D. P. Gaikwad

  • Citations Per Year
Learn More
Intrusion detection system is widely used to protect and reduce damage to information system. It protects virtual and physical computer networks against threats and vulnerabilities. Presently, machine learning techniques are widely extended to implement effective intrusion detection system. Neural network, statistical models, rule learning, and ensemble(More)
Due to the rapid expansion and advancements of computer network, security has become a vital issue for modern computer network. The network intrusion detection systems play the vital role in protecting the computer networks. So, it has become a significant research issue. In spite of notable progress in intrusion detection system, there are still many(More)
Present research paper "Study of the Linear and Non-Linear Differential Equation for physical system"is an attempt to improve and develop the skill in science and engineering for solving the real problems. Here studying the application of differential equation for various branch of science and technology such as applied mathematics, physics,(More)
An intrusion compromises the security and the value of a computer system in network. Legitimate users find it difficult to access network services due to the network attacks as they intentionally occupy or sabotage network resources and services. The intrusion detection system defends the critical computer system and networks from cyber-attacks. Various(More)
Our faces are complex objects with features that can vary over time. However, we humans have a natural ability to recognize faces and identify persons in a glance. Unfortunately, this natural ability does not exist in machines, so we need to create intelligent autonomous machines to simulate recognition system artificially. We have implemented intelligent(More)
  • Aishwarya Auti, Romalee Amolic, +21 authors “Hand
  • 2017
The speech and hearing impaired face a severe problem of communication with the normal people as the sign language used by them, is not understood by a majority of the people. Today those using sign language require a human sign language interpreter to surpass the communication barriers with non-disabled people. Hence we will develop a system that will(More)
In Internet-based communication, different types of networks are used to provide services to users. Due to exploration of different types of vulnerabilities, day by day threat of attacks in network is increasing. There is possibility of getting system infected by internal or external intruders. Single computer system is shared by multiple users. Users use(More)
Steganography is a science and art of communicating in writing such a way that the presence of message is detected. Steganography is focuses on hiding of a secret message into ordinary messages and the extraction of this message into its destination using provided techniques in such a way only sender and receiver are able to disclose it. Steganography(More)
  • 1