Vedant Rastogi

  • Citations Per Year
Learn More
Complex intra-abdominal surgical procedures can now be performed with laparoscopy, and laparoscopic cholecystectomy has become the gold standard in the care of patients with cholelithiasis. This and other surgically challenging procedures involve use of multiple large (10-mm-15-mm) ports. A standard laparoscopic cholecystectomy employs two 10-mm trocar(More)
Positive and negative sequential patterns mining is used to discover interesting sequential patterns in a incremental transaction databases, and it is one of the essential data mining tasks widely used in various application fields. Implementation of this approach, construct tree for appended transactions (new upcoming data) and will merge this tree with(More)
In the paper the most efficient model to implement super resolution using discrete wavelet transform is shown. The model is a three step process of image registration, interpolation and noise filtering using DWT. The paper resolutions the deduction of noise in the digital gray scale images. Normally, Data, text, picture, can be tainted by an additive noise(More)
Cloud servers is a platform for enabling convenient, on demand network access to a shared pool of configurable server resources (memory, networks, storage, cpu, applications, and services) that can be rapidly provisioned and released with minimal management effort or cloud service provider interactions. Cloud servers are mostly being used; however, data(More)
In this paper, we present a comprehensive review of recent developments in the application of machine learning algorithms to Spam filtering, focusing on textual approaches. We are trying to introduce various spam filtering methods from Naïve Bias to Hybrid methods for spam filtering, we are also introducing types of filters recently used for spam filtering(More)
with the recent surge and rapid growth in digital data usage and transfer in many real life applications, there is a question of new and effective ways to ensure their security. Efficient secrecy can be achieved by using the steganography mechanism. In this system, we have developed steganographic techniques for embedding text data in image, audio and video(More)
  • 1