Analysis of malware detection techniques in android PD Sawle, AB Gadicha International Journal of Computer Science and Mobile Computing 3 (3), 176-182, 2014 | 23 | 2014 |
Virtual realization using 3D password AB Gadicha, VB Gadicha International Journal of Electronics and Computer Science Engineering, ISSN …, 2016 | 19 | 2016 |
Implicit Authentication Approach by Generating Strong Password through Visual Key Cryptography A Gadicha, V Gadicha Journal of Cybersecurity and Information Management 1 (1), 5-16, 2020 | 18 | 2020 |
A review paper on Vehicle Number Plate Recognition (VNPR) using improved character segmentation method SH Bailmare, AB Gadicha International Journal of Scientific and Research Publications 3 (12), 1-3, 2013 | 18 | 2013 |
Audio wave steganography AB Gadicha International Journal of Soft Computing and Engineering (IJSCE) 1 (5), 174-176, 2011 | 16 | 2011 |
An overview on fuzzy logic and fuzzy elements RS Jaiswal, MV Sarode Int. Res. J. Comp. Sci 3 (2), 29, 2015 | 15 | 2015 |
A survey based on designing an efficient image encryption-then-compression system KG Nimbokar, MV Sarode, MM Ghonge International Journal of Computer Applications 975, 8887, 2014 | 13 | 2014 |
The combined effect of median and FIR filter in pre-processing of ECG signal using MATLAB JS Karnewar, MV Sarode International journal of computer applications 975, 8887, 2013 | 12 | 2013 |
DBP‐iDWT: Improving DNA‐Binding Proteins Prediction Using Multi‐Perspective Evolutionary Profile and Discrete Wavelet Transform F Ali, O Barukab, AB Gadicha, S Patil, O Alghushairy, AY Sarhan Computational Intelligence and Neuroscience 2022 (1), 2987407, 2022 | 11 | 2022 |
Multimode approach of data encryption in images through quantum steganography AB Gadicha, VBB Gupta, VB Gadicha, K Kumar, MM Ghonge Multidisciplinary approach to modern digital steganography, 99-124, 2021 | 9 | 2021 |
Prevention mechanism on DDOS attacks by using multilevel filtering of distributed firewalls S Pande, AB Gadicha International Journal on Recent and Innovation Trends in Computing and …, 2015 | 7 | 2015 |
A Novel approach towards Implicit Authentication System by using Multi-share visual key Cryptography Mechanism AB Gadicha, VB Gadicha, AJ Obaid Journal of Physics: Conference Series 1963 (1), 012141, 2021 | 6 | 2021 |
Top-down approach process built on conceptual design to physical design using LIS, GCS schema AB Gadicha, AS Alvi, VB Gadicha, SM Zaki International Journal of Engineering Sciences & Emerging Technologies 3, 90-96, 2012 | 6 | 2012 |
Speckle and rician noise removal from medical images and Ultrasound images SU Saoji, MV Sarode Int J Recent Technol Eng 8 (5), 1851-1854, 2020 | 4 | 2020 |
Development and application of a universal filter in image processing for automatic interpretation of temperature-sensing thermal paints SV Bhalerao, AN Pawar, U Chandrashekhar, M Sarode Experimental Techniques 38, 38-47, 2014 | 4 | 2014 |
Outlier detection method for data set based on clustering and EDA technique PK Bhowate, VB Gadicha Int. J. Eng. Res. Technol.(IJERT) 3 (2), 2278-0181, 2014 | 4 | 2014 |
A review on role of active contour model in image segmentation applications RS Jaiswal, MV Sarode J. Adv. Res. Comput. Commun. Eng. 6 (5), 675-679, 2017 | 3 | 2017 |
Multiple biometric system application: Iris and fingerprint recognition system PM Shende, MV Sarode nternational Journal of Application or Innovation in Engineering …, 2016 | 3 | 2016 |
Locust Mayfly optimization-tuned neural network for AI-based pruning in Chess game V Chole, V Gadicha International Journal of Image and Graphics 23 (04), 2350028, 2023 | 2 | 2023 |
Hybrid optimization for developing human like chess playing system V Chole, V Gadicha 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT), 1-5, 2022 | 2 | 2022 |