Dharmendra Kumar Yadav
YOU?
Author Swipe
View article: The Architecture of Digital Mental Health Systems: Frameworks, Infrastructure, and Policy Support in Academic Institutions
The Architecture of Digital Mental Health Systems: Frameworks, Infrastructure, and Policy Support in Academic Institutions Open
The increasing prevalence of mental health challenges among students in academic institutions has underscored the need for innovative, scalable solutions that can address these issues effectively. Digital mental health systems have emerged…
View article: polarisR: Non-Linear Dimensionality Reduction Visualization Tool
polarisR: Non-Linear Dimensionality Reduction Visualization Tool Open
View article: Crowdfunding Web Application: A Platform for Decentralized Fundraising
Crowdfunding Web Application: A Platform for Decentralized Fundraising Open
Crowdfunding has emerged as a viable and innovative approach to raising capital for entrepreneurial, social, and creative ventures. With the proliferation of internet-based platforms, web applications now play a central role in facilitatin…
View article: A TECHNICAL REVIEW ON SMART CONTRACT PLATFORMS, LANGUAGES AND APPLICATIONS IN BLOCKCHAIN
A TECHNICAL REVIEW ON SMART CONTRACT PLATFORMS, LANGUAGES AND APPLICATIONS IN BLOCKCHAIN Open
Blockchain is the technology which greatly attracted the industries as well as the academics of the educational system because of its variety of applications and innovations around the globe. Smart contract is one of the most highly used t…
View article: Enhancing Semantic Segmentation: Design and Analysis of Improved U-Net Based Deep Convolutional Neural Networks
Enhancing Semantic Segmentation: Design and Analysis of Improved U-Net Based Deep Convolutional Neural Networks Open
In this research, we provide a state-of-the-art method for semantic segmentation that makes use of a modified version of the U-Net architecture, which is itself based on deep convolutional neural networks (CNNs). This research delves into …
View article: Knowledge-based checkpointing strategy for spot instances in cloud computing
Knowledge-based checkpointing strategy for spot instances in cloud computing Open
The Amazon EC2 offers spot-priced virtual machines (VMs) at a reduced price compared to on-demand and reserved VMs. However, Amazon EC2 can terminate these VMs anytime due to the spot price and demand fluctuation. Using spot VMs results in…
View article: Detecting Deepfakes: A Novel Framework Employing XceptionNet-Based Convolutional Neural Networks
Detecting Deepfakes: A Novel Framework Employing XceptionNet-Based Convolutional Neural Networks Open
Social networking sites have become primary sources of information for web users, making the rapid dissemination of deepfakes a cause for concern.Deepfakes are digitally manipulated images or videos that contain the computer-generated face…
View article: Using Ensemble and TOPSIS with AHP for Classification and Selection of Web Services
Using Ensemble and TOPSIS with AHP for Classification and Selection of Web Services Open
Due to the increasing number of Web Services with the same functionality, selecting a Web Service that best serves the needs of the Web Client has become a tremendously challenging task. Present approaches use non-functional parameters of …
View article: A Multiobjective Discrete Grey Wolf Optimization Approach for Transactional and QoS-driven Web Services Composition
A Multiobjective Discrete Grey Wolf Optimization Approach for Transactional and QoS-driven Web Services Composition Open
Web services facilitate reusability that allows cost-effective development of business applications using web services composition. Due to the proliferation of web services, different service providers are providing similar functionality w…
View article: A Two-Systems Perspective for Computational Thinking
A Two-Systems Perspective for Computational Thinking Open
View article: Horizontal Scaling for Containerized Application Using Hybrid Approach
Horizontal Scaling for Containerized Application Using Hybrid Approach Open
Cloud computing is a paradigm to provide services to end-users through the Internet. The availability of services to end-users is dependent on various factors such as the availability of computing resources as well as the number of users t…
View article: Verification of Virtual Machine Architecture in a Hypervisor through Model Checking
Verification of Virtual Machine Architecture in a Hypervisor through Model Checking Open
Hypervisors are used to virtualize the architecture on which it runs. These are small computer programs that are typically safety-critical, and also hard to debug. As the size of hypervisors are small that is why the formal verification at…
View article: MOESM1 of The comparison of automated clustering algorithms for resampling representative conformer ensembles with RMSD matrix
MOESM1 of The comparison of automated clustering algorithms for resampling representative conformer ensembles with RMSD matrix Open
Additional file 1. Conformations of every entry under RCKmeans, RCDCT, RCPCA, and RCPCA-RBF.
View article: Towards Validation of UML Design Model
Towards Validation of UML Design Model Open
Design models of model-driven engineering support efficient and error free designing i.e. independent of implementation details.Ensuring design model consistencies is an important activity in software development.One way of achieving it, i…
View article: A Movie Recommender System: MOVREC
A Movie Recommender System: MOVREC Open
Now a day's recommendation system has changed the style of searching the things of our interest.This is information filtering approach that is used to predict the preference of that user.The most popular areas where recommender system is a…
View article: Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization
Multi-Objective Tasks Scheduling Algorithm for Cloud Computing Throughput Optimization Open
In cloud computing datacentersexert server unification to enhance the efficiency of resources. Many Vms (virtual machine) are running on each datacenter to utilize the resources efficiently. Most of the time cloud resources are underutiliz…
View article: Validation of UML Design Model
Validation of UML Design Model Open
Ensuring absence of design model inconsistencies that may lead to errors creeping in software, is a major challenge of software development.Further, these errors may propagate to the different phases of software development life cycle mode…