A survey on security issues in cloud computing R Bhadauria, R Chaki, N Chaki, S Sanyal arXiv preprint arXiv:1109.5388, 1-15, 2011 | 219 | 2011 |
Moving object detection using background subtraction SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed, N Chaki Moving object detection using background subtraction, 15-23, 2014 | 170 | 2014 |
A comprehensive survey on image binarization techniques N Chaki, SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed Exploring Image Binarization Techniques, 5-15, 2014 | 93 | 2014 |
Ant colony based routing for mobile ad-hoc networks towards improved quality of services B Roy, S Banik, P Dey, S Sanyal, N Chaki Journal of Emerging Trends in Computing and Information Sciences 3 (1), 10-14, 2012 | 91 | 2012 |
Exploring neural networks with C R Tadeusiewicz, R Chaki, N Chaki CRC Press, 2014 | 90 | 2014 |
Exploring image binarization techniques N Chaki, SH Shaikh, K Saeed Springer India 1, 4, 2014 | 85 | 2014 |
A study on wormhole attacks in MANET R Maulik, N Chaki International Journal of Computer Information Systems and Industrial …, 2011 | 79 | 2011 |
A new image binarization method using iterative partitioning SH Shaikh, AK Maiti, N Chaki Machine vision and applications 24, 337-350, 2013 | 70 | 2013 |
Can# Twitter_trends predict election results? Evidence from 2014 Indian general election A Khatua, A Khatua, K Ghosh, N Chaki 2015 48th Hawaii international conference on system sciences, 1676-1685, 2015 | 67 | 2015 |
Secure and trusted cloud of things T Bhattasali, R Chaki, N Chaki 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 65 | 2013 |
A comprehensive review on wormhole attacks in MANET R Maulik, N Chaki 2010 International Conference on Computer Information Systems and Industrial …, 2010 | 60 | 2010 |
IDSX: a cluster based collaborative intrusion detection algorithm for mobile ad-hoc network R Chaki, N Chaki 6th International Conference on Computer Information Systems and Industrial …, 2007 | 52 | 2007 |
Resource allocation in cloud using simulated annealing D Pandit, S Chattopadhyay, M Chattopadhyay, N Chaki 2014 Applications and Innovations in Mobile Computing (AIMoC), 21-27, 2014 | 48 | 2014 |
Moving object detection approaches, challenges and object tracking SH Shaikh, K Saeed, N Chaki, SH Shaikh, K Saeed, N Chaki Moving object detection using background subtraction, 5-14, 2014 | 43 | 2014 |
LACBER: a new location aided routing protocol for GPS scarce MANET D Deb, SB Roy, N Chaki International Journal of Wireless & Mobile Networks (IJWMN) 1 (1), 22-34, 2009 | 42 | 2009 |
A survey of security and privacy issues for biometrics based remote authentication in cloud T Bhattasali, K Saeed, N Chaki, R Chaki Computer Information Systems and Industrial Management: 13th IFIP TC8 …, 2014 | 41 | 2014 |
Evaluation of middleware architectures in achieving system interoperability P Young, N Chaki, V Berzins 14th IEEE International Workshop on Rapid Systems Prototyping, 2003 …, 2003 | 41 | 2003 |
Detection of dental caries lesion at early stage based on image analysis technique S Datta, N Chaki 2015 IEEE International Conference on Computer Graphics, Vision and …, 2015 | 40 | 2015 |
HIDS: Honesty-rate based collaborative intrusion detection system for mobile ad-hoc networks P Sen, N Chaki, R Chaki 2008 7th Computer Information Systems and Industrial Management Applications …, 2008 | 39 | 2008 |
Character recognition N Chaki, SH Shaikh US Patent 8,391,602, 2013 | 38 | 2013 |