Description
Efnisyfirlit
- Preface
- Rajiv Ranjan Giri, Richa Indu, Sushil Chandra Dimri Machine learning-enabled techniques for speech categorization
- 1 Introduction
- 2 Recent trends in speech categorization
- 3 Proposed methodology
- 3.1 Categorizing comments
- 3.2 Data acquisition and preprocessing
- 3.3 The proposed algorithm
- 4 Results and discussion
- 4.1 Hijab case (Karnataka)
- 4.2 Boycott movies dataset
- 4.3 Dharamsansad (Haridwar)
- 5 Conclusion
- Akash Dogra, Shiv Ashish Dhondiyal, Sushil Chandra Dimri Comprehensive study of cybersecurity issues and challenges
- 1 Introduction
- 2 Cybercrime
- 3 Cyberspace threats
- 4 Notable recent cybercrime
- 5 Cybersecurity
- 6 Cybersecurity policy
- 7 Future direction
- 8 Conclusion
- Chandrashekhar Patel, Bhanu Priya Yadav, Aditi Saxena An energy-efficient FPGA-based implementation of AES algorithm using HSTL IO standards for new digital age technologies
- 1 Introduction
- 1.1 The Advanced Encryption Standard (AES)
- 1.2 FPGA
- 1.3 HSTL (high-speed transceiver logic) IO standard
- 2 Literature review
- 3 Design methodology
- 3.1 Simulation
- 3.2 RTL analysis
- 3.3 Synthesis
- 3.4 Implementation
- 3.5 Program and debug
- 4 Results and analysis
- 4.1 Computing total power consumption of HSTL_I_18
- 4.2 Computing total power consumption of HSTL_II
- 4.3 Computing total power consumption of HSTL_II_18
- 5 Conclusion
- 6 Future scope
- Bhawnesh Kumar, Ashwani Kumar, Harendra Singh Negi, Ishwari Singh Rajput A comparative study on security issues and clustering of wireless sensor networks
- 1 Introduction
- 1.1 Popular research areas of WSNs
- 1.2 Comparison of clustering objectives and energy consumption of node
- 1.3 Security and privacy issues in WSN
- 2 Critical literature review
- 3 Research gaps identified
- 4 Conclusion
- Deonarain Brijlall, Tauqeer Ahmed Usmani, Richa Indu Heuristic approach and its application to solve NP-complete traveling salesman problem
- 1 Introduction
- 2 Related work
- 3 Techniques and mathematical models
- 3.1 The traveling salesman problem
- 3.2 Nearest neighbor approach
- 3.3 Greedy approach
- 3.4 The proposed heuristic solution
- 4 Results and discussion
- 4.1 Identifying the optimal route of a milk van for 10 houses
- 4.2 Identifying the optimal route of a milk van for 20 houses
- 5 Conclusion
- Megha Shah, Akshay Kumar, Shristi Kharola, Mangey Ram Assessment of fake news detection from machine learning and deep learning techniques
- 1 Introduction
- 2 Literature survey
- 3 Methodology
- 3.1 Natural language processing (NLP)
- 3.2 Machine learning (ML)
- 3.3 Deep learning (DL)
- 3.4 Study framework
- 3.5 Datasets
- 3.6 Data cleaning steps (preprocessing the dataset)
- 3.7 Models utilized in the study
- 4 Results and analysis of datasets
- 4.1 Results for dataset 1
- 4.2 Result for dataset 2
- 5 Conclusion and future work
- Harendra Singh Negi, Aditya Bhatt, Vandana Rawat Spam mail detection various machine learning methods and their comparisons
- 1 Introduction
- 2 Related works
- 3 Purposed work
- 4 Implementation and result
- 4.1 Performance metrics
- 4.2 Time elapsed
- 4.3 AUC-ROC
- 4.4 PR curve
- 5 Conclusion
- Rahul Bijalwan, Vandana Rawat, Akshita Patwal, Sudhanshu Maurya Cybersecurity threats in modern digital world
- 1 Introduction
- 2 Literature review
- 3 Issues in cybersecurity
- 4 Attacks with their classification
- 4.1 Phishing
- 4.2 SQL injection
- 4.3 Brute force attack
- 4.4 Malware
- 4.5 Man-in-the-middle
- 5 Data breaches
- 6 Conclusion
- Parth Gautam, Apurva Omer, Jeetendra Pande, Devesh Bora Mechanism to protect the physical boundary of organization where the private and public networks encounter
- 1 Introduction
- 2 Literature review
- 3 Purpose and objectives
- 4 Overview of private and public networks
- 5 Security considerations for private and public networks
- 5.1 Network segmentation
- 5.2 Segmentation techniques
- 5.3 Use of firewalls and intrusion prevention systems (IPS)
- 5.4 Access control mechanisms
- 5.5 Network access control (NAC) solutions
- 5.6 Physical security measures
- 6 Future trends and considerations
- 7 Conclusion
- Bhawnesh Kumar, Aditya Bhatt, Neeraj Panwar By combining binary search and insertion sort, a sorting method for small input size
- 1 Introduction
- 2 Related works
- 3 Proposed work
- 3.1 Algorithm
- 3.2 Time complexity
- 3.3 In the worst case of binary insertion sort
- 3.4 For average case of binary insertion sort
- 3.5 Time complexity analysis
- 4 Numerical illustration
- 5 Conclusion
- Index




