- Chaos-based Image/Signal Encryption
- Energy Efficient Wireless Sensor Networks
- Topic Modeling
- User Authentication and Security Systems
- Natural Language Processing Techniques
- Spam and Phishing Detection
- AI in Service Interactions
- Sentiment Analysis and Opinion Mining
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Cryptography and Data Security
- Advanced Wireless Network Optimization
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Aquatic Invertebrate Ecology and Behavior
- Digital Media Forensic Detection
- Consumer Retail Behavior Studies
- Cryptography and Residue Arithmetic
- Video Coding and Compression Technologies
- Cryptographic Implementations and Security
- Network Traffic and Congestion Control
- Advanced Text Analysis Techniques
- EEG and Brain-Computer Interfaces
- Artificial Intelligence in Healthcare
- Multimodal Machine Learning Applications
Techno India University
2024
Haldia Institute of Technology
2022
University of Engineering & Management
2015-2021
Li Fi (Light Fidelity) is a wireless communication system by which we can access the internet.Li uses light for communication.So it very easy to use in practical life.Here I propose technique using monitoring any li-fi enable component.Also this create clear view of road map.We also method security purpose. .Suppose person/car walking through road.By identify where person is.The side lamp posts are used as source light.Every should have photo detector device.That receiver.So easily...
Sometimes malnourished children fall into some serious health issues. And doctors are unable to find out the root causes of their illness, but they used apply practices which were not appropriate for every child. Children often die because this reason. So, it is very dangerous children. Along these lines, fundamental point our review anticipate hunger status a 1 5 years more established kid in Asia by utilizing AI. Looked ongoing examination papers (2010 - 2020) identified and combined...
In this paper we have proposed an smart health service for victims in emergency scenario to allow the interconnect without conventional infrastructure. This is provided using DTN architecture. By system architecture, identification of injured people will be easy as it provide information about seriousness condition affected person, so that rescue team can prioritize more critically person at time.
The overall support and trustworthiness among nodes in wireless environment to relay each other's packets expose them a wide range of security attacks. Wireless sensor networks (WSNs) introduce new standard ambient supervision with many potential applications. Mobile Ad-hoc make very attractive the challengers they become vulnerable some types intruders since are arranged open unsecured atmosphere comprised low-priced small devices. This paper introduces an algorithm design network (MANET)...
Data Security is very much important in every aspect of data collection as well storage. Hardware device like USB useful worldwide order to store real time confidential data. So it necessary provide hardware level security small storage pen drive, external hard disk etc. In this context cryptography one the most promising technique encrypt actual other form. paper, we propose a robust encryption which will keep safe from theft. Our proposed algorithm associated with drive and disk.
Today, there are many ways to obtain data from computer systems by making the system vulnerable. Different security protocols available which offer different levels of secure SMTP. E-mail suffers various message integrity problems like spamming, phishing, sender spoofing, date spoofing etc. The technique based on encryption and decryption methods can be used provide more in information technologies. This paper describes a new algorithm that was developed secret key or shared introduces an...
A portable memory stick or USB data storage devices/microsd card readers have been widely popular these days and so is the urge in prevention of exposure confidentiality those information stored peripheral devices. Due to easy portability accessibility, oriented devices quite a days; not only it very much flexible feasible commercial purposes but also for personalized uses. Here this paper, an unique idea proposed securing microSD readers/USB with help symmetric cryptographic encryption...
In this paper, we develop an approach to optimize power consumption using solar energy and also for storing as backup resource.The following aspects of paper are 1) location management based on update (LU) paging method by considering the area (LA) architecture in personal communication service (PCS) networks.2) Try reduce cost utilizing global natural resource harvester 3) create a storage during day-off situation.
In recent trends Ultra wide-band Wireless Body Area Networks have rapidly progressed in biotelemetry system which is most dominant field today's research work. hyperthermia and needs the concept of implemented antenna human body. To construct practical use antennas inside a body, resonance characteristics implanted their radiation pattern at receiver end located outside body must be evaluate through numerical analysis measurement set up. The design parameter has to consider on surrounding...
The study revealed that amongst all parameters, longitude, latitude, elevation and habitat maximum correlation with distribution of earthworms.The methodology used is the first report application heatmap in ecological earthworms.
The increase of internet usage in recent times has been a noticeable change this generation. Users from all over the world use social sites to interact across world. Countless websites are present today. With countless networks and sites, some people or companies tend create new ways lure out random users using web, such as phishing. In phishing, normal swindled fraudulent websites. aim is identify phishing with great accuracy compare different methods by which can be tracked an easier more...