A Review Of Semantic Abstraction Techniques Are Used To Collect, Analyze, And Interpret Enormous Amounts Of Raw Data Dr.Satish Kumar, Associate Professor, Department of Computer Science, Government College Narnaul, Distt. Mohindergarh, Haryana, India Page No.: 38-42 ![]() ![]() ![]()
For some applications, precision is crucial, yet for others, neither exact computation nor precise outcomes are necessary. For instance, a photo taken with an Visually, an 8 MP camera and a 10 MP camera are comparable. In fields like computer science speech recognition, graphics, searching, machine learning, and physical simulation, Perfect solutions may not be possible. The Approximate Computing (AxC) paradigm is gaining traction as a novel architecture for delivering better energy efficiency a
|
Study On Systematic Literature Review Related to Software Process Simulation Modeling Basavaraj U, Assistant Professor, Department of Computer Science, Government First Grade College and PG Centre Thenkinidiyur Udupi, Karnataka India Page No.: 1-6 ![]() ![]() ![]()
Changes and continuous progress in logistics and productive systems make the realization of improvements in decision making necessary. Simulation is a good support tool for this type of decisions because it allows reproducing processes virtually to study their behavior, to analyze the impact of possible changes or to compare different design alternatives without the high cost of scale experiments. Although process simulation is usually focused on industrial processes, over the last two decades,
|
Native Mobile Application Development Amit Singla, Head, Deptt. Of Computer Science,Seth G.L.Bihani S.D.PG.College,Sri Ganganagar (Raj.) Page No.: 1-5 ![]() ![]() ![]()
The notoriety of versatile applications has soar over the most recent couple of many years. Cell phone reception is currently dominating that of workstations and PCs. This is on the grounds that cell phones have a wide assortment of utilizations that permit the client to get done with jobs from any area utilizing a little, versatile gadget. There are a few disadvantages to this, like the requirement for cross-stage application similarity. The present engineers are basically worried about making
|
Review of Literature on Study on The Hybrid Approaches Contribution as An Efficient Solution for Task Scheduling and Load Balancing in The Cloud Rajinder Kumar, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar, Associate Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 6-11 ![]() ![]() ![]()
Recommender systems represent a high economic, social, and technological impact at international level due to the most relevant technological companies have been used them as their main services considering that user experience and companies sales have been improved. For this reason, these systems are a principal research area, and the companies optimize their algorithms with hybrid approaches that combine two or more recommendation strategies. A systematic literature review on the hybrid approa
|
Applications Of the EEG-Based Machine Learning Gururaj J.P., Assistant Professor, Department of Computer Science, Government First Grade College, Harihar-577601, Karnataka (India) Page No.: 7-9 ![]() ![]() ![]()
Machine learning has two phases: training and testing. In the training phase, a set of examples (i.e., data with their corresponding labels) are available. With a given machine learning algorithm, the example data are used to train a model (i.e., tune its parameters) so that it can identify the relationship between input data and the labels. In the testing phase, input data without labels go through the same methodology as the training phase for preprocessing, feature extraction, and feature red
|
An Analysis on Information Warfare Space on a Regular Collusive Nature of Transborder Proxy War and Hybrid Warfare Dr. Rajesh Kumar, Associate Professor, Department of Defence Study, Govt. College Ateli (Mahendergarh) , Haryana, India Page No.: 12-18 ![]() ![]() ![]()
In the modern era of hybrid warfare, governments have switched to the unorthodox use of information warfare to impose their national will on an adversary with apparent anonymity and without breaking international laws on other nations' sovereignty.To wage the fight in infospace, the Fifth Dimension of Warfare, information security must be a crucial component of national security.Electronic warfare, psychological operations, cyberwarfare, military deception, and operational security are all possi
|
Color Image Segmentation Using Machine Learning Techniques Raghu Kumar, Research Scholar, Deptt. Computer Science, OPJS University, Churu | Dr. Prerna Nagpal, Research Supervisor, Deptt. Computer Science, OPJS University, Churu Page No.: 6-12 ![]() ![]() ![]()
From the internet, news stories, schematics in papers, and advertisements, we are exposed to a substantial amount of pictures every day. Visitors are tasked with deciphering the meaning of these sights. Despite the fact that most images are devoid of text descriptions, people can nonetheless make meaning of them. It is necessary that the system be able to interpret some form of image caption if automated captions are required by the public. There are several reasons why image captioning is essen
|
Application Performance Management: State of the Art and Challenges for The Future Sri Sharanabasappa Raikoti, Assistant Professor, Department of Computer Science, Government Degree College Yadgir, Karnataka (India) Page No.: 12-16 ![]() ![]() ![]()
In the last decade, several research efforts have been directed to integrating performance analysis in the software development process. Traditional software development methods focus on software correctness, introducing performance issues later in the development process. This approach is not adequate since performance problems may be so severe that they may require considerable changes in the design, for example at the software architecture level, or even worse in the requirements analysis. Several approaches have been proposed to address early software performance analysis. Although some of them have been successfully applied, there is still a gap to be filled in order to see performance analysis integrated in ordinary software development. We present a comprehensive review of the recent developments of software performance research and point out the most promising research directions in the field.
|
Review of Literature on Optimization of Load Balancing and Task Scheduling in Cloud Computing Environments Using Artificial Neural Networks Tija P Thomas, Assistant Professor Department of computer science, Dr.G Shankar Govt Womens First Grade College and P G Study Centre, Ajjarakad Udupi, Karnataka (India) Page No.: 10-16 ![]() ![]() ![]()
Thousands use websites at some point of time for other. Cloud has limitation in maintaining load obtained from all demands at time any point of time. It results in destroy of the entire network. It is the process in which computing resources and workloads are distributed to more than one server. Workload is divided between two or more servers, hard drives, system interface and other computing resources resulting in good use and system response time. A huge traffic web site requires a high powerf
|
Exploring the State of Indian Politics during Partition Vikas Caudhary, Department of computer science, R D engineering College, Ghaziabad Page No.: 14-19 ![]() ![]() ![]()
The study investigates the state of Indian politics during the partition, with a focus on the role of key political figures, the impact of political parties, and the communal violence that ensued. The methodology involves a systematic review approach as well as first-hand accounts. The study sheds light on the complex interplay of political forces and communal tensions during this tumultuous period. The key conclusion drawn from this study is that the actions of political leaders and parties hea
|
Unveiling the Language of Expression: Decoding Verbal and Non-verbal Cues in English Literature Mehak sharma, Department of computer science, R D engineering College, Ghaziabad Page No.: 20-23 ![]() ![]() ![]()
This qualitative content analysis decodes the complex interplay of verbal and non-verbal cues in Mohsin Hamid's Exit West. Focused on characters Saeed and Nadia, the study reveals nuanced power dynamics and challenges to traditional gendered communication norms. Examining instances of conformity and resistance to gendered communication ideals, the analysis sheds light on emotional intelligence and societal negotiation. The study not only enhances understanding of character dynamics but contribut
|
Review of Literature on Principle and Methods of Data Cleaning for Removing Erroneous Data from Database Sri Sharanabasappa Raikoti, Assistant Professor, Department of Computer Science, Government Degree College Yadgir, Karnataka, India Page No.: 17-19 ![]() ![]() ![]()
This paper includes the detail study of many techniques that have been found useful and important during the time of data cleaning process as well as consolidating the data quality in databases. For Instance, existing classification of dirty data types from the literature will be reviewed to present the multiple dirty data types observed in different data sources. Data cleaning methods, Data quality, data quality dimensions are reviewed in this chapter. They provide the foundation of development of the proposed data cleaning framework.
|
A Study on Exclusive Brand"s Marketing Optimization Jitendra Mishra, Department of computer science, R D engineering College, Ghaziabad Page No.: 20-25 ![]() ![]() ![]()
This research walk-through the various methods used by exclusive and upscaled organizations that minimized its marketing Champaign and budgeting. Generally, posh products and service are not marketed through Integrated channels that are commonly available. As these companies differentiate themselves through unique innovative features they opt for specific single streamed path for marketing that directly reach-out its targeted customer group than spending on popularity promotions. Posh and exclus
|
Effect of Life Skills Training on Emotional Intelligence among Nursing Officers at selected Tertiary Care Hospital Amit Maurya, Department of computer science, R D engineering College, Ghaziabad Page No.: 26-30 ![]() ![]() ![]()
Nurses are on the frontline of patient interaction in any clinic or hospital. Being emotionally intelligent means understanding ourselves, handling our emotions in a mature way, understanding others and helping them to handle their emotions. Life skills training helps to build confidence in communication, cooperative and collaborative skills, problem solving, socializing and recognize the impact of their actions. Methods: One Group Pre-test Post-test Research design was adopted in this study. Th
|
An Analysis of Cyber Crime Data Jyoti Singh, Department of Computer Science & Engineering, RDEC, Ghaziabad Page No.: 24-27 ![]() ![]() ![]()
Cyber Crime is technology based crime committed by technocrats. This paper deals with Variants of cyber crime held in Chhattisgarh between 2005to 2019. Under this, the Age wise Clustering of arrested people has been displayed on basis of cybercrime in Chhattisgarh .data mining DBSCAN and Hierarchical algorithm is used for clustering. A DBSCAN algorithm is based on this intuitive notion of “clusters”. The key idea is that for each point of a cluster, the neighborhood of a given radius has to
|
Theoretical Aspects of Machine Learning (Ml) Based Image Processing Raghu Kumar, Research Scholar, Deptt. Computer Science, OPJS University, Churu | Dr. Prerna Nagpal, Research Supervisor, Deptt. Computer Science, OPJS University, Churu Page No.: 16-21 ![]() ![]() ![]()
The growing need for image annotation research stems from the growing necessity to manage large collections of images. An effective annotation and retrieval system is urgently needed because of the enormous volume of picture data available on the internet and the affordability of inexpensive digital cameras. Image annotation and retrieval systems have traditionally depended on keyword annotations. These approaches begin with photos that have been manually tagged with textual tags. The semantics
|
INTERACTIVE INTENT ESTIMATION MODEL Rajkumar Basappa, Assistant Professor, Department of Computer Science, SRSMN Government First Grade College, Barkur Udupi, Karnataka India Page No.: 23-27 ![]() ![]() ![]()
With the rise of collaborative robots, the need for safe, reliable, and efficient physical human–robot interaction (pHRI) has grown. High-performance pHRI requires robust and stable controllers suitable for multiple degrees of freedom (DoF) and highly nonlinear robots. In this article, we describe a cascade-loop pHRI controller, which relies on human force and pose measurements and can adapt to varying robot dynamics online. It can also adapt to different users and simplifies the interaction by
|
Increasing Growth of Internet in India and Its Significance Dr. Kalpana Midha, Assistant Professor, Deptt. of Computer Science and Engineering, Sri Gurunanak Girls PG College, Sri Ganganagar (Rajasthan) Page No.: 20-23 ![]() ![]() ![]()
India has one of the greatest and speediest creating masses of Internet users in the world, which is evaluated to be around 190 million as of June 2014 and growing rapidly. India at this point has the third greatest Internet people on earth today, after China with 620 million and the US with 275 million. The advancement in the Internet base in India is at present surprising. It required quite a while from the associate of the Internet with show up at 100 million users. The second 100 million wil
|
Inventory Management System With Respect To Paper Industry in India Nutan Sharma, Department of Management, RDEC,Ghaziabad Page No.: 26-28 ![]() ![]() ![]()
Inventory management is generally recognized to be of sufficient importance to warrant the appointment of a person to carry specific responsibility for it .The study investigated the relationship between company performance and inventory management. The researcher used inventory days as a dependent variable and gross profit and net profit as an independent variable. The inventory connotes the value of raw materials, consumables, spares, work –in– progress, finished goods and scrap in which a com
|
NPA of Indian Banking System and its Impact on Economy Subhas Verma, Department of Mangement, RDEC,Ghaziabad Page No.: 31-39 ![]() ![]() ![]()
Banks are playing a very important role in providing financial assistance for the various business sectors and agricultural sectors. But from the last few years banking institutions financial health is not in good condition. Major public banks are going through a liquidity crisis. The large volume of NPAs is negatively impacting the growth of the Indian economy. The 'District co-operative banks bad loan ratio hinting towards 12.6 per cent. The bad-debt ratio of commercial banks stood at 7.5 per
|
Study On the Clustering in Novel Techniques with Related to Its Classification Basavaraj U, Assistant Professor, Department of Computer Science, Government First Grade College and PG Centre Thenkinidiyur Udupi, Karnataka India Page No.: 28-33 ![]() ![]() ![]()
Feature extraction is essential in bioinformatics because it transforms genome sequences into the feature vectors required for data mining activities such as classification and clustering. The data mining activities enable us to classify or cluster the newly sequenced genome to the known families. Nowadays, a variety of feature extraction strategies are available for genome data. Nevertheless, several existing algorithms do not extract context-sensitive key properties, also some approaches extra
|
Strategies For The Prevention Of The Networking System From Hacking Dr. Kalpana Midha, Assistant Professor, Deptt. of Computer Science and Engineering, Sri Gurunanak Girls PG College, Sri Ganganagar (Rajasthan) Page No.: 26-30 ![]() ![]() ![]()
In the computing scene, cyber security is going through tremendous changes in technology and its operations of late, and data science is driving the change. Eliminating security occasion models or snippets of information from cyber security data and building seeing data-driven model, is the best way to deal with make a security system modernized and shrewd. To understand and investigate the real ponders with data, different canny philosophies, machine learning procedures, cycles and systems are
|
Role of DBMS In Supporting Data Science Workflows, Including Data Preprocessing Pawan Kumar Pandey,Assistant Professor, Department of Computer Science, Digvijay Nath P.G College Gorakhpur, U.P Page No.: 23-27 ![]() ![]() ![]()
The Increasing Volume, Variety, And Velocity of Data Generated in Today”s Digital Age Pose Significant Challenges for Data Scientists in Extracting Valuable Insights. Data Preprocessing, A Crucial Step in The Data Science Workflow, Involves Cleaning, Transforming, And Integrating Raw Data to Improve Its Quality and Usability for Analysis. The Role of a Database Management System (DBMS) In Supporting Data Science Workflows, Particularly Data Preprocessing, Is the Focus of This Research Paper. Thi
|
Machine Learning for Smart Production Jyoti Mishra, Dept, of Computer Application, Manipal University, Jaipur (Raj.) | Dr.Shailendra Shukla,Professor, Department of Mathematics,Arya PG College, Jaipur, India Page No.: 43-52 ![]() ![]() ![]()
The industrial sector values innovations and adaptation greatly. This progress ought to result in the use of new technologies for sustainable manufacturing. Smart manufacturing calls for a global perspective on the technology being used to in order to be environmentally friendly. In this context, Thanks to the continuous research in the field of artificial intelligence, AI-based approaches, such as machine learning, are currently established in the industry to achieve sustainable production (AI)
|
Machine Translation and Assorted Aspects with Real Time Applications BILAL AHMED, Research Scholar, Department of Computer Science, Shri Jagdishprasad Jhabarmal Tibrewala University, Jhunjhunu (Rajasthan), | Dr Abdul Jabbar Khilji, Co Guide, Department of Computer Applications, Govt Engineering College, (Bikaner) | Dr. Prasadu Peddi, (Research Guide)Department of Computer Science and Engineering, Shri Jagdishprasad Jhabarmal Tibrewala University, Jhunjhunu (Rajasthan) Page No.: 46-49 ![]() ![]() ![]()
Machine translation refers to the sub-field of computational linguistics that investigates the use of software to translate text or speech from one language to another. On a basic level, MT performs mechanical substitution of words in one language for words in another, but that alone rarely produces a good translation because recognition of whole phrases and their closest counterparts in the target language is needed. Not all words in one language have equivalent words in another language, and m
|
Characteristics of Cloud Computing Tija P Thomas, Assistant Professor Department of computer science, Dr.G Shankar Govt Womens First Grade College and P G Study Centre, Ajjarakad Udupi, Karnataka (India) Page No.: 34-40 ![]() ![]() ![]()
Cloud computing is the upcoming environment in the use of computer technology. Numerous users are keen to put their information in cloud; since balancing load in cloud a risky. Load balancing resource allocation plays a vital role. This chapter deals with the research motivation, the objectives and the thesis organization.
