S.No |
Paper Title / Authors |
Download |
Downloads |
1 |
Building Better Generative Models:
Overcoming Challenges in AI Creation
Rajiv Harish Patel Solanki |
|
2 |
2 |
Partial Key Distribution for Secure Key
Issuance in Decentralized Disruption Tolerant Networks
Bharat Jitendra Modi Vaghela |
|
1 |
3 |
A Novel Approach to Data Security Using
Color Codes and Whole Numbers
Gaurav Chandrakant
Jain Lodha |
|
1 |
4 |
Design of a Smart Self-Healing Digital
System with Fault Detection Based on Endocrine-Inspired Communication
Omprakash Virendra Chauhan Sisodia |
|
1 |
5 |
New Approach for Recognizing Authorized
Users Within a Network
Nitin Jayant Pathak
Dixit |
|
2 |
6 |
Building Better Generative Models:
Overcoming Challenges in AI Creation
Rajiv Harish Patel
Solanki |
|
1 |
7 |
Generative AI Unleashed: The
Intersection of Latent Spaces and Creative Outcomes
Nikhil Anand Mehta
Joshi |
|
1 |
8 |
Enhancing Android Device Security with
a Cloud-Based System Using the MES-II Encryption Algorithm: A Review
Rajiv Harish Patel Solanki |
|
1 |
9 |
Big Data Processing Frameworks: An
Overview of Pig, Hive, and Jaql
Ajinkya Mohan More
Pawar |
|
1 |
10 |
Reinforcement Learning and Generative
AI: Training Machines to Be Creators
Aditya Ramesh Yadav
Bhati |
|
1 |
11 |
Developing a Data Security Framework
for Cloud Computing Environments
Chetan Ashok Patil
Pawar |
|
1 |
12 |
The Role of Cloud and Semantic Web
Technologies in Transforming E-Learning
Nishant Suraj Kumar Choubey |
|
2 |
13 |
Self-Supervised Learning in Generative
AI: A Game-Changer for Creativity
Rohan Suresh Verma
Tomar |
|
2 |
14 |
Analyzing the Effects of
Computer-Emitted Energy on Users and Techniques for Electromagnetic
Shielding"
Tanmay Vishwanath Joshi Phadke |
|
1 |
15 |
A Detailed Examination of
Virtualization Technology
Vipul Narendra
Thakkar Mehta |
|
1 |
16 |
Troubleshooting and Restoring Wireless
Network Connections"
Ritesh Bhaskar
Kumar Bhuyan |
|
1 |
17 |
The Architecture Behind Generative AI:
A Look into Neural Networks
Kunal Mahesh
Bhatnagar Singh |
|
2 |
18 |
Enhancing User Experience with Beacon
Technology on Android
Ananya Rekha Sharma
Chauhan |
|
2 |
19 |
Evaluating UNIX Security Protocols for
Cloud Computing Environments
Priya Sushma Patel
Solanki |
|
2 |
20 |
The Future of Multi-Modal Generative
Models: Integrating Text, Image, and Sound
Pranav Dinesh
Kapoor Thakur |
|
2 |
21 |
Efficient Email Content Extraction and
Summarization
Riya Meena Mehta
Joshi |
|
2 |