Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Logarithmic Distance-Based Multi-Objective Genetic Programming Approach for Classification of Imbalanced Data

    Standard classification algorithms give biased results when data sets are imbalanced. Genetic Programming, a machine learning algorithm based on the evolution of species in nature, also suffers from the same i...

    Arvind Kumar, Shivani Goel, Nishant Sinha, Arpit Bhardwaj in Advanced Computing (2022)

  2. No Access

    Chapter and Conference Paper

    A Review on Unbalanced Data Classification

    Classification is a supervised machine learning technique to categorize data into a predefined and distinct number of classes. Again, in the real world, most of these data set are unbalanced. If one of its cla...

    Arvind Kumar, Shivani Goel, Nishant Sinha in Proceedings of International Joint Confere… (2022)

  3. No Access

    Chapter and Conference Paper

    Predicting the Presence of Newt-Amphibian Using Genetic Programming

    In nature, aquatic ecosystems play a very important aspect. River valleys, wetlands, and water reservoirs are territories for various species of vegetation and wildlife. The prediction of these species is very...

    Arvind Kumar, Nishant Sinha, Arpit Bhardwaj in Advances in Data and Information Sciences (2022)

  4. No Access

    Chapter and Conference Paper

    Coronavirus Visual Dashboard and Data Repository: COVID-19

    This research paper talks about the site advancement and the most hazardous and pandemic infection COVID-19. We are additionally examining the Steps followed for making a site. We analyze diverse site advancem...

    M. Arvindhan, Mohit Bhatia, Nishant Sinha in Applications of Computational Methods in M… (2022)

  5. No Access

    Chapter and Conference Paper

    Assessment of Weight Factor in Genetic Programming Fitness Function for Imbalanced Data Classification

    In real-world data classification, applications often have an imbalanced distribution of data over various classes. This imbalanced distribution imposes intense challenges, and because of this, traditional cla...

    Arvind Kumar, Shivani Goel, Nishant Sinha in Proceedings of the International Conferenc… (2022)

  6. No Access

    Chapter and Conference Paper

    Realization of Security System Using Facial Recognition and Arduino Keypad Door Lock System

    In today’s world which is full of technological and unseen errors security is one of the major issues that should not be over seen. The technological and modern perspective has to be used to resolve the modern...

    Rasmita Lenka, Nishant Shubham in Advances in Electronics, Communication and… (2021)

  7. No Access

    Chapter and Conference Paper

    Classification of Forest Cover Type Using Random Forests Algorithm

    Natural resource planning    important aspect for any society. Knowing forest cover type is one of them. Multiple statistical and machine learning approaches are already proposed in past for classification. I...

    Arvind Kumar, Nishant Sinha in Advances in Data and Information Sciences (2020)

  8. No Access

    Article

    Certain Observations on ACORN v3 and Grain v1—Implications Towards TMDTO Attacks

    It is known that for a stream cipher with state size less than 2.5 times the key size, it is possible to mount a Time-Memory-Data Trade-Off attack with an online complexity lower than the exhaustive key search...

    Akhilesh Anilkumar Siddhanti, Subhamoy Maitra in Journal of Hardware and Systems Security (2019)

  9. Article

    Open Access

    26th Annual Computational Neuroscience Meeting (CNS*2017): Part 3

    Adam J. H. Newton, Alexandra H. Seidenstein, Robert A. McDougal in BMC Neuroscience (2017)

  10. No Access

    Chapter and Conference Paper

    Quantum Algorithms Related to \(\textit{HN}\) -Transforms of Boolean Functions

    \(\textit{HN}\) -transforms, which have been proposed as generalizations of Hadamard transforms, are construc...

    Sugata Gangopadhyay, Subhamoy Maitra in Codes, Cryptology and Information Security (2017)

  11. No Access

    Chapter and Conference Paper

    An Executable Sequential Specification for Spark Aggregation

    Spark is a new promising platform for scalable data-parallel computation. It provides several high-level application programming interfaces (APIs) to perform parallel data aggregation. Since execution of paral...

    Yu-Fang Chen, Chih-Duo Hong, Ondřej Lengál, Shin-Cheng Mu in Networked Systems (2017)

  12. No Access

    Chapter and Conference Paper

    Certain Observations on ACORN v3 and the Implications to TMDTO Attacks

    ACORN is a lightweight authenticated cipher which is one of the selected designs among the fifteen third round candidates. This is based on the underlying model of a stream cipher with 6 LFSRs of different len...

    Akhilesh Anilkumar Siddhanti in Security, Privacy, and Applied Cryptograph… (2017)

  13. Article

    Open Access

    Predicting surgical outcome in intractable epilepsy using a computational model of seizure initiation

    Nishant Sinha, Justin Dauwels, Yujiang Wang, Sydney S Cash in BMC Neuroscience (2015)

  14. Chapter and Conference Paper

    Commutativity of Reducers

    In the Map-Reduce programming model for data parallel computation, a reducer computes an output from a list of input values associated with a key. The inputs however may not arrive at a reducer in a fixed orde...

    Yu-Fang Chen, Chih-Duo Hong, Nishant Sinha in Tools and Algorithms for the Construction … (2015)

  15. No Access

    Chapter and Conference Paper

    What Gives? A Hybrid Algorithm for Error Trace Explanation

    When a program fails, the cause of the failure is often buried in a long, hard-to-understand error trace. We present a new technique for automatic error localization, which formally unifies prior approaches ba...

    Vijayaraghavan Murali, Nishant Sinha in Verified Software: Theories, Tools and Exp… (2014)

  16. Chapter and Conference Paper

    Alternate and Learn: Finding Witnesses without Looking All over

    Most symbolic bug detection techniques perform search over the program control flow graph based on either forward symbolic execution or backward weakest preconditions computation. The complexity of determining...

    Nishant Sinha, Nimit Singhania, Satish Chandra in Computer Aided Verification (2012)

  17. Chapter and Conference Paper

    Object Model Construction for Inheritance in C++ and Its Applications to Program Analysis

    Modern object-oriented programming languages such as C++ provide convenient abstractions and data encapsulation mechanisms for software developers. However, these features also complicate testing and static an...

    **g Yang, Gogul Balakrishnan, Naoto Maeda, Franjo Ivančić in Compiler Construction (2012)

  18. No Access

    Article

    Verification of evolving software via component substitutability analysis

    This paper presents an automated and compositional procedure to solve the substitutability problem in the context of evolving software systems. Our solution contributes two techniques for checking correctness of ...

    Sagar Chaki, Edmund Clarke, Natasha Sharygina in Formal Methods in System Design (2008)

  19. Chapter and Conference Paper

    SAT-Based Compositional Verification Using Lazy Learning

    A recent approach to automated assume-guarantee reasoning (AGR) for concurrent systems relies on computing environment assumptions for components using the L * algorithm for learning regular langu...

    Nishant Sinha, Edmund Clarke in Computer Aided Verification (2007)

  20. Chapter and Conference Paper

    Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions

    The state explosion problem is one of the core bottlenecks in the model checking of concurrent software. We show how to ameliorate the problem by combining the ability of partial order techniques to reduce the...

    Vineet Kahlon, Aarti Gupta, Nishant Sinha in Computer Aided Verification (2006)

previous disabled Page of 2