Asoke Nath
YOU?
Author Swipe
View article: Exploring the Trade-Off between Language Simplicity and Execution Efficiency: A Study Using Crython and LLVM
Exploring the Trade-Off between Language Simplicity and Execution Efficiency: A Study Using Crython and LLVM Open
Contemporary programming languages often pose a challenge due to either complex syntax or performance limitations, especially in dynamically typed environments. The language proposed in this paper, Crython, aims to mitigate these challenge…
View article: Quantum Driven Vector Similarity Search
Quantum Driven Vector Similarity Search Open
View article: LearnLynk: Empowering the Next Generation of Learners
LearnLynk: Empowering the Next Generation of Learners Open
The COVID-19 crisis initiated the extensive use of online learning in the education sector, making it imperative for a new, purpose-built learning management system. Platforms like Microsoft Teams and Zoom were originally created for the b…
View article: Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file
Digital Steganography : A Comprehensive Study on Various Methods for Hiding Secret Data in a Cover file Open
This research paper offers an in-depth examination of digital steganography, with a focus on the diverse methodologies utilized for embedding secret data within cover files. Steganography, the practice of concealing information within othe…
View article: CareerBoost: Revolutionizing the Job Search with Resume Enhancement and Tailored Recommendations
CareerBoost: Revolutionizing the Job Search with Resume Enhancement and Tailored Recommendations Open
The Resume Enhancer and Job Recommendation System is designed to meet the unique challenges faced by job seekers in today's dynamic job market. Leveraging cutting-edge natural language processing (NLP) techniques, the present system provid…
View article: Quantum Key Distribution (QKD) for Symmetric Key Transfer
Quantum Key Distribution (QKD) for Symmetric Key Transfer Open
Classical cryptographic systems are increasingly challenged by advances in computing power and new algorithmic techniques, particularly with the rise of quantum computing, which threatens the security of current encryption methods. This ha…
View article: Enhancing Cybersecurity Through Intelligent Conversations : A Chatbot Approach
Enhancing Cybersecurity Through Intelligent Conversations : A Chatbot Approach Open
Retrieval-based chatbots are fundamental tools in computer-mediated conversations. They use stored responses to act as virtual assistants, facilitating smooth interactions between users and computers. This examination investigates into how…
View article: Application of Finite State Automaton in a Random DNA Sequence and Pattern Analysis
Application of Finite State Automaton in a Random DNA Sequence and Pattern Analysis Open
View article: Visibility Analysis and Time Series Forecasting
Visibility Analysis and Time Series Forecasting Open
Visibility prediction and time series forecasting are two important fields in the domain of data analysis and machine learning. Visibility prediction deals with the estimation of atmospheric visibility or the distance over which objects ca…
View article: Development of a successful IFS model for livelihood sustenance of small households of Uttar Pradesh
Development of a successful IFS model for livelihood sustenance of small households of Uttar Pradesh Open
An experiment was conducted at research farm of ICAR-Indian Institute of Farming Systems Research, Modipuram, Uttar Pradesh during 2016–17 to 2018–19 to develop integrated farming systems (IFS) model which has diverse commodities/component…
View article: Trends In Natural Language Processing : Scope And Challenges
Trends In Natural Language Processing : Scope And Challenges Open
Natural language processing (NLP) is a subfield of linguistics, computer science, and artificial intelligence concerned with the interactions between computers and human language, in particular how to program computers to process and analy…
View article: Introduction to Quantum Gates : Implementation of Single and Multiple Qubit Gates
Introduction to Quantum Gates : Implementation of Single and Multiple Qubit Gates Open
A quantum gate or quantum logic gate is an elementary quantum circuit working on a small number of qubits. It means that quantum gates can grasp two primary feature of quantum mechanics that are entirely out of reach for classical gates : …
View article: A Comprehensive study on Text Classification: Application of Convolutional Neural Networks and Deep Learning methods
A Comprehensive study on Text Classification: Application of Convolutional Neural Networks and Deep Learning methods Open
Text classification is an essential part in many applications, such as web searching, information filtering, language identification and sentiment analysis such as predicting the sentiment of tweets and movie reviews, as well as classifyin…
View article: Trends In Natural Language Processing : Scope And Challenges
Trends In Natural Language Processing : Scope And Challenges Open
Quantum cryptography is a comparatively new and special type of cryptography which uses Quantum mechanics to provide unreal protection of data/information and unconditionally secure communications. This is achieved with Quantum Key Distrib…
