Lalit K. Awasthi
Lalit K. Awasthi
Vice Chancellor Sardar Patel University Mandi and Professor of Computer Science and
Verified email at - Homepage
Cited by
Cited by
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization
S Kaur, LK Awasthi, AL Sangal, G Dhiman
Engineering Applications of Artificial Intelligence 90, 103541, 2020
A critical survey of live virtual machine migration techniques
A Choudhary, MC Govil, G Singh, LK Awasthi, ES Pilli, D Kapil
Journal of Cloud Computing 6, 1-41, 2017
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions
P Kumar, S Chauhan, LK Awasthi
Engineering Applications of Artificial Intelligence 120, 105894, 2023
A distributed weighted cluster based routing protocol for MANETs
N Chauhan, LK Awasthi, N Chand, A Chugh
Computer Networks and Information Technologies: Second International …, 2011
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach
LK Awasthi, P Kumar
International Journal of Information and Computer Security 1 (3), 298-314, 2007
Comprehensive Survey on Petya Ransomware Attack
JS Aidan, HK Verma, LK Awasthi
2017 International Conference on Next Generation Computing and Information …, 2017
Low overhead optimal checkpointing for mobile distributed systems
L Kumar, M Mishra, RC Joshi
Proceedings 19th International Conference on Data Engineering (Cat. No …, 2003
A non-intrusive minimum process synchronous checkpointing protocol for mobile distributed systems
P Kumar, L Kumar, RK Chauhan, VK Gupta
2005 IEEE International Conference on Personal Wireless Communications, 2005 …, 2005
A review of deep learning techniques used in agriculture
I Attri, LK Awasthi, TP Sharma, P Rathee
Ecological Informatics, 102217, 2023
An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs
AS Nandan, S Singh, LK Awasthi
Applied Soft Computing 107, 107318, 2021
Sentiment Analysis Approach Based on N-gram and KNN Classifier
S Kaur, G Sikka, LK Awasthi
2018 First International Conference on Secure Cyber Computing and …, 2018
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review
RM Singh, LK Awasthi, G Sikka
ACM Computing Surveys (CSUR) 55 (3), 1-43, 2022
Robust data security for cloud while using third party auditor
A Mohta, RK Sahu, LK Awasthi
International journal of advanced research in computer science and software …, 2012
Proactive approach for cooperative caching in mobile adhoc networks
P Kumar, N Chauhan, LK Awasthi, N Chand
International Journal of Computer Science Issues (IJCSI) 7 (3), 21, 2010
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges
M Chaudhary, N Goyal, A Benslimane, LK Awasthi, A Alwadain, A Singh
IEEE Internet of Things Journal 10 (4), 3500-3524, 2022
Peer-to-peer networks and computation: Current trends and future perspectives
A Gupta, LK Awasthi
Computing and Informatics 30 (3), 559-594, 2011
Cloud data security while using third party auditor
A Mohta, LK Awasti
International Journal of Scientific & Engineering Research 3 (6), 1, 2012
A range based node localization scheme with hybrid optimization for underwater wireless sensor network
M Nain, N Goyal, LK Awasthi, A Malik
International Journal of Communication Systems 35 (10), e5147, 2022
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation
N Agarwal, G Sikka, LK Awasthi
Expert Systems with Applications 161, 113682, 2020
Priority based efficient data scheduling technique for VANETs
BB Dubey, N Chauhan, N Chand, LK Awasthi
Wireless Networks 22, 1641-1657, 2016
The system can't perform the operation now. Try again later.
Articles 1–20