V. M. Thakare

V. M. Thakare

Dr.

About

331
Publications
137,513
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,516
Citations

Publications

Publications (331)
Article
Full-text available
Vehicular Adhoc Networks (VANETs) enable vehicles to communicate with each other and with the infrastructure to improve safety, efficiency, and mobility. Event-based communication models have emerged as a promising approach for VANETs to detect and respond to various traffic events in real-time. Machine learning algorithms have been used to detect...
Article
Full-text available
This is an Open Access Journal / article distributed under the terms of the Creative Commons Attribution License (CC BY-NC-ND 3.0) which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. All rights reserved. Word sense disambiguation (WSD) is a method for pinpointing a word's inten...
Article
Full-text available
With the rising demand for efficient resource usage and optimization of performance in Edge Computing environments, comprehensive research needs to be carried out on the loading balancing techniques. The literature already identifies weaknesses in the current approach that includes local maxima issues, energy consumption, and degradation in system...
Article
Full-text available
The software in today's cars has become increasingly important in recent years. The development of high-tech driver assistance devices has helped fuel this movement. This tendency is anticipated to accelerate with the advent of completely autonomous vehicles. As more modern vehicles incorporate software and security-based solutions, "Event-Based di...
Chapter
Opinion mining is also called sentiment analysis is a branch of web mining and text mining that is the process of identifying and determining the orientation of individual web users regarding various products, services, social comments on social media, different e-commerce websites, political issues, hotels, restaurants, emotions or sentiments of i...
Article
Full-text available
Data-hiding technology plays an important role in fields of the image such as copyright identification and annotation. Predicators may be exploited in RDH in the encrypted image (RDHEI); this has become a research interest in recent years because of the development of cloud computing and a need for content owner privacy. The existing algorithms can...
Article
The rapid expansion of internet usage and related services like social media and blogs has increased people's level of expressiveness in day-to-day life. Social media platforms like Twitter and Facebook facilitate people to interact and exchange opinions about people, products, and services. As a result, a vast amount of data is available online in...
Chapter
Cloud computing is now an integral infrastructure for individuals and companies to store data and provide services that leverage this data. Thus, it is a routine for data owners to outsource their data and data operations to a public cloud that serves certain mining services. In order to preserve privacy, the valuable outsourced data has to be encr...
Chapter
Social media is one of the evolving platforms to share the views. The social media such as Twitter, Instagram, Facebook, and other microblogging sites floats lot of information from one corner of the world to another corner. This information can be used for the various purposes. Social media plays major role in collection of wide variety of informa...
Chapter
In a current scenario use of multimedia, gadgets have increased the usage of social websites and the Internet. Twitter, Facebook, Instagram, Telegram, and WhatsApp are the generally used platforms in the Internet community. Sharing reviews, feedbacks, and personal experiences are the most common task on social media. Such data is available in an un...
Chapter
Reversible data hiding is used to embed information or data in the encrypted domain. In RDH, an input image is converted into unreadable format with encryption technique by using secret key and while transmission, additional information is embed in the encrypted image, with no knowledge of image content. At the time of decoding, extraction of embed...
Conference Paper
Full-text available
Social media is the richest source of text generated by the user. So there is a necessity to automate the system to help organizing and classifying the opinions posted on social media sites. Proposed methodology framework using Artificial Recurrent Neural Network (ARNN) with bi-directional long short term memory (LSTM) has been used for the classif...
Article
Full-text available
With the increased use of technology , the fog computing network is being used on a large scale The integration of fog computing into cloud computing network is full of advantages and increases features. The network currently is secured but also subjected to various challenges. In this paper, we have reviewed five different schemes which are : Arch...
Chapter
Rapid developments in the field of technology have tremendously increased the deployment of the most demanding WSNs in the majority of applications such as health care, agriculture and structural monitoring. The sensor nodes monitor and transmit the sensed values to the server/base station for analyzing. The major difficulty in deploying the WSN is...
Article
Full-text available
The security of computer networks has become a very important aspect in today’s era. An intrusion detection system (IDS) is a type of security software designed to automatically inform administrators when someone is trying to compromise the information system through malicious activities or security policy violations. IDS works by monitoring the sy...
Article
Social network is the most reliable platform to share data. It produces a huge number of subjects each day. Online media is critical for business associations to learn the popularity of these themes as fast as could be expected. This paper is centered around the investigation of five distinctive existing trending detection methods, such as The Pred...
Article
Full-text available
The MANETs are effectively deployed in the different environments such as: Armed Forces, Disaster Management, Medical and other similar Integrated Applications . Observed that new challenges and applications come up in the MANETs in every short period of a time. In the large deployments MANETs can have huge number of mobile nodes creating new probl...
Article
Full-text available
Clustering is a widely used unsupervised data mining technique. In clustering, the main aim is to put similar data objects in one cluster and dissimilar in another cluster. The k-implies is the most famous clustering algorithm because of its effortlessness. But the performance of the k-means clustering algorithm depends upon the parameter selection...
Chapter
With the recent advancements in technology, nowadays wireless sensor networks are the most prominent networks deployed almost in all the areas such as healthcare, agriculture, defense, etc. Wireless sensor nodes are basically used to monitor and send the data to a central machine for analysis purposes. The major concern while deploying the wireless...
Chapter
