Shalini Bhaskar Bajaj

Learn More
In this era of technology with an increasing usage of Internet, data security has become a major issue. Various cryptographic hash function such as MD4, MD5, SHA-1, SHA-2 has been defined to provide data security. In this paper we proposed a new algorithm, TL-SMD (Two Layered-Secure Message Digest) for building a secure hash function, which can provide two(More)
The quantitative structure–activity relationship (QSAR) studies were performed on a series of 34 thiazolidine-2,4-dione derivatives to find the structural features necessary for the inhibition of 15-PGDH. The multiple linear regression (MLR) and partial least square (PLS) regression coupled with stepwise (SW) feature selection methods were performed to(More)
Classification is the best way to partition a given data set. Decision tree is one of the common methods for extracting knowledge from the data set. Traditional decision tree faces the problem of crisp boundary hence fuzzy boundary conditions are proposed in this research. The paper proposes Fuzzy Heterogeneous Split Measure (FHSM) algorithm for decision(More)
  • 1