Face recognition using PCA and LDA algorithm A Bansal, K Mehta, S Arora 2012 second international conference on Advanced Computing & Communication …, 2012 | 85 | 2012 |
3D Location Oriented Routing in Flying Ad-Hoc Networks for Information Dissemination S Kumar, RS Raw, A Bansal, MA Mohammed, P Khuwuthyakorn, ... IEEE Access 9, 137083 - 137098, 2021 | 28 | 2021 |
Health monitoring planning for on-board ships through flying ad hoc network S Kumar, A Bansal, RS Raw Advanced Computing and Intelligent Engineering: Proceedings of ICACIE 2018 …, 2020 | 26 | 2020 |
Minimize the routing overhead through 3D cone shaped location-aided routing protocol for FANETs S Kumar, RS Raw, A Bansal International Journal of Information Technology 13 (1), 89-95, 2021 | 25 | 2021 |
Performance analysis of supervised machine learning techniques for cyberstalking detection in social media AK Gautam, A Bansal Journal of Theoretical and Applied Information Technology 100 (2), 449-461, 2022 | 22 | 2022 |
Analysis of effective routing protocols for flying ad-hoc networks S Kumar, A Bansal, RS Raw International Journal of Smart Vehicles and Smart Transportation (IJSVST) 3 …, 2020 | 19 | 2020 |
Performance investigation of topology-based routing protocols in flying ad-hoc networks using NS-2 S Kumar, A Bansal IoT and cloud computing advancements in vehicular ad-hoc networks, 243-267, 2020 | 15 | 2020 |
Information and communication technology for improving livelihoods of tribal community in India V Kumar, A Bansal Int. J. Comput. Eng. Sci 3 (5), 13-21, 2013 | 15 | 2013 |
LoCaL: link‐optimized cone‐assisted location routing in flying ad hoc networks S Kumar, RS Raw, A Bansal International Journal of Communication Systems 36 (2), e5375, 2023 | 13 | 2023 |
Effect of features extraction techniques on cyberstalking detection using machine learning framework AK Gautam, A Bansal Journal of Advances in Information Technology 13 (5), 2022 | 12 | 2022 |
Energy and direction aware routing protocol for flying ad hoc networks S Kumar, RS Raw, A Bansal Proceedings of international conference on communication, circuits, and …, 2021 | 12 | 2021 |
Secure data hiding using eight queens solutions SK Muttoo, V Kumar, A Bansal International Journal of Information Security and Privacy (IJISP) 6 (4), 55-70, 2012 | 9 | 2012 |
Automatic cyberstalking detection on twitter in real-time using hybrid approach AK Gautam, A Bansal International Journal of Modern Education and Computer Science 13 (1), 58, 2023 | 7 | 2023 |
Data hiding method based on inter-block difference in eight queens solutions and LSB substitution V Kumar, A Bansal, SK Muttoo International Journal of Information Security and Privacy (IJISP) 8 (2), 55-68, 2014 | 6 | 2014 |
Email-Based cyberstalking detection on textual data using Multi-Model soft voting technique of machine learning approach AK Gautam, A Bansal Journal of Computer Information Systems 63 (6), 1362-1381, 2023 | 5 | 2023 |
Secure Data Hiding Along Randomly Selected Closed Knight's Tour A Bansal, SK Muttoo, V Kumar Journal of Applied Security Research 11 (1), 90-100, 2016 | 5 | 2016 |
Data hiding approach based on eight-queens problem and pixel mapping method A Bansal, SK Muttoo, V Kumar International Journal of Signal Processing 7 (5), 47-58, 2014 | 5 | 2014 |
Steganography Technique Inspired by Rook A Bansal, V Kumar International Journal of Information Security and Privacy (IJISP) 15 (2), 53-67, 2021 | 4 | 2021 |
A predictive model for cyberstalking detection on twitter using support vector machine (SVM) AK Gautama, A Bansal AIJR Abstracts, 12, 2022 | 3 | 2022 |
Security against sample pair steganalysis in eight queens data hiding technique A Bansal, SK Muttoo, V Kumar International Journal of Computer Network and Information Security 8 (8), 39, 2016 | 3 | 2016 |