Survey of innovated techniques to detect selfish nodes in MANET S Padiya, R Pandit, S Patel IJCNWMC 3 (1), 221-230, 2013 | 18 | 2013 |
A System for MANET to detect selfish nodes using NS2 SD Padiya, R Pandit, S Patel Int. J. Eng. Sci. Innov. Technol 1 (2), 25-30, 2012 | 9 | 2012 |
Survey paper of encrypted data hiding using skin tone detection RD Kalambe, R Pandit, S Patel international journal of computer applications 79 (5), 2013 | 5 | 2013 |
Analysis of Single Sign on for Multiple Web Applications PSP ANITA PATIL, PROF. RAKESH PANDIT International Journal of Advanced Research in Electrical, Electronics and …, 2013 | 4* | 2013 |
Comparative analysis of interpolation and texture synthesis method for enhancing image P Bhatt, S Patel, R Pandit International Journal of Innovative Research in Science, Engineering and …, 2013 | 4 | 2013 |
Implementation of RSA RC5 Algorithm in Cloud P Pande, P Dhasal, R Pandit International Journal of Computer Science and Information Technologies 6 (1 …, 2014 | 3 | 2014 |
Hash-based approach on secure skin tone stegnography using wavelet transform RD Kalambe, R Pandit, S Patel international journal of advanced research in computer science and software …, 2013 | 3 | 2013 |
Prof. Rakesh Pandit, Prof. Sachin Patel,“Analysis of Single Sign-on for Multiple Web Applications,” A Patil International Journal of Advanced Research in Electrical, Electronics and …, 2013 | 3 | 2013 |
Various Techniques Use In Wireless Sensor Network For Congestion Control S Patel, R Pandit, A Rathod, M Tech International Journal of Advanced Research in Computer Engineering …, 2014 | 2 | 2014 |
Resources load sharing using RR,FCFS,SJF,MSJF,GP Algorithms in Cloud Computing DMD Rakesh Pandit Neuroquantology 20 (11), 7853-7872, 2022 | 1 | 2022 |
Implementation of Mobile To Mobile Calling through Wi-Fi VS Kasat, R Pandit International Journal of Science and Research (IJSR) ISSN (Online), 2319-7064, 2015 | 1 | 2015 |
Implementation of security framework for multiple web applications A Patil, R Pandit, S Patel 2014 International Conference on Computer Communication and Informatics, 1-7, 2014 | 1 | 2014 |
PhishIdentifier: A Mozilla Firefox plugin to protect user against Phishing attacks [J] PV Kalola, S Patel, R Pandit International Journal of Computer Science & Information Technolo, 2014 | 1 | 2014 |
Trusted Security Model for User’s Data for Public Cloud Using RSA Encryption P Pandey, P Dhasal, R Pandit International Journal of Emerging Technology and Advanced Engineering, 2014 | 1 | 2014 |
Cost estimation model for reuse software M Mandloi, S Patel, R Pandit International Journal 3 (6), 693-702, 2013 | 1 | 2013 |
Dynamic Web Cache Management and Browsing Performance SK Badodia, S Patel, R Pandit International Journal of Computer Applications 70 (14), 2013 | 1 | 2013 |
Swing Detection Using Onto Tree R Pandit, P Sohoni, S Patel International Journal of Advanced Computer Research 2 (3), 99, 2012 | 1 | 2012 |
Resource Allocation in Cloud Datacenters Using Modified Best Fit with Capacity Based Scheduling R Pandit, M Dwivedi Computer Integrated Manufacturing Systems 1006, 5911, 0 | 1 | |
A Review of EEG Artifact Removal Methods for Brain-Computer Interface Applications AKK Safdar Sardar Khan, Jaskirat Singh Sudan , Anuj Pathak , Rakesh Pandit ... Ingénierie des Systèmes d’Information 29 (1), 247-252, 2024 | | 2024 |
Credit Risk Assessment and Fraud Detection in Financial Transactions Using Machine Learning_Journal of Electrical System DPMACRPDSBJ Surana* JOURNAL OF ELECTRICAL SYSTEM 20 (3), 2061-2069, 2024 | | 2024 |