Loading [MathJax]/extensions/MathMenu.js
Gaurav Bhatia - IEEE Xplore Author Profile

Showing 1-5 of 5 results

Filter Results

Show

Results

With the advancement of technology, cyber-attacks are becoming more frequent than ever before. When a sophisticated attack occurs, organization business suffers adversely. Small and Midsize Enterprise (SME) operate with limited resources in terms of staff and budgets. Most SME does not have capabilities to detect advanced threats on their network and attackers can easily target them. Our research ...Show More
The context of smart cities and cloud computing is essential to understanding the broader landscape in which security challenges and privacy perspectives play pivotal roles in enhancing the quality of life for the residents in smart cities. Smart cities use information and communication technologies (ICT) to optimize resource efficiency. They leverage data, sensors, and connectivity to improve var...Show More
Data compression is a specific and special task that goes on and on as more and more data is required to be stored in the memory. For memory usage, it is always “smaller is better”. But, of course, there is always a threshold limit which may never be broken. Saving a graphical file is always challenging task as whenever we try to compress it, there is a possibility of loss of data whether in terms...Show More
AI Virtual Keyboard is a model that imitates the standard keyboard. This project of virtualizing the hardware keyboard with the help of Computer Vision and the Hand Detecting module allows users to type with hand gestures and modify different layouts of the keyboard. AI virtual keyboard is a computer-based keyboard that works by typing on the optically detectable area which can be used to remove t...Show More
In present scenario, the Internet of Things (IoT) has rapidly become a major use in people’s modern life. A network defines number of heterogeneous devices using a single communication like Wi-Fi, Bluetooth etc. In today’s real world, there are many ways to connect with the IoT object. IoT uses many technologies like Wi-Fi, GPRS, 5G etc. for identifying the location of an object. The objects can b...Show More