Volume no :
|Issue no :
Article Type :
Author :
M. Abhishek, N. Om Prakash, P. ShivaniPublished Date :
Publisher :
Page No: 1 - 11
Abstract : MLNova is a structured platform designed to bridge the gap between theoretical knowledge and practical application in machine learning. Focused on enhancing student learning, the platform offers a path for beginners to explore key concepts in data preprocessing and model evaluation. Through interactive modules, MLNova delivers pre-recorded lessons and real-world projects, allowing learners to experience hands-on engagement. This paper outlines the platform’s design, methodology, and the impact of interactive learning on improving comprehension of machine learning principles. Early feedback indicates a significant improvement in user engagement and learning outcomes.
Keyword Machine Learning, Data Preprocessing, Interactive Learning, Educational Platform
Reference:
- Murthy, G., and R. Shankar. “Composite Fermions.” (1998): 254-306.
- Mahalakshmi, A., Goud, N. S., & Murthy, G. V. (2018). A survey on phishing and it’s detection techniques based on support vector method (Svm) and software defined networking (sdn). International Journal of Engineering and Advanced Technology, 8(2), 498-503.
- Murthy, G., & Shankar, R. (2002). Semiconductors II-Surfaces, interfaces, microstructures, and related topics-Hamiltonian theory of the fractional quantum Hall effect: Effect of Landau level mixing. Physical Review-Section B-Condensed Matter, 65(24), 245309-245309.
- Murthy, G. V. K., Sivanagaraju, S., Satyanarayana, S., & Rao, B. H. (2014). Optimal placement of DG in distribution system to mitigate power quality disturbances. International Journal of Electrical and Computer Engineering, 7(2), 266-271.
- Muraleedharan, K., Raghavan, R., Murthy, G. V. K., Murthy, V. S. S., Swamy, K. G., & Prasanna, T. (1989). An investigation on the outbreaks of pox in buffaloes in Karnataka.
- Murthy, G. V. K., Sivanagaraju, S., Satyanarayana, S., & Rao, B. H. (2012). Reliability improvement of radial distribution system with distributed generation. International Journal of Engineering Science and Technology (IJEST), 4(09), 4003-4011.
- Gowda, B. M. V., Murthy, G. V. K., Upadhye, A. S., & Raghavan, R. (1996). Serotypes of Escherichia coli from pathological conditions in poultry and their antibiogram.
- Balasubbareddy, M., Murthy, G. V. K., & Kumar, K. S. (2021). Performance evaluation of different structures of power system stabilizers. International Journal of Electrical and Computer Engineering (IJECE), 11(1), 114-123.
- Murthy, G. V. K., & Sivanagaraju, S. (2012). S. Satyana rayana, B. Hanumantha Rao,” Voltage stability index of radial distribution networks with distributed generation,”. J. Electr. Eng, 5(6), 791-803.
- Anuja, P. S., Kiran, V. U., Kalavathi, C., Murthy, G. N., & Kumari, G. S. (2015). Design of elliptical patch antenna with single & double U-slot for wireless applications: a comparative approach. International Journal of Computer Science and Network Security (IJCSNS), 15(2), 60.
- Siva Prasad, B. V. V., Mandapati, S., Kumar Ramasamy, L., Boddu, R., Reddy, P., & Suresh Kumar, B. (2023). Ensemble-based cryptography for soldiers’ health monitoring using mobile ad hoc networks. Automatika: časopis za automatiku, mjerenje, elektroniku, računarstvo i komunikacije, 64(3), 658-671.
- Siva Prasad, B. V. V., Sucharitha, G., Venkatesan, K. G. S., Patnala, T. R., Murari, T., & Karanam, S. R. (2022). Optimisation of the execution time using hadoop-based parallel machine learning on computing clusters. In Computer Networks, Big Data and IoT: Proceedings of ICCBI 2021(pp. 233-244). Singapore: Springer Nature Singapore.
- Prasad, B. V., & Ali, S. S. (2017). Software–defined networking based secure rout-ing in mobile ad hoc network. International Journal of Engineering & Technology, 7(1.2), 229.
