Salil Bharany

ORCID: 0000-0002-2282-0419
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Internet of Things and AI
  • Cloud Computing and Resource Management
  • Artificial Intelligence in Healthcare
  • Anomaly Detection Techniques and Applications
  • IoT-based Smart Home Systems
  • COVID-19 diagnosis using AI
  • Underwater Vehicles and Communication Systems
  • Water Quality Monitoring Technologies
  • Sentiment Analysis and Opinion Mining
  • Brain Tumor Detection and Classification
  • AI in cancer detection
  • Smart Grid Security and Resilience
  • Radiomics and Machine Learning in Medical Imaging
  • Artificial Intelligence in Healthcare and Education
  • User Authentication and Security Systems
  • UAV Applications and Optimization
  • Organizational and Employee Performance
  • Software-Defined Networks and 5G
  • Smart Agriculture and AI
  • Chaos-based Image/Signal Encryption

Chitkara University
2024-2025

Lovely Professional University
2023-2024

Indian Institute of Management Amritsar
2023-2024

King Abdulaziz University
2023-2024

Guru Nanak Dev University
2021-2023

Bennett University
2023

Universiti of Malaysia Sabah
2023

Uttaranchal University
2023

A Flying Ad-hoc network constitutes many sensor nodes with limited processing speed and storage capacity as they institute a minor battery-driven device quantity of energy. One the primary roles node is to store transmit collected information base station (BS). Thus, life span main criterion for efficient design FANETS Network, always have resources. In this paper, we present methodology an energy-efficient clustering algorithm collecting transmitting data based on Optimized Low-Energy...

10.3390/en14196016 article EN cc-by Energies 2021-09-22

Global warming is one of the most compelling environmental threats today, as rise in energy consumption and CO2 emission caused a dreadful impact on our environment. The data centers, computing devices, network equipment, etc., consume vast amounts that thermal power plants mainly generate. Primarily fossil fuels like coal oils are used for generation these induce various problems such global ozone layer depletion, which can even become cause premature deaths living beings. recent research...

10.3390/su14106256 article EN Sustainability 2022-05-20

FANET (flying ad-hoc networks) is currently a trending research topic. Unmanned aerial vehicles (UAVs) have two significant challenges: short flight times and inefficient routing due to low battery power high mobility. Due these topological restrictions, FANETS considered more complicated than MANETs or VANETs. Clustering approaches based on artificial intelligence (AI) can be used solve complex issues when static dynamic routings fail. Evolutionary algorithm-based clustering techniques,...

10.3390/su14106159 article EN Sustainability 2022-05-19

In the past few decades, cutting-edge information and communication technology has been used in several ways to keep an eye on marine environment. Underwater wireless sensor networks (UWSNs) can measure amount of water soil conditions, such as salinity, moisture, movements, predict landslides. UWSNs are made up many underwater nodes (WSNs) that spread out across thalassic These have uses, including data collection, navigation, resource analysis, surveillance, disaster prediction, etc....

10.3389/fmars.2023.1117787 article EN cc-by Frontiers in Marine Science 2023-02-02

Software Defined Networking (SDN) is a relatively new networking architecture that has become the most widely discussed technology in recent years and latest development field of developing digital networks, which aims to break down traditional connection middle control surface infrastructure surface. The goal this separation make resources more manageable, secure, controllable. As result, many controllers such as Beacon, Floodlight, Ryu, OpenDayLight (ODL), Open Network Operating System...

10.3390/electronics11172715 article EN Electronics 2022-08-29

The Internet of Things (IoT) has radically transformed how patient information and healthcare monitoring are monitored recorded revolutionized the area by ensuring regular 24 × 7 tracking without costly restricted human resources with a low mistake probability. Medical (IoMT) is subsection things that uses medical equipment as or nodes to enable cost-effective efficient recording. IoMT can cope wide range problems, including observing patients in hospitals, their homes, assisting consulting...

10.3390/su142215312 article EN Sustainability 2022-11-18

Forest fires are a significant threat to the ecological system’s stability. Several attempts have been made detect forest using variety of approaches, including optical fire sensors, and satellite-based technologies, all which unsuccessful. In today’s world, research on flying ad hoc networks (FANETs) is thriving field can be used successfully. This paper describes unique clustering approach that identifies presence zone in transfers sensed data base station as soon feasible via wireless...

10.3390/drones6080193 article EN cc-by Drones 2022-08-02

The democratic welfare government is equally committed to quality-driven, impartial, and egalitarian education. major contribution of this study examine the problems opportunities posed by incorporation digital technology in classroom via lens Classroom 4.0 (CLSR4) education 4.0. commitment equitable quality investigated, line with Global Agenda SDG 4 goal ensuring comprehensive lifelong for everyone. modern witnessing a clash between traditional teaching methods competency today's...

10.1109/access.2024.3357786 article EN cc-by-nc-nd IEEE Access 2024-01-01

Smart home devices have brought in a disruptive, revolutionary Internet-based ecosystem that enhanced our daily lives but has pushed private data from inside homes to external public sources. Threats and attacks mounted against IoT deployments only increased recent times. There been several proposals secure automation environments, there is no full protection Cybersecurity threats for platforms. This research investigates attack attempts on smart focusing firmware, brute force, DoS the...

