Survey of fully homomorphic encryption and its potential to cloud computing security S Agrawal, A Choubey International Journal of Advanced Research in Computer Science and Software …, 2014 | 10 | 2014 |
Comparative Analysis and Implementation of DSDV and AODV Routing Protocol for MANET S Goverdhan, A Choubey International Journal of Computer Techniques 2 (3), 2015 | 3 | 2015 |
Offline signature verification and recognition using neural network A Arora, AS Choubey International Journal of Science and Research (IJSR) 2 (8), 2013 | 3 | 2013 |
Comparative Analysis of Off-line Signature Recognition A Arora, AS Choubey Volume 2, 241-245, 2013 | 3 | 2013 |
Delay Calculation Of Gray Bus Encoder As Per Microelectronic Standard K Mehta, AS Choubey, M Kowar, HR Sharma i-Manager's Journal on Electrical Engineering 3 (2), 59, 2009 | 1 | 2009 |
Lungs Disease Detection using Image Processing through Python T Sahu, AS Choubey i-manager's Journal on Image Processing 9 (1), 1, 2022 | | 2022 |
A Review on Lungs Disease Detection using Image Processing T Sahu, AS Choubey i-Manager's Journal on Information Technology 11 (1), 48, 2021 | | 2021 |
Analysis of AODV Routing Protocol and Use of Colored Petri Net in AODV Routing Protocol M Dewangan, A Choubey International Journal 4 (9), 2014 | | 2014 |
A Survey & Analysis of Routing Protocols for Mobile Ad-hoc network S Goverdhan, A Choubey International Journal of Advanced Research in Computer Engineering …, 2014 | | 2014 |
Fully Automated Approach to Identify Brain Tumors in 2D MRI Using Thresholding and Region Growing Method Y Dewangan, AS Choubey | | 2014 |
Generative Adversarial Networks: Techniques, Area Covered, and Challenges AS Choubey, S Gajbhiye, R Tiwari | | |
Securing Personalized Medical Data in Cloud Using Homomorphic Encryption S Agrawal, A Choubey | | |
AN IMPLEMENTATION OF LBS TO SENT AN EMERGENCY MESSAGE, BASED ON GEO POSITIONING SYSTEM S Chandrakar, AS Choubey | | |
Content Based Image Retrieval and Its Ranking Using K-NN and SVM Classifiers S Choubey, C Bhilai, A Choubey | | |
Detection and Prevention of Black Hole Attack with Modified DRI Table in Mobile Network A Choubey, N Peters | | |
Detection and Prevention of Black Hole Attack with Modified DRI Table in Mobile Network N Peters, AS Choubey | | |