关注
Hemlata Dakhore
Hemlata Dakhore
Assistant Professor
在 raisoni.net 的电子邮件经过验证
标题
引用次数
引用次数
年份
Data compression techniques for wireless sensor network
S Sheikh, H Dakhore
IJCSIT-2015, 2015
172015
Video watermarking using DWT-DCT-SVD algorithms
S Mawande, H Dakhore
2017 International conference on computing Methodologies and communication …, 2017
92017
Generation of c-code using xml parser
H Dakhore, A Mahajan
Proceedings of ISCET 2010, 19-20, 2010
82010
Implementation of modified huffman coding in wireless sensor networks
M Malleswari, BA Krishna, N Madhuri, MK Chowdary
International Journal of Computer Applications 177 (1), 14-17, 2017
62017
Design approach of visual image detection in rescue robot system of urban search using Bayesian's logical algorithm
SP Malewar, H Dakhore
2015 International Conference on Innovations in Information, Embedded and …, 2015
62015
An approach to mining association rules in horizontally distributed databases with anonymous ID assignment
MR Raut, H Dakhore
2015 Global Conference on Communication Technologies (GCCT), 391-396, 2015
42015
Method of resource allocation in OFDMA using convex optimization
L Sharnagat, H Harichand
2015 Fifth International Conference on Communication Systems and Network …, 2015
42015
Association rule mining in horizontally distributed databases
MR Raut, H Dakhore
International Journal of Computer Science and Information Technologies 5 (6 …, 2014
32014
A Efficient and Secure ID-Based Mutual Authentication Scheme Based on ECC for Mobile Devices
SN Burde, H Dakhore, SP Chhaware
Date: 30 th March, 2014, 63, 2014
22014
Sedas: A Self Destructive Active Storage Framework for Data Privacy
RC Dharmik, H Dakhore, V Jadhao
ISSN (Online), 2347-3878, 0
2
An approach to color transformation for image encryption and data hiding
S Sarwate, H Dakhore
2015 Global Conference on Communication Technologies (GCCT), 792-796, 2015
12015
An Approach to Securely Transfer a Secret Image Using Reversible Color Transformations and HSV Color Model
MS Sarwate, MH Dakhore
IJCSIT 5 (6), 2014
12014
Access Level Privacy Protection for Security
SS Chinchkhede, H Dakhore
2018 IEEE International Conference on System, Computation, Automation and …, 2018
2018
Secure Data Sharing in Cloud Computing using Revocable-Storage Identity-Based Encryption
R Manmode, H Dakhore
2018
Implementation and Performance analysis UP-Growth for Mining High Utility Itemsets in Transactional Database
B Lokhande, H Dakhore
2017
Implementing Association Rule Summarization for Predicting Relative Risk for Diabetes Mellitus
TN Kureshi, H Dakhore
2017
Design of adaptive traffic signal re-timing in vehicular ad-hoc network
S Rakhade, H Dakhore
2015 Global Conference on Communication Technologies (GCCT), 423-428, 2015
2015
An Efficient and Secure ID-Based Mutual Authentication with Key Agreement Scheme Based on ECC for Mobile Devices
SN Burde, H Dakhore, SP Chhaware
International Journal of Advanced Research in Computer Engineering …, 2014
2014
Review of Robust Video Watermarking Using DWT, SVD and DCT
SS Mawande, H Dakhore
Computing 8 (7), 2012
2012
A Survey of Real Time Trainable Robotic ARM Based on Experience Technique
M Kanholkar, H Dakhore
Computational Intelligence, 2012
2012
系统目前无法执行此操作,请稍后再试。
文章 1–20