Prediction of heart disease using machine learning algorithms: A survey H Sharma, MA Rizvi International Journal on Recent and Innovation Trends in Computing and …, 2017 | 132 | 2017 |
Applied cryptography using chaos function for fast digital logic-based systems in ubiquitous computing PK Shukla, A Khare, MA Rizvi, S Stalin, S Kumar Entropy 17 (3), 1387-1410, 2015 | 63 | 2015 |
Big data privacy based on differential privacy a hope for big data KMP Shrivastva, MA Rizvi, S Singh 2014 international conference on computational intelligence and …, 2014 | 52 | 2014 |
A novel machine learning model to predict the staying time of international migrants PK Shukla, PK Shukla, M Bhatele, AK Chaturvedi, P Sharma, MA Rizvi, ... International Journal on Artificial Intelligence Tools 30 (02), 2150002, 2021 | 37 | 2021 |
Clustering based energy efficient algorithm using max-heap tree for MANET M Saxena, N Phate, KJ Mathai, MA Rizvi 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 36 | 2014 |
Improved heart disease prediction using deep neural network M Ashraf, MA Rizvi, H Sharma Asian Journal of Computer Science and Technology 8 (2), 49-54, 2019 | 23 | 2019 |
Finding robust assailant using optimization functions (FiRAO-PG) in wireless sensor network PK Shukla, S Goyal, R Wadhvani, MA Rizvi, P Sharma, N Tantubay Mathematical Problems in Engineering 2015, 2015 | 23 | 2015 |
Mobile cloud a new vehicle for learning: m-learning its issues and challenges K Verma, S Dubey, M Rizvi, M NITTTR International Journal of Science and Applied Information Technology 1 (3), 2012 | 23 | 2012 |
Security for node isolation attack on olsr by modifying mpr selection process D Malik, K Mahajan, MA Rizvi 2014 First International Conference on Networks & Soft Computing (ICNSC2014 …, 2014 | 22 | 2014 |
Minimizing congestion and improved QoS of AODV using clustering in mobile ad hoc network N Phate, M Saxena, MA Rizvi International Conference on Recent Advances and Innovations in Engineering …, 2014 | 21 | 2014 |
Boolean Algebra based effective and efficient asymmetric key cryptography algorithm: BAC algorithm N Kumar, P Gupta, M Sahu, MA Rizvi 2013 International Mutli-Conference on Automation, Computing, Communication …, 2013 | 20 | 2013 |
Impact of cloud on E-learning K Verma, MA Rizvi 2013 5th International Conference and Computational Intelligence and …, 2013 | 18 | 2013 |
Image Mining: A New Approach for data mining based on texture M Sahu, M Shrivastava, MA Rizvi 2012 Third International Conference on Computer and Communication Technology …, 2012 | 18 | 2012 |
E-commerce security through asymmetric key algorithm A Chaudhary, K Ahmad, MA Rizvi 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 17 | 2014 |
An efficient image retrieval tool: query based image management system K Ahmad, M Sahu, M Shrivastava, MA Rizvi, V Jain International Journal of Information Technology 12 (1), 103-111, 2020 | 16 | 2020 |
Improved support vector machine for cyber attack detection S Singh, S Agrawal, MA Rizvi, RS Thakur Proceedings of the World Congress on Engineering and Computer Science 1, 2011 | 15 | 2011 |
An intelligent and fast chaotic encryption using digital logic circuits for ad-hoc and ubiquitous computing A Khare, PK Shukla, MA Rizvi, S Stalin Entropy 18 (5), 201, 2016 | 12 | 2016 |
Event driven dynamic path optimization for AODV in MANET K Mahajan, D Malik, MA Rizvi, DS Karaulia 2014 International Conference on Computational Intelligence and …, 2014 | 12 | 2014 |
ZBLE: Zone based efficient energy multipath protocol for routing in mobile Ad Hoc networks R Sahu, S Sharma, MA Rizvi Wireless Personal Communications 113, 2641-2659, 2020 | 10 | 2020 |
Critical analysis of various symmetric key cryptographic algorithms P Nema, MA Rizvi International Journal on Recent and Innovation Trends in Computing and …, 2015 | 10 | 2015 |