- Data Mining Algorithms and Applications
- Blockchain Technology Applications and Security
- Semantic Web and Ontologies
- Rough Sets and Fuzzy Logic
- Biomedical Text Mining and Ontologies
- Chaos-based Image/Signal Encryption
- Data Management and Algorithms
- IoT and Edge/Fog Computing
- Information and Cyber Security
- Data Quality and Management
- Molecular Communication and Nanonetworks
- COVID-19 diagnosis using AI
- Advanced Text Analysis Techniques
- Sharing Economy and Platforms
- Privacy, Security, and Data Protection
- Cryptographic Implementations and Security
- Cognitive Computing and Networks
- Cell Image Analysis Techniques
- Cryptography and Data Security
- Blind Source Separation Techniques
- Smart Cities and Technologies
- EEG and Brain-Computer Interfaces
- Emotion and Mood Recognition
- Cloud Data Security Solutions
- Transportation and Mobility Innovations
Higher Institute of Management
2024
ABES Engineering College
2019-2022
Institute of Management Technology
2019-2021
Pacific Dental College and Hospital
2012
Abstract The electroencephalography (EEG) signal is corrupted with some non-cerebral activities due to patient movement during measurement. These are termed as artifacts, which may diminish the superiority of acquired EEG statistics. state art artifact elimination approaches applied canonical correlation analysis (CCA) for confiscating motion artifacts accompanied by ensemble empirical mode decomposition (EEMD). An improved cascaded approach based on Gaussian CCA (GECCA) and EEMD suppress...
With the continuous advancement in technical field many technologies are evolving day by day, cloud computing is one of them. help user can easily share, store and retrieve their data from anywhere. Cloud provides hardware, software infrastructural storage to users at a time. As share on main question about security present cloud. In this research paper solution provided maintain integrity. This scheme contains combination RSA Partial homomorphic MD5 hashing algorithm. encrypted before...
Computer security or Cyber Security is combination of processes, technologies and practices. The objective cyber to protect programs, application, networks, computers data from attack. In a computing context, includes both physical security. attacker damage theft software information well as disruption misdirection the services they misguide. controlling access hardware, networks protecting against harm that may come via networks. this paper we proposed study its elements. We also give...
Introduction: Electrocardiogram-based facial emotion identification has been a widely spread field in the last few decades. Due to its non-linearity, non-stationary and noisy properties, it is very difficult job create framework that capable of recognizing emotions with high recognition rate. background: Electrocardiogram based some Method: In this work, we introduce new for detection on feature creation using topographic representation ECG signal properties. The map created deep learning...
AI has the potential to revolutionize image analysis across various industries, from healthcare entertainment. AI-powered can improve accuracy, speed, and efficiency, enabling industries make better decisions provide services customers. This research paper aims study in detail concept of how integration improved process analysis. The reviews phases open-source tools available perform processing. methodology includes systematic procedure execute processing with an tool analyze efficiency...
Background:: With the growing need for information safety and security rules in every corner of globe. The biometric innovation has been used widely all over world daily life. In this view, Multimodal-based technique gained popularity interest due to its capability resolve various problems associated with single-model identification systems Methods:: research, an advanced multimodal-based recognition system is introduced, which depends on multilayer perceptron (MLP), it identifies humans...
The disease identification from the symptoms and other detail is one of important research area for researcher.The various ontology systems which relate symptom evaluated by researchers.Many time this system fail due to confusing make fuzzy problem classification.In paper based presented.The fuzziness solving generating optimizing rule base.The Malaria has been used evaluate performance classifier.The accuracy classification on database key parameter evaluation method.
Associations rule mining along with classification are both significant techniques of knowledge in the area discovery massive databases stored different geographic locations world. Based on such combination these two, class association rules for or associative methods have been generated, which, far too many cases, showed higher prediction accuracy than platitudinous conventional classifiers. Motivated by study, this paper, we proposed a new approach, namely IHAC (Incorporating Heuristics...
E-health care decision support system is developed for the purpose of improving health services and control over patient's health.The facilitates quick accessed specialized services, course, depending upon or case history by reducing visit time to medical institutions.It provides specialist a fast up date patient data, thus documentation formalities increasing usability information more effectively reliably institutions.Healthcare institutions are designed target patients deliver proper...
Knowledge discovery process deals with two essential data mining techniques, association and classification. Classification produces a set of large number associative classification rules for given observation. Pruning removes unnecessary class without losing accuracy. These processes are very significant but at the same time challenging. The experimental results limitations existing techniques have shown that there is requirement to consider more pruning parameters so size classifier can be...
Causality as a phenomenon still seems to be an old and open issue the philosophy itself. Discovering such relationships among data, in most of cases results unsuccessfully effort. Taking consideration fact that research community mostly focuses on discovery causal association rules with single cause factor, but however, sometimes variable might not any effect, since problem is affected by single, combination two or more factors variables. Anyway, considering literature located web, it...
The main objective of this paper is to examine the basic principles granular computing and apply them for knowledge discovery in databases. Granular an emerging field research that provides a way studying many issues solving problems related them. consist introduction overview computing. It also examines some those issues, including data representation processing. demonstrated one fundamental task mining finding up right level granularity representation. Finally it concludes on powerful view...
In the era of internet & smart phone every day terabytes data are being generated. Data security over during communication is a great challenge. Cryptography an integral part mechanism internet. makes information unintelligible to unauthorized person. provides confidentiality and maintains integrity genuine users. study mathematical techniques related aspects such as confidentiality, integrity, entity authentication, authentication. The input encryption process commonly called plain text,...