Results for 'Pavan Vinayak Shetty Ganapathi Avabrath, Mohana Poojary'

12 found
Order:
  1.  15
    Plant Disease Detection and Proposing Solution Using Image Processing and Deep Learning with IOT.Pavan Vinayak Shetty Ganapathi Avabrath, Mohana Poojary - 2023 - International Journal of Innovative Research in Science, Engineering and Technology 12 (4):3608-3613.
    Farmers are often concerned about plant disease since it can greatly affect crop productivity and quality. Expert manual inspection is required in traditional techniques of identifying plant diseases, which can be time- and money-consuming. Deep learning algorithms have made automated plant disease detection systems more practical. Convolutional neural networks (CNNs) are used in our proposed deep learning- based technique for the diagnosis of plant diseases. The suggested system uses plant photos as input to determine the presence of illnesses in the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. Collected Papers (on various scientific topics), Volume XII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This twelfth volume of Collected Papers includes 86 papers comprising 976 pages on Neutrosophics Theory and Applications, published between 2013-2021 in the international journal and book series “Neutrosophic Sets and Systems” by the author alone or in collaboration with the following 112 co-authors (alphabetically ordered) from 21 countries: Abdel Nasser H. Zaied, Muhammad Akram, Bobin Albert, S. A. Alblowi, S. Anitha, Guennoun Asmae, Assia Bakali, Ayman M. Manie, Abdul Sami Awan, Azeddine Elhassouny, Erick González-Caballero, D. Dafik, Mithun Datta, Arindam Dey, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3.  61
    Be Intentional About Fairness!: Fairness, Size, and Multiplicity in the Rashomon Set.Gordon Dai, Pavan Ravishankar, Rachel Yuan, Daniel B. Neill & Emily Black - manuscript
    When selecting a model from a set of equally performant models, how much unfairness can you really reduce? Is it important to be intentional about fairness when choosing among this set, or is arbitrarily choosing among the set of “good” models good enough? Recent work has highlighted that the phenomenon of model multiplicity—where multiple models with nearly identical predictive accuracy exist for the same task—has both positive and negative implications for fairness, from strengthening the enforcement of civil rights law in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. AICTE AI-Based Assistive Portal for Stakeholder (Institutions) Approval Process.C. H. Pavan Kumar - 2024 - International Journal of Engineering Innovations and Management Strategies 1 (2):1-12.
    The AICTE approval process for institutions plays a critical role in regulating technical education in India, ensuring quality and adherence to established standards. However, the current system is cumbersome, leading to delays and inefficiencies. This paper proposes the development of an AI-powered assistive portal that automates key stages of the approval process. The portal aims to reduce manual errors, provide real-time feedback, and enhance user experience for stakeholders, thereby improving overall system efficiency and transparency.
    Download  
     
