
Dr. Divyakant Meva- MCA, M.Phil., Ph.D.
- Professor (Associate) at Marwadi Education Foundation
Dr. Divyakant Meva
- MCA, M.Phil., Ph.D.
- Professor (Associate) at Marwadi Education Foundation
About
42
Publications
34,194
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
215
Citations
Introduction
Blockchain, Cyber Security
Current institution
Additional affiliations
June 2016 - present
July 2010 - June 2016
July 2010 - present
Education
December 2000 - November 2002
Publications
Publications (42)
Knee abnormalities represent one of the most common orthopedic conditions affecting individuals across different age groups, significantly impacting mobility and quality of life. For treatment planning to be successful, these anomalies must be diagnosed promptly and accurately. Deep learning techniques have transformed medical image analysis in the...
The performance evaluation techniques for large language models (LLMs) are thoroughly reviewed in this study. As these models' capabilities and applications continue to develop quickly, establishing robust evaluation frameworks becomes increasingly important. We analyze the evolution of evaluation metrics and benchmarks, from traditional natural la...
Convolutional neural networks (CNNs) pre-trained on the ImageNet dataset were used in this study to perform a thorough investigation of brain tumor categorization. We tested a number of cutting-edge CNN models, such as Resnet50, Vgg16, and InceptionV3, using a publicly accessible brain MRI dataset that included pictures of pituitary tumors, gliomas...
Natural Language Processing (NLP) plays a crucial role in analyzing Twitter data to introduce an automated HEXACO model. Analyzing personality traits from social media data, particularly on platforms like Twitter, presents unique challenges due to the brevity, informal language, and rapid evolution of linguistic expressions. To overcome these drawb...
Currently, there is a notable prevalence of substantial traffic congestion and frequent vehicular accidents on roadways in contemporary times. Amalgamation of latest front-line technologies involving Internet of Things (IoT) and image classification has immense potential to advance the progress of a proficient traffic regulation system. To mitigate...
Mental health is as important as physical health because it consists of our mental, societal, and emotional welfare. It affects people’s feelings, opinions, and behavior. It impacts our ability to handle stress, communicate with others, and make informed decisions. Mental health is vital at each phase of life, from childhood to maturity. There exis...
Cotton plant (Gossypium herbaceum), is one of the significant fiber crop grown worldwide. However, the crop is quite prone to leaves diseases, for which deep learning (DL) techniques can be utilized for early disease prediction and prevent stakeholders from losing the harvest. The objective of this paper is to develop a novel ensemble based deep co...
Groundnut (Arachis hypogaea L.), is the sixth-most significant leguminous oilseed crop grown all over worldwide. Groundnut, due to its high content of various dietary fibers, is classified as a valuable cash, staple and a feed crop for millions of households around the world. However, due to varied environmental factors, the crop is quite prone to...
Castor leaves, which come from the castor plant, are large, glossy leaves that are typically green or greenish-blue in color. The leaves are palmate, meaning that they have several pointed lobes radiating from a central point, and can measure up to 2 feet (60 cm) in diameter. Castor leaves are often used in traditional medicine, particularly in Ayu...
As a result of the transition from Web 2.0 to Web 3.0, people have adapted to being educated and socially connected with others while also becoming more empowered to deliver and obtain various services based on their individual thoughts and views. The natural language processing approach, known as sentiment analysis, uses the emotional tone behind...
The field of computer science known as machine learning is used to create algorithms that have the ability to self-learn or learn on their own. This is how the phrase "Machine Learning" came to be. Artificial intelligence in-cludes a subfield called machine learning. These days, machine learning and deep learning techniques are frequently used to c...
Now a days massive traffic queues and accidents are very much there in the Indian roads. Traffic Management is a critical issue which influences us all things considered, regular. Use of knowledge, for example, IoT and picture dealing with can move a smooth traffic supervision structure. To avoid clashing of vehicles during the signal, we can analy...
