Rishi Kumar

ORCID: 0000-0002-1451-2686
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Advanced Image and Video Retrieval Techniques
  • Blockchain Technology Applications and Security
  • Video Surveillance and Tracking Methods
  • Video Analysis and Summarization
  • Image Retrieval and Classification Techniques
  • IoT-based Smart Home Systems
  • Lung Cancer Diagnosis and Treatment
  • Robotics and Automated Systems
  • Hand Gesture Recognition Systems
  • Advanced Malware Detection Techniques
  • Radiomics and Machine Learning in Medical Imaging
  • Date Palm Research Studies
  • Corporate Insolvency and Governance
  • Tactile and Sensory Interactions
  • Advanced Steganography and Watermarking Techniques
  • Handwritten Text Recognition Techniques
  • Spam and Phishing Detection
  • Emotion and Mood Recognition
  • Smart Parking Systems Research
  • Building Energy and Comfort Optimization
  • Face recognition and analysis
  • Organizational and Employee Performance
  • Agricultural Practices and Plant Genetics

Graphic Era University
2025

Indian Institute of Horticultural Research
2024

SASTRA University
2024

Universiti Teknologi Petronas
2021-2023

Saveetha University
2023

Amity University
2016-2019

Amity University
2018

Indian Institute of Technology Kanpur
2010

An application for tracking and detecting faces in videos cameras which can be used multipurpose activities. The intention of the paper is deep study face detection using open CV. A tabular comparison performed order to understand algorithms an easier manner. It talks about various like Adaboost, Haar cascades. This aims help understanding best prerequisites detection.

10.1109/iceca.2017.8203730 article EN 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA) 2017-04-01

"Olivia" is a Virtual Assistant developed specifically for homes, which can be integrated into any home to make it Smart Home. The user interact solely through his/her voice with Olivia (the virtual assistant) get work done around the house. Olivia-the assistant installed anywhere inside house as lives Raspberry Pi really compact and inexpensive computer connected easily devices such microphone, speakers, cameras, PIR etc. Thus having ability convert smart home. In this system we have door...

10.1109/confluence.2019.8776918 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2019-01-01

As the field of information technology expands, there is a huge need for cloud service providers (CSP). CSP's vast solutions and services support Cloud, IoT, Fog, Edge computing. In today's competitive market, customer satisfaction critical more than ever. CSP consumer with level agreement (SLA) fulfillment have always been given attention. result signing SLA agreements to supply resources in high demand, customers are now experiencing issues resource delivery. Cloud heterogeneous...

10.1109/access.2023.3254552 article EN cc-by IEEE Access 2023-01-01

The development of the urban environment by providing favorable and secure conditions to population are always directed based on Environmental Energy factors at various level. role facility planning remains an integral part designing efficient management in . In this paper, Hierarchical Statistical Efficient Planning Framework (HSEPF) has been proposed for transportation areas. HSEPF utilizes mathematical model analysis focuses developing effective policies improve territorial utilization...

10.1051/e3sconf/202456408005 article EN cc-by E3S Web of Conferences 2024-01-01

With cybercrimes and attacks on the rise, security is a basic requirement, as well necessity, in today's world. As any type of intercommunication storage data internet becoming precarious, it becomes extremely important to keep our home network updated terms security, minimize loop holes ensure integrity incorruptibility. It now that we protect secure networks devices from cyber-attacks. Intrusion Detection Systems Honeypots if implemented correctly can prove be efficient solutions. In this...

10.1109/ctems.2018.8769135 article EN 2018 International Conference on Computational Techniques, Electronics and Mechanical Systems (CTEMS) 2018-12-01

Human emotions are natural expressions that people tend to make naturally, instead of any conscious effort is accompanied by the reflexing facial muscles. Some common Happy, sad, surprised, anger and stable (normal) which a human face can according different situations one may find itself in. We present software detects recognizes faces as well tells lot more about person could be used get feedback from customers or know if needs motivation. The objective project an affordable efficient...

10.1109/confluence.2019.8776617 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2019-01-01

Video is a structured media and segmentation of it into basic temporal units normally the beginning in processing channel content based retrieval. This paper looks various possible techniques for extraction key frames from video stream. As there have been many challenges faced by other researches projects to properly execute or create system which can perform frame face recognition, this will try resolve them more efficient manner. The focuses on streamlining all requirements user view only...

10.1109/confluence.2016.7508164 article EN 2016-01-01

Cloud Service Providers (CSPs) are in massive demand with the growing field of information technology. CSP produces enormous solutions and support for cloud, IoT, Fog, Edge computing. In current era competitive cloud market, consumer satisfaction plays an important role. Quality Services (QoS) fulfilment service level agreement (SLA) consumers is always given more attention. Consumers face problems over resource delivery after signing SLA issues to provide over-demanded resources. dynamic...