    Export citation  
     
    Bookmark  
  5.  37
    Home Depot Breach or The Rise of Ransomware.Vaka Pavan Reddy - 2014 - Neuroquantology 12 (4):485-491.
    The Home Depot data breach, which occurred in 2014, marked a significant turning point in the cybersecurity landscape, drawing attention to the increasing prevalence of ransomware and cyberattacks targeting large-scale retail organizations. This breach exposed the personal and financial information of over 56 million customers and highlighted the vulnerabilities in the systems used by major corporations. The attack was attributed to a sophisticated ransomware operation that gained access through a third-party vendor’s compromised credentials, ultimately enabling cybercriminals to infiltrate Home Depot’s (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6.  30
    How to Respond to a Cyber Security Incident.Vaka Pavan Reddy - 2025 - International Journal of Innovative Research in Computer and Communication Engineering 13 (1):6-9.
    Cyber security incidents pose significant threats to organizations, potentially leading to data breaches, financial losses, and reputational damage. Effective incident response is crucial for mitigating these impacts and restoring normal operations. This research article explores comprehensive strategies and best practices for responding to cyber security incidents. By reviewing existing literature, analyzing related work, and identifying research gaps, the study aims to develop a robust framework for incident response. The methodology encompasses data collection, tool utilization, and algorithm implementation to establish an (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  7.  71
    Sulla creatività dei sistemi di calcolo, con una lettura filosofica del problema della fermata di Alan Turing.Michele Pavan - 2023 - «Epekeina. International Journal of Ontology, History and Critics», Vol. 16, No. 1-2 16 (1-2):1-33.
    The main goal of this essay is to demonstrate the creativity of computational systems (both living and non-living) through a philosophical interpretation of Alan Turing's halting theorem. The first part consists of a brief genealogy of studies focused on the analogy between humans and machines, with a specific focus on the issue of creativity. It aims to show how, since the publication of Turing's 1950 paper Computing Machinery and Intelligence, a subjectivist approach has become dominant in these studies—namely, the tendency (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  35
    Zero-Day Vulnerabilities.Vaka Pavan Reddy - 2012 - International Journal of Innovative Research in Science, Engineering and Technology 1 (2):318-322.
    Zero-day vulnerabilities are critical security risks that exploit previously unknown flaws in software systems, making them difficult to detect and defend against. As such vulnerabilities are discovered by attackers before the software vendor is aware of them, they provide a significant advantage to malicious entities. The exploitation of zero-day vulnerabilities is a major concern for both individuals and organizations, as it can lead to unauthorized data access, loss of information, and compromised systems. This paper aims to explore the nature of (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Collected Papers (on Neutrosophic Theory and Applications), Volume VII.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This seventh volume of Collected Papers includes 70 papers comprising 974 pages on (theoretic and applied) neutrosophics, written between 2013-2021 by the author alone or in collaboration with the following 122 co-authors from 22 countries: Mohamed Abdel-Basset, Abdel-Nasser Hussian, C. Alexander, Mumtaz Ali, Yaman Akbulut, Amir Abdullah, Amira S. Ashour, Assia Bakali, Kousik Bhattacharya, Kainat Bibi, R. N. Boyd, Ümit Budak, Lulu Cai, Cenap Özel, Chang Su Kim, Victor Christianto, Chunlai Du, Chunxin Bo, Rituparna Chutia, Cu Nguyen Giap, Dao The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Collected Papers (on Physics, Artificial Intelligence, Health Issues, Decision Making, Economics, Statistics), Volume XI.Florentin Smarandache - 2022 - Miami, FL, USA: Global Knowledge.
    This eleventh volume of Collected Papers includes 90 papers comprising 988 pages on Physics, Artificial Intelligence, Health Issues, Decision Making, Economics, Statistics, written between 2001-2022 by the author alone or in collaboration with the following 84 co-authors (alphabetically ordered) from 19 countries: Abhijit Saha, Abu Sufian, Jack Allen, Shahbaz Ali, Ali Safaa Sadiq, Aliya Fahmi, Atiqa Fakhar, Atiqa Firdous, Sukanto Bhattacharya, Robert N. Boyd, Victor Chang, Victor Christianto, V. Christy, Dao The Son, Debjit Dutta, Azeddine Elhassouny, Fazal Ghani, Fazli Amin, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Introduction to the Non-dualism Approach in Hinduism and its Connection to Other Religions and Philosophies.Sriram Ganapathi Subramanian & Benyamin Ghojogh - manuscript
    In this paper, we introduce the Hinduism religion and philosophy. We start with introducing the holy books in Hinduism including Vedas and Upanishads. Then, we explain the simplistic Hinduism, Brahman, gods and their incarnations, stories of apocalypse, karma, reincarnation, heavens and hells, vegetarianism, and sanctity of cows. Then, we switch to the profound Hinduism which is the main core of Hinduism and is monotheistic. In profound Hinduism, we focus on the non-dualism or Advaita Vedanta approach in Hinduism. We discuss consciousness, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12.  31
    Sustainable Cloud Computing: Achieving NetZero Carbon Emissions in Data Centers.Deepak Ramchandani Taman Poojary - 2024 - International Journal of Multidisciplinary Research in Science, Engineering and Technology 8 (3):1720-1725.
    Cloud computing is revolutionizing modern computing infrastructure, but as the demand for cloud services grows, so does the energy consumption of the data centers that support them. Data centers, which house the servers that power cloud computing, are significant contributors to global carbon emissions. This paper explores strategies to achieve net-zero carbon emissions in data centers, focusing on energy efficiency, renewable energy integration, and carbon offsetting practices. The paper reviews current technologies, practices, and policies aimed at reducing the carbon footprint (...)
    Download  
     
    Export citation  
     
    Bookmark