An education is an important part of daily lifestyle of student. A knowledge can be gained through newspaper, television, Internet, books, etc. This formal and informal way of learning education can also be done with the help of Internet communication technology. There are various ways of delivering knowledge, viz. (i) an ancient method of classroo...
Chapter
Full-text available
Software refactoring is the procedure that requires alteration in the source code to keep away from unused variable or duplicated variable, unused method and deprecated method. In this paper, work is done for implementation of CCACSR with PMD and UCD tool, which is useful for software refactoring. This paper focuses on CCACSR that includes mainly t...
Research
The present research work provides a framework and method for fall and melanoma skin detection by using inbuilt smartphone sensors. The result gives an accurate interpretation depending on the data provided to the system.In this paper, the proposed method extracts the signals with the help of a smartphone sensor. This system is a live monitoring sy...
Article
Full-text available
It is literature Survey of methods for character recognition.
Conference Paper
Full-text available
An outsourced environment like cloud has become a default choice for organizations to store their data because of its extensive resources. This also allows the organizations to access their data on demand. Generally, any cloud service encrypts data collected from different data owners with its own credentials. In some special cases, when the data i...
Chapter
As wireless sensor network has limited resources in terms of battery power, computation capacity and memory, therefore a dynamic clustering approach is proposed in order to reduce the energy consumption of the network. The algorithm works on various parameters such as residual energy, distance to the base station, intra cluster distance and number...
Article
Full-text available
The offline handwritten identification in the area of pattern recognition was a heavy and difficult task. Because of its application in different areas, a set of work is being done and the results are continuing to be strengthened by different methods. We suggested in this paper a handwritten model for individual character recognition using general...
Article
Full-text available
Abstract: The offline handwritten identification in the area of pattern recognition was a heavy and difficult task. Because of its application in different areas, a set of work is being done and the results are continuing to be strengthened by different methods. We suggested in this paper a handwritten model for individual character recognition usi...
Chapter
Terrorists have shifted their activities of planning and coordination of attacks to internet by using web technologies. They are educated enough to create their websites, communicate through apps. They use online technologies to fulfill their objectives such as distribution of materials, overcome obstacles, communication, recruitment, fundraising,...
Article
Full-text available
A radio-frequency identification (RFID) technology is an automatic identification method by using cloud storage i.e. storing the data and retrieving the data. The cloud-storage RFID location detection system is an process of detecting the tag ID form the users. This technology is based on radio-frequency identification as well as Wireless sensor ne...
Article
Full-text available
Major trouble to Indian road surface is the potholes, cracks and patches. This problem reduces moving speed of vehicles and leads to inefficient communication. In this paper we proposed an approach for development and implementation of ICT enabled model for efficient identification and maintenance of Indian road distress. The entire work can be car...
Conference Paper
Full-text available
Mobility models of MANET have been still research area in mobile computing and in wireless network with lots of mobility algorithms to design the efficient mobility model. There are many mobility models was developed to give the framework for the communication of mobile node. This paper focused on five different techniques such as Enhanced mobility...
Article
Full-text available
The most widely correspondence modes for individuals is speech. People use speech as another mode to convey information without lifting a finger with the help of speech recognition applications. This paper presents a study about execution of speech recognition debilitates inside considering resounding and even low levels of including clamor. Speech...
Chapter
Nowadays, mobile devices have become an essential element of life for every individual. The use of mobile devices and applications vary from person to person. The user interaction mechanism in mobile devices has changed from keypads to touchpads. People prefer to do multitasking while using mobile devices which have created a need to find more natu...
Article
Full-text available
Speech recognition or speech to text conversion has rapidly gained a lot of interest by large organizations in order to ease the process of human to machine communication. Optimization of the speech recognition process is of utmost importance, due to the fact that real-time users want to perform actions based on the input speech given by them, and...
Article
Full-text available
Relational databases hold a leading position in database industry and are better know as workhorses of database industry. They are one of most popular and commonly used medium for recording, manipulating and retrieving data. They find its application in varied and protean requirements including data mining, business intelligence and analytical quer...
Article
Full-text available
As there has been a vast advancement in information and communication technology, there is a need for change in traditional examination system. Traditional examination system is to be replaced by online examination system. A cloud based solution is proposed to tackle the various issues in educational institutions. Here, we propose architecture for...
Conference Paper
This paper presents a review of methods for character recognition. Optical Character Recognition (OCR) is the task of perceiving the characters which are available in a digital form. The characters can be machine print or handwritten. OCR is demonstrating along with the most fascinating and testing regions of pattern recognition with different prac...
Article
In wireless sensor network (WSN), it is a complex task to track the target when it is moving randomly in an unknown environment. It also becomes difficult to cover a complete searching area because of the limited searching range and energy of sensor nodes as they are few in number. The author proposes a distributed energy efficient tracking in a hy...
Conference Paper
Full-text available
This paper discuss about Arduino based heart rate measuring techniques using easy pulse sensor and pulse sensor. Heart rate monitoring and counting is performed using different software tools. The proposed framework collects input from pulse sensor by placing the patients' finger on the sensor. Then it is processed using Arduino to count the number...
Research
Full-text available
A mechanism of converting a fingerprint template to text based on Minutiae Point algorithm

Network

Cited By