10.1016/j.eij.2024.100443 article EN cc-by-nc-nd Egyptian Informatics Journal 2024-02-09

Brain tumors, a significant health concern, are leading cause of mortality globally, with an annual projected increase 5% by the World Health Organization. This work aims to comprehensively analyze performance transfer learning methods in identifying types brain particular emphasis on necessity prompt identification. The study demonstrates how useful it is use pre-trained models, including models VGG-16, VGG-19, Inception-v3, ResNet-50, DenseNet, and MobileNet—on MRI datasets used obtain...

10.1109/access.2024.3430109 article EN cc-by-nc-nd IEEE Access 2024-01-01

Diabetes is a growing health concern in developing countries, causing considerable mortality rates. While machine learning (ML) approaches have been widely used to improve early detection and treatment, several studies shown low classification accuracies due overfitting, underfitting, data noise. This research employs parallel sequential ensemble ML paired with feature selection techniques boost accuracy. The Pima India Data from the UCI Repository served as dataset. preprocessing included...

10.1038/s41598-025-87767-1 article EN cc-by-nc-nd Scientific Reports 2025-01-25

Utilization of the Internet Things and ubiquitous computing in medical apparatuses have “smartified” current healthcare system. These days, is used for more than simply curing patients. A Smart Healthcare System (SHS) a network implanted devices wearables that monitors patients real-time to detect avert potentially fatal illnesses. With its expanding capabilities comes slew security threats, there are many ways which SHS might be exploited by malicious actors. include, but not limited to,...

10.3390/su141911934 article EN Sustainability 2022-09-22

With the explosion of connected devices linked to one another, amount transmitted data grows day by day, posing new problems in terms information security, such as unauthorized access users’ credentials and sensitive information. Therefore, this study employed RSA ElGamal cryptographic algorithms with application SHA-256 for digital signature formulation enhance security validate sharing Security is increasingly becoming a complex task achieve. The goal be able authenticate shared function...

10.3390/info13100442 article EN cc-by Information 2022-09-20

Despite major diagnostic progress and treatment progress, cardiovascular diseases (CVD) continue to be the world's leading cause of disease mortality. Artificial intelligence methods provide ability drastically alter cardiology healthcare, by improving reliability optimizing CVD prediction response accuracy. Medical knowledge can also improved AI techniques like machine learning depth due availability healthcare data related relevant cardio clinical information. The focus this research is...

10.1016/j.aej.2023.01.029 article EN cc-by-nc-nd Alexandria Engineering Journal 2023-01-25

Cryptography and associated technologies have existed for a long time. This field is advancing at remarkable speed. Since the inception of its initial application, blockchain has come way. Bitcoin cryptocurrency based on blockchain, also known as distributed ledger technology (DLT). The most well-known everyday use Bitcoin, which debuted in 2008. Its success ushered digital revolution, it currently provides security, decentralization, reliable data transport storage mechanism to various...

10.3390/su14148708 article EN Sustainability 2022-07-16

Owing to the latest advancements in networking devices and functionalities, there is a need build future intelligent networks that provide intellectualization, activation, customization. Software-defined (SDN) are one of most trusted technologies method network management provides virtualization. Although traditional still have strong presence industry, software-defined begun replace them at faster rates. When emerge steady rate, SDN will be implemented higher rates upcoming years all...

10.3390/su141911950 article EN Sustainability 2022-09-22

One of the most common types cancer in women is cervical cancer, a disease which prevalent poor nations, with one woman dying from it every two minutes. It has major impact on burden all cultures and economies. Clinicians have planned to use improvements digital imaging machine learning enhance screening recent years. Even while infections, generate positive tests, do not result precancer, who test negative are at low risk for over next decade. The problem determining HPV results more likely...

10.3390/su141911947 article EN Sustainability 2022-09-22

Businesses need to use sentiment analysis, powered by artificial intelligence and machine learning forecast accurately whether or not consumers are satisfied with their offerings. This paper uses a deep model analyze thousands of reviews Amazon Alexa predict customer sentiment. The proposed can be directly applied any company an online presence detect from automatically. research aims present suitable method for analyzing the users' Echo categorizing them into positive negative thoughts. A...

10.3390/s22197318 article EN cc-by Sensors 2022-09-27

This study uses social media analytics to analyze Twitter users' views, opinions, and sentiments towards the Winter Olympics 2022. Impression Management Theory (IMT) Social Presence (SPT) have been utilized imposition of decision practice self-censorship sports fans, spectators, athletes for sharing content over channels other than Weibo. A total 3270 tweets were collected using combination a keyword hashtag "Weibo" "#Beijing2022". The findings suggest that users chose remain vocal against...

10.1016/j.dajour.2023.100321 article EN cc-by-nc-nd Decision Analytics Journal 2023-09-09

Abstract The research addresses energy consumption, latency, and network reliability challenges in wireless sensor communication, especially military security applications. A multi-agent context-aware model employing the belief-desire-intention (BDI) reasoning mechanism is proposed. This utilizes a semantic knowledge-based intelligent to monitor suspicious activities within prohibited zone, generating alerts. Additionally, BDI multi-level data transmission routing algorithm proposed optimize...

10.1186/s13635-024-00155-6 article EN cc-by EURASIP Journal on Information Security 2024-04-08

The concept of the Internet Things (IoT) threat surface refers to overall susceptibility smart devices potential security risks. This vulnerability includes combined impact weaknesses, gaps in protective measures, and vulnerabilities within device OS, installed libraries, applications, as well infrastructure involved. comprises both identified unforeseen risks that could potentially compromise device's integrity, data, logs, hosted applications. By minimizing extent which components are...

10.1016/j.eij.2024.100513 article EN cc-by-nc-nd Egyptian Informatics Journal 2024-08-06
Coming Soon ...