|
Mammography: A Review and Experimental Results Shweta S. Marigoudar, Research Scholar (CSE), SunRise University, Alwar (Rajasthan) | Dr. Amit Singla, Assistant Professor, Dept. of CSE, SunRise University, Alwar (Rajasthan) Page No.: 32-39 ![]() ![]() ![]()
Mammography, which exposes patients to a low dose of radiation, is often regarded as the simplest way for identifying breast cancer in its initial stages. However, there are certain risks associated with the procedure. It helps radio-graphic breast cancer examination detect any growth or lump in the early stages, even before it becomes obvious to the doctor or the woman herself, and that these rays are not dangerous if used at yearly intervals, as recommended by the National Guidelines for early
|
Review of Literature Correlation Between Clustering and Classification of Novel Techniques in Computer Science M Ramakrishna, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Praveen Kumar. Associate Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 55-58 ![]() ![]() ![]()
By clustering the data, people can obtain the data distribution, observe the character of each cluster, and make further study on particular clusters. In addition, cluster analysis usually acts as the preprocessing of other data mining operations. Therefore, cluster analysis has become a very active research topic in data mining. Data mining is a new technology, developing with database and artificial intelligence. It is a processing procedure of extracting credible, novel, effective and underst
|
Study on Website Performance Measurement Anju, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 38-41 ![]() ![]() ![]()
Websites are essentially client/server applications - with web servers and browser clients. Consideration should be given to the interactions between html pages, TCP/IP communications, internet connections, firewalls, applications that run in web pages (such as applets, JavaScript, plug-in applications) and applications that run on the server side (such as CGI scripts, database interfaces, logging applications, dynamic page generators, asp, etc.). Additionally, there are a wide variety of server
|
Study On the Transfer Learning in Aerial Scene Classification Sri Sharanabasappa Raikoti, Assistant Professor, Department of Computer Science, Government Degree College Yadgir, Karnataka Page No.: 41-44 ![]() ![]() ![]()
Efficiently executing image categorization with high spatial quality imagery from remote sensing can bring great benefits to scene classification. Effective feature representation is critical in the development of high-performance scene categorization techniques because sensor data processing is tough. Remote sensing as well as deep learning abilities have made it easier to extract spatiotemporal information for classification. Furthermore, other scientific disciplines, together with remote sensing, have made significant advances in image categorization by convolutional neural networks (CNNs), and transfer learning is being combined. Image categorization in this article was performed to enrich the accuracy of Scene classification using Transfer learning utilizing pre-trained Alex Net, and Visual Geometry Group (VGG) networks and compared with feature extraction methods. First, features were retrieved from the pre-trained network's second fully-connected layer and employed in SVM classification. Second, substituting the last layers of pre-trained networks with the notion of transfer learning was used to categorize new datasets. It is executed on the UCM Dataset as well as the SIRI-WHU Dataset. The proposed methodologies produced improved accuracy of 95% for UCM, 93% for SIRI-WHU Datasets. The categorization of scene images into a distinct set of meaningful groups based on the image contents is important in the analysis of imaging sensor, aerial and satellite images because of its importance in an extensive range of applications, significant various approaches for remote sensing data scene classification have been developed throughout the last few decades. The capacity to handle large dimensionality data and perform well with limited training samples, as well as high accuracy, drew a lot of attention with the introduction of SVM machine learning. We can use a pretrained network as a commencement for learning a new deep learning task by replacing the pretrained network's fully connected layer and classification layer.
|
Exploring Ethical Implications and Responsible use of AI in Automotive Ashray Ramsingh Chauhan,School of Computing Science and Engineering,VIT, Bhopal University | Dr. Nilmadhab Mishra,Assistant Professor,School of Computing Science and Engineering,VIT, Bhopal University Page No.: 43-51 ![]() ![]() ![]()
The integration of artificial intelligence (AI) into the automotive industry has revolutionized the way we drive and interact with vehicles. This paper explores the ethical implications and responsible use of AI in automotive technology. It delves into the multifaceted challenges and opportunities that arise as AI becomes increasingly intertwined with vehicles, emphasizing the need for a comprehensive ethical framework The potential job displacement due to autonomous vehicles and the ethical con
|
Transfer Learning in Aerial Scene Classification Dr. Prateek Mishra, Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Rabia Shaheen, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 45-47 ![]() ![]() ![]()
The categorization of scene images into a distinct set of meaningful groups based on the image contents is important in the analysis of imaging sensor, aerial and satellite images because of its importance in an extensive range of applications, significant various approaches for remote sensing data scene classification have been developed throughout the last few decades. The capacity to handle large dimensionality data and perform well with limited training samples, as well as high accuracy, dre
|
Study on the Cloud Computing Y Shyam Sundar, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra, Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 63-69 ![]() ![]() ![]()
Cloud computing is the upcoming environment in the use of computer technology. Numerous users are keen to put their information in cloud; since balancing load in cloud a risky. Load balancing resource allocation plays a vital role. This chapter deals with the research motivation, the objectives and the thesis organization.
|
Modeling Asthma-Prone Areas Using Machine Learning Jyoti Mishra, Dept, of Computer Science, Manipal University, Jaipur (Raj.) | Dr. Shailendra Shukla, Professor, Dept. of Mathematics, Arya PG College, Jaipur (Raj.) Page No.: 61-70 ![]() ![]() ![]()
Asthma prevalence is currently rising sharply as a result of population growth, rising environmental pollutants, and changing lifestyles. As a result, the goal of this study was to locate Tehran, Iran's asthmatic areas by taking both environmental and geographic aspects into account. Data from 872 locations in children who have asthma and 13 ecologic factors that affect illnesses (distance to play areas and roadways, weather patterns, itemperature, ihumidity, iairipressure, iwindispeed, particul
|
Optimal Payment Policy for Deteriorating Items with Hybrid Type Demand and Non-instantaneous Deterioration under Effect of Trade Credit Jyoti Mishra, Dept, of Computer Application, Manipal University, Jaipur (Raj.) | Sushil Bhawaria, Dept. of mathematics & statistics, Manipal University Jaipur | Dr. Shailendra Shukla, Professor, Dept. of Mathematics, Arya PG College, Jaipur (Raj.) Page No.: 70-78 ![]() ![]() ![]()
In this present article we have developed an optimal payment policy for deteriorating items. The nature of deterioration rate is non-instantaneous and preservation technology is used to control the deterioration. Demand rate depends on stock level and selling price as hybrid type function. Shortages are permitted and partially backlogged with constant rate. A trade credit policy is considered to establish an optimal payment policy. As global changes cannot be ignored hence effect of inflation is
|
Study on Distributed Real-Temporal Image Processing System Pawan Kumar Pnadey, Research Scholar (CSE), SunRise University, Alwar (Rajasthan) | Dr. Suraj Vishwanath Pote, Associate Professor, Dept. of CSE, SunRise University, Alwar (Rajasthan) Page No.: 44-50 ![]() ![]() ![]()
The efficiency of a database is a critical component in determining how well it can be used. In order to ensure that requests are carried out in a timely manner, distributed real-time database systems, also known as DRTDBS, need to be developed on all levels of database architecture. The number of missed deadlines should be kept to a minimum as much as possible, since this is the major performance goal of DRTDBS. Because of the difficult nature of this task, conventional methods are insufficient
|
Role of DBMS In Supporting Recommendation Systems by Storing and Processing User Preference Data Pawan Kumar Pandey,Assistant Professor, Department of Computer Science, Digvijay Nath P.G College Gorakhpur, U.P Page No.: 42-47 ![]() ![]() ![]()
Recommendation systems have become an integral part of many online platforms, aiding users in finding relevant and personalized content. These systems rely heavily on user preference data to generate accurate and effective recommendations. However, handling and processing vast amounts of user data pose significant challenges, necessitating the use of a robust and efficient database management system (DBMS). This research paper investigates the critical role of DBMS in supporting recommendation s
|
Study the Process of System Analysis and Design Applied To DBMS Pawan Kumar Pandey,Assistant Professor, Department of Computer Science, Digvijay Nath P.G College Gorakhpur, U.P Page No.: 53-58 ![]() ![]() ![]()
The field of database management systems (DBMS) plays a crucial role in modern information systems. The process of system analysis and design is a fundamental aspect of developing effective and efficient DBMS solutions. This research paper aims to study and analyze the process of system analysis and design as applied to DBMS, with a focus on understanding its key components, methodologies, and best practices. The paper begins by providing an overview of DBMS and its significance in contemporary
|
Advanced Drill Data Management Solutions Market: Growth and Forecast Pawan Kumar Pandey,Assistant Professor, Department of Computer Science, Digvijay Nath P.G College Gorakhpur, U.P Page No.: 49-53 ![]() ![]() ![]()
This research paper aims to provide a comprehensive analysis of the global market for advanced drill data management solutions and presents a detailed forecast for its growth in the coming years. The increasing demand for efficient drilling operations and the rising adoption of digital technologies in the oil and gas industry have led to the emergence of advanced drill data management solutions. The paper begins with an overview of the market, highlighting the key drivers, challenges, and trends
|
Recent Advances in Tissue Culture to Boost Bioactive Compound Production in Therapeutic Herbs Arpit Rajput, Research Scholar, Biotechnology, The Glocal University Saharanpur, Uttar Pradesh | Dr. Vishal kumar Chhimpa, Professor, Research Supervisor Glocal School of Science, The Glocal University, Saharanpur, Uttar Pradesh Page No.: 73-77 ![]() ![]() ![]()
Plant tissue culture is a crucial technology that facilitates the growth, preservation, and improvement of therapeutic plants. In order to create genetically homogeneous plants, this approach entails cultivating plant cells, tissues, or organs in a regulated setting that is free of pollutants. Since its invention more than a century ago, tissue culture has undergone substantial development, leading to discoveries like totipotency and improvements in nutrient-rich medium. The method makes it easi
|
The Deep Learning Techniques for Classifying Remote Sensing Aerial Scenes Sri Sharanabasappa Raikoti, Assistant Professor, Department of Computer Science, Government Degree College Yadgir, Karnataka, India Page No.: 72-77 ![]() ![]() ![]()
A novel convolutional neural network named JM-Net [67] is designed that has fewer parameters since different size of convolution kernels are applied in same layer unlike fully convolutional layer. Deep color models [68] of CNN are developed by exploring different color spaces and their combination and all of them are fused to investigate the importance of color within the deep learning framework for aerial scene classification. This proves its’ effectiveness by improving the classification performance compared to using only the RGB image as input to the network as a general practice. Two novel deep architectures, texture coded two-stream deep architecture and saliency coded two-stream deep architecture which are based on the idea of feature-level fusion are proposed in a work to further improve the classification accuracy. Remote sensing image scene classification with deep learning (DL) is a rapidly growing field that has gained significant attention in the past few years. While previ
|
A Basic Concept of Servlets (Use for Web Development Application) Mahender Kumar Research Scholar:-Bundelkhand University, Jhansi | Research Guide:-Dr. Rishpal Bangarh Bundelkhand University, Jhansi Page No.: 61-64 ![]() ![]() ![]()