- Elechi, P., & Onu, K. E. (2022). Unmanned Aerial Vehicle Cellular Communication Operating in Non-terrestrial Networks. In Unmanned Aerial Vehicle Cellular Communications(pp. 225-251). Cham: Springer International Publishing.
- Prasad, B. V. V. S., Mandapati, S., Haritha, B., & Begum, M. J. (2020, August). Enhanced Security for the authentication of Digital Signature from the key generated by the CSTRNG method. In 2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT)(pp. 1088-1093). IEEE.
- Alapati, N., Prasad, B. V. V. S., Sharma, A., Kumari, G. R. P., Veeneetha, S. V., Srivalli, N., … & Sahitya, D. (2022, November). Prediction of Flight-fare using machine learning. In 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)(pp. 134-138). IEEE.
- Alapati, N., Prasad, B. V. V. S., Sharma, A., Kumari, G. R. P., Bhargavi, P. J., Alekhya, A., … & Nandini, K. (2022, November). Cardiovascular Disease Prediction using machine learning. In 2022 International Conference on Fourth Industrial Revolution Based Technology and Practices (ICFIRTP)(pp. 60-66). IEEE.
- Mukiri, R. R., Kumar, B. S., & Prasad, B. V. V. (2019, February). Effective Data Collaborative Strain Using RecTree Algorithm. In Proceedings of International Conference on Sustainable Computing in Science, Technology and Management (SUSCOM), Amity University Rajasthan, Jaipur-India.
- Rao, B. T., Prasad, B. V. V. S., & Peram, S. R. (2019). Elegant Energy Competent Lighting in Green Buildings Based on Energetic Power Control Using IoT Design. In Smart Intelligent Computing and Applications: Proceedings of the Second International Conference on SCI 2018, Volume 1(pp. 247-257). Springer Singapore.
- Someswar, G. M., & Prasad, B. V. V. S. (2017, October). USVGM protocol with two layer architecture for efficient network management in MANET’S. In 2017 2nd International Conference on Communication and Electronics Systems (ICCES)(pp. 738-741). IEEE.
- Hnamte, V., & Balram, G. (2022). Implementation of Naive Bayes Classifier for Reducing DDoS Attacks in IoT Networks. Journal of Algebraic Statistics, 13(2), 2749-2757.
- Balram, G., Poornachandrarao, N., Ganesh, D., Nagesh, B., Basi, R. A., & Kumar, M. S. (2024, September). Application of Machine Learning Techniques for Heavy Rainfall Prediction using Satellite Data. In 2024 5th International Conference on Smart Electronics and Communication (ICOSEC)(pp. 1081-1087). IEEE.
- Subrahmanyam, V., Sagar, M., Balram, G., Ramana, J. V., Tejaswi, S., & Mohammad, H. P. (2024, May). An Efficient Reliable Data Communication For Unmanned Air Vehicles (UAV) Enabled Industry Internet of Things (IIoT). In 2024 3rd International Conference on Artificial Intelligence For Internet of Things (AIIoT)(pp. 1-4). IEEE.
- KATIKA, R., & BALRAM, G. (2013). Video Multicasting Framework for Extended Wireless Mesh Networks Environment. pp-427-434, IJSRET, 2(7).
- Prasad, P. S., & Rao, S. K. M. (2017). HIASA: Hybrid improved artificial bee colony and simulated annealing based attack detection algorithm in mobile ad-hoc networks (MANETs). Bonfring International Journal of Industrial Engineering and Management Science, 7(2), 01-12.
- Prasad, P. S., & Rao, S. K. M. (2017). A Survey on Performance Analysis of ManetsUnder Security Attacks. network, 6(7).
- Reddy, P. R. S., & Ravindranath, K. (2024). Enhancing Secure and Reliable Data Transfer through Robust Integrity. Journal of Electrical Systems, 20(1s), 900-910.
- REDDY, P. R. S., & RAVINDRANATH, K. (2022). A HYBRID VERIFIED RE-ENCRYPTION INVOLVED PROXY SERVER TO ORGANIZE THE GROUP DYNAMICS: SHARING AND REVOCATION. Journal of Theoretical and Applied Information Technology, 100(13).
- Reddy, P. R. S., Ram, V. S. S., Greshma, V., & Kumar, K. S. Prediction of Heart Healthiness.
