Shikha Singh
YOU?
Author Swipe
View article: Strengthening Financial Cloud Security with ML-Driven Data Hiding Strategy
Strengthening Financial Cloud Security with ML-Driven Data Hiding Strategy Open
Data hiding is a modern paradigm that efficaciously hides a class or module's implementation details, revealing just the essential information to the outdoors world. It improves security and encapsulation by proscribing access to sensitive…
View article: REVIEW PAPER ON DEEP FAKE DETECTION USING DEEP LEARNING
REVIEW PAPER ON DEEP FAKE DETECTION USING DEEP LEARNING Open
In the modern digital age, the emergence of artificial intelligence has made it possible to create hyper-realistic human faces that do not exist in reality. Such AI-generated images, popularly referred to as deepfakes, pose an increasing t…
View article: Incremental Approximate Single-Source Shortest Paths with Predictions
Incremental Approximate Single-Source Shortest Paths with Predictions Open
The algorithms-with-predictions framework has been used extensively to develop online algorithms with improved beyond-worst-case competitive ratios. Recently, there is growing interest in leveraging predictions for designing data structure…
View article: Deceptive Plastic: Unveiling the World of Financial Fraud
Deceptive Plastic: Unveiling the World of Financial Fraud Open
View article: THE IMPACT OF SOCIAL MEDIA INFLUENCERS ON GENERATION Z'S PURCHASE INTENTIONS IN THE COSMETIC AND SKINCARE INDUSTRY
THE IMPACT OF SOCIAL MEDIA INFLUENCERS ON GENERATION Z'S PURCHASE INTENTIONS IN THE COSMETIC AND SKINCARE INDUSTRY Open
Influencer marketing, the practice of analyzing, identifying, and endorsing beauty influencers who represent the brand's clientele, is a contemporary trend in the digital landscape across several social media platforms, providing firms wit…
View article: Incremental Topological Ordering and Cycle Detection with Predictions
Incremental Topological Ordering and Cycle Detection with Predictions Open
This paper leverages the framework of algorithms-with-predictions to design data structures for two fundamental dynamic graph problems: incremental topological ordering and cycle detection. In these problems, the input is a directed graph …
View article: Unbalanced Random Matching Markets with Partial Preferences
Unbalanced Random Matching Markets with Partial Preferences Open
Properties of stable matchings in the popular random-matching-market model have been studied for over 50 years. In a random matching market, each agent has complete preferences drawn uniformly and independently at random. Wilson (1972), Kn…
View article: Review on handwriting examination on unusual surface
Review on handwriting examination on unusual surface Open
Individuals have a unique handwriting style, which can aid investigators in identifying suspects and perpetrators at a crime scene. A handwriting analysis can also provide information about the crime's circumstances, including its social a…
View article: Online List Labeling with Predictions
Online List Labeling with Predictions Open
A growing line of work shows how learned predictions can be used to break through worst-case barriers to improve the running time of an algorithm. However, incorporating predictions into data structures with strong theoretical guarantees r…
View article: An analysis of Artificial Intelligence and its role in the cryptocurrency
An analysis of Artificial Intelligence and its role in the cryptocurrency Open
Cryptocurrencies are a fascinating phenomenon around the globe.Rapidly increasing digital currencies continue to be a highly lucrative financial instrument, either for shortterm profits on cryptocurrency exchanges or long-term benefits via…
View article: Towards Automated and Optimized Security Orchestration in Cloud SLA
Towards Automated and Optimized Security Orchestration in Cloud SLA Open
In cloud computing, providers pool their resources and make them available to customers. Next-generation computer scientists are flocking to the cutting-edge field of cloud computing for their research and exploration of uncharted territor…
View article: A Study on Customer Relationship Management in Bank-Special Reference to ICICI Bank
A Study on Customer Relationship Management in Bank-Special Reference to ICICI Bank Open
CRM represents Customer Relationship Management. It is a system used to study clients' necessities and practices to create more grounded associations with them. All things considered, great client connections are at the core of business ac…
View article: Advanced Data Structures for Monitoring Cyber Streams.