The Java Enterprise Edition (Java EE) has provided the industry with a standard suite of APIs and services for developing server - side applications in Java. As Java EE applications increase in size and complexity the constraints imposed by the existing component model restrict utility. The Servlet is the server side web programming language Listener is a set of classes. It is used for server side Application.There is some Listeners ServletRequestListener, HttpSessionListener, HttpSessionBinding
|
Blockchain Enabled Edge-Fog and Cloud Based Architecture for IoT Aravendra Kumar Sharma (Dept. of Computer Science & Engineering), Researcher, SunRise University, Alwar (Raj.) | Dr. Kamal Kumar Srivastava, Professor (Dept. of Computer Science & Engineering), SunRise University, Alwar (Raj.) Page No.: 79-90 ![]() ![]() ![]()
This paper addresses critical challenges in current blockchain-enabled Internet of Things (IoT) architectures, identifying key issues that warrant architectural modifications. The proposed solution, termed the "Blockchain-Enabled Edge-Fog and Cloud-Based Architecture for IoTs," is introduced in subsequent sections to overcome these challenges. The Issues section highlights various problems within existing architectures, setting the stage for the innovative solution presented in this work. It del
|
An Evolution Study of Defense Strategies and Machine Learning Techniques Vishal Soni, Research scholar, Department of Computer Science, Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur (Rajasthan) | Dr. Manish kumar, Associate Professor, Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur (Rajasthan) Page No.: 66-72 ![]() ![]() ![]()
The advancement in the field of AIA that will improve image retrieval performance. The suggested approach comprises three basic stages: segmentation, feature extraction and annotation. Shape images are segmented using edge detection techniques, whereas colour images are segmented using thresholding, region-based, and clustering-based techniques. K-means clustering on the brightness level of an image results in clusters creating image regions. Feature extraction is the process of transforming hig
|
Exploring Internet of Things: Protocols, Applications, and Addressing Security Concerns Krishna Kumar Kantiwal, Computer Science, Glocal School of Technology & Computer Science, The Glocal University | Dr. Prerna Sidana (Associate Professor), Glocal School of Technology & Computer Science, The Glocal University Page No.: 116-123 ![]() ![]() ![]()
This Research explores the many facets of the Internet of Things (IoT), looking into its various protocols, uses, and the crucial security issue. In this investigation, we examine the field of Internet of Things protocols, from well-known standards to cutting-edge innovations, emphasizing their features and applicability for diverse uses. In addition, we examine the wide range of IoT applications in industries including smart cities, transportation, and healthcare, explaining both their opportun
|
Study on a Replicated and Distributed Real-Time Database Pawan Kumar Pnadey, Research Scholar (CSE), SunRise University, Alwar (Rajasthan) | Dr. Suraj Vishwanath Pote, Associate Professor, Dept. of CSE, SunRise University, Alwar (Rajasthan) Page No.: 79-88 ![]() ![]() ![]()
Numerous real-time applications have a need for data services in decentralised settings. However, being able to provide such data services is difficult owing to the lengthy delays that are associated with distant data accessing and the severe time constraints that are associated with real-time transactions. When the amount of time required to compute the transactions in a set is more than the amount of time available on the processor, overload occurs. There have been many methods proposed to dea
|
Review on Various Open Source Software Designs V.Ramesh,Dept. of Computer Science, Research Scholar, SunRise University, Alwar(Rajasthan) | Dr.Prasadu Peddi, Dept. of Computer Science, Associate Professor , SunRise University , Alwar (Rajasthan) Page No.: 76-81 ![]() ![]() ![]()
Open source software has revolutionized the technology landscape by enabling collaborative development and sharing of software designs. This research paper aims to provide an overview and critical analysis of various open source software designs across different domains. The paper explores the design principles, development processes, and community engagement within these projects. Through an extensive review of open source software projects, this research aims to shed light on the strengths, we
|
Machine Learning Techniques and Ransomware Attacks Vishal Soni, Research scholar, Department of Computer Science, Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur (Rajasthan) | Dr. Manish kumar, Associate Professor, Janardan Rai Nagar Rajasthan Vidyapeeth University, Udaipur (Rajasthan) Page No.: 76-80 ![]() ![]() ![]()
Over the years, our dependence on technology has risen tremendously. Many scenarios need our use of information technology (IT), though. Since our dependence on technology has resulted in a major shift in how we interact with the rest of the world, Systems that were formerly entirely autonomous are now designed to work in concert with one another as well as human users. A vast range of applications and devices are being networked all over the place and for many different reasons. Analytical mod
|
6g Communication through MIMO LTE: A Research Shambhu Kumar Singh, Research Scholar, Dept. of CSE, SunRise University, Alwar (Rajasthan). | Dr. Prerna Nagpal, Research Supervisor, Dept. of CSE, SunRise University, Alwar (Rajasthan), Page No.: 93-95 ![]() ![]() ![]()
Volume alludes to tremendous measure of created and put away data not in Terabytes but rather Zettabytes or Yottabytes. The "size" shows value of data and its capability to be considered as "MIMO LTE based antenna" or not. The volume was identified with the size of data. At present data was in pettabytes and in not so distant future it will be of zettabytes. Consistently, in the computerized universe, we make around 2.5 Exabyte's of data. Each time we click on mouse, each telephone call we make,
|
Study on Application of AI Medical Image Analysis Prasad H M, Assistant Professor, Department of Computer Science, Vedavathi Government First Grade College, Hiriyur, Chitradurga District, Karnataka (India) Page No.: 81-84 ![]() ![]() ![]()
The integration of artificial intelligence (AI) into medical imaging has guided in an era of transformation in healthcare. This literature review explores the latest innovations and applications of AI in the field, highlighting its profound impact on medical diagnosis and patient care. The innovation segment explores cutting-edge developments in AI, such as deep learning algorithms, convolutional neural networks, and generative adversarial networks, which have significantly improved the accuracy
|
Digital Image Processing and Machine Learning for Image Analysis Prasad H M, Assistant Professor, Department of Computer Science, Vedavathi Government First Grade College, Hiriyur, Chitradurga District, Karnataka (India) Page No.: 103-106 ![]() ![]() ![]()
AI has had a substantial influence on image processing, allowing cutting-edge methods and uses. The foundations of image processing are covered in this chapter, along with representation, formats, enhancement methods, and filtering. It digs into methods for machine learning, neural networks, optimization strategies, digital watermarking, picture security, cloud computing, image augmentation, and data pretreatment methods. The impact of cloud computing on platforms, performance, privacy, and secu
|
Optimisation of Apriori Algorithm to improve performance in E-Commerce Applications Ashfaq Ahmed Khan, Research Scholar, Department of Computer Science, Mewar University, Gangrar | Dr. Ganesh Gopal Varshney, Supervisor, Department of Computer Science, Mewar University, Gangrar Page No.: 97-101 ![]() ![]() ![]()
E-commerce markets are growing at noticeable rates. The online market is expected to grow by 56% in 2015–2020.E-commerce allows customers to overcome geographical barriers and allows them to purchase products anytime and from anywhere. Retailing in India is one of the pillars of its economy and accounts for about 10 percent of its GDP. The Indian retail market is estimated to be worth $1.3 trillion as of 2022 and estimated to reach $2 Tn by 2032. India is one of the fastest growing retail market
|
The Blockchain Model for Trust Management in the Internet of Things for Smart Cities Pankaj Jagtap, Department of Computer Science, Dr.A.P.J Abdul kalam University ,School of Computer Science & IT, Devi Ahilya Vishwavidyalaya, Indore | Dr. Sandeep Singh Rajpoot, Department of Computer Science, Dr.A.P.J Abdul kalam University, Indore(M.P.) Page No.: 88-91 ![]() ![]() ![]()
Smart Cities, powered by the Internet of Things (IoT), are rapidly transforming urban living by seamlessly integrating technology into daily life. However, the exponential growth in interconnected devices and systems also brings forth concerns related to security, privacy, and trustworthiness. Addressing these concerns, this paper introduces an innovative Blockchain Model for Trust Management (BMTM) tailored for the IoT ecosystem in Smart Cities. The decentralized nature of blockchain technolog
|
Study On the Transfer Learning in Aerial Scene Classification Sri Sharanabasappa Raikoti, Assistant Professor, Department of Computer Science, Government Degree College Yadgir, Karnataka, India Page No.: 107-111 ![]() ![]() ![]()
Remote Sensing (RS) imageclassification has recently attracted great attention for its application in different tasks, including environmental monitoring, battlefield surveillance, and geospatial object detection. The best practices for these tasks often involve transfer learning from pre-trained Convolutional NeuralNetworks (CNNs). AcommonapproachintheliteratureisemployingCNNsforfeatureextraction, and subsequently train classifiers exploiting such features. In this paper, we propose the adoption of transfer learning by fine-tuning pre-trained CNNs for end-to-end aerial image classification. Our approach performs feature extraction from the fine-tuned neural networks and remote sensing image classification with a Support Vector Machine (SVM) model with linear and Radial Basis Function (RBF) kernels. To tune the learning rate hyperparameter, we employ a linear decay learning rate scheduler as well as cyclical learning rates. Moreover, in order to mitigate the overfitting problem of pre
|
Review of Literature on Modeling Software Reliability Growth from the Perspective of Imperfect Debugging Jyoti, Former Assistant Professor, Government College Of Women, Bawani Khera, Bhiwani (Haryana) Page No.: 108-111 ![]() ![]() ![]()
Due to the fact that OSS is having free of cost access to the tools and technology, teaching and learning through OSS can be done in a wonderful manner. The gap of digital divide can be filled with the novel idea of OSS. Reliability measurement is a prime concern in OSS as it is being updated by many developers constantly. Research is being carried to develop SRGMs for OSS in order to check its reliability under different environmental conditions. Reliability of Mozilla Firefox, Apache, Genome e
|
Deep Learning and Quantum Machine Learning Techniques for Passive Blind Image Splicing in Forensics RATHEESH R, RESEARCH SCHOLAR, DEPARTMENT OF COMPUTER SCIENCE, SUNRISE UNIVERSITY, ALWAR, RAJASTHAN | DR. JITENDER RAI, PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE, SUNRISE UNIVERSITY, ALWAR, RAJASTHAN Page No.: 96-104 ![]() ![]() ![]()
With the rapid advancement of digital image editing tools, manipulating images has become easier than ever. Among various tampering techniques, image splicing—where segments from one or more images are combined into a single composite—remains a prominent method of forgery. The implications of such forgeries are significant, particularly in sensitive domains like journalism, forensics, and social media, where image authenticity is paramount. The growing accessibility of image editing tools has made image splicing a prevalent method of forgery, posing challenges for detection.Passive image forgery detection has gained significant attention in recent years due to the rapid advancements in digital image editing tools. Among various forgery techniques, image splicing remains a common method for tampering. Detecting image splicing presents substantial challenges. This paper proposes a novel algorithm combining deep learning and wavelet transform for spliced image detection. A Convolutional Neural Network (CNN) is utilized for automatic feature extraction, followed by Haar Wavelet Transform (HWT). Support Vector Machine (SVM) is then employed for classification. Additionally, experiments replace HWT with Discrete Cosine Transform (DCT), followed by Principal Component Analysis (PCA). The algorithm is evaluated on public datasets (CASIA v1.0 and CASIA v2.0) and demonstrates high accuracy with a compact feature vector. Results confirm the effectiveness of the proposed approach in detecting spliced images with improved performance.
