- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Software System Performance and Reliability
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Privacy-Preserving Technologies in Data
- Anomaly Detection Techniques and Applications
- Blockchain Technology Applications and Security
- Information and Cyber Security
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- Advanced Optical Network Technologies
- Brain Tumor Detection and Classification
- Internet Traffic Analysis and Secure E-voting
- Power Line Communications and Noise
- Opportunistic and Delay-Tolerant Networks
- Privacy, Security, and Data Protection
- Spacecraft and Cryogenic Technologies
- Spam and Phishing Detection
- Parallel Computing and Optimization Techniques
- Retinal Imaging and Analysis
- Cloud Data Security Solutions
- Adversarial Robustness in Machine Learning
- Advanced Photonic Communication Systems
University of Missouri–St. Louis
2019-2025
Washington University in St. Louis
2015-2019
South Eastern Railway
2015
Government of India
2013
Indian Space Research Organisation
2006
University of Toronto
2002
Unmanned Aerial Vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful applications where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently economically as compared to single UAV systems. However, there many issues resolved before effective use of UAVs made provide stable reliable context-specific networks. Much work carried out areas Mobile Ad Hoc Networks (MANETs), Vehicular...
It is critical to secure the Industrial Internet of Things (IIoT) devices because potentially devastating consequences in case an attack. Machine learning (ML) and big data analytics are two powerful leverages for analyzing securing (IoT) technology. By extension, these techniques can help improve security IIoT systems as well. In this paper, we first present common protocols their associated vulnerabilities. Then, run a cyber-vulnerability assessment discuss utilization ML countering...
Network slicing for 5G provides Network-as-a-Service (NaaS) different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With slicing, service providers can deploy their applications and services flexibly quickly accommodate diverse services' specific requirements. As an emerging technology with number of advantages, has raised many issues the industry academia alike. Here, authors discuss this technology's background propose framework. They...
Lately application service providers (ASPs) and Internet (ISPs) are being confronted with the unprecedented challenge of accommodating increasing traffic demands from their geographically distributed users. Many ASPs ISPs, such as Facebook, Netflix, AT&T others have adopted micro-service architecture to tackle this problem. Instead building a single, monolithic application, idea is split into set smaller, interconnected services, called micro-services (or simply services). Such services...
Network slicing in 5G is expected to essentially change the way which network operators deploy and manage vertical services with different performance requirements. Efficient secure slice provisioning algorithms are important since slices share limited resources of physical network. In this article, we first analyze security issues formulate an Integer Linear Programming (ILP) model for core provisioning. Then, propose a heuristic algorithm called VIKOR-CNSP based on VIKOR, multi-criteria...
Wireless communication advancements have significantly improved connectivity and user experience with each generation. The recent release of the framework M.2160 for upcoming sixth generation (6G or IMT-2030) cellular wireless standard by ITU-R has heightened expectations, particularly Internet Things (IoT) driven use cases. However, this progress introduces significant security risks, as technologies like O-RAN, terahertz communication, native AI pose threats such eavesdropping, supply...
Network function virtualization (NFV) over multi-cloud promises network service providers amazing flexibility in deployment and optimizing cost. Telecommunications applications are, however, sensitive to performance indicators, especially latency, which tend get degraded by both the multiple cloud requirement for widely distributed coverage. In this work we propose an efficient framework that uses novel concept of random selection combined with a support vector regression based predictive...
Network slicing for 5G provides Network-as-a-Service (NaaS) different use cases, allowing network operators to build multiple virtual networks on a shared infrastructure. With slicing, service providers can deploy their applications and services flexibly quickly accommodate diverse services’ specific requirements. As an emerging technology with number of advantages, has raised many issues the industry academia alike. Here, authors discuss this technology’s background propose framework. They...
