Laxmi Ahuja
YOU?
Author Swipe
View article: A Machine Learning-Driven Sustainability Assessment of Geothermal Turbine Systems: The Novel PRODSI Framework
A Machine Learning-Driven Sustainability Assessment of Geothermal Turbine Systems: The Novel PRODSI Framework Open
Geothermal energy represents a crucial component of sustainable energy strategies due to its consistent availability and minimal emissions. However, the comprehensive assessment of sustainability for geothermal turbine systems remains chal…
View article: ML-Powered Nutrient Recommendations: A MERN Stack-Based Approach
ML-Powered Nutrient Recommendations: A MERN Stack-Based Approach Open
Personalized nutrition has become essential for both prevention and overall health in this day and age, too. However, the effectiveness of current dietary recommendation systems in satisfying a variety of user needs is limited by their fre…
View article: Identification of Influential Nodes in Social Network: Big Data - Hadoop
Identification of Influential Nodes in Social Network: Big Data - Hadoop Open
Software development and associated data is the most critical factor these days. Currently, people are living in an internet world where data and related artifacts are major sets of information these days. The data is correlated with real-…
View article: Artificial Intelligence and Machine Learning- the New Emerging Technology
Artificial Intelligence and Machine Learning- the New Emerging Technology Open
With the emergence of new requirements & needs and ways to resolve these needs, nowadays software development has become the most demanding and powerful way to solve and satisfy the requirement of the customer and end user. Any requirement…
View article: Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs
Applying Clustering to Predict Attackers Trace in Deceptive Ecosystem by Harmonizing Multiple Decoys Interactions Logs Open
Bluff and truth are major pillars of deception technology. Deception technology majorly relies on decoy-generated data and looks for any behavior deviation to flag that interaction as an attack or not. But at times a legitimate user can al…
View article: Cloud Computing Paradigm in Academics
Cloud Computing Paradigm in Academics Open
Cloud computing has gained significant popularity due to its convenience and accessibility, especially with the surge in remote work arrangements during the global lockdown. Integrating cloud computing with education offers a unique and hi…
View article: Cloud Computing Paradigm in Academics
Cloud Computing Paradigm in Academics Open
Cloud computing is experiencing a surge in popularity due to its convenience and accessibility. The global lockdown and widespread adoption of the Work from Home (WFH) approach have further propelled the demand for cloud computing. In this…
View article: A novel security framework for threat management of cloud based computing networks
A novel security framework for threat management of cloud based computing networks Open
There are many different ways to store data on the cloud, the most common of which are logical pools. Although there are numerous advantages to cloud storage, such as scalability, usability, and cost savings the biggest danger to cloud sto…
View article: A Novel Approach for Band Selection Using Virtual Dimensionality Estimate and Principal Component Analysis for Satellite Image Classification
A Novel Approach for Band Selection Using Virtual Dimensionality Estimate and Principal Component Analysis for Satellite Image Classification Open
Images, being around us in every aspect of life, have become an emerging field of research. Extensive image analysis has been done on binary as well as coloured images, which has led various researchers to explore images having deep spectr…
View article: Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception
Seeded Transfer Learning for Enhanced Attack Trace and Effective Deception Open
Cyberattacks have reached their peak during COVID-19, and intruders urge to gain the upper hand in the cybersecurity battlefield, even gaining dominance.Now intruders are trying harder to elude behavior analysis techniques, which in turn g…
View article: Simulation performance of selected global and regional climate models for temperature and rainfall in some locations in India
Simulation performance of selected global and regional climate models for temperature and rainfall in some locations in India Open
Global and regional climate models are reported to have inherent bias in simulating the observed climatology of a region. This bias of climate models is the major source of uncertainties in climate change impact assessments. Therefore, use…
View article: Utilizing Gated Recurrent Units to Retain Long Term Dependencies with Recurrent Neural Network in Text Classification
Utilizing Gated Recurrent Units to Retain Long Term Dependencies with Recurrent Neural Network in Text Classification Open
The classification of text is one of the key areas of research for natural language processing.Most of the organizations get customer reviews and feedbacks for their products for which they want quick reviews to action on them.Manual revie…
View article: A Novel Rule based Data Mining Approach towards Movie Recommender System
A Novel Rule based Data Mining Approach towards Movie Recommender System Open
The proposed research work is an effort to provide accurate movie recommendations to a group of users with the help of a rule-based content-based group recommender system. The whole approach is categorized into 2 phases. In phase 1, a rule…
View article: Discriminant Analysis: Classifying and Predicting Sexual Offenders
Discriminant Analysis: Classifying and Predicting Sexual Offenders Open
Crimes or offences against women have their major contribution to spoil the physical and mental health of women. There are varieties of techniques and methods exists, through which crime against women can be analysed and predict for preven…
View article: Interactions of mean climate change and climate variability on food security extremes. [P-2223-18]
Interactions of mean climate change and climate variability on food security extremes. [P-2223-18] Open
The Coordinated Climate-Crop Modeling Project (C3MP) has conducted a common set of sensitivity tests on more than 1100 simulation sets representing different farm systems in more than 50 countries, with carbon dioxide, temperature, and pre…