|
Study On Review of Literature Hybrid Data Clustering Technique In Big Data Using Machine Learning Anju,Research Scholar, Department Of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 112-115 ![]() ![]() ![]()
Big data actually implies an assortment of very large datasets which cannot be processed easily by implementing traditional computing methods. Big data is not merely a data, it has rather transformed into a comprehensive topic, which encompasses number of tools, procedures and frameworks. In general, big data is a datasets that could not be observed, attained, managed, and administered with hold-style IT and software/hardware components within a bearable period. Big Data technologies pronounce a
|
STUDY ON SOFTWARE MAINTAINABILITY SIMULATOR Anju, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) anjupanwar2793@gmail.com Page No.: 109-115 ![]() ![]() ![]()
Using this analysis one can generate a new sequence of random but related states which look similar to the original. This Markov process is stochastic in nature which has the property that the probability of transition from a given state to any future state depends only on the present state and not on the manner in which it was reached. The simulator is developed in this chapter to compute n-step e steady state stationary transition probabilities for various state of the software under maintena
|
Protecting Confidentiality in Data Consolidation within IoT Neha, Dept. of Computer Science, Research Scholar, SunRise University, Alwar (Rajasthan) | Dr. Pawan Kumar Pareek, Assistant Professor (Dept. of Computer Science), SunRise University, Alwar (Rajasthan) Page No.: 111-116 ![]() ![]() ![]()
The term "Internet of Things" (IoT) refers to a network of devices, both large and small, that are linked together and made available online. Because IoT devices may increase efficiency, accuracy, and financial advantage while decreasing the need for human intervention, they provide the greatest degree of adaptability and convenience in our day-to-day operations. The burden of safety, confidentiality, and communication There are also emerging issues in the Internet of Things. Several privacy-pre
|
IOT Networks Security Perspective: A Review Deepak Kumar Verma , Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur | Alok Kumar, Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur Page No.: 117-124 ![]() ![]() ![]()
The widespread use of IoT in society has created a broad target for malicious actors to exploit. This concise paper introduces IoT and its security issues, covering its ecosystem and protocols. The paper then delves into the vulnerabilities present in IoT systems. Its intended audience is those with existing network knowledge but who are new to IoT. The study concludes that the shortage of IoT standards and limitations in device resources are critical issues. Opportunities exist for research int
|
Deep Learning-Based Early Detection of Alzheimer"s Disease from Neuroimaging Data Mahbub Ullah Rajj, Full Stack Developer & Data Analysts, ABM Global Compliance BD Ltd, Dhaka, Bangladesh Page No.: 67-73 ![]() ![]() ![]()
Alzheimer's disease (AD) results in memory loss and impairment, which can give rise to additional symptoms. It has a significant impact on the lives of patients and unfortunately, there is no cure. However, early detection of AD can be beneficial in initiating appropriate treatment to prevent additional brain damage. In recent years, researchers have utilized machine learning techniques to classify AD. These methods involve using manually prepared features and a classifier with a complex archite
|
The Role of Machine Learning in Enhancing Intrusion Prevention Systems for Iot Bharath GG, Research Scholar, Department of Computer Science, SunRise University, Alwar | Dr. Kamal Kumar Srivastava, Professor, Computer Science, School of Computer Science, SunRise University, Alwar Page No.: 123-128 ![]() ![]() ![]()
The large and interconnected nature of IoT devices has made maintaining strong security a serious problem as the Internet of Things (IoT) has proliferated. This research investigates how Artificial Neural Networks (ANNs), a kind of machine learning, might improve Intrusion Prevention Systems (IPS) designed for Internet of Things contexts. Conventional IPS techniques are unable to provide sufficient security for Internet of Things devices due to their limitations, including limited battery life a
|
Study On Unification of Software Reliability Growth Models Srgms) Jyoti, Former Assistant Professor, Government College Of Women, Bawani Khera, Bhiwani (Haryana) Page No.: 116-119 ![]() ![]() ![]()
In the past 35 years numerous software reliability growth models (SRGMs) have been proposed under diverse testing and debugging (T&D) environments and applied successfully in many real life software projects but no SRGM can claim to be the best in general as the physical interpretation of the T&D is not general. Unified modeling approach proves to be very successful in this regard and provides an excellent platform for obtaining several existing SRGM following single methodology. It forms the ma
|
Efficiency Evaluation of Simulated Networks Using Opnet And Firewall Kavitha Kuthumbaka (Computer Science), Research Scholar, SunRise University, Alwar(Rajasthan) | Dr. Pawan Kumar Pareek, Assistant Professor (Dept. of Computer Science), SunRise University, Alwar (Rajasthan) Page No.: 130-137 ![]() ![]() ![]()
In this research, we present a method for analysing packet data networks using the OPNET simulation tool. The goal is to educate users about packet-level networks, such as the Fibre Distributed Data Interface and Network Intrusion Simulation. The FDDI protocol is investigated by switching between two networks with different settings. High utilisation on the FDDI LAN reduces the cost of transporting data, and geographically dispersing servers and workstations in different buildings to make use of
|
Association Rule Mining Techniques With Respect to their Privacy Preserving Capabilities Gopinath Puppala, Research Scholar, Dept. of Computer Science, Maharaja Agrasen Himalayan Garhwal University | Dr. Ajay Kumar Chaurasia, Assistant Professor, Dept. of Computer Science, Maharaja Agrasen Himalayan Garhwal University Page No.: 105-114 ![]() ![]() ![]()
Data mining, an urging requirement in the current era and whose scope of research is expected to be for upcoming decades. Among the well versed techniques of data mining association rule mining plays a prodigious role. This technique emphasizes on curious association, correlations, frequent patterns etc. from the given data sources to be mined. The primary task of association mining resides in uncovering the frequent patterns and exploring the association rules. Multiple variation of association
|
Review of Literature on The Deep Learning Techniques for Classifying Remote Sensing Aerial Scenes Dr. Prateek Mishra, Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Rabia Shaheen, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 143-146 ![]() ![]() ![]()
Earth observation is a collection of information about the earths surface whether it be physical, chemical and biological systems using earth observation satellite or earth remote sensing satellite or directly captured from aircrafts. With the increasing volume of high-resolution remote-sensing images due to development of such earth observation technologies, there necessitate automated systems for analyzing as well as classification of these images for various applications like land mapping, ve
|
Machine and Deep Learning Solutions for Enhancing Iot Security and Privacy Krishna Kumar Kantiwal, Computer Science, Glocal School of Technology & Computer Science, The Glocal University | Dr. Prerna Sidana (Associate Professor), Glocal School of Technology & Computer Science, The Glocal University Page No.: 144-151 ![]() ![]() ![]()
This Research highlight the pivotal role of machine and deep learning in fortifying the security and privacy of Internet of Things (IoT) systems. As IoT devices proliferate across various domains, ensuring robust security measures becomes increasingly critical. Machine and deep learning techniques offer sophisticated solutions to tackle the evolving challenges in this domain. This abstract delves into the application of these technologies in enhancing the security and privacy of IoT ecosystems,
|
Framework for IoT Security Risk Assessment and Management: A Review Neha, Dept. of Computer Science, Research Scholar, SunRise University, Alwar (Rajasthan) | Dr. Pawan Kumar Pareek, Assistant Professor (Dept. of Computer Science), SunRise University, Alwar (Rajasthan) Page No.: 156-163 ![]() ![]() ![]()
The increasing use of the Internet of Things (IoT) technology has raised concerns about the security and privacy of the devices and data involved. IoT devices are highly connected, and their security risks and vulnerabilities can have significant impacts on the entire network. Therefore, there is a need for a systematic framework to assess and manage IoT security risks. This research paper proposes a framework for IoT security risk assessment and management that aims to identify potential risks
|
BRAIN – COMPUTER FOR STROKE REHABILITATION : A REVIEW OF RECENT DEVELOPMENTS Dr. Syam Mohan K.M Head of Department, Computer Science and Engineering UKF College of Engineering and Technology,Kollam , Kerala,Drsyam0105@gmail.com Page No.: 124-132 ![]() ![]() ![]()
Stroke is a leading cause of long-term disability, often resulting in motor impairments that require intensive rehabilitation. Traditional stroke rehabilitation approaches have shown promising results, but advancements in technology have paved the way for innovative interventions. Brain-computer interfaces (BCIs) have emerged as a potential tool for enhancing stroke rehabilitation outcomes by directly connecting the brain with external devices or computer systems. This paper provides a comprehen
|
An Efficient Theoretical Model of An Algorithm for Generating the Mining Essential Rules for Efficient Prediction Manish Kumar Goyal, Research Scholar, Department of Computer Science Engineering, Nirwan University Jaipur, Rajasthan (India) | Dr. Amit Singla, Professor, Department of Computer Science Engineering, Nirwan University Jaipur, Rajasthan (India) Page No.: 171-177 ![]() ![]() ![]()
Association policy Mining identifies intriguing relationships or correlations between data pieces. With vast volumes of data being generated and kept on a constant basis, several companies are increasingly interested in mining association rules from their databases. Because rule is one of most expressive & human readable representations of information, association rule mining is a critical task in datamining. Usually association rule mining techniques generate too many rules and it reduces the efficiency of the process. Further it complicates the pruning process also. As a result, it is required to identify a limited group of fundamental rules that allow for prediction without creating the whole set of rules. This paper proposes an efficient theoretical model of the method for creating crucial rules without producing the whole set of rules. Because the algorithm creates just the necessary rules, the rule set produced is less in size. The time necessary to generate the rules is likewise
|
“What CNN Neural Networks Can Do For Education and How They Could Change the Field” Shivani, Research Scholar, Glocal University, Mirzapur, Saharanpur(Uttar Pradesh) | Dr. Praveen Kumar, Associate Professor (Dept. of Computer Science), Glocal University, Mirzapur, Saharanpur(U.P.) Page No.: 115-122 ![]() ![]() ![]()
"This paper provides a comprehensive analysis of CNN's (Convolutional Neural Network) potential in the classroom and its implications for the future of education. The purpose of this research is to investigate how CNNs may be used in the classroom, specifically for tasks like deep learning ; speech and picture recognition, NLP, and more. Improved student engagement, individualised instruction, and higher achievement are just some of the many acknowledged benefits of incorporating CNNs into the c
|
Study And Analysis of Cyber Crime Awareness in Network Security Geetu Soni, Research Scholar, Department of Computer Science, Singhania University, Rajasthan (India) | Dr. Pooja Maheshwari, Associate Professor, Singhania University, Rajasthan (India) Page No.: 138-143 ![]() ![]() ![]()
Cyberattack is knowing victimization of device, tech-dependent networks and companies. Cyberattacks use malicious code to modify statistics, common sense, or device code, resulting in consequences because of which records can be compromised and can end result to cybercrimes, consisting of records and identity theft. Cyberattack is find of knowing hobby — maybe over prolonged period of time — to modify, interrupt, betray, shame, or demolish adversary facts or computer device or networks and/or ap
|
Artificial Noesis for Human and Robot Interaction Jyoti, Former Assistant Professor, Government College Of Women, Bawani Khera, Bhiwani (Haryana) Page No.: 178-181 ![]() ![]() ![]()
The purpose of this study is to investigate the interaction between human and robot in our society. Human robot interaction is a multidisciplinary area of research interaction. It is a multidisciplinary research comprising of the technological abilities of robots. The design of robot embodiment and geographical studies and lab based research who are human participants with robots in a controlled environment. Therefore the discipline involved with human robot interaction or computer science are H
|
Developing Multitier Enterprise Applications (E-Commerce and Other Web Based Application) Dr. Mahender Kumar, Assistant Professor Department of Computer science,Sri Guru Nanak Girls PG College,Sri Ganganagar. Page No.: 141-146 ![]() ![]() ![]()
The software Developer build the large scale Application using these component. J2EE plateform consist of set of Service Programming Interface(API and Protocals) that provide the functionality for developing multitiered web based application. JSP are used to create and genrated the dynamicaly Web Pages which based on SOAP,XML,HTML etc .The Web Based Application Architecture is Different type such as One Tier, Two Tier , Three Tier etc. The three Tier Architecure Application is based on Three
|
“A Computational Intelligence Approach to Recognizing Hand Gestures” Shivani, Research Scholar, Glocal University, Mirzapur, Saharanpur(Uttar Pradesh) | Dr. Praveen Kumar, Associate Professor (Dept. of Computer Science), Glocal University, Mirzapur, Saharanpur(U.P.). Page No.: 141-147 ![]() ![]() ![]()
Although research into gesture recognition has been ongoing for decades, it remains difficult. It's not an easy problem to solve because of the complicated nature of the setting, the camera, and the lighting. Therefore, an efficient and reliable method for gesture recognition using RGB video is presented in this paper. To begin, we use their hair and eye colour to determine if they have skin. The next step is to get the hand's outline and segment it. We understand the gesture now. The experiment
|
Cloud Computing, Characteristics & Its Advantages Rajinder Kumar, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar, Associate Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 168-174 ![]() ![]() ![]()
Cloud computing is the upcoming environment in the use of computer technology. Numerous users are keen to put their information in cloud; since balancing load in cloud a risky. Load balancing resource allocation plays a vital role. This chapter deals with the research motivation, the objectives and the thesis organization.
|
Combining Deep Learning and Machine Learning for Passive Image Forensic Applications RATHEESH R, RESEARCH SCHOLAR, DEPARTMENT OF COMPUTER SCIENCE, SUNRISE UNIVERSITY, ALWAR, RAJASTHAN | DR. JITENDER RAI, PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE, SUNRISE UNIVERSITY, ALWAR, RAJASTHAN Page No.: 143-150 ![]() ![]() ![]()
Image forgery detection plays a critical role in maintaining the authenticity and integrity of digital content. Traditional forgery detection algorithms often face limitations in terms of time efficiency and detection accuracy. Emerging methods leveraging deep neural networks have shown promise in addressing these challenges. In this study, we propose a hybrid approach combining deep learning (DL) and machine learning (ML) techniques for passive image forgery detection. The DL component classifies images into forged and non-forged categories, while the ML-based color illumination model effectively localizes the forged regions. This hybrid methodology enhances both detection accuracy and interpretability. The performance of the proposed approach is rigorously evaluated against widely-used public datasets, including CASIA1.0, CASIA2.0, BSDS300, DVMM, and the CMFD image manipulation dataset. Our results demonstrate superior accuracy, achieving 99% on CASIA1.0, 98% on CASIA2.0, 98% on BSDS300, 97% on DVMM, and 99% on the CMFD dataset. Additionally, the computational efficiency of the approach outperforms traditional methods, making it suitable for real-time and large-scale applications. This hybrid framework is designed to address various forms of image manipulations, including splicing, copy-move forgeries, and region duplication, thereby providing a robust solution for digital forensic investigations. Future work will explore integrating advanced preprocessing techniques and leveraging multimodal datasets to further enhance robustness and applicability.
