Zobrazeno 1 - 10
of 28
pro vyhledávání: '"A J Umbarkar"'
Publikováno v:
ICTACT Journal on Communication Technology, Vol 8, Iss 2, Pp 1533-1539 (2017)
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and
Externí odkaz:
https://doaj.org/article/f53ae92569a64429b3ddae8c661a27c1
Publikováno v:
2022 3rd International Conference for Emerging Technology (INCET).
Autor:
A. J. Umbarkar, M. S. Joshi
Publikováno v:
ICTACT Journal on Soft Computing, Vol 3, Iss 4, Pp 615-622 (2013)
Genetic Algorithm (GA), a stochastic optimization technique, doesn’t ensure optimal solution every time. Nowadays there is a need to improve the performance of each and every application so that the time required for obtaining quality solution can
Externí odkaz:
https://doaj.org/article/659fb0a7b3394909a051653906532b12
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811507502
Jaya algorithm is population-based parameter less heuristic algorithm. The algorithm requires only control parameters like population size and a number of iterations and two stochastic steps (three random number generators). This paper presents an in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f5c3ab4850f6f57d43f9ecfcd7a8ec24
https://doi.org/10.1007/978-981-15-0751-9_56
https://doi.org/10.1007/978-981-15-0751-9_56
Publikováno v:
ICT Analysis and Applications ISBN: 9789811506291
Clustering is grouping of similar data points in clusters. Clustering has many applications, particularly in big data analytics. In data mining, traditional algorithm are used for clustering. These algorithms are inefficient in terms quality of clust
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a79227228b754bf334e386a5dc451f0c
https://doi.org/10.1007/978-981-15-0630-7_52
https://doi.org/10.1007/978-981-15-0630-7_52
Publikováno v:
ICTACT Journal on Communication Technology, Vol 8, Iss 2, Pp 1533-1539 (2017)
Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and
Publikováno v:
Techno-Societal 2018 ISBN: 9783030168476
India has larger agricultural lands but it does not cross the world’s standard in plant productivity. There are many reasons for low plant yield. To improve the productivity, technological support system for agriculture is essential. This paper pre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::a970df17000284b4a0731ee792ab7991
https://doi.org/10.1007/978-3-030-16848-3_43
https://doi.org/10.1007/978-3-030-16848-3_43
Publikováno v:
ICTACT Journal on Image and Video Processing, Vol 6, Iss 3, Pp 1185-1191 (2016)
Steganography is a very pivotal technique mainly used for covert transfer of information over a covert communication channel. This paper proposes a significant comparative study of the spatial LSB domain technique that focuses on sharper edges of the
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811315916
SocProS (1)
SocProS (1)
From past four decades, many heuristic algorithms are proposed by researchers for solving complex engineering problems. The main source of inspiration of these algorithms is the intelligence present in different parts of nature. These algorithms are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::eb9ef774e592f39bbbf79a3064f8ab06
https://doi.org/10.1007/978-981-13-1592-3_76
https://doi.org/10.1007/978-981-13-1592-3_76
Autor:
P. D. Sheth, A. J. Umbarkar
Publikováno v:
ICTACT Journal on Soft Computing, Vol 6, Iss 1, Pp 1083-1092 (2015)
The performance of Genetic Algorithm (GA) depends on various operators. Crossover operator is one of them. Crossover operators are mainly classified as application dependent crossover operators and application independent crossover operators. Effect