- Network Security and Intrusion Detection
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Context-Aware Activity Recognition Systems
- Advanced Database Systems and Queries
- Data Management and Algorithms
- Music and Audio Processing
- Network Packet Processing and Optimization
- Blockchain Technology Applications and Security
- Information and Cyber Security
- IoT Networks and Protocols
- IPv6, Mobility, Handover, Networks, Security
- IoT-based Smart Home Systems
- Cybersecurity and Cyber Warfare Studies
- Spam and Phishing Detection
- Metaheuristic Optimization Algorithms Research
- IoT and GPS-based Vehicle Safety Systems
- Semantic Web and Ontologies
- Chaos-based Image/Signal Encryption
- Advanced Malware Detection Techniques
- Web Data Mining and Analysis
- Topic Modeling
- Cloud Computing and Resource Management
Sardar Vallabhbhai National Institute of Technology Surat
2021-2023
Parul University
2018-2021
Society for Electronic Transactions and Security
2011-2013
The challenge for deployment of low-cost and high-speed ubiquitous Smart Health services has prompted us to propose new framework design providing excellent healthcare humankind. So, there exists a very high demand developing an Internet Medical Things (IoMT) based Ubiquitous Real-Time LoRa (Long Range) Healthcare System using Convolutional Neural Networks (CNN) agree if sequence frames contains person falling. To model the video motion make system scenario sovereign, in this research, we...
These days, NoSQL (Not only SQL) databases are being used as a deployment tool for Data Warehouses (DW) due to its support dynamic and scalable data modeling capabilities. Yet, decision-makers have faced several challenges accept it major choice implementation of their DW. The most significant one among those is lack common conceptual model systematic design methodology different databases. objective this paper resolve these by proposing an ontology based formal DWs. proposed concepts...
The blend of computerized data processing with the existing engineering and medic techniques has enabled explorers in betterment controlling patients concerning two at homes along clinics. In this work, numerous fall assessment for prediction detection vital signs monitoring methods particularly to establish a research gap its allied problems been reviewed incorporated using triple-axis accelerometer Vital Signs Parameters (Heartrate, Heartbeat, Temperature monitoring) ancient people...
NoSQL solutions are started to be increasingly used in modern days’ Data Warehouses (DW). However, business analysts face challenges when performing On Line Analytical Processing (OLAP) queries on these systems. The lack of uniform representation various OLAP operations over different types based DWs is one them. In addition, deficiency precise semantics create obstacles effective query interpretation distinct DWs. This paper aiming deal with aforementioned challenges. Formal and rigorous...
IPv6 communication protocol vulnerabilities are common security threats in Next Generation Networks. Distributed Denial of Service (DDoS) attacks generated by exploiting these have performance impact on both victim as well other hosts sharing the path. Hence order to protect computational and bandwidth resources shared path, anomalies caused be detected attack traffic should filtered out from network elements. Under context flow state maintenance not deployed elements, characterization is...
In healthcare systems, users require keys and certificates to communicate share electronic health records (EHRs). The traditional EHR sharing system typically involves a single centralized trusted third-party (STTP) for authentication, auditing, key generation, storing managing patients' EHRs. To securely collect EHRs from multiple hospitals, perform cryptographic operations. operations that are generated by STTP. However, compromised or malicious STTP can disclose the users' information is...