- Security in Wireless Sensor Networks
- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Cooperative Communication and Network Coding
- Internet of Things and AI
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- IoT-based Smart Home Systems
- Artificial Intelligence in Law
- Concrete and Cement Materials Research
- Advanced MIMO Systems Optimization
- Innovations in Concrete and Construction Materials
- Image Enhancement Techniques
- Consumer Retail Behavior Studies
- Opportunistic and Delay-Tolerant Networks
- Seed Germination and Physiology
- Advanced Image Fusion Techniques
- Recycled Aggregate Concrete Performance
- Data Stream Mining Techniques
- Wind and Air Flow Studies
- Recommender Systems and Techniques
- Cognitive Radio Networks and Spectrum Sensing
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Weed Control and Herbicide Applications
Uttaranchal University
2014-2023
Hemwati Nandan Bahuguna Garhwal University
2008
Human fingerprints have a wealth of minutiae, or minute characteristics, that can be used as identity marks for fingerprint verification. Our term project is to investigate identification and transaction systems based on minutiae-based matching, which widely utilized in algorithms methodologies. The approach taken this entails extracting minutiae points from photos then doing matching between two fingerprints. If yes, the database queried additional information, information displayed...
WSN are made of hundreds constraints dependent sensors for solving real world sensitive applications.These nodes scattered over an area to monitor and record the data as desired by application forward same center node further observation, which may generate alert control situation.In recent years, has been grown tremendously in applications, resulted demand a strong, consistent security mechanism.WSN issues, challenges needed be addressed designing such mechanism.Irrespective various limited...
<span>Modeling legal text is a difficult task because of its unique features, such as lengthy texts, complex language structures, and technical terms. During the last decade, there has been big rise in number legislative documents, which makes it hard for law professionals to keep up with legislation like analyzing judgements implementing acts. The relevancy topics heavily influenced by processing presentation documents some contexts. objective this work understand judgement corpus...
The concept of digital transformation, also known as ''Industry 4.0,'' is making its way onto the agendas businesses all over world. hospitality and food service industry extremely varied cutthroat it one industries that expanding at quickest rate. This sector has a significant amount untapped potential for advancement techniques. research will investigate role technique plays in industry, well business administration's adaption to opportunities or conceptual breakthroughs revolution...
Image processing is a process to identify the differ- ent patterns in multiple scale. This research explains funda- mentals of digital image and this study provides significant area enhancement deal with parameters on spatial transform domain. On other side which aims enhance visibility input images extract useful data from them. The most common transformation Fourier transform. There are many applications for Transform. Examining photos items determine their relevance known as "image...
Recent advancements in MEMS technologies and development the area of low power microcontrollers have resulted as implementation wireless sensor networks real life problem solving areas like traffic monitoring, patient monitoring , battlefield surveillance.These sensors are very small size operated at for data rate applications.WSN nodes include features scalability, self-organizing, self-healing.WSN face many challenges starting from deployment till their span which is dependent on battery...
Historical data on structural energy usage, artificial intelligence (AI) is able to produce estimations more precisely and quickly. Forecasting building performance, which looks across different construction levels, may assist city & neighborhood leaders in better anticipating their future demands also making optimal plans for addressing them. This study provides a campus consumption prediction tool the impacts of long-term climate change upon this efficiency buildings utilizing AI methods,...
Recommender Systems (RS) have application in all areas where digital information is generating at high rate. They are used to filter large volume of data containing user preferences, interests and behaviour patterns for products services. Today artificial intelligence has achieved rapid development automation, computation, knowledge-engineering, retrieval processing. Techniques such as fuzzy logic, neural networks, natural language processing, transfer learning, machine learning also...
For about last two decades research and development processes in area of Electronics Sensors have resulted as significant advancements electronics technology, small size, cost effectiveness sensor nodes crucial part real world problem solution applications.The wireless are spread over an to record the facts situations like fire, flood then forward same meaningful data a node, which is generally cluster head node for calculations, resulting alert take necessary measures control situation.In...
Drug repurposing processing plays a significant role in evaluating Target identification the field of discovery. Today Machine learning algorithms based automated systems are gaining attention for creating new device applications artificial intelligence. [2] The present study used machine approaches to develop computational predicted model predicting unknown pharmacological effects with immune-oncology compound. authors applied similarity features on drug and disease see indication also...
With emerging advancements, the medical domain of health monitoring systems has a necessity to combine cloud computing and IoT technology for current requirements. This study is concerned with designing modules under supervision Cloud Computing connected server. The device used coordinate people care, sensors, gateway, servers database. From sensor point, maintenance metrics like sugar level, blood pressure status, oxygen level human body, other parameters will be collected. records...
Five seed sources of A. pindrow, collected from Garhwal Himalaya were studied for cone and characteristics germination behaviour. Three different sizes cones (large, medium small) observed in all the sources. The dimensions large (14.25 x 4.76-16.04 4.56 cm), (11.45 4.17-12.28 4.43 cm) small (9.01 4.05-9.68 4.08 sized 5 pindrow oscillated greatly. maximum moisture content also varied significantly (45.22-55.37%) cones. largest was 1.17 cm long 0.87 wide smallest 0.56 0.19 wide. mass heaviest...
Open nature of Internet connectivity architectures have resulted new threats and challenges for the security community are emerging. Hackers may exploit critical vulnerabilities in a wide range IoT edge-fog applications devices. Things is referred as interconnected physics devices through internet to solve real world problems. Hence participating can be administered from anywhere even everywhere. As part ubiquitous computing, include any wearable gadget, smart measurement machines, mobile...
Uttarakhand is the most popular state to produce fruits and vegetables like Apple, Tomato, Mango, Litchi, Guava, Apricot, Green peas, Cauliflower Capsicum, etc. in India Production gradually increasing as a result of changing agro-climatic conditions more readily available bundles activities. Despite fact that there lot room expand output, lack advanced cold storage monitoring facilities becoming key impediment realizing potential. So, this can be overcome through an IoT-enabled management...
<p>The cognitive radio prototype performance is to alleviate the scarcity of spectral resources for wireless communication through intelligent sensing and quick resource allocation techniques. Secondary users (SU’s) actively obtain spectrum access opportunity by supporting primary (PU’s) in networks (CRNs). In present generation, endowed cooperative based link-level frame-based (LLC) principle. this SUs independently act as conveyors PUs achieve opportunities. Unfortunately, LLC...