- Artificial Intelligence in Healthcare
- Smart Grid Energy Management
- Big Data and Business Intelligence
- Microgrid Control and Optimization
- Digital Transformation in Industry
- IoT and Edge/Fog Computing
- Privacy-Preserving Technologies in Data
- AI in cancer detection
- Advanced Steganography and Watermarking Techniques
- Advanced Manufacturing and Logistics Optimization
- Energy Load and Power Forecasting
- Power Line Communications and Noise
- Flexible and Reconfigurable Manufacturing Systems
- Network Time Synchronization Technologies
- Cybersecurity and Cyber Warfare Studies
- Frequency Control in Power Systems
- Currency Recognition and Detection
- Industrial Vision Systems and Defect Detection
- Millimeter-Wave Propagation and Modeling
- Privacy, Security, and Data Protection
- Global Security and Public Health
- Internet Traffic Analysis and Secure E-voting
- Video Surveillance and Tracking Methods
- Modular Robots and Swarm Intelligence
- Chaos-based Image/Signal Encryption
Amity University
2019-2024
Amity University
2020-2022
The phenomenon of AI has been widely studied in several areas. This paper is based on the use artificial intelligence and its impact HRM due to technological advancement IT landscape. At present almost all companies are implementing their functional areas increase efficiency employees organization. role HR domain starts with recruitment till performance appraisal employees. aim research examine relationship between Human resource functions industry Delhi/NCR location weather this moderated...
The main objective of this paper is the development an Algorithm for Boolean Breast Cancer Classification based on 116 patients with results by testing blood along physical information (life, BMI, Gluco-level, diabetes, etc.). following machine learning models were compared performance in study: choice tree, arbitrary forest, K-closest neighbors, ANN, AVM, and replace analysis. With methodologies, was gathered: Data separated among 80 percent training 20 using k-fold cross-validation (k 10)....
In recent times we can observe technological growth in respect of new expansions, innovations, and improvements every industry. This brings a great movement this era the field military, healthcare, industries, education, or daily households. Technology 4.0 has boomed into current market with name Industry which deals information change automation manufacturing technologies. It includes concept IoT, cloud computing, artificial intelligence for generating smart factories industries. knots...
Parameters have great impact on the performance of an optimization algorithm. This paper concerns parameter tuning for metaheuristics which are stochastic algorithms. A novel, fast, and very simple population-based metaheuristic namely Human Habitation Behavior-Based (HHBO) is proposed in order to tune parameters used weight bias problem feed-forward neural networks. The algorithm compared with other state-of-art algorithms, results analysis presented. show merits HHBO comparison
Copy-Move forgery practices are defamatory tampering processes, affecting digital images. Such have become much more common nowadays because of the advent significantly effective image processing tools being readily available. In copy-move technique, an area from original is copied and pasted over another area. This technique provides a way to conceal important details information in without leaving traces behind observe or manipulation image. question authenticity forensic. this paper,...
Stock market forecasting involves predicting fluctuations and trends in the value of financial assets, utilizing statistical machine learning models to analyze historical data for insights into future behavior. This practice aids investors, traders, institutions, governments making informed decisions, managing risks, assessing economic conditions. Forecasting markets is difficult due intricate interplay global economics, politics, investor sentiment, it inherently unpredictable. study...
The application and development of communications information technology has created a new battleground. cyber threat is growing rapidly with high pace variation in the world. It will significantly affect international relations 21st century. These threats can be both planned unplanned it come from different sources, like warfare, hackers, criminals, virus writers, contractors or disgruntled employees working within an organization. This paper brings out comparative assessment G4 Nations...
In current circumstances, congestion in traffic is a major issue. Due to congestion, many people didn't reach their destination place pre-defined time. This may lead loss of job opportunity, miss journey, etc. Many algorithms had been developed for reducing the problem traffic. They are working well day times but those give precise results at night times. So new algorithm by using image processing this paper that will also. done isolating RGB into its individual channels and converting each...
Diabetes affects a large number of people in modern culture. Individuals must keep track food calories and total consumed daily to maintain balanced diet. Type 2 diabetes is devastating metabolic illness that may manifest many symptoms complications throughout the body. In day, diabetics be found all age groups society. The increased reported patients attributed different causes, including but not limited harmful or chemical components blended into food, obesity, working culture improper...
Supply chain (SC) management is an integral part of the technological advancement industries nowadays. This study designed and presents optimization model for inventory-location technical problems in SC network. The considers carbon emission perishable products formulated a novel based on mixed-integer linear programming concept. proposed aimed at minimizing total costs solution obtained using GAMS package. results show that optimal reachable within reasonable time with presented mathematical model.
People are concerned about the security of their data over internet. The can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography used conjunction with cryptography. It is common for hiding or secret messages, whereas cryptography encrypts messages so that they cannot read. As a result, proposed system combines both and steganography. A steganographic message concealed prying eyes by using an image as carrier data. In steganography,...
Industry4.0, a new buzz word in the modern industry system. This is revolution 21 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">st</sup> century which provides digitization and intelligence as need of today's Indian industry. The technological advancement helps not only improving productivity but also quality output. Industrial 4.0 considered fourth generation manufacturing process gives total control. Industry possessing vast vision with...
Data collection from sensitive places must be done remotely due to laborious communication protocols. In this paper, the deployment of wireless sensor networks is investigated on battlefield in terms specific parameters such as node power, latency, and network survival. It investigates simulated environment at three different levels while using a simulator. Continuous data gathering significant power consumption are necessary during early phase networks. The wiring stage then where usage...
In this paper I talk about converge networks and its types, moving on the technological elements of converged network. give a detailed view benefits various challenges faced in implementation while giving an informative characteristics needed by network to converge. provide solution for using JMX.
The purpose of this research is to investigate the viability wired technologies for home-building automation and put up a simpler transfer attribute prototype low voltage power line effective information exchange based on two-wire transmission hypothesis. Software simulation done check effect length parameters. In investigation viability, bottom-up approach used parameters scattering matrix applied in frequency-domain channel prototyping.
Drug repurposing is an attractive chemotherapeutic strategy that serves to make up for the inadequacy of current antifungal drugs. The present study aims repurpose theophylline (THP) against Candida albicans. THP a methylxanthine derived from cocoa beans and tea extracts, generally used as first‐line drug asthma other respiratory disorders. We investigated activity C. albicans non‐albicans species. Mechanistic insights revealed induces membrane damage. Enhanced ionic disturbances depleted...
The provision of uncontaminated water, sufficient sanitation facilities, and appropriate hygiene behaviours is an essential entitlement every individual plays a crucial role in promoting worldwide health overall welfare. interconnection between sanitation, (WASH) exerts significant influence on the outcomes global societies. This study examines complex relationship within framework health. It specifically highlights difficulties, prospects, capacity for change that this presents. In context...
Many database operational and analytical systems are adopting Big Data analytics tools techniques to meet the upcoming business challenges. Migration Hadoop Distributed File System has a specialized migration process that maps current schema models batch processing schemes. The schemas hold many data semantics designed according usage, affordances, access rights, efficiency demands. Thus, towards big must preserve base of domain, structures, formats, sources. Most time, these dimensions...
The proliferation of Vehicular Ad-hoc Networks (VANETs) highlights the crucial need for secure, privacy-protecting inter-vehicle communication. By integrating blockchain technology with a safe certificate-less aggregate signature process, this research presents novel approach to enhancing VANET security. Traditional systems that rely on PKI and certificates have their limitations solved by suggested approach. Using paradigm eliminates requirement certificate authority when creating keys,...