Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Dev Kumar Chaudhary"'
Publikováno v:
2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
India, a global leader in manufacturing and the largest supplier of cost-effective generic drugs around the world, especially to the African countries under the United Nations aid, is facing a widespread fake drug epidemic. One of the major reasons b
Publikováno v:
2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT).
In the present situation, Machine Learning provides a very sturdy toolkit for building applicable and useful complex prediction systems by providing new methods for creating high-show software. Unlike traditional software engineering, the collection
Publikováno v:
2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT).
Rapid changes in the technology and the availability of the sources have resulted in large amount of useful information to be shared from one person to the other over the internet in some seconds. As the information is quiet sensitive and important i
Autor:
Dev Kumar Chaudhary, Dipti Mahajan
Publikováno v:
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
Sentimental analysis is the term which is used to refer the usage of NLP (Natural language processing), Analysis of text, linguistics related to computers or machines and the metrics of biology termed as biometrics. Sentimental analysis is carried ou
Publikováno v:
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
Electrocardiogram is a standout amongst the most generally utilized indicative apparatuses for heart maladies these days. By the by, the exact ECG elucidation is basically required with a specific end goal to assess the significant data inner side th
Publikováno v:
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence).
The purpose of writing this paper is to analyze the types of vulnerabilities that can be found in radio frequency identification (RFID) systems and to check how easy or difficult it is to compromise the security of RFID tags. This paper presents two
Publikováno v:
2017 3rd International Conference on Computational Intelligence and Networks (CINE).
Stock exchange that is, buying and selling of stock is considered to be an important factor in the economy sector. The Stockbrokers typically use time series or technical analysis in predicting the stock price. These techniques are based on trends an
Publikováno v:
2017 3rd International Conference on Computational Intelligence and Networks (CINE).
The outburst growth and the wide accessibility of the internet has aroused gush of investigate motion in the area of information retrieval on the Web. Due to expansion of internet, it is necessary to remain locational competence to attract user needs
Publikováno v:
2017 International Conference on Big Data Analytics and Computational Intelligence (ICBDAC).
The main aim of this paper is to explain the various types of testing techniques, methods and levels(functional, unit) which are being used by many Software industries. These software industries use these techniques to find faults or bugs in the fina
Autor:
Tuhena Sen, Dev Kumar Chaudhary
Publikováno v:
2017 7th International Conference on Cloud Computing, Data Science & Engineering - Confluence.
Web mining is a very important research subject. It's basically an application of data mining to find concealed information on web. Internet has been providing us with boundless source of information according to our need. In recent times search tool