Deep learning approach for hand drawn emoji identification

J Singh, K Upreti, AK Gupta, N Dave… - … in Engineering and …, 2022 - ieeexplore.ieee.org
Object detection is a computer technology which is based on image processing and deep
learning. It uses a database to recognize objects by comparing them. Emoticons are small …

[HTML][HTML] Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms

A Sharma, UK Singh - Global Transitions Proceedings, 2022 - Elsevier
Major backbone of today's competitive and upcoming market is definitely becoming Cloud
computing & hence corporate utilize capabilities of cloud computing services. To improve …

A comprehensive framework for online job portals for job recommendation strategies using machine learning techniques

K Upreti, S Mittal, P Divakaran, P Vats, M Bajwa… - ICT Infrastructure and …, 2022 - Springer
The employment market in today's modern society is growing increasingly active, which
makes choosing a clear opportunity for yourself a difficult endeavor, particularly for …

Analysis of Elliptic Curve Cryptography & RSA

MR Khan, K Upreti, MI Alam, H Khan… - Journal of ICT …, 2023 - ieeexplore.ieee.org
In today's digital world, the Internet is an essential component of communication networks. It
provides a platform for quickly exchanging information among communicating parties. There …

Data leakage detection in cloud computing environment using classification based on deep learning architectures

RC Patil, A Kumar, T Narmadha, M Suganthi… - International Journal of …, 2022 - ijisae.org
Insider threats are hostile actions that a legitimate employee of a company could commit. For
both commercial and governmental enterprises, insider threats pose a significant …

Energy configuration management framework using automated data mining algorithm

N Sharma, BK Vargis, K Upreti, R Jain… - Advances in Intelligent …, 2022 - Springer
As we know, whole world relies on corporate function, whether it is a house flat or any
corporate office, its infrastructure should be technically smart. Corporate functions are …

A Comparative Analysis of Autonomous Ledger Systems for Enhanced Blockchain Computing Applications

S Ghosh, K Upreti, S Jafri, P Divakaran… - … on Security of …, 2023 - ieeexplore.ieee.org
Due to its potential to completely transform a number of sectors thanks to its irreversible and
decentralized ledger system, the use of blockchain technology has recently attracted a lot of …

[PDF][PDF] Security & Privacy Comparison of NextCloud vs Dropbox: A Survey

A Olaosebikan, TPBM Dissanayaka… - Midwest Instruction …, 2022 - micsymposium.org
In recent years cloud computing has moved from an idea phase to a necessity in the
business and personal use world, it has gone from being a theory to being an easily …

Separation of Powers in India

D Sharma - Available at SSRN 4380967, 2023 - papers.ssrn.com
The underlying idea of the doctrine of separation of power is that the organs of the
government do not overlap or interchange the functions that are exercised by them …

[PDF][PDF] Global Transitions Proceedings

A Sharma, UK Singh - … learning and deep learning applications-a …, 2021 - e-tarjome.com
abstract Major backbone of today's competitive and upcoming market is definitely becoming
Cloud computing & hence corporate utilize capabilities of cloud computing services. To …