Introductory chapter: artificial intelligence-challenges and applications DG Harkut, K Kasat Artificial Intelligence-Scope and Limitations, 2019 | 52 | 2019 |
Classical and quantum cryptography for image encryption & decryption HR Pawar, DG Harkut 2018 International conference on research in intelligent and computing in …, 2018 | 33 | 2018 |
Detecting and mitigating robotic cyber security risks R Kumar, PK Pattnaik, P Pandey IGI Global, 2017 | 13 | 2017 |
Cloud data security using attribute-based key-aggregate cryptosystem P More, DG Harkut 2016 International Conference on Wireless Communications, Signal Processing …, 2016 | 12 | 2016 |
Artificial intelligence-Scope and limitations DG Harkut | 9 | 2019 |
Comparison of Different Task Scheduling Algorithms in RTOS : A Survey AMA D G Harkut International Journal of Advanced Research in Computer Science and Software …, 2014 | 9 | 2014 |
A novel framework for network traffic classification using unknown flow detection ZA Shaikh, DG Harkut 2015 Fifth International conference on communication systems and network …, 2015 | 8 | 2015 |
Scheduling Task of Wireless Sensor Network using Earliest Deadline First Algorithm MPL Dr. D. G. Harkut, Dr. M. S. Ali International Journal of Scientific Research in Computer Science and …, 2014 | 8 | 2014 |
Hardware Support for Adaptive Task Scheduler in RTOS DMSA Dinesh G Harkut Intelligent Systems Technologies & Applications 384, 227-245, 2015 | 7* | 2015 |
An Overview of Network Traffic Classification Methods ZSD Harkut 2nd International Conference on Advances in Engineering & Technology (ICAET …, 2015 | 6* | 2015 |
Cloud Computing: Technology and Practices DG Harkut, K Kasat, S Shah BoD–Books on Demand, 2019 | 5 | 2019 |
Adaptive fuzzy hardware scheduler for real time operating system DG Harkut, MS Ali International Journal of Computing and Digital Systems 5 (06), 2016 | 5 | 2016 |
Hybrid model for Authorized De-duplication in Cloud DDGH Miss. Prachi D. Thakar International Journal of Emerging Trends & Technology in Computer Science …, 2015 | 5 | 2015 |
Introductory Chapter: Cloud Computing Security Challenges DG Harkut Cloud computing security-concepts and practice, 2020 | 3 | 2020 |
Dynamic Data Assimilation: Beating the Uncertainties DG Harkut BoD–Books on Demand, 2020 | 2 | 2020 |
Implementation of Single Sign-On Mechanism for Distributed Computing MRGC Dr. D. G. Harkut International Journal of Computer Science and Mobile Computing 3 (6), 623-632, 2014 | 2* | 2014 |
e-CRM-In the Insurance Industry using Adaptive Neuro Fuzzy Model DG Harkut, SB Sadar Global Journal of Finance and Management 2 (1), 147-158, 2010 | 2 | 2010 |
An Overview of Constraints of Operating Systems Used in IoT Devices PC Khanzode, DG Harkut Proceedings of Integrated Intelligence Enable Networks and Computing: IIENC …, 2021 | 1 | 2021 |
Introductory Chapter: Cloud Computing DG Harkut Cloud Computing-Technology and Practices, 2018 | 1 | 2018 |
Key PreDistribution Model for Wireless Sensor Network MSAZDDG Harkut International Journal of Application or Innovation in Engineering …, 2015 | 1 | 2015 |