A survey: different mobility model for FANET K Kumari, B Sah, S Maakar International Journal of Advanced Research in Computer Science and Software …, 2015 | 60 | 2015 |
Performance metrics in ad-hoc network J Birla, B Sah, B BRCM BRCM, Bahal, 2012 | 17 | 2012 |
A brief survey of mobility model for FANET K Kumari, S Maakar, B Sah Proceedings of national conference on innovative trends in computer science …, 2015 | 13 | 2015 |
A robust technique of face recognition Y Maniktala, D Srivastava, B Sah, B Sah International Journal of Advanced Research in Computer Science and Software …, 2016 | 6 | 2016 |
Reversible data hiding technique using novel interpolation technique and discrete cosine transform B Sah, VK Jha International Journal of Integrated Engineering 11 (1), 2019 | 4 | 2019 |
Secure Approach To Data Transmission Using Steganography and RSA Technique Through TCPIP Header. B Sah, V Jha International Journal on Computer Science and Engineering 6 (9), 280-284, 2018 | 1 | 2018 |
Unlocking the Potential: The Crucial Role of Data Preprocessing in Big Data Analytics P Kantha, VK Sinha, D Srivastava, B Sah 2023 1st DMIHER International Conference on Artificial Intelligence in …, 2023 | | 2023 |
Energy optimization in path arbitrary wireless sensor network BS 1 | Expert System wiley, 1-15, 2023 | | 2023 |
Utilization of Blockchain in E-Voting System B Sah 2nd International Conference on Intelligent Technologies (CONIT), IEEE …, 2022 | | 2022 |
EXPERIENCE (14 YEAR IN TEACHING) B SAH KL University, 2022 | | 2022 |
Brain Tumor Detection using Clustering Machine Learning Algorithm: An Overview B Sah Brain 8 (2), 2021 | | 2021 |
A Radial Segmentation Adpative Dual Tranformation Approach for Visual Cryptography S Mehta, B Sah International Journal of Engineering Science 2420, 2016 | | 2016 |
Efficient and Secure Data Transmission using Steganography Technique B Sah, VK Jha International Journal of Applied Engineering Research 10 (22), 42869-42872, 2015 | | 2015 |