1 | Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methods | COMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024. | | Vol. 21, Number 06, pp. 1–15 | | | 2024 | https://zenodo.org/records/11466500 | International | | | | | | 0 |
2 | Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methods | COMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024. | | Vol. 21, Number 06, pp. 1–15 | | | 2024 | https://zenodo.org/records/11466500 | International | | | | | | 0 |
3 | Predicting Election Results with social media sentiment analysis: Employing advanced machine learning methods | COMMUNITY PRACTITIONER, 21(06), 1-15, ISSN: 1462 2815, 2024. | | Vol. 21, Number 06, pp. 1–15 | | | 2024 | https://zenodo.org/records/11466500 | International | | | | | | 0 |
4 | Secure Cloud Deduplication on Hybrid Cloud Storage Architecture | Secure Cloud Deduplication on Hybrid Cloud Storage Architecture | Miss Aparna Ajit Patil, Dhanashree Kulkarni | 110 | 0975-8887 | 29-32 | 2015 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | 5 | 0 |
5 | Brief Survey on Opinion Mining Techniques | Brief Survey on Opinion Mining Techniques | Swapnil B Mulay, Dhanashree Kulkarni | 975 | | 8887 | 0 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | National | | | | | 5 | 0 |
6 | Tiling based Compression for Reducing Memory Occupancy of Embedded Applications | Tiling based Compression for Reducing Memory Occupancy of Embedded Applications | Dhanashree Kulkarni | 17 | 2231-5381 | 152-155 | 2014 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | 5 | 0 |
7 | Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping Attack | Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping Attack | Rajani Patil, Dhanashree Kulkarni | 2 | 2349-6967 | 216-222 | 2015 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | 5 | 0 |
8 | Secure Cloud Deduplication on Hybrid Cloud Storage Architecture | Secure Cloud Deduplication on Hybrid Cloud Storage Architecture | International Journal of Computer Applications | 110 | 0975-8887 | 29-32 | 2015 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | | 0 |
9 | Brief Survey on Opinion Mining Techniques | Brief Survey on Opinion Mining Techniques | | 975 | | 8887 | 0 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | National | | | | | | 0 |
10 | Tiling based Compression for Reducing Memory Occupancy of Embedded Applications | Tiling based Compression for Reducing Memory Occupancy of Embedded Applications | International Journal of Computer Trends and Technology (IJCTT) | 17/3 | 2231-5381 | 152-155 | 2014 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | | 0 |
11 | Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping Attack | Unobservable Secure on Demand Routing Protocol (USOR) to Avoid Eavesdropping Attack | International Journal of Emerging Trend in Engineering and Basic Sciences (IJEEBS) | 2/1 | 2349-6967 | 216-222 | 2015 | https://scholar.google.com/citations?user=1wKSg5IAAAAJ&hl=en&oi=ao | International | | | | | | 0 |
12 |
IMPLEMENTATION OF SARCASM DETECTION ON TWITTER DATA |
IMPLEMENTATION OF SARCASM DETECTION ON TWITTER DATA | | | | | 0 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
13 | INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT | INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT | INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT | | 2349-5197 | 9-11 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | 2.138 | | | | 0 |
14 | A Protective Mechanism to Avoid Eavesdropping Attack in MANET | A Protective Mechanism to Avoid Eavesdropping Attack in MANET | International Journal on Recent and Innovation Trends in Computing and Communication | 3/4 | 2321-8169,2356 – 2361 | 2356-2361 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
15 | Secure Data Deduplication on Hybrid Cloud Storage Architecture | Secure Data Deduplication on Hybrid Cloud Storage Architecture | International Journal on Recent and Innovation Trends in Computing and Communication | 3/5 | 2321-8169,2906-2909 | 2906-2909 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
16 | A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey | A Protective Mechanism to Avoid Warm Hole and Sink-Hole Attack in Wireless Ad hoc Network: Survey | Foundation of Computer Science | 107/20 | 0975 – 8887 | 31-33 | 2014 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
17 | K-Most Demanding Products Discovery with Maximum Expected Customers | K-Most Demanding Products Discovery with
Maximum Expected Customers | Foundation of Computer Science | 124/15 | 0975 – 8887 | 13-16 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
18 | An Unobservable On-demand Routing Protocol with Trust Management Mechanism | An Unobservable On-demand Routing Protocol with Trust Management Mechanism | Foundation of Computer Science | 122/14 | 0975 – 8887 | 6-13 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
