no code implementations • 10 Dec 2022 • Sakshi Chhabra, Ashutosh Kumar Singh
A resource management unit is used in this paradigm for energy and performing virtual machine allocation with efficiency, assuring the safe execution of users' applications, and protecting against data breaches brought on by unauthorised virtual machine access real-time.
no code implementations • 24 Nov 2022 • Rishabh Gupta, Ashutosh Kumar Singh
Therefore, a privacy-preserving model is proposed, which protects the privacy of the data without compromising machine learning efficiency.
no code implementations • 21 Mar 2022 • Ishu Gupta, Vartika Sharma, Sizman Kaur, Ashutosh Kumar Singh
In this modern era of overpopulation disease prediction is a crucial step in diagnosing various diseases at an early stage.
no code implementations • 11 Mar 2022 • Ishu Gupta, Harsh Mittal, Deepak Rikhari, Ashutosh Kumar Singh
Weather is a phenomenon that affects everything and everyone around us on a daily basis.
no code implementations • 10 Mar 2022 • Ishu Gupta, Tarun Kumar Madan, Sukhman Singh, Ashutosh Kumar Singh
Hence, it is vital to have a prediction model which can accurately predict future stock prices.
no code implementations • 23 Aug 2021 • Harsh Mittal, Deepak Rikhari, Jitendra Kumar, Ashutosh Kumar Singh
Cricket is unarguably one of the most popular sports in the world.
no code implementations • 23 Aug 2021 • Pooja Tiwari, Simran Mehta, Nishtha Sakhuja, Jitendra Kumar, Ashutosh Kumar Singh
In this paper, we present a comprehensive review of various methods used to detect credit card fraud.