Supreet Kaur

ORCID: 0000-0002-1361-922X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Energy Efficient Wireless Sensor Networks
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • IoT-based Smart Home Systems
  • Access Control and Trust
  • Cloud Data Security Solutions
  • Network Traffic and Congestion Control
  • Biometric Identification and Security
  • Cognitive Radio Networks and Spectrum Sensing
  • Advanced Statistical Modeling Techniques
  • Smart Agriculture and AI
  • IoT and Edge/Fog Computing
  • Digital Rights Management and Security
  • Data Mining Algorithms and Applications
  • Cloud Computing and Resource Management
  • Energy Harvesting in Wireless Networks
  • Advanced MIMO Systems Optimization
  • Innovation, Technology, and Society
  • Lymphoma Diagnosis and Treatment
  • Mobile Agent-Based Network Management
  • CNS Lymphoma Diagnosis and Treatment
  • Machine Learning and ELM
  • Advanced Steganography and Watermarking Techniques
  • Wireless Communication Networks Research
  • Big Data and Business Intelligence

Sylvester Comprehensive Cancer Center
2024

Fred Hutch Cancer Center
2024

City Of Hope National Medical Center
2024

Moffitt Cancer Center
2024

Prisma Health
2024

City of Hope
2024

The University of Texas Health Science Center at San Antonio
2024

Cornell University
2024

Punjab Technical University
2019-2022

University College London
2022

BackgroundIncorporating brentuximab vedotin into the treatment of advanced-stage classic Hodgkin's lymphoma improves outcomes in adult and pediatric patients. However, increases toxic effects adults, more than half patients who receive drug undergo consolidative radiation, relapse remains a challenge. Programmed death 1 blockade is effective lymphoma, including preliminary studies involving previously untreated patients.MethodsWe conducted phase 3, multicenter, open-label, randomized trial...

10.1056/nejmoa2405888 article EN New England Journal of Medicine 2024-10-16

In this paper, an efficient and modified load balancing algorithm is proposed.This paper shows the results of proposed energy aware algorithm.Global reclustering initiated when network becomes significantly unbalanced i.e. if variance degree cluster heads in greater than a pre-determined threshold.Degree all would be required at single node to evaluate average subsequently among themselves, which not possible adhoc because its distributed nature.For this, formula derived can updated each hop...

10.5120/19599-1442 article EN International Journal of Computer Applications 2015-02-18

As technology advances, massive amounts of data in many different formats are produced everywhere. The industries that have fueled the growth data, including retail, media, finance, healthcare, and education, a tremendously large complicated collection is known as "big data." On other hand, virtual service called cloud computing utilised for processing, storage, mining order to maximise flexibility cut costs. It assisting society addressing upcoming issues, management, cyber security,...

10.1109/pdgc56933.2022.10053276 article EN 2022-11-25

Ubiquitous computing environment demands a dynamic access control mechanism that can adapt to the changing security requirement of environment.In this paper an authorization model for ubiquitous is proposed and formal approach adopted design flexible scalable support intelligent process in environment.

10.5120/12746-9668 article EN International Journal of Computer Applications 2013-07-26

In this paper, an inter-cluster data aggregation based on General Self-Organized Tree-based Energy Balance (GSTEB) routing protocol has been improved by proposing energy efficient under hybrid soft computing. First, finest cluster heads are elected using enhanced ant colony optimization (ACO) method. After that, information which gathered is sent to sink node applying computing (i.e., hybridization of glow swarm and ACOs). Experimental analysis shows that network lifetime according the...

10.1142/s0217979219503569 article EN International Journal of Modern Physics B 2019-12-10

With the emergence of new dynamic computing environments, traditional identity based authorization models are unable to meet multiple attribute policy requirements through single function access control model.There is need for a flexible and scalable model that can different protection requirement system adapt demand real world security requirements.In this paper formal ubiquitous environment proposed.Ubiquitous demands mechanism changing environment.The proposed has taken these factors into...

10.5120/16083-5220 article EN International Journal of Computer Applications 2014-04-18

Cognitive radio technology is a low cost communication system. The main reason of choosing the cognitive system that it prevents interfering licensed and authorised users; by available frequencies waveforms automatically Today development new technologies limited because spectrum. But spectrum sensing vital in networks. It enhances spectral efficiency filling wireless voids.The code written for architecture. In this architecture, maximum 300 nodes taken as an architectural network. aim work...

10.15680/ijircce.2015.0305104 article EN International Journal of Innovative Research in Computer and Communication Engineering 2015-07-21

10.18535/ijecs/v4i9.40 article EN International Journal Of Engineering And Computer Science 2015-10-15

10.14445/22312803/ijctt-v23p121 article EN International Journal of Computer Trends and Technology 2015-05-25

Security is a very important aspect in the biometric systems.Biometric characteristics are unique to an individual hence compromise of template permanent.Attackers mostly attack on and database system so securing them crucial issue these days.Moreover multibiometric systems require storage multiple templates (e.g., fingerprint, iris, face) for each user, which results increased risk user privacy security.In this research paper our focus security biometrics we develop encrypt decrypt...

10.5120/11882-7698 article EN International Journal of Computer Applications 2013-05-17

Objectives: The main objective of this work is to isolate dictionary attack in wireless sensor networks. In the existing techniques Diffie-Helman algorithm has been proposed for secure channel establishment from source destination. possible which reduce network performance. work, ECC technique used will detect malicious nodes network. Methods/Statistical Analysis: networks are kind can sense natural conditions and it conveyed far spots like a backwoods, deserts so on. Wireless have faced...

10.17485/ijst/2017/v10i13/99503 article EN Indian Journal of Science and Technology 2017-04-01

10.14445/22312803/ijctt-v60p109 article EN International Journal of Computer Trends and Technology 2018-06-25

A hybrid protocol is proposed which utilizes secure clustering and soft computing to improve the network lifetime. Ant colony optimization (ACO) Particle swam (PSO) with crossover operator are used design a computing-based inter-cluster data aggregation. Initially, cluster heads selected based upon adaptive threshold function. Recommendation-based signatures then assigned every aggregated data. Then, tree-based aggregation comes in action collects sensing information directly from by...

10.1142/s0217984920502036 article EN Modern Physics Letters B 2020-06-02

In this paper, a robust energy efficient multi-support and integrated Wireless Multimedia Sensor Network (WMSN) platform, has been proposed. The proposed platform can be used for various ecological occurrence detections such as the presence of plant diseases insects in agriculture applications with high accuracy. Lifetime WMSN also increased by using global balance protocol particle swarm optimization. Finally, extensive experiment analysis is drawn between existing protocols performance...

10.1109/csnt54456.2022.9787666 article EN 2022 IEEE 11th International Conference on Communication Systems and Network Technologies (CSNT) 2022-04-23
Coming Soon ...