- Reddy, P. R. S., Reddy, A. M., & Ujwala, B. IDENTITY PRESERVING IN DYNAMIC GROUPS FOR DATA SHARING AND AUDITING IN CLOUD.
- Madhuri, K., Viswanath, N. K., & Gayatri, P. U. (2016, November). Performance evaluation of AODV under Black hole attack in MANET using NS2. In 2016 international conference on ICT in Business Industry & Government (ICTBIG)(pp. 1-3). IEEE.
- Kovoor, M., Durairaj, M., Karyakarte, M. S., Hussain, M. Z., Ashraf, M., & Maguluri, L. P. (2024). Sensor-enhanced wearables and automated analytics for injury prevention in sports. Measurement: Sensors, 32, 101054.
- Rao, N. R., Kovoor, M., Kishor Kumar, G. N., & Parameswari, D. V. L. (2023). Security and privacy in smart farming: challenges and opportunities. International Journal on Recent and Innovation Trends in Computing and Communication, 11(7 S).
- Madhuri, K. (2023). Security Threats and Detection Mechanisms in Machine Learning. Handbook of Artificial Intelligence, 255.
- DASTAGIRAIAH, D. (2024). A SYSTEM FOR ANALYSING CALL DROP DYNAMICS IN THE TELECOM INDUSTRY USING MACHINE LEARNING AND FEATURE SELECTION. Journal of Theoretical and Applied Information Technology, 102(22).
- Sukhavasi, V., Kulkarni, S., Raghavendran, V., Dastagiraiah, C., Apat, S. K., & Reddy, P. C. S. (2024). Malignancy Detection in Lung and Colon Histopathology Images by Transfer Learning with Class Selective Image Processing.
- Sudhakar, R. V., Dastagiraiah, C., Pattem, S., & Bhukya, S. (2024). Multi-Objective Reinforcement Learning Based Algorithm for Dynamic Workflow Scheduling in Cloud Computing. Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 12(3), 640-649.
- PushpaRani, K., Roja, G., Anusha, R., Dastagiraiah, C., Srilatha, B., & Manjusha, B. (2024, June). Geological Information Extraction from Satellite Imagery Using Deep Learning. In 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT)(pp. 1-7). IEEE.
- Sravan, K., Rao, L. G., Ramineni, K., Rachapalli, A., & Mohmmad, S. (2024). Analyze the Quality of Wine Based on Machine Learning Approach Check for updates. Data Science and Applications: Proceedings of ICDSA 2023, Volume 3, 820, 351.
- Chandhar, K., Ramineni, K., Ramakrishna, E., Ramana, T. V., Sandeep, A., & Kalyan, K. (2023, December). Enhancing Crop Yield Prediction in India: A Comparative Analysis of Machine Learning Models. In 2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON)(pp. 1-4). IEEE.
- Ramineni, K., Shankar, K., Shabana, Mahender, A., & Mohmmad, S. (2023, June). Detecting of Tree Cutting Sound in the Forest by Machine Learning Intelligence. In International Conference on Power Engineering and Intelligent Systems (PEIS)(pp. 303-314). Singapore: Springer Nature Singapore.
- Ashok, J., RAMINENI, K., & Rajan, E. G. (2010). BEYOND INFORMATION RETRIEVAL: A SURVEY. Journal of Theoretical & Applied Information Technology, 15.
- Sekhar, P. R., & Sujatha, B. (2020, July). A literature review on feature selection using evolutionary algorithms. In 2020 7th International Conference on Smart Structures and Systems (ICSSS)(pp. 1-8). IEEE.
- Sekhar, P. R., & Sujatha, B. (2023). Feature extraction and independent subset generation using genetic algorithm for improved classification. J. Intell. Syst. Appl. Eng, 11, 503-512.
- Sekhar, P. R., & Goud, S. (2024). Collaborative Learning Techniques in Python Programming: A Case Study with CSE Students at Anurag University. Journal of Engineering Education Transformations, 38(Special Issue 1).
- Pesaramelli, R. S., & Sujatha, B. (2024, March). Principle correlated feature extraction using differential evolution for improved classification. In AIP Conference Proceedings(Vol. 2919, No. 1). AIP Publishing.
