- Cloud Computing and Resource Management
- Distributed and Parallel Computing Systems
- Blockchain Technology Applications and Security
- Scientific Computing and Data Management
- Cloud Data Security Solutions
- Advanced Steganography and Watermarking Techniques
- IoT and Edge/Fog Computing
- COVID-19 Pandemic Impacts
- Caching and Content Delivery
- Advanced Data Storage Technologies
- Cryptography and Data Security
- Topic Modeling
- Advanced Text Analysis Techniques
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Organizational and Employee Performance
- Internet Traffic Analysis and Secure E-voting
- Parallel Computing and Optimization Techniques
- Advanced Data Compression Techniques
- Internet of Things and AI
- Video Coding and Compression Technologies
- Security in Wireless Sensor Networks
- Transboundary Water Resource Management
- Digital Transformation in Law
- E-Government and Public Services
Chandigarh University
2015-2024
Jaypee Institute of Information Technology
2013-2020
Dayanand Medical College & Hospital
2020
Government Dental College and Hospital
2020
Thapar Institute of Engineering & Technology
2018-2019
Punjab Engineering College
2017
Sharda University
2013
On average, we receive approximately more than 40 emails per day and spend around 2 min reading each email, i.e., 80 a are spent by the user emails. This time can be saved if is presented with summary of Thus propose ShortMail, an email summarizing system. ShortMail produces summaries composed in English-language. Furthermore, it allows users to perform follow-up actions on these thus one-stop solution for all emailing functionalities. uses stat-of-art Semantic models deep-learning...
This paper explains the existing approaches employed for (automatic) text summarization. The summarizing method is part of natural language processing (NLP) field and applied to source document produce a compact version that preserves its aggregate meaning key concepts. On broader scale, text-based summarization are categorized into two groups: abstractive extractive. In summarization, main contents input paraphrased, possibly using vocabulary not present in document, while extractive output...
This paper examines the efficiency of interactive communiqué media algorithms in networking applications. It specializes 2 important used inside communication procedure applications, namely, Dijkstra's and Bellman-Ford algorithms. evaluates right community Protocol (SNP) approach, which enables excellent performance furthermore, this discusses differences between those phrases complexity, cost, overall performance. The consequences display that two provide different networks based totally...
The airlines industry has been a competitive marketplace that grown rapidly over the last few decades. Mostly, customers like family members, businessman, sportsman and youngsters are traveling through Airlines. If people participating, their feedback is extremely important. Customer direct may be favorable or negative, but understanding Tweets critical for improvement. This serves as conduit open-source inactive communication between promoters coincidentally exercising time duties on same...
Today the scale, complexity and intensity of Denial Service attacks has increased many folds.These have moved from simple flooding based to sophisticated Application as well Protocol specific attacks.The challenge is develop detection algorithms that can distinguish between like new pulsating denial service legitimate traffic Flash events.The presence self-similarity in computer network introduced a newer dimension techniques being developed for anomaly aggregated traffic.We propose use...
Nowadays, containerization techniques for High Performance Computing (HPC) are becoming more prominent with the increase in features and complexity of scientific applications. Message Passing Interface (MPI) applications have many dependencies terms other libraries, new patches, code versions, bug fixes to effectively execute workloads. The tasks updating version code, installing troubleshooting build issues very time-consuming complicated. These problems tackled by making MPI portable...
Prior to blockchain technology coming into much usage, the earlier cryptographic digital cash schemes relied merely on trusted authorities. Bitcoin revolutionized this conventional view of a cryptocurrency, trading decentralized, distributed ledger, completely secured by majority rule without predetermined authority or owner. Only standard primitives such as signatures and hash functions were used achieve security. Though other cryptocurrencies Bit-gold B-money which are among authority-free...
As cloud computing is increasingly embraced by people and organizations for information storage processing, security a major concern. Cryptographic algorithms are utilized to guarantee the privacy integrity of in computing. This paper presents comprehensive analysis cryptographic The talks about different sorts algorithms, their strengths, shortcomings, suitability use also analyzes threats proposes few mitigation strategies.
High Performance Computing (HPC) workloads necessitate a variety of hardware, including scalar, vector, matrix, and spatial architectures. The biggest challenge came from programming standpoint, because writing deploying code for the Central Processing Unit (CPU) accelerators like Field Programmable Gate Array (FPGA) as well Graphics (GPU) has traditionally necessitated languages, libraries, tools. oneAPI, unified model that addresses this issue makes development easier across diverse XPU...
Online learning text summarization is vital for managing the constant influx of online information. It involves condensing lengthy content into concise summaries while retaining original meaning and While several tools are available, they often fall short in preserving underlying semantics text. In this paper, we introduce an innovative approach to that strongly emphasizes capturing Our automatic summarizer leverages distributional semantic models extract incorporate semantics, producing...
This paper will help to identify and understand the key skills of employees, running gap analysis, sequencing planning, in addition such as analysis profile creation. Competency management combines human resource scheduling business development by allowing firms assess their employees' knowledge abilities against competencies necessary achieve organization's vision objectives. Then, fill vacancies, strategies programs (e.g., recruiting, learning, career progression, succession management,...
The main purpose of the study is to explore factors employee happiness through an extensive literature survey. has used a review-based descriptive method and it scrutinised approximately 100 research papers find prominent happiness. In order get more accurate results, focused group interviews (FGD's) semi-structured are conducted in education industry validate obtained results. results reveal several that influence critical for both employees organisations. findings indicate such as work...
Cloud computing allows users and organization to exchange, store, retrieve data at any time from location. Because of insufficient change control, misconfiguration, several suppliers using different techniques rules with deficiencies for securing cloud-based infrastructure. privacy sensitive data, security is a vital part cloud computing. many firms consumers exchange demanding on the cloud, it's critical consider how will be protected. The anxious concern about cloud's se-crecy. This...