Jaspreet Kaur

ORCID: 0000-0002-7105-7720
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Energy Efficient Wireless Sensor Networks
  • Advanced Malware Detection Techniques
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Metaheuristic Optimization Algorithms Research
  • IoT and Edge/Fog Computing
  • Cloud Data Security Solutions
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Advanced Steganography and Watermarking Techniques
  • Geotechnical Engineering and Soil Stabilization
  • Spam and Phishing Detection
  • Neural Networks and Applications
  • IoT-based Smart Home Systems
  • Chaos-based Image/Signal Encryption
  • Speech and Audio Processing
  • Advanced Text Analysis Techniques
  • Anomaly Detection Techniques and Applications
  • Geotechnical and construction materials studies
  • Antenna Design and Optimization
  • Video Analysis and Summarization
  • Energy Harvesting in Wireless Networks
  • Topic Modeling
  • Smart Grid Security and Resilience

California Northstate University
2025

Chandigarh University
2018-2024

Indian Institute of Technology Jodhpur
2019-2024

ASA College
2023

CT Group Of Institutions
2012-2023

Punjab Engineering College
2015-2021

Punjab Technical University
2021

Baba Farid University of Health Sciences
2021

Maharaja Ranjit Singh Punjab Technical University
2020

Guru Teg Bahadur Hospital
2019

Over-accumulation of reactive oxygen species (ROS) causes hepatocyte dysfunction and apoptosis that might lead to the progression liver damage. Sirtuin-3 (SIRT3), main NAD+-dependent deacetylase located in mitochondria, has a critical role regulation mitochondrial function ROS production as well antioxidant mechanism. This study explores roles astragaloside IV (AST-IV) formononetin (FMR) connection with SIRT3 for potential antioxidative effects. It was shown condition combined pre-...

10.3390/ijms26020774 article EN International Journal of Molecular Sciences 2025-01-17

10.1007/s11831-020-09414-4 article EN Archives of Computational Methods in Engineering 2020-02-24

In today's time, we use Leave Application System managed by some central authority. This can lead to corruption, misuse a single authority or unnecessary time for approval. So, in this paper, have developed smart contract architecture Management using Solidity and Ethereum, which is decentralized app leveraged from Blockchain Technology. We also include smartphones as IoT devices any client app. Due the resource-constrained nature of these devices, coupled with an alternative centralized...

10.1109/comsnets.2019.8711422 article EN 2019-01-01

Fundamentally, a sentiment refers to the reflection of emotions people. Today's world stands on strings emotions. People express happiness, sadness, love, hatred etc. through some actions. Division i.e positive, neutral and negative, is called analysis. Nowadays there rich data in form tweets, status updates, blog posts, reviews, comments, forums for discussion If we efficiently work upon this bucket full data, it gives way apprehending opinions, views or perspective masses specific...

10.1109/iccons.2018.8663224 article EN 2018-06-01

Network covert channels have become a sophisticated means for transferring hidden information over the network, and thereby breaking security policy of system. Covert channel-internal control protocols, called micro been introduced in recent years to enhance capabilities network channels. Micro protocols are usually placed within bits channel's payload enable features such as reliable data transfer, session management, dynamic routing These provide adaptive stealthy communication malware,...

10.1109/ares.2015.88 article EN 2015-08-01

Dengue, also known as break-bone fever, is a tropical disease transmitted by mosquitoes. If the similarity between dengue infected users can be identified, it help government's health agencies to manage outbreak more effectively. To find cases affected user's personal and information are two fundamental requirements. Identification of similar symptoms, causes, effects, predictions treatment procedures, important. In this paper, an effective framework proposed which finds patients suffering...

10.1080/17517575.2017.1287429 article EN Enterprise Information Systems 2017-02-01

Many emerging social sites, famous forums, review and many bloggers generate huge amount of data in the form user sentimental reviews, emotions, opinions, arguments, viewpoints etc. about different events, products, brands, politics, movies Sentiments expressed by users has great effect on readers, political images, online vendors. So present scattered unstructured manner needs to be managed properly this context sentiment analysis got attention at very large level. Sentiment can defined as...

10.1109/iccons.2018.8662899 article EN 2018-06-01

In recent times machine learning algorithms are used for internet traffic classification. The infinite number of websites in the world can be classified into different categories ways. educational institutions, these two categories, and non-educational websites. Educational to acquire knowledge, explore topics while entertainment keep touch with people. case blocking students use proxy unblock them. Therefore, institutes optimum network resources should banned. this paper, we five ML...

10.5815/ijisa.2012.08.05 article EN International Journal of Intelligent Systems and Applications 2012-07-02

An efficient prediction of drug synergy plays a significant role in the medical domain. Examination different drug-drug interaction can be achieved by considering score. With an rapid increase cancer disease, it becomes difficult for doctors to predict amount synergy. Because each patient's infection level varies. Therefore, less or more may harm these patients. Machine learning techniques are extensively used estimate However, machine based approaches suffer from parameter tuning problem....

10.14569/ijacsa.2019.0100577 article EN International Journal of Advanced Computer Science and Applications 2019-01-01

Education has undergone an unprecedented change since ancient times. As a latest development Massive Open Online Courses (MOOCs) are emerging all over the globe. Embracing students from diverse geographical areas, academic backgrounds, and professional pursuits is essence of open learning. India in fact second largest user country MOOCs, following US being at number one. Recognizing same, MOOCs gained momentum too. While some run by private business houses, others introduced Government so as...

10.21863/ijisl/2016.1.1.001 article EN International Journal of Information Studies and Libraries 2016-01-01

Background/Objectives: To mitigate network from amalgam attacks, this study is focussed on designing an efficient approach that can prevent the networks intruders and secure communication. Methods: A crossbreed approach, named 'MOpt Shield,' proposed in study. This protocol utilizes efficacy of existing Cuckoo Search Firefly Optimization Algorithm basic AODV along with promising factors Intrusion Detection System. The simulated using NS-2 simulator two different simulation scenarios, PDR,...

10.17485/ijst/v14i20.601 article EN Indian Journal of Science and Technology 2021-05-25

Abstract Network covert channels have become a sophisticated means for transferring hidden information over the network. Covert channel‐internal control protocols, also called micro protocols , been introduced in recent years to enhance capabilities of network channels. Micro are usually placed within bits channel's payload and enable features such as reliable data transfer, session management, dynamic routing These provide adaptive stealthy communication Some protocol based tools exhibit...

10.1002/sec.1471 article EN Security and Communication Networks 2016-04-05

Wireless sensor networks have gained considerable attention in the past few years. They found application domains battlefield communication, homeland security, pollution sensing and traffic monitoring. As such, there has been an increasing need to define develop simulation frameworks for carrying out high-fidelity WSN simulation. For our based study we considered three different scenarios where a Adhoc routing protocol can be applied, namely a) Phenom nodes with Mobility, Sensor mobility...

10.1109/mncapps.2012.42 article EN 2012-08-01
Coming Soon ...