Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains V Khetani, Y Gandhi, S Bhattacharya, SN Ajani, S Limkar International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 125 | 2023 |
A performance comparison of routing protocols (DSR and TORA) for security issue in MANET (Mobile Ad Hoc Networks) RK Jha, SV Limkar, DU Dalal IJCA Special Issue on MANETs (2), 78-83, 2010 | 36 | 2010 |
A novel method for parallel indexing of real time geospatial big data generated by IoT devices SV Limkar, RK Jha Future generation computer systems 97, 433-452, 2019 | 35 | 2019 |
Deep learning and image processing-based early detection of Alzheimer disease in cognitively normal individuals P Borkar, VA Wankhede, DT Mane, S Limkar, JVN Ramesh, SN Ajani Soft Computing, 1-23, 2023 | 31 | 2023 |
DLMBHCO: design of an augmented bioinspired deep learning-based multidomain body parameter analysis via heterogeneous correlative body organ analysis SN Ajani, RA Mulla, S Limkar, R Ashtagi, SK Wagh, ME Pawar Soft Computing, 1-21, 2023 | 27 | 2023 |
Evaluation of growth responses of lettuce and energy efficiency of the substrate and smart hydroponics cropping system M Dutta, D Gupta, S Sahu, S Limkar, P Singh, A Mishra, M Kumar, R Mutlu Sensors 23 (4), 1875, 2023 | 23 | 2023 |
Performance investigation of DMV (detecting malicious vehicle) and D&PMV (detection and prevention of misbehave/malicious vehicles): Future road map M Kadam, S Limkar Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | 20 | 2014 |
Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments RM Sairise, S Limkar, ST Deokate, ST Shirkande, RA Mahajan, A Kumar Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1569-1583, 2023 | 19 | 2023 |
Improved data hiding technique based on audio and video steganography S Limkar, A Nemade, A Badgujar, R Kate Smart Computing and Informatics: Proceedings of the First International …, 2018 | 15 | 2018 |
Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process S Shivadekar, B Kataria, S Limkar, K S. Wagh, S Lavate, RA Mulla Soft Computing, 1-19, 2023 | 13 | 2023 |
D&PMV: new approach for detection and prevention of misbehave/malicious vehicles from VANET M Kadam, S Limkar Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | 13 | 2014 |
IPv6: issues and solution for next millennium of internet SV Limkar, RK Jha, S Pimpalkar Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 11 | 2011 |
Optimisation Using Levenberg-Marquardt Algorithm of Neural Networks for Iris A Sayed, M Sardeshmukh, S Limkar Proceedings of the International Conference on Frontiers of Intelligent …, 2014 | 10 | 2014 |
Performance analysis under the influence of jamming for WiMAX system RK Jha, SV Limkar, UD Dalal 2011 Second International Conference on Emerging Applications of Information …, 2011 | 9 | 2011 |
Significance of artificial intelligence in the production of effective output in power electronics W Anandpwar, S Barhate, S Limkar, M Vyawahare, SN Ajani, P Borkar International Journal on Recent and Innovation Trends in Computing and …, 2023 | 8 | 2023 |
Computing over encrypted spatial data generated by IoT SV Limkar, RK Jha Telecommunication Systems 70, 193-229, 2019 | 8 | 2019 |
An effective defence mechanism for detection of DDoS attack on application layer based on hidden Markov model S Limkar, RK Jha Proceedings of the International Conference on Information Systems Design …, 2012 | 8 | 2012 |
Genetic Algorithm: Paradigm Shift over a Traditional Approach of Timetable Scheduling S Limkar, A Khalwadekar, A Tekale, M Mantri, Y Chaudhari Proceedings of the 3rd International Conference on Frontiers of Intelligent …, 2014 | 7 | 2014 |
IPv6: Features, Current Deployment Scenario, Issues and Migration Status in India S Limkar, R Jha, T Patil, M Kalbande Proceeding of the International Conference on Software and Computing …, 2010 | 7 | 2010 |
A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography S Limkar, WV Ashok, S Singh, A Singh, SK Wagh, SN Ajani Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1597-1611, 2023 | 6 | 2023 |