Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization S Kaur, LK Awasthi, AL Sangal, G Dhiman Engineering Applications of Artificial Intelligence 90, 103541, 2020 | 970 | 2020 |
A critical survey of live virtual machine migration techniques A Choudhary, MC Govil, G Singh, LK Awasthi, ES Pilli, D Kapil Journal of Cloud Computing 6, 1-41, 2017 | 122 | 2017 |
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions P Kumar, S Chauhan, LK Awasthi Engineering Applications of Artificial Intelligence 120, 105894, 2023 | 82 | 2023 |
A distributed weighted cluster based routing protocol for MANETs N Chauhan, LK Awasthi, N Chand, A Chugh Computer Networks and Information Technologies: Second International …, 2011 | 69 | 2011 |
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach LK Awasthi, P Kumar International Journal of Information and Computer Security 1 (3), 298-314, 2007 | 67 | 2007 |
Comprehensive Survey on Petya Ransomware Attack JS Aidan, HK Verma, LK Awasthi 2017 International Conference on Next Generation Computing and Information …, 2017 | 64 | 2017 |
Low overhead optimal checkpointing for mobile distributed systems L Kumar, M Mishra, RC Joshi Proceedings 19th International Conference on Data Engineering (Cat. No …, 2003 | 64 | 2003 |
A non-intrusive minimum process synchronous checkpointing protocol for mobile distributed systems P Kumar, L Kumar, RK Chauhan, VK Gupta 2005 IEEE International Conference on Personal Wireless Communications, 2005 …, 2005 | 63 | 2005 |
A review of deep learning techniques used in agriculture I Attri, LK Awasthi, TP Sharma, P Rathee Ecological Informatics, 102217, 2023 | 50 | 2023 |
An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs AS Nandan, S Singh, LK Awasthi Applied Soft Computing 107, 107318, 2021 | 49 | 2021 |
Sentiment Analysis Approach Based on N-gram and KNN Classifier S Kaur, G Sikka, LK Awasthi 2018 First International Conference on Secure Cyber Computing and …, 2018 | 47 | 2018 |
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review RM Singh, LK Awasthi, G Sikka ACM Computing Surveys (CSUR) 55 (3), 1-43, 2022 | 45 | 2022 |
Robust data security for cloud while using third party auditor A Mohta, RK Sahu, LK Awasthi International journal of advanced research in computer science and software …, 2012 | 36 | 2012 |
Proactive approach for cooperative caching in mobile adhoc networks P Kumar, N Chauhan, LK Awasthi, N Chand International Journal of Computer Science Issues (IJCSI) 7 (3), 21, 2010 | 36 | 2010 |
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges M Chaudhary, N Goyal, A Benslimane, LK Awasthi, A Alwadain, A Singh IEEE Internet of Things Journal 10 (4), 3500-3524, 2022 | 35 | 2022 |
Peer-to-peer networks and computation: Current trends and future perspectives A Gupta, LK Awasthi Computing and Informatics 30 (3), 559-594, 2011 | 34 | 2011 |
Cloud data security while using third party auditor A Mohta, LK Awasti International Journal of Scientific & Engineering Research 3 (6), 1, 2012 | 33 | 2012 |
A range based node localization scheme with hybrid optimization for underwater wireless sensor network M Nain, N Goyal, LK Awasthi, A Malik International Journal of Communication Systems 35 (10), e5147, 2022 | 31 | 2022 |
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation N Agarwal, G Sikka, LK Awasthi Expert Systems with Applications 161, 113682, 2020 | 29 | 2020 |
Priority based efficient data scheduling technique for VANETs BB Dubey, N Chauhan, N Chand, LK Awasthi Wireless Networks 22, 1641-1657, 2016 | 28 | 2016 |