- Topic Modeling
- Natural Language Processing Techniques
- Blockchain Technology Applications and Security
- Neuroscience and Neural Engineering
- Advanced Chemical Sensor Technologies
- Biomedical Text Mining and Ontologies
- Machine Learning and Data Classification
- Physical Unclonable Functions (PUFs) and Hardware Security
- Photovoltaic System Optimization Techniques
- Satellite Communication Systems
- Hybrid Renewable Energy Systems
- Ferroelectric and Negative Capacitance Devices
- Advanced DC-DC Converters
- Solar Thermal and Photovoltaic Systems
- Advanced Surface Polishing Techniques
- Advanced Authentication Protocols Security
- Microgrid Control and Optimization
- Advanced Neural Network Applications
- Smart Grid Energy Management
- Energy and Environment Impacts
- Multilevel Inverters and Converters
- Muscle activation and electromyography studies
- Advanced Memory and Neural Computing
- IoT-based Smart Home Systems
- Visual Attention and Saliency Detection
Indian Institute of Management Ranchi
2024
Indian Institute of Information Technology Allahabad
2022-2024
Indian Institute of Technology Kanpur
2024
Indian Institute of Technology Indore
2024
Vellore Institute of Technology University
2024
Delhi Technological University
2024
Indian Institute of Technology Palakkad
2023
National Institute of Technology Goa
2023
Centre for Artificial Intelligence and Robotics
2023
Guru Ghasidas Vishwavidyalaya
2023
Prompt engineering has emerged as an indispensable technique for extending the capabilities of large language models (LLMs) and vision-language (VLMs). This approach leverages task-specific instructions, known prompts, to enhance model efficacy without modifying core parameters. Rather than updating parameters, prompts allow seamless integration pre-trained into downstream tasks by eliciting desired behaviors solely based on given prompt. Prompts can be natural instructions that provide...
Abstract. The MJO-Teleconnections diagnostics package is an open-source Python software that provides process-level evaluation of predicted by subseasonal-to-seasonal (S2S) forecast systems. in-depth both tropospheric and stratospheric pathways defining the atmospheric teleconnections from tropics to extratropics on S2S times scale. analyses include comparison a model with default verification data set or user-provided data. consists user-friendly graphic user interface (GUI), which allows...
Middlemen are critical in the distribution of goods Fast Moving Consumer Goods (FMCG) sector. This paper describes a scheme where hybrid recommendation system uses combination content based filtering and collaborative through user ratings to recommend products middlemen. The allows middleman enter product they deal with, then provides them with relevant recommendations. User facilitate process. Results from experiments show discovery capabilities system.
This work proposes the implementation of idea real-time human emotion recognition through digital image processing techniques using CNN. presents significant literacy calculations used in facial protestation for exact distinctive verification and acknowledgment that can effectively capably see sentiments from vibes client. The proposed model gives six probability values based on different expressions. Large datasets are explored investigated training model. In support this work, CNN Deep...
Product recommendation systems work well at boosting user engagement, increasing sales, and enhancing customer satisfaction by making personalized relevant suggestions for goods based on users' preferences behaviors. However, these face several challenges, including data sparsity, scalability, bias. Recent studies have looked into the creation of image-based using deep learning transfer methods, such as Reverse Image Search, to overcome difficulties. This study discusses use techniques,...
The spread of Internet Things (IoT) devices in our homes, healthcare, industries etc. are more easily infiltrated than desktop computers have resulted a surge botnet attacks based on IoT devices, which may jeopardize the security. Hence, there is need to detect these and mitigate damage. Existing systems rely supervised learning-based intrusion detection methods, require large labelled data set achieve high accuracy. Botnets onerous because stealthy command & control protocols amount network...
A DC-DC converter with a high voltage conversion ratio is presented in this paper. The given has similarities an interleaved boost on the input side and resembles Voltage Multiplier (VM) output part. capable of providing continuous current that makes it more suitable for non conventional energy system. Also, which been paper can incorporate single source or multiple sources small modification structure. compactness achieved as multiplier available offers comparatively low ratings storage...
Abstract: Hate speech is a form of verbal abuse that targetsindividuals depending on their race, religion, ethnicity, gender, sexual orientation, or other personal characteristics. It can be spoken, written, displayed, and found in variety contexts, including online, person, the media. Speech has potential to have devastating impact victims, causing emotional distress, social isolation, even physical harm. Recognizing hate challenging task, especially multilingual contexts. This because...
ABSTRACT Internet of Drones (IoD) is one the most beneficial and has many versatile applications like Surveillance Security, Delivery Logistics, Environmental Monitoring, Agriculture, so forth. The IoD network crucial for collecting sensitive data geo‐coordinates, vehicle traffic data, property details while surveying various deployment locations in smart cities. communication between users drones can be compromised over insecure wireless channels by multiple attacks such as...
Training and evaluating language models increasingly requires the construction of meta-datasets --diverse collections curated data with clear provenance. Natural prompting has recently lead to improved zero-shot generalization by transforming existing, supervised datasets into a diversity novel pretraining tasks, highlighting benefits meta-dataset curation. While successful in general-domain text, translating these data-centric approaches biomedical modeling remains challenging, as labeled...
With the emerging advancements in VANETs, preserving location privacy has become a vital requirement. Most of schemes focus on changing pseudonyms after certain interval time or some special scenarios (can be mix-context mix-zone) to avoid linking messages. Due pseudonym attacks, elementary methods are found inefficient provide desirable protection privacy. The spatiotemporal information contained beacons makes vehicles traceable, and driver's is breached. In this paper, we propose mechanism...
Abstract: This paper introduces the implementation of Universal Asynchronous Receiver- Transmitter Controller (UART) based on Microprogrammed Field Programmable Gate Array (FPGA. Our UART design is fully functional and built-in. Coded using Verilog from top to bottom visible in Spartan-3E FPGA Xilinx ISE Webpack 14.7. Use results show that can work maximum clock frequency 218.248 MHz. The frequent use controller 192.773 bits hence this why with a small amount storage. Keywords: Receiver,...
In this paper, a modified Artificial Bee Colony algorithm is proposed. Then estimation of the parameters fractional order chaotic systems performed using proposed and Ant algorithm. For purpose modeling, four v iz. Financial System, Chen Lorenz's system 3 Cell Net have been considered. Each defined by set fractional-order differential equations. These equations comprise several variables – model parameters, derivative orders, initial conditions. system's entire state future values to be...
Abstract: As digital content grows, quality data management and solutions are needed. This work presents a unique application (chatbot PDF reader) designed to improve users' interaction experience with documents. Through interactive communication, the chatbot allows users use machine learning natural language processing (NLP) process files. Users can ask questions, get details, extract specific files, browse PDFs through simple queries. Chatbots cognitive text-based technologies provide...
This review paper aims to shed light on the technology that has helped make web accessible people with a wide spectrum of disabilities.It also discusses future scope these existing technologies, developing them and convenient for special needs.Artificial Intelligence (AI) presents promising avenue enhancing accessibility by leveraging its capabilities address various challenges faced individuals disabilities.By harnessing AI developers designers can create more inclusive digital experiences,...