Follow
Dr. Suresh Limkar
Dr. Suresh Limkar
Associate Professor, AISSMS IOIT, Pune
Verified email at aissmsioit.org
Title
Cited by
Cited by
Year
Cross-Domain Analysis of ML and DL: Evaluating their Impact in Diverse Domains
V Khetani, Y Gandhi, S Bhattacharya, SN Ajani, S Limkar
International Journal of Intelligent Systems and Applications in Engineering …, 2023
1252023
A performance comparison of routing protocols (DSR and TORA) for security issue in MANET (Mobile Ad Hoc Networks)
RK Jha, SV Limkar, DU Dalal
IJCA Special Issue on MANETs (2), 78-83, 2010
362010
A novel method for parallel indexing of real time geospatial big data generated by IoT devices
SV Limkar, RK Jha
Future generation computer systems 97, 433-452, 2019
352019
Deep learning and image processing-based early detection of Alzheimer disease in cognitively normal individuals
P Borkar, VA Wankhede, DT Mane, S Limkar, JVN Ramesh, SN Ajani
Soft Computing, 1-23, 2023
312023
DLMBHCO: design of an augmented bioinspired deep learning-based multidomain body parameter analysis via heterogeneous correlative body organ analysis
SN Ajani, RA Mulla, S Limkar, R Ashtagi, SK Wagh, ME Pawar
Soft Computing, 1-21, 2023
272023
Evaluation of growth responses of lettuce and energy efficiency of the substrate and smart hydroponics cropping system
M Dutta, D Gupta, S Sahu, S Limkar, P Singh, A Mishra, M Kumar, R Mutlu
Sensors 23 (4), 1875, 2023
222023
Performance investigation of DMV (detecting malicious vehicle) and D&PMV (detection and prevention of misbehave/malicious vehicles): Future road map
M Kadam, S Limkar
Proceedings of the International Conference on Frontiers of Intelligent …, 2014
202014
Secure group key agreement protocol with elliptic curve secret sharing for authentication in distributed environments
RM Sairise, S Limkar, ST Deokate, ST Shirkande, RA Mahajan, A Kumar
Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1569-1583, 2023
192023
Improved data hiding technique based on audio and video steganography
S Limkar, A Nemade, A Badgujar, R Kate
Smart Computing and Informatics: Proceedings of the First International …, 2018
152018
Design of an efficient multimodal engine for preemption and post-treatment recommendations for skin diseases via a deep learning-based hybrid bioinspired process
S Shivadekar, B Kataria, S Limkar, K S. Wagh, S Lavate, RA Mulla
Soft Computing, 1-19, 2023
132023
D&PMV: new approach for detection and prevention of misbehave/malicious vehicles from VANET
M Kadam, S Limkar
Proceedings of the International Conference on Frontiers of Intelligent …, 2014
132014
IPv6: issues and solution for next millennium of internet
SV Limkar, RK Jha, S Pimpalkar
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
112011
Optimisation Using Levenberg-Marquardt Algorithm of Neural Networks for Iris
A Sayed, M Sardeshmukh, S Limkar
Proceedings of the International Conference on Frontiers of Intelligent …, 2014
102014
Performance analysis under the influence of jamming for WiMAX system
RK Jha, SV Limkar, UD Dalal
2011 Second International Conference on Emerging Applications of Information …, 2011
92011
Computing over encrypted spatial data generated by IoT
SV Limkar, RK Jha
Telecommunication Systems 70, 193-229, 2019
82019
An effective defence mechanism for detection of DDoS attack on application layer based on hidden Markov model
S Limkar, RK Jha
Proceedings of the International Conference on Information Systems Design …, 2012
82012
Significance of artificial intelligence in the production of effective output in power electronics
W Anandpwar, S Barhate, S Limkar, M Vyawahare, SN Ajani, P Borkar
International Journal on Recent and Innovation Trends in Computing and …, 2023
72023
Genetic Algorithm: Paradigm Shift over a Traditional Approach of Timetable Scheduling
S Limkar, A Khalwadekar, A Tekale, M Mantri, Y Chaudhari
Proceedings of the 3rd International Conference on Frontiers of Intelligent …, 2014
72014
IPv6: Features, Current Deployment Scenario, Issues and Migration Status in India
S Limkar, R Jha, T Patil, M Kalbande
Proceeding of the International Conference on Software and Computing …, 2010
72010
A mechanism to ensure identity-based anonymity and authentication for IoT infrastructure using cryptography
S Limkar, WV Ashok, S Singh, A Singh, SK Wagh, SN Ajani
Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1597-1611, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20