" Comparing Different Gateway Discovery Mechanism for Connectivity of Internet & MANET. ILPBNP Kamaljit International Journal of Wireless Communication and Simulation,(IJWCS), 2 (1 …, 0 | 12* | |
A Comparative Study of Attacks, Security Mechanisms, Preventive Measures, and Challenges in Wireless Sensor Networks KI Lakhtaria Encyclopedia of Information Science and Technology, Third Edition, 6104-6113, 2015 | 1 | 2015 |
A Comparative Study of Lossless Compression Algorithm on Text Data A Jain, KI Lakhtaria, P Srivastava Advances in Engineering and Technology, 536-543, 2013 | 11 | 2013 |
A distance based static index pruning method for phrase terms SK Vishwakarma, D Bhatnagar, K Lakhtaria, Y Vyas | | |
A review of steganography techniques AM Khalaf, K Lakhtaria AIP Conference Proceedings 3051 (1), 2024 | 1 | 2024 |
A SURVEY ON SYMMETRIC-KEY AND ASYMMETRIC-KEY ALGORITHMS BASED CRYPTOGRAPHY AM Khalaf, K Lakhtaria Towards Excellence 14 (1), 2022 | | 2022 |
A survey on wireless sensor networks H Toral-Cruz, F Hidoussi, DE Boubiche, R Barbosa, M Voznak, ... Next Generation Wireless Network Security and Privacy, 171-210, 2015 | 15 | 2015 |
Ad-hoc Retrieval on FIRE data set with TF-IDF and Probabilistic Models CS Jangid, SK Vishwakarma, KI Lakhtaria International Journal of Computer Applications 93 (18), 2014 | 5 | 2014 |
Advancements and Applications in Mobile Ad-Hoc Networks KI Lakhtaria | | 2012 |
An analytical approach based on self organized maps (SOM) in Indian classical music raga clustering AK Sharma, KI Lakhtaria, A Panwar, S Vishwakarma 2014 Seventh International Conference on Contemporary Computing (IC3), 449-453, 2014 | 11 | 2014 |
An efficient approach for inverted index pruning based on document relevance SK Vishwakarma, KI Lakhtaria, D Bhatnagar, AK Sharma in Fourth International Conference on Communication Systems and Network …, 2014 | 18 | 2014 |
An efficient approach using LPFT for the karaoke formation of musical song AK Sharma, KI Lakhtaria, A Panwar, SK Vishwakarma 2014 IEEE International Advance Computing Conference (IACC), 601-605, 2014 | 7 | 2014 |
Analyzing generation and transmission of h. 264 multi-bitrate stream KI Lakhtaria, D Modi | | |
Analyzing Horizontal Integration among SOA, Cloud Computing and Grid Computing KD Trivedi, KI Lakhtaria, PR Shah, NJ Patel Global Journal of Computer Science and Technology 10 (7), 81-85, 2010 | | 2010 |
Analyzing Reactive Routing Protocols in Mobile Ad Hoc Networks KI Lakhtaria International Journal of Advanced Networking and Applications 3 (6), 1416-1421, 2012 | | 2012 |
Analyzing service integration between UMTS & WLAN network KI Lakhtaria Oriental Journal of Computer Science and Technology, 165-171, 2009 | | 2009 |
Analyzing Visual Cryptography with Watermark Hiding Technique KI Lakhtaria | | |
Analyzing Visual Cryptography with Watermark Technique KI Lakhtaria International Journal of Computer Applications 8, 4-8, 2013 | | 2013 |
Analyzing Web 2.0 Integration with Next Generation Networks for Services Rendering KI Lakhtaria, D Nagamalai International Conference on Web and Semantic Technology, 581-591, 2010 | 7 | 2010 |
Analyzing Zone Routing Protocol in MANET Applying Authentic Parameter KI Lakhtaria, P Patel Global Journal of Computer Science & Technology 10 (4), 114-118, 2010 | 22 | 2010 |