About
11
Publications
10,638
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
40
Citations
Publications
Publications (11)
Data mining is a method of extracting helpful data from an oversized quantity of information. It is a process of finding out interesting patterns from a huge data. It is used for summarizing information in useful format. In the cur- rent scenario data mining is being hot topic of research along with machine learning and data analysis. Classificatio...
After the inception of
Internet of Things (IoT) a very new term is get into existence i.e. Internet
of Everything (IoE). Before discussing on Internet of Everything one must know the meaning if it. In Internet of Everything process, people, data, & things are connected intelligently. Internet of Everything is a platform which makes the connection...
Face recognition has many important applications e.g. recognition of faces at security checkpoints and airports. Human beings have capability of recognizing a person or a face but machine is not able to perform the same. The main aim is to engineer a system which is able to function like mankind. In this paper face recognition approach is proposed...
Technology has been developed to help us estimate the safety and effectiveness of anti-virus technology before it is organized. Technology for dealing with known viruses has been very successful and is being extended to deal with previously unknown viruses automatically. There are still important research problem for the solution to any significant...
Green computing refers to optimal use of information and communication technology (ICT) for managing the environmental sustainability of enterprise operations and supporting business critical computing needs with least possible amount of power. Stimulating innovation in green technology through public policy requires an understanding of technology,...
The web has become paramount part of our lives. Unfortunately, as our dependency on the web increases, so does the interest of attackers in enslaving web applications and web-base information systems. Previous work in the field of web application security has mainly focused on the mitigation of Cross Site Scripting and SQL injection attacks. XSS, o...
In today’s world handling and security of information from attacks becomes very important aspect for the individuals.
Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed.
Here in this paper we are going to review an advanced...