19 | TRACKING MOVING TARGET LOCATION OF MOBILE SENSOR NAVIGATION USING ANT COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORK | TRACKING MOVING TARGET LOCATION OF MOBILE SENSOR NAVIGATION USING ANT
COLONY OPTIMIZATION IN WIRELESS SENSOR NETWORK | INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT | 2/11 | 2349- 5197 | 9-11 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | 2.138 | | | | 0 |
20 | Brief Survey on Opinion Mining Techniques | Brief Survey on Opinion Mining Techniques | | | | | 2016 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
21 | Disease detection for multilabel big dataset using MLAM, Naive Bayes, Adaboost classification | Disease detection for multilabel big dataset using MLAM, Naive Bayes, Adaboost classification | International Research Journal of Engineering and Technology | 4/12 | 2395-0056, 2395-0072 | 1766-1771 | 2017 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
22 | Product Review Using Naive Bayes | Product Review Using Naive Bayes | | 6/6 | | | 2018 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
23 | Privacy, Confidentiality And Authorization Preserving Rfid System For Toll Application | Privacy, Confidentiality And Authorization Preserving Rfid System For Toll Application | | 13/3 | | 1258-1265 | 2020 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
24 |
PREDICTING ELECTION RESULTS WITH SOCIAL MEDIA SENTIMENT ANALYSIS: EMPLOYING ADVANCED MACHINE LEARNING METHODS |
PREDICTING ELECTION RESULTS WITH SOCIAL MEDIA SENTIMENT ANALYSIS: EMPLOYING ADVANCED MACHINE LEARNING METHODS | | 21/6 | 1462 2815 | | 2024 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
25 |
Cyber Threat Detection and Mitigation Using Artificial Intelligence–A Cyber‐physical Perspective |
Cyber Threat Detection and Mitigation Using Artificial Intelligence–A Cyber‐physical Perspective | John Wiley & Sons, Inc.
| | | 107-133 | 2024 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 0 |
26 | Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms | Intrusion Detection in Dynamic Distributed Network Using PSO and SVM Machine Learning Algorithms | International Journal of Science and Research(IJSR) | 5/2 | 2319-7064 | 1612-1617 | 2016 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | 6.14 | 5.611 | | | | 1 |
27 | Word Sense Disambiguation for Lexicon-based Sentiment Analysis in Hindi | Word Sense Disambiguation for Lexicon-based Sentiment Analysis in Hindi | Webology | 19/1 | 1735-188X | 592-600 | 2022 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | National | | | | | | 1 |
28 | A Greedy Algorithm Approach for Mobile Social Network | A Greedy Algorithm Approach for Mobile Social Network | Foundation of Computer Science | 111/16 | 0975 – 8887 | 1-3 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 2 |
29 | Review on urea prediction system using fuzzy logic | Review on urea prediction system using fuzzy logic | | 3 | | | 2017 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 2 |
30 | Specifying context free grammar for Marathi sentences | Specifying context free grammar for Marathi sentences | International Journal of Computer Applications | 99/14 | 0975 – 8887 | 38-41 | 2014 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | National | | | | | | 4 |
31 | Influence maximization on mobile social network using location based community greedy algorithm | Influence maximization on mobile social network using location based community greedy algorithm | Foundation of Computer Science | 122/19 | 0975 – 8887 | 28-31 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 4 |
32 | Towards enhancement of the lexicon approach for Hindi sentiment analysis | Towards enhancement of the lexicon approach for Hindi sentiment analysis | Springer Singapore | 2 | | 445-451 | 2022 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 5 |
33 | A survey on: secure data deduplication on hybrid cloud storage architecture | A survey on: secure data deduplication on hybrid cloud storage architecture | International Journal of Computer Applications | 110/3 | 0975 – 8887 | 29-32 | 2015 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 6 |
34 | Extensive study of text based methods for opinion mining | Extensive study of text based methods for opinion mining | IEEE | | | 523-527 | 2018 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 8 |
35 | Sentiment analysis in Hindi—A survey on the state-of-the-art techniques | Sentiment analysis in Hindi—A survey on the state-of-the-art techniques | ACM | 21/1 | | 1-46 | 2021 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 24 |
36 | Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) | Enhancing Security in Cloud Computing Using Artificial Intelligence (AI) | John Wiley & Sons, Inc. | | | 179-220 | 2024 | https://scholar.google.com/citations?view_op=list_works&hl=en&hl=en&user=1wKSg5IAAAAJ&pagesize=80 | International | | | | | | 24 |