关注
Dr.Varsha Bhosale
Dr.Varsha Bhosale
Professor ,Vidyalankar Institute of Technology
在 vit.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Efficient storage utilization using erasure codes in openstack cloud
B Kulkarni, V Bhosale
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
122016
Comparative analysis of various distributed file systems & performance evaluation using map reduce implementation
M Vaidya, S Deshpande
2016 International Conference on Recent Advances and Innovations in …, 2016
52016
Implementation of Location based Steganography on mobile Smartphone using Android Platform
K Pandit, V Bhosale
International Journal of Computer Science and Information Technologies 6 (3 …, 2015
52015
Super resolution of astronomical objects using back propagation algorithm
H Mhatre, V Bhosale
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
32016
IoT Based Biometric School Bus Attendance and Tracking System
K More, V Bhosale
Jetir. org, 2019
22019
Invisible touch screen based PIN authentication to prevent shoulder surfing
SA Vaidya, V Bhosale
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
22016
Data Extraction from dynamic web pages based on visual features
S Bojewar, V Bhosale, S Chanchlani
International Journal of Advanced Engineering Research and Studies 1 (1), 91-94, 2012
22012
Search over encrypted data
SA Vaidya, V Bhosale
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
12016
Generating Honeywords from Real Passwords with Decoy Mechanism
MK Naik, V Bhosale, VD Shinde
International Journal for Research in Engineering Application & Management 2 …, 2016
12016
Ostentatious Adoption of Hand Gestures for Intelligent HCI
SM Ashfaque, V Bhosale
2015 International Conference on Computational Intelligence and …, 2015
12015
Malicious user detection using honeyword and IP tracking
MK Naik, V Bhosale, VD Shinde
International Conference On Emanations in Modern Technology and Engineering …, 0
1
Preventing shoulder surfing attack using touch screen based PIN authentication method in invisible form
S Vaidya, S Kadam, V Bhosale
2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017
2017
IoT security cryptographic solutions for trustworthy wireless sensor networks
D Motwani, V Chitre, V Bhosale, M Israni, S Sonawane, A Nerurkar
Applied Nonlinear Analysis and Machine Learning Transforming the Horizons of Communication Technology
D Motwani, V Chitre, V Bhosale, S Borkar, DK Chitre
Real-Time Sensing with IoT and Environmental Monitoring Using Raspberry Pi
NT Salunke, V Bhosale
Role of Predictive Analytics using Divergent Sources for Customer Segmentation
S Bamne, V Bhosale
Honeyword Generation Approach Using ASCII Values for Security Enhancement
M KomalNaik, VD Shinde
International Conference On Emanations in Modern Technology and Engineering …, 0
Detection of Intruder using Honeywords and IP Blocking
MK Naik, V Bhosale, VD Shinde
Mining gene expression data
V Bhosale
系统目前无法执行此操作,请稍后再试。
文章 1–19