Distributed metadata management scheme in hdfs M Varade, V Jethani International Journal of Scientific and Research Publications 3 (5), 2250-3153, 2013 | 28 | 2013 |
Diabetic retinopathy detection through image mining for type 2 diabetes KA Anant, T Ghorpade, V Jethani 2017 International Conference on Computer Communication and Informatics …, 2017 | 22 | 2017 |
Breast thermograms analysis for cancer detection using feature extraction and data mining technique P Yadav, V Jethani Proceedings of the international conference on advances in information …, 2016 | 15 | 2016 |
A vote based system to detect misbehaving nodes in MANETs R Talreja, V Jethani 2014 IEEE International Advance Computing Conference (IACC), 391-394, 2014 | 12 | 2014 |
Improved ALERT protocol in MANET with strategies to prevent DOS & MITM attacks P Patil, N Marathe, V Jethani 2016 International Conference on Automatic Control and Dynamic Optimization …, 2016 | 9 | 2016 |
Glaucoma and diabetic retinopathy diagnosis using image mining ND Panse, T Ghorpade, V Jethani International journal of computer applications 117 (5), 2015 | 8 | 2015 |
Retinal fundus diseases diagnosis using image mining ND Panse, T Ghorpade, V Jethani 2015 International Conference on Computer, Communication and Control (IC4), 1-4, 2015 | 7 | 2015 |
Cross platform C compiler F Mulla, S Nair, A Chhabria 2016 International Conference on Computing Communication Control and …, 2016 | 6 | 2016 |
Diabetic retinopathy analysis using image mining to detect type 2 diabetes KA Anant, T Ghorpade, V Jethani Int J Comp Math Sci 5 (1), 37-42, 2016 | 5 | 2016 |
Applying Genetic Algorithm to Intrusion Detection System V Yewale, V Jethani, T Ghorpade International Journal of Science and Research (IJSR) 4 (4), 524-529, 2015 | 5 | 2015 |
Hybrid encryption algorithm based improved RSA and Diffie-Hellman R Bodkhe, V Jethani International Journal of Engineering, Science and Mathematics 4 (1), 1-15, 2015 | 5 | 2015 |
Forensic Analysis of financial document using Dempster Shafer approach S Shejale, S Bharne, V Jethani 2016 International Conference on Automatic Control and Dynamic Optimization …, 2016 | 4 | 2016 |
QoS in WiMAX for real-time applications by using improved handoff scheme V Jethani 2010 Seventh International Conference on Wireless and Optical Communications …, 2010 | 4 | 2010 |
Abstractive summarization using graph based methods C Badgujar, V Jethani, T Ghorpade 2018 Second International Conference on Inventive Communication and …, 2018 | 3 | 2018 |
Preventing DOS & MITM Attacks in “anonymous location based efficient routing protocol” in MANET P Patil, N Marathe, V Jethani 2016 IEEE International Conference on Engineering and Technology (ICETECH …, 2016 | 3 | 2016 |
A novel approach based on intersection and direction to optimize hard handover in mobile WiMAX R Talreja, V Jethani, N Marathe, K Saxena 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 3 | 2016 |
Survey of privacy preservation in vanets P Patil, N Marathe, V Jethani IRACST-International Journal of Computer Science and Information Technology …, 2016 | 3 | 2016 |
A novel methodology to filter out unwanted messages from OSN user’s wall using trust value calculation R Bodkhe, T Ghorpade, V Jethani Proceedings of the Second International Conference on Computer and …, 2016 | 3 | 2016 |
Analysis of light pollution prediction using mathematical model and machine learning techniques A Sainger, R Yadav, P Tipare, S Waghralkar, V Jethani, A Barve Advanced Computing Technologies and Applications: Proceedings of 2nd …, 2020 | 2 | 2020 |
An approach to find synonym and bigram to improve query recommendation efficiency of exploratory search using search goal shift graphs C Badgujar, V Jethani, T Ghorpade Journal of Computational and Theoretical Nanoscience 17 (1), 445-450, 2020 | 2 | 2020 |