Role of cloud computing technology in agriculture fields SK Choudhary, RS Jadoun, HL Mandoriya Computing 7 (3), 1-7, 2016 | 54 | 2016 |
Two-stage human activity recognition using 2D-ConvNet KK Verma, BM Singh, HL Mandoria, P Chauhan IJIMAI 6 (2), 125-135, 2020 | 33 | 2020 |
Routing protocols in mobile ad-hoc network: A review. B Renu, PT mandoria Hardwari lal International Conference on Quality, Reliability, Security and Robustness …, 2013 | 27 | 2013 |
A proposed model for Intrusion Detection System for mobile adhoc network S Husain, SC Gupta, M Chand, HL Mandoria 2010 International Conference on Computer and Communication Technology …, 2010 | 23 | 2010 |
Network Intrusion Detection: A comparative study using state-of-the-art machine learning methods M Rai, HL Mandoria 2019 international conference on issues and challenges in intelligent …, 2019 | 21 | 2019 |
A study on cyber crimes cyber criminals and major security breaches M Rai, H Mandoria Int. Res. J. Eng. Technol 6 (7), 1-8, 2019 | 18 | 2019 |
A complete guide to wireless sensor networks: from inception to current trends A Dumka, SK Chaurasiya, A Biswas, HL Mandoria CRC Press, 2019 | 16 | 2019 |
Study of task scheduling algorithms in the cloud computing environment: a review AK Yadav, HL Mandoria Int. J. Comput. Sci. Inf. Technol 8 (4), 462-468, 2017 | 13 | 2017 |
Data security analysis in cloud environment: a review M Thapliyal, HL Mandoria, N Garg Int. J. Innovations Adv. Comput. Sci2, 14-19, 2014 | 11 | 2014 |
Content based image retrieval using statistical feature and shape extraction P Kothyari, S Dwivedi, HL Mandoria Int J Innov Res Comput Commun Eng 4 (6), 2016 | 10 | 2016 |
Latest development of cloud computing technology, characteristics, challenge, services & applications SK Choudhary, RS Jadoun, HL Mandoria, A Kumar IOSR Journal of Computer Engineering 16 (6), 57-68, 2014 | 10 | 2014 |
A combined classifier to detect landmines using rough set theory and Hebb net learning & fuzzy filter as neural networks S Kumar, S Atri, HL Mandoria 2009 International Conference on Signal Processing Systems, 423-427, 2009 | 10 | 2009 |
Simulation study for performance comparison of routing protocols in mobile adhoc network A Anzaar, H Shahnawaz, C Mukesh, SC Gupta, R Gowri, HL Mandoria World Academy of Science, Engineering and Technology 4 (10), 2010 | 9 | 2010 |
A survey on various text detection and extraction techniques from videos and images S Paliwal, R Singh, M HL International Journal of Computer Science Engineering and Information …, 2016 | 7 | 2016 |
A review of leading databases: Relational & non-relational database NK Kashyap, BK Pandey, HL Mandoria, A Kumar i-Manager's Journal on Information Technology 5 (2), 34, 2016 | 7 | 2016 |
Analysis on Enhancements in LEACH Protocol for WSN R Kandpal, R Singh, HL Mandoria International Journal of Computer Science and Engineering (SSRG-IJCSE) 2, 2015 | 7* | 2015 |
A Review Paper on Chaotic Map Image Encryption Techniques C Singh, BK Pandey, HLM Mandoria, A Kumar International Research Journal of Engineering and Technology, 2018 | 6 | 2018 |
Texture, Shape And Color Based Classification Of Satellite Images Using Glcm & Gabor Filter, Fuzzy C Means And Svm D Arya, RS Singh, A Kumar, H Mandoria Int Res J Eng Technol 5 (4), 751-4, 2018 | 6 | 2018 |
Implementation of QoS algorithm in integrated services (IntServ) MPLS network A Dumka, HL Mandoria, V Fore, K Dumka 2015 2nd international conference on computing for sustainable global …, 2015 | 6 | 2015 |
Performance study of VANET using ant based routing algorithms R Kochhar, HL Mandoria 2015 2nd international conference on computing for sustainable global …, 2015 | 6 | 2015 |