Zobrazeno 1 - 10
of 13
pro vyhledávání: '"Utpal Shrivastava"'
Autor:
Mukesh Prasad, R. S. Aswal, Utpal Shrivastava, Abhishek Joshi, Pooja Panwar, Pargin Bangotra, R. C. Ramola
Publikováno v:
Journal of Radioanalytical and Nuclear Chemistry.
Publikováno v:
2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N).
Publikováno v:
International Journal of Computer Science and Engineering. 7:11-15
Conformance Checking (CC) techniques enable us to gives the deviation between modelled behavior and actual execution behavior. The majority of organizations have Process-Aware Information Systems for recording the insights of the system. They have th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1a4e0e92ed7fd2f57377a0d8de08cc87
https://doi.org/10.3233/apc210213
https://doi.org/10.3233/apc210213
Publikováno v:
2021 International Conference on Computational Performance Evaluation (ComPE).
Autor:
Utpal Shrivastava, Vikas Thada
Publikováno v:
International Journal of Computer Sciences and Engineering. 7:246-250
Human beings tend to make predictions about future events irrespective of probability of occurrence. We are fascinated to solve puzzles and patterns. One such area which intrigues many, full of complexity and unpredicted behavior, is the stock market
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7dc90f548b01c47a124c72d8fb803ff8
https://doi.org/10.4018/978-1-7998-5876-8.ch004
https://doi.org/10.4018/978-1-7998-5876-8.ch004
Autor:
Utpal Shrivastava, Neelam Sharma
Publikováno v:
2020 International Conference on Computational Performance Evaluation (ComPE).
Monitoring of the data traffic is done by Intrusion detection system (IDS) in the network and identify possibility of attacks with can cause harm in the network. The growing digital age where so many host are connected to network and digital transact
Autor:
Utpal Shrivastava, Neelam Sharma
Publikováno v:
2020 International Conference on Computational Performance Evaluation (ComPE).
Computer network is expanding day by day and number of users are increasing on the network. There are many attacks on the network with makes user on risk, leading to security of their data. Attackers are using novel method for getting information of
Publikováno v:
International Journal of Innovative Research in Computer Science & Technology. 8
We propose another system for evaluating generative models by means of an ill-disposed process, in which we at the same time train two models: a generative model G that catches the information conveyance, and a discriminative model D that gauges the