- Cutaneous Melanoma Detection and Management
- AI in cancer detection
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Spectroscopy and Chemometric Analyses
- Spectroscopy Techniques in Biomedical and Chemical Research
- Nonmelanoma Skin Cancer Studies
- Emotion and Mood Recognition
- Optical Coherence Tomography Applications
- Blockchain Technology Applications and Security
- Face and Expression Recognition
- Autonomous Vehicle Technology and Safety
- Security in Wireless Sensor Networks
- Advanced Wireless Network Optimization
- Technology and Data Analysis
- COVID-19 diagnosis using AI
- Stock Market Forecasting Methods
- Internet of Things and AI
- Customer Service Quality and Loyalty
- FinTech, Crowdfunding, Digital Finance
- Privacy-Preserving Technologies in Data
- Cloud Data Security Solutions
- Energy Efficient Wireless Sensor Networks
Manav Rachna International Institute of Research and Studies
2023-2024
Amity University
2017-2023
Amity University
2019-2022
Institute of Molecular Medicine
2015
Emotional strain is referred to as stress. Both our mental health and the of others around us may be affected. While anxiety a normal response stress that frightening, it can also cause panic attacks. Everyone needs address these problems. The method we use identify in person using vocal/audio information described this study. We have created deep neural network model for detection. Here, Kaggle audio datasets with 7 different emotions―joy, fear, disgust, neutral, sorrow, surprise, anger―are...
The banking industry is rapidly adopting artificial intelligence (AI)-enabled technologies to improve efficiency, reduce costs, and enhance customer experience. paper utilizes case studies data from various research papers analyze the use of AI in different areas industry. highlights that AI-enabled can be applied industry, with significant potential for improving decision making, reducing risk fraud, enhancing study also provides examples implementations domains, such as assessment, credit...
Homomorphic Encryption is not a widely used encryption technique because it has lot of drawbacks. It very slow in performance and lacks efficiency. This makes its application difficult inefficient. Ways to improve the homomorphic by realizing fully systems been vain. Furthermore, additions through different cryptosystems have done little increase paper talks about method applying existing state characteristics provide location privacy at run time. companionship Global Positioning System...
Today, almost billions of people use social media sites to share pictures, thoughts online and connect worldwide. During this challenging time pandemics, we are leaning towards more than ever, increasing our engagement. It has made us aware the coronavirus cases worldwide, entertained us, helped stay connected acquaintances living far away, even many start grow their small businesses online. Besides wide range advantages that offers, it also comes up with disadvantages being an platform....
Abstract The segmentation of dermoscopic‐based skin lesion images is considered to be challenging owing various factors. Some the most tangible reasons include poor contrast near affected lesion, fuzzy and unpredictable limits, presence variations in noise, capturing under different conditions. This paper aims develop an efficient model for dermoscopic lesions based on deep learning. proposes 11‐layer convolutional neural network with two models trained from start finish do not depend any...
There is many applications of wireless multimedia sensor networks such as surveillance system and telemedicine. To ensure to have a broad deployment the services strip requirement processing content should be followed. are limited technological resources that can taken into account in terms energy computation brand with storage. So very essential achieve goals hard implement due existence data ordinarily requires complex compression combination algorithms. This paper also reviews on focus...
Security is crucial given the rising sophistication and ubiquity of cyber dangers in today's digitalised networked world. The present study delves into significance safeguarding login pages as primary precaution against cyberattacks. It specifically addresses susceptibilities possible impacts linked to compromised credentials. research explores various cyberattack techniques, particularly dangerous consequences dictionary brute force attacks. strong security protocols, cooperative...
Nodes of minimum connected dominating set (MCDS) form a virtual backbone in wireless adhoc network. In this paper, modified approach is presented to determine MCDS an underlying graph Wireless Adhoc Simulation results for variety graphs indicate that the efficient determining as compared other existing techniques.
With an increase advancement of technology, fraud phone calls, including spams and malicious calls have become a major concern in telecommunication industry causes millions global financial losses every year. Fraudulent or scams via telephone mobile common threat to individuals organizations. Artificial Intelligence (AI) Machine Learning (ML) has emerged as powerful tools detecting analyzing calls. This paper presents overview AI-based spam detection analysis techniques, along with its...
Credit card companies are continuously working to keep hold of their customers due the tough competition in financial industry. Churning takes place when a customer leaves one company join some other company. It is notable and complicated issue that many businesses, including credit telecommunications face globally, on daily basis. Devastating business potential effects high churn rate, as it not only diminishes income but also hinders operations. Although certain degree turnover inevitable,...
Cloud computing has revolutionized the way data is stored, processed, and accessed. However, it also introduces new security challenges, making protection of sensitive a top priority for cloud service providers users. Cryptographic techniques play crucial role in ensuring environments. This abstract presents study that investigates various cryptographic employed to safeguard cloud. research aims analyze different used computing, focusing on their effectiveness, performance, suitability...
In the cyber world, zero day means it is a defect that previously unknown to vendors or developers but already known by hackers and being exploited them. Because these defects are there high risk impact when attack happens. With all problems, only few surveys researchers could look into. Case Studies help understand current developments in detection prevention techniques for attacks. understanding of developments, be able create new solutions. This paper briefly covers attacks, their impact,...
Since centuries fingerprint is the best identification method in everyday life for transaction, unique id, login etc. This paper proposes a model designed on technology of recognition with USB as authentication method. The can also be used to encrypt drive store some important and confidential files. gives light development key verification using Arduino nano.
Automated segmentation of skin lesions as digitally recorded images is a crucial procedure to diagnose diseases accurately. This paper proposes model for centered on deep convolutional neural network (DCNN) melanoma, squamous, basal, keratosis, dermatofibroma, and vascular types diseases. The DCNN trained from scratch instead pre-trained networks with different layers among variations in pooling activation functions. comparison the proposed made winner ISIC 2018 challenge task (skin lesion...