V. M. Thakare

V. M. Thakare

Dr.

About

293
Publications
107,510
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,074
Citations

Publications

Publications (293)
Chapter
Rapid developments in the field of technology have tremendously increased the deployment of the most demanding WSNs in the majority of applications such as health care, agriculture and structural monitoring. The sensor nodes monitor and transmit the sensed values to the server/base station for analyzing. The major difficulty in deploying the WSN is...
Chapter
With the recent advancements in technology, nowadays wireless sensor networks are the most prominent networks deployed almost in all the areas such as healthcare, agriculture, defense, etc. Wireless sensor nodes are basically used to monitor and send the data to a central machine for analysis purposes. The major concern while deploying the wireless...
Chapter
An education is an important part of daily lifestyle of student. A knowledge can be gained through newspaper, television, Internet, books, etc. This formal and informal way of learning education can also be done with the help of Internet communication technology. There are various ways of delivering knowledge, viz. (i) an ancient method of classroo...
Chapter
Full-text available
Software refactoring is the procedure that requires alteration in the source code to keep away from unused variable or duplicated variable, unused method and deprecated method. In this paper, work is done for implementation of CCACSR with PMD and UCD tool, which is useful for software refactoring. This paper focuses on CCACSR that includes mainly t...
Article
Full-text available
It is literature Survey of methods for character recognition.
Conference Paper
Full-text available
An outsourced environment like cloud has become a default choice for organizations to store their data because of its extensive resources. This also allows the organizations to access their data on demand. Generally, any cloud service encrypts data collected from different data owners with its own credentials. In some special cases, when the data i...
Chapter
As wireless sensor network has limited resources in terms of battery power, computation capacity and memory, therefore a dynamic clustering approach is proposed in order to reduce the energy consumption of the network. The algorithm works on various parameters such as residual energy, distance to the base station, intra cluster distance and number...
Article
Full-text available
The offline handwritten identification in the area of pattern recognition was a heavy and difficult task. Because of its application in different areas, a set of work is being done and the results are continuing to be strengthened by different methods. We suggested in this paper a handwritten model for individual character recognition using general...
Article
Full-text available
Abstract: The offline handwritten identification in the area of pattern recognition was a heavy and difficult task. Because of its application in different areas, a set of work is being done and the results are continuing to be strengthened by different methods. We suggested in this paper a handwritten model for individual character recognition usi...
Chapter
Terrorists have shifted their activities of planning and coordination of attacks to internet by using web technologies. They are educated enough to create their websites, communicate through apps. They use online technologies to fulfill their objectives such as distribution of materials, overcome obstacles, communication, recruitment, fundraising,...
Article
Full-text available
A radio-frequency identification (RFID) technology is an automatic identification method by using cloud storage i.e. storing the data and retrieving the data. The cloud-storage RFID location detection system is an process of detecting the tag ID form the users. This technology is based on radio-frequency identification as well as Wireless sensor ne...
Article
Full-text available
A radio-frequency identification (RFID) technology is an automatic identification method by using cloud storage i.e. storing the data and retrieving the data. The cloud-storage RFID location detection system is an process of detecting the tag ID form the users. This technology is based on radio-frequency identification as well as Wireless sensor ne...
Article
Full-text available
Major trouble to Indian road surface is the potholes, cracks and patches. This problem reduces moving speed of vehicles and leads to inefficient communication. In this paper we proposed an approach for development and implementation of ICT enabled model for efficient identification and maintenance of Indian road distress. The entire work can be car...
Conference Paper
Full-text available
Mobility models of MANET have been still research area in mobile computing and in wireless network with lots of mobility algorithms to design the efficient mobility model. There are many mobility models was developed to give the framework for the communication of mobile node. This paper focused on five different techniques such as Enhanced mobility...
Article
Full-text available
The most widely correspondence modes for individuals is speech. People use speech as another mode to convey information without lifting a finger with the help of speech recognition applications. This paper presents a study about execution of speech recognition debilitates inside considering resounding and even low levels of including clamor. Speech...
Chapter
Nowadays, mobile devices have become an essential element of life for every individual. The use of mobile devices and applications vary from person to person. The user interaction mechanism in mobile devices has changed from keypads to touchpads. People prefer to do multitasking while using mobile devices which have created a need to find more natu...
