Dipesh Vaya

Dipesh Vaya
  • Master of Technology
  • Assistant Professor at Sir Padampat Singhania University

About

18
Publications
17,766
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
57
Citations
Current institution
Sir Padampat Singhania University
Current position
  • Assistant Professor
Additional affiliations
March 2011 - present
SSCE
Position
  • Professor
March 2011 - December 2016
Geetanjali Institute of Technical Studies
Position
  • Researcher
Education
August 2006 - August 2010
GITS
Field of study

Publications

Publications (18)
Article
Full-text available
Objective: This paper aims to investigate the impact of specified behavioral biases on investors' stock trading decisions in North India. It has been observed that most of the research works are based on financial theories, which affect investment decisions. But besides the theories nowadays, behavioral biases also play an important role in investm...
Conference Paper
Full-text available
Edge and cloud computing environments are currently employed in a variety of fields, yet despite their growing prominence and advantages, it faces certain difficulties, including data privacy and trust. Intruder assaults ought to be avoided, and data storage ought to be restricted to authorized individuals only. The majority of methods of authentic...
Article
Full-text available
Data mining is a method of extracting helpful data from an oversized quantity of information. It is a process of finding out interesting patterns from a huge data. It is used for summarizing information in useful format. In the cur- rent scenario data mining is being hot topic of research along with machine learning and data analysis. Classificatio...
Conference Paper
Full-text available
A vision of Web Intelligence (WI) research from the viewpoint of Brain Informatics (BI), a new interdisciplinary field that systematically studies the mechanisms of human information processing from both the macro and micro viewpoints by combining experimental cognitive neuroscience with advanced information technology. BI studies human brain from...
Article
Full-text available
After the inception of Internet of Things (IoT) a very new term is get into existence i.e. Internet of Everything (IoE). Before discussing on Internet of Everything one must know the meaning if it. In Internet of Everything process, people, data, & things are connected intelligently. Internet of Everything is a platform which makes the connection...
Conference Paper
Face recognition has many important applications e.g. recognition of faces at security checkpoints and airports. Human beings have capability of recognizing a person or a face but machine is not able to perform the same. The main aim is to engineer a system which is able to function like mankind. In this paper face recognition approach is proposed...
Conference Paper
Technology has been developed to help us estimate the safety and effectiveness of anti-virus technology before it is organized. Technology for dealing with known viruses has been very successful and is being extended to deal with previously unknown viruses automatically. There are still important research problem for the solution to any significant...
Conference Paper
Green computing refers to optimal use of information and communication technology (ICT) for managing the environmental sustainability of enterprise operations and supporting business critical computing needs with least possible amount of power. Stimulating innovation in green technology through public policy requires an understanding of technology,...
Conference Paper
Testing is a process to ensure the correctness, completeness, and quality of the software system with respect to requirements. Testing is a process of executing a program or application with the thought of finding error. It means testing in IT world is used to show how we can test and where our application or software is not meeting the client's re...
Article
Full-text available
The web has become paramount part of our lives. Unfortunately, as our dependency on the web increases, so does the interest of attackers in enslaving web applications and web-base information systems. Previous work in the field of web application security has mainly focused on the mitigation of Cross Site Scripting and SQL injection attacks. XSS, o...
Article
Full-text available
In today’s world handling and security of information from attacks becomes very important aspect for the individuals. Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed. Here in this paper we are going to review an advanced...
Article
Full-text available
Shamir’s encryption method is to share a secret image by n number of shadow images and then r shadow images can be used to obtain the original secret image. In proposed method, the size of secret image is greater than the size of the shadow image used for the encryption. Such shadow image is beneficial to process in image hiding, transmission, or s...
Conference Paper
Full-text available
The calculation of a desired mathematical value is just an arithmetic function with inputs and their respective outputs. Apart from the numbers as inputs and calculating value, the analysis of a language presenting the problem of mathematics can add towards the further advancement of an automated function. This paper discusses the methods to learn...
Conference Paper
Full-text available
In the present era of digital communication where we have various data transmission techniques are generally relies on cryptography for security. But when we are concerning with data related to international/national security, we have to ensure more powerful security mechanisms. As technology is enhancing day by day enemies/intruders are also growi...

Network

Cited By