- Energy Efficient Wireless Sensor Networks
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- IoT-based Smart Home Systems
- Access Control and Trust
- Cloud Data Security Solutions
- Network Traffic and Congestion Control
- Biometric Identification and Security
- Cognitive Radio Networks and Spectrum Sensing
- Advanced Statistical Modeling Techniques
- Smart Agriculture and AI
- IoT and Edge/Fog Computing
- Digital Rights Management and Security
- Data Mining Algorithms and Applications
- Cloud Computing and Resource Management
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Innovation, Technology, and Society
- Lymphoma Diagnosis and Treatment
- Mobile Agent-Based Network Management
- CNS Lymphoma Diagnosis and Treatment
- Machine Learning and ELM
- Advanced Steganography and Watermarking Techniques
- Wireless Communication Networks Research
- Big Data and Business Intelligence
Sylvester Comprehensive Cancer Center
2024
Fred Hutch Cancer Center
2024
City Of Hope National Medical Center
2024
Moffitt Cancer Center
2024
Prisma Health
2024
City of Hope
2024
The University of Texas Health Science Center at San Antonio
2024
Cornell University
2024
Punjab Technical University
2019-2022
University College London
2022
BackgroundIncorporating brentuximab vedotin into the treatment of advanced-stage classic Hodgkin's lymphoma improves outcomes in adult and pediatric patients. However, increases toxic effects adults, more than half patients who receive drug undergo consolidative radiation, relapse remains a challenge. Programmed death 1 blockade is effective lymphoma, including preliminary studies involving previously untreated patients.MethodsWe conducted phase 3, multicenter, open-label, randomized trial...
In this paper, an efficient and modified load balancing algorithm is proposed.This paper shows the results of proposed energy aware algorithm.Global reclustering initiated when network becomes significantly unbalanced i.e. if variance degree cluster heads in greater than a pre-determined threshold.Degree all would be required at single node to evaluate average subsequently among themselves, which not possible adhoc because its distributed nature.For this, formula derived can updated each hop...
As technology advances, massive amounts of data in many different formats are produced everywhere. The industries that have fueled the growth data, including retail, media, finance, healthcare, and education, a tremendously large complicated collection is known as "big data." On other hand, virtual service called cloud computing utilised for processing, storage, mining order to maximise flexibility cut costs. It assisting society addressing upcoming issues, management, cyber security,...
Ubiquitous computing environment demands a dynamic access control mechanism that can adapt to the changing security requirement of environment.In this paper an authorization model for ubiquitous is proposed and formal approach adopted design flexible scalable support intelligent process in environment.
In this paper, an inter-cluster data aggregation based on General Self-Organized Tree-based Energy Balance (GSTEB) routing protocol has been improved by proposing energy efficient under hybrid soft computing. First, finest cluster heads are elected using enhanced ant colony optimization (ACO) method. After that, information which gathered is sent to sink node applying computing (i.e., hybridization of glow swarm and ACOs). Experimental analysis shows that network lifetime according the...
With the emergence of new dynamic computing environments, traditional identity based authorization models are unable to meet multiple attribute policy requirements through single function access control model.There is need for a flexible and scalable model that can different protection requirement system adapt demand real world security requirements.In this paper formal ubiquitous environment proposed.Ubiquitous demands mechanism changing environment.The proposed has taken these factors into...
Cognitive radio technology is a low cost communication system. The main reason of choosing the cognitive system that it prevents interfering licensed and authorised users; by available frequencies waveforms automatically Today development new technologies limited because spectrum. But spectrum sensing vital in networks. It enhances spectral efficiency filling wireless voids.The code written for architecture. In this architecture, maximum 300 nodes taken as an architectural network. aim work...
Security is a very important aspect in the biometric systems.Biometric characteristics are unique to an individual hence compromise of template permanent.Attackers mostly attack on and database system so securing them crucial issue these days.Moreover multibiometric systems require storage multiple templates (e.g., fingerprint, iris, face) for each user, which results increased risk user privacy security.In this research paper our focus security biometrics we develop encrypt decrypt...
Objectives: The main objective of this work is to isolate dictionary attack in wireless sensor networks. In the existing techniques Diffie-Helman algorithm has been proposed for secure channel establishment from source destination. possible which reduce network performance. work, ECC technique used will detect malicious nodes network. Methods/Statistical Analysis: networks are kind can sense natural conditions and it conveyed far spots like a backwoods, deserts so on. Wireless have faced...
A hybrid protocol is proposed which utilizes secure clustering and soft computing to improve the network lifetime. Ant colony optimization (ACO) Particle swam (PSO) with crossover operator are used design a computing-based inter-cluster data aggregation. Initially, cluster heads selected based upon adaptive threshold function. Recommendation-based signatures then assigned every aggregated data. Then, tree-based aggregation comes in action collects sensing information directly from by...
In this paper, a robust energy efficient multi-support and integrated Wireless Multimedia Sensor Network (WMSN) platform, has been proposed. The proposed platform can be used for various ecological occurrence detections such as the presence of plant diseases insects in agriculture applications with high accuracy. Lifetime WMSN also increased by using global balance protocol particle swarm optimization. Finally, extensive experiment analysis is drawn between existing protocols performance...