References
[2]. Balvir, S. U., Raghuwanshi, M. M., & Borkar, P. S. (2024). Node2Vec and machine learning: A powerful duo for link prediction in social network. Journal of Electrical Systems, 20(2s), 639-649.
[5]. Choudhary, R. K. (2015). Implementation of efficient search by integrating proximity ranking & instant fuzzy. International Journal of Advances in Computer Science and Cloud Computing (IJACSCC), 3(1), 25-35.
[6].
Choudhary, R. K., Borate, P., Jaiswal, P., Gupta, S., & Mandaogade, V. (2024c). Literature survey on revolutionizing fake currency detection: CNN-Based approach for Indian rupee notes. Journal of Image Processing and Intelligent Remote Sensing, 4(5), 15–24.
[7]. Choudhary, R. K., Botre, M., Narwre, M. H., Adase, M.
A., Jichkar, M. A., Patekar, M. N., & Pradhan, M. J. (2023). Transforming domestic helper recruitment and management with deep learning: A web application. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 9 (6), 333-343.
[8]. Choudhary, R. K., Dubey, S. P., & Warbhe, A. (2015a). Efficient search engine using proximity ranking & instant fuzzy logic. International Journal, 5(7).
[9]. Choudhary, R. K., Muley, S., Chopade, S., Pokale, S., Thakur, R., & Dhakate, G. (2024b). Enhancing cybersecurity in IoT networks: Effective detection of cyber attacks. International Research Journal of Engineering and Technology (IRJET), 11(04), 1364-1375.
[10]. Choudhary, R. K., Warbhe, A., & Dubey, S. P. (2015b). Instant fuzzy-based efficient search engine using proximity ranking. International Journal of Advance Computational Engineering and Networking (IJACEN), 3(8), 59-65.
[11].
Choudhary, R. K., Zunke, S., Sengupta, A., Raut, N., Shahare, O., Ghagare, U., & Bali, I. (2024a). Value chain optimization in dairy product management: Insights and perspectives. International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 10 (1), 01-14.
[13].
Devi, E. R., Shanthakumari, R., Harini, T., Lokesh, K., & Anusuyaa, V. S. (2024, May). Detection of position falsification attacks in VANETs using ensemble learning. In 2024 3rd International Conference on Artificial Intelligence for Internet of Things (AIIoT) (pp. 1-6). IEEE.
[15].
Dineshkumar, R., Siddhanti, P., Kodati, S., Shnain, A. H., & Malathy, V. (2024, May). Misbehavior detection for position falsification attacks in vanets using ensemble machine learning. In 2024 Second International Conference on Data Science and Information System (ICDSIS) (pp. 1-5). IEEE.
[17]. Gaidhane, R., Vaidya, C., & Raghuwanshi, M. (2014a). Survey: Learning techniques for intrusion detection system (ids). International Journal of Advance Foundation and Research in Computer (IJAFRC), 1(2), 21-28.
[18]. Gaidhane, R., Vaidya, C., & Raghuwanshi, M. (2014b). Intrusion detection and attack classification using back-propagation neural network. International Journal of Engineering Research & Technology (IJERT), 3(4), 1112-1115.
[19].
Jyothsna, V., Swetha, S. N., Kumar, P. L., Kumar, V. U., Kalyan, P., & Srilakshmi, K. (2024, May). A novel machine learning approach to detect application layer ddos attacks. In 2024 5th International Conference for Emerging Technology (INCET) (pp. 1-10). IEEE.
[20].
Kaddour, H., Das, S., Bajgai, R., Sanchez, A.,
Sanchez, J., Chiu, S. C., & Fouda, M. M. (2024, April). Evaluating the performance of machine learning-based classification models for IoT intrusion detection. In 2024 IEEE Opportunity Research Scholars Symposium (ORSS) (pp. 84-87). IEEE.
[24].
Kumar, P. R., Meenakshi, S., Shalini, S., Devi, S. R., & Boopathi, S. (2023). Soil quality prediction in context learning approaches using deep learning and blockchain for smart agriculture. In Effective AI, Blockchain, and E-Governance Applications for Knowledge Discovery and Management (pp. 1-26). IGI Global.
[28]. Rohankar, J. S., & Balvir, S. U. (2011). A Study of Content Based Image Retrieval (CBIR) system based on correlation, median filtering and edge extraction. International Journal of Electronics Communication and Engineering, 4(1), 251-256.
[30]. Tembhurney, S., & Arjariya, T. (2023). An efficient and secure decentralized electronic voting platform using ethereum blockchain technology. International Journal for Scientific Research & Development, 11 (3), 67-69.
[32]. Vaidya, C., Nampalliwar, A., Nampalliwar, K., Thakkar, R., & Bhagat, S. (2018). Statistical approach for load distribution in decentralized cloud computing. Helix, 8(5), 3884-3887.
[33].
Vaidya, C., Shelar, P., Ukey, J., Kawale, T., Bawankar, C., Diwate, M., & Bhure, K. (2023, April). Flood prediction using machine learning. In AIP Conference Proceedings, 2753 (1). AIP Publishing.