Search Results - "Ashish Dhondiyal, Shiv"

Refine Results
  1. 1

    Machine Learning Approach for Malware Analysis and Detection by Singh Rana, Deepak, Chandra Dimri, Sushil, Singh Rawat, Ramesh, Ashish Dhondiyal, Shiv, Dogra, Akash

    “…According to research, Cybercrime has grown dramatically over the past ten years, costing several firms a significant amount of money. Various anti-virus…”
    Get full text
    Conference Proceeding
  2. 2

    A Novel Clustering Protocol Using Fuzzy Logic by Aeri, Manisha, Dhondiyal, Shiv Ashish

    “…The presented systems are efficient in terms of key sensitivity, decrypted picture quality, confusion and diffusion, and speed. The clustering approach use…”
    Get full text
    Conference Proceeding
  3. 3

    Detection of Epilepsy Disease Using Support Vector Machine Based on EEG Signals by Dhondiyal, Shiv Ashish, Dimri, Sushil Chandra

    “…Epilepsy disease related to nervous system of the brain characterised by unusual brain activity, including seizures. The EEG signals are transcription of…”
    Get full text
    Conference Proceeding
  4. 4

    Diagnosis, Treatment and Containment of Epilepsy Disease by Dhondiyal, Shiv Ashish, Dimri, Sushil Chandra

    “…The research work includes a thorough examination of the evolution of Epilepsy Disease, its symptoms, therapies, and progression, as well as algorithmic…”
    Get full text
    Conference Proceeding
  5. 5

    Plans and strategies for Growth Specialists' Projects by Poddar, Subham, Dhondiyal, Shiv Ashish, Dumka, Ankur

    “…Managing IT systems are essential vital so as to govern the facilities associated to that system appropriately. As for certain firms happining troubles with…”
    Get full text
    Conference Proceeding
  6. 6

    DDoS Attacks Detection in IoT Networks using Naive Bayes and Random Forest by Srivastava, Animesh, Tiwari, Shweta, Rawat, Bhupender Singh, Dhondiyal, Shiv Ashish

    “…The proliferation of Internet of Things (IoT) devices has resulted in numerous benefits, including streamlined tasks and improved connectivity but has also…”
    Get full text
    Conference Proceeding
  7. 7

    Performance Evaluation of Cotton Leaf Disease Detection Using Deep Learning Models by Singh, Gulbir, Aggarwal, Ritu, Bhatnagar, Vivek, Kumar, Suneet, Dhondiyal, Shiv Ashish

    “…Cotton plant diseases significantly impact developing nations' economies and pose a threat to the textile industry. Detecting these diseases is challenging due…”
    Get full text
    Conference Proceeding
  8. 8

    Role of AI in Enhancing Health Insurance Penetration in Rural India by Singh, Gulbir, Aggarwal, Ritu, Kumar, Suneet, Nagpa, Shally, Dhondiyal, Shiv Ashish

    “…Despite significant advancements in healthcare infrastructure, rural India faces challenges in obtaining and using health insurance services. Limited…”
    Get full text
    Conference Proceeding
  9. 9

    Potato Leaf Disease Detection Method Based on the YOLO Model by Srivastava, Animesh, Rawat, Bhupender Singh, Bajpai, Prashant, Dhondiyal, Shiv Ashish

    “…Global potato production is at risk because of potato leaf diseases, which cause huge economic losses. To ensure crop productivity and disease management,…”
    Get full text
    Conference Proceeding
  10. 10

    Rainfall Prediction Using Machine Learning by Bartwal, Kanchan, Pathak, Nilotpal, Alexander, John, Aeri, Manisha, Dhondiyal, Shiv Ashish, Awasthi, Shashank

    “…Rainfall prediction is crucial across various sectors, and this research examines the effectiveness of machine learning (ML) algorithms in forecasting rainfall…”
    Get full text
    Conference Proceeding
  11. 11

