Zobrazeno 1 - 10
of 32
pro vyhledávání: '"R. S. Bichkar"'
Autor:
A. S. Shinde, R. S. Bichkar
Publikováno v:
Journal of Ambient Intelligence and Humanized Computing. 14:7649-7662
Autor:
Milind V Kamble, R. S. Bichkar
Publikováno v:
2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS).
Autor:
R. S. Bichkar, Jyoti S. Kulkarni
Publikováno v:
International Journal of Innovative Technology and Exploring Engineering. 10:92-97
Ant Colony Optimization (ACO) is a relatively high approach for finding a relatively strong solution to the problem of optimization. The ACO based image fusion technique is proposed. The objective function and distance matrix is designed for image fu
Autor:
R. S. Bichkar, Jyoti S. Kulkarni
Publikováno v:
International Journal of Image, Graphics and Signal Processing. 11:50-59
Autor:
Pratik D. Shah, R. S. Bichkar
Publikováno v:
2020 International Conference for Emerging Technology (INCET).
Steganography is used to perform covert communication. The advantage of steganography over other secret communication techniques is its ability to conceal the presence of covert communication. In image steganography, the secret information is conceal
Autor:
Lobo L. M. R. J, R. S. Bichkar
Publikováno v:
International Journal of Computer Applications. 170:18-23
Autor:
L. M. R. J. Lobo, R. S. Bichkar
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315794
Finding interesting and usually unexpected optimistic rules which are used to normally represent a dataset becomes a question of concern when dealing with data repositories. Association rule mining can cater to generation and classification of these
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::80c35c29af248c37ad0e276a85f8c712
https://doi.org/10.1007/978-981-13-1580-0_2
https://doi.org/10.1007/978-981-13-1580-0_2
Autor:
R. S. Bichkar, B. D. Phulpagar
Publikováno v:
International Journal of Computer Applications. 126:29-39
Image segmentation technique is the process of separating the foreground objects of different intensities from the background. Several authors have proposed different methods for segmentation of images into two classes, each one having different qual
Autor:
Manisha Y. Joshi, R. S. Bichkar
Publikováno v:
International Journal of Computer Network and Information Security. 7:49-55
Group key management is an integral part of secure multicast. Minimizing the number of rekeying messages, maintaining the forward and backward secrecy has always been a challenging task. Though there are many solutions which reduce the rekeying messa
Autor:
S. N. Pawar, R. S. Bichkar
Publikováno v:
International Journal of Automation and Computing. 12:337-342
Genetic algorithm (GA) has received significant attention for the design and implementation of intrusion detection systems. In this paper, it is proposed to use variable length chromosomes (VLCs) in a GA-based network intrusion detection system. Fewe