Recently, leading research communities have been investigating the use of blockchains for Artificial Intelligence (AI) applications, where multiple participants, or agents, collaborate to make consensus decisions. To achieve this, data in blockchain storage be transformed into knowledge. We refer these types as knowledge-based blockchains. Knowledge-based are potentially useful building efficient risk assessment applications. An earlier work introduced probabilistic which facilitates This...
Abstract With the enhancements in field of software‐defined networking and virtualization technologies, novel paradigms such as network function Internet Things are rapidly gaining ground. The development 5G networks explosion online services has resulted an exponential growth devices connected to network. As a result, application service providers being confronted with unprecedented challenge accommodating increasing traffic demands from geographically distributed users. To tackle this...
Carriers’ network services are distributed, dynamic, and investment intensive. Deploying them as virtual (VNS) brings the promise of low-cost agile deployments, which reduce time to market new services. If these hosted dynamically over multiple clouds, greater flexibility in optimizing performance cost can be achieved. On flip side, when orchestrated stringent norms for carrier become difficult meet, necessitating novel innovative placement strategies. In selecting appropriate combination...
A blockchain provides a securedparadigm to achieve consensus using distributed and peer-to-peer network in which no trusted central party is required. As result, it has the potential resolve many challenges that are faced with current centralized controllers globally applications. To date, technology been used for recording transactions tracking objects multiple participants reach on whether transaction valid or not. This paper introduces novel paradigm of probabilistic blockchains, an...
Inguinal hernia with vermiform appendix as content is known Amyand’s hernia. It a rare entity but we encountered four cases within six months. A 52-year-old female had high grade fever and evidence of inflammatory pathology involving the ileocaecal region. She was initially managed conservatively subsequently underwent exploratory laparatomy. The perforated herniating in inguinal canal. Appendectomy done herniorrhaphy without mesh placement. 74-year-old male bilateral hernia, which, right...
Efficient provisioning of 5G network slices is a major challenge for slicing technology. Previous slice methods have only considered resource attributes and ignored topology attributes. These may result in decrease the acceptance ratio revenue. To address these issues, we propose two-stage heuristic algorithm, called RT-CSP, core by jointly considering this paper. The first stage our method node stage, which an approach to scoring ranking nodes using (i.e., CPU capacity bandwidth) degree...
Most global enterprises and application service providers need to use resources from multiple clouds managed by different cloud providers, located throughout the world. The ability manage these geographically distributed requires of specialized management control platforms. Such platforms allow deploy their applications across remote that meet objectives. Generally, are multi-threaded, highly complex. They be optimized perform well cost effective for all players. For optimization succeed, it...
Communication and coordination play an important role in achieving concurrency the design of large complex artifacts. It is also widely accepted that constraint oriented involving recognition, formulation satisfaction constraints. In this paper we have described how constraints can be used to achieve communication concurrent projects. The system are implementing towards (but not limited to) engineering domain, supports multiple perspectives, notification mechanisms, a management agent...
Fault and performance management systems, in the traditional carrier networks, are based on rule-based diagnostics that correlate alarms other markers to detect localize faults issues. As carriers move Virtual Network Services, Function Virtualization multi-cloud deployments, methods fail deliver because of intangibility constituent Functions increased complexity resulting architecture. In this paper, we propose a framework, called HYPER-VINES, interfaces with various platforms involved...
In healthcare applications like monitoring patients in ICUs and performing precision robotic surgeries, IoT sensor networks have become indispensable. These sensors generate a large amount of data that, when processed visually presented to medical professional, assists the more accurate diagnosis treatment ailments. For some time now, hospital administrations been taking advantage public cloud(referred as main clouds this paper) resources store process patient using advanced AI analytical...
Centralized clouds processing the large amount of data generated by Internet-of-Things (IoT) can lead to unacceptable latencies for end user. Against this backdrop, Edge Computing (EC) is an emerging paradigm that address shortcomings traditional centralized Cloud (CC). Its use associated with improved performance, productivity, and security. Some its cases include smart grids, healthcare Augmented Reality (AR)/Virtual (VR). EC uses servers strategically placed near users, reducing latency...