Pooja Kamat
Pooja Kamat
Assistant Professor of Computer Science, Symbiosis International University
Verified email at sitpune.edu.in
TitleCited byYear
A reactive energy-alert algorithm for manet and its impact on node energy consumption
S Bade, M Kumar, P Kamat
International Journal of Computer Applications 71 (18), 1-6, 2013
142013
Prediction of heart disease using k-means and artificial neural network as Hybrid Approach to Improve Accuracy
A Malav, K Kadam, P Kamat
International Journal of Engineering and Technology 9 (4), 3081-3082, 2017
122017
Security in Mobile Agent Communication'
P Pai, SK Shinde, AR Khachane
International Journal of AdvancedEngineering Research and Studies 1 (4), 74-80, 2012
32012
A critical analysis of P2P communication, security concerns and solutions
P Kamat, S Gite, M Kumar, S Patil
International Journal of Applied Engineering Research 9 (24), 30899-30909, 2014
22014
Prediction and Analysis of Liver Disorder Diseases by using Data Mining Technique: Survey
KP Shambel Kefelegn
International Journal of Pure and Applied Mathematics 118 (9 (Special Issue …, 2018
12018
Survey on Prediction and Analysis the Occurrence of Heart Disease Using Data Mining Techniques
C Beyene, K Pooja
International Journal of Pure and Applied Mathematics 118 (8 (Special Issue …, 2018
12018
Design Patterns for Effective Technology Enabled Learning
P Kamat, S Patil, K Kadam
International Journal of Advanced Engineering Research and Science 4 (1 …, 2017
1*2017
Cardiovascular Disease Prediction Using Data Mining Techniques: A Proposed Framework Using Big Data Approach
K Kadam, PV Kamat, AP Malav
Coronary and Cardiothoracic Critical Care: Breakthroughs in Research and …, 2019
2019
Recent Trends in the Era of Cybercrime and the Measures to Control Them
P Kamat, AS Gautam
Handbook of e-Business Security, 243-258, 2018
2018
Recent Trends in the Era of Cybercrime and the Measures to Control Them
PKANDA SINGH
Handbook of E-Business Security 1, 16, 2018
2018
Mobile Agent Communication, Security Concerns, and Approaches: An Insight into Different Kinds of Vulnerabilities a Mobile Agent Could Be Subjected to and Measures to Control Them
K Pooja, G Shilpa, P Shruti
Detecting and Mitigating Robotic Cyber Security Risks, 300-311, 2017
2017
A Study on Security in P2P Networks
P Pai
International Conference on Recent Technologies, 5, 2012
2012
Predicting the impact of the GDP measure on the forest cover using forecasting and regression
P Kamat, K Kadam, A Mathur
2018 IEEE Punecon, 1-6, 0
The system can't perform the operation now. Try again later.
Articles 1–13