关注
Prof Sonika A chorey
Prof Sonika A chorey
Assisatnt Professor
在 mitra.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Secure VANET from vampire attack using LEACH protocol
GA Jagnade, SI Saudagar, SA Chorey
2016 International Conference on Signal Processing, Communication, Power and …, 2016
52016
Failure recovery model in big data using the checkpoint approach
S Chorey, N Sahu
Journal of Integrated Science and Technology 11 (4), 564-564, 2023
32023
Face Detection Using Skin Color in Image by Neural Networks
PV Mamankar, SA Chorey, RS Sawade
International Journal of Innovative and Emerging Research in Engineering 3 …, 0
3
Rapid Recover Map Reduce (RR-MR): Boosting failure recovery in Big Data applications
S Chorey, N Sahu
Journal of Integrated Science and Technology 12 (3), 773-773, 2024
22024
Securing the Crash Failures and Accidentally Destroyed of Large Data using Checkpoint Approach
S Chorey, N Sahu
13th Int. Conf. Adv. Comput. Control. Telecommun. Technol. ACT 2022 8, 146-152, 2022
12022
A Multi-Factor Monitoring Fault Tolerance Model Based on a CNN Algorithm for Data Recovery
SA Chorey, N Sahu
National Academy Science Letters, 1-4, 2024
2024
Review on Intrigue Used for Caching of Information in View of Information Density in Wireless Ad Hoc Network
SI Saudagar, SA Chorey, GA Jagnade
Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019
2019
Face Recognition using Principal Component Analysis
PV Mamankar, SA Chorey, RS Sawade
系统目前无法执行此操作,请稍后再试。
文章 1–8