Papers by Dr. Akhilesh A . Waoo
Developments in the Built Environment, 2021
This is a PDF file of an article that has undergone enhancements after acceptance, such as the ad... more This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version will undergo additional copyediting, typesetting and review before it is published in its final form, but we are providing this version to give early visibility of the article. Please note that, during the production process, errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
Customers look at ratings and feedback from other customers before deciding whether or not to buy... more Customers look at ratings and feedback from other customers before deciding whether or not to buy a product. This content may take the form of favorable or negative reviews written by customers who have lately used the product in question. The Machine Learning Calculation may be able to assist us in both the visual depiction of the information as well as the factorization of the information. This investigation of customer behavior uses the Naive Bayes and Logistic Regression methods, both of which are presented in this work. The tactics based on logistic regression performed preferable than those based on other approaches. The contemporary problems are dissected, and then the contemporary solutions to those problems are presented and discussed. Afterwards, the results of the test indicate that the recommended technique has a greater accuracy as well as a higher recall and F1 score. The technique ends up being successful, with a high degree of precision on the comments. Python Spider 3.7 is the programmer that is used in order to carry out both the replication and the analysis.
Zenodo (CERN European Organization for Nuclear Research), Sep 10, 2021
This is an IoT-enabled RFID-based door locking gadget. This door lock system will know how long t... more This is an IoT-enabled RFID-based door locking gadget. This door lock system will know how long the door is open and in this door lock system, only those people who register will be able to enter using their card. It uses a servo motor that operates with the help of Arduino. The Arduino board runs with complete programming that is stored inside it. By using this gadget, an owner can track his office and the place where he wants to let the specific people in. It is also very secure. RFID Module, LCD Display Red and Green and Yellow LED Light and Buzzer have also been used in this door lock system. When the door is locked, the yellow LED will be on and when the door lock is open, the green led light will turn on. The Red LED work will alert you that your card is wrong.
An intrusion detection system, often known as IDS, is a piece of equipment or a piece of software... more An intrusion detection system, often known as IDS, is a piece of equipment or a piece of software that monitors a network or collection of devices in order to search for indications of possible intrusion. The frequency of cyber assaults has grown in recent years, and with it, the damage they do to society. The study of cyber security and the avoidance of cyber assaults, such as the use of intrusion detection as a defensive mechanism, is therefore needed. The internet services are widely used. Services based on computers, the internet, and other forms of technology are all considered part of the cyber world. The cyber world has advanced greatly thanks to new protocols and technologies. Cyber security is a major issue for every service that operates online. Network and hostbased intrusion detection systems (NIDS/HIDS) are the backbones of any cyber security infrastructure. The NSL-KDD dataset is often used in algorithm research and verification and is widely employed in both the study and development of intrusion detection systems. In this study, we provide a neural network approach to intrusion detection system threat prediction. In this paper, the Python Spyder software is used for the simulation.
Apple Academic Press eBooks, Jul 18, 2023
Apple Academic Press eBooks, Jul 18, 2023
A proprietary open wireless technology standard for exchanging data over short distances from one... more A proprietary open wireless technology standard for exchanging data over short distances from one device to another is not much secure. As in traditional method of Bluetooth communication between two or more devices a 128-bit symmetric stream cipher called E0 is used which seems to be week under some conditions it may be broken under certain conditions with the time complexity O (2 64). To improve security of data we propose a hybrid encryption technique. In this technique we use triple DES for encryption of the key for which we use Tiger algorithm. In Tiger algorithm there is double protection of Data using triple DES and with the help of this algorithm transmission of data will be more secure for exchanging data over short distances from one device to another.
Journal La Edusci, 2022
New Education Policy was formulated by the Government via a consultation process. It emerges as a... more New Education Policy was formulated by the Government via a consultation process. It emerges as an inclusive, participatory, and holistic approach of MHRD initiated in January 2015, MHRDA new National Education Policy (NEP) has been approved by the Union Cabinet, which makes modifications in the Indian system of education from school to college. The New Education Policy outlines India's goal of becoming a knowledge superpower. As part of the restructuring, the Ministry of Human Resources Development (MHRD) became the Ministry of Education. NEP promotes ideas, concepts, applications, and problem-solving activities. This policy calls for more interactive teaching-learning. A technology-based educational approach is emphasized in this policy. This policy demonstrates a greater use of ICT for remote and interactive education at school and in higher education. The study in this paper shows the impact of ICT tools on future education and various methods for building virtual infrastruc...
International Journal of Scientific Research in Computer Science, Engineering and Information Technology
Through the use of relevant data to build an algorithm, machine learning primarily aims to automa... more Through the use of relevant data to build an algorithm, machine learning primarily aims to automate human help. A subset of artificial intelligence (AI), machine learning (ML) focuses on the development of systems that can learn from past data, recognize patterns, and reach logical conclusions with little to no human involvement. The concept of cyber security involves guarding against hostile attack on digital systems such computers, servers, mobile devices, networks, and the data they are connected to. Accounting for cyber security where machine learning is used and using machine learning to enable cyber security are the two main components of combining cyber security and ML. We may benefit from this union in a number of ways, including by giving machine learning models better security, enhancing the effectiveness of cyber security techniques, and supporting the efficient detection of zero day threats with minimal human involvement. In this review paper, we combine ML and cyber sec...
Zenodo (CERN European Organization for Nuclear Research), Mar 18, 2023
CRC Press eBooks, Jan 16, 2023
Smart innovation, systems and technologies, Nov 29, 2022
Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India
Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India
Proceedings of The International Conference on Emerging Trends in Artificial Intelligence and Smart Systems, THEETAS 2022, 16-17 April 2022, Jabalpur, India
Elementary Education Online, 2021
Human-Centric Smart Computing
Artificial Intelligence for Neurological Disorders
Uploads
Papers by Dr. Akhilesh A . Waoo