Advanced Data Structures for Monitoring Cyber Streams. Open
View article: Changing agents and ascribing beliefs in dynamic epistemic logic
Changing agents and ascribing beliefs in dynamic epistemic logic Open
In dynamic epistemic logic (Van Ditmarsch, Van Der Hoek, & Kooi, 2008) it is customary to use an action frame (Baltag & Moss, 2004; Baltag, Moss, & Solecki, 1998) to describe different views of a single action. In this article, action fram…
View article: Write-Optimized Algorithms for Cybersecurity Stream Monitoring.
Write-Optimized Algorithms for Cybersecurity Stream Monitoring. Open
View article: Forecasting Directional Movement of Stock Prices using Deep Learning
Forecasting Directional Movement of Stock Prices using Deep Learning Open
View article: Using advanced data structures to enable responsive security monitoring
Using advanced data structures to enable responsive security monitoring Open
View article: Using External Memory to Improve Cyber-Security Stream Monitoring.
Using External Memory to Improve Cyber-Security Stream Monitoring. Open
View article: Enhance Movie Recommender System Using Machine Learning Techniques
Enhance Movie Recommender System Using Machine Learning Techniques Open
View article: Blockchain applications for the healthcare sector: Uses beyond Bitcoin
Blockchain applications for the healthcare sector: Uses beyond Bitcoin Open
View article: ECHOES OF A BROKEN PAST: READING MAHESH DATTANI'S TARA AS A MEMORY PLAY
ECHOES OF A BROKEN PAST: READING MAHESH DATTANI'S TARA AS A MEMORY PLAY Open
The story of Mahesh Dattani’s Tara exemplifies his skill in delving into memory, which is another theme of the play with broad appeal. Tara poses inquiries concerning memory and the processes involved in it. Dan's past demonstrates how lit…
View article: Timely Reporting of Heavy Hitters Using External Memory
Timely Reporting of Heavy Hitters Using External Memory Open
Given an input stream S of size N , a ɸ-heavy hitter is an item that occurs at least ɸN times in S . The problem of finding heavy-hitters is extensively studied in the database literature. We study a real-time heavy-hitters variant in whic…
View article: Impact of COVID-19 pandemic on HIV care delivery and access in Asia
Impact of COVID-19 pandemic on HIV care delivery and access in Asia Open
View article: Telescoping Filter: A Practical Adaptive Filter
Telescoping Filter: A Practical Adaptive Filter Open
Filters are fast, small and approximate set membership data structures. They are often used to filter out expensive accesses to a remote set S for negative queries (that is, a query x not in S). Filters have one-sided errors: on a negative…
View article: Mental Actions and Explainability in Kripkean Semantics: What Else do I Know? (Student Abstract)
Mental Actions and Explainability in Kripkean Semantics: What Else do I Know? (Student Abstract) Open
The ability of an agent to distinguish the ramification effects of an action from its direct effects adds value to the explainability of its decisions. In this work, we propose to encode the ramification effects of ontic and epistemic acti…
View article: Telescoping Filter: A Practical Adaptive Filter.
Telescoping Filter: A Practical Adaptive Filter. Open
Filters are small, fast, and approximate set membership data structures. They are often used to filter out expensive accesses to a remote set S for negative queries (that is, filtering out queries x ∉ S). Filters have one-sided errors: on …
View article: Exploring Data Science for Highlighting Breast Cancer Prediction Using Python
Exploring Data Science for Highlighting Breast Cancer Prediction Using Python Open
View article: PRIORITIZED INTERVENTION IN E-COMMERCE APPLICATIONS USING LOGICAL OCL SOFTWARE AGENTS (PIE)
PRIORITIZED INTERVENTION IN E-COMMERCE APPLICATIONS USING LOGICAL OCL SOFTWARE AGENTS (PIE) Open
View article: Timely Reporting of Heavy Hitters using External Memory
Timely Reporting of Heavy Hitters using External Memory Open
Given an input stream of size N, a φ-heavy hitter is an item that occurs at least φ N times in S. The problem of finding heavy-hitters is extensively studied in the database literature. We study a real-time heavy-hitters variant in which a…
View article: Subjective Knowledge and Reasoning about Agents in Multi-Agent Systems
Subjective Knowledge and Reasoning about Agents in Multi-Agent Systems Open
Though a lot of work in multi-agent systems is focused on reasoning about knowledge and beliefs of artificial agents, an explicit representation and reasoning about the presence/absence of agents, especially in the scenarios where agents m…