Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Review of Metaheuristic Techniques for Feature Selection

    Due to the rise of high-dimensional datasets in various sectors, feature selection is one of the most important issues. The primary goal of the feature selection problem is to lower the dimension of the featur...

    Sanat Jain, Ashish Jain, Mahesh Jangid in Soft Computing: Theories and Applications (2023)

  2. No Access

    Chapter and Conference Paper

    A Big Data Approach for Healthcare Analysis During Covid-19

    In the present times, with the massive growth of the Internet, unbelievably enormous measures of data are in our reach. Although our lives have been changed by prepared access to boundless information, still w...

    Santosh K. Vishwakarma, Nirmal K. Gupta in Smart Systems: Innovations in Computing (2022)

  3. No Access

    Chapter and Conference Paper

    A Review on Metaheuristic Techniques in Automated Cryptanalysis of Classical Substitution Cipher

    Between the year 1993 and 2019, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical substitution cipher. This p...

    Ashish Jain, Prakash C. Sharma, Nirmal K. Gupta in Data Engineering for Smart Systems (2022)

  4. No Access

    Chapter and Conference Paper

    Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review

    Between the year 2003 and 2018, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper co...

    Ashish Jain, Nirmal K. Gupta in Smart Systems: Innovations in Computing (2022)

  5. No Access

    Chapter and Conference Paper

    An Approach for Graph Coloring Problem Using Grou** of Vertices

    The algorithm works by dividing the nodes of a graph G into two groups; one is non-visited type of groups including the nodes that are not colored and visited type of groups including the nodes that are alread...

    Prakash C. Sharma, Santosh Kumar Vishwakarma in Data Engineering for Smart Systems (2022)

  6. No Access

    Chapter and Conference Paper

    Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review

    Between the year 1994 and 2018, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This ...

    Ashish Jain, Prakash C. Sharma in Smart Systems: Innovations in Computing (2022)

  7. No Access

    Chapter and Conference Paper

    State of the Art and Challenges in Blockchain Applications

    Blockchain is a decentralized infrastructure widely used in emerging digital cryptocurrencies. With the gradual acceptance of Bitcoin, it has attracted attention and research in this field. Blockchain technolo...

    Nirmal K. Gupta, Ashish Jain, Prakash C. Sharma in Smart Systems: Innovations in Computing (2022)

  8. No Access

    Chapter and Conference Paper

    A Modified Cuckoo Search for the n-Queens Problem

    A modified cuckoo search algorithm is proposed in this paper to solve the n-queens problem. For solving the problem, the host nests are treated as permutations of a cluster of distinctive values. The main idea is...

    Ashish Jain, Manoj K. Bohra, Manoj K. Sharma in Data Engineering for Smart Systems (2022)

  9. No Access

    Chapter and Conference Paper

    Classification of Cervical Cancer Through C4.5 Algorithm

    In today’s scenario, cervical malignant growth is one of the most affecting diseases in females. Its pace of event is around 80% in low and middle-pay nations. Cancer research is very important for the early t...

    Sanat Jain, Ashish Jain, Mahesh Jangid in Soft Computing for Problem Solving (2021)

  10. No Access

    Chapter and Conference Paper

    Analysis of Career Development Opportunities in IT Sectors in Jaipur

    Career development programs are gaining significance as a stimulus that drive the employee growth as well as organization productivity, and hence, all the organizations are attempting to adopt the concept and ...

    Ashish Jain, Swati Mishra, Ruchi Goyal in Proceedings of the Second International Co… (2021)

  11. No Access

    Chapter and Conference Paper

    A New Design of Equiangular Circular Cum Elliptical Honeycomb Photonic Crystal Fiber

    The design of Silica Glass photonic crystal fiber is proposed for lowering the chromatic dispersion. For this design, Finite Difference Time Domain (FDTD) methodology along with the transparent boundary condit...

    Ashish Jain, Ravindra Kumar Sharma in Inventive Communication and Computational … (2020)

  12. No Access

    Chapter and Conference Paper

    Local Invariant Feature-Based Gender Recognition from Facial Images

    Human gender is an important demographic characteristic in the society. Recognizing demography characteristics of individuals, for example, age and gender using automatic image recognition taken much considera...

    Vivek Kumar Verma, Sumit Srivastava, Tarun Jain in Soft Computing for Problem Solving (2019)

  13. No Access

    Chapter and Conference Paper

    Performance Assessment of Thirteen Crossover Operators Using GA

    Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...

    Ashish Jain, Tripti Mishra, Jyoti Grover, Vivek Verma in Soft Computing for Problem Solving (2019)

  14. No Access

    Chapter and Conference Paper

    A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers

    The efficient utilization of one of the latest search heuristic, namely, cuckoo search for automated cryptanalysis (or attack) of substitution ciphers is addressed. A previously proposed genetic algorithm base...

    Ashish Jain, Narendra S. Chaudhari in Neural Information Processing (2015)

  15. No Access

    Chapter and Conference Paper

    Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization

    The security of most Public Key Cryptosystem (PKC) proposed in literature relies on the difficulty of the integer factorization problem or discrete logarithm problem. However, using shor’s [19] algorithm the p...

    Ashish Jain, Narendra S. Chaudhari in International Joint Conference SOCO’14-CIS… (2014)

  16. No Access

    Chapter and Conference Paper

    Identification of Conjunct Verbs in Hindi and Its Effect on Parsing Accuracy

    This paper introduces a work on identification of conjunct verbs in Hindi. The paper will first focus on investigating which noun-verb combination makes a conjunct verb in Hindi using a set of linguistic diagn...

    Rafiya Begum, Karan **dal, Ashish Jain in Computational Linguistics and Intelligent … (2011)

  17. No Access

    Article

    Relating logic programs via program maps

    This paper presents a mathematical theory underlying a systematic method for constructingProlog programs calledstepwise enhancement. Stepwise enhancement dictates building a program starting with askeleton progra...

    Marc Kirschenbaum, Leon Sterling in Annals of Mathematics and Artificial Intel… (1993)