Search Results - "Zunke, Sonali"

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Enhanced route optimization technique and design of threshold-T for malicious node detection in ad hoc networks by Sonekar, Shrikant V., Pal, Madhuri, Tote, Milind, Sawwashere, Supriya, Zunke, Sonali

    “…MANET has attracted popularity due to the tremendous use of internet and its allied resources, the ease of deployment and features of MANET keeps it ahead in…”
    Get full text
    Journal Article
  2. 2

    Research Paper Summarization using Extractive summarizer by Zunke, Sonali, Shrivastava, Alka, Sakhare, Komal, Bhatkar, Ajay, Prajapati, Atul, Sheikh, Mahawish, Yedke, Mansi

    “…The rapid growth of scientific literature in various domains has made it increasingly challenging for researchers to stay updated with the latest developments…”
    Get full text
    Conference Proceeding
  3. 3

    Computation Termination and Malicious Node Detection using Finite State Machine in Mobile Adhoc Networks by Sonekar, Shrikant V., Pal, Madhuri, Tote, Milind, Sawwashere, Supriya, Zunke, Sonali

    “…The wireless technology has knocked the door of tremendous usage and popularity in the last few years along with a high growth rate for new applications in the…”
    Get full text
    Conference Proceeding
  4. 4

    Women's Safety System by Voice Recognition by Mishra, Vinay, Shivankar, Nilesh, Gadpayle, Sanam, Shinde, Sandip, Khan, Mohd.Amaan, Zunke, Sonali

    “…In today's world Victimization sensible phones having multiplied chop-chop and thence sensible phone may be used expeditiously for private security. A bunch of…”
    Get full text
    Conference Proceeding