Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Pankaj Kawadkar"'
Publikováno v:
International Journal of Scientific Methods in Intelligence Engineering Networks. :22-32
Our research focuses on using big data technology with a structured and personalized nursing care approach to improve treatment for patients with COPD and respiratory arrest. This study evaluates a continuous care strategy for COPD and RF therapies u
Publikováno v:
International Journal of Scientific Methods in Engineering and Management. :31-38
Image processing is essential for the success of image-based authentication. Included in multiple ”Multimodal image classification” subheadings. In this research, we will investigate three methods that have been shown to improve the precision of
Autor:
Mirza Arif baig, Dr Pankaj Kawadkar
The mobile ad hoc network, or MANET, is one of most promising networks to originate from technological world. Nodes within MANETs change locations over time, setup themselves, and transfer data from source to destination even without assistance of a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::81a1c75cbef63fe444572361b9bcc280
Autor:
Syed Shabbeer Ahmad, Atheequllah Khan, Pankaj Kawadkar, Imtiyaz Khan, Mummadi Upendra Kumar, D. Shravani
Publikováno v:
Advancements in Smart Computing and Information Security ISBN: 9783031230943
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9167597bb32aa42ce0a810a74488a2d7
https://doi.org/10.1007/978-3-031-23095-0_6
https://doi.org/10.1007/978-3-031-23095-0_6
Publikováno v:
2013 5th International Conference on Computational Intelligence and Communication Networks.
Geographic Information Systems (GIS) has been prominently working for the designed to sculpt the world. With the growth and data and increasing sophistication of analysis and processing techniques the traditional sequential methods of performing GIS
Publikováno v:
WOCN
Internet threat have different form of attacks, considering individual users to obtain control over data and network. The Buffer Overflow which is one of the most frequently occurring security vulnerabilities on network. Buffer Overflow occurs while