SQL support over MongoDB using metadata S Khan, V Mane International Journal of Scientific and Research Publications 3 (10), 1-5, 2013 | 65 | 2013 |
Comparative study and analysis of network intrusion detection tools DA Bhosale, VM Mane 2015 International Conference on Applied and Theoretical Computing and …, 2015 | 48 | 2015 |
Modified BPCS steganography using Hybrid cryptography for improving data embedding capacity SP Bansod, VM Mane, R Ragha 2012 International Conference on Communication, Information & Computing …, 2012 | 47 | 2012 |
Comparative analysis of different word embedding models S Bhoir, T Ghorpade, V Mane 2017 International conference on advances in computing, communication and …, 2017 | 45 | 2017 |
Forensic analysis and evidence collection for web browser activity A Nalawade, S Bharne, V Mane 2016 International Conference on Automatic Control and Dynamic Optimization …, 2016 | 42 | 2016 |
Handwritten character recognition using elastic matching and PCA V Mane, L Ragha Proceedings of the International Conference on Advances in Computing …, 2009 | 27 | 2009 |
Reflective SIFT for improving the detection of copy-move image forgery V Agarwal, V Mane 2016 Second International Conference on Research in Computational …, 2016 | 18 | 2016 |
Analysis of data security by using anonymization techniques PC Kaur, T Ghorpade, V Mane 2016 6th International Conference-Cloud System and Big Data Engineering …, 2016 | 17 | 2016 |
Image super-resolution for MRI images using 3D faster super-resolution convolutional neural network architecture V Mane, S Jadhav, P Lal ITM Web of Conferences 32, 03044, 2020 | 16 | 2020 |
Comparative Study and Simulation of Digital Forensic Tools V Sanap, V Mane International Conference on Advances in Science and Technology, 2015 | 16 | 2015 |
Algorithmic trading bot M Mathur, S Mhadalekar, S Mhatre, V Mane ITM Web of Conferences 40, 03041, 2021 | 14 | 2021 |
Robust image forgery localization and recognition in copy-move using bag of features and SVM K Khuspe, V Mane 2015 International Conference on Communication, Information & Computing …, 2015 | 12 | 2015 |
Region duplication forgery detection in digital images using 2D-DWT and SVD VK Sanap, VM Mane 2015 International Conference on Applied and Theoretical Computing and …, 2015 | 9 | 2015 |
4G wireless networks challenges and benefits S Chavan, V Mane International Journal of Emerging Technology and Advanced Engineering 3 (7 …, 2013 | 9 | 2013 |
Extraction of unigram and bigram topic list by using Latent Dirichlet Markov allocation and sentiment classification PC Kaur, T Ghorpade, V Mane 2017 International Conference on Energy, Communication, Data Analytics and …, 2017 | 8 | 2017 |
Source camera identification using GLCM N Kulkarni, V Mane 2015 IEEE International Advance Computing Conference (IACC), 1242-1246, 2015 | 8 | 2015 |
Protection of web application against SQL injection attack M Bhagat, V Mane Int. J. Sci. Res. Publ 3 (10), 1-5, 2013 | 8 | 2013 |
Detection of contrast enhancement forgery in previously and post compressed jpeg images P Suryawanshi, P Padiya, V Mane 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-4, 2019 | 7 | 2019 |
Fusion of SIFT and hue moments features for cloning tamper detection KA Tatkare, V Mane 2015 international conference on applied and theoretical computing and …, 2015 | 6 | 2015 |
Enhancing adaptability of Insertion sort through 2-Way expansion K Nenwani, V Mane, S Bharne 2014 5th International Conference-Confluence The Next Generation Information …, 2014 | 6 | 2014 |