Search Results - "Motwani, Deepak"
-
1
Intuitionistic fuzzy divergence measure-based ELECTRE method for performance of cellular mobile telephone service providers
Published in Neural computing & applications (01-04-2020)“…In India, Telecom sector has been enduring a massive growth for over two and half decades in the bandwidth, preference of services and depth of penetration in…”
Get full text
Journal Article -
2
Extended MABAC method based on divergence measures for multi-criteria assessment of programming language with interval-valued intuitionistic fuzzy sets
Published in Granular computing (Internet) (2020)“…Programming languages (PLs) are symbolic instruction for writing programs, which have qualifications of evaluation of algorithm. The basic idea of programming…”
Get full text
Journal Article -
3
Multi-criteria assessment of cellular mobile telephone service providers using intuitionistic fuzzy WASPAS method with similarity measures
Published in Granular computing (Internet) (01-07-2019)“…The objective of this paper is to construct an outline to explore the performance of cellular mobile telephone service providers (TSPs) in the Madhya Pradesh…”
Get full text
Journal Article -
4
Minimized Computations of Deep Learning Technique for Early Diagnosis of Diabetic Retinopathy Using IoT-Based Medical Devices
Published in Computational intelligence and neuroscience (14-09-2022)“…Diabetes mellitus is the main cause of diabetic retinopathy, the most common cause of blindness worldwide. In order to slow down or prevent vision loss and…”
Get full text
Journal Article -
5
Enhancing Network Intrusion Detection with Support Vector Machines: A Comparative Study of Feature Selection Techniques
Published in 2024 5th International Conference on Smart Electronics and Communication (ICOSEC) (18-09-2024)“…This research investigates the impact of feature selection techniques on the performance of Support Vector Machine (SVM)-based Network Intrusion Detection…”
Get full text
Conference Proceeding -
6
An Efficient Crypto Based Ransomware Prevention Method in Android Platform
Published in 2024 IEEE 3rd World Conference on Applied Intelligence and Computing (AIC) (27-07-2024)“…A relatively new kind of intrusion attack called ransomware aims to demand a ransom from its target. Ransomware attacks are carried out by cybercriminals to…”
Get full text
Conference Proceeding -
7
Using Machine Learning to Predict Diabetes Early on
Published in 2024 International Conference on Healthcare Innovations, Software and Engineering Technologies (HISET) (18-01-2024)“…Diabetes is a category of metabolic disease caused by a prolonged high blood sugar level. It is sometimes referred to as a chronic disease. If accurate early…”
Get full text
Conference Proceeding -
8
An Approach to Enhance the Performance of Hadoop MapReduce Framework for Big Data
Published in 2016 International Conference on Micro-Electronics and Telecommunication Engineering (ICMETE) (01-09-2016)“…Data analysis is becoming one of the highest research topic among researchers. Information is the baseline of every small and big organization. Everyone wants…”
Get full text
Conference Proceeding -
9
A Smart Irrigation System Powered by IoT and Machine Learning for Optimal Water Management
Published in 2024 4th International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) (14-05-2024)“…In this innovative quest for more efficient irrigation, we investigate the combined use of sensor technology and machine intelligence to optimise agricultural…”
Get full text
Conference Proceeding -
10
Forecasting the Survival and Mortality of Patients by Machine Learning Trained on Heart Failure Clinical Imbalanced Data
Published in 2024 IEEE International Conference on Interdisciplinary Approaches in Technology and Management for Social Innovation (IATMSI) (14-03-2024)“…A heart attack arises when blood flow in a heart is strictly reduced or congested. The blockage generally comes from the accretion of cholesterol, sugar, fats,…”
Get full text
Conference Proceeding -
11
The Based on Rough Set Theory Development of Decision Tree after Redundant Dimensional Reduction
Published in 2015 Fifth International Conference on Advanced Computing & Communication Technologies (01-02-2015)“…Decision tree technologists have been examined to be a helpful way to find out the human decision making within a host. Decision tree performs variable…”
Get full text
Conference Proceeding Journal Article -
12
BODH: A model for information retrieval from research articles
Published in 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (01-03-2015)“…This paper pertain of design a model retrieval of information from an intelligent model (Bodh model) which helps researchers to save time at the time of…”
Get full text
Conference Proceeding -
13
An efficient data replication and load balancing technique for fog computing environment
Published in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) (01-03-2016)“…The technological environment is a competitive ground used by IT industries for provisioning Cloud services. It is essential for the organizations to…”
Get full text
Conference Proceeding