|
A Comprehensive Framework to Evaluate Websites Basavaraj U, Assistant Professor, Department of Computer Science, Government First Grade College and PG Centre Thenkinidiyur Udupi, Karnataka India Page No.: 144-148 ![]() ![]() ![]()
Websites are essentially client/server applications - with web servers and browser clients. Consideration should be given to the interactions between html pages, TCP/IP communications, internet connections, firewalls, applications that run in web pages (such as applets, JavaScript, plug-in applications) and applications that run on the server side (such as CGI scripts, database interfaces, logging applications, dynamic page generators, asp, etc.). Additionally, there are a wide variety of server
|
A Study on Role of Cyber Security in Digital Security in Digital Insurance Dr. Kulwant Singh, Assistant Professor, Department of Computer Science, Shri Khushal Das University, Hanumangarh (Rajasthan) India Page No.: 182-187 ![]() ![]() ![]()
In the fast-paced world of insurance, where technology plays an increasingly vital role in managing policies, processing claims, and engaging with customers, the importance of strong cybersecurity measures has never been more pronounced. This research delves into the pivotal role cybersecurity plays in the realm of digital insurance. It delves into the vulnerabilities that come hand in hand with online platforms and explores how cyber threats can impact both insurers and their clientele. The study sheds light on the rising instances of cyberattacks, from data breaches to ransomware attacks, which jeopardize sensitive customer data and erode trust in digital insurance solutions. Moreover, it delves into effective cybersecurity practices such as encryption, multi-factor authentication, and continuous monitoring to safeguard data integrity and privacy. By examining recent case studies and industry analyses, this research underscores the significance of cultivating a culture of cybersecuri
|
Characteristics of MIMO LTE based antenna: An Overview Shambhu Kumar Singh, Research Scholar, Dept. of CSE, SunRise University, Alwar (Rajasthan). | Dr. Prerna Nagpal, Research Supervisor, Dept. of CSE, SunRise University, Alwar (Rajasthan), Page No.: 163-167 ![]() ![]() ![]()
MIMO LTE based antenna was being produced by everything around us consistently. Each computerized procedure and web based life trade delivers the MIMO LTE based antenna. It was transmitted by frameworks, sensors and cell phones. Regularly around 2.5 quintillions of data can be made. The 2019 IDC Digital Universe study composes that around 130 exabytes of data were made and put away in 2015. With the quick increment in this, it developed to 1227 exabytes in 2020 and was anticipated to develop at
|
EEG In Major Depressive Disorder Related to Machine Learning Meta Analysis: Review of Literature Gururaj J.P., Assistant Professor, Department of Computer Science, Government First Grade College, Harihar-577601, Karnataka (India) Page No.: 149-152 ![]() ![]() ![]()
Electroencephalography is a widely used clinical and research method to record and monitor the brain’s electrical activity – the electroencephalogram (EEG). Machine learning algorithms have been developed to extract information from the EEG to help in the diagnosis of several disorders (e.g., epilepsy, Alzheimer’s disease, and schizophrenia) and to identify various brain states. Despite the elegant and generally easy-to-use nature of machine learning algorithms in neuroscience, they can produce
|
Multimodal Biometric System: Leveraging Fingerprint Features Viren Swami, Research Scholar, Department of Computer Science, Shri Khushal Das University, Hanumangarh (Rajasthan) India | Dr. Garima Bansal, Research Supervisor, Department of Computer Science, Shri Khushal Das University, Hanumangarh (Rajasthan) India Page No.: 188-192 ![]() ![]() ![]()
Biometric authentication has gained widespread adoption in security-critical applications due to its ability to provide reliable and unique identification. Among various biometric modalities, fingerprint recognition remains one of the most popular and effective techniques. However, individual fingerprint features alone may not always provide sufficient accuracy, especially in noisy or less-than-ideal conditions. To address this limitation, multimodal biometric systems, which combine multiple biometric traits, offer enhanced performance in terms of accuracy, security, and robustness. This research proposes a novel multimodal biometric system that leverages fingerprint features alongside other biometric modalities, such as facial recognition or iris scans, to improve identification and verification accuracy. The system utilizes advanced feature extraction techniques, including minutiae matching, texture-based methods, and deep learning-based fusion approaches, to effectively combine and
|
A Systematic Review towards Big Data Analytics in Social Media Ingole Sheetal Prakash, Student SEM-II, M.Tech-Computer Science (Artificial Intelligence), NIILM University,Kaithal,Haryana, India Page No.: 201-216 ![]() ![]() ![]()
The recent advancement in internet 2.0 creates a scope to connect people worldwide using society 2.0 and web 2.0 technologies. This new era allows the consumer to directly connect with other individuals, business corporations, and the government. People are open to sharing opinions, views, and ideas on any topic in different formats out loud. This creates the opportunity to make the “Big Social Data” handy by implementing machine learning approaches and social data analytics. This study offers a
|
Review on The Effects of Social Networking Websites on Students Yeldi Venkanna, Dept. of Computer Science, Research Scholar, SunRise University, Alwar(Rajasthan) | Dr.Amit Singla, Dept. of Computer Science, Assistant Professor, SunRise University , Alwar (Rajasthan) Page No.: 181-187 ![]() ![]() ![]()
This research paper aims to provide a comprehensive review of the effects of social networking websites on students. With the increasing popularity and widespread use of platforms such as Facebook, Instagram, Twitter, and Snapchat, it is crucial to understand the impact they have on the academic, social, and psychological well-being of students. By examining a wide range of studies conducted on this topic, this paper discusses the positive and negative effects of social networking websites, expl
|
Review of In Order to Address Nonlinear or Non-Differentiable Optimization Problems, The Genetic Algorithm Is Utilized as An Optimization Tool Dr. Satish Kumar, Associate Professor, Department of Computer Science, Government College Narnaul, Distt. Mohindergarh, Haryana, India Page No.: 179-183 ![]() ![]() ![]()
An optimization method known as the genetic algorithm is used to handle nonlinear or non-differentiable optimization problems. It looks for a global minimum using ideas from evolutionary biology. It avoids local optima and looks for global fitness since it is the resilient solution when measured against fitness standards. However, there are still some instances and circumstances where solutions are offered based on local optimal values, which completely undermines the use of GAs for optimization
|
Advancements in Cloud Computing: A Contemporary Perspective Ragotham Reddy T, Dept. of Computer Science, Research Scholar, SunRise University, Alwar (Rajasthan) | Dr.Prasadu Peddi, Associate Professor (Dept. of Computer Science), SunRise University , Alwar (Rajasthan) Page No.: 188-195 ![]() ![]() ![]()
Computing resources such as networks, servers, storage, services, applications, and software are pooled and made available to multiple users over the Internet in a cloud computing setup. In today's era of information technology, we have complete access to data on all major developments in the relevant disciplines. Various small and large scale (manufacturing, automation, television, and constructions industries), Geographical Information System (GIS), Military intelligence fusion (MIS), business
|
Sentiment Analysis of Amazon reviews with Natural Language Processing using Machine Learning Algorithms Fauja Singh, Research Scholar, MGS University, Bikaner | Dr. Vishal Gaur, Research Supervisor, Govt. Engineering College, Bikaner Page No.: 202-206 ![]() ![]() ![]()
Sentiment analysis utilises natural language processing (NLP) techniques to create software that interprets text similarly to human comprehension. Sentiment analysis is a crucial business intelligence tool that allows organisations to improve products and services by analysing digital text to determine the author's viewpoint on a subject. This information is employed to augment customer service and elevate brand reputation. Naive Bayes, Support Vector Machines, and Logistic Regression are commonly utilised in sentiment analysis to predict sentiment in Amazon reviews by analysing textual features and training the model on labelled data. These models aid organisations in understanding customer satisfaction, enabling data-driven decision-making, and leveraging the extensive collection of Amazon reviews to foster corporate growth and success. The primary objective of this study was to conduct a thorough examination of the sentiments expressed in Amazon reviews for a variety of product cate
|
Cyber Law and Technological Advancements: An Overview Sridhar Pippari, Research Scholar, Glocal School of Technology and Computer Science, Glocal University, Mirzapur, Saharanpu (U.P.) | Dr. Lalit Kumar Khatri, Research Supervisor, Glocal School of Technology and Computer Science, Glocal University, Mirzapur, Saharanpu (U.P.) Page No.: 196-200 ![]() ![]() ![]()
Cybercrime refers to illegal activities carried out using computers and the Internet. These crimes can range from stealing personal information and financial fraud to hacking and spreading malicious software. Cybercrime poses significant risks to individuals, businesses, and governments worldwide. Human beings, endowed with unique cognitive abilities, have transformed the world through innovation and adaptation. From basic survival needs to the complexities of modern society, our intellectual pr
|
Use of Social Networking Sites in Recent Times Yeldi Venkanna, Dept. of Computer Science, Research Scholar, SunRise University, Alwar(Rajasthan) | Dr.Amit Singla, Dept. of Computer Science, Assistant Professor , SunRise University , Alwar (Rajasthan) Page No.: 179-187 ![]() ![]() ![]()
This research paper explores the use of social networking sites in recent times, highlighting the significant shifts, trends, and impacts on individuals, communities, and society as a whole. It delves into the evolving nature of social networking platforms, the role they play in shaping interpersonal relationships, communication patterns, and the overall social fabric. The paper discusses both the positive and negative implications of social networking sites and offers insights into their potent
|
Future of E-Government: An Integrated Conceptual Framework Rajkumar Basappa, Assistant Professor, Department of Computer Science, SRSMN Government First Grade College, Barkur Udupi, Karnataka India Page No.: 160-166 ![]() ![]() ![]()
In fact, e-governance can be seen as a broader concept that identifies and evaluates the impacts that ICT and artificial intelligence technologies on the practice and administration of government, on relations between civil servants and society in general, and on interactions with elected representatives or external stakeholders including non-governmental organizations or private institutions. Several studies have examined how e-governance is radically transforming public sector organizations an
|
INCREASING TREND OF IMAGE MINING Ramakrishna Reddy K,Research Scholar, Department of Computer Science and Engineering,Bhagwant University,Rajasthan-India | Dr.B.Dhanasekaran,Research Supervisor,Department of Computer Science and Engineering,Bhagwant University,Rajasthan-India | Prof.Dr V.K.Sharma,ResearchCo-Supervisor,DepartmentofEEE,Bhagwant University, Rajasthan-India Page No.: 167-171 ![]() ![]() ![]()
Image mining means to separate affiliations and models which are not unequivocally managed there of mind from crude data images. Image mining is a particularly arranged system considering data mining, man-made thinking, reenacted information, image recuperation, image making due, PC vision and edifying grouping, etc. Image mining's capacity of finding solid image plans opens different assessment fields to new edges. Mining huge arrangement of images, and joined data mining of colossal combinatio
|
Review of Literature on Design and Use of a Robust Model for Small Software Companies Mamata, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra, Assistant Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 224-227 ![]() ![]() ![]()
It is understood that there are various models that achieve feeble programming quality. It is basic to invite the focal drivers of low quality in deals to have the choice to successfully improve your techniques in mentioning to improve the possibility of your thing. Fortunately, what's more locate that improving quality improves time-to-market of the most basic features. To recognize mutilations can be: bugs, joins that weren't referenced, features that were referenced currently are of immateria
|
Leveraging Artificial Learning to Enhance the Quality of Cloud-Based Applications Ragotham Reddy T, Dept. of Computer Science, Research Scholar, SunRise University, Alwar (Rajasthan) | Dr.Prasadu Peddi, Associate Professor (Dept. of Computer Science), SunRise University , Alwar (Rajasthan) Page No.: 188-196 ![]() ![]() ![]()
Cloud computing has revolutionized the way applications are developed, deployed, and accessed. Cloud-based applications offer numerous benefits such as scalability, cost-effectiveness, and easy maintenance. However, ensuring the quality of these applications is a complex and challenging task due to the dynamic nature of cloud environments. In recent years, artificial learning techniques have emerged as a promising approach to address the quality challenges associated with cloud-based application
|
Digital Image Processing: Detection of Cancer Nodules in The Early Stage Using Scanned Images Comparing and Optimising the Algorithm Prasad H. M., Assistant Professor of Computer Science, Vedavathi Govt. First Grade College, Hiriyur, Karnataka (India) Page No.: 167-171 ![]() ![]() ![]()
This study investigates the application of Digital Image Processing (DIP) techniques for early cancer nodule detection in scanned medical images. By comparing and optimizing various algorithms, we aim to enhance the accuracy and efficiency of identifying cancerous nodules at their nascent stages. The process encompasses image acquisition, preprocessing, segmentation, feature extraction, classification, and post-processing. We explore different approaches within each stage, such as noise reductio
|
Review of Literature on Study on The Hybrid Approaches Contribution as An Efficient Solution for Task Scheduling and Load Balancing in The Cloud Gouri Chiniwalmath , Research Scholar, Department Of Computer Science, Sunrise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra Professor, Department Of Computer Science, Sunrise University, Alwar, Rajasthan (India) Page No.: 228-231 ![]() ![]() ![]()
Thousands use websites at some point of time for other. Cloud has limitation in maintaining load obtained from all demands at time any point of time. It results in destroy of the entire network. It is the process in which computing resources and workloads are distributed to more than one server. Workload is divided between two or more servers, hard drives, system interface and other computing resources resulting in good use and system response time. A huge traffic web site requires a high powerf
|
Radiomics and Deep Learning Approaches in Oncology through the Cancer Continuum: An Approch Shweta S. Marigoudar, Research Scholar (CSE), SunRise University, Alwar (Rajasthan) | Dr. Amit Singla, Assistant Professor, Dept. of CSE, SunRise University, Alwar (Rajasthan) Page No.: 197-202 ![]() ![]() ![]()
For a number of decades, the conventional approach to medical picture analysis for cancer relied on human-defined characteristics as its foundation. In many cases, low-level image qualities like as intensity, contrast, and a limited number of texture metrics served as a source of motivation for the development of these features. It was challenging to capture the high-level, complex patterns that a skilled radiologist uses to determine whether or not cancer is present in a patient 1. In the subcl
