关注
Vijay Bagdi
Vijay Bagdi
Automation Engineer
在 agpce.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Online signature verification on smart phone using discrete wavelet transforms
KP Nagbhidkar, PV Bagdi
IORD J. Sci. Technol 2 (2), 1-6, 2015
42015
Analysis Of Various CBIR Techniques for Retriving Forensically Viable Information From The Images
V Bagdi, S Patil, R Dharaskar
International Journal of Engineering Research & Technology (IJERT), ISSN …, 2013
22013
Systematic Growth in Digital Image Forensic: A Study of Practical Tools for Investigation Based on Features
DVMT Vijay Bagdi, Dr. K. H. Walse
International Journal of Grid and Distributed Computing 13 (2), 1181-1186, 2020
2020
Efficient Security Services of Honeypot using Kerberos for Detecting Intruders.
DS Kapse, V Bagdi
International Journal of System & Software Engineering 3 (2), 2015
2015
Image Mining of Geotagged Images Extracted from Cloud for Prediction of Next Probable Location
V Bagdi, S Patil, RV Dharaskar
Image 3 (10), 2013
2013
Content based retrieval of geotagged images using wavelet as part of digital forensic
V Bagdi, S Patil, RV Dharskar
2013 Fourth International Conference on Computing, Communications and …, 2013
2013
Authentication of Colored Document Images using Secret-Sharing Method with Repair Capability
MMT Jagnade, V Bagdi
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AN SUPERVISED METHOD FOR DETECTION MALWARE BY USING MACHINE LEARNING ALGORITHM
N Badwaik, V Bagdi
A Review on VHDL Implementation for Adaptive Finite Impulse Response filter and its novel applications using Systolic Architecture
GA Chune, V Bagdi
International Journal on Recent and Innovation Trends in Computing and …, 0
Generation of Shares Using Secret-Sharing Method for Authentication of Colored Document Images
MMT Jagnade, V Bagdi
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NEW INNOVATION IN ELECTRONIC MEASURING SYSTEM USING LVDT SENSOR
SD Taksande, V Bagdi
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IDENTIFICATION OF ATTACKERS BY USING SECURITY SERVICES OF HONEYPOT
DS Kapse, V Bagdi
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY ENHANCING SECURITY OF CLOUD DATA FROM DATA MINING BASED ON FULLY HOMOMORPHIC ENCRYPTION
AR Borkar, V Bagdi
INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY A SECURITY OF CLOUD DATA IN FULLY HOMOMORPHIC ENCRYPTION
AR Borkar, V Bagdi
VHDL Implementation for Adaptive FIR filter and its Novel Application using Systolic Architecture
GA Chune, V Bagdi
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES
KP Nagbhidkar, V Bagdi
Web Mining: A Brief Survey on Data Extraction Techniques
V Bagdi, S Patil
系统目前无法执行此操作,请稍后再试。
文章 1–17