Search Results - "Chaudhary, Dev Kumar"
-
1
Extensive review on software testing and pipeline testing softwares
Published in 2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC) (01-03-2017)“…The main aim of this paper is to explain the various types of testing techniques, methods and levels(functional, unit) which are being used by many Software…”
Get full text
Conference Proceeding -
2
Sentiment Analysis Using Rnn and Google Translator
Published in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01-01-2018)“…Sentimental analysis is the term which is used to refer the usage of NLP (Natural language processing), Analysis of text, linguistics related to computers or…”
Get full text
Conference Proceeding -
3
Contrastive study of Simple PageRank, HITS and Weighted PageRank algorithms: Review
Published in 2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence (01-01-2017)“…Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing…”
Get full text
Conference Proceeding -
4
Stock Prediction Using Functional Link Artificial Neural Network (FLANN)
Published in 2017 3rd International Conference on Computational Intelligence and Networks (CINE) (01-10-2017)“…Stock exchange that is, buying and selling of stock is considered to be an important factor in the economy sector. The Stockbrokers typically use time series…”
Get full text
Conference Proceeding -
5
Combating Counterfeit Drugs: A quantitative analysis on cracking down the fake drug industry by using Blockchain technology
Published in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01-01-2019)“…India, a global leader in manufacturing and the largest supplier of cost-effective generic drugs around the world, especially to the African countries under…”
Get full text
Conference Proceeding -
6
Steganography for Confidential Communication and Secret Data storage
Published in 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT) (01-08-2018)“…Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the…”
Get full text
Conference Proceeding -
7
Analysis of Vulnerabilities in Radio Frequency Identification (RFID) Systems
Published in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01-01-2018)“…The purpose of writing this paper is to analyze the types of vulnerabilities that can be found in radio frequency identification (RFID) systems and to check…”
Get full text
Conference Proceeding -
8
A Review on Hidden Debts in Machine Learning Systems
Published in 2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT) (01-08-2018)“…In the present situation, Machine Learning provides a very sturdy toolkit for building applicable and useful complex prediction systems by providing new…”
Get full text
Conference Proceeding -
9
Modified Page Rank Algorithm: Efficient Version of Simple Page Rank with Time, Navigation and Synonym Factor
Published in 2017 3rd International Conference on Computational Intelligence and Networks (CINE) (01-10-2017)“…The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to…”
Get full text
Conference Proceeding -
10
Comparative study of WSN Protocols (LEACH, PEGASIS and TEEN)
Published in 2015 Third International Conference on Image Information Processing (ICIIP) (01-12-2015)“…With this study three "Wireless Sensor Networks" protocols are being reviewed on the basis of their functioning. "Low Energy Adaptive Clustering Hierarchy"…”
Get full text
Conference Proceeding -
11
ECG Diagnosis Using Digital Image Processing
Published in 2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence) (01-01-2018)“…Electrocardiogram is a standout amongst the most generally utilized indicative apparatuses for heart maladies these days. By the by, the exact ECG elucidation…”
Get full text
Conference Proceeding -
12
Hybrid edge detection technique for digital images
Published in 2016 International Conference on Computing, Communication and Automation (ICCCA) (01-04-2016)“…This paper suggests a novel algorithm for edge detection in digital images. A new hybrid technique is also developed by the use of canny operator, Sobel…”
Get full text
Conference Proceeding -
13
Search engine optimization: Success factors
Published in 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC) (2016)“…With the advent of Internet and Search Engine Optimization techniques, various factors came into existence like On the Page and Off the Page Optimization of…”
Get full text
Conference Proceeding -
14
Mood Based Classification of Music by Analyzing Lyrical Data Using Text Mining
Published in 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) (01-09-2016)“…This research task looks at the part lyric content and additionally audio features can play in enhancing audio music mood arrangement. With the developing…”
Get full text
Conference Proceeding