|
Literature Related to The Electronic Governance: Issues and Challenges Rajkumar Basappa, Assistant Professor, Department of Computer Science, SRSMN Government First Grade College, Barkur Udupi, Karnataka India Page No.: 184-189 ![]() ![]() ![]()
Electronic governance, commonly referred to as ―e-governance‖, has emerged as a critical aspect of modern-day governance. It involves the use of digital technologies to deliver efficient, transparent, and citizen-centric government services and processes. In India, ―e-governance‖ has been a significant policy objective for several years, with the government launching various initiatives to improve citizen participation and reduce corruption. However, the implementation of ―e-governance‖ in India
|
Cybercrime: A Review based of Modern perspective Sridhar Pippari, Research Scholar, Glocal School of Technology and Computer Science, Glocal University, Mirzapur, Saharanpu (U.P.) | Dr. Lalit Kumar Khatri, Research Supervisor, Glocal School of Technology and Computer Science, Glocal University, Mirzapur, Saharanpu (U.P.) Page No.: 238-242 ![]() ![]() ![]()
Cybercrime is any criminal activity that involves computers and networks. It's a broad term that covers a wide range of illegal activities, from stealing personal information to disrupting critical infrastructure. Cybercrime refers to illegal activities carried out using computers and the Internet. These crimes can range from stealing personal information and financial fraud to hacking and spreading malicious software. Cybercrime poses significant risks to individuals, businesses, and government
|
Review on Performance Optimization of Fiber Distributed Data Networks Kavitha Kuthumbaka (Computer Science), Research Scholar, SunRise University, Alwar(Rajasthan) | Dr.Pawan Kumar Pareek ,( Computer Science) Assistant Professor, SunRise University , Alwar (Rajasthan) Page No.: 203-210 ![]() ![]() ![]()
Fiber distributed data networks have gained significant prominence in recent years due to their ability to provide high-speed and reliable connectivity. However, as the demand for data continues to grow exponentially, it becomes crucial to optimize the performance of these networks to ensure efficient data transmission and meet user expectations. This research paper presents a comprehensive review of performance optimization techniques employed in fiber distributed data networks. It explores var
|
Study on the Reliability Evaluation of the Web-Based Software and Hardware Geetu Soni, Research Scholar, Department of Computer Science, Singhania University, Rajasthan (India) | Dr. Pooja Maheshwari, Associate Professor, Singhania University, Rajasthan (India) Page No.: 182-185 ![]() ![]() ![]()
Web-based systems are playing an important role in modern computer savvy society today. Because of the pervasive nature and the massive user population, various existing software engineering approaches need to be adopted for web engineering and web quality assurance (WebQA) is the application area which deals with analysis, testing, quality/reliability improvement for web-based applications. Davila-Nicanor et al. [DAV2005] focused on the development of a methodology for the evaluation and analy
|
A Comparative Study Assessing Probabilistic Protocols" Performance in Protecting Enterprise Networks U Devika, School of Computer Science, SunRise University, Alwar | Dr. Kamal Kumar Srivastava, Professor, Computer Science, School of Computer Science, SunRise University, Alwar Page No.: 210-215 ![]() ![]() ![]()
Enterprise networks in the country of cybersecurity are subject to increasingly complex attacks, which calls for strong defenses. By adding randomness into security operations, probabilistic protocols provide a fresh strategy that hinders attackers' capacity to anticipate and take advantage of weaknesses. The purpose of this comparative study is to investigate how probabilistic protocols might improve network resilience against various cyber dangers, such as advanced persistent threats (APTs), p
|
Adversarial-Based Iot Security: Strengthening Network Defenses Renuka Bhagavati , Dept. of Computer Science, Research Scholar, SunRise University , Alwar(Rajasthan) | Dr. Pawan Kumar Pareek , Assistant Professor (Dept. of Computer Science), SunRise University , Alwar (Rajasthan) Page No.: 224-231 ![]() ![]() ![]()
The proliferation of Internet of Things (IoT) devices has revolutionized various industries, enabling seamless connectivity and smart automation. However, this interconnectedness also poses significant security risks, as IoT networks become prime targets for malicious actors. Traditional security approaches fall short in effectively identifying and mitigating IoT vulnerabilities due to the dynamic nature of IoT environments. In this research paper, we propose an innovative approach, Adversarial-
|
Title: Privacy Concerns in Social Media. Pawan Kumar Pandey Assistant Professor, Department Of Computer Science Digvijay Nath P.G College Gorakhpur, U.P Page No.: 181-189 ![]() ![]() ![]()
Privacy concerns in the realm of social media have become a pressing issue in the digital age. The exponential growth of social networking platforms has given rise to a host of privacy-related challenges that demand careful examination. This research paper delves into the multifaceted landscape of privacy concerns in social media, encompassing issues related to data security, information sharing, user awareness, and regulatory frameworks. By analyzing the intricacies of privacy concerns in socia
|
Factors impacting acceptance of augmented reality after Covid-19 in India Alok Kumar, Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur | Ruchika Rastogi, Department of Management, Pranveer Singh Institute of Technology, Kanpur 209305, India | Deepak Kumar Verma, Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur Page No.: 212-214 ![]() ![]() ![]()
Mobile phone in hands give you more options of shopping than the mobile phone lying in pocket. Consumers want to take the advantage of advanced technologies of their smart phones for revolutionizing their buying process (Bandara et al., 2020; Wagner et al., 2020).Augmented reality, Virtual reality, and Artificial intelligence are some of the advanced technologies of the smart phones whichgive evolution to the new platform for shopping, called m-commerce (Blaise et al., 2018). Globally, m-commerc
|
Literature Study on the Artificial Intelligence Related to Big Data using Techniques Anju Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar Assistant Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 254-259 ![]() ![]() ![]()
Artificial Intelligence (AI) has vast potential in marketing. It aids in proliferating information and data sources, improving software's data management capabilities, and designing intricate and advanced algorithms. AI is changing the way brands and users interact with one another. The application of this technology is highly dependent on the nature of the website and the type of business. Marketers can now focus more on the customer and meet their needs in real time. By using AI, they can qui
|
Digital Value Chain Smart Additive Manufacturing: Pillars and Principals Jyoti Mishra, Dept, of Computer Science, Manipal University, Jaipur (Raj.) | Dr. Shailendra Shukla, Professor, Dept. of Mathematics, Arya PG College, Jaipur (Raj.) Page No.: 200-207 ![]() ![]() ![]()
This research investigates the implications of smart additive manufacturing (SAM), which is also known as smart three-dimensional (3D) printing, for industrial production logistics and inventory management as well as for digital supply chains (DSCs) and digital value chains (DVCs). The research is conducted within the context of Industry 4.0. The fourth industrial revolution is frequently referred to as "Industry 4.0." This transformation has given rise to the development of new digital technolo
|
Effects of Cognitive Sensory Motor Training Versus Repetitive Facilitation Exercisesof Upper Limb in Hemiparetic Patients Ashish patel, Department of computer science, R D engineering College, Ghaziabad Page No.: 224-231 ![]() ![]() ![]()
Stroke [CVA] is the sudden loss of neurological function caused by an interruption of blood flow to the brain. Large numbers of people who survive a stroke are left with permanent impairment of arm and hand function, even after completion of conventional rehabilitation programs. The standard neuro physiological facilitation technique use for hemiplegicupperlimb have notbeenconfirmedto promote functional recovery of hemiplegic limb. This promotethat more research needs to be conducted for same. C
|
Mimo-Based Lte-Advanced an Antenna Design Dr. Geetanjali, Assistant Professor, Sri Ganganagar Page No.: 267-270 ![]() ![]() ![]()
Considering the use of web stages in various fields, remote systems with high data rates and amazing redirection limits were very famous. These requirements were reliably incompatible with single-input and single-output (SISO) antennas. Therefore, multi-input and multiple-output (MIMO) printed antennas, another type of antenna setup, had emerged as a sensible competitor for quick correspondence upgrades. In such schemes, sending and receiving data were energetically supervised using a coplanar o
|
Approach Used in Developing Open Source Software: A Comprehensive Analysis V.Ramesh, Dept. of Computer Science, Research Scholar, SunRise University, Alwar(Rajasthan) | Dr.Prasadu Peddi, Dept. of Computer Science, Associate Professor, SunRise University , Alwar (Rajasthan) Page No.: 238-243 ![]() ![]() ![]()
Open Source Software (OSS) has gained significant prominence in the software industry, with its collaborative and transparent development model. This research paper aims to provide a comprehensive analysis of the approaches employed in developing open-source software. The study investigates key aspects such as community collaboration, version control, licensing, and quality assurance methodologies. By understanding these approaches, software developers and researchers can gain valuable insights
|
Cross-Disciplinary Analysis of AI Decision-Making: Legal and Ethical Implications" Shivaraj, Research Scholar (Computer Science) Sunrise University, Alwar | Dr. Vijay Pal Singh (Professor), Research Supervisor School of Computer Science & IT, Sunrise University, Alwar Page No.: 241-247 ![]() ![]() ![]()
The ethical Dimensions of artificial intelligence (AI) involve crucial matters including impartiality, equity, and responsibility, all of which are essential for guaranteeing the responsible application of AI. Unfair outcomes and the reinforcement of pre-existing prejudices might result from biased data, discriminating algorithms, or systemic imbalances in AI systems. Using inclusive design principles to promote fairness, regular algorithmic audits, and the use of representative and diverse data
|
An Analysis on Cyber Security Laws in India Manoj Kumar, Department of Computer Science & Engineering RDEC,Ghaziabad Page No.: 232-239 ![]() ![]() ![]()
The internet has made a significant impact on all parts of modern lifestyle and businesses and people have become susceptible to various cyber attacks. Every year, cybercrime rates are increasing and causing loss of privacy, reputational and financial damage, and intellectual property violations. The INDIA has become a key target for those criminals because of high levels of tourism and economic activity, rise of oil and gas sector, and uptake of technology. A lot of changes have been made to th
|
Information Corresponding in Communication in Mobile Ad Hoc Networks Manoj Kumar Chaudhary, Research Scholar, Department of Computer Science, Sun Rise University | Dr. Lalit Kumar Khatri, Department of Computer Science, Sun Rise University Page No.: 223-227 ![]() ![]() ![]()
Mobile Ad Hoc Networks ((MANETs)) address a critical shift from conventional organization designs, basically because of their decentralized nature and dynamic geographies. Not at all like customary organizations that depend on fixed framework, for example, base stations or switch-es, MANETs work with no concentrated control. All things being equal, hubs inside the organ-ization are answerable for both steering and handing-off information, shaping impermanent, on-the-fly correspondence ways through multi-jump transmissions. As nodes move or join or leave the network, each MANET node acts as both a host and a router, adapting dynamically to changes in the network's topology. Versatile Impromptu Organizations (MANETs) address a decentralized remote organization structure where hubs speak with one another without de-pending on a previous framework. The powerful geography of MANETs, joined with their de-pendence on multi-jump directing, acquaints a few difficulties related with data trade, steering effectiveness, and correspondence unwavering quality. This paper examines the routing proto-cols, data dissemination strategies, network scalability, security concerns, and communication reliability of MANET information corresponding mechanisms. Reproduction results are intro-duced to assess the exhibition of various steering conventions under different portability exam-ples and traffic conditions, alongside ideas for upgrading data trade in MANET conditions. This examination intends to add to the continuous advancement of MANET correspondence methodologies by offering bits of knowledge into how data correspondence can be enhanced to fulfill the needs of progressively intricate and asset compelled networks.
|
Study on the Parameters Related to Simulator for software maintainability Kavita Vijaysingh Tiwari, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar Assistant Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 268-274 ![]() ![]() ![]()
Using this analysis one can generate a new sequence of random but related states which look similar to the original. This Markov process is stochastic in nature which has the property that the probability of transition from a given state to any future state depends only on the present state and not on the manner in which it was reached. The simulator is developed in this chapter to compute n-step e steady state stationary transition probabilities for various state of the software under maintena
|
Aspect Term Extraction Using Different Methods Alok Kumar, Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur | Ruchika Rastogi, Department of Management, Pranveer Singh Institute of Technology, Kanpur | Deepak Kumar Verma , Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur Page No.: 249-257 ![]() ![]() ![]()
The “Aspect Based Sentiment Analysis” (ABSA) task is a classic Sentiment Analysis problem that focuses on understanding people’s opinion on aspect level. This main task is sub-divided into multiple works including the extraction of aspect term, recognition of aspect category, recognition of sentiment word and classification of emotions (positive, negative, conflict, neutral) for aspect term and also for aspect category. Here we propose the system for recognizing aspects and analyzing the sentimen
|
“Security Ways to Deal with Relieve Digital Dangers in Web-Based Inter Personal Organization Rohit Kumar, Research Scholar, Department of Computer Science, Sun Rise University | Dr. Lalit Kumar Khatri, Department of Computer Science, Sun Rise University Page No.: 228-231 ![]() ![]() ![]()
The advent of web-based social networks has revolutionized communication, collaboration, and content sharing, enabling unprecedented global connectivity. However, this evolution has also exposed users to a myriad of cybersecurity threats, including identity theft, phishing attacks, cyberbullying, misinformation, and large-scale data breaches. These risks compromise user privacy, trust, and platform integrity. This research provides a comprehensive analysis of current threats targeting social networks and evaluates state-of-the-art security measures to counteract them. It further explores emerging technologies such as artificial intelligence, blockchain, and advanced encryption techniques as robust solutions to enhance security and user confidence. By proposing strategic frameworks and policies, this study aims to foster safer online interactions and minimize digital vulnerabilities.
