Featured based sentiment classification for hotel reviews using NLP and Bayesian classification T Ghorpade, LL Ragha Communication, Information & Computing Technology (ICCICT), 2012 …, 2012 | 51 | 2012 |
Video quality assessment through PSNR estimation for different compression standards RG Deshpande, LL Ragha, SK Sharma Indonesian Journal of Electrical Engineering and Computer Science 11 (3 …, 2018 | 47 | 2018 |
Privacy Preserving in Data Mining Using Hybrid Approach S Lohiya, LL Ragha Computational Intelligence and Communication Networks (CICN), 2012 Fourth …, 2012 | 46 | 2012 |
Establishing secure routing path using trust to enhance security in MANET VV Sarbhukan, L Ragha Wireless Personal Communications 110 (1), 245-255, 2020 | 32 | 2020 |
Phish mail guard: Phishing mail detection technique by using textual and URL analysis J Hajgude, LL Ragha Information and Communication Technologies (WICT), 2012 World Congress on …, 2012 | 27 | 2012 |
Comparison of time-series forecasting models P Verma, SV Reddy, L Ragha, D Datta 2021 International Conference on Intelligent Technologies (CONIT), 1-7, 2021 | 25 | 2021 |
Adaptive fuzzy‐based message dissemination and micro‐artificial bee colony algorithm optimised routing scheme for vehicular ad hoc network SD Patil, L Ragha IET Communications 14 (6), 994-1004, 2020 | 20 | 2020 |
A rate limiting mechanism for defending against flooding based distributed denial of service attack RY Patil, LL Ragha Information and Communication Technologies (WICT), 2011 World Congress on …, 2011 | 19 | 2011 |
Blockchain technology: applications and research challenges S Bansod, L Ragha 2020 international conference for emerging technology (INCET), 1-6, 2020 | 18 | 2020 |
Comparing performance of collaborative filtering algorithms VA Patil, LL Ragha Communication, Information & Computing Technology (ICCICT), 2012 …, 2012 | 17* | 2012 |
Challenges in making blockchain privacy compliant for the digital world: some measures S Bansod, L Ragha Sādhanā 47 (3), 168, 2022 | 15 | 2022 |
Security agents for detecting and avoiding cooperative blackhole attacks in MANET VG Mohite, LL Ragha 2015 International Conference on Applied and Theoretical Computing and …, 2015 | 13 | 2015 |
Cooperative Security Agents for MANET V Mohite, LL Ragha Information and Communication Technologies (WICT), 2012 World Congress on …, 2012 | 12 | 2012 |
Data Integrity and Confidentiality in Outsourced Database S Balpande, R Shedge, LL Ragha International Journal of Computer Applications, 2012 | 12 | 2012 |
A dynamic spectrum access model for cognitive radio wireless sensor network TV Saroja, LL Ragha 2017 4th International Conference on Electronics and Communication Systems …, 2017 | 11* | 2017 |
Hybrid Approach for Credit Card Fraud Detection KK Tripathi, LL Ragha International Journal of Soft Computing & Engineering 3 (4), 8-11, 2013 | 11 | 2013 |
An enhanced spanning tree topology for wireless sensor networks SA Attarde, LL Ragha, SK Dhamal International Journal of Computer Applications 1 (19), 47-52, 2010 | 10 | 2010 |
Performance analysis of various video compression standards RG Deshpande, LL Ragha 2016 International Conference on Global Trends in Signal Processing …, 2016 | 9 | 2016 |
Dynamic Quantum based Genetic Round Robin Algorithm RA Dhumal, TA Maktum, LL Ragha International Journal of Advanced Research in Computer and Communication …, 2014 | 8 | 2014 |
A dynamic rate limiting mechanism for flooding based Distributed Denial of service attack RY Patil, LL Ragha Communication and Computing (ARTCom2012), Fourth International Conference on …, 2012 | 8 | 2012 |