Data compression techniques for wireless sensor network S Sheikh, H Dakhore IJCSIT-2015, 2015 | 17 | 2015 |
Video watermarking using DWT-DCT-SVD algorithms S Mawande, H Dakhore 2017 International conference on computing Methodologies and communication …, 2017 | 9 | 2017 |
Generation of c-code using xml parser H Dakhore, A Mahajan Proceedings of ISCET 2010, 19-20, 2010 | 8 | 2010 |
Implementation of modified huffman coding in wireless sensor networks M Malleswari, BA Krishna, N Madhuri, MK Chowdary International Journal of Computer Applications 177 (1), 14-17, 2017 | 6 | 2017 |
Design approach of visual image detection in rescue robot system of urban search using Bayesian's logical algorithm SP Malewar, H Dakhore 2015 International Conference on Innovations in Information, Embedded and …, 2015 | 6 | 2015 |
An approach to mining association rules in horizontally distributed databases with anonymous ID assignment MR Raut, H Dakhore 2015 Global Conference on Communication Technologies (GCCT), 391-396, 2015 | 4 | 2015 |
Method of resource allocation in OFDMA using convex optimization L Sharnagat, H Harichand 2015 Fifth International Conference on Communication Systems and Network …, 2015 | 4 | 2015 |
Association rule mining in horizontally distributed databases MR Raut, H Dakhore International Journal of Computer Science and Information Technologies 5 (6 …, 2014 | 3 | 2014 |
A Efficient and Secure ID-Based Mutual Authentication Scheme Based on ECC for Mobile Devices SN Burde, H Dakhore, SP Chhaware Date: 30 th March, 2014, 63, 2014 | 2 | 2014 |
Sedas: A Self Destructive Active Storage Framework for Data Privacy RC Dharmik, H Dakhore, V Jadhao ISSN (Online), 2347-3878, 0 | 2 | |
An approach to color transformation for image encryption and data hiding S Sarwate, H Dakhore 2015 Global Conference on Communication Technologies (GCCT), 792-796, 2015 | 1 | 2015 |
An Approach to Securely Transfer a Secret Image Using Reversible Color Transformations and HSV Color Model MS Sarwate, MH Dakhore IJCSIT 5 (6), 2014 | 1 | 2014 |
Access Level Privacy Protection for Security SS Chinchkhede, H Dakhore 2018 IEEE International Conference on System, Computation, Automation and …, 2018 | | 2018 |
Secure Data Sharing in Cloud Computing using Revocable-Storage Identity-Based Encryption R Manmode, H Dakhore | | 2018 |
Implementation and Performance analysis UP-Growth for Mining High Utility Itemsets in Transactional Database B Lokhande, H Dakhore | | 2017 |
Implementing Association Rule Summarization for Predicting Relative Risk for Diabetes Mellitus TN Kureshi, H Dakhore | | 2017 |
Design of adaptive traffic signal re-timing in vehicular ad-hoc network S Rakhade, H Dakhore 2015 Global Conference on Communication Technologies (GCCT), 423-428, 2015 | | 2015 |
An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices SN Burde, H Dakhore, SP Chhaware International Journal of Advanced Research in Computer Engineering …, 2014 | | 2014 |
Review of Robust Video Watermarking Using DWT, SVD and DCT SS Mawande, H Dakhore Computing 8 (7), 2012 | | 2012 |
A Survey of Real Time Trainable Robotic ARM Based on Experience Technique M Kanholkar, H Dakhore Computational Intelligence, 2012 | | 2012 |