Search Results - "Kumar Gupta, Bineet"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Naïve Bayes Approach for Word Sense Disambiguation System With a Focus on Parts-of-Speech Ambiguity Resolution by Abraham, Ajith, Kumar Gupta, Bineet, Sachindeo Maurya, Archana, Bhushan Verma, Satya, Husain, Mohammad, Ali, Arshad, Alshmrany, Sami, Gupta, Sanjay

    Published in IEEE access (2024)
    “…Natural languages are written and spoken languages, and NLP (Natural Language Processing) is the ability of a computer program to recognize both written and…”
    Get full text
    Journal Article
  2. 2
  3. 3
  4. 4

    Containerization and its Architectures: A Study by Verma, Satya Bhushan, Pandey, Brijesh, Kumar Gupta, Bineet

    “…Containerization is a technique for lightweight virtualization of programs in cloud computing, which leads to the widespread use of cloud computing. It has a…”
    Get full text
    Journal Article
  5. 5
  6. 6

    A hybrid framework to prevent VANET from Sybil Attack by Faisal, Syed Mohd, Kumar Gupta, Bineet, Zaidi, Taskeen

    “…The commuter having mobile vehicle attain a widespread safety with the proper use of Vehicular Ad-hoc Network (VANET). Instead of apparent most of the opaque…”
    Get full text
    Conference Proceeding
  7. 7

    Integrated hesitant fuzzy-based decision-making framework for evaluating sustainable and renewable energy by Sahu, Kavita, Srivastava, R. K., Kumar, Sarvesh, Saxena, Manish, Gupta, Bineet Kumar, Verma, Ravi Prakash

    “…Energy can be generated from renewable sources such as geothermal heat, rain, wind, tides, and sunlight. All nations' economies and political systems depend on…”
    Get full text
    Journal Article
  8. 8

    A Review of Cloud Security Issues and Challenges by Agarwal, Anamika, Verma, Satya Bhushan, Gupta, Bineet Kumar

    “…The advancement of information technology today depends on cloud computing. Every cloud consumer continues to search for the best services available,…”
    Get full text
    Journal Article
  9. 9

    Detection and prevention of Sybil attack in VANET using modified ACO by Faisal, Syed Mohd, Gupta, Bineet Kumar, Zaidi, Taskeen

    “…Security is a primary concern in wireless networks, such as mobile ad-hoc network, vehicular ad-hoc network. Attacks are regarded as serious security issues in…”
    Get full text
    Conference Proceeding
  10. 10

    Smart Cards with Biometric Influences: An Enhanced ID Authentication by Singh, Praveen Kumar, Kumar, Neeraj, Gupta, Bineet Kumar

    “…Management of flow of all kinds of objects including human beings signifies their real time monitoring. This paper outlines the advantages accrued out of…”
    Get full text
    Conference Proceeding
  11. 11

    Radio Frequency Identification (RFID) Standardization: Issues in Pursuit of Global Accomplishment by Singh, Praveen Kumar, Kumar, Neeraj, Gupta, Bineet Kumar

    “…Management of flow of all kinds of objects including human beings signifies their real time monitoring. It demands online updating of database in the flow of…”
    Get full text
    Conference Proceeding
  12. 12

    Formation of algorithms module and dynamic interface in web mining and storage process to retrieve metadata by Gupta, Bineet Kumar, Hussain, Mohd, Tiwari, Neeraj Kumar

    Published in 2014 Science and Information Conference (01-08-2014)
    “…Web system technology is rapidly used by most of the users and there has been a speedy change in the technology to access the information in past fifteen years…”
    Get full text
    Conference Proceeding Journal Article