- Amarnadh, V., & Moparthi, N. R. (2023). Comprehensive review of different artificial intelligence-based methods for credit risk assessment in data science. Intelligent Decision Technologies, 17(4), 1265-1282.
- Amarnadh, V., & Moparthi, N. R. (2024). Prediction and assessment of credit risk using an adaptive Binarized spiking marine predators’ neural network in financial sector. Multimedia Tools and Applications, 83(16), 48761-48797.
- Amarnadh, V., & Moparthi, N. R. (2024). Range control-based class imbalance and optimized granular elastic net regression feature selection for credit risk assessment. Knowledge and Information Systems, 1-30.
- Amarnadh, V., & Akhila, M. (2019, May). RETRACTED: Big Data Analytics in E-Commerce User Interest Patterns. In Journal of Physics: Conference Series(Vol. 1228, No. 1, p. 012052). IOP Publishing.
- Selvan, M. Arul, and S. Miruna Joe Amali. “RAINFALL DETECTION USING DEEP LEARNING TECHNIQUE.” (2024).
- Selvan, M. Arul. “Fire Management System For Indutrial Safety Applications.” (2023).
- Selvan, M. A. (2023). A PBL REPORT FOR CONTAINMENT ZONE ALERTING APPLICATION.
- Selvan, M. A. (2023). CONTAINMENT ZONE ALERTING APPLICATION A PROJECT BASED LEARNING REPORT.
- Selvan, M. A. (2021). Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.
- Selvan, M. A. (2023). INDUSTRY-SPECIFIC INTELLIGENT FIRE MANAGEMENT SYSTEM.
- Selvan, M. Arul. “PHISHING CONTENT CLASSIFICATION USING DYNAMIC WEIGHTING AND GENETIC RANKING OPTIMIZATION ALGORITHM.” (2024).
- Selvan, M. Arul. “Innovative Approaches in Cardiovascular Disease Prediction Through Machine Learning Optimization.” (2024).
- Lokhande, M., Kalpanadevi, D., Kate, V., Tripathi, A. K., & Bethapudi, P. (2023). Study of Computer Vision Applications in Healthcare Industry 4.0. In Healthcare Industry 4.0(pp. 151-166). CRC Press.
- Tripathi, A. K., Soni, R., & Verma, S. (2022). A review on ethnopharmacological applications, pharmacological activities, and bioactive compounds of Mimosa pudica (linn.). Research Journal of Pharmacy and Technology, 15(9), 4293-4299.
- Mishra, S., Grewal, J., Wal, P., Bhivshet, G. U., Tripathi, A. K., & Walia, V. (2024). Therapeutic potential of vasopressin in the treatment of neurological disorders. Peptides, 174, 171166.
- Koliqi, R., Fathima, A., Tripathi, A. K., Sohi, N., Jesudasan, R. E., & Mahapatra, C. (2023). Innovative and Effective Machine Learning-Based Method to Analyze Alcoholic Brain Activity with Nonlinear Dynamics and Electroencephalography Data. SN Computer Science, 5(1), 113.
- Biswas, D., Sharma, G., Pandey, A., Tripathi, A. K., Pandey, A., & Sahu, P. & Chauhan, P.(2022). Magnetic Nanosphere: Promising approach to deliver the drug to the site of action. NeuroQuantology, 20(11), 4038.
- Tripathi, A. K., Diwedi, P., Kumar, N., Yadav, B. K., & Rathod, D. (2022). Trigonella Foenum Grecum L. Seed (Fenugreek) Pharmacological Effects on Cardiovascular and Stress Associated Disease. NeuroQuantology, 20(8), 4599.
- Tripathi, A. K., Dwivedi, C. P., Bansal, P., Pradhan, D. K., Parganiha, R., & Sahu, D. An Ethnoveterinary Important Plant Terminalia Arjuna. International Journal of Health Sciences, (II), 10601-10607.
- Babbar, R., Kaur, A., Vanya, Arora, R., Gupta, J. K., Wal, P., … & Behl, T. (2024). Impact of Bioactive Compounds in the Management of Various Inflammatory Diseases. Current Pharmaceutical Design, 30(24), 1880-1893.
