- IoT and Edge/Fog Computing
- Biometric Identification and Security
- Blockchain Technology Applications and Security
- Face recognition and analysis
- Cloud Data Security Solutions
- User Authentication and Security Systems
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Internet of Things and AI
- Sentiment Analysis and Opinion Mining
- Forensic and Genetic Research
- Data Stream Mining Techniques
- Human Mobility and Location-Based Analysis
- IoT and GPS-based Vehicle Safety Systems
- Distributed systems and fault tolerance
- Artificial Intelligence in Healthcare
- Advanced Text Analysis Techniques
- Imbalanced Data Classification Techniques
- Dermatoglyphics and Human Traits
- Real-Time Systems Scheduling
- Metaheuristic Optimization Algorithms Research
- Data Mining Algorithms and Applications
- Smart Cities and Technologies
Birla Institute of Technology, Mesra
2016-2025
Deen Dayal Upadhyaya Gorakhpur University
2022
Zimmer Biomet (United States)
2022
Indian Institute of Information Technology Allahabad
2013-2016
University of Allahabad
2010-2016
Birla Institute of Technology and Science, Pilani
2015
Sebha University
2010
Summary Data privacy is critical for users who want to use Cloud storage services. There a significant focus on service providers address this need. However, in the evolving dynamic cyber‐space, infractions are rising and pose threats infrastructures. Several studies developed various models techniques ensure of contents. these came with several shortages privacy‐preserving attributes they cover. Thus, article identified comprehensive set data propose flexible efficient framework handle...
The Internet of Things (IoT) is a powerful technology adopted in various industries. Applications the IoT aim to enhance automation, productivity, and user comfort cloud distributive computing environment. Cloud automatically stores analyzes large amounts data generated by IoT-based applications. has become crucial component information age through easier administration storage. Currently, government agencies, commercial enterprises, end users are rapidly migrating their environments. This...
DNA matching has become one of the most used biometric identification method during last several years. stores information for creating and organizing an organism. It can be thought as a string over alphabets {A, C, G, T, N}, which makes four chemical components that make it up. Here, N represents unknown nucleotide. This nucleotide may either A, or T. The size each sequence is varying in range millions to billions nucleotides. Compression interesting both practical reasons (such reduced...
Knowledge Management (KM) and Artificial Intelligence (AI) at their core are about knowledge. AI provides the mechanism that allows a machine to obtain, acquire, process, use information execute tasks, as well reveal or unlock knowledge may be transmitted people for improved strategic decision-making. The intelligent approaches in process of KDM (Knowledge Discovery Management) can improve efficiency sense time accuracy. Intelligent especially soft computing have ability learn any...
Centralized Vehicle Security System is a python-based computer application, that uses Machine Learning (ML) techniques to detect and recognize the driver's face. So only authorized personnel of an organization can drive vehicles. With invention many other features like key-card entry will unlock car start ignition vehicle, no requirement for keys. The application software keep track vehicle. Also, authors have developed drowsiness detection system has been implemented on same motherboard...
Cancer is a major global health challenge, emphasizing the critical need for early detection to enhance patient outcomes. This study thoroughly investigates applications of advanced machine learning methods cancer and prevention, aiming develop robust algorithms that can accurately identify cancerous cells assess severity based on key parameters. The authors synthesize insights from previous prevention research through an in-depth literature review. sets specific objectives, including...
This paper presents an overview of security and it's issues in cloud computing. Nowadays computing has tremendous usage so many fields such as financial management, communications collaboration, office productivity suits, accounting applications, customer relationship online storage human resource employment. Owing to increase use these services by companies, several have emerged this challenges architectures secure, protect process user's data. These certain cons like security, lock-in,...
The twins are classified into two categories namely fraternal and identical twins.Fraternal differ in face structures DNA sequences but, have the same structure share sequence.Therefore, it is difficult to identify on basis of their faces sequences.In this research paper, we introduced a new approach for identifying minutiae coordinates, orientation angles, distances thumbprint images.We tested proposed method images an twin pair generated by using Incept H3 T&A Terminal fifty pairs FVC04,...
This papers focuses the peer to network will be one of outdated customer server method.Sharing file on mobile gadgets is not simply attained client for constrained bandwidth and maximum cost.And disconnection which irregular address IP alters happens because migration network.We have short level networking methodologies as Bluetooth without any cost are adequately quick make transfer in a practical manner.The end-end method enables sharing mid Smartphone's over less transport our article...
The main contribution of this paper is using compressive sensing (CS) theory for crypto steganography system to increase both the security and capacity preserve cover image imperceptibility.For CS implementation, discrete Cosine transform (DCT) as sparse domain random matrix measurement are used.We consider 7 MRI images secret gray scale test cover.In addition, three sampling rates used.The performance seven recovery algorithms in terms imperceptibility, achieved peak signal noise ratio...
Face veins based personal identification is a challenging task in the field of identity verification person.It because many other techniques are not identifying uniqueness person universe.This research paper finds on basis face technique.In this five different persons images have been used with rotation angles (left/right 90 0 to 270 and 315 ).For each person, eight at rotations were for these same minimum cost minutiae tree (MCMT) obtained.Here, Prim"s or Kruskal"s algorithm finding MCMT...
Identical twins identification is a challenging task because they share the same DNA sequence.This research paper presents minutiae coordinates and orientation angles fusion based technique for thumbprint of identical twins.Six different images t wins were taken at fixed ime interval using H3 T&A terminal.The these thumbprints fused to form union set.The set values stored in smartcard memo ry further identification.The person be identified are co mputed together online mpared with memory...