Dr. Divyakant Meva

Dr. Divyakant Meva
Verified
Dr. Divyakant verified their affiliation via an institutional email.
Verified
Dr. Divyakant verified their affiliation via an institutional email.
  • MCA, M.Phil., Ph.D.
  • Professor (Associate) at Marwadi Education Foundation

About

42
Publications
34,194
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
215
Citations
Introduction
Current institution
Marwadi Education Foundation
Current position
  • Professor (Associate)
Additional affiliations
June 2016 - present
Marwadi Education Foundation
Position
  • Professor (Associate)
July 2010 - June 2016
Marwadi Education Foundation
Position
  • Professor (Assistant)
July 2010 - present
Marwadi Education Foundation
Position
  • Professor (Assistant)
Education
December 2000 - November 2002
Saurashtra University
Field of study
  • computer applications

Publications

Publications (42)
Article
Full-text available
Knee abnormalities represent one of the most common orthopedic conditions affecting individuals across different age groups, significantly impacting mobility and quality of life. For treatment planning to be successful, these anomalies must be diagnosed promptly and accurately. Deep learning techniques have transformed medical image analysis in the...
Article
Full-text available
The performance evaluation techniques for large language models (LLMs) are thoroughly reviewed in this study. As these models' capabilities and applications continue to develop quickly, establishing robust evaluation frameworks becomes increasingly important. We analyze the evolution of evaluation metrics and benchmarks, from traditional natural la...
Article
Full-text available
Convolutional neural networks (CNNs) pre-trained on the ImageNet dataset were used in this study to perform a thorough investigation of brain tumor categorization. We tested a number of cutting-edge CNN models, such as Resnet50, Vgg16, and InceptionV3, using a publicly accessible brain MRI dataset that included pictures of pituitary tumors, gliomas...
Article
Full-text available
Natural Language Processing (NLP) plays a crucial role in analyzing Twitter data to introduce an automated HEXACO model. Analyzing personality traits from social media data, particularly on platforms like Twitter, presents unique challenges due to the brevity, informal language, and rapid evolution of linguistic expressions. To overcome these drawb...
Article
Full-text available
Currently, there is a notable prevalence of substantial traffic congestion and frequent vehicular accidents on roadways in contemporary times. Amalgamation of latest front-line technologies involving Internet of Things (IoT) and image classification has immense potential to advance the progress of a proficient traffic regulation system. To mitigate...
Chapter
Mental health is as important as physical health because it consists of our mental, societal, and emotional welfare. It affects people’s feelings, opinions, and behavior. It impacts our ability to handle stress, communicate with others, and make informed decisions. Mental health is vital at each phase of life, from childhood to maturity. There exis...
Article
Full-text available
Cotton plant (Gossypium herbaceum), is one of the significant fiber crop grown worldwide. However, the crop is quite prone to leaves diseases, for which deep learning (DL) techniques can be utilized for early disease prediction and prevent stakeholders from losing the harvest. The objective of this paper is to develop a novel ensemble based deep co...
Article
Full-text available
Groundnut (Arachis hypogaea L.), is the sixth-most significant leguminous oilseed crop grown all over worldwide. Groundnut, due to its high content of various dietary fibers, is classified as a valuable cash, staple and a feed crop for millions of households around the world. However, due to varied environmental factors, the crop is quite prone to...
Article
Full-text available
Castor leaves, which come from the castor plant, are large, glossy leaves that are typically green or greenish-blue in color. The leaves are palmate, meaning that they have several pointed lobes radiating from a central point, and can measure up to 2 feet (60 cm) in diameter. Castor leaves are often used in traditional medicine, particularly in Ayu...
Conference Paper
Full-text available
As a result of the transition from Web 2.0 to Web 3.0, people have adapted to being educated and socially connected with others while also becoming more empowered to deliver and obtain various services based on their individual thoughts and views. The natural language processing approach, known as sentiment analysis, uses the emotional tone behind...
Article
Full-text available
The field of computer science known as machine learning is used to create algorithms that have the ability to self-learn or learn on their own. This is how the phrase "Machine Learning" came to be. Artificial intelligence in-cludes a subfield called machine learning. These days, machine learning and deep learning techniques are frequently used to c...
Conference Paper