    IoT Attack Detection Using LSTM Model by Srivastava, Animesh, Sawan, Vikash, Jugnu, Kumari, Dhondiyal, Shiv Ashish

    “…It is suggested in this paper that an LSIM model be used to find DDoS attacks, which usually involve patterns of bad traffic that happen over time. The idea…”
    Get full text
    Conference Proceeding
  12. 12

    Efficient Authentication Scheme for IoT in Smart Homes by Srivastava, Animesh, Saini, Parveen Kumar, Singh, Gulbir, Kumar, Gautam, Dhondiyal, Shiv Ashish

    “…In a smart home, all of the devices can talk to each other and the owner from anywhere in the world, thanks to the internet connection. The term…”
    Get full text
    Conference Proceeding
  13. 13

    An Enhanced Secure Authentication Scheme for the Internet of Things by Neetu, Srivastava, Animesh, Barik, Lal Bihari, Dhondiyal, Shiv Ashish

    “…The Internet of Things (IoT) has led to the proliferation of interconnected devices, including smart appliances and industrial sensors. Nevertheless, the rapid…”
    Get full text
    Conference Proceeding
  14. 14

    IoT Attack Detection Using Artificial Neural Network by Srivastava, Animesh, Sawan, Vikash, Saini, Parveen Kumar, Dhondiyal, Shiv Ashish

    “…As billions of devices are now connected to the Internet, the Internet of Things has become an integral part of modern life. However, hackers are constantly…”
    Get full text
    Conference Proceeding
  15. 15

    Back Propagation Neural Network-Based Routing Optimization for IoT by Maurya, Sant Kumar, Srivastava, Animesh, Saini, Parveen Kumar, Gupta, Rajeev, Dhondiyal, Shiv Ashish

    “…The Internet of Things (IoT) has fundamentally changed how we engage with the environment that surrounds us by facilitating the connection of various devices…”
    Get full text
    Conference Proceeding
  16. 16

    Child Health Tracking System Using React by Bhatt, Chandradeep, Rawat, Shubham, Chauhan, Rahul, Kumar, Devendra, Kumar, Mukesh, Dhondiyal, Shiv Ashish

    “…The new generation of children faces increased vulnerability, particularly due to the rise of remote learning and excessive screen time leading to a sedentary…”
    Get full text
    Conference Proceeding
  17. 17

    Customer Churn Prediction in Telecom Services by Aeri, Manisha, Dhondiyal, Shiv Ashish, Rana, Yash, Rawat, Suraj, Kothari, Piyush, Adhikari, Ritik

    “…Customer churn, sometimes referred to as attrition or defection of customers, is the process through which consumers discontinue their affiliation with a…”
    Get full text
    Conference Proceeding
  18. 18

    Attack Detection and Mitigation in IoT using SVM by Srivastava, Animesh, Tiwari, Shweta, Saini, Parveen Kumar, Sawan, Vikash, Dhondiyal, Shiv Ashish

    “…As the Internet of Things (IoT) increases along with the cost of sensors decrease, more and more people are interested in the concept of the Internet of Things…”
    Get full text
    Conference Proceeding
  19. 19

    Predicting Mobile Prices with Machine Learning Techniques by Rana, Deepak Singh, Dhondiyal, Shiv Ashish, Singh, Sumeshwar, Kukreti, Sanjeev, Dhyani, Ashish

    “…Smartphones are increasingly vital to people on a daily basis. Telephones are utilized in all aspects of life, ranging from personal to professional, due to…”
    Get full text
    Conference Proceeding
  20. 20

    Epilepsy Seizure Detection Using Optimised KNN Algorithm Based on EEG by Dogra, Akash, Dhondiyal, Shiv Ashish, Rana, Deepak Singh

    “…Modern artificial intelligence relies heavily on the concept of machine learning. It has rapidly developed and been used widely in numerous sectors during the…”
    Get full text
    Conference Proceeding