Survey on various techniques of brain tumor detection from MRI images DC Dhanwani, MM Bartere International Journal of Computational Engineering Research 4 (1), 24-26, 2014 | 35 | 2014 |
Review on data mining with big data V Yenkar, M Bartere International Journal of Computer Science and Mobile Computing 3 (4), 97-102, 2014 | 21 | 2014 |
Enhancing ATM security using Fingerprint and GSM technology AM Jaiswal, M Bartere International Journal of Computer Science and Mobile Computing (IJCSMC) 3 (4 …, 2014 | 16 | 2014 |
Implementation of network intrusion detection system using artificial intelligence: Survey PR Maidamwar, MM Bartere, PP Lokulwar Proceedings of the 2nd International Conference on Recent Trends in Machine …, 2022 | 15 | 2022 |
Mobile phone sensing system for health monitoring SD Nanhore, MM Bartere International Journal of Science and Research 2 (4), 252-255, 2013 | 14 | 2013 |
A survey on machine learning approaches for developing intrusion detection system PR Maidamwar, MM Bartere, PP Lokulwar Proceedings of the international conference on innovative computing …, 2021 | 12 | 2021 |
Survey on edge, fog assisted IoT framework using intelligent learning techniques PD Saraf, MM Bartere, PP Lokulwar Proceedings of the 2nd International Conference on Recent Trends in Machine …, 2022 | 10 | 2022 |
Classification of Hybrid Intrusion Detection System Using Supervised Machine Learning with Hyper-Parameter Optimization PR Maidamwar, MM Bartere, PP Lokulwar Journal of Algebraic Statistics 13 (3), 1532-1550, 2022 | 5 | 2022 |
Implementing a hybrid recommendation system to personalize customer experience in E-commerce domain S Bohra, M Bartere ECS transactions 107 (1), 9211, 2022 | 5 | 2022 |
An Efficient Technique using Text & Content Base Image Mining Technique for Image Retrieval MM Bartere, PR Deshmukh International Journal of Engineering Research and Applications (IJERA), 1-9, 2012 | 4 | 2012 |
Comprehensive study on performance analysis of various CAPTCHA systems PC Tayade, MM Bartere International Journal of Current Engineering and Technology 5 (1), 15, 2015 | 3 | 2015 |
Data Security Based on LAN Using Distributed Firewall JV Gaud, MM Bartere International Journal of Computer Science and Mobile Computing, 2014 | 3 | 2014 |
WIFI MIMO emerging trend in wireless technology SA Jaswante, MM Bartere Int. J. Comput. Sci. Mob. Comput 3 (3), 557-561, 2014 | 3 | 2014 |
Cluster oriented image retrieval system MM Bartere, PR Deshmukh IJCA Proceedings on Emerging Trends in Computer Science and Information …, 2012 | 3 | 2012 |
Lightweight blockchain secured framework for smart precise farming system JP Mehare, MM Bartere 2021 International Conference on Computational Intelligence and Computing …, 2021 | 2 | 2021 |
Study of data hiding mechanism using virtual key replacement method MM Bartere, HR Deshmukh 2017 International Conference on Inventive Computing and Informatics (ICICI …, 2017 | 2 | 2017 |
An X-Or Base Image Encryption and Data Security through Higher LSB Data Hiding Approach: Result Oriented AR Yeole, M Bartere International Journal of Engineering Science 4559, 2016 | 2 | 2016 |
A Comparative Study of Various image Steganographic Techniques Used for Information Hiding." SK Jichkar, MM Bartere Compusoft Int. J. Adv. Computer Technol 4 (5), 2015 | 2 | 2015 |
A Survey on Applications of Genetic Algorithms and Fuzzy Logic in Caching MM Bartere, PV Ingole International Journal of Science and Engineering Investigations 1 (2), 5-7, 2012 | 2 | 2012 |
An Enhanced Authentication System using Multi-Level Security for web Services MPC Tayade, MM Bartere International Journal on Recent and Innovation Trends in Computing and …, 0 | 2 | |