Performance analysis of encryption algorithms for security M Panda 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 97 | 2016 |
Security in wireless sensor networks using cryptographic techniques M Panda American Journal of Engineering Research (AJER) 3 (01), 50-56, 2014 | 70 | 2014 |
Fault tolerant routing in heterogeneous environment M Panda, P Pradhan, H Mohapatra, NK Barpanda International journal of scientific & technology research 8 (8), 1009-1013, 2019 | 39 | 2019 |
Data security in wireless sensor networks via AES algorithm M Panda 2015 IEEE 9th International Conference on Intelligent Systems and Control …, 2015 | 36 | 2015 |
Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux M Panda, A Nag 2015 Second International Conference on Advances in Computing and …, 2015 | 28 | 2015 |
Security threats at each layer of wireless sensor networks M Panda International Journal of Advanced Research in Computer Science and Software …, 2013 | 22 | 2013 |
A survey of shortest-path algorithms M Panda, A Mishra International Journal of Applied Engineering Research 13 (9), 6817-6820, 2018 | 19 | 2018 |
Performance comparison of genetic algorithm, particle swarm optimization and simulated annealing applied to TSP M Panda International Journal of Applied Engineering Research 13 (9), 6808-6816, 2018 | 12 | 2018 |
It enabled business process reengineering M Panda International Journal of Information Technology & Management Information …, 2013 | 9 | 2013 |
A Novel Approach to Maximize Network Life Time by Reducing the Variance of Power Consumption AmongNodes in Wireless Sensor Network K Das, M Panda International Journal of Advance Computation and Networking, 2013 | 8 | 2013 |
Cardiac disease prediction using smote and machine learning classifiers S Priyadarshinee, M Panda Journal of Pharmaceutical Negative Results, 856-862, 2022 | 6 | 2022 |
Improving prediction of chronic heart failure using smote and machine learning S Priyadarshinee, M Panda 2022 Second International Conference on Computer Science, Engineering and …, 2022 | 6 | 2022 |
Network structure based protocols for Wireless Sensor Networks M Panda, PK Sethy 2014 International Conference on Advances in Engineering & Technology …, 2014 | 6 | 2014 |
Congestion control in cable network transmission using novel red algorithm PK Dash, NK Barpanda, M Panda International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | 5 | 2019 |
Performance evaluation of symmetric encryption algorithms for information security M Panda Int. J. Adv. Res. Trends Eng. Technol 4 (11), 2017 | 5 | 2017 |
Text and image encryption decryption using symmetric key algorithms on different platforms M Panda Int. J. Sci. Technol. Res 8 (09), 2019 | 3 | 2019 |
Parameter setting and stability of PI controller for AQM router PK Dash, SK Bisoy, NK Kamila, M Panda Handbook of Research on Wireless Sensor Network Trends, Technologies, and …, 2017 | 3 | 2017 |
Performance analysis of encryption algorithms for security P Madhumita Signal Processing, Communication, Power and Embedded System (SCOPES), 2016 …, 2016 | 3 | 2016 |
SMLMAC-HEAP: Slotted multi-layer MAC protocol for wireless sensor networks powered by ambient energy harvesting PK Dash, M Panda Indian Journal of Science and Technology 15 (36), 1827-1835, 2022 | 2 | 2022 |
Machine automation making cyber-policy violator more resilient: A proportionate study GR Panigrahi, NK Barpanda, M Panda Handbook of Research on Automated Feature Engineering and Advanced …, 2021 | 2 | 2021 |