Kamta Nath Mishra

ORCID: 0000-0001-8070-9009
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Biometric Identification and Security
  • Blockchain Technology Applications and Security
  • Face recognition and analysis
  • Cloud Data Security Solutions
  • User Authentication and Security Systems
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • Internet of Things and AI
  • Sentiment Analysis and Opinion Mining
  • Forensic and Genetic Research
  • Data Stream Mining Techniques
  • Human Mobility and Location-Based Analysis
  • IoT and GPS-based Vehicle Safety Systems
  • Distributed systems and fault tolerance
  • Artificial Intelligence in Healthcare
  • Advanced Text Analysis Techniques
  • Imbalanced Data Classification Techniques
  • Dermatoglyphics and Human Traits
  • Real-Time Systems Scheduling
  • Metaheuristic Optimization Algorithms Research
  • Data Mining Algorithms and Applications
  • Smart Cities and Technologies

Birla Institute of Technology, Mesra
2016-2025

Deen Dayal Upadhyaya Gorakhpur University
2022

Zimmer Biomet (United States)
2022

Indian Institute of Information Technology Allahabad
2013-2016

University of Allahabad
2010-2016

Birla Institute of Technology and Science, Pilani
2015

Sebha University
2010

Summary Data privacy is critical for users who want to use Cloud storage services. There a significant focus on service providers address this need. However, in the evolving dynamic cyber‐space, infractions are rising and pose threats infrastructures. Several studies developed various models techniques ensure of contents. these came with several shortages privacy‐preserving attributes they cover. Thus, article identified comprehensive set data propose flexible efficient framework handle...

10.1002/cpe.7831 article EN cc-by-nc Concurrency and Computation Practice and Experience 2023-06-22

The Internet of Things (IoT) is a powerful technology adopted in various industries. Applications the IoT aim to enhance automation, productivity, and user comfort cloud distributive computing environment. Cloud automatically stores analyzes large amounts data generated by IoT-based applications. has become crucial component information age through easier administration storage. Currently, government agencies, commercial enterprises, end users are rapidly migrating their environments. This...

10.1007/s10462-024-10908-x article EN cc-by-nc-nd Artificial Intelligence Review 2024-08-27

DNA matching has become one of the most used biometric identification method during last several years. stores information for creating and organizing an organism. It can be thought as a string over alphabets {A, C, G, T, N}, which makes four chemical components that make it up. Here, N represents unknown nucleotide. This nucleotide may either A, or T. The size each sequence is varying in range millions to billions nucleotides. Compression interesting both practical reasons (such reduced...

10.5120/757-954 article EN International Journal of Computer Applications 2010-06-10

Knowledge Management (KM) and Artificial Intelligence (AI) at their core are about knowledge. AI provides the mechanism that allows a machine to obtain, acquire, process, use information execute tasks, as well reveal or unlock knowledge may be transmitted people for improved strategic decision-making. The intelligent approaches in process of KDM (Knowledge Discovery Management) can improve efficiency sense time accuracy. Intelligent especially soft computing have ability learn any...

10.1109/assic60049.2024.10508021 article EN 2024-01-27

Centralized Vehicle Security System is a python-based computer application, that uses Machine Learning (ML) techniques to detect and recognize the driver's face. So only authorized personnel of an organization can drive vehicles. With invention many other features like key-card entry will unlock car start ignition vehicle, no requirement for keys. The application software keep track vehicle. Also, authors have developed drowsiness detection system has been implemented on same motherboard...

10.1109/iccike58312.2023.10131765 article EN 2023-03-09

Cancer is a major global health challenge, emphasizing the critical need for early detection to enhance patient outcomes. This study thoroughly investigates applications of advanced machine learning methods cancer and prevention, aiming develop robust algorithms that can accurately identify cancerous cells assess severity based on key parameters. The authors synthesize insights from previous prevention research through an in-depth literature review. sets specific objectives, including...

10.1016/j.imu.2024.101579 article EN cc-by Informatics in Medicine Unlocked 2024-01-01

This paper presents an overview of security and it's issues in cloud computing. Nowadays computing has tremendous usage so many fields such as financial management, communications collaboration, office productivity suits, accounting applications, customer relationship online storage human resource employment. Owing to increase use these services by companies, several have emerged this challenges architectures secure, protect process user's data. These certain cons like security, lock-in,...

10.1109/icact.2015.7224820 article EN 2022 24th International Conference on Advanced Communication Technology (ICACT) 2015-07-01

The twins are classified into two categories namely fraternal and identical twins.Fraternal differ in face structures DNA sequences but, have the same structure share sequence.Therefore, it is difficult to identify on basis of their faces sequences.In this research paper, we introduced a new approach for identifying minutiae coordinates, orientation angles, distances thumbprint images.We tested proposed method images an twin pair generated by using Incept H3 T&A Terminal fifty pairs FVC04,...

10.5815/ijigsp.2013.02.08 article EN International Journal of Image Graphics and Signal Processing 2013-01-15

This papers focuses the peer to network will be one of outdated customer server method.Sharing file on mobile gadgets is not simply attained client for constrained bandwidth and maximum cost.And disconnection which irregular address IP alters happens because migration network.We have short level networking methodologies as Bluetooth without any cost are adequately quick make transfer in a practical manner.The end-end method enables sharing mid Smartphone's over less transport our article...

10.30534/ijatcse/2018/04762018 article EN International Journal of Advanced Trends in Computer Science and Engineering 2019-01-07

The main contribution of this paper is using compressive sensing (CS) theory for crypto steganography system to increase both the security and capacity preserve cover image imperceptibility.For CS implementation, discrete Cosine transform (DCT) as sparse domain random matrix measurement are used.We consider 7 MRI images secret gray scale test cover.In addition, three sampling rates used.The performance seven recovery algorithms in terms imperceptibility, achieved peak signal noise ratio...

10.5815/ijigsp.2015.10.07 article EN International Journal of Image Graphics and Signal Processing 2015-09-08

Face veins based personal identification is a challenging task in the field of identity verification person.It because many other techniques are not identifying uniqueness person universe.This research paper finds on basis face technique.In this five different persons images have been used with rotation angles (left/right 90 0 to 270 and 315 ).For each person, eight at rotations were for these same minimum cost minutiae tree (MCMT) obtained.Here, Prim"s or Kruskal"s algorithm finding MCMT...

10.5815/ijisa.2015.09.08 article EN International Journal of Intelligent Systems and Applications 2015-08-31

Identical twins identification is a challenging task because they share the same DNA sequence.This research paper presents minutiae coordinates and orientation angles fusion based technique for thumbprint of identical twins.Six different images t wins were taken at fixed ime interval using H3 T&A terminal.The these thumbprints fused to form union set.The set values stored in smartcard memo ry further identification.The person be identified are co mputed together online mpared with memory...

10.5815/ijisa.2014.01.10 article EN International Journal of Intelligent Systems and Applications 2013-11-10
Coming Soon ...