|
Study on COVID-19: A Lightweight Security Framework for Internet of Things-Enabled Human Tracking Aravendra Kumar Sharma (Dept. of Computer Science & Engineering), Researcher, SunRise University, Alwar (Raj.) | Dr. Kamal Kumar Srivastava, Professor (Dept. of Computer Science & Engineering), SunRise University, Alwar (Raj.) Page No.: 278-285 ![]() ![]() ![]()
This paper introduces a lightweight security framework for human tracking enabled by the Internet of Things (IoT), specifically addressing scenarios related to pandemics such as COVID-19. The paper identifies key challenges associated with IoT-based human tracking, focusing on enterprise, cloud computing, and superlative layers. The proposed framework paradigm is constructed to mitigate these challenges and enhance the overall security of the system. The subsequent sections detail the steps invo
|
Blockchain, AI, And IOT Integration: Advancements and Industry Impact Dinesh Hemant Bhere, Computer Science, SunRise University, Alwar, Rajasthan | Dr. Amit Singhal, Associate Professor, School of Computer Science, SunRise University, Alwar, Rajasthan Page No.: 248-253 ![]() ![]() ![]()
The combination of blockchain, AI, and IoT is transforming industries. Blockchain provides safe, transparent data management, AI enables intelligent analysis of IoT data, and IoT generates important real-time insights. This integration is leading to breakthroughs in supply chain management, healthcare, smart cities, and more, boosting efficiency, security, and decision-making processes. This study investigates the convergence of Blockchain, Artificial Intelligence (AI), and the Internet of Thing
|
Study on the Robust Model for Small Software Companies Mamata, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra, Assistant Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 273-276 ![]() ![]() ![]()
Masterminding is significant, in any case learning is head. You need to push structures, for example, iterative improvement, that help packs find what accessories truly require and make up for lost time with that data. It's in addition basic for a social affair to routinely mull over what they're doing and a brief timeframe later act to improve their procedure. It's not basic to begin programming improvement by portraying a hard and fast affirmation, and when in doubt that shows up, clearly, to
|
A Study of Cloud Computing Is Transforming the It World Using Virtualization Technology Dr. Satish Kumar, Associate Professor, Department of Computer Science, Government College, Narnaul, Distt. Mohindergarh, Haryana, India Page No.: 286-290 ![]() ![]() ![]()
Due to its ability to enable the on-demand outsourcing of cloud resources on a pay-per-use basis, cloud computing (CC) has advanced the IT sector. It gives both small and large enterprises the chance to grow, innovate, and develop new values. Users can access cloud-based services from any point in the world and use the applications and data that are managed and administered by others. The rapidly expanding needs of the current resource-demanding business and IT sectors have prompted awareness of
|
A Study on Cloud Computing and Its Characterstics Gouri Chiniwalmath , Research Scholar, Department Of Computer Science, Sunrise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra Professor, Department Of Computer Science, Sunrise University, Alwar, Rajasthan (India) Page No.: 277-283 ![]() ![]() ![]()
Cloud computing is the upcoming environment in the use of computer technology. Numerous users are keen to put their information in cloud; since balancing load in cloud a risky. Load balancing resource allocation plays a vital role. This chapter deals with the research motivation, the objectives and the thesis organization.
|
A comparison of terrorism and human rights Jammu and Kashmir as a Case Study Dr. Rajesh Kumar, Associate Professor, Department of Defence Study, Govt. College Ateli (Mahendergarh) , Haryana, India, Page No.: 291-296 ![]() ![]() ![]()
In the latter few decades of the 20th century, the east-west battle came to an end and some type of collaboration amongst once-rivals emerged. This collaboration was made possible by governments' acceptance of regional and international institutions as effective conflict-resolution tools. However, there are ongoing hazards and threats, both old and new. Age-old conflicts of a national, ethnic, religious, and cultural nature that suppressed throughout the second cold war have begun to reemerge wi
|
Study of Algorithms to Calculate Real Root of Transcendental Equations Arvind Panwar, Department of computer science, R D engineering College, Ghaziabad Page No.: 266-270 ![]() ![]() ![]()
This study deals with a comparative analysis of algorithms for solving transcendental equations. It includes algorithms for RF-EXP, RF-Halley, Arc-sine, Tanh and RF-ArcTanh methods to check the accuracy, number of iterations, and errors for the solution of the trigonometric, logarithmic, and exponential equations. Several numerical examples are presented to illustrate the algorithms’ efficacy which are programmed in MATLAB. The findings indicate that Arc-sine and RF-ArcTanh, RF-Halley, and Tanh
|
Multiband and Wideband MIMO Antennas for Mobile Applications Pooja Sharma, Department of Electronics and Communication, RD Engineering College Ghaziabad, India Page No.: 238-241 ![]() ![]() ![]()
This paper presents a multiband MIMO antenna based on meander lines with an L-shaped metallic strip. A monopole antenna with many short-circuited transmission line sections acts as an inductor, altering the impedance characteristics of the antenna; this arrangement is referred to as a meander line. 69% of the antenna size was reduced with the use of a line slot DGS (Defective Ground Structure) to reduce the mutual interaction between the antenna components and the insertion of two U slots on the
|
Issues of Data Minining: A Review Raval Chandni Sudhirkumar, Research Scholar, Department of Computer Application, Shri Jagdishprasad Jhabarmal Tibreuniversity, Vidyanagari, Jhunjhunu, Rajasthan | Dr. Ajit Kumar, Assistant Professor, Department of Computer Application, Shri Jagdishprasad Jhabarmal Tibreuniversity, Vidyanagari, Jhunjhunu, Rajasthan Page No.: 245-250 ![]() ![]() ![]()
In the present time, the World Wide Web has evolved into a distributed data space that contains a few billion pages and 100 million devices. Customers continue to face difficult challenges in their search for the information they want, despite the fact that there is an abundance of data available to them online. As a result of the exponential growth of the Internet, the most important objective for research is to develop a search engine that is both accurate and efficient. Among the many subfiel
|
Difference in Visual Reaction Time Among Male and Female Physiotherapy Students: A Comparative Study Heena Bhalla, Department of computer science, R D engineering College, Ghaziabad Page No.: 271-274 ![]() ![]() ![]()
Introduction: Visual reaction time is a component of cognitive function. Reaction time is defined as interval of time between presentation of stimulus and appearance of appropriate voluntary response in subject. The measurement of visual reaction time has been used to evaluate Processing speed of central nervous system and coordination between Sensory and motor system. It determines the alertness of a person because how quickly a person responds to stimulus depends on reaction time. Method: a co
|
An Analysis on Cloud Computing Technology Is Fostering the Foundation of Virtualization Dr. Satish Kumar, Assistant Professor, Department of Computer Science, Government College Narnaul, Distt. Mohindergarh, Haryana, India, Page No.: 282-285 ![]() ![]() ![]()
A computer has various resources comprising monitor, CPU (Central Processing Unit), networking devices, primary and auxiliary storage devices, printer-cum-scanner, track-pad and many more. In order to manage these resources, an operating system needs a scheduler which can define the pre-arrangement of resources lest some specific situation or a process demands it. Cloud computing systems are on the path of great success economically as they are capable of providing huge amount of different kinds
|
Educational Outcomes Across the Educational Spectrum Faraz Khan, Research Scholar, Department of Computer Science, The Glocal University, Saharanpur (U.P.) | Dr. Prof. Bhupendra Kumar, Professor, Department of Computer Science, The Glocal University, Saharanpur (U.P.) Page No.: 293-298 ![]() ![]() ![]()
The primary objective of this research is to develop and evaluate Artificial Intelligence (AI)-driven tools that enhance learning experiences and educational outcomes across various educational stages. By doing so, this study seeks to contribute to the growing body of knowledge on Artificial Intelligence (AI) in education and provide practical solutions for educators and policymakers striving to improve educational practices. In summary, this research embarks on a comprehensive exploration of Ar
|
An Efficient and Improved RDH-EI Jaideep Kumar, Dept. of Computer Science & Engineering, R.D Engineering College, Ghaziabad | Arti Sharma, Department of Electronics and Communication Engineering, R.D Engineering College, Ghaziabad Page No.: 275-283 ![]() ![]() ![]()
With the improvement of data innovation the datas are put away in the cloud and it should be ensure the security of data and the executives of the data simultaneously. By these requests the reversible data hiding in encoded images (RDH-EI) draws in an ever increasing number of analysts consideration. Here propose a novel system for RDH-EI dependent on RIT (Reverse image Transformation). Herethe substance of the first image can be tansform to the substance of another image. Then, at that point th
|
Clustering in Classification of Novel Techniques M Ramakrishna, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Praveen Kumar. Associate Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 292-296 ![]() ![]() ![]()
Data Distribution can be obtained by clustering data. In this work we observed the characteristics of selected cluster, and make a further study on particular clusters. Also, cluster analysis generally acts as the preprocessing of other data mining operations. Consequently, cluster analysis has become a very active research topic in data mining. Data mining is a new technology, developing with database as well as artificial intelligence. It is a processing procedure of extracting credible and ef
|
Artificial Intelligence (AI)-Powered Tools to Improve Learning Experiences Faraz Khan, Research Scholar, Department Of Computer Science, The Glocal University, Saharanpur (U.P.) | Dr. Prof. Bhupendra Kumar, Professor, Department Of Computer Science, The Glocal University, Saharanpur (U.P.) Page No.: 325-329 ![]() ![]() ![]()
The primary objective of this research is to develop and evaluate Artificial Intelligence (AI)-driven tools that enhance learning experiences and educational outcomes across various educational stages. By doing so, this study seeks to contribute to the growing body of knowledge on Artificial Intelligence (AI) in education and provide practical solutions for educators and policymakers striving to improve educational practices. In summary, this research embarks on a comprehensive exploration of Ar
|
Literature on the Hybrid Approaches and Load Balancing in the Cloud Y Shyam Sundar, Research Scholar, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) | Dr. Prateek Mishra, Professor, Department of Computer Science, SunRise University, Alwar, Rajasthan (India) Page No.: 309-314 ![]() ![]() ![]()
Recommender systems represent a high economic, social, and technological impact at international level due to the most relevant technological companies have been used them as their main services considering that user experience and companies sales have been improved. For this reason, these systems are a principal research area, and the companies optimize their algorithms with hybrid approaches that combine two or more recommendation strategies. A systematic literature review on the hybrid approa
|
Challenges and Opportunities Facing India"s Domestic Defence Industry, With A Focus on The Role of State Defence Production Agencies and The Private Sector Dr. Rajesh Kumar, Associate Professor, Department of Defence Study, Govt. College Ateli (Mahendergarh) , Haryana, India Page No.: 286-294 ![]() ![]() ![]()
The Indian defence industry has a long history, although modern weapons are just roughly 200 years old. The oldest known activity7 was the founding of the Gun Carriage Agency by the East India Company close to Calcutta at the start of the eighteenth century. It wasn't a particularly noteworthy development, but it signalled the creation of the Defence Industrial Base and slowly cultivated the country's specific skills, artisanal work practises, and knowledge for producing weapons. Since the milit
|
A Study on Emotional Analysis Based on Deep Learning Sudhanshu Raghuwanshi (Dept. of Computer Science and Engineering), Research Scholar, Glocal University, Saharanpur, Uttar Pradesh | Dr. Geetu Soni, Professor (Dept. of Computer Science and Engineering), Glocal University, Saharanpur, Uttar Pradesh Page No.: 336-349 ![]() ![]() ![]()
This research develops EmoNet, an emotion identification system using Deep Neural Networks, to accurately detect various facial emotions. EmoNet, with 40 layers, outperforms conventional models, achieving an 8% accuracy improvement on FER2013 and a 0.2% improvement on JAFFE, and can classify 3589 images into seven categories in under 2.77 seconds. The model handles variations in facial size, illumination, and angles, utilizing residual layers to enhance classification and engagement detection. T
|
Study on The Big Data Clustering Technique Anju, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar Assistant Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 312-315 ![]() ![]() ![]()
Clustering is a Machine Learning technique that involves the grouping of data points. Given a set of data points, we can use a clustering algorithm to classify each data point into a specific group. In theory, data points that are in the same group should have similar properties and/or features, while data points in different groups should have highly dissimilar properties and/or features. Clustering is a method of unsupervised learning and is a common technique for statistical data analysis us
|
Hybrid Type Demand Inventory Model for Perishable Items with Advance Payment Concerned Discount Facilities under the Effect of Inflation and Preservation Technology Jyoti Mishra, Dept, of Computer Application, Manipal University, Jaipur (Raj.) | Sushil Bhawaria, Dept. of mathematics & statistics, Manipal University Jaipur | Dr. Shailendra Shukla, Professor, Dept. of Mathematics, Arya PG College, Jaipur (Raj.) Page No.: 315-322 ![]() ![]() ![]()
The aim of this research is to demonstrate the optimal strategy of inventory system for perishable items with hybrid type demand under the effect of inflation partial backlogging and preservation technology with a certain ratio. Preservation technology (PT) used to control the deterioration. In this discipline, the concept of advance payment policy with discount facility is includes. This inventory is modeled mathematically by governing differential equations, and solving all these equation, in
|
FACE BASED EMOTION DETECTION SYSTEM USING HAAR-CASCADE AND CONVOLUTIONAL NEURAL NETWORK Deepak Kumar Verma, Department of Computer Science and Engineering, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur | Vibhash Yadav, Department of Information Technology, Rajkiya Engineering College Banda, India. | Alok Kumar, Department of Computer Science and Engineering,, University Institute of Engineering and Technology, Chhatrapati Shahu Ji Maharaj University, Kanpur Page No.: 293-308 ![]() ![]() ![]()
Computer vision has a tough time detecting human facial emotions. Emotion may now be discerned from a video or photograph using computer vision and machine learning. In this research, we will describe a technique for identifying facial emotion that makes use of the Haar-Cascade Classifier and convolutional neural networks. Seven distinct facial expressions were employed in the experiment based on data from FER2013, the facial expression recognition dataset. The epoch variety improves the CNN mod
|
Explainable AI for Engagement Prediction in Online and Offline Educational Environments Sunil Kumar, Research Scholar, Department of Technology and Computer Science, Glocal University, Saharanpur (Uttar Pradesh) | Dr. Amit Singla, Assistant Professor, Department of Technology and Computer Science, Glocal University, Saharanpur (Uttar Pradesh) Page No.: 298-310 ![]() ![]() ![]()
The integration of Artificial Intelligence (AI) in educational environments has revolutionized the way academic engagement is analyzed and predicted. However, the "black-box" nature of many AI models limits their interpretability, raising concerns about trust, fairness, and accountability. This research proposes an Explainable AI (XAI) framework for predicting student engagement in online and offline learning environments. By leveraging state-of-the-art deep learning models and incorporating explainability techniques such as SHAP (Shapley Additive Explanations), the study aims to enhance the transparency and usability of engagement prediction systems. The paper evaluates the proposed framework through extensive experimentation and a case study in a hybrid learning setup.
