- Network Security and Intrusion Detection
- Energy Efficient Wireless Sensor Networks
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Metaheuristic Optimization Algorithms Research
- IoT and Edge/Fog Computing
- Cloud Data Security Solutions
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Advanced Steganography and Watermarking Techniques
- Geotechnical Engineering and Soil Stabilization
- Spam and Phishing Detection
- Neural Networks and Applications
- IoT-based Smart Home Systems
- Chaos-based Image/Signal Encryption
- Speech and Audio Processing
- Advanced Text Analysis Techniques
- Anomaly Detection Techniques and Applications
- Geotechnical and construction materials studies
- Antenna Design and Optimization
- Video Analysis and Summarization
- Energy Harvesting in Wireless Networks
- Topic Modeling
- Smart Grid Security and Resilience
California Northstate University
2025
Chandigarh University
2018-2024
Indian Institute of Technology Jodhpur
2019-2024
ASA College
2023
CT Group Of Institutions
2012-2023
Punjab Engineering College
2015-2021
Punjab Technical University
2021
Baba Farid University of Health Sciences
2021
Maharaja Ranjit Singh Punjab Technical University
2020
Guru Teg Bahadur Hospital
2019
Over-accumulation of reactive oxygen species (ROS) causes hepatocyte dysfunction and apoptosis that might lead to the progression liver damage. Sirtuin-3 (SIRT3), main NAD+-dependent deacetylase located in mitochondria, has a critical role regulation mitochondrial function ROS production as well antioxidant mechanism. This study explores roles astragaloside IV (AST-IV) formononetin (FMR) connection with SIRT3 for potential antioxidative effects. It was shown condition combined pre-...
In today's time, we use Leave Application System managed by some central authority. This can lead to corruption, misuse a single authority or unnecessary time for approval. So, in this paper, have developed smart contract architecture Management using Solidity and Ethereum, which is decentralized app leveraged from Blockchain Technology. We also include smartphones as IoT devices any client app. Due the resource-constrained nature of these devices, coupled with an alternative centralized...
Fundamentally, a sentiment refers to the reflection of emotions people. Today's world stands on strings emotions. People express happiness, sadness, love, hatred etc. through some actions. Division i.e positive, neutral and negative, is called analysis. Nowadays there rich data in form tweets, status updates, blog posts, reviews, comments, forums for discussion If we efficiently work upon this bucket full data, it gives way apprehending opinions, views or perspective masses specific...
Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby breaking security policy of system. Covert channel-internal control protocols, called micro been introduced in recent years to enhance capabilities network channels. Micro protocols are usually placed within bits channel's payload enable features such as reliable data transfer, session management, dynamic routing These provide adaptive stealthy communication malware,...
Dengue, also known as break-bone fever, is a tropical disease transmitted by mosquitoes. If the similarity between dengue infected users can be identified, it help government's health agencies to manage outbreak more effectively. To find cases affected user's personal and information are two fundamental requirements. Identification of similar symptoms, causes, effects, predictions treatment procedures, important. In this paper, an effective framework proposed which finds patients suffering...
Many emerging social sites, famous forums, review and many bloggers generate huge amount of data in the form user sentimental reviews, emotions, opinions, arguments, viewpoints etc. about different events, products, brands, politics, movies Sentiments expressed by users has great effect on readers, political images, online vendors. So present scattered unstructured manner needs to be managed properly this context sentiment analysis got attention at very large level. Sentiment can defined as...
In recent times machine learning algorithms are used for internet traffic classification. The infinite number of websites in the world can be classified into different categories ways. educational institutions, these two categories, and non-educational websites. Educational to acquire knowledge, explore topics while entertainment keep touch with people. case blocking students use proxy unblock them. Therefore, institutes optimum network resources should banned. this paper, we five ML...
An efficient prediction of drug synergy plays a significant role in the medical domain. Examination different drug-drug interaction can be achieved by considering score. With an rapid increase cancer disease, it becomes difficult for doctors to predict amount synergy. Because each patient's infection level varies. Therefore, less or more may harm these patients. Machine learning techniques are extensively used estimate However, machine based approaches suffer from parameter tuning problem....
Education has undergone an unprecedented change since ancient times. As a latest development Massive Open Online Courses (MOOCs) are emerging all over the globe. Embracing students from diverse geographical areas, academic backgrounds, and professional pursuits is essence of open learning. India in fact second largest user country MOOCs, following US being at number one. Recognizing same, MOOCs gained momentum too. While some run by private business houses, others introduced Government so as...
Background/Objectives: To mitigate network from amalgam attacks, this study is focussed on designing an efficient approach that can prevent the networks intruders and secure communication. Methods: A crossbreed approach, named 'MOpt Shield,' proposed in study. This protocol utilizes efficacy of existing Cuckoo Search Firefly Optimization Algorithm basic AODV along with promising factors Intrusion Detection System. The simulated using NS-2 simulator two different simulation scenarios, PDR,...
Abstract Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel‐internal control protocols, also called micro protocols , been introduced in recent years to enhance capabilities of network channels. Micro are usually placed within bits channel's payload and enable features such as reliable data transfer, session management, dynamic routing These provide adaptive stealthy communication Some protocol based tools exhibit...
Wireless sensor networks have gained considerable attention in the past few years. They found application domains battlefield communication, homeland security, pollution sensing and traffic monitoring. As such, there has been an increasing need to define develop simulation frameworks for carrying out high-fidelity WSN simulation. For our based study we considered three different scenarios where a Adhoc routing protocol can be applied, namely a) Phenom nodes with Mobility, Sensor mobility...