- Advanced Wireless Network Optimization
- Artificial Intelligence in Healthcare
- Advanced MIMO Systems Optimization
- Telecommunications and Broadcasting Technologies
- Energy Efficient Wireless Sensor Networks
- Mobile Agent-Based Network Management
- Hate Speech and Cyberbullying Detection
- Education and Learning Interventions
- Machine Learning in Healthcare
- Machine Learning and Data Classification
- Quantum Computing Algorithms and Architecture
- Handwritten Text Recognition Techniques
- Petri Nets in System Modeling
- Advanced Computing and Algorithms
- Smart Agriculture and AI
- Food Supply Chain Traceability
- Wireless Networks and Protocols
- Diverse Aspects of Tourism Research
- Optimization and Search Problems
- Cooperative Communication and Network Coding
- Digital Marketing and Social Media
- Software-Defined Networks and 5G
- Advanced Malware Detection Techniques
- IoT-based Smart Home Systems
- Bullying, Victimization, and Aggression
Sangath
2023-2024
Kurukshetra University
2023
Anna University, Chennai
2020
KPR Institute of Engineering and Technology
2020
University of Colorado Boulder
2002
Pets play a crucial role in human society, yet the transfer of their veterinary medical records pose challenge when pet owners relocate or pets undergo change ownership. This results gaps pet's history, potentially leading to missed care for long-term conditions, allergies, essential preventive procedures. To address this issue and enhance overall well-being owners, research study aims develop comprehensive application by utilizing Amazon Web Services (AWS). seeks facilitate seamless record...
Summary IoT‐assisted WSN contains various nodes, which are placed on a huge scale that increases complications. Thus, the challenges and issues of these networks fluctuate as compared to WSNs. Hence, sensor nodes imperative unit runs less energy resources. devising robust energy‐effective protocol for increasing network lifetime is complex task. This paper devises novel hybrid optimization‐driven approach selecting cluster head (CH) in Initially, simulation IoT done by configuration....
In ultramodern smart metropolises, licence plate recognition systems, similar to risk payment parking and apartment admission operation, are generally enforced. Similar electronic technology not only improves people's daily lives, but also provides governments with safe effective services. People clamouring for a life trip in an era of rapid technological development. Over the last several decades, no. buses on road has significantly increased. Tracking every vehicle can be difficult process...
The release of textile effluents into the biosphere is a serious threat to environment and promotes several health issues.Although studies have been carried out in remediation using adsorbents, continuous mode operation (packed bed) treat effluent generated from cotton-based industry biosorbent seldom reported.Here, one such investigation made remediate Remazol solution batch operation.A maximum decolourization efficiency 77.5% 49.66% was obtained for Ulva lactuca derived biochar...
In quantum-based computing, the communication uses quantum bits rather than digital to address information. This work proposes employ encrypted for sharing keys called in Quantum framework. Cloud computing is one of services, which supports both and registering. For small huge tasks, providing any software, platform, or infrastructure as a service, pay-n-use technique should be possible distributed computing. Based on duration amount administration utilization, payment will determined. The...
Internet connectivity in WiMAX networks, along with various applications, is increasing rapidly, so the of internet and data transfer speed are always challenge for effective transmission wireless networks. Several factors affect performance One important factor to choose a suitable frame period transmissions. The different round-robin strict priority evaluated this work. A round robin performs better than terms throughput, but drop rates observed. This paper also demonstrates that an...
IEEE 802.16 can be seen as a compelling replacement for conventional broadband technologies because its primary goal is to provide Broadband Wireless Access (BWA). The variable and uncertain nature of wireless networks makes it much more challenging ensure QoS in this network. WiMAX Technology used support various quality services which includes UGS, rtps, nrtps, ertps Best Effort. This study employs an network simulator, offers adaptable reliable features assessing particular parameters...
Cyberbullying represents a significant challenge in online environments, requiring advanced techniques for its accurate detection and mitigation. This paper introduces novel approach that leverages ensemble learning embedding methods to enhance cyberbullying detection. The proposed framework integrates various classifiers, including deep models, decision trees, random forests, logistic regression, combination with Universal Sentence Embeddings semantic text representation. study employs...
Summary Enhancement of network performance is a big challenge today for the emerging technology based on IEEE 802.16. Wireless an alternate solution to wired technology. Network availability all way important in day‐to‐day life. Due huge population, again challenge. Also, it becomes more difficult capture if considering rural areas, hilly, lakes, and seashores today. This work proposed relay stations WiMAX (Worldwide Interoperability Microwave Access) networks along with various bandwidth...
We describe a fully distributed algorithm for location management. It is based on organizing mobile switching stations into hierarchical network of grids. The interesting properties this are symmetric availability reads and writes, low quorum size, scalability flexibility. novel solution the well-known matching problem that especially suitable in environment. compare performance our technique against standard grid protocol also more recent Crumbling Walls terms read write availability, size...
Many of the newest switching systems have a distributed architecture in which overload controls can also be distributed. Under overload, location congestion might determine type control exercised. In particular, actions may taken even after digits been collected. Such "post-dial" facilitate preferential treatment certain calls on basis dialed digits. this paper we present results performance study strategies for giving priority to essential user at predial and postdial stages system.
Abstract IoT-assisted WSN contains various nodes, which are placed in huge scale that increases complications. Thus, challenges and issues of these networks fluctuate as compared to WSN. Hence, sensor nodes imperative unit runs on less energy resources. devising a robust energy-effective protocol for increasing network lifetime is complex task. This paper devises novel hybrid optimization driven approach selecting cluster head (CH) Initially, simulation IoT done by configuration. Thereafter,...
Customer who viewed this item wills also view that” is an intelligent as well expert activity that keeps track of customers. Online shopping trends are based on the statistics which execute cross-selling mechanism. This algorithm will suggest your site visitors with products were mostly explored by other customers basis maximum ratings, purchased or liked and viewed. These suggestions display product pages current product. Various Shopping application web-sites using different methods to...
Nowadays, Machine is playing a similar role as human being in every field of decision making, recommending something, diagnosing patients or recognising someone. That Day not far where the machine will start commanding humans. A lot research has been done, and some are going making to visualise detect recognise person objects. This technique called Computer vision, which gives power that this this. With same technology research, I have developed system for recognition & expression reading...
Artificial intelligence is making a new world with the most advanced technology like machine learning, deep computer vision and Robotics process automation. The techniques are human to reduce their physical efforts, save times accuracy more than where can't perform those task. With effortless, as lots of research done in this filed, its uses application also developed self-driving card, face recognition, emotion speech recognition many more. In research, we implemented smart classroom...