- Software Reliability and Analysis Research
- Software Engineering Research
- Information and Cyber Security
- Reliability and Maintenance Optimization
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Software System Performance and Reliability
- Emotion and Mood Recognition
- Anomaly Detection Techniques and Applications
- Smart Systems and Machine Learning
- Advanced Text Analysis Techniques
- Internet of Things and AI
- Emotional Intelligence and Performance
- Stock Market Forecasting Methods
- Software Engineering Techniques and Practices
- EEG and Brain-Computer Interfaces
- Statistical Distribution Estimation and Applications
- IoT and Edge/Fog Computing
- Face recognition and analysis
- Sentiment Analysis and Opinion Mining
- Energy Efficient Wireless Sensor Networks
- Technology Assessment and Management
- Market Dynamics and Volatility
- Financial Markets and Investment Strategies
- Imbalanced Data Classification Techniques
National Eye Institute
2025
Narsee Monjee Institute of Management Studies
2014-2024
Bharati Vidyapeeth Deemed University
2017-2023
International Management Institute
2021-2023
Vivekananda Global University
2023
Career Point University
2023
National Bureau of Plant Genetic Resources
2022
Punjab Engineering College
2022
Netaji Subhas University of Technology
2016-2020
GD Goenka University
2020
In an era marked by rapid technological advancement, the convergence of corporate governance and artificial intelligence (AI) ethics has emerged as a pivotal concern for modern businesses. As AI technologies become deeply embedded in decision-making processes, risks ethical violations, bias, lack transparency, accountability have intensified. While promises significant improvements efficiency, innovation, strategic agility, these benefits can only be realized within robust framework. This...
This paper presents distributed formation control of a multi-agent system to encircle maneuvering target using Lyapunov and graph theories with emphasis on consensus cooperation. The proposed approach embeds algorithm into robust controller capture whose information is partially known. To address this issue, cooperative strategy in conjunction enable fleet UAVs either escort desired destination or keep the movement restricted certain set order gain superiority. We have employed sliding mode...
There is a tremendous growth of the use component based software engineering (CBSE) approach for development systems.The selection best suited COTS components which fulfils necessary requirement software(s) has become major challenge developers.The complexity optimal problem increases with an increase in alternative potential and corresponding criteria.In this research paper, ranking Data Base Management Systems (DBMS) modeled as multi-criteria decision making problem.A 'Fuzzy Distance Based...
Substantial growth in networking and our increasing dependence on it has led to the evolution of security concerns another level. With vulnerabilities system, number possible breaches also shows an upward trend. such growing concern for security, researchers began with quantitative modeling termed as vulnerability discovery models (VDM). A model illustrates changes detection rate a software system during its lifecycle. They can be used gauge risk based which mitigation methodologies planned....
Today's social informatics is facing the challenge of exponentially increasing data present online. However this massive amount available across several heterogeneous platform making it a challenging task especially to comprehend useful information and effectively use for business intelligence. Achieving Business intelligence through machine learning one significant issues in recent era. Previously, outliers were being considered as noisy disregarded leading loss relevant information. This...
Wireless Sensor Network is utilized as a part of numerous applications like defense application, surrounding observing, traffic, security, modern detecting, smart homes, computing framework etc. In each utilization wireless sensor network energy the scare assets nodes. It drains more in transmissions and processing. For purpose conserving node's round robin technique for cluster head selection used. such manner can be conserved number rounds. The clustering method versatile applied on static...
Purpose The purpose of this paper is to develop a new software reliability growth model considering different fault distribution function before and after the change point. Design/methodology/approach In paper, authors have developed framework incorporate change-point in developing hybrid by functions Findings Numerical illustration suggests that proposed gives better results comparison existing models. Originality/value literature on point-based assumes correction trend governed same...
With growing concern for security, the researchers began with quantitative modeling of vulnerabilities termed as vulnerability discovery models (VDM). These aim at finding trend time and facilitate developers in patch management, optimal resource allocation assessing associated security risks. Among existing discovery, Alhazmi-Malaiya Logistic Model (AML) is considered best fitted model on all kinds datasets. But, each has a predefined basic shape can only fit datasets following their...
With increasing number of tech-savvy users, the demand for software with advanced features is also growing exponentially. To meet these expectations, firms are coming up innovative strategies to attract customers buy their products and remain loyal. One key provide product assurance post-sales support. Software a warranty fix failures encountered during operational phase pre-defined time period. reliability literature consists various modeling framework decide release under period...
In most developing countries like India, agriculture plays a significant role in the nation's economy hence increasing agricultural productivity and eliminating unwanted middlemen is important order to reduce poverty. The main challenge improve efficiency of an supply chain. use mobile phones easy access internet has made it connect people share information. People are becoming aware food safety issues which linked with increased chemical pesticides fruits or vegetables they purchase....
The aim of this paper is detecting and analyzing design patterns architectural for two software applications that use Machine Learning (ML) Deep techniques respectively. classification done based on the principles need to be adhered a standard patterns. ML generally have ubiquitous modules some extent. However, modeling their components through varied bring out positive changes performance systems as well mitigates many computational shortcomings faced otherwise. Although it still novel...
Epilepsy is chronic neurological disorder that clinically detected by continuous monitoring of Electroencephalogram (EEG) signals experienced clinicians. clinicians based on the visual observation EEG records normally consumes more time and sensitive to noise. To address these issues, a new system proposed for automatic epileptic seizure recognition. Gaussian Process Latent Variable Model (GPLVM) used lessen number features achieving set principal significantly rejects “curse dimensionality”...
Anomaly detection is a very important step in building secure and trustworthy system. Manually it daunting to analyze detect failures anomalies. In this paper, we proposed an approach that leverages the pattern matching capabilities of Convolution Neural Network (CNN) for anomaly system logs. Features from log files are extracted using windowing technique. Based on feature, one-dimensional image (1×n dimension) generated where pixel values correlate with features On these images, 1D...
The decision of selecting the right product from market is getting tedious these days customers point view, as firms offering at low cost do not provide assurance that will work desired by consumer whereas companies providing good quality products sell their relatively high prices. As a customer, person looks around for which in price and same time. On account, before buying customer quest offers perfect balance between quality. Warranty acts an important attribute comprehension. firm least...
As the threat for viruses and malware is increasing so detecting them accurately very important. By studying researching different papers, it finally known that main problem about detection has recorded high false positive rates obfuscation. To deal with this limitation, research work created a model testing dataset based on attention neural network as latest topic of research. The proposed Residual Neural Network uses an extended non-linear kernel composite skip connections to improve...