Survey on online electronic paymentss security

S Saxena, S Vyas, BS Kumar… - 2019 Amity International …, 2019‏ - ieeexplore.ieee.org
As days are passing online payments is getting popular and for this people uses various
modes of payment like Debit card, Credit Card, electronic wallet, e-banking etc. People …

Intelligent agents and autonomous robots

D Bhargava - Detecting and mitigating robotic cyber security risks, 2017‏ - igi-global.com
Over decades new technologies, algorithms and methods are evolved and proposed. We
can witness a paradigm shift from typewriters to computers, mechanics to mechnotronics …

Enhanced accident detection system using safety application for emergency in mobile environment: Safeme

A Hirawat, D Bhargava - … of Fourth International Conference on Soft …, 2015‏ - Springer
Road accidents claim a huge toll on precious human life all over the world. However,
significant amount of lives could be saved if the information regarding the accident could be …

Brain Tumour Detection Using MRI Images and CNN Architecture

PK Kushwaha, A Rana, BP Lohani… - 2024 International …, 2024‏ - ieeexplore.ieee.org
The brain tumour is a phenomenon involving the creation of cells which multiply within the
brain and they are different from the normal cells. Among all platforms, magnetic resonance …

Overcoming Quantum Hardware Challenges: Navigating the Landscape of Quantum Computing

A Singh, Y Kumar, P Yadav, N Tripathi… - 2024 International …, 2024‏ - ieeexplore.ieee.org
Quantum computing has surfaced as a revolutionary idea with the potential to transform
industries ranging from cryptography to drug discovery. However, alongside its promise …

Design and development of an intelligent agent based framework for predictive analytics

D Bhargava, RC Poonia, U Arora - 2016 3rd International …, 2016‏ - ieeexplore.ieee.org
The arrival of World Wide Web has led to the explosive growth of information on the web.
There is a sudden boom in quality of raw data/information, which is commonly referred as …

Mind reading by face recognition using security enhancement model

V Vyas, S Saxena, D Bhargava - … on Soft Computing for Problem Solving …, 2015‏ - Springer
Face recognition has always been an area of interest for the researchers because it seems
so fascinating in itself. As the time has passed, the evolution of human brain and social …

Generational zgc-an improvement in garbage collector in java 21

I Chaudhary, BP Lohani, PK Kushwaha… - 2024 International …, 2024‏ - ieeexplore.ieee.org
Java support the garbage collection automatically. However, with the introduce of JRE7 it
introduces the hotspot Architecture having heap, where object data is stored. Garbage …

OMMIP: An optimized multiple mobile agents itinerary planning for wireless sensor networks

K Lingaraj, RV Biradar, VC Patil - Journal of Information and …, 2017‏ - Taylor & Francis
Mobile agent is programmed software that move across networks or the among the sensor
nodes. MA is capable to execute and deliver the code for efficient and re-usability of …

A framework for agent-based detection and prevention of DDoS attacks in distributed p2P networks

G Jaideep, BP Battula - … Computing: A Networking Perspective and Future …, 2019‏ - Springer
Peer-to-peer networks have become popular as they are able to deliver useful services.
They are distributed in nature and utilize distributed resources to perform intended activities …