View article: Scope and Challenges in Conversational AI using Transformer Models
Scope and Challenges in Conversational AI using Transformer Models Open
Conversational AI is an interesting problem in the field of Natural Language Processing and combines natural language processing with machine learning. There has been quite a lot of advancements in this field with each new model architectu…
View article: Past, Present and Future of Quantum Computing: A Systematic Study
Past, Present and Future of Quantum Computing: A Systematic Study Open
Quantum Computing is relatively new and it's kind of a special type of computing that uses the laws of quantum physics. In classical computing, we have some limitations and we can overcome those with the help of Quantum Computing as it use…
View article: An Efficient Cross-Lingual BERT Model for Text Classification and Named Entity Extraction in Multilingual Dataset
An Efficient Cross-Lingual BERT Model for Text Classification and Named Entity Extraction in Multilingual Dataset Open
In recent times, with the rise of the internet, everyone is being bombarded with tons of information and data from various sources like websites, blogs and articles, social media posts and comments, e-news portals etc. Now all these data a…
View article: New Bit Level Positional Encryption Algorithm (NBPLEA - Ver 2)
New Bit Level Positional Encryption Algorithm (NBPLEA - Ver 2) Open
In the age of the digital world, cyber security and protecting the digital assets of a person and organization are of the utmost importance. Various types of attackers and foreign entities attempt to break in and steal or modify records an…
View article: Designing and Implementing Conversational Intelligent Chat-bot Using Natural Language Processing
Designing and Implementing Conversational Intelligent Chat-bot Using Natural Language Processing Open
In the early days of Artificial Intelligence, it was observed that tasks which humans consider ‘natural’ and ‘commonplace’, such as Natural Language Understanding, Natural Language Generation and Vision were the most difficult task to carr…
View article: Data Hiding and Retrieval Method Using LSB Substitution Algorithm
Data Hiding and Retrieval Method Using LSB Substitution Algorithm Open
Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Many different carrier ?le formats can be used, but digital images are the most popular because of their frequency …
View article: A Comprehensive Study on Scope and Challenges in Digital Inheritance
A Comprehensive Study on Scope and Challenges in Digital Inheritance Open
We are living our life online more and more nowadays. We access internet banking, investments online and into communication with our family and friends through various social media and other means over the internet. In this context it is b…
View article: Mathematical Description of Social Distancing to Prevent Transmission of COVID-19 between Human to Human
Mathematical Description of Social Distancing to Prevent Transmission of COVID-19 between Human to Human Open
Social distancing is one kind of preventative measure to reduce the spread of COVID-19. COVID-19 transmits mainly from one person to another during close contact for a prolonged period. Different types of preventive measures like thermal s…
View article: Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0)
Advanced Symmetric Key Cryptography Algorithm: Application of Pseudo Biotic DNA Method(ASKCA VER-1.0) Open
In today’s world with advancement in technologies as networking is growing at a fast pace providing security to data becomes the biggest concern. Hence, cryptography is the major area of concern when it comes to data security. DNA cryptogr…
View article: A Proposed Model of Advanced Security System in ATM Implementation of Face Recognition and Finger Print Recognition
A Proposed Model of Advanced Security System in ATM Implementation of Face Recognition and Finger Print Recognition Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Enhancing Security of ATM Transactions via Debit Cards
Enhancing Security of ATM Transactions via Debit Cards Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Smart Input: Remote Keyboard and Mouse Control from Android Device
Smart Input: Remote Keyboard and Mouse Control from Android Device Open
Smart Input aims to be a utility which enables its users to imitate any Android smartphone device as keyboard and mouse of the PC. In order to establish this feature thedevices must be connected through any LAN- wired or wireless. The app …
View article: Scope and Challenges in Data Visualisation Presentation of Data in a Graphical Format
Scope and Challenges in Data Visualisation Presentation of Data in a Graphical Format Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0)
Bit Level Encryption Algorithm Using Chaos Version 1.0(BLEAUC-1.0) Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Scope and Challenges in Smart Glasses A Comprehensive Study on Present Scenario
Scope and Challenges in Smart Glasses A Comprehensive Study on Present Scenario Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Dark Web The Uniluminated Side of the World Wide Web
Dark Web The Uniluminated Side of the World Wide Web Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …