Zobrazeno 1 - 10
of 39
pro vyhledávání: '"Gautam M. Borkar"'
Autor:
Anita R. Patil, Gautam M. Borkar
Publikováno v:
IET Wireless Sensor Systems, Vol 13, Iss 6, Pp 201-215 (2023)
Abstract In a mobile ad hoc network (MANET), all nodes are communicated with one another across wireless networks to create a temporary network without the support of centralised management. Due to dynamic topology in MANET, secure routing is a cruci
Externí odkaz:
https://doaj.org/article/034885c659df4241ac849ae4c3d22793
Autor:
Benyamin Abdollahzadeh, Silifat Adaramaja Abdulraheem, Iyad Abu-Doush, Mohammed Azmi Al-Betar, Yusuf Sahabi Ali, Khalifa Al-Jabri, Ghazi Al-Rawas, Ankush Anand, Mohammed A. Awadallah, Parnian Hashempour Bakhtiari, P. Shanthi Bala, Kusum Kumari Bharti, Gautam M. Borkar, Malik Shehadeh Braik, Özay Can, Soumitri Chattopadhyay, Aybike Özyüksel Çiftçioğlu, Ahmet Cevahir Cinar, Serdar Ekinci, Hasan Eroğlu, Amir H. Gandomi, Mohammadali Geranmehr, Farhad Soleimanian Gharehchopogh, Ibrahim Hayatu Hassan, Davut Izci, Sehej Jain, Isuwa Jeremiah, Ersin Kaya, Muhammad Najeeb Khan, Nima Khodadadi, Hisham M. Khudhur, Krishanu Kundu, Aritra Marik, Mansur Aliyu Masama, Mwangi Mbuthia, Seyedali Mirjalili, Abdullahi Mohammed, Rafaa Mraihi, Mohammad Reza Nikoo, Abraham Nyete, Ali Öztürk, Narendra Nath Pathak, Anita R. Patil, Rishav Pramanik, Bochra Rabbouch, Hana Rabbouch, Sajad Ahmad Rather, Foued Saâdaoui, Davies Segera, Sevil Sen, Amit Kumar Sinha, Bahaeddin Turkoglu, Sait Ali Uymaz, Selim Yilmaz, Ehsan Yousefi-Khoshqalb
Publikováno v:
Comprehensive Metaheuristics ISBN: 9780323917810
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8dd6226b3aa5e931607ec81c35cf9841
https://doi.org/10.1016/b978-0-323-91781-0.09992-0
https://doi.org/10.1016/b978-0-323-91781-0.09992-0
Autor:
Anita R. Patil, Gautam M. Borkar
Publikováno v:
Comprehensive Metaheuristics ISBN: 9780323917810
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b9102f0dfccc25e0f9a06c9b782db97e
https://doi.org/10.1016/b978-0-323-91781-0.00016-8
https://doi.org/10.1016/b978-0-323-91781-0.00016-8
Publikováno v:
The Psychology of Trust
The Psychology of Trust ISBN: 9781839698729
The Psychology of Trust ISBN: 9781839698729
Trust, defined as the willingness to accept risk and vulnerability based upon positive expectations of the intentions or behaviours of another. The qualities or behaviours of one person that create good expectations in another are referred to as trus
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9175f48dcb45485e831e752add727609
https://mts.intechopen.com/articles/show/title/trust-management-a-cooperative-approach-using-game-theory
https://mts.intechopen.com/articles/show/title/trust-management-a-cooperative-approach-using-game-theory
Autor:
Nikita Valte, Gautam M. Borkar
One of the most cutting-edge technologies is the Internet of Things (IOT).Various features provided by the IOT by connecting smart objects through the internet. IOT is refers as the connecting various devices to each other by means of internet hence
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::61bdf8f6fa8a08569dff2a574311b358
Publikováno v:
Transactions on Emerging Telecommunications Technologies. 33
Publikováno v:
2021 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME).
Big data analytics has given us the ability to analyze massive amounts of data, but it has also put privacy at a risk. Personal information may be present in data processed by big data analytics, which must be preserved. Existing privacy preservation
Publikováno v:
Sustainable Computing: Informatics and Systems. 23:120-135
Nowadays Wireless Sensor Network (WSN) mainly faces security issue during packet transmission between different sensor nodes in network combined with data mining. To overcome this challenge an efficient clustering technique called adaptive chicken sw
With the rise in usage of social media, large quantities of data like pictures, videos, audio, and computer graphics are created. As the data is shared over the network, security and privacy become important concerns. Social networks are most popular
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a6ac795d940e8fda9139ae213706e526
https://doi.org/10.4018/978-1-7998-5728-0.ch007
https://doi.org/10.4018/978-1-7998-5728-0.ch007
Autor:
Leena H. Patil, Gautam M. Borkar
Publikováno v:
Journal of Applied Security Research. 13:545-571
In recent times, the interest for different multimedia applications such as video conferencing, surveillance system, and video on request service over Mobile ad-hoc networks (MANETs) has been devel...