[PDF][PDF] Operating system security with discrete mathematical structure for secure round robin scheduling method with intelligent time quantum

A Kumar, AK Gupta, D Panwar… - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
These days, the problems of scheduling and security are increasingly pressing as a result of
the rapidly growing number of implementations that are operated in operating systems …

[PDF][PDF] An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach

SS Kushwaha, S Joshi… - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
The technology behind blockchain is quickly becoming one of the most crucial innovations
in recent years. The Smart contracts are digital agreements, made in between two untrusted …

[PDF][PDF] Mathematical modeling of intelligent system for predicting effectiveness of premenstrual syndrome

R Joshi, P Mathur, AK Gupta… - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
Majority of reproductive-aged women experience some form of physical discomfort or
emotional unease in the weeks leading up to the onset of menstruation. The symptoms are …

Unveiling the Communication Dynamics: A Comprehensive Review of Mobile Health Applications

MM Ghani, MN Osman, WA Mustafa… - … in Applied Sciences …, 2024 - semarakilmu.com.my
Technology has penetrated every aspect of our lives since the pandemic ended, from work
to entertainment. The seamless integration of work, leisure, and learning with portable …

[PDF][PDF] Illustration of free convection tangent hyperbolic fluid in conjunction with magnetic field within a microchannel

PK Pattnaik, SR Mishra, P Mathur, G Pradhan - … .s3.ap-south-1.amazonaws.com
This article investigates the physical interpretation of the magnetic field on the free
convection of hyperbolic tangent fluid within a microchannel. The radiating heat through the …

[PDF][PDF] Discrete mathematical models for enhancing cybersecurity: A mathematical and statistical analysis of machine learning approaches in phishing attack detection

D Goyal, F Sheth, P Mathur, AK Gupta - … .s3.ap-south-1.amazonaws.com
This paper presents a discreate mathematical modelling of cybersecurity phishing attack
detection methodologies, emphasizing the crucial role of continual advancements in …

[PDF][PDF] Deep insight: Mathematical modeling and statistical analysis for mango leaf disease classification using advanced deep learning models

P Mathur, F Sheth, D Goyal, AK Gupta - … .s3.ap-south-1.amazonaws.com
This paper presents a comprehensive investigation into the mathematical modeling and
statistical analysis of classification of mango leaf diseases employing state-of-the-art Deep …

[PDF][PDF] Artificial intelligence-based classification performance evaluation in monophonic and polyphonic indian classical instruments recognition with hybrid domain …

AV Chitre, K Wanjale, A Deshmukh, SP Kosbatwar… - … .s3.ap-south-1.amazonaws.com
In computer music, instrument recognition is a critical part of sound modeling. Pitch, timbre,
loudness, duration, and spatialization are all components of musical sounds. All of these …

[PDF][PDF] Optimized data analysis through hybrid approach over trusted security environment

S Sharma, B Sharma - … .s3.ap-south-1.amazonaws.com
For those who can uncover the knowledge hidden inside this data, this offers enormous
opportunity, but it also creates new difficulties. In this study, we explore how the …

[PDF][PDF] Bouc-Wen model with machine learning for SISO and MIMO nano-positioning system

C Sumitha, MB Anandaraju - … .s3.ap-south-1.amazonaws.com
Most of the application in present world have taken 'Nano'as a part of their near future
implementation. In Nano-Positioning System (NPS) mechanical dynamics are handled at …