- Sahu, A., Mishra, S., Wal, P., Debnath, B., Chouhan, D., Gunjal, S. D., & Tripathi, A. K. (2024). Novel Quinoline‐Based RAF Inhibitors: A Comprehensive Review on Synthesis, SAR and Molecular Docking Studies. ChemistrySelect, 9(23), e202400347.
- Vaishnav, Y., Banjare, L., Verma, S., Sharma, G., Biswas, D., Tripathi, A., … & Manjunath, K. (2022). Computational Method on Hydroxychloroquine and Azithromycin for SARS-CoV-2: Binding Affinity Studies. Research Journal of Pharmacy and Technology, 15(12), 5467-5472.
- Ramya, S., Devi, R. S., Pandian, P. S., Suguna, G., Suganya, R., & Manimozhi, N. (2023). Analyzing Big Data challenges and security issues in data privacy. International Research Journal of Modernization in Engineering Technology and Science, 5(2023), 421-428.
- Pandian, P. S., & Srinivasan, S. (2016). A Unified Model for Preprocessing and Clustering Technique for Web Usage Mining. Journal of Multiple-Valued Logic & Soft Computing, 26.
- Thamma, S. R. T. S. R. (2025). Transforming E-Commerce with Pragmatic Advertising Using Machine Learning Techniques.
- Thamma, S. R. T. S. R. (2024). Optimization of Generative AI Costs in Multi-Agent and Multi-Cloud Systems.
- Thamma, S. R. T. S. R. (2024). Revolutionizing Healthcare: Spatial Computing Meets Generative AI.
- Thamma, S. R. T. S. R. (2024). Cardiovascular image analysis: AI can analyze heart images to assess cardiovascular health and identify potential risks.
- Thamma, S. R. T. S. R. (2024). Generative AI in Graph-Based Spatial Computing: Techniques and Use Cases.
- NAVANEETHA, N., & KALYANI, S. (2012). Efficient Association Rule Mining using Indexing Support.
- Thirumoorthi, P., Deepika, S., & Yadaiah, N. (2014, March). Solar energy based dynamic sag compensator. In 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE)(pp. 1-6). IEEE.
- Nair, R., Zafrullah, S. N., Vinayasree, P., Singh, P., Zahra, M. M. A., Sharma, T., & Ahmadi, F. (2022). Blockchain‐Based Decentralized Cloud Solutions for Data Transfer. Computational Intelligence and Neuroscience, 2022(1), 8209854.
- Vinayasree, P., & Reddy, A. M. (2023). Blockchain-Enabled Hyperledger Fabric to Secure Data Transfer Mechanism for Medical Cyber-Physical System: Overview, Issues, and Challenges. EAI Endorsed Transactions on Pervasive Health and Technology, 9.
- Vinayasree, P., & Reddy, A. M. (2025). A Reliable and Secure Permissioned Blockchain‐Assisted Data Transfer Mechanism in Healthcare‐Based Cyber‐Physical Systems. Concurrency and Computation: Practice and Experience, 37(3), e8378.
- VINAYASREE¹, P., & REDDY, A. M. (2024). A SCALABLE AND SECURE BLOCKCHAIN-BASED HEALTHCARE SYSTEM: OPTIMIZING PERFORMANCE, SECURITY, AND PRIVACY WITH ADAPTIVE TECHNOLOGIES. Journal of Theoretical and Applied Information Technology, 102(22).
- Sahoo, P. K., & Jeripothula, P. (2020). Heart failure prediction using machine learning techniques. Available at SSRN 3759562.
- Sahoo, P. K., Chottray, R. K., & Pattnaiak, S. (2012). Research issues on windows event log. International Journal of Computer Applications, 41(19).
- Sahoo, P. K. (2018, March). Data mining a way to solve Phishing Attacks. In 2018 International Conference on Current Trends towards Converging Technologies (ICCTCT)(pp. 1-5). IEEE.
- Sahoo, P. K., Chhotray, R. K., Jena, G., & Pattnaik, S. (2013). An implementation of elliptic curve cryptography. J. Eng. Res. Technol.(IJERT), 2(1), 2278-0181.
- Nagesh, O., Kumar, T., & Venkateswararao, V. (2017). A Survey on Security Aspects of Server Virtualization in Cloud Computing. International Journal of Electrical & Computer Engineering (2088-8708), 7(3).
