Image processing techniques for detection of leaf disease AN Rathod, B Tanawal, V Shah International Journal of Advanced Research in Computer Science and Software …, 2013 | 149 | 2013 |
Leaf disease detection using image processing and neural network AN Rathod, BA Tanawala, VH Shah International Journal of Advance Engineering and Research Development …, 2014 | 43 | 2014 |
Load balancing by process migration in distributed operating system V Shah, J Donga LAP LAMBERT Academic Publishing, 2020 | 17 | 2020 |
An analysis and review on memory management algorithms for real time operating system VH Shah, A Shah International Journal of Computer Science and Information Security 14 (5), 236, 2016 | 11 | 2016 |
Review on generative adversarial networks MJ Patel, MS Pandya, V Shah other words 4 (7), 2018 | 9 | 2018 |
Big video data analytics using Hadoop V Shah International Journal of Advanced Research in Computer Science and Software …, 2015 | 8 | 2015 |
Load balancing algorithm by process migration in distributed operating system V Shah, K Patel International Journal of Computer Science and Information Technology …, 2012 | 7 | 2012 |
Proposed Memory Allocation Algorithm for NUMA-Based Soft Real-Time Operating System V Shah, A Shah Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 6 | 2019 |
International Journal of Advance Engineering and Research Development VK Yadav, MH Fulekar Development 4 (10), 2017 | 5 | 2017 |
Improve fingerprint and recognition using both minutiae based and pattern based method A Patel, V Agrawal, VH Shah Orient. J. Comput. Sci. Technol 7 (2), 251-256, 2014 | 5 | 2014 |
Applicability analysis of attention U-Nets over vanilla variants for automated ship detection P Gajjar, M Garg, V Shah, P Shah, A Das Reports on Geodesy and Geoinformatics 114, 2022 | 3 | 2022 |
An analysis of different computer science algorithms with the graph theory of Mathematics J Donga, P Bhojak, K Patel, V Shah Reliability: Theory & Applications 16 (SI 1 (60)), 376-383, 2021 | 3 | 2021 |
Automated Web Application Vulnerability Detection With Peneteration Testing P Bhojak, V Shah, K Patel, D Gol ICRISET2017 2, 2017 | 3 | 2017 |
Comparitive study on ipv4 and ipv6 internet protocol U Patel, J Chhatbar, V Shah Int. J. Adv. Eng. Res. Dev 1, 58-62, 2014 | 2 | 2014 |
Detection of Cotton Leaf Curl Disease K Viveki, P Rudani, V Shah Int. J. Advance Engg. And Res. Develop.(IJAERD), 2014 | 2 | 2014 |
Handwritten character recognition HS Amrutiya, PP Moghariya, VH Shah International Journal of Advance Engineering and Research Development …, 2014 | 2 | 2014 |
Detection of COVID-19 using Chest X-rays K Rana, P Jain, V Shah, R Shah, K Ullal, MR Edinburgh 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-5, 2022 | 1 | 2022 |
Abnormality Detection Based on ECG Segmentation MM Sevak, D Patel, P Mishra, V Shah International Conference on Advanced Informatics for Computing Research, 89-99, 2020 | 1 | 2020 |
Industrial waste water treatment using natural adsorbents B Kamble, P Bhusari, V Shah, V Mane, M Suryawanshi Development 4 (4), 2017 | 1 | 2017 |
Pca and kpca algorithms for face recognition–a survey SM Dhokai, VB Vala, VH Shah International Journal of Advance Engineering and Research Development 1 (4), 2014 | 1 | 2014 |