An encryption algorithm based on ASCII value of data SR Shinge, R Patil International Journal of Computer Science and Information Technologies 5 (6 …, 2014 | 37 | 2014 |
Prediction system for student performance using data mining classification R Patil, S Salunke, M Kalbhor, R Lomte 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 23 | 2018 |
Disease prediction system using data mining hybrid approach R Patil, P Chopade, A Mishra, B Sane, Y Sargar Commun. Appl. Electron 4, 2016 | 11 | 2016 |
A hybrid model to detect phishing-sites using clustering and Bayesian approach R Patil, BD Dhamdhere, KS Dhonde, RG Chinchwade, SB Mehetre International Conference for Convergence for Technology-2014, 1-5, 2014 | 10 | 2014 |
Hybrid cryptography technique using modified Diffie-Hellman and RSA S Deshmukh, R Patil International Journal of Computer Science and Information Technologies 5 (6 …, 2014 | 10 | 2014 |
Skewed Evolving Data Streams Classification with Actionable Knowledge Extraction using Data Approximation and Adaptive Classification Framework RA Patil, PD Patil International Journal on Recent and Innovation Trends in Computing and …, 2023 | 7 | 2023 |
CaptchAs based on the principle-hard to separate text from background NK Choudhary, R Patil Int J Comput Sci Inf Technol (IJCSIT) 5 (6), 7501-7503, 2014 | 7 | 2014 |
Avinash and L. Golande,“Decision Tree Post Processing for Extraction of Actionable Knowledge,” RA Patil, PG Ahire, PD Patil International Journal of Engineering and Innovative Technology (IJEIT) 2 (1 …, 2012 | 6 | 2012 |
Efficient cash withdrawal from atm machine using qrcode technology R Patil, S Salunke, R Lomte, M Kalbhor 2019 5th International Conference On Computing, Communication, Control And …, 2019 | 5 | 2019 |
An Android Application for Driver Assistance and Event Alert System Using Ultrasonic Sensor and Heart Rate Sensor R Patil, P Bais, K Baviskar, S Shevate, M Kalyani 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 5 | 2018 |
Secure secret key transfer using modified hash based LSB method AG Meshram, R Patil vol 5, 7683-7685, 2014 | 5 | 2014 |
System for analyzing crime news by mining live data streams with preserving data privacy R Patil, PD Patil, S Kanase, N Bhegade, V Chavan, S Kashetwar Sentimental Analysis and Deep Learning: Proceedings of ICSADL 2021, 799-811, 2022 | 4 | 2022 |
Improving spam mail filtering using classification algorithms with discretization Filter PRP Supriya S. Shinde International Journal of Emerging Technologies in Computational and Applied …, 2014 | 4* | 2014 |
Faster Transfer of AES Encrypted Data over Network S Patil, R Patil vol 5, 7674-7676, 2014 | 4 | 2014 |
An Approach to Clustering of Power Quality Events Data PG Ahire, PD Patil, RA Patil, AL Golande Proc. Int. J. Eng. Innov. Technol 2, 164-168, 2012 | 4 | 2012 |
Data Sharing and Privacy–Preserving of Medical Records Using Blockchain SS Kavathekar, R Patil Sustainable Communication Networks and Application: ICSCN 2019, 65-72, 2020 | 3 | 2020 |
Hate speech and abusive language suspect identification and report generation S Chaudhari, P Chaudhari, P Fegade, A Kulkarni, R Patil International Journal of Scientific & Technology Research 8, 1609-1611, 2019 | 3 | 2019 |
Answer Ranking in Community Question Answer (QA) System and Questions Recommendation SS Shah, TS Bavaskar, SS Ukhale, RA Patil, AS Kalyankar 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 3 | 2018 |
Routing Algorithms for Interconnection Networks: A Review C Zanwar, RA Patil, PD Godbole 2016 International Conference on Information, Communication and Computing …, 2016 | 2 | 2016 |
Synthesis and characterization of potential impurities in Fenofibrate drug substance R Patil, S Patil, P Joshi, V Jadhav Der Pharma Chem 7, 273-278, 2015 | 2 | 2015 |