- IoT-based Smart Home Systems
- Medical Image Segmentation Techniques
- Radiomics and Machine Learning in Medical Imaging
- Advanced Malware Detection Techniques
- Engineering and Technology Innovations
- Energy Efficient Wireless Sensor Networks
- Brain Tumor Detection and Classification
- Mobile Ad Hoc Networks
- Image Enhancement Techniques
- Smart Grid Energy Management
- Security in Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Simulation Techniques and Applications
- COVID-19 diagnosis using AI
- Smart Parking Systems Research
- Advanced Multi-Objective Optimization Algorithms
- Fault Detection and Control Systems
- IoT and Edge/Fog Computing
- Renal cell carcinoma treatment
- Embedded Systems Design Techniques
- Video Analysis and Summarization
- Energy Harvesting in Wireless Networks
- Cryptographic Implementations and Security
- Chaos-based Image/Signal Encryption
- UAV Applications and Optimization
University of Engineering & Management
2016-2024
This device includes a pair of glasses and an obstacle detection module fitted in it the center, processing unit, output i.e. beeping component, power supply. The Obstacle is connected to unit. supply used central basically consists ultrasonic sensor, unit consist control buzzer. controls sensors get information present front man processes sends through buzzer accordingly. These Ultrasonic Smart Glasses for Blind people portable device, easy use, light weight, user friendly cheap price....
Meta-heuristics are commonly applied to solve various global optimization problems. In order make the meta-heuristics performing a search, balancing their exploration and ability is still an open avenue. This manuscript proposes novel Opposition-based learning scheme, called "PCOBL" (Partial Centroid Learning), inspired by partial centroid. PCOBL aims improve performance through maintaining effective balance between exploitation. was incorporated in three different meta-heuristics,...
Nowadays the easiest way to connect with people is chatting by using Mobile Chatting Applications which offers us a lot of helpful facilities. Though different Chat security users but leads increase in vulnerabilities & risks attack on data. Not only for business conversations also normal our data must be secured because, someone's very sensitive most important prevent unwanted hacking or losses. To overcome this kind attacks we need encrypted messaging protocol conversation. This proposed...
Now a days Unmanned Aerial Vehicles (UAVs) is being used for wide range of application. For example, UAVs are utilized to surveillance disaster affected and resource constrained network area create the communication network. In this paper we proposed an Ad-hoc networked Sensor Network management application remote sensing. We Wireless Mesh connect multiple set with each other increase coverage observable area. present approach that works on basis process-patterns, describing...
IOT is one of the most controversial topic in current digitalized era. The scope developing gradually with new technologies like smart grids, homes, cities etc. permits internet connectivity for all kind physical objects and devices. Virtualization different types system becoming trend today's world that allows to perform without direct interaction. combination intelligent devices high speed makes easier multi-tasking smoothly constraint distances.
Sentiment analysis (or opinion mining) is defined as the task of finding opinions authors about specific entities. The decision-making process people affected by formed thought leaders and ordinary people. When a person wants to buy product online he or she will typically start searching for reviews written other on various offerings. one hottest research areas in computer science. Over 7,000 articles have been topic. Hundreds start-ups are developing sentiment solutions major statistical...
In today's world the Internet of Things (IOT) pairing up with our daily life. The helps to peek into virtual digitization where every smart device, sensor is connected internet and therefore can be accessed power management system all over world. This paper propose a secured IoT framework multiple nodes that sends data web cloud server allows users access those via mobile application through unique user id password. proposed end-to-end encryption. Among numerous computer protocols present,...
Ten percent of the women in whole world are suffering from breast cancer their lives. Breast MRI registration is an important task to align MR images pre-and post-contrast for diagnosis and classification type into benign malignant using pharmacokinetic analysis. It also very much essential that be taken various time intervals isolate lesion small intervals. This technique useful monitor types therapies. The main enlightenment algorithms used image has transferred a control point...
Wireless Sensor Networks (WSN) have gained worldwide attention in recent years, particularly with which has facilitated the development of smart sensors. WSN consists small nodes sensing, computation and wireless communication capabilities. In WSN, clustering is used as an effective technique to achieve scalability, self-organization, power saving, channel access, routing etc. Lifetime sensor determines lifetime network crucial for sensing capability. Clustering key extend a network. this...
Data Security is very much important in every aspect of data collection as well storage. Hardware device like USB useful worldwide order to store real time confidential data. So it necessary provide hardware level security small storage pen drive, external hard disk etc. In this context cryptography one the most promising technique encrypt actual other form. paper, we propose a robust encryption which will keep safe from theft. Our proposed algorithm associated with drive and disk.
Mobile ad-hoc network is networks that are collection of mobile device can communicate and share information between each other, without any predefine infrastructure or centralized system. Another challenge in MANET energy constraints because the nodes operated by limited battery. This paper presents a new on-demand power saving routing algorithm for networks. The protocol based on node identification using k-means & Convex Hull gives less hopping, demand protocol. K-means identify cluster...
Both the incidence and mortality rates of kidney cancer are increasing worldwide. Imaging examinations followed by effective systemic therapies can reduce rate. In this article, a new method to segment MRI for lesion detection is developed using hard-clustering technique with Slime Mould Algorithm (SMA). First, partitional or hard clustering SMA which searches optimal cluster centers segmentation. preprocessing steps proposed method, noise intensity inhomogeneities removed from MR images as...
The modern society is now fully dependent upon technology and the technological approach has brought a revolutionary change in each every field. This paper proposes multipurpose robot to be used battle contains Raspberry Pi which acts as client, packs video camera for live streaming, mapping gripper disposal of explosives, Wi-Fi module controlling remotely from any part world by concept Wireless Connectivity. Apart this control application developed Android based smart phone all functions...