Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Nitesh Naik"'
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811958670
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::42d1a653231ba4331b45756b819c57c0
https://doi.org/10.1007/978-981-19-5868-7_20
https://doi.org/10.1007/978-981-19-5868-7_20
Publikováno v:
Environmental Earth Sciences. 82
Autor:
Nitesh Naik, Bm Zeeshan Hameed, Sadaf Karim Sulaiman, Ewa Bres-Niewada, Kithmini N. Gamage, Bhaskar K. Somani, Enakshee Jamnadass, Yosef Philip-McKenzie
Publikováno v:
Central European Journal of Urology
Introduction Maintaining hydration reduces incidence of kidney stone disease (KSD), chronic kidney disease (CKD) and urinary tract infections (UTIs). Mobile applications (apps) measuring hydration are gaining in usage, allowing users to monitor intak
Autor:
Nitesh Naik, Ankita Naik
Publikováno v:
Advances in Intelligent Systems and Computing ISBN: 9789811535130
The number of deaths caused due to cardiovascular ailments is increasing day by day. Prediction of such deadly disease is an unwieldy job for the medical practitioners as it needs adequate experience and knowledge. This study focuses on the real prob
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b3ed589fad870826491b6ade6bb2a6db
https://doi.org/10.1007/978-981-15-3514-7_2
https://doi.org/10.1007/978-981-15-3514-7_2
Autor:
Ankita Naik, Nitesh Naik
Publikováno v:
International Journal of Computer Applications. 181:14-18
Autor:
Nitesh Naik, Jyoti T. G. Kankonkar
Publikováno v:
2017 International Conference on Computing Methodologies and Communication (ICCMC).
With increase in digital communication, multimedia data such as digital images, videos etc. we require fast and robust security systems. To achieve high security, encryption is one of the way to protect our data from unauthorized users. In this paper
Autor:
Shruti R. Dangui, Nitesh Naik
Publikováno v:
COMPUTE
Stemming is an operation that reduces morphological variants of words to its stem. Stemming is a pre-processing tool which is used in various natural language processing applications such as text summarization, information retrieval, word sense disam
Publikováno v:
Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing.
The K-Nearest Neighbor (K-NN) algorithm is an instance based learning method that has been widely used in many pattern classification tasks due to its simplicity, effectiveness and robustness. Standard K-NN fails to work satisfactorily due to many li
Publikováno v:
2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN).
Cloud Computing is composed of amalgamation of different elements and solutions, namely operating systems running on a single virtualized computing environment, middleware layers that attempt to combine physical and virtualized resources from multipl
Publikováno v:
2012 International Conference on Advances in Computing and Communications.
Communication is a crucial aspect in the domain of IT service provisioning, where data is being transmitted from the sending entity to the receiving entity by the interaction of applications via an interface. When the data is transferred, large amoun