- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Internet of Things and AI
- Energy Efficient Wireless Sensor Networks
- Software Engineering Research
- Software Engineering Techniques and Practices
- Advanced Wireless Communication Technologies
- Wireless Body Area Networks
- Cloud Data Security Solutions
- Information and Cyber Security
- COVID-19 diagnosis using AI
- Advanced Malware Detection Techniques
- Cloud Computing and Resource Management
- IoT-based Smart Home Systems
- Network Security and Intrusion Detection
- Water Quality Monitoring Technologies
- Anomaly Detection Techniques and Applications
- IoT Networks and Protocols
- Digital and Cyber Forensics
- Smart Parking Systems Research
- AI in cancer detection
- Smart Grid Security and Resilience
- Distributed Control Multi-Agent Systems
- Advanced MIMO Systems Optimization
- Telecommunications and Broadcasting Technologies
Jazan University
2017-2024
Aligarh Muslim University
2012-2024
Manav Rachna International Institute of Research and Studies
2022
Arya Vaidya Sala
2022
Early diagnosis of pandemic diseases such as COVID-19 can prove beneficial in dealing with difficult situations and helping radiologists other experts manage staffing more effectively. The application deep learning techniques for genetics, microscopy, drug discovery has created a global impact. It enhance speed up the process medical research development vaccines, which is required pandemics COVID-19. However, current drugs remdesivir clinical trials chemical compounds have not shown many...
In today’s digital world, the Internet is an essential component of communication networks. It provides a platform for quickly exchanging information among communicating parties. There risk unauthorized persons gaining access to our sensitive while it being transmitted. Cryptography one most effective and efficient strategies protecting data are utilized all around world. The efficiency cryptography algorithm determined by number parameters, which length key. For cryptography, key...
COVID-19 is a novel virus that spreads in multiple chains from one person to the next. When infected with this virus, they experience respiratory problems as well rise body temperature. Heavy breathlessness most severe sign of COVID-19, which can lead serious illness some people. However, not everyone who has been will same symptoms. Some people develop cold and cough, while others suffer headaches fatigue. This freezes entire world each country fighting against endures vaccination doses....
The research paper is about the dangers to information security and a solution it by use of blockchain implementation in data security. Blockchain implementations were mostly witnessed sensitive systems, like financial database. Furthermore, this paper, Threats computers systems are highlighted analyzed them well elaborated. cloud computing raised many concerns, that had be addressed solutions found curbing insecurity. was majorly based on step threat system technology.
The idea to connect everything anything and at any point of time is what vaguely defines the concept Internet Things (IoT).The IoT not only about providing connectivity but also facilitating interaction among these connected things.Though term was introduced in 1999 has drawn significant attention during past few years, pace which new devices are being integrated into system will profoundly impact world a good way poses some severe queries security privacy.IoT its current form susceptible...
The coronavirus, formerly known as COVID-19, has caused massive global disasters. As a precaution, most governments imposed quarantine periods ranging from months to years and postponed significant financial obligations. Furthermore, around the world have used cutting-edge technologies track citizens’ activity. Thousands of sensors were connected IoT (Internet Things) devices monitor catastrophic eruption with billions that use these novel tools apps, privacy security issues regarding data...
IoT gadgets include smart lights, ovens, and industrial data-collecting equipment. IDC expects 41.6 billion connected devices to generate 79.4 ZB of data by 2025. Early sent the cloud for analysis. When sending trillions gigabytes cloud, pipeline clogs. Edge computing enables handle locally instead it cloud. Data is processed at "edge" your local network, rather than transferred away. Technology's versatility makes valuable in education. edge has different requirements non-IoT computing....
Blockchain and Internet of Things are the most influential innovative technologies last decade. attracts practitioners researchers due to its inimitable features, including security, data integrity, decentralization, reliability. Whereas IoT describes collection connection objects with each other through wearable devices, software's communicate exchange devices internet. To improve current state knowledge blockchain practices in enabled education sector utilize thoroughgoing features benefit...
In a network setting, sensor node's round-trip delay time over hostile nodes compromises the ability to transmit data from sender node destination node. Minimum distance path discovery causes failure, since aggressive are available. Node connectivity is poor which should cause packet loss; it does not control more energy consumption, broadcasting repeated for many times using that path. So, proposed intertwine connection-based routing selection (ICBRPS) technique allows only efficient path,...
With the development of artificial intelligence technology, various sectors industry have developed. Among them, autonomous vehicle has developed considerably, and research on self-driving control systems using been extensively conducted. Studies use image-based deep learning to monitor driving recently performed. In this paper, we propose an advanced for a serving robot. A robot acts as line-follower that can detect follow line drawn floor move in specified directions. The should be able...
Over the last decade, much has been done to improve healthcare services and technology. A recent study found that IoT can connect sensors, medical devices professionals deliver high-quality remote care. It improved operational efficiency, reduced costs, increased patient safety in industry. Using internet of things, this offers a distributed architecture based on monitoring human biomedical signals during physical activity. The proposed system novelties are applications flexible be computed...
With increasing advancement of technology in the past years rise various security issues and problems.In this connected world, is a paramount challenging issue software development demand time.However usually engineers/developers think about it after entire at that it's too late.Though, developers are aware importance its priority throughout life cycle.Considering right from early stages incorporating during indicates good research development.When metrics considered process initial stage...
Localization and security are among the most dominant tasks of wireless sensor networks (WSN). For applications containing sensitive information on location parameters event, secure localization is mandatory must not be compromised at any cost. The main task, as if node malicious, to authenticate nodes that involved in process. In this paper, we propose a hop-based algorithm provides better accuracy. addition, maintain process, digital signature approach used. Moreover, impact malicious...
The amalgamation of Unmanned Aerial Vehicles (UAVs) into Wireless Sensor Networks (WSNs) and Mobile Ad Hoc (MANETs) provides significant prospects to improve network capabilities. This study examines the energy renewable efficiency performance UAVs operating in WSNs MANETs. assessment considers a variety elements that influence consumption, including possibility integrating energy, management measures, impact on overall performance. seeks provide insights optimizing usage improving these...