Article
Full-text available
Speech recognition or speech to text conversion has rapidly gained a lot of interest by large organizations in order to ease the process of human to machine communication. Optimization of the speech recognition process is of utmost importance, due to the fact that real-time users want to perform actions based on the input speech given by them, and...
Article
Full-text available
Relational databases hold a leading position in database industry and are better know as workhorses of database industry. They are one of most popular and commonly used medium for recording, manipulating and retrieving data. They find its application in varied and protean requirements including data mining, business intelligence and analytical quer...
Article
Full-text available
As there has been a vast advancement in information and communication technology, there is a need for change in traditional examination system. Traditional examination system is to be replaced by online examination system. A cloud based solution is proposed to tackle the various issues in educational institutions. Here, we propose architecture for...
Conference Paper
This paper presents a review of methods for character recognition. Optical Character Recognition (OCR) is the task of perceiving the characters which are available in a digital form. The characters can be machine print or handwritten. OCR is demonstrating along with the most fascinating and testing regions of pattern recognition with different prac...
Article
In wireless sensor network (WSN), it is a complex task to track the target when it is moving randomly in an unknown environment. It also becomes difficult to cover a complete searching area because of the limited searching range and energy of sensor nodes as they are few in number. The author proposes a distributed energy efficient tracking in a hy...
Research
Full-text available
A mechanism of converting a fingerprint template to text based on Minutiae Point algorithm
Chapter
Emotion extraction from text is the categorization of given pieces of text (reviews/comments) into diffident emotions with NLP techniques. Now a days, internet is flooded with individual’s social interaction. Also there are emotionally rich environments on the internet where close friends can share their emotions, feelings and thoughts. It has lots...
Chapter
The Sentiment analysis from text documents is emerging field for the research in Natural Language Processing (NLP) and text mining. Feature specific opinion matters more than the overall opinion. Given a collection of review texts, the goal is to detect the individual product aspects comments by reviewers and to decide whether the comments are rath...
Article
Full-text available
In today’s real life applications complexity of multimedia contents is significantly increased. This is highly demanding the development of effective retrieval systems to satisfy human desires. Recently, extensive research efforts have been carried out in the field of content-based image retrieval (CBIR). These research efforts are based on various...
Chapter
Full-text available
Nowadays, all smartphones are equipped with powerful multiple built-in sensors. People are carrying these “sensors” nearly all the time from morning to night before sleep as they carry the smartphone all the time. These smartphone allow the data to be collected through built-in sensors, especially the accelerometer and gyroscope give us several obv...
Article
Full-text available
It is crucial in image forensics to prove the authenticity of the digital images. Due to the availability of the using sophisticated image editing software programs, anyone can manipulate the images easily. There are various types of digital image manipulation or tampering possible; like image compositing, splicing, copy-paste, etc. In this paper,...
Article
Full-text available
The issue of the authenticity and integrity of digital images is getting critical. Nowadays it became easy to create image forgeries. Digital image forensics plays a vital role in proving authenticity and integrity of digital images. There are various types of image forgeries possible, and Copy-Paste is one of it. In this type of forgery, a region...
Article
Full-text available
Copy-Move forgery is the most common image tampering method to create forged images. The images may be forged to conceal or change the meaning of the photographs. Hence, it becomes important to verify the integrity and authenticity of the images. The copy-move forgery detection can be classified under two heads viz., block based and keypoint based....
Article
Full-text available
One of the problem in image forensics is to check the authenticity of image. This can be very important task when images are used as an evidence which cause change in judgment like, for example in a court of law. Image is forged by using different techniques but in that most common technique is copy-move forgery. Copy-move forgery is created by cop...
Conference Paper
Full-text available
Mobile Phone used not to be matter of luxury only, it has become a significant need for rapidly evolving fast track world. This paper proposes a spatial context recognition system in which certain types of human physical activities using accelerometer and gyroscope data generated by a mobile device focuses on reducing processing time. The benchmark...
Article
Full-text available
Users store vast amounts of sensitive data on a cloud. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. Security is one of the most difficult task to implement in cloud computing. Different forms of attacks i...