A review paper: noise models in digital image processing AK Boyat, BK Joshi arXiv preprint arXiv:1505.03489, 2015 | 551 | 2015 |
Image denoising using wavelet transform and median filtering A Boyat, BK Joshi 2013 Nirma University International Conference on Engineering (NUiCONE), 1-6, 2013 | 75 | 2013 |
Impact of wavelet transform and median filtering on removal of salt and pepper noise in digital images A Joshi, AK Boyat, BK Joshi 2014 International Conference on Issues and Challenges in Intelligent …, 2014 | 54 | 2014 |
Mitigate wormhole attack and blackhole attack using elliptic curve cryptography in MANET M Shukla, BK Joshi, U Singh Wireless Personal Communications 121, 503-526, 2021 | 41 | 2021 |
A mitigation technique for high transmission power based wormhole attack in wireless sensor networks MK Sharma, BK Joshi 2016 International Conference on ICT in Business Industry & Government …, 2016 | 23 | 2016 |
Image denoising using wavelet transform and wiener filter based on log energy distribution over Poisson-Gaussian noise model AK Boyat, BK Joshi 2014 IEEE international conference on computational intelligence and …, 2014 | 21 | 2014 |
Rola: an equi-matrik chhand of Hindi poems KK Kushwah, BK Joshi International Journal of Computer Science and Information Security 15 (3 …, 2017 | 16 | 2017 |
Data Structures and Algorithms in C++ BK Joshi Tata McGraw Hill Education, 2010 | 16 | 2010 |
A review paper: Noise models in digital image processing. arXiv 2015 AK Boyat, BK Joshi arXiv preprint arXiv:1505.03489, 0 | 16 | |
Detection & prevention of vampire attack in wireless sensor networks MK Sharma, BK Joshi 2017 International conference on information, communication, instrumentation …, 2017 | 15 | 2017 |
Image Denoising using Wavelet Transform and Median Filtering’, IEEE Nirma University International Conference on Engineering A Boyat, BK Joshi Ahemdabad, 2013 | 15 | 2013 |
Sandhi: the rule-based word formation in Hindi BK Joshi, KK Kushwaha International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 14 | 2016 |
A parallel lexical analyzer for multi-core machines A Barve, BK Joshi 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 1-3, 2012 | 14 | 2012 |
A review paper: Noise models in digital image processing. arXiv AK Boyat, BK Joshi arXiv preprint arXiv:1505.03489, 2015 | 13 | 2015 |
Security assessment of AODV protocol under wormhole and DOS attacks BK Joshi, M Soni 2016 2nd international conference on contemporary computing and informatics …, 2016 | 12 | 2016 |
Parallel lexical analysis on multi-core machines using divide and conquer A Barve, BK Joshi 2012 Nirma University International Conference on Engineering (NUiCONE), 1-5, 2012 | 12 | 2012 |
Security assessment of SAODV protocols in mobile ad hoc networks M Soni, BK Joshi Data Science and Big Data Analytics: ACM-WIR 2018, 347-355, 2019 | 11 | 2019 |
Security assessment of routing protocols in mobile adhoc networks M Soni, BK Joshi 2016 International Conference on ICT in Business Industry & Government …, 2016 | 10 | 2016 |
Hindi modifier recognition based on pixel relationship KK Kushwah, BK Joshi 2016 International Conference on ICT in Business Industry & Government …, 2016 | 10 | 2016 |
A novel approach to automatic detection of Chaupai Chhand in Hindi poems BK Joshi, KK Kushwah 2018 International Conference on Computing, Power and Communication …, 2018 | 9 | 2018 |