Kediya, Shailesh
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Transfer learning based leaf disease detection model using convolution neural network Raut, Rahul; Bidve, Vijaykumar; Sarasu, Pakiriswamy; Kakade, Kiran Shrimant; Shaikh, Ashfaq; Kediya, Shailesh; Borde, Santosh; Pakle, Ganesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 36, No 3: December 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v36.i3.pp1857-1865

Abstract

The plants are attacked from various micro-organisms, bacterial illnesses, and pests. The signs are normally identified via leaves, stem, or fruit inspection. Illnesses that generally appeared on vegetation are from leaves and causes big harm if not managed in the early ranges. To stop this huge harm and manipulate the unfold of disorder this work implements a software system. This research work customs deep neural network to gain knowledge of probable illnesses on leaves within the early phases so it can be stopped early. Deep neural network (DNN) used for image classification. This work mainly focuses a neural network model of leaves ailment detection. The commonly available plant leaves dataset is undertaken with a dataset having special training of disease detection. In this work VGG16, ResNet50, Inception V3 and Inception ResNetV2 architectural techniques are implemented to generate and compare the results. Results are compared on the factors like precision, accuracy, recall and F1-Score. The results lead to the conclusion, that the convolution neural network (CNN) is more impactful technique to perceive and predict plant diseases.
Secure financial application using homomorphic encryption Bidve, Vijaykumar; Pavate, Aruna; Raut, Rahul; Kediya, Shailesh; Sarasu, Pakiriswamy; Rao Anne, Koteswara; Gangadhara, Aryani; Shaikh, Ashfaq
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 1: April 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i1.pp595-602

Abstract

In today’s digital age, the security and privacy of financial transactions are paramount. With the advent of technologies like homomorphic encryption, it is now possible to perform computations on encrypted data without the need to decrypt it first, offering a promising avenue for secure financial applications. This research paper explores the implementation and implications of utilizing homomorphic encryption in financial applications to safeguard sensitive data while maintaining computational integrity. By employing homomorphic encryption techniques, financial institutions can enhance the confidentiality of their clients’ information, protect against data breaches, and enable secure computations on encrypted data. The paper discusses the principles of homomorphic encryption, its applications in financial systems, challenges, and potential solutions. Additionally, it examines real-world examples and case studies where homomorphic encryption has been employed successfully, highlighting its effectiveness in ensuring the privacy and security of financial transactions. Overall, this paper aims to provide insights into the role of homomorphic encryption in creating secure financial applications and its potential to revolutionize the way sensitive financial data is handled and processed.