Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    A Big Data Approach for Healthcare Analysis During Covid-19

    In the present times, with the massive growth of the Internet, unbelievably enormous measures of data are in our reach. Although our lives have been changed by prepared access to boundless information, still w...

    Santosh K. Vishwakarma, Nirmal K. Gupta in Smart Systems: Innovations in Computing (2022)

  2. No Access

    Chapter and Conference Paper

    Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review

    Between the year 2003 and 2018, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper co...

    Ashish Jain, Nirmal K. Gupta in Smart Systems: Innovations in Computing (2022)

  3. No Access

    Chapter and Conference Paper

    Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review

    Between the year 1994 and 2018, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This ...

    Ashish Jain, Prakash C. Sharma in Smart Systems: Innovations in Computing (2022)

  4. No Access

    Chapter and Conference Paper

    State of the Art and Challenges in Blockchain Applications

    Blockchain is a decentralized infrastructure widely used in emerging digital cryptocurrencies. With the gradual acceptance of Bitcoin, it has attracted attention and research in this field. Blockchain technolo...

    Nirmal K. Gupta, Ashish Jain, Prakash C. Sharma in Smart Systems: Innovations in Computing (2022)

  5. No Access

    Chapter and Conference Paper

    A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers

    The efficient utilization of one of the latest search heuristic, namely, cuckoo search for automated cryptanalysis (or attack) of substitution ciphers is addressed. A previously proposed genetic algorithm base...

    Ashish Jain, Narendra S. Chaudhari in Neural Information Processing (2015)

  6. No Access

    Chapter and Conference Paper

    Identification of Conjunct Verbs in Hindi and Its Effect on Parsing Accuracy

    This paper introduces a work on identification of conjunct verbs in Hindi. The paper will first focus on investigating which noun-verb combination makes a conjunct verb in Hindi using a set of linguistic diagn...

    Rafiya Begum, Karan **dal, Ashish Jain in Computational Linguistics and Intelligent … (2011)

  7. No Access

    Book

    Enterprise Service Oriented Architectures

    Concepts, Challenges, Recommendations

    James McGovern, Oliver Sims (2006)

  8. No Access

    Chapter

    Engineering of Two Web-Enabled Commercial Software Services

    Traditionally software is loaded onto, or downloaded to, a user’s PC where it is then executed. The ubiquitous Web, however, allows another choice, a Web front end for data collection residing on the user’s PC...

    Siddhartha R. Dalal, Ashish Jain, Nachimuthu Karunanithi, Gardner Patton in Web Engineering (2001)