Journal of Clinical and Experimental Neuropsychology, 1999
... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William ... more ... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William J. Mahoney3 Departments of 1Psychology ... Longitudinal (Baker & Cantwell, 1987) and epi-demiological (Beitchman, Nair, Clegg, Fergu-son, & Patel, 1986) studies suggest that ...
This project focusses on developing an android application which can be used for recommending pla... more This project focusses on developing an android application which can be used for recommending places to the user based on his current GPS location. For this we use user based collaborative filtering algorithm which evaluates places based on user's current location, check-in's and preferences. Collaborative filtering algorithm is used to recommend nearest and best places to the users from the device. For the purpose of recommendation, we use a self-driven database for information of places which incorporates real-world check-in spots. Our objective is to extract information about a place and recommend user their place of interest based on their ratings and system algorithm.
Cloud computing is a new generation technology that provides a number of services with great effi... more Cloud computing is a new generation technology that provides a number of services with great efficiency and performance by removing any forms of restrictions imposed by the limitations of user’s hardware and software. However such an advanced technology comes with a risk of having loop holes in its sophisticated design that makes the system vulnerable to attacks and failure in its purpose of design. Thus security forms one of the important aspects in cloud computing. One of the most fundamental requirements in cloud computing is access control which has the paramount responsibility of providing smooth and easy access to authorized users as well as, at the same time, preventing access to any unauthorized users. Not only users but the system is also prone to insider attacks by those who are familiar with the architecture of the system. Traditional models like Mandatory access model (MAC) and Discretionary access model (DAC) may prove suitable for applications run on computer hardware ...
1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Pro... more 1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Professor, Department of Information Technology, Xavier Institute of Engineering, Mumbai, India -----------------------------------------------------------------------------***---------------------------------------------------------------------------Abstract Artificial intelligence has been a growing resource for video games for years now. Most video games, whether they’re racing games, shooting games, or strategy games, have various elements that are controlled by AI, such as the enemy bots or neutral characters. Even the ambiguous characters that don’t seem to be doing much are programmed to add more depth to the game, and to give you clues about what your next steps should be. AI in video games is a distinct subfield and differs from academic AI. It serves to improve the game-player experience rather than machine learning or decision making. During the golden age of arcade video games, ...
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Us... more Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Using MISR and Parallel Shift Register Sequence Generator (STUMPS) architecture uses a compression technique to generate a set of test patterns, to submit them to the circuit undergoing testing, and to compare the output with that of a “gold” (known to be good circuit) by loading and comparing the contents of a Multiple Input Shift Register (MISR). We propose to use algebraic signatures as the comparison signature implemented by the MISR. As we will see, the MISR is still basically a Linear Feedback Shift Register (LFSR), but can now be made to guarantee to discover one or up to k output discrepancies, where k is a very small number that determines the length of the MISR register. The construction of the algebraic signature register is generic and only the comparison value needs to be programmed.
Journal of Clinical and Experimental Neuropsychology, 1999
... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William ... more ... Nicole E. Rielly1, Charles E. Cunningham2, JoAnne E. Richards3, Heather Elbard4, and William J. Mahoney3 Departments of 1Psychology ... Longitudinal (Baker & Cantwell, 1987) and epi-demiological (Beitchman, Nair, Clegg, Fergu-son, & Patel, 1986) studies suggest that ...
This project focusses on developing an android application which can be used for recommending pla... more This project focusses on developing an android application which can be used for recommending places to the user based on his current GPS location. For this we use user based collaborative filtering algorithm which evaluates places based on user's current location, check-in's and preferences. Collaborative filtering algorithm is used to recommend nearest and best places to the users from the device. For the purpose of recommendation, we use a self-driven database for information of places which incorporates real-world check-in spots. Our objective is to extract information about a place and recommend user their place of interest based on their ratings and system algorithm.
Cloud computing is a new generation technology that provides a number of services with great effi... more Cloud computing is a new generation technology that provides a number of services with great efficiency and performance by removing any forms of restrictions imposed by the limitations of user’s hardware and software. However such an advanced technology comes with a risk of having loop holes in its sophisticated design that makes the system vulnerable to attacks and failure in its purpose of design. Thus security forms one of the important aspects in cloud computing. One of the most fundamental requirements in cloud computing is access control which has the paramount responsibility of providing smooth and easy access to authorized users as well as, at the same time, preventing access to any unauthorized users. Not only users but the system is also prone to insider attacks by those who are familiar with the architecture of the system. Traditional models like Mandatory access model (MAC) and Discretionary access model (DAC) may prove suitable for applications run on computer hardware ...
1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Pro... more 1-3Student, Information Technology, Xavier Institute of Engineering, Mumbai, India 4Assistant Professor, Department of Information Technology, Xavier Institute of Engineering, Mumbai, India -----------------------------------------------------------------------------***---------------------------------------------------------------------------Abstract Artificial intelligence has been a growing resource for video games for years now. Most video games, whether they’re racing games, shooting games, or strategy games, have various elements that are controlled by AI, such as the enemy bots or neutral characters. Even the ambiguous characters that don’t seem to be doing much are programmed to add more depth to the game, and to give you clues about what your next steps should be. AI in video games is a distinct subfield and differs from academic AI. It serves to improve the game-player experience rather than machine learning or decision making. During the golden age of arcade video games, ...
2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA), 2017
Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Us... more Chip functionality testing can greatly benefit from a Built In Self-Test (BIST). The Self-Test Using MISR and Parallel Shift Register Sequence Generator (STUMPS) architecture uses a compression technique to generate a set of test patterns, to submit them to the circuit undergoing testing, and to compare the output with that of a “gold” (known to be good circuit) by loading and comparing the contents of a Multiple Input Shift Register (MISR). We propose to use algebraic signatures as the comparison signature implemented by the MISR. As we will see, the MISR is still basically a Linear Feedback Shift Register (LFSR), but can now be made to guarantee to discover one or up to k output discrepancies, where k is a very small number that determines the length of the MISR register. The construction of the algebraic signature register is generic and only the comparison value needs to be programmed.
Uploads
Papers by Jaya Jeswani