- Mobile Agent-Based Network Management
- Multi-Agent Systems and Negotiation
- Energy Efficient Wireless Sensor Networks
- Mobile Ad Hoc Networks
- IoT-based Smart Home Systems
- IoT and Edge/Fog Computing
- Fire Detection and Safety Systems
- Peer-to-Peer Network Technologies
- User Authentication and Security Systems
- Water Quality Monitoring Technologies
- Smart Grid Energy Management
- Transportation and Mobility Innovations
- Biometric Identification and Security
- Smart Parking Systems Research
- Smart Agriculture and AI
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Access Control and Trust
- Water Systems and Optimization
- Wireless Body Area Networks
- Security in Wireless Sensor Networks
- Energy Load and Power Forecasting
- Internet Traffic Analysis and Secure E-voting
King Faisal University
2022-2025
Rajalakshmi Engineering College
2025
SRM Institute of Science and Technology
2016-2024
Banaras Hindu University
2023-2024
Central Ground Water Board
2024
Sri Eshwar College of Engineering
2023
Academy of Scientific and Innovative Research
2023
Indian Institute of Chemical Technology
2023
Osaka Institute of Technology
2023
Anhui Science and Technology University
2023
Abstract Today, India is one of the worst flood-affected countries in world, with recent disaster Kerala August 2018 being a prime example. A good amount work has been carried out by employing Internet Things (IoT) and machine learning (ML) techniques past for flood occurrence based on rainfall, humidity, temperature, water flow, level etc. However, challenge that no attempted possibility temperature rainfall intensity. So accordingly Deep Neural Network employed predicting In addition, deep...
The growing demand for energy and the increasing carbon footprint in globe has made electricity utilities to move from nonrenewable renewable energy. integration of renewables into electric grid is day-by-day. consumers' consumption needs be managed wisely effectively. Internet Things helped connecting all homes appliances Internet. With smart homes, it possible study consumer's usage patterns their During peak hours day, increases have met by starting up additional coal-fired generation....
Node localization is critical for accessing diverse nodes that provide services in remote places. Single-anchor techniques suffer co-linearity, performing poorly. The reliable multiple anchor node selection method computationally intensive and requires a lot of processing power time to identify suitable nodes. wireless sensor networks (WSNs) challenging due the number placement anchors, as well their communication capabilities. These senor possess limited energy resources, which big concern...
Digital banking has revolutionized the way financial transactions are conducted, offering convenience and accessibility like never before. However, this paradigm shift also brings forth a myriad of security threats challenges. This paper aims to evaluate overall awareness level among customers regarding issues in digital banking. Through comprehensive study, specific that most aware will be identified. Additionally, customers' understanding protocols best practices while using net services...
Objectives: Conventional face-to-face nutrition counseling has played a crucial role in promoting healthy habits. However, the emergence of digital health technologies introduced mobile app-based as an effective alternative. This research aims to develop and evaluate usability effectiveness FIT4PEDON application dietary behaviors lifestyle modifications among childhood cancer survivors (CCS). Methods: study employed mixed-methods approach, incorporating both survey qualitative quantitative...
Electrical Grid we have is more than 50 years old. The integration of information technology to the electric grid system expected address many shortcomings current and traditional electrical grids that resulted in Smart which gaining lot interest momentum. In Grid, Power Distribution one part requires monitoring control. Lot technologies been applied towards sensing action. Supervisory Control Data Acquisition (SCADA) very well proven within substation region. There has less done on...
Most of Colleges and Universities use the traditional lighting system where we have a switch to control lighting. us i.e students faculty members are habituated towards leaving class room without switching lights, Fan, Aircon etc which leads unnecessary consumption energy for organization paying huge amount bill from their budget. Some systems come with Remote controlling fan similar air conditioner is being used in homes. But still there challenge lights fans unattended when person not...
Fire is a very dangerous situation and it much necessary to monitor give warning before anything untoward happens. In many developing countries, houses do not come fitted with fire alarm system as seen in developed countries like Singapore, USA etc. This results being unattended leading lot of losses property, human so. Also India, we have any strict laws pertaining installation Alarm all homes for alerting Service personnel action.
Home security is becoming necessary nowadays as the possibilities of intrusion are increasing day by .Lot Security companies available towards protecting house from getting vandalized or so. But still there no much guarantee that be safe even if vandalized, personnel and sound to report police nearby. This leads property loss damage. Lot research been carried out employing sensors like PIR, Sensor Camera, GSM detecting intruder at home. drawback in all these systems they expensive deployed...
The Forest fires are one of the most critical catastrophes which has been initiated mostly by global warming. Due to environmental pollution, nature can make this threat even worse destroying themselves and mankind. management wild life department handling many problems such as rehabilitating animals, migration animals residential regions. strength trees drastically decreased lead unhealthy forest environment. It analyzed from yearly survey that 85% losses in calamities due fire. In recent...
This paper introduces a novel edge detection operator called 'vision transformer-based Dexinet (ViT-DexiNet)' to address the challenges of detecting small objects in synthetic aperture radar (SAR) images. SAR images are typically impacted by strong multiplicative noise, making difficult. Existing traditional methods have limited spectral data preservation capabilities and often result loss clarity integrity salient features The proposed ViT-DexiNet employs series interconnected layers...
Web applications are important for various online businesses and operations because of their platform stability low operation cost. The increasing usage Internet-of-Things (IoT) devices within a network has contributed to the rise intrusion issues due malicious Uniform Resource Locators (URLs). Generally, URLs initiated promote scams, attacks, frauds which can lead high-risk intrusion. Several methods have been developed detect in previous works. There good amount work done using such as...
Common electrical hazards that occur at home are usually associated with the usage of faulty appliances and distribution. Also, increasing demands higher power can cause overloading. The existing house distribution system does not normally offer enough protection also provide adequate warning. normal for residential homes when an over loading happens is circuit breaker gets tripped. best method to improve this situation monitor continuously characteristics every point in real time....
Advanced Metering Infrastructure (AMI) forms an important part in Smart Grids. Routing the data effectively from smart meters to Edge/Fog node requires efficient routing protocol. Protocol for Low Power Lossy Area Network (RPL) is a standard protocol IPv6 over Personal (6LoWPAN). In Distribution system all together form 6LoWPAN network. They communicate with fog router, which acts as gateway. ContikiRPL was evaluated using Cooja simulator power distribution network topology. The nodes were...
Fuzzy c-means (FCM) clustering is used to classify the acoustic emission (AE) signal different sources of signals. FCM has ability discover cluster among data, even when boundaries between subgroup are overlapping, based technique an advantage over conventional statistical like maximum likelihood estimate, nearest neighbor classifier etc, because they distribution free (i.e.) no knowledge required about data. AE test carried out using pulse, pencil and spark source on surface solid steel...
M-commerce (mobile commerce) is the buying and selling of goods services through wireless handheld devices such as cellular telephone personal digital assistants PDA. provides lot like Mobile ticketing, banking, location based services, auctions, purchasing so on. This represents an incredible opportunity to enable mobile devices, a universal device for commerce applications. For applications, we normally want choose best hotel in prime locations, with modern facilities, clean environment...