Search

Your search keyword '"Prajapat, Shaligram"' showing total 163 results

Search Constraints

Start Over You searched for: Author "Prajapat, Shaligram" Remove constraint Author: "Prajapat, Shaligram"
163 results on '"Prajapat, Shaligram"'

Search Results

1. Comparative Analysis of Community Detection Methods for Online Learning Environments

2. Higher Education Students Performance and Feature Analysis Using Classification Models Based on Blended Learning Data

3. Exploring U-Net, FCN, SegNet, PSPNet, Mask R-CNN and Using DeepLabV3+ for Multiclass Semantic Segmentation on Satellite Images of Western Ghats

4. Experimental Demonstration for Learning Analytics and Data Mining on e-assessment

5. A Decision Tree Approach for Identifying Indian Penal Code Sections Across Different Crime Aspects

6. Rise of Federated Learning to Real-World Applications

7. Modeling and Analysis of Advanced Intrusion Prevention System Using Distributed Host Datasets for Anomaly Detection

8. Information Communication Technology (ICT) Tools for Online Learning Environments (OLE) Towards Quality Higher Education with NEP-2020

9. Information Security Primitives Automatic Variable Key Approaches and Cryptic Mining

10. Cyber Attacks and Review of Recent Data Breach Incidents Their Trends and Measures

11. Prompt Engineering for Personalized Assessment and Formative Assessment in Technical Education

12. Towards an IoT-Enabled Support System for Water Management Control, with a Focus on Storm, Drainage, and Sewage Systems

13. Offense Feature Extraction and Comparative Analysis of Jaccard Similarity and Word Embedding Techniques for IPC Section Recommendations in First Information Report

14. Performance Pattern Mining for Higher Education Students in Blended Learning Using Clustering Algorithms

15. Federated Learning Approach Using Transfer Learning Architectures for Lung Cancer Detection

16. Safeguarding SaaS Through HoneyPots: Strategies for Data Privacy and Security Compliance

17. A Comparative Analysis of Threat Modelling Methods: STRIDE, DREAD, VAST, PASTA, OCTAVE, and LINDDUN

18. An Introduction to Threat Modelling: Modelling Steps, Model Types, Benefits and Challenges

19. Modelling and Cryptanalysis of Symmetric Key-Based Cryptosystem with Fibonacci Sequences for Key Variability Concept

20. Heat Analysis Using Gradient Descent with Multicore Numerical Integration Computation

21. Multiprocessing Performance Analysis Using Numerical Integration Techniques

22. Share Spell - From Fantasy to Reality: A Collaboration Platform with Learning Analytics for a Dynamic Online Learning Environment System

23. Investigation of Efficient Approaches and Applications for Image Classification Through Deep Learning

24. Analyzing and Comparing Clustering Algorithms for Student Academic Data

25. Investigation of Decision Support System for Indian Penal Code Section Using Similarity Algorithm and Fuzzy Logic

26. Probability Approximation Based Link Prediction Method for Online Social Network

27. Exploring Community Detection Algorithms and Their Applications in Social Networks

28. Cyberattack Analysis Utilising Attack Tree with Weighted Mean Probability and Risk of Attack

29. Analysing Cyberattacks Using Attack Tree and Fuzzy Rules

30. Analyzing Supervised Learning Models for Predicting Student Dropout and Success in Higher Education

31. Effect of Financial News Headlines on Crypto Prices Using Sentiment Analysis

32. A Fuzzy Logic-Based Approach to Calculate Similarity Between Crime Aspects of Indian Penal Code Sections and Crime Complaint Report

33. Text Processor for IPC Prediction

35. Predictive World Models for Social Navigation

36. Demystifying the Working, Types, Benefits and Limitations of Chatbots

37. An Introduction to Federated Learning: Working, Types, Benefits and Limitations

38. Artificial Intelligence (AI) Applications in Chemistry

39. Cryptosystem for AVK-Based Symmetric Algorithms and Analysis Using Cryptic Pattern Mining

40. A Prototype for Grievance Redressal System

44. Cryptic-Mining: Association Rules Extractions Using Session Log

45. Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem

50. Investigation of SPM Approaches for Academic IT – Projects

Catalog

Books, media, physical & digital resources