Vijay Singh Rathore

Vijay Singh Rathore
  • Doctor of Philosophy
  • Professor at Inspiration Innovation Synergy University

About

41
Publications
4,837
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
114
Citations
Introduction
Vijay Singh Rathore currently works at the Department of Computer Science & IT, IIS University, Jaipur. Vijay Singh does research in Information Systems (Business Informatics), Distributed Computing and Databases. Their last project was 'FICR-TEAS 2020'.
Current institution
Inspiration Innovation Synergy University
Current position
  • Professor

Publications

Publications (41)
Book
Full-text available
Presents innovative works in the field of computational intelligence and security Provides results of UNI-TEAS 2024 held in Jaipur, Rajasthan, India Serves as a reference for researchers and practitioners in academia and industry
Book
Full-text available
The book covers current developments in the field of computer system security using cryptographic algorithms and other security schemes for system as well as cloud. The proceedings compiles the selected research papers presented at ICE-TEAS 2023 Conference held at Jaipur Engineering College and Research Centre, Jaipur, India, during February 17–19,...
Chapter
Full-text available
This paper discusses the importance teaching–learning process for quality assurance and as efforts of affiliated technical institutes in India for getting accredited. Various problems related to the long-lasting acquisition of knowledge, skills, and attitude by the millennials are discussed with their implementable solutions to overcome it. The met...
Chapter
With the tremendous growth of IOT devices in ubiquitous fashion the data of such devices has increased enormously. By 2025, the world will produce 175 zettabytes (or 175 trillion gigabytes) of data. Traditionally such data are processed and stored in cloud storage. 91% of today’s data is generated and stored in centralized data centre. Because clou...
Book
Full-text available
The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7–8, 2022. The volume is a collection of innovative ideas from researchers, scientists, academicians, industry pr...
Chapter
The demonetization of India has become a major impetus for the country to switch to digitalization and become a cashless country. Although new and potentially disruptive innovations, such as Cryptocurrencies and the Blockchain, are in their development stages, they are able to convert paper money into digital currency, providing a decentralized and...
Chapter
The concept of teaching through the flipped classroom technique is always considered as one of the most important in higher education in the Indian context. It enables undergraduates to gain fundamental learning even before they attend the class and also facilitate educators to manage discussions among the undergraduates during the classroom intera...
Book
This book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2020, held at IIS University Jaipur, Rajasthan, India, on January 17–19, 2020. Featuring innovative ideas from researchers, academics, industry professionals and students, the book covers a variety of t...
Chapter
The evolution of technology (specifically artificial intelligence and machine learning) in the recent time has made the human life easier, fast, and providing real-time solutions, but at the same time, its negative impacts are also simultaneously affecting the human intelligence and human behavior. This paper discusses some observations on the impa...
Chapter
Various organizations under the aegis of Ministry of Human Resources Development (MHRD), Govt. of India, including All India Council for Technical Education (AICTE) have initiated many quality initiatives such as Development of Model Curriculum, Teacher Training Policy, mandatory student internship, mandatory student induction program, Start-up Pol...
Book
Full-text available
This book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2020, held at IIS University Jaipur, Rajasthan, India, on January 17–19, 2020. Featuring innovative ideas from researchers, academics, industry professionals and students, the book covers a variety of t...
Chapter
Implementing a citizen-centric approach to delivering government services is the need of the hour which creates and maintains a level of dialogue and trust between citizen and government. As per the study conducted so far, it was seen that implementing such system aids in increasing the public satisfaction and reduces cost. In technical terms, this...
Chapter
Full-text available
In this paper, an approach has been proposed for imparting education for an undergraduate-level engineering course on database management system (DBMS) to pre-final students of the bachelor’s degree program in computer engineering at self-aided engineering institute utilizing a novel instruction delivering model. Our approach depends on exploratory...
Chapter
The increasing number of cores in multicores systems-on-chip requires efficient communication infrastructure to satisfy energy and bandwidth requirements of gigascale processors. Hybrid wireless network on chip suffers from the issue of congestion due to availability of single wireless communication within subnet. Thus, the proposed architecture Gl...
Article
Full-text available
Software reuse can improve software quality with the reducing cost and development time. Systematic reuse plan enhances cohesion and reduces coupling for better testability and maintainability. Software reuse approach can be adopted at the highest extent if relevant software components can be easily searched, adapted and integrated into new system....
Article
Full-text available
In these days most of the software development uses preexisting software components. This approach provides plenty of benefits over the traditional development. Most of the software industries uses their own domain based software libraries where components resides in the form of modules, codes, executable file, documentations, test plans which may...
Chapter
This paper investigates a new and effective method for image edge feature estimation and enrichment based on cellular automata framework. Objective of this paper is find an area where arbitrary changes in intensity of an image and enrich the features of that area. The inner and outer neighbors of a blurred cell are used to accumulate the pixels or...
Chapter
Cloud computing is an amazing technology in the present era, in all services provided by the service provider. Users only need a web browser and an Internet connection. As part of its definition of a theory of no server needs to be run in the hosted hardware and transfer data to your computer or device is only increased their own connection to the...
Chapter
This paper is to improvising and optimizing the scenario of Big data processing in cloud computing. A homogeneous cluster setup supports static nature of processing which is a huge disadvantage for optimizing the response time towards clients. In order to avail utmost client satisfaction, the host server needs to be upgraded with the latest technol...
Article
Third generation of GSM technology (3GSM) has a Wideband-CDMA (W-CDMA) air interface. W-CDMA includes a shared high-speed channel for traffic from the base station to the mobile users. This research paper performs some modification in the Transmission Control Protocol’s (TCP) Tahoe variant in UMTS Network. Modifications in TCP Tahoe perform by chan...
Article
Universal Mobile Telecommunication Network (UMTS) deal with various packet losses. These packet losses developed in network due to channel fading and shadowing. Contention in network should maintain by TCP end-to-end semantics and dependency on intermediate nodes is minimized. Recent development in 3G UMTS networks new services provide to users mak...
Article
Universal Mobile Telecommunication Network (UMTS) deal with various packet losses. These packet losses developed in network due to channel fading and shadowing. Contention in network should maintain by TCP end-to-end semantics and dependency on intermediate nodes is minimized. Recent development of advanced 3G networks and services makes it necessa...
Article
Full-text available
current era, with the changes in financial transactional trends, the usage of Automated Teller Machines is excelling around the world to meet the customers need. The technological enhancement in this direction is supporting various aspects relevant to the smooth, safe and secure communication and functionality of Automated Teller Machine. But, in r...
Chapter
E-learning is becoming dominant delivery method in workplaces around the globe in various sectors and of varying sizes. E-learning had become now a three decade old technology in comparison to computer based training and education. There is essential need of design of new and efficient e-learning models which can incorporate all Indian languages sp...

Network

Cited By