|
The Transition to Renewable Energy Right Now: States and Structural View Jyoti Mishra, Dept, of Computer Science, Manipal University, Jaipur (Raj.) | Dr. Shailendra Shukla, Professor, Dept. of Mathematics, Arya PG College, Jaipur (Raj.) Page No.: 299-304 ![]() ![]() ![]()
Indicators of climate change such as greenhouse gas concentrations, sea level rise, ocean heat, and ocean acidification each have new benchmarks set for the year 2011. These new benchmarks were created in the year 2011. This is yet another strong indicator that human activities are causing changes on a global scale on land, in the oceans, and in the atmosphere. These changes will have large and long-lasting effects, and this is yet another strong signal that these changes are being generated. If
|
Mental Health and Technology Pravesh Aggarwal, student, Vivekananda Global University, V I T Campus, Jagatpura, Seesyawas, Jaipur, Rajasthan | Anushka Sharma, student, Vivekananda Global University, V I T Campus, Jagatpura, Seesyawas, Jaipur, Rajasthan | Vanshdeep, student, Vivekananda Global University, V I T Campus, Jagatpura, Seesyawas, Jaipur, Rajasthan | Imran Khan, student, Vivekananda Global University, V I T Campus, Jagatpura, Seesyawas, Jaipur, Rajasthan Page No.: 303-306 ![]() ![]() ![]()
Qualitative and mixed methods play a prominent role in mental health services research. However, the standards for their use are not always evident, especially for those not trained in such methods. This paper reviews the rationale and common approaches to using qualitative and mixed methods in mental health services and implementation research based on a review of the papers included in this special series along with representative examples from the literature. Qualitative methods are used to
|
Study on the Reliability Evaluation of the Web-Based Software Kavita Vijaysingh Tiwari, Research Scholar, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) | Dr. Kailash Kumar Assistant Professor, Department of Computer Science, Monad University, Hapur, Uttar Pradesh (India) Page No.: 323-329 ![]() ![]() ![]()
The simulator developed in this chapter has been executed for 100000 number of simulation runs in order to compute system reliability for web-based software. The results obtained for web-based software reliability corresponding to different data sets of values of web page reliability. It is found that the system reliability increases as the web page reliability increases. The simulator described in his chapter will be of great importance to evaluate the reliability of web based software. The tra
|
Effective Resource Distribution Techniques for IOT on Cloud Computing Jeelan Basha G, Associate Professor, Harsha institute of management studies, Nelmagala, Bangalore Page No.: 303-309 ![]() ![]() ![]()
In cloud computing environments based on the Internet of Things, efficient resource allocation strategies are essential for maximizing performance and guaranteeing dependable service delivery. In order to define performance benchmarks and direct resource allocation, this study examines the function of policies and service-level agreements (SLAs) in cloud resource management. Policies and Service Level Agreements (SLAs) guarantee that cloud services follow established guidelines, enabling auto-sc
|
Role of Machine Learning Techniques Dr. Geetanjali, Assistant Professor, Sri Ganganagar Page No.: 304-308 ![]() ![]() ![]()
The main aim of this study is to discuss the Role of Machine Learning Techniques on Image Content Management. The thesis is advancement in the field of AIA that will improve image retrieval performance. The suggested approach comprises three basic stages: segmentation, feature extraction and annotation. Shape images are segmented using edge detection techniques, whereas colour images are segmented using thresholding, region-based, and clustering-based techniques. K-means clustering on the bright
|
Natural Language Processing: Enhancing Human-Computer Interaction Archana Chindhu Bhaware, Computer Science, Sunrise University, Alwar, Rajasthan | Dr. Mahender Kumar, Associate Professor, School of Computer Science, Sunrise University, Alwar, Rajasthan Page No.: 311-316 ![]() ![]() ![]()
The goal of the multidisciplinary discipline of natural language processing (NLP), which lies at the interface of artificial intelligence, computer science, psychology, and linguistics, is to improve human-computer interaction by enabling machines to comprehend and process human language. In order to describe and implement language comprehension and production, natural language processing (NLP) merges computer approaches with linguistic characteristics such as phonetics, syntax, semantics, and p
|
Transfer Learning Approach to Detect Emotions of an Online Learner Sudhanshu Raghuwanshi (Dept. of Computer Science and Engineering), Research Scholar, Glocal University, Saharanpur, Uttar Pradesh | Dr. Geetu Soni, Professor (Dept. of Computer Science and Engineering), Glocal University, Saharanpur, Uttar Pradesh Page No.: 320-327 ![]() ![]() ![]()
This paper introduces a Hybrid VGG16 model leveraging transfer learning to improve the accuracy of emotion detection in online learners. By freezing the initial layers of the VGG16 model and adding custom convolutional layers, the model is fine-tuned to effectively detect emotions, significantly outperforming traditional convolutional models in terms of accuracy and other evaluation metrics. The enhanced emotion detection system facilitates personalized learning by providing real-time emotional
|
Relationship of the Perceived Service Quality and Customer Satisfaction on Digital Printing Businesses Abhishek Shukla, Department of computer science, R D engineering College, Ghaziabad Page No.: 318-332 ![]() ![]() ![]()
The study investigates the relationship between perceived service quality and customer satisfaction among digital printing businesses in Santiago City. The relationship between the demographic profile and customer satisfaction was also examined. This cross-sectional study is based on primary and secondary data. A sample of 369 respondents who availed of the service at least once from the various digital printing businesses in Santiago City participated in the study. A non-probability sampling te
|
Monitoring the Levels of Antiepileptic Drugs for Therapeutic Purposes: An Overview of the Current Situation and Potential Future Advancements Ashutosh Pradhan, Department of computer science, R D engineering College, Ghaziabad Page No.: 315-321 ![]() ![]() ![]()
Antiepileptic drugs (AEDs) play a crucial role in treating epilepsy, with expected variability in their pharmacokinetics across diverse patient groups such as children, the elderly, pregnant individuals, and those undergoing polytherapy with potential drug interactions. Additionally, ensuring patient adherence is essential. Therapeutic drug monitoring (TDM) serves as a valuable tool for maintaining treatment quality. Given the prevalence of pharmacokinetic variability among AEDs, TDM enables a p
|
Advanced Strategies for Balancing Data Privacy and Accountability in Modern Cloud Computing Environments Vishal kohli, Research Scholar (Computer Science) The Glocal University Saharanpur, Uttar Pradesh | Dr. Geetu Soni, Associate Professor, Research Supervisor, Glocal School of Technology & Computer Science, The Glocal University, Saharanpur, Uttar Pradesh Page No.: 382-386 ![]() ![]() ![]()
This research examines the roles of cloud service providers, businesses, and end users in relation to the adoption, effectiveness, and challenges associated with various data privacy and accountability strategies in cloud computing. The study emphasizes key strategies that demonstrate significant acceptance and effectiveness, such as encryption, multi-factor authentication, and adherence to regulations, based on a structured survey involving 250 participants. However, newer methods, particularly AI-driven privacy tools, encounter considerable challenges due to their technical intricacies. The findings indicate that end users play a vital role in adhering to best practices, while cloud service providers hold the primary responsibility for ensuring security and compliance. Additionally, the research outlines how liability and privacy concerns are distributed among stakeholders. It underscores the importance of robust frameworks and continuous improvements in cloud security and privacy measures.
|
Software Reliability Prediction Model for Interlocking Software Nidhi, Research Scholar, Mewar University, Chittorgarh, Rajasthan | Pradeep Tomar, Research Supervisor, Professor Dept. of ICT, Gautam Buddha University, UP Page No.: 432-438 ![]() ![]() ![]()
Software reliability is a critical aspect of ensuring the safe and efficient operation of various systems, including safety-critical applications like interlocking software in railway control systems. This research paper proposes a novel Software Reliability Prediction Model (SRPM) specifically designed for interlocking software to improve system reliability. The model incorporates various factors such as software complexity, fault density, and operational profile, leveraging historical data and
|
Internet Data Gathering Using the Web Mining Raval Chandni Sudhirkumar, Research Scholar, Department of Computer Application, Shri Jagdishprasad Jhabarmal Tibreuniversity, Vidyanagari, Jhunjhunu, Rajasthan | Dr. Ajit Kumar, Assistant Professor, Department of Computer Application, Shri Jagdishprasad Jhabarmal Tibreuniversity, Vidyanagari, Jhunjhunu, Rajasthan Page No.: 402-409 ![]() ![]() ![]()
"Web usage mining" refers to the process of analysing the patterns of user access to web servers. This article is written in response to questions about the limitations of data mining. Our primary focus will be on the many approaches that may be taken to obtain information that is kept on the internet via the use of these technologies. Additionally, we discussed cloud mining, which is a method that involves the utilisation of cloud computing in order to gather information from the internet. The
|
Optimizing Information Correspondence for Efficient Communication in Mobile Ad Hoc Networks Manoj Kumar Chaudhary, Research Scholar, Department of Computer Science, Sun Rise University | Dr. Lalit Kumar Khatri, Department of Computer Science, Sun Rise University Page No.: 570-574 ![]() ![]() ![]()
In this article, an outline of secure extraordinarily delegated directing shows for remote frameworks was introduced. Improvised framework is a social event of center points that is related through a distant medium outlining rapidly developing geography. Attacks on extraordinarily designated framework controlling shows upset arrange execution and steady quality with their game plan. We rapidly show the most notable shows that take after the table- driven and the source-began on-demand draws near. The association-flanked by the proposed courses of action and boundaries of uncommonly selected framework shows the execution as demonstrated by secure shows. We discuss in this paper coordinating show and challenges and moreover look at check in uniquely designated framework.
|
Strategies For Enhancing Security and Mitigating Risks in Web-Based Interpersonal Organizations Rohit Kumar, Research Scholar, Department of Computer Science, Sun Rise University | Dr. Lalit Kumar Khatri, Department of Computer Science, Sun Rise University Page No.: 575-581 ![]() ![]() ![]()
The security of web applications remains a critical concern amidst escalating cyber threats and vulnerabilities, which increasingly target organizations' digital infrastructures. This research paper delves into the results of an experimental study conducted on five websites using advanced pentest scanning tools to uncover prevalent security vulnerabilities and identify critical security gaps. The study revealed common yet significant vulnerabilities, including SQL injection, cross-site scripting (XSS), missing HttpOnly and Secure flags, insufficient Content-Security-Policy configurations, and weak authentication mechanisms. These findings underscore the urgent need for a comprehensive framework to enhance web application security. To address these challenges, this research introduces the Quality Enhancement Model for Secured Web Applications (QEMSWA), an innovative framework designed to fortify web application security through proactive and systematic approaches. The QEMSWA model incorporates best practices, including asset identification, secure coding guidelines, static and dynamic code reviews, real-time vulnerability assessments, and continuous monitoring. It also integrates advanced defensive mechanisms, such as automated patch management, AI-powered anomaly detection, and robust encryption protocols, to mitigate emerging threats. Furthermore, the study emphasizes the importance of fostering a security-centric organizational culture by prioritizing employee training, secure development lifecycle (SDL) adoption, and regular penetration testing. The proposed QEMSWA model offers actionable recommendations and a roadmap for organizations aiming to minimize risks, enhance resilience, and establish a secure digital environment. By bridging gaps between theoretical concepts and practical implementation, this research contributes to the ongoing efforts to standardize web security practices and reduce vulnerabilities in web applications.
|
A Theoretical Exploration of Data Types in Deep Learning for Academic Engagement Analysis in Online and Offline Learning Frameworks Sunil Kumar, Research Scholar, Department of Technology and Computer Science, Glocal University, Saharanpur (Uttar Pradesh) | Dr. Amit Singla, Assistant Professor, Department of Technology and Computer Science, Glocal University, Saharanpur (Uttar Pradesh) Page No.: 624-633 ![]() ![]() ![]()
This paper explores the various data types employed in deep learning methodologies for analyzing academic engagement in both online and offline learning frameworks. The study examines textual, visual, audio, and multimodal data sources and their implications in assessing student participation, motivation, and performance. By comparing online and offline learning environments, the paper provides a comprehensive understanding of the role of deep learning in enhancing academic engagement. This theoretical exploration aims to inform educators, researchers, and policymakers on the applicability of deep learning techniques to educational contexts.
|