- IoT and Edge/Fog Computing
- COVID-19 diagnosis using AI
- Blockchain Technology Applications and Security
- Sentiment Analysis and Opinion Mining
- Digital Imaging for Blood Diseases
- Radiomics and Machine Learning in Medical Imaging
- Anomaly Detection Techniques and Applications
- Traffic Prediction and Management Techniques
- Cloud Data Security Solutions
- Network Security and Intrusion Detection
- AI in cancer detection
- COVID-19 epidemiological studies
- Brain Tumor Detection and Classification
- Neural Networks and Applications
- CCD and CMOS Imaging Sensors
- AI in Service Interactions
- Embedded Systems Design Techniques
- Energy Efficient Wireless Sensor Networks
- Artificial Intelligence in Healthcare
- Social Robot Interaction and HRI
- Context-Aware Activity Recognition Systems
- Spam and Phishing Detection
- SARS-CoV-2 and COVID-19 Research
- Currency Recognition and Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
Barkatullah University
2022-2024
Madhya Pradesh Bhoj Open University
2023-2024
Vellore Institute of Technology University
2022
Jagran Lakecity University
2018-2021
National University of Kaohsiung
2021
Maulana Azad National Institute of Technology
2018-2019
Glaucoma is prominent in a variety of nations, with the United States and Europe being two most famous. now affects around 78 million people throughout world (2020). By year 2040, it expected that there will be 111.8 cases glaucoma worldwide. In countries are still building enough healthcare infrastructure to cope glaucoma, ailment misdiagnosed nine times out ten. To aid early diagnosis creation detection system necessary. this work, researchers propose using technology known as deep...
Purpose The latest 2019 coronavirus (COVID-2019), which first appeared in December Wuhan's city China, rapidly spread around the world and became a pandemic. It has had devastating impact on daily lives, public's health global economy. positive cases must be identified as soon possible to avoid further dissemination of this disease swift care patients affected. need for supportive diagnostic instruments increased, no specific automated toolkits are available. results from radiology imaging...
Stock market trends forecast is one of the most current topics and a significant research challenge due to its dynamic unstable nature. The stock data usually non-stationary, attributes are non-correlative each other. Several traditional Technical Indicators (STIs) may incorrectly predict trends. To study characteristics using STIs make efficient trading decisions, robust model built. This paper aims build up an Evolutionary Deep Learning Model (EDLM) identify trends’ prices by STIs....
One of the most significant pandemics has been raised in form Coronavirus disease 2019 (COVID19). Many researchers have faced various types challenges for finding accurate model, which can automatically detect COVID-19 using computed pulmonary tomography (CT) scans chest. This paper also focused on same area, and a fully automatic model developed, predict chest CT scans. The performance proposed method evaluated by classifying community-acquired pneumonia (CAP) other non-pneumonia. deep...
Breast cancer can develop when breast cells replicate abnormally. It is now a worldwide issue that concerns people's safety all around the world. Every day, women die from cancer, which especially common in United States. Mammography, CT, MRI, ultrasound, and biopsies may be used to detect cancer. Histopathology (biopsy) often carried out examine image discover detection at an early stage saves lives. Deep machine learning models aid of The aim research work encourage medical development...
One of the rising fields research are hand gesture recognition. Being an important part non-verbal interaction is a critical our everyday life. Hand management recognition systems allow us to communicate with machine, which more familiar human being, creative, normal, user-friendly. covers wide range applications including contact sign language, immersive game technology etc. To perform this we have implemented method and extraction features by means web camera in real time. The picture...
Purpose Since December 2019, global attention has been drawn to the rapid spread of COVID-19. Corona was discovered in India on 30 January 2020. To date, India, 178,014 disease cases were reported with 14,011 deaths by Indian Government. In meantime, an increasing speed, COVID-19 epidemic occurred other countries. The survival rate for patients who suffer from a critical illness is efficiently and precisely predicted as more fatal can be affected advanced cases. However, over 400...
Cloud computing has increased its service area and user experience above traditional platforms through virtualization resource integration, resulting in substantial economic societal advantages. is experiencing a significant security trust dilemma, requiring trust-enabled transaction environment. The typical cloud model centralized, high maintenance costs, network congestion, even single-point failure. Also, due to lack of openness traceability, rating findings are not universally...
Purpose This purpose of this study is to perfrom the analysis COVID-19 with help blood samples. The samples used in consist more than 100 features. So process high dimensional data, feature reduction has been performed by using genetic algorithm. Design/methodology/approach In study, authors will implement algorithm for prediction from test sample. sample contains records around 5,644 patients 111 attributes. such as relief ant colony optimization be dimensionality approach. Findings...
Human activity recognition is a time series classification problem that difficult to solve (HAR). Traditional signal processing approaches and domain expertise are necessary appropriately create features from raw data fit machine learning model for predicting person’s movement. This work aims demonstrate how hybrid deep may be used recognize human behavior. Deep methodologies such as convolutional neural networks recurrent will extract the achieve goal. The suggested has wireless sensor...
This article examines the critical role of encryption key management in hybrid cloud environments, where enterprises must secure data across both on-premises infrastructure and multiple service providers. As organizations increasingly adopt architectures to balance flexibility, performance, cost-efficiency, they face growing complexity securing sensitive disparate environments. study hypothesizes that centralized significantly reduces exposure risk It demonstrates implementing systems...
Nowadays, COVID-19 is considered to be the biggest disaster that world facing. It has created a lot of destruction in whole world. Due this COVID-19, analysis been done predict death rate and infected from total population. To perform on regression implemented by applying differential equation ordinary (ODE) parameters. The parameters taken for are number susceptible individuals, Infected Individuals, Recovered Individuals. This work will cases, cases near future based different reproductive...
Wireless sensor networks (WSNs) are a widely studied area in the field of networked embedded computing. They made up several nodes, which keep track variety physical and environmental parameters, like temperature humidity. The nodes autonomous, self-configuring, wireless. A significant problem WSNs is that sensors these consume lot energy. Energy consumption big issue when it comes to deployment networks. reason for this cost operating node incurred due energy consumption. optimization based...
This article examines the paradigm shift from traditional perimeter-based security to Zero-Trust Architecture (ZTA) in enterprise environments. As cyber threats continue evolve sophistication, conventional "castle-and-moat" models have proven increasingly inadequate, particularly their inability prevent lateral movement once perimeters are breached. Architecture, founded on principle of "never trust, always verify," offers a compelling alternative by requiring continuous authentication and...
Proactive threat hunting represents a paradigm shift in cybersecurity defense strategies, moving organizations beyond traditional reactive approaches to more aggressive posture against advanced persistent threats. This article examines how structured methodologies enable security teams identify sophisticated adversaries before significant damage occurs. By implementing comprehensive program with appropriate technical infrastructure, specialized personnel, and formalized processes, can...
Internet of Things (IoT) is an emerging field in the area research and emergence has developed explosion sensor computing platforms. A wide range applications been using this platform by IoT devices ranging from simple to complex machines like implementation Artificial intelligence various devices. Developers are working on more that can generate performance but at same time, they targeting low-cost machine systems CPU, sometimes low cost might performance. To overcome these low-performance...
Recommender systems are chiefly renowned for their applicability in e-commerce sites and social media. For system optimization, this work introduces a method of behaviour pattern mining to analyze the person's mental stability. With utilization sequential algorithm, efficient extraction frequent patterns from database is achieved. A candidate sub-sequence generation-and-test adopted conventional algorithms like Generalized Sequential Pattern Algorithm (GSP). However, since approach will...