- Budaraju, R. R., & Nagesh, O. S. (2023, June). Multi-Level Image Thresholding Using Improvised Cuckoo Search Optimization Algorithm. In 2023 3rd International Conference on Intelligent Technologies (CONIT)(pp. 1-7). IEEE.
- Nagesh, O. S., Budaraju, R. R., Kulkarni, S. S., Vinay, M., Ajibade, S. S. M., Chopra, M., … & Kaliyaperumal, K. (2024). Boosting enabled efficient machine learning technique for accurate prediction of crop yield towards precision agriculture. Discover Sustainability, 5(1), 78.
- Jyothi, A., & Indira, B. (2018). A Two Way Validation Framework for Cloud Storage Security. International Journal of Engineering & Technology, 7(2.20), 236-242.
- Rekha, S. B., & Rao, M. V. (2017, September). Methodical activity recognition and monitoring of a person through smart phone and wireless sensors. In 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI)(pp. 1456-1459). IEEE.
- Sangisetti, B. R., Pabboju, S., & Racha, S. (2019, June). Smart call forwarding and conditional signal monitoring in duos mobile. In Proceedings of the Third International Conference on Advanced Informatics for Computing Research(pp. 1-11).
- Sangisetti, B. R., & Pabboju, S. (2021). Analysis on human activity recognition using machine learning algorithm and personal activity correlation. Psychol Educ J, 58(2), 5754-5760.
- Kumar, T. V. (2018). Project Risk Management System Development Based on Industry 4.0 Technology and its Practical Implications.
- Tambi, V. K., & Singh, N. (2015). Potential Evaluation of REST Web Service Descriptions for Graph-Based Service Discovery with a Hypermedia Focus.
- Kumar, T. V. (2024). A Comparison of SQL and NO-SQL Database Management Systems for Unstructured Data.
- Kumar, T. V. (2024). A Comprehensive Empirical Study Determining Practitioners’ Views on Docker Development Difficulties: Stack Overflow Analysis.
- Kumar, T. V. (2024). Developments and Uses of Generative Artificial Intelligence and Present Experimental Data on the Impact on Productivity Applying Artificial Intelligence that is Generative.
- Kumar, T. V. (2024). A New Framework and Performance Assessment Method for Distributed Deep Neural NetworkBased Middleware for Cyberattack Detection in the Smart IoT Ecosystem.
- Sharma, S., & Dutta, N. (2016). Analysing Anomaly Process Detection using Classification Methods and Negative Selection Algorithms.
- Sharma, S., & Dutta, N. (2024). Examining ChatGPT’s and Other Models’ Potential to Improve the Security Environment using Generative AI for Cybersecurity.
- Sakshi, S. (2023). Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.
- Arora, P., & Bhardwaj, S. Mitigating the Security Issues and Challenges in the Internet of Things (IOT) Framework for Enhanced Security.
- Sakshi, S. (2024). A Large-Scale Empirical Study Identifying Practitioners’ Perspectives on Challenges in Docker Development: Analysis using Stack Overflow.
- Sakshi, S. (2023). Advancements and Applications of Generative Artificial Intelligence and show the Experimental Evidence on the Productivity Effects using Generative Artificial Intelligence.
- Sakshi, S. (2023). Assessment of Web Services based on SOAP and REST Principles using Different Metrics for Mobile Environment and Multimedia Conference.
- Sakshi, S. (2022). Design and Implementation of a Pattern-based J2EE Application Development Environment.
- Sharma, S., & Dutta, N. (2018). Development of New Smart City Applications using Blockchain Technology and Cybersecurity Utilisation. Development, 7(11).
- Sharma, S., & Dutta, N. (2017). Development of Attractive Protection through Cyberattack Moderation and Traffic Impact Analysis for Connected Automated Vehicles. Development, 4(2).
- Sharma, S., & Dutta, N. (2015). Evaluation of REST Web Service Descriptions for Graph-based Service Discovery with a Hypermedia Focus. Evaluation, 2(5).
- Sharma, S., & Dutta, N. (2024). Examining ChatGPT’s and Other Models’ Potential to Improve the Security Environment using Generative AI for Cybersecurity.
