default search action
Shilpa Chaudhari
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Sahana P. Shankar, Shilpa Shashikant Chaudhari:
Analysis of Bio Inspired Based Hybrid Learning Model for Software Defect Prediction. SN Comput. Sci. 5(7): 825 (2024) - [j14]Vijayalaxmi R. Patil, Anita Kanavalli, Shilpa Chaudhari, K. S. Aisiri:
Bio-Inspired Based Optimization of Machine Learning Techniques for Energy Efficient Routing for UWSN. SN Comput. Sci. 5(8): 983 (2024) - 2022
- [j13]Chetana Belavadi, Vandana Sudhakar Sardar, Shilpa Shashikant Chaudhari:
Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining. Int. J. Comput. 21(3): 333-341 (2022) - [j12]G. Kalyani, Shilpa Chaudhari:
Data privacy preservation in MAC aware Internet of things with optimized key generation. J. King Saud Univ. Comput. Inf. Sci. 34(5): 2062-2071 (2022) - [j11]K. Krishna Jyothi, Shilpa Chaudhari:
A novel block chain based cluster head authentication protocol for machine-type communication in LTE network: Statistical analysis on attack detection. J. King Saud Univ. Comput. Inf. Sci. 34(6 Part B): 3713-3721 (2022) - [j10]G. Kalyani, Shilpa Chaudhari:
Cross Layer Security MAC Aware Routing Protocol for IoT Networks. Wirel. Pers. Commun. 123(1): 935-957 (2022) - 2021
- [j9]G. Kalyani, Shilpa Chaudhari:
Security Aware Routing: Rule Based Attack Detection on Optimal Shortest Route Selection. Ad Hoc Sens. Wirel. Networks 49(3-4): 223-245 (2021) - [j8]Shilpa Chaudhari:
A survey on multipath routing techniques in wireless sensor networks. Int. J. Netw. Virtual Organisations 24(3): 267-328 (2021) - 2020
- [j7]K. Krishna Jyothi, Shilpa Chaudhari:
Optimized neural network model for attack detection in LTE network. Comput. Electr. Eng. 88: 106879 (2020) - [j6]K. Krishna Jyothi, Shilpa Chaudhari:
Cluster-based authentication for machine type communication in LTE network using elliptic curve cryptography. Int. J. Cloud Comput. 9(2/3): 258-284 (2020) - [c3]Yindumathi K. M, Shilpa Shashikant Chaudhari, Aparna R:
Analysis of Image Classification for Text Extraction from Bills and Invoices. ICCCNT 2020: 1-6 - [c2]Suchetha R. Pujar, Shilpa Shashikant Chaudhari, Aparna R:
Survey on Data Integrity and Verification for Cloud Storage. ICCCNT 2020: 1-7
2010 – 2019
- 2018
- [j5]Shilpa Shashikant Chaudhari, Rajashekhar C. Biradar:
Resource prediction-based routing using agents in mobile ad hoc networks. Int. J. Commun. Networks Distributed Syst. 20(4): 413-445 (2018) - 2016
- [j4]Roshan Zameer Ahmed, Rajashekhar C. Biradar, Shilpa Shashikant Chaudhari:
Cluster-based data aggregation for pest identification in coffee plantations using wireless sensor networks. Comput. Electr. Eng. 56: 591-607 (2016) - [j3]Shilpa Shashikant Chaudhari, Rajashekhar C. Biradar:
Traffic and mobility aware resource prediction using cognitive agent in mobile ad hoc networks. J. Netw. Comput. Appl. 72: 87-103 (2016) - 2015
- [j2]Shilpa Shashikant Chaudhari, Rajashekhar C. Biradar:
Survey of Bandwidth Estimation Techniques in Communication Networks. Wirel. Pers. Commun. 83(2): 1425-1476 (2015) - [j1]Shilpa Shashikant Chaudhari, Rajashekhar C. Biradar:
Available Bandwidth Estimation Using Collision Probability, Idle Period Synchronization and Random Waiting Time in MANETs: Cognitive Agent Based Approach. Wirel. Pers. Commun. 85(3): 597-621 (2015) - 2014
- [c1]Shilpa Shashikant Chaudhari, Rajashekhar C. Biradar:
Collision probability based Available Bandwidth estimation in Mobile Ad Hoc Networks. ICADIWT 2014: 244-249
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint