Land records on blockchain for implementation of land titling in India V Thakur, MN Doja, YK Dwivedi, T Ahmad, G Khadanga International Journal of Information Management 52, 101940, 2020 | 263 | 2020 |
Fuzzy based enhanced cluster head selection (FBECS) for WSN PS Mehra, MN Doja, B Alam Journal of King Saud University-Science 32 (1), 390-401, 2020 | 190 | 2020 |
Detecting distraction of drivers using convolutional neural network S Masood, A Rai, A Aggarwal, MN Doja, M Ahmad Pattern Recognition Letters 139, 79-85, 2020 | 141 | 2020 |
A new hyperchaotic system-based design for efficient bijective substitution-boxes E Al Solami, M Ahmad, C Volos, MN Doja, MMS Beg entropy 20 (7), 525, 2018 | 110 | 2018 |
A New 1D Chaotic Map and -Hill Climbing for Generating Substitution-Boxes AA Alzaidi, M Ahmad, MN Doja, E Al Solami, MMS Beg IEEE Access 6, 55405-55418, 2018 | 107 | 2018 |
Feature and opinion mining for customer review summarization M Abulaish, Jahiruddin, MN Doja, T Ahmad Pattern Recognition and Machine Intelligence: Third International Conference
, 2009 | 96 | 2009 |
Security analysis and enhancements of an image cryptosystem based on hyperchaotic system M Ahmad, MN Doja, MMS Beg Journal of King Saud University-Computer and Information Sciences 33 (1), 77-85, 2021 | 70 | 2021 |
ABC optimization based construction of strong substitution-boxes M Ahmad, MN Doja, MMS Beg Wireless Personal Communications 101, 1715-1729, 2018 | 63 | 2018 |
Hybrid filterwrapper feature selection method for sentiment classification G Ansari, T Ahmad, MN Doja Arabian Journal for Science and Engineering 44, 9191-9208, 2019 | 61 | 2019 |
K-means clustering using weka interface S Jain, MA Aalam, MN Doja Proceedings of the 4th National Conference, 25-26, 2010 | 55 | 2010 |
Cryptanalysis of an image encryption algorithm based on combined chaos for a BAN system, and improved scheme using SHA-512 and hyperchaos M Ahmad, E Al Solami, XY Wang, MN Doja, MMS Beg, AA Alzaidi Symmetry 10 (7), 266, 2018 | 52 | 2018 |
H-leach: Modified and efficient leach protocol for hybrid clustering scenario in wireless sensor networks V Gupta, MN Doja Next-Generation Networks: Proceedings of CSI-2015, 399-408, 2018 | 47 | 2018 |
Swarm Intelligent Power-Aware Detection of Unauthorized and Compromised Nodes in MANETs. S Mehfuz, MN Doja Journal of Artificial Evolution & Applications, 2008 | 46 | 2008 |
Zonal based approach for clustering in heterogeneous WSN PS Mehra, MN Doja, B Alam International Journal of Information Technology 11 (3), 507-515, 2019 | 43 | 2019 |
5-layered architecture of cloud database management system B Alam, MN Doja, M Alam, S Mongia AASRI Procedia 5, 194-199, 2013 | 42 | 2013 |
Image authentication schemes against key-logger spyware MN Doja, N Kumar 2008 Ninth ACIS International Conference on Software Engineering, Artificial
, 2008 | 38 | 2008 |
Generalization of Dijkstra's Algorithm for Extraction of Shortest Paths in Directed multigraphs. SS Biswas, B Alam, MN Doja J. Comput. Sci. 9 (3), 377-382, 2013 | 36 | 2013 |
Swarm intelligence-based topology maintenance protocol for wireless sensor networks MB Krishna, MN Doja IET wireless sensor systems 1 (4), 181-190, 2011 | 32 | 2011 |
Finding time quantum of round robin cpu scheduling algorithm using fuzzy logic B Alam, MN Doja, R Biswas 2008 International Conference on Computer and Electrical Engineering, 795-798, 2008 | 32 | 2008 |
Self-organized energy conscious clustering protocol for wireless sensor networks MB Krishna, MN Doja 2012 14th International Conference on Advanced Communication Technology
, 2012 | 31 | 2012 |