default search action
Search dblp for Publications
export results for "Uttam D. Kolekar"
@article{DBLP:journals/cee/MohiteKMBSJ24, author = {Shailaja Sanjay Mohite and Uttam D. Kolekar and Juber Shaphi Mulla and Santoshi Bhakte and Priya Shinde and Patil Jaydip}, title = {Interference management and power scheduling in femtocell networks with the optimized power scheduling BiLSTM}, journal = {Comput. Electr. Eng.}, volume = {119}, pages = {109487}, year = {2024}, url = {https://doi.org/10.1016/j.compeleceng.2024.109487}, doi = {10.1016/J.COMPELECENG.2024.109487}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cee/MohiteKMBSJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/WaghmodeK23, author = {Uttam Waghmode and Uttam D. Kolekar}, title = {Firefly-Aquila optimized Deep {Q} network for handoff management in context aware video streaming-based heterogeneous wireless networks}, journal = {Web Intell.}, volume = {21}, number = {4}, pages = {363--384}, year = {2023}, url = {https://doi.org/10.3233/WEB-220090}, doi = {10.3233/WEB-220090}, timestamp = {Wed, 15 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/WaghmodeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/AmbekarK22, author = {Rahul K. Ambekar and Uttam D. Kolekar}, title = {{T-TOHIP:} Trust-based topology-hiding multipath routing in mobile ad hoc network}, journal = {Evol. Intell.}, volume = {15}, number = {2}, pages = {1067--1081}, year = {2022}, url = {https://doi.org/10.1007/s12065-019-00280-z}, doi = {10.1007/S12065-019-00280-Z}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/AmbekarK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/JadhavK22, author = {Vaishali Satish Jadhav and Uttam D. Kolekar}, title = {Fuzzy-based decisive approach for call admission control in the {LTE} networks}, journal = {Evol. Intell.}, volume = {15}, number = {2}, pages = {1007--1024}, year = {2022}, url = {https://doi.org/10.1007/s12065-019-00270-1}, doi = {10.1007/S12065-019-00270-1}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/JadhavK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/evi/NanivadekarK22, author = {Sameer Suresh Nanivadekar and Uttam D. Kolekar}, title = {A hybrid optimization model for resource allocation in OFDM-based cognitive radio system}, journal = {Evol. Intell.}, volume = {15}, number = {2}, pages = {825--836}, year = {2022}, url = {https://doi.org/10.1007/s12065-018-0173-1}, doi = {10.1007/S12065-018-0173-1}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/evi/NanivadekarK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/SapkaleK21, author = {Pallavi V. Sapkale and Uttam D. Kolekar}, title = {Modified Na{\"{\i}}ve Bayes Classifier for Mode Switching and Mobility Management Using Cellular Networks}, journal = {Wirel. Pers. Commun.}, volume = {116}, number = {3}, pages = {2345--2366}, year = {2021}, url = {https://doi.org/10.1007/s11277-020-07794-1}, doi = {10.1007/S11277-020-07794-1}, timestamp = {Fri, 05 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/wpc/SapkaleK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/MukhedkarK20, author = {Moresh Madhukar Mukhedkar and Uttam D. Kolekar}, title = {{E-TDGO:} An encrypted trust-based dolphin glowworm optimization for secure routing in mobile ad hoc network}, journal = {Int. J. Commun. Syst.}, volume = {33}, number = {7}, year = {2020}, url = {https://doi.org/10.1002/dac.4252}, doi = {10.1002/DAC.4252}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/MukhedkarK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/MukhedkarK19, author = {Moresh Madhukar Mukhedkar and Uttam D. Kolekar}, title = {Trust-Based Secure Routing in Mobile Ad Hoc Network Using Hybrid Optimization Algorithm}, journal = {Comput. J.}, volume = {62}, number = {10}, pages = {1528--1545}, year = {2019}, url = {https://doi.org/10.1093/comjnl/bxz061}, doi = {10.1093/COMJNL/BXZ061}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/MukhedkarK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sivp/RajankarKT19, author = {Omprakash S. Rajankar and Uttam D. Kolekar and Sanjay N. Talbar}, title = {Heuristics approach to speeding up saliency detection}, journal = {Signal Image Video Process.}, volume = {13}, number = {3}, pages = {465--473}, year = {2019}, url = {https://doi.org/10.1007/s11760-018-1371-0}, doi = {10.1007/S11760-018-1371-0}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sivp/RajankarKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jois/AmbekarK18, author = {Rahul K. Ambekar and Uttam D. Kolekar}, title = {{FL-TOHIP} (Fractional Lion Algorithm to Topology-Hiding Multipath Routing Protocol) in Mobile ad hoc Network}, journal = {J. Intell. Syst.}, volume = {27}, number = {4}, pages = {523--536}, year = {2018}, url = {https://doi.org/10.1515/jisys-2016-0178}, doi = {10.1515/JISYS-2016-0178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jois/AmbekarK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mags/DeotaleKK18, author = {Nitin Deotale and Uttam D. Kolekar and Anuradha Kondelwar}, title = {Optimal transmit antenna selection for {LTE} system using self-adaptive grey wolf optimization}, journal = {Multiagent Grid Syst.}, volume = {14}, number = {1}, pages = {67--82}, year = {2018}, url = {https://doi.org/10.3233/MGS-180281}, doi = {10.3233/MGS-180281}, timestamp = {Thu, 04 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mags/DeotaleKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ems/KariaK08, author = {Deepak Chatrabhuj Karia and Uttam D. Kolekar}, editor = {David Al{-}Dabass and Atulya Nagar and Hissam Tawfik and Ajith Abraham and Richard N. Zobel}, title = {Performance Analysis of Real and Non Real Time Traffic over {WLAN} Using Connection Admission Control Policy}, booktitle = {{EMS} 2008, Second {UKSIM} European Symposium on Computer Modeling and Simulation, Liverpool, England, UK, 8-10 September 2008}, pages = {548--554}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EMS.2008.25}, doi = {10.1109/EMS.2008.25}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ems/KariaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.