Arun Kumar Yadav
YOU?
Author Swipe
View article: Analyzing the Complexity of US Federal Debt
Analyzing the Complexity of US Federal Debt Open
The United States federal debt has witnessed a significant surge over recent decades. This study delves into inquiries regarding the persistent patterns in federal debt, key factors driving this alarming trend, and the optimal timing for i…
View article: Communicating Life-Saving Information in Emergencies: Implementation of Multi-Hazard Early Warning System in India
Communicating Life-Saving Information in Emergencies: Implementation of Multi-Hazard Early Warning System in India Open
Disaster risk reduction is a pressing global challenge owing to climate change and other anthropogenic factors. Communicating timely, trusted, and actionable life-saving information to the public in emergency or disaster situations can mak…
View article: The Historical Evolution and Future Prospects of Hypertext
The Historical Evolution and Future Prospects of Hypertext Open
Hypertext is a digital technology that has evolved significantly since its inception in the 1940s. The origins of hypertext can be traced back to Vannevar Bush’s concept of the “Memex,” which was designed to allow users to access informati…
View article: Automatic Image Caption Generation Using Deep Learning
Automatic Image Caption Generation Using Deep Learning Open
Image captioning is an interesting and challenging task with applications in diverse domains such as image retrieval, organizing and locating images of users’ interest etc. It has huge potential for replacing manual caption generation for …
View article: Univariate and Multivariate LSTM Model for Short-Term Stock Market Prediction
Univariate and Multivariate LSTM Model for Short-Term Stock Market Prediction Open
Designing robust and accurate prediction models has been a viable research area since a long time. While proponents of a well-functioning market predictors believe that it is difficult to accurately predict market prices but many scholars …
View article: Automatic Text Summarization Methods: A Comprehensive Review
Automatic Text Summarization Methods: A Comprehensive Review Open
One of the most pressing issues that have arisen due to the rapid growth of the Internet is known as information overloading. Simplifying the relevant information in the form of a summary will assist many people because the material on any…
View article: Qualitative Analysis of Text Summarization Techniques and Its Applications in Health Domain
Qualitative Analysis of Text Summarization Techniques and Its Applications in Health Domain Open
For the better utilization of the enormous amount of data available to us on the Internet and in different archives, summarization is a valuable method. Manual summarization by experts is an almost impossible and time-consuming activity. P…
View article: Quantifying Age Heaping and Age Misreporting in a Multicentric Survey
Quantifying Age Heaping and Age Misreporting in a Multicentric Survey Open
Introduction: Demographic indices known as the age-heaping indexes were used to explore the patterns of age misreporting in a multicentric survey. Methods: The data of 3252 individuals were analyzed, and measurement of errors in age for th…
View article: Feature Based Automatic Text Summarization Methods: A Comprehensive State-of-the-Art Survey
Feature Based Automatic Text Summarization Methods: A Comprehensive State-of-the-Art Survey Open
With the advent of the World Wide Web, there are numerous online platforms that generate huge amounts of textual material, including social networks, online blogs, magazines, etc. This textual content contains useful information that can b…
View article: Percutaneous balloon pulmonary valvuloplasty in a young lady with coexisting repaired patent ductus arteriosus
Percutaneous balloon pulmonary valvuloplasty in a young lady with coexisting repaired patent ductus arteriosus Open
An asymptomatic woman aged 24 years was informed about the presence of a heart murmur by her attending obstetrician while she was hospitalised for a spontaneous abortion 6 months ago and was subsequently referred to us to rule out underlyi…
View article: Fingerprint Presentation Attack Detection using Referential Quality Metrics and Minutiae Count
Fingerprint Presentation Attack Detection using Referential Quality Metrics and Minutiae Count Open
The fingerprint presentation attack is still a major challenge in biometric systems due to its increased applications worldwide. In the past, researchers used Fingerprint Presentation Attack Detection (FPAD) for user authentication, but it…
View article: Wavelet Tree ensembles with Machine Learning and its classification
Wavelet Tree ensembles with Machine Learning and its classification Open
Wavelet trees are compact data structures in computational geometry. In the past, it was used as an essential tool for handling the size of data, data compression, indexing and for many more applications. Machine learning algorithms are us…
View article: Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach
Modeling Fingerprint Presentation Attack Detection Through Transient Liveness Factor-A Person Specific Approach Open
A self-learning, secure and independent open-set solution is essential to be explored to characterise the liveness of fingerprint presentation. Fingerprint spoof presentation classified as live (a Type-I error) is a major problem in a high…
View article: An Automated Tomato Maturity Grading System Using Transfer Learning Based AlexNet
An Automated Tomato Maturity Grading System Using Transfer Learning Based AlexNet Open
Tomato maturity classification is the process that classifies the tomatoes based on their maturity by its life cycle. It is green in color when it starts to grow; at its pre-ripening stage, it is Yellow, and when it is ripened, its color i…
View article: A Novel Convolutional Neural Network Based Model for Recognition and Classification of Apple Leaf Diseases
A Novel Convolutional Neural Network Based Model for Recognition and Classification of Apple Leaf Diseases Open
Plants have a great role to play in biodiversity sustenance. These natural products not only push their demand for agricultural productivity, but also for the manufacturing of medical products, cosmetics and many more. Apple is one of the …
View article: Development and characterization of jute composites for sustainable product: effect of chemical treatments and polymer coating
Development and characterization of jute composites for sustainable product: effect of chemical treatments and polymer coating Open
In this work, woven jute fibres were subjected to ecofriendly and chemical treatments (alkali, benzoylation and sodium bicarbonate) and PLA coating in order to improve the adhesion with epoxy thereby improvement in the performances of thei…
View article: An Improvised Feature-Based Method for Sentiment Analysis of Product Reviews
An Improvised Feature-Based Method for Sentiment Analysis of Product Reviews Open
In today’s society, sentiment analysis has gained due importance as it provides useful information about products that areused by variety of users. It gives a sneak peek of users’ reactions towards the products that are available in the ma…
View article: Spatial Ambiguities Optimization in GIR
Spatial Ambiguities Optimization in GIR Open
INTRODUCTION: Huge amount of geographically referenced information is available on World Wide Web and has become an excellent source for retrieval of desired information. Extraction of relevant information from such a huge unstructured sou…
View article: Rectenna design for electromagnetic energy harvesting and wireless power transfer
Rectenna design for electromagnetic energy harvesting and wireless power transfer Open
Under this article,an antenna with rectifier circuit is intended and simulated to energize the wireless feeler systems at resonant fre-quency 5.3838 GHz. The antenna substrate is prepared with textile material. The dielectric constant of m…
View article: Blind Approach for Digital Image Forgery Detection
Blind Approach for Digital Image Forgery Detection Open
In the digital era of where everyone is exposed to a visual imagery in very large extent.Digital images are very convincible way to share information.Due to the rapidly growing field of digital image acquirement and editing software that a…