Parashu Ram Pal

ORCID: 0000-0002-3559-7498
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Data Mining Algorithms and Applications
  • Blockchain Technology Applications and Security
  • Semantic Web and Ontologies
  • Rough Sets and Fuzzy Logic
  • Biomedical Text Mining and Ontologies
  • Chaos-based Image/Signal Encryption
  • Data Management and Algorithms
  • IoT and Edge/Fog Computing
  • Information and Cyber Security
  • Data Quality and Management
  • Molecular Communication and Nanonetworks
  • COVID-19 diagnosis using AI
  • Advanced Text Analysis Techniques
  • Sharing Economy and Platforms
  • Privacy, Security, and Data Protection
  • Cryptographic Implementations and Security
  • Cognitive Computing and Networks
  • Cell Image Analysis Techniques
  • Cryptography and Data Security
  • Blind Source Separation Techniques
  • Smart Cities and Technologies
  • EEG and Brain-Computer Interfaces
  • Emotion and Mood Recognition
  • Cloud Data Security Solutions
  • Transportation and Mobility Innovations

Higher Institute of Management
2024

ABES Engineering College
2019-2022

Institute of Management Technology
2019-2021

Pacific Dental College and Hospital
2012

Abstract The electroencephalography (EEG) signal is corrupted with some non-cerebral activities due to patient movement during measurement. These are termed as artifacts, which may diminish the superiority of acquired EEG statistics. state art artifact elimination approaches applied canonical correlation analysis (CCA) for confiscating motion artifacts accompanied by ensemble empirical mode decomposition (EEMD). An improved cascaded approach based on Gaussian CCA (GECCA) and EEMD suppress...

10.1093/comjnl/bxab170 article EN The Computer Journal 2021-12-05

10.70558/spijsh.2025.v2.i3.45138 article EN ShodhPatra: International Journal of Science and Humanities. 2025-03-01

With the continuous advancement in technical field many technologies are evolving day by day, cloud computing is one of them. help user can easily share, store and retrieve their data from anywhere. Cloud provides hardware, software infrastructural storage to users at a time. As share on main question about security present cloud. In this research paper solution provided maintain integrity. This scheme contains combination RSA Partial homomorphic MD5 hashing algorithm. encrypted before...

10.1109/ic4.2015.7375655 article EN 2015-09-01

Computer security or Cyber Security is combination of processes, technologies and practices. The objective cyber to protect programs, application, networks, computers data from attack. In a computing context, includes both physical security. attacker damage theft software information well as disruption misdirection the services they misguide. controlling access hardware, networks protecting against harm that may come via networks. this paper we proposed study its elements. We also give...

10.26483/ijarcs.v8i3.3099 article EN International Journal of Advanced Research in Computer Science 2017-04-30

Introduction: Electrocardiogram-based facial emotion identification has been a widely spread field in the last few decades. Due to its non-linearity, non-stationary and noisy properties, it is very difficult job create framework that capable of recognizing emotions with high recognition rate. background: Electrocardiogram based some Method: In this work, we introduce new for detection on feature creation using topographic representation ECG signal properties. The map created deep learning...

10.2174/0123520965293221240411091945 article EN Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 2024-04-25

AI has the potential to revolutionize image analysis across various industries, from healthcare entertainment. AI-powered can improve accuracy, speed, and efficiency, enabling industries make better decisions provide services customers. This research paper aims study in detail concept of how integration improved process analysis. The reviews phases open-source tools available perform processing. methodology includes systematic procedure execute processing with an tool analyze efficiency...

10.2139/ssrn.4819507 article EN SSRN Electronic Journal 2024-01-01

Background:: With the growing need for information safety and security rules in every corner of globe. The biometric innovation has been used widely all over world daily life. In this view, Multimodal-based technique gained popularity interest due to its capability resolve various problems associated with single-model identification systems Methods:: research, an advanced multimodal-based recognition system is introduced, which depends on multilayer perceptron (MLP), it identifies humans...

10.2174/0123520965293198240418063311 article EN Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 2024-05-10

The disease identification from the symptoms and other detail is one of important research area for researcher.The various ontology systems which relate symptom evaluated by researchers.Many time this system fail due to confusing make fuzzy problem classification.In paper based presented.The fuzziness solving generating optimizing rule base.The Malaria has been used evaluate performance classifier.The accuracy classification on database key parameter evaluation method.

10.5120/18857-8528 article EN International Journal of Computer Applications 2014-12-18

Associations rule mining along with classification are both significant techniques of knowledge in the area discovery massive databases stored different geographic locations world. Based on such combination these two, class association rules for or associative methods have been generated, which, far too many cases, showed higher prediction accuracy than platitudinous conventional classifiers. Motivated by study, this paper, we proposed a new approach, namely IHAC (Incorporating Heuristics...

10.1142/s0219649221500106 article EN Journal of Information & Knowledge Management 2021-03-01

E-health care decision support system is developed for the purpose of improving health services and control over patient's health.The facilitates quick accessed specialized services, course, depending upon or case history by reducing visit time to medical institutions.It provides specialist a fast up date patient data, thus documentation formalities increasing usability information more effectively reliably institutions.Healthcare institutions are designed target patients deliver proper...

10.5120/9575-4050 article EN International Journal of Computer Applications 2012-12-18

Knowledge discovery process deals with two essential data mining techniques, association and classification. Classification produces a set of large number associative classification rules for given observation. Pruning removes unnecessary class without losing accuracy. These processes are very significant but at the same time challenging. The experimental results limitations existing techniques have shown that there is requirement to consider more pruning parameters so size classifier can be...

10.35940/ijeat.b3317.129219 article EN International Journal of Engineering and Advanced Technology 2019-12-30

Causality as a phenomenon still seems to be an old and open issue the philosophy itself. Discovering such relationships among data, in most of cases results unsuccessfully effort. Taking consideration fact that research community mostly focuses on discovery causal association rules with single cause factor, but however, sometimes variable might not any effect, since problem is affected by single, combination two or more factors variables. Anyway, considering literature located web, it...

10.1109/icdabi53623.2021.9655981 article EN 2021 International Conference on Data Analytics for Business and Industry (ICDABI) 2021-10-25

The main objective of this paper is to examine the basic principles granular computing and apply them for knowledge discovery in databases. Granular an emerging field research that provides a way studying many issues solving problems related them. consist introduction overview computing. It also examines some those issues, including data representation processing. demonstrated one fundamental task mining finding up right level granularity representation. Finally it concludes on powerful view...

10.26483/ijarcs.v2i1.242 article EN International Journal of Advanced Research in Computer Science 2011-01-01

In the era of internet & smart phone every day terabytes data are being generated. Data security over during communication is a great challenge. Cryptography an integral part mechanism internet. makes information unintelligible to unauthorized person. provides confidentiality and maintains integrity genuine users. study mathematical techniques related aspects such as confidentiality, integrity, entity authentication, authentication. The input encryption process commonly called plain text,...

10.26483/ijarcs.v8i3.3126 article EN International Journal of Advanced Research in Computer Science 2017-04-30
Coming Soon ...