One of the main causes of low yield and the destruction of cotton plant growth is the attack of leaf disease. In any crops like cotton, groundnut, potato, tomato identification and detection of leaf diseases controlling the spread of an illness early on is essential, as is help to get the maximum crop production. For developing nations, it costs mo...
Object finding is a fast-developing technique in the area of Computer Vision and Machine Learning. Computer vision is one of the principal tasks of deep learning field. Object detection is a technique that identifies the existence of object in an image or video. Object detection can be used in many areas for improving efficiency in the task. The ap...
By taking advantage of vulnerability, Cyber criminals is easily able to steal confidential data of the ICT, results in heavy loss. Vulnerability Assessment and penetration testing is a special approach to eliminate various security threats from the web application. By focusing high risk vulnerability such as SQL Injection, Cross Site Scripting, Loc...
Blockchain is one of the latest trends in Information Technology domain. It has changed a way of thinking for IT professional. Companies are focusing on implementation of blockchain with their services to ensure security and reliability. Still they are facing challenges and issues for development and implementation of blockchain based services. Thi...
With the increased usage of cloud computing, there is a need to address the security issues also. No. of techniques have been proposed and is there in use. Still there are few problems related to authentication in cloud environment. This paper throws a light on such problems and their solution with the use of Biometric techniques.
Managing the location information is the most important aspect in Cellular Networks. This is even more important when the user is in moving condition (mobile). In today's world with the invention of latest mobile devices, the mobile device is not just a medium for communication but it is a replacement of the whole office. A person can read / write...
Biometrics is becoming necessity for security issues in Information Technology trend. Authentication and authorization purposes can be served efficiently and effectively with biometric techniques. But sometimes unimodal biometric systems (systems using one biometric trait) may not serve purpose because of various reasons. Mutibiometric systems reso...
Security is one of the most important aspects in today's computer environment. Especially, person authentication now a day is necessary to maintain security of computer based systems. Biometric authentication methods are becoming popular since last decade. Face recognition is one of the mature and popular biometric authentication methods. Today, wi...
Biometric systems are getting popularity since last decade. As per the demand of IT industry, this technology is satisfying authentication and authorization needs. But Unimodal Biometric systems have their own limitations. To overcome the limitations of Unimodal Biometric Systems, we can choose the approach of Multimodal Biometric Systems. In this...
The term cloud computing is a relatively recent vintage. In the year of 2008, this term came in popularity. Since
then, this term has emerged a lot within short span of time. As it is known fact of IT industry that every emerging
technology brings some issues and challenges, this is also true for Cloud Computing Environment. In this paper,
authors...
History of Face recognition is old enough to be mature. In 1960s, face recognition became semi-automated. In 1970s, face recognition took another step in automation. In 1988, first semi-automated facial recognition system was deployed. In 2001, automated face recognition captured attention of public at SuperBowl event to capture surveillance images...
History of Face recognition is old enough to be mature. In 1960s, face recognition became semi-automated. In 1970s, face recognition took another step in automation. In 1988, first semi-automated facial recognition system was deployed. In 2001, automated face recognition captured attention of public at SuperBowl event to capture surveillance images...
Multimodal biometric authentication resolves no. of issues present in unimodal biometrics. There are number of ways for the fusion of different modalities in multimodal biometrics. Fusion could be either before matching the scores or after matching the score. The presented research paper deals with the comparative study of different techniques whic...
ABSRACT Fingerprint identification and verification are one of the well established methods for implementing security aspects. This technique has become mature due to lots of research in this area. One more feature of artificial intelligence is clubbed with image processing for fingerprint that is artificial neural network. ANN is used at different...
Now a day, covert communication is one of the most important aspects of internet. When you want to hide the data from intruders, you can use different methods for covert communication. One of the most useful methods is steganography. Other thing in the era of internet is the copyright protection, which can be implemented effectively by digital wate...
Mobile Adhoc NETwork [8] is collection of wireless mobile nodes dynamically forming a temporary network without the use of existing network infrastructure of centralized administration. Each node acts as a router by itself and forwards all the packets which it receives. This concept of AODTPRR [2] is basically useful when there is a very high link...