Zobrazeno 1 - 10
of 12
pro vyhledávání: '"Kamal Mistry"'
Publikováno v:
2022 IEEE 7th International conference for Convergence in Technology (I2CT).
Purpose Online learning is essential in today’s world. The COVID-19 has resulted in shutting down all the universities across the globe. Countries like India and Turkey (lower-income countries) are suffering a lot in giving the best classroom pract
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e4268ce4f1201f6c92efe9f9ae346aa1
https://avesis.sdu.edu.tr/publication/details/507f1046-d843-4651-ae5f-6533faff5890/oai
https://avesis.sdu.edu.tr/publication/details/507f1046-d843-4651-ae5f-6533faff5890/oai
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9789811640155
Language is the primary means of communication used by every individual. It is a tool to express greater ideas of ideas and emotions. It shapes thoughts and carries meanings. Indian Sign Language (ISL) used by the Deaf Community in India, does have l
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::088a3d53383cb6ad3245aa25db5cf4dc
https://doi.org/10.1007/978-981-16-4016-2_47
https://doi.org/10.1007/978-981-16-4016-2_47
Publikováno v:
ICCCS
The advent of technologies emphasizing on 3-D model reconstruction, shows a tremendous potential for application in medical imaging, specifically in anomaly detection for target organs. Medical practitioners. Bearing this in mind, the objective of ou
Autor:
Kamal Mistry, Prathamesh Churi
Publikováno v:
Circulation in Computer Science. 2:23-27
In most cases, usually, when a web application or a website is fully developed it is released over the internet and if not provided with proper security then it is susceptible to input validation attacks; specifically SQLIA, XSS, Buffer Overflow. A w
Publikováno v:
2019 IEEE International Conference on System, Computation, Automation and Networking (ICSCAN).
Credit card fraud is one of the most prevalent issues of this century. Its detection and prevention is of the utmost importance to various banks and other financial institutions. This paper discusses a plethora of detection techniques ranging from Ge
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811399411
This paper presents a new approach to study the use of the Presentation Architecture Control model in Business Intelligence. BI Tools are in heavy demand as they are used to extract data components and reports. The model view controller architecture
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50cf849719a9c637db927378c4cac73c
https://doi.org/10.1007/978-981-13-9942-8_62
https://doi.org/10.1007/978-981-13-9942-8_62
Publikováno v:
2018 Fifth HCT Information Technology Trends (ITT).
The domain of cloud computing has transformed from a niche domain to a ubiquitous one. Cloud computing basically means access to shared computing resources such as network, storage and, IT. over the internet on a pay-as-you-use basis. There are three
Publikováno v:
IJARCCE. :425-429
Cloud computing is one of the emerging field in the IT industry and is widely adopted across the globe due to the easy accessibility and availability of the data from any location in the world over the internet. The era of cloud computing has reduced
Publikováno v:
2017 International Conference on Networks & Advances in Computational Technologies (NetACT).
Cloud Computing is the current trend and will be future era because of its advantages like pay per usage and on demand services. Load Balancing is a key aspect of Cloud Computing. It is the distribution of network or applications traffic across a num