FAJIT: a fuzzy-based data aggregation technique for energy efficiency in wireless sensor network S Bhushan, M Kumar, P Kumar, T Stephan, A Shankar, P Liu Complex & Intelligent Systems 7, 997-1007, 2021 | 84 | 2021 |
An experimental analysis of various machine learning algorithms for hand gesture recognition S Bhushan, M Alshehri, I Keshta, AK Chakraverti, J Rajpurohit, ... Electronics 11 (6), 968, 2022 | 49 | 2022 |
A hybrid MCDM framework and simulation analysis for the assessment of worst polluted cities S Raheja, MS Obaidat, M Kumar, B Sadoun, S Bhushan Simulation Modelling Practice and Theory 118, 102540, 2022 | 29 | 2022 |
A new approach towards IoT by using health care-IoT and food distribution IoT S Bhushan, B Bohara, P Kumar, V Sharma 2016 2nd International conference on advances in computing, communication …, 2016 | 23 | 2016 |
Filtering spam messages and mails using fuzzy C means algorithm AK Singh, S Bhushan, S Vij 2019 4th international conference on internet of things: smart innovation …, 2019 | 20 | 2019 |
Comparative study and analysis of wireless mesh networks on AODV and DSR S Bhushan, AK Singh, S Vij 2019 4th International conference on internet of things: smart innovation …, 2019 | 20 | 2019 |
A Proportional Sentiment Analysis of MOOCs Course Reviews Using Supervised Learning Algorithms. AK Singh, S Kumar, S Bhushan, P Kumar, A Vashishtha Ingénierie des Systèmes d'Information 26 (5), 2021 | 18 | 2021 |
Secure and energy efficient data transmission model for WSN AK Singh, M Alshehri, S Bhushan, M Kumar, O Alfarraj, KR Pardarshani Intelligent Automation & Soft Computing 27 (3), 761-769, 2021 | 16 | 2021 |
Secure key management and mutual authentication protocol for wireless sensor network by linking edge devices using hybrid approach Sharmila, P Kumar, S Bhushan, M Kumar, M Alazab Wireless Personal Communications 130 (4), 2935-2957, 2023 | 14 | 2023 |
Implementation and evaluation of wireless mesh networks on MANET routing protocols S Bhushan, A Saroliya, V Singh International Journal of Advanced Research in Computer and Communication …, 2013 | 13 | 2013 |
A novel approach to face pattern analysis S Bhushan, M Alshehri, N Agarwal, I Keshta, J Rajpurohit, A Abugabah Electronics 11 (3), 444, 2022 | 10 | 2022 |
Secure authentication in WLAN using modified four-way handshake protocol M Diwakar, P Singh, P Kumar, K Tiwari, S Bhushan, M Kaushik Machine Learning, Advances in Computing, Renewable Energy and Communication …, 2021 | 9 | 2021 |
Scantime antivirus evasion and malware deployment using silent-SFX S Bhushan, P Kumar, A Kumar, V Sharma 2016 International Conference on Advances in Computing, Communication …, 2016 | 8 | 2016 |
Performance evaluation of reactive routing protocols in VANET S Chauhan, SB Tyagi International Journal of Innovations and Advancement in Computer Science 3 …, 2014 | 8 | 2014 |
Energy conservation and Missing value prediction model in Wireless Sensor Network A Rawat, A Gupta, A Singh, S Bhushan 2019 4th International Conference on Internet of Things: Smart Innovation …, 2019 | 7 | 2019 |
An overview of data redundancy reduction schemes in WSNs V Sharma, S Kumar, S Bhushan 2017 3rd International conference on advances in computing, communication …, 2017 | 7 | 2017 |
Enhancing the Paddy Disease Classification by Using Cross‐Validation Strategy for Artificial Neural Network over Baseline Classifiers V Malathi, MP Gopinath, M Kumar, S Bhushan, S Jayaprakash Journal of Sensors 2023 (1), 1576960, 2023 | 6 | 2023 |
A critical review on secure authentication in wireless network M Diwakar, P Singh, P Kumar, K Tiwari, S Bhushan Machine Learning, Advances in Computing, Renewable Energy and Communication …, 2022 | 6 | 2022 |
A brief analysis and comparison of DCT-and DWT-based image compression techniques AK Singh, S Bhushan, S Vij Information Management and Machine Intelligence: Proceedings of ICIMMI 2019 …, 2021 | 6 | 2021 |
A novel digital forensic inspection model for XSS attack S Bhushan Soft Computing: Theories and Applications: Proceedings of SoCTA 2021, 747-759, 2022 | 4 | 2022 |