Intrusion Detection System (IDS): Anomaly detection using outlier detection approach J Jabez, B Muthukumar Procedia Computer Science 48, 338-346, 2015 | 244 | 2015 |
Comparative Study of Symmetric and Asymmetric Cryptography Techniques R Tripathi, S Agrawal International Journal of Advance Foundation and Research in Computer (IJAFRC …, 2014 | 147 | 2014 |
User profiling trends, techniques and applications S Kanoje, S Girase, D Mukhopadhyay arXiv preprint arXiv:1503.07474, 2015 | 105 | 2015 |
Computed tomography image enhancement using cuckoo search: a log transform based approach AS Ashour, S Samanta, N Dey, N Kausar, WB Abdessalemkaraa, ... Journal of Signal and Information Processing 6 (3), 244-257, 2015 | 89 | 2015 |
Role of matrix factorization model in collaborative filtering algorithm: A survey D kumar Bokde, S Girase, D Mukhopadhyay CoRR, abs/1503.07475, 2015 | 70 | 2015 |
Issues of data aggregation methods in wireless sensor network: A survey S Sirsikar, S Anavatti Procedia Computer Science 49, 194-201, 2015 | 69 | 2015 |
Enhancing distributed data storage security for cloud computing using TPA and AES algorithm N Shimbre, P Deshpande 2015 International Conference on Computing Communication Control and …, 2015 | 54 | 2015 |
Minimization of average energy consumption to prolong lifetime of wireless sensor network A Chunawale, S Sirsikar 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 244-248, 2014 | 48 | 2014 |
Comparison of clustering algorithms to design new clustering approach S Sirsikar, K Wankhede Procedia Computer Science 49, 147-154, 2015 | 40 | 2015 |
Clustering algorithms in MANETs: a review M Alinci, E Spaho, A Lala, V Kolici 2015 ninth international conference on complex, intelligent, and software …, 2015 | 39 | 2015 |
A survey on applications of data mining using clustering techniques D Neha, BM Vidyavathi International Journal of Computer Applications 126 (2), 2015 | 33 | 2015 |
Skin detection in YCbCr color space V Powar, A Jahagirdar, S Sirsikar International Journal of Computer Applications 5, 1-4, 2012 | 31 | 2012 |
Rectangular microstrip patch antenna for 2.4 GHz communication using defected ground structure PA Nawale, RG Zope IJAFRC 2 (1), 1-11, 2015 | 23 | 2015 |
Review on various routing protocols for heterogeneous wireless sensor network A Chatap, S Sirsikar 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 21 | 2017 |
Polarity shift detection approaches in sentiment analysis: A survey S Zirpe, B Joglekar 2017 International Conference on Inventive Systems and Control (ICISC), 1-5, 2017 | 21 | 2017 |
A review of predictive models on diagnosis and treatment of malaria fever A Oguntimilehin, AO Adetunmbi, OB Abiola International Journal of Computer Science and Mobile Computing 4 (5), 1087-1093, 2015 | 20 | 2015 |
A novel approach for medical image segmentation using PCA and K-means clustering J Katkar, T Baraskar, VR Mankar 2015 International Conference on Applied and Theoretical Computing and …, 2015 | 17 | 2015 |
Role of matrix factorization model in collaborative filtering algorithm: a survey S Girase, D Mukhopadhyay arXiv preprint arXiv:1503.07475, 2015 | 17 | 2015 |
Does self-efficacy effect on knowledge sharing intention in e-learning system? A motivational factor analysis in Open University Malaysia (OUM) DSM Dr. Seyed Ali Hosseini, Dr. Seyed Mohammad Bathaei International Journal of Advance Foundation and Research in Computer (IJAFRC …, 2014 | 17* | 2014 |
A model for determining personality by analyzing off-line handwriting V Bhade, T Baraskar Advances in Machine Learning and Data Science: Recent Achievements and …, 2018 | 16 | 2018 |