Now a days massive traffic queues and accidents are very much there in the Indian roads. Traffic Management is a critical issue which influences us all things considered, regular. Use of knowledge, for example, IoT and picture dealing with can move a smooth traffic supervision structure. To avoid clashing of vehicles during the signal, we can analy...
Chapter
Full-text available
One of the main causes of low yield and the destruction of cotton plant growth is the attack of leaf disease. In any crops like cotton, groundnut, potato, tomato identification and detection of leaf diseases controlling the spread of an illness early on is essential, as is help to get the maximum crop production. For developing nations, it costs mo...
Article
Full-text available
Object finding is a fast-developing technique in the area of Computer Vision and Machine Learning. Computer vision is one of the principal tasks of deep learning field. Object detection is a technique that identifies the existence of object in an image or video. Object detection can be used in many areas for improving efficiency in the task. The ap...
Article
Full-text available
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a special approach to eliminate various security threats from the web application. By focusing high risk vulnerability such as SQL Injection, Cross Site Scripting, Loc...
Article
Full-text available
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability. Still they are facing challenges and issues for development and implementation of blockchain based services. Thi...
Article
Full-text available
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This paper throws a light on such problems and their solution with the use of Biometric techniques.
Article
Full-text available
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile device is not just a medium for communication but it is a replacement of the whole office. A person can read / write...
Conference Paper
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems (systems using one biometric trait) may not serve purpose because of various reasons. Mutibiometric systems reso...
Article
Security is one of the most important aspects in today's computer environment. Especially, person authentication now a day is necessary to maintain security of computer based systems. Biometric authentication methods are becoming popular since last decade. Face recognition is one of the mature and popular biometric authentication methods. Today, wi...
Article
Full-text available
Biometric systems are getting popularity since last decade. As per the demand of IT industry, this technology is satisfying authentication and authorization needs. But Unimodal Biometric systems have their own limitations. To overcome the limitations of Unimodal Biometric Systems, we can choose the approach of Multimodal Biometric Systems. In this...
Conference Paper
Full-text available
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging technology brings some issues and challenges, this is also true for Cloud Computing Environment. In this paper, authors...
Article
Full-text available
History of Face recognition is old enough to be mature. In 1960s, face recognition became semi-automated. In 1970s, face recognition took another step in automation. In 1988, first semi-automated facial recognition system was deployed. In 2001, automated face recognition captured attention of public at SuperBowl event to capture surveillance images...
Article
Full-text available
History of Face recognition is old enough to be mature. In 1960s, face recognition became semi-automated. In 1970s, face recognition took another step in automation. In 1988, first semi-automated facial recognition system was deployed. In 2001, automated face recognition captured attention of public at SuperBowl event to capture surveillance images...
Article
Full-text available
Multimodal biometric authentication resolves no. of issues present in unimodal biometrics. There are number of ways for the fusion of different modalities in multimodal biometrics. Fusion could be either before matching the scores or after matching the score. The presented research paper deals with the comparative study of different techniques whic...
Article
Full-text available
ABSRACT Fingerprint identification and verification are one of the well established methods for implementing security aspects. This technique has become mature due to lots of research in this area. One more feature of artificial intelligence is clubbed with image processing for fingerprint that is artificial neural network. ANN is used at different...
Article
Full-text available
Now a day, covert communication is one of the most important aspects of internet. When you want to hide the data from intruders, you can use different methods for covert communication. One of the most useful methods is steganography. Other thing in the era of internet is the copyright protection, which can be implemented effectively by digital wate...
Article
Full-text available
Mobile Adhoc NETwork [8] is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept of AODTPRR [2] is basically useful when there is a very high link...

Network

Cited By