Secure VANET from vampire attack using LEACH protocol GA Jagnade, SI Saudagar, SA Chorey 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 5 | 2016 |
Failure recovery model in big data using the checkpoint approach S Chorey, N Sahu Journal of Integrated Science and Technology 11 (4), 564-564, 2023 | 3 | 2023 |
Face Detection Using Skin Color in Image by Neural Networks PV Mamankar, SA Chorey, RS Sawade International Journal of Innovative and Emerging Research in Engineering 3 …, 0 | 3 | |
Rapid Recover Map Reduce (RR-MR): Boosting failure recovery in Big Data applications S Chorey, N Sahu Journal of Integrated Science and Technology 12 (3), 773-773, 2024 | 2 | 2024 |
Securing the Crash Failures and Accidentally Destroyed of Large Data using Checkpoint Approach S Chorey, N Sahu 13th Int. Conf. Adv. Comput. Control. Telecommun. Technol. ACT 2022 8, 146-152, 2022 | 1 | 2022 |
A Multi-Factor Monitoring Fault Tolerance Model Based on a CNN Algorithm for Data Recovery SA Chorey, N Sahu National Academy Science Letters, 1-4, 2024 | | 2024 |
Review on Intrigue Used for Caching of Information in View of Information Density in Wireless Ad Hoc Network SI Saudagar, SA Chorey, GA Jagnade Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | | 2019 |
Face Recognition using Principal Component Analysis PV Mamankar, SA Chorey, RS Sawade | | |