Raju Barskar

Learn More
-E-Commerce offers the banking industry great opportunity, but also creates a set of new risks and vulnerability such as security threats. Information security, therefore, is an essential management and technical requirement for any efficient and effective Payment transaction activities over the internet. Still, its definition is a complex endeavor due to(More)
One of the most successful algorithms that bring realism in the world of 3-D generation is fast phong shading. The digital image data is rapidly expanding in quantity and heterogeneity. The traditional information retrieval techniques does not meet the user’s demand, so there is need to develop an efficient system for content based image retrieval.(More)
Association Rule mining is a very efficient technique for finding correlation among data sets. The correlation of data gives meaning full extraction process. For the mining of rules varieties of algorithms are used such as Apriori algorithm and Tree based algorithm. Some algorithm is wonder performance but generates redundant association rule and also(More)
Mobile Ad hoc Networks’ (MANETs) properties present major vulnerabilities in security. Wireless ad hoc technology is demanding and continually growing. Its dynamics and flexibility allow the network to be easily set up without the requirement of a predetermined infrastructure. The advancement of the technology itself draws attentions from intruders as well(More)
Wireless Ad hoc Networks: is an interconnection of nodes which are mobile, have wireless links with temporary connections and without any centralized control. All this properties makes the network dynamic in nature. To communicate with each other over distance, nodes either can transmit directly or through intermediate nodes, which can relay the data to the(More)
The touchy evolution and well-known approachability of free underwritten media gratified on the internet have led to surge of research activity in hypermedia as well as web image search. Organizations that rub on text search procedure for amalgamation search have flourished limited accomplishment as they completely disregard visual content as a ranking(More)
Vehicular ad hoc networks (VANETs) are relegated as an application of mobile ad-hoc network (MANET) which encourages vehicles on road to impart for driving wellbeing. VANETs have been developed to turn the consideration of specialists in the area of wireless and mobile communication. VANETs endures security dangers as different systems, it is unmanageable(More)