C. K. Jha
YOU?
Author Swipe
A DEMATEL-Based Framework for Combating Digital Piracy in Media & Entertainment Industry through Blockchain: A Critical Success Factor Analysis Open
The media and entertainment sector remain under threat from digital piracy, with an estimated annual revenue loss of over USD 30 billion resulting from the illegal distribution and consumption of digital content. Blockchain technology (BT)…
Energy Efficient Approach with ANN based Intrusion Detection System for Securing Network and Route for Transmission in Wireless Sensor Network Open
The research focuses on hierarchical clustering-based intrusion detection using artificial neural networks (ANNs) for secure data transmission in wireless sensor networks (WSNs). WSNs consist of numerous tiny sensor nodes deployed to monit…
View article: Transformer-based models for hate speech classification
Transformer-based models for hate speech classification Open
This research paper explores the application of text classification and natural language processing techniques for enhancing hate speech detection. The study employs machine learning (ML) and deep learning models, including transformer mod…
Clustering Adaptive Elephant Herd Optimization Based Data Dissemination Protocol for VANETs Open
VANETs (Vehicular Ad hoc Networks) have pulled in enormous considerations because of their real-time application and business value. Due to the limited bandwidth of the wireless interface, dynamic topology, frequently disconnected networks…
DESIGNING AND IMPLEMENTING THE LOGICAL SECURITY FRAMEWORK FOR ECOMMERCE BASED ON SERVICE ORIENTED ARCHITECTURE Open
Rapid evolution of information technology has contributed to the evolution of more sophisticated Ecommerce system with the better transaction time and protection. The currently used E-commerce models lack in quality properties such as logi…
A Framework for Multi-Sensor Data fusion in the Context of IoT Smart City Parking Data Open
Now a day, things are communicating using the Internet, In the context of a smart city all things are interconnected and they are transferring the data to each other. Smart city subapplications like parking, pollution, traffic, transportat…
View article: A Framework for Web Application Vulnerability Detection
A Framework for Web Application Vulnerability Detection Open
Hardly a facet of human life is not influenced by the Internet due to the continuous proliferation in the Internet facilities, usage, speed, user friendly browsing, global access, etc. At flip side, hackers are also attacking this digital …
Sentiment analysis of financial news using unsupervised approach Open
Sentiment analysis aims to determine the sentiment strength from a textual source for good decision making. This work focuses on application of sentiment analysis in financial news. The semantic orientation of documents is first calculated…
Optimizing LSTM for time series prediction in Indian stock market Open
Long Short Term Memory (LSTM) is among the most popular deep learning models used today. It is also being applied to time series prediction which is a particularly hard problem to solve due to the presence of long term trend, seasonal and …
A New Pattern Mining Algorithm for Analytics of Real-Time Internet of Things Data Open
The rise of IoT Real time data has led to new demands for mining systems to learn complex models with millions to billions of parameters, which promise adequate capacity to digest massive datasets and offer powerful predictive analytics. T…
Brain Tumor Detection Using Wathershed Segmentation Techniques and Area Calculation Open
This paper primarily focuses on to employ a novel approach to classify the brain tumor and its area. The Tumor is an uncontrolled enlargement of tissues in any portion of the human body. Tumors are of several types and have some different …
The Manual Steering to be Made Cut Very Freely without using Power Steering System Open
This paper presents Manual Steering To Be Made Cut Very Freely Without Using Power Steering System, In thesis we increase the length of arm bolt so that manual steering of heavy vehicles which are very hard to be cut made easy so that driv…
Classification Of Machine Translation Outputs Using Nb Classifier And Svm For Post-Editing Open
Machine translation outputs are not correct enough to be used as it is, except for the very simplest translations. They only give the general meaning of a sentence not the exact translation. As Machine Translation (MT) is gaining a positio…
Analytics of IoT Streaming Data using Modified New Pattern Mining Algorithm Open
In the era of information technology, everything we are using in the everyday life is represented in form of information. Transportation, parking, traffic, pollution are some examples of hundreds of infrastructure systems with which we act…
Modeling Aspects with AODML: Extended UML approach for AOD Open
Aspect Oriented Software Development (AOSD) has been considered one of the most promising abstractions to make software structure more maintainable and configurable.It also helps to overcome two big issues of current object oriented progra…
Research and Analysis of Open Security Issues in Communication for Wireless Sensor Network Open
Sensors are resource constrained and computing devices used in wireless networks. These networks are comprised of large numbers sensors deployed randomly over an area. The wireless sensor network (WSN) has a direct impact on human welfare …