- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Security in Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Machine Learning and ELM
- Scheduling and Optimization Algorithms
- Transportation Planning and Optimization
- Seismology and Earthquake Studies
- Smart Systems and Machine Learning
- Optical Network Technologies
- Advanced Photonic Communication Systems
- Digital and Cyber Forensics
- Advanced Wireless Network Optimization
- Customer Service Quality and Loyalty
- Machine Learning and Data Classification
- EEG and Brain-Computer Interfaces
- Artificial Intelligence in Healthcare
- AI in cancer detection
- Neuroscience and Neural Engineering
- Semiconductor Lasers and Optical Devices
- Advanced Memory and Neural Computing
- Traffic control and management
- Energy Harvesting in Wireless Networks
- Energy Efficient Wireless Sensor Networks
- Neural Networks and Applications
Maharishi Markandeshwar University, Mullana
2023
Recent trends have shown a greatly increasing number of users in the digital world, so there is need for large resources. To handle these resources, to manage and schedule an optimized manner using artificial intelligence (AI) systems. These systems deal with business-common method managing offerings. Ordinary models consolidate inbound deals, outbound bargains, account-based offerings, or mix diverse models. An organization model may gather multiple choices that makes over long period time,...
The extensive use of sensor technology in every sphere life, along with the continuous digitization society, makes it realistic to anticipate that planet will soon be patched small-sized devices all over place not-too-distant future. These give monitoring and surveillance capabilities, as well access a vast digital universe information, among other things. Finding data processing enquiries, is made much easier thanks seamless transmission information wireless media, which based on “anywhere,...
To be effective, evidence-driven disaster risk management (DRM) relies on a wide variety of data types, information sources, and models. Weather modeling, the rupture earthquake fault lines, creation dynamic urban exposure measures all require extensive collection from sources in addition to complex science. There are various methodologies utilize AI recognize necessities asset accessibility by likes Twitter; however, foremost broadly recognized exact strategies remain cloudy. Within...
In the event of an epileptic attack, Field-Programmable Gate Array (FPGA)-accelerated Convolutional Neural Network (CNN) model is paired with Electroencephalogram (EEG) acquisition equipment to produce a reliable production system that can be used in clinical medical diagnosis. Additionally, this study includes cybersecurity protect both patient’s data and prediction system. Epilepsy frequent neurological disorder manifests as recurrent seizures, sign indicates rapid intervention necessary...
Machine learning is a science of computer algorithms that enable systems to automatically learn actions and adjust them without explicit programming improve from experience using pattern recognition. This work offers practical introduction the core concepts principles bagging decision trees used for breast cancer diagnosis. In this article, three main algorithms, viz. linear regression (LR), tree (DT), random forest, were used. The forest method techniques selecting data points, feature...
Traffic congestion is a formidable problem that affecting the routine lives of people worldwide. A number traffic control schemes have been introduced but still same. Virtual Light one as solution to management at intersections. By selecting right way in distributed fashion an intersection through Vehicle-to-Vehicle Communications. Through this scheme, we can manage self-organized manner. Another factor for Travel behavior, It has become significant research area due its specific features...
The most latest and advanced mode of data communication which involves, transmitting information from one place to another by flashing/sending pulses light through an optical fiber can be termed as optic communication. (the media transmission) forms electromagnetic carrier wave, modulated according the needs. fibers have revolutionized comm.Industry attaining higher bit rate speeds over 100 peta-bits per second using these modes only.
Abstract: Now a days detection of various anomalies finds all the unexpected events in computing information over internet are defined as anomalous or inconsistency events. While detecting inconsistencies will help getting useful system. Inconsistency type locations and exception investigation is way mining prepared for recognizing focuses that drop exterior anomaly. doing so standard set up to anticipated design dataset. This location preparation crucial since peculiarities like these...
Abstract: In our digital age, security breaches brought on by malicious software (malware) attacks are the rise and pose a serious risk. Due to exponential in malware attacks, which has had negative impact many computer users, businesses, governments, detection is still popular research area. Increased use of machine learning artificial intelligence for detection. These systems can learn from patterns anomalies, improving their ability detect new sophisticated strains. The static dynamic...
Customer segmentation is to collect customer related data generalize some insight so as solve business challenges. Data like when purchasing, how many times they have purchased, much spent ,which product purchased in huge quantity, which country has highest sales of particular product. After getting all the details most companies or industry provides, market activity will help not only but also customers too leads growth business. Through understanding behaviour using their buying patterns...