- Sharma, S., & Dutta, N. (2015). Cybersecurity Vulnerability Management using Novel Artificial Intelligence and Machine Learning Techniques. Sakshi, S. (2023). Development of a Project Risk Management System based on Industry 4.0 Technology and its Practical Implications.
- Sharma, S., & Dutta, N. (2017). Classification and Feature Extraction in Artificial Intelligence-based Threat Detection using Analysing Methods.
- Sharma, S., & Dutta, N. (2016). Analysing Anomaly Process Detection using Classification Methods and Negative Selection Algorithms.
- Sharma, S., & Dutta, N. (2015). Distributed DNN-based Middleware for Cyberattack Detection in the Smart IOT Ecosystem: A Novel Framework and Performance Evaluation Technique.
- Bhat, S. (2015). Technology for Chemical Industry Mixing and Processing. Technology, 2(2).
- Bhat, S. (2024). Building Thermal Comforts with Various HVAC Systems and Optimum Conditions.
- Bhat, S. (2020). Enhancing Data Centre Energy Efficiency with Modelling and Optimisation of End-To-End Cooling.
- Bhat, S. (2016). Improving Data Centre Energy Efficiency with End-To-End Cooling Modelling and Optimisation.
- Bhat, S. (2015). Deep Reinforcement Learning for Energy-Saving Thermal Comfort Management in Intelligent Structures.
- Bhat, S. (2015). Design and Function of a Gas Turbine Range Extender for Hybrid Vehicles.
- Bhat, S. (2023). Discovering the Attractiveness of Hydrogen-Fuelled Gas Turbines in Future Energy Systems.
- Bhat, S. (2019). Data Centre Cooling Technology’s Effect on Turbo-Mode Efficiency.
- Bhat, S. (2018). The Impact of Data Centre Cooling Technology on Turbo-Mode Efficiency.
- Archana, B., & Sreedaran, S. (2023). Synthesis, characterization, DNA binding and cleavage studies, in-vitro antimicrobial, cytotoxicity assay of new manganese (III) complexes of N-functionalized macrocyclic cyclam based Schiff base ligands. Polyhedron, 231, 116269.
- Archana, B., & Sreedaran, S. (2022). New cyclam based Zn (II) complexes: effect of flexibility and para substitution on DNA binding, in vitro cytotoxic studies and antimicrobial activities. Journal of Chemical Sciences, 134(4), 102.
- Archana, B., & Sreedaran, S. (2021). POTENTIALLY ACTIVE TRANSITION METAL COMPLEXES SYNTHESIZED AS SELECTIVE DNA BINDING AND ANTIMICROBIAL AGENTS. European Journal of Molecular and Clinical Medicine, 8(1), 1962-1971.
- Rasappan, A. S., Palanisamy, R., Thangamuthu, V., Dharmalingam, V. P., Natarajan, M., Archana, B., … & Kim, J. (2024). Battery-type WS2 decorated WO3 nanorods for high-performance supercapacitors. Materials Letters, 357, 135640.
- Arora, P., & Bhardwaj, S. (2017). Investigation and Evaluation of Strategic Approaches Critically before Approving Cloud Computing Service Frameworks.
- Arora, P., & Bhardwaj, S. (2017). Enhancing Security using Knowledge Discovery and Data Mining Methods in Cloud Computing.
- Arora, P., & Bhardwaj, S. (2017). Combining Internet of Things and Wireless Sensor Networks: A Security-based and Hierarchical Approach.
- Arora, P., & Bhardwaj, S. (2019). Safe and Dependable Intrusion Detection Method Designs Created with Artificial Intelligence Techniques. machine learning, 8(7).
- Arora, P., & Bhardwaj, S. (2017). A Very Safe and Effective Way to Protect Privacy in Cloud Data Storage Configurations.
- Arora, P., & Bhardwaj, S. (2019). The Suitability of Different Cybersecurity Services to Stop Smart Home Attacks.
- Arora, P., & Bhardwaj, S. (2020). Research on Cybersecurity Issues and Solutions for Intelligent Transportation Systems.
- Arora, P., & Bhardwaj, S. (2021). Methods for Threat and Risk Assessment and Mitigation to Improve Security in the Automotive Sector. Methods, 8(2).
