- Network Security and Intrusion Detection
- IoT-based Smart Home Systems
- Advanced MIMO Systems Optimization
- Smart Agriculture and AI
- IoT and Edge/Fog Computing
- Energy Efficient Wireless Sensor Networks
- Cloud Data Security Solutions
- Cryptography and Data Security
- Big Data and Business Intelligence
- Traffic Prediction and Management Techniques
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Telecommunications and Broadcasting Technologies
- Video Surveillance and Tracking Methods
- Solar Radiation and Photovoltaics
- Smart Grid Security and Resilience
- Antenna Design and Analysis
- Mathematical and Theoretical Epidemiology and Ecology Models
- Software-Defined Networks and 5G
- Wireless Communication Networks Research
- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Water Quality Monitoring Technologies
- E-commerce and Technology Innovations
- Seed and Plant Biochemistry
Graphic Era University
2019-2025
Indian Institute of Technology Roorkee
2017-2018
NIIT (India)
2014
In smart communities, social media has allowed users easy access to multimedia content. With recent advancements in computer vision and natural language processing, machine learning (ML), deep (DL) models have evolved. generative adversarial networks (GAN), it become possible create fake images/audio/and video streams of a person or use some person's audio visual details fit other environments. Thus, deepfakes are specifically used disseminate information propaganda on circles that tarnish...
Abstract Breast tumors are from the common infections among women around world. Classifying various types of breast contribute to treating more efficiently. However, this classification task is often hindered by dense tissue patterns captured in mammograms. The present study has been proposed a pattern characterization framework using deep neural network. A total 322 mammograms belonging mini-MIAS dataset and 4880 DDSM have taken, an ROI fixed size 224 × pixels each mammogram extracted. In...
The Internet of Things (IoT) is legitimately growing quicker. operators have already started setting up a diligent infrastructure for these gadgets. Various technologies need to be developed this type sensor, including enterprise safety initiatives. This paper covers the stability routing protocol, which assumes an assessment credibility in gadgets and packet flow. To build reliable Software-Defined Network (SDN) routes, on trust between network element flows Quality Service (QoS) or energy...
The integration of Internet Things (IoT) technology in smart agriculture management has emerged as a promising approach to address challenges the agricultural sector. This abstract provides an overview concept integrated IoT system solutions for management, highlighting its benefits and applications. combines sensors, devices, cloud-based platforms enable real- time data collection, analysis, decision-making agriculture. By deploying sensors across farm, farmers can gather on crucial...
Abstract Planning of location area (LA) in cellular networks plays a vital role utilizing the resources efficiently and economically. Location update paging costs directly affect cost to service provider. When size Mobile Switching Centre (MSC) is large, becomes maximum. Though, no required for this case. On contrary, shoots high if each cell forms individual LA, but case, maximum value. Therefore, deducing network optimal amount LA's an intractable combinatorial optimization problem. In...
Because of the metaphysical shift in technological era, world is witnessing machine to (M2M) communication. Sensors are omnipresent, owing which wireless sensor networks (WSNs) developing as a key enabling technology for Internet Things (IoT). M2M interaction poses severe threat lifetime network. Clustering plays an essential role elevating energy efficiency WSN. Particularly, uniform distribution cluster heads (CHs) crucial achieving better network and uninterrupted sensing from area under...
One of the most important objectives in brain–computer interfaces (BCI) is to identify a subset characteristics that represents electroencephalographic (EEG) signal while eliminating elements are duplicate or irrelevant. Neuroscientific research advanced by bioimaging, especially field BCI. In this work, novel quantum computing-inspired bald eagle search optimization (QC-IBESO) method used improve effectiveness motor imagery EEG feature selection. This can prevent dimensionality curse and...
The white corpuscles nucleus segmentation from microscopic blood images is major steps to diagnose blood-related diseases. perfect and speedy system assists the hematologists identify diseases take appropriate decision for better treatment. Therefore, fully automated model using deep convolution neural network, proposed in present study. uses combination of ‘binary_cross_entropy’ ‘adam’ maintaining learning rate each network weight. To validate potential capability above solution, ALL-IDB2...
Prediction of the stock price has always been a challenging task due to irregular patterns market. Uncertainty made researchers think some new and robust predictive methods. Many studies are available in literature, with many models predict accurately. Statistical, machine learning, deep other related approaches can create model. ARIMA model is most commonly used statistical for time series prediction. But ensemble learning techniques have not explored much future price. So, present study...
Growing environmental concerns have made more people aware of waste utilization and management. Agro-waste is becoming to be one the main contributors issue. From a circular economy perspective, agro-waste, such as natural fibers (NFs) well particulates (NPs) found in various parts crop, can utilized for development new materials. In particular, problem utilizing these wastes blending into polymer matrix their hydrophilicity. which results "low mechanical properties the" composite. To enable...
Mobile entities are unrestricted to form communication grid without any predefined substructure in MANET. Though it offers great resilience, but extra challenges for MANETs guard against malevolent attacks also fetched. Various tactics have been anticipated discourse probable network operation, they rely on unbending solutions, which operative only set-ups. Denial of Service (DoS) and Distributed DoS (DDoS) popular the performance. Dos devour system wherewithal isolate authentic handlers...
Routing protocols govern data communication in MANET, which strictly, should be consummate accord with the movement of nodes dynamic topology configuration. In this study, we propose Modified Mobility Factor that is premeditated based upon keeping track movement, hold time and speed entity. MMF provides platform to anticipate duration for two will remain communicable range each other, hence plummeting problem link rupture.
In the dynamic and profoundly serious domain of current business, new companies experience a huge number difficulties vulnerabilities as they try to lay down good foundation for themselves accomplish manageable development. The coordination data science arises an extraordinary impetus with possibility impact direction progress significantly. This examination investigates vital job in businesses, accentuating its ability engage information outlook-changing driven direction, cultivate...