Teena Hadpawat

Teena Hadpawat

About

11
Publications
10,638
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
40
Citations

Publications

Publications (11)
Article
Full-text available
Data mining is a method of extracting helpful data from an oversized quantity of information. It is a process of finding out interesting patterns from a huge data. It is used for summarizing information in useful format. In the cur- rent scenario data mining is being hot topic of research along with machine learning and data analysis. Classificatio...
Article
Full-text available
After the inception of Internet of Things (IoT) a very new term is get into existence i.e. Internet of Everything (IoE). Before discussing on Internet of Everything one must know the meaning if it. In Internet of Everything process, people, data, & things are connected intelligently. Internet of Everything is a platform which makes the connection...
Conference Paper
Face recognition has many important applications e.g. recognition of faces at security checkpoints and airports. Human beings have capability of recognizing a person or a face but machine is not able to perform the same. The main aim is to engineer a system which is able to function like mankind. In this paper face recognition approach is proposed...
Conference Paper
Technology has been developed to help us estimate the safety and effectiveness of anti-virus technology before it is organized. Technology for dealing with known viruses has been very successful and is being extended to deal with previously unknown viruses automatically. There are still important research problem for the solution to any significant...
Conference Paper
Green computing refers to optimal use of information and communication technology (ICT) for managing the environmental sustainability of enterprise operations and supporting business critical computing needs with least possible amount of power. Stimulating innovation in green technology through public policy requires an understanding of technology,...
Article
Full-text available
The web has become paramount part of our lives. Unfortunately, as our dependency on the web increases, so does the interest of attackers in enslaving web applications and web-base information systems. Previous work in the field of web application security has mainly focused on the mitigation of Cross Site Scripting and SQL injection attacks. XSS, o...
Article
Full-text available
In today’s world handling and security of information from attacks becomes very important aspect for the individuals. Researchers are innovating new techniques to secure the information from unwanted intrusions. Various cryptography techniques are discovered and many are yet to be revealed. Here in this paper we are going to review an advanced...

Network

Cited By