10.1109/iccit52419.2022.9711663 article EN 2022-01-25

Image encoding algorithm is a state of art information hiding using any image as shield. In this paper concept steganography and various terms related are defined. The efficiency the improved by novel fractal technique. Fractals self-similar complex created applying set affine transformation on iteratively. paper, we propose to exploit self-similarity present an determine regions. Location fractals region in used hide that region. Proposed results into good quality coded visually it looks...

10.1109/iwait.2018.8369799 article EN 2018 International Workshop on Advanced Image Technology (IWAIT) 2018-01-01

Nowadays, lots of people in current era using social media for making their mindset to buy some products or services. Opinion mining spam analysis is a tuff task analyze the review because fake reviews can make by owner product as well individuals different purposes. They use write unwanted approach readers automated detection technique encourage discourage target and reputations. In this paper, our unique base on knowledge-based Ontology other detect opinion with high accuracy.

10.1109/icacccn.2018.8748781 article EN 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN) 2018-10-01

Gesture Recognition has played a very significant role in the field of Human Computer Interaction (HCI). A vision-based hand gesture recognition approach can provide solution to various machine applications by providing an easy interaction channel. For most automated control efficient real time communication is required. In this paper gesture-based presented for robotic control. The was tested on different gestures used movements and result shows that proposed be efficiently where immediate...

10.1109/icgciot.2018.8752966 article EN 2018-08-01

The exponential growth of Digital media has made large number videos available to us on social video sharing platforms. These are generally loosely tagged by users making indexing and retrieval methods inefficient. A pressing problem cropped up categorizing theses videos. In this paper we present/propose an innovative method for classifying tagging This study initially deals with face recognition in then automation them. novel content based automatic algorithm will dramatically reduce human...

10.1109/confluence.2016.7508165 article EN 2016-01-01

This paper shows various services provided in cloud computing and use of these directly via Operating System. With the increasing popularity concept its availability encourages more organization to switch their environment based environment. deals with using all kinds software requirements through by an operating system mere hardware requirement thus remotely accessing those applications installed on cloud, also referred as "Cloud Driving" paper. approach can drastically minimize cost high...

10.1109/confluence.2016.7508114 article EN 2016-01-01

Intending to revolutionize medical diagnosis, this paper attempts harness the power of deep learning techniques create a virtual interface identify Alzheimer's disease. The major public health issue is disease, progressive neurological illness. Although it still challenging procedure, early identification crucial managing course To fulfill challenge, work crucial. Early detection essential manage disease progression but remains difficult task. A Kaggle dataset was used design for...

10.1109/icdcece60827.2024.10549233 article EN 2024-04-26

A study was conducted to assess the spread and acceptance of ICAR-IIHR released annona Hybrid–Arka Sahan in 3 major states such as Karnataka, Andhra Pradesh Rajasthan. From each state, predominant growing district purposively selected. Using multistage sampling methodology, 60 growers were The data collected using pre-tested interview schedule analyzed by appropriate statistical tools. results revealed that Arka 12.50 per cent total area under production Tamil Nadu, followed 9.78 1.60...

10.9734/ajaees/2024/v42i82534 article EN Asian Journal of Agricultural Extension Economics & Sociology 2024-08-20

The increasing demand for efficient and cost-effective energy storage systems has pushed extensive research into improved materials next-generation devices. This study discusses the crucial significance of material advances in boosting performance reducing costs technologies such as batteries supercapacitors. Conventional face limits density, charge or discharge rates, scalability, which impede their broad implementation. Advanced materials, including nanomaterials, solid-state electrolytes,...

10.1051/e3sconf/202459101001 article EN cc-by E3S Web of Conferences 2024-01-01

With the help of an intelligent agent, a cloud service provider (CSP) offers various services and resources to their customers over internet. Consumers CSPs in market are constant state negotiation individual needs. Competition among is fierce because enormous number market. Intelligent agents highly demanding as timesaving success rate-enhancing tool. While negotiating, multiple attributes such price, resources, reliability, CSP performance, utility value, many more considered. There’s...

10.37934/araset.32.2.189202 article EN cc-by-nc Journal of Advanced Research in Applied Sciences and Engineering Technology 2023-09-07

The purpose of this study is to explore how modern virtual reality technology applied in India's landscape design. This provides a brief overview and scientific classification its main categories. At the same time, advantages currently emerging VR are summarised scientifically analysed discussed before attempting apply Research has found that can create an immersive environment for users if it used well design, bring sense physical mental enjoyment, effectively play more vivid, intuitive,...

10.1109/smarttechcon57526.2023.10391303 article EN 2023-08-18
Coming Soon ...