Vasundhara Acharya

ORCID: 0000-0002-8720-633X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Digital Imaging for Blood Diseases
  • AI in cancer detection
  • Smart Agriculture and AI
  • Advanced Authentication Protocols Security
  • COVID-19 diagnosis using AI
  • User Authentication and Security Systems
  • Cryptography and Data Security
  • Radiomics and Machine Learning in Medical Imaging
  • Spam and Phishing Detection
  • Security in Wireless Sensor Networks
  • Image and Object Detection Techniques
  • Brain Tumor Detection and Classification
  • Imbalanced Data Classification Techniques
  • Cell Image Analysis Techniques
  • Advanced Data Compression Techniques
  • Biomarkers in Disease Mechanisms
  • Digital Media Forensic Detection
  • Smart Systems and Machine Learning
  • Chaos-based Image/Signal Encryption
  • Seismology and Earthquake Studies
  • Plant Disease Management Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Digital and Cyber Forensics
  • Artificial Intelligence in Healthcare and Education
  • Advanced Image Processing Techniques

Manipal Academy of Higher Education
2016-2024

Rensselaer Polytechnic Institute
2022-2024

Thomas Jefferson University Hospital
2023

Tuberculosis (TB) is an airborne disease caused by Mycobacterium tuberculosis. It imperative to detect cases of TB as early possible because if left untreated, there a 70% chance patient dying within 10 years. The necessity for supplementary tools has increased in mid low-income countries due the rise automation healthcare sectors. already limited resources are being heavily allocated towards controlling other dangerous diseases. Modern digital radiography (DR) machines, used screening chest...

10.1155/2022/2399428 article EN Computational Intelligence and Neuroscience 2022-10-03

Abstract Cassava is a rich source of carbohydrates, and it vulnerable to virus diseases. Literature survey shows that the image recognition integrated deep learning approach successfully employed for leaf disease classification. Mostly, transfer based on convolutional neural network (CNN) models were applied However, existing approaches are not effective in identifying tiny portion overall area. Identifying focussing regions affected by vital achieving good classification accuracy. An...

10.1111/exsy.12862 article EN Expert Systems 2021-11-03

Acute myeloid leukemia (AML) is a cancer of the line cells caused due to rapid increase abnormal that later interfere with healthy cells. One main reasons for in mortality cost devices used determination and late diagnosis. The most effective treatment option can be provided by accurate medical Automated segmentation blood smear images plays crucial role identification AML. This article proposes new computer-aided diagnosis model segment identifies stage methodology presented this work...

10.1109/tem.2021.3103549 article EN IEEE Transactions on Engineering Management 2021-08-27

Tuberculosis (TB), primarily affecting the lungs, is caused by bacterium Mycobacterium tuberculosis and poses a significant health risk. Detecting acid-fast bacilli (AFB) in stained samples critical for TB diagnosis. Whole Slide (WS) Imaging allows digitally examining these samples. However, current deep-learning approaches to analyzing large-sized whole slide images (WSIs) often employ patch-wise analysis, potentially missing complex spatial patterns observed granuloma essential accurate...

10.1109/access.2024.3359989 article EN cc-by-nc-nd IEEE Access 2024-01-01

Examination malpractice is a deliberate wrong doing contrary to official examina-tion rules designed place candidate at unfair advantage or disadvantage. The proposed system depicts new use of technology identify in E-Exams which essential due growth online education. current solu-tions for such problem either require complete manual labor have various vulnerabilities that can be exploited by an examinee. application en-compasses end-to-end assists examiner/evaluator deciding whether student...

10.3991/ijet.v16i08.15995 article EN International Journal of Emerging Technologies in Learning (iJET) 2021-04-23

Red blood cell count plays a vital role in identifying the overall health of patient. Mature cells undergo morphological changes when disorder exists. Automated and Manual techniques exist market to number RBCs(Red cells). counting involves use Hemocytometer cells. The conventional method placing smear under microscope manually leads erroneous results medical laboratory technicians are put stress. counters fail identify abnormal A computer aided system will help attain precise less amount...

10.1109/icacci.2017.8126155 article EN 2017-09-01

Quick, early, and precise detection is important for diagnosis to control the spread of COVID-19 infection. Artificial Intelligence (AI) technology could certainly be used as a modulating tool ease detection, help with preventive steps further. Convolutional neural networks (CNNs) have achieved state-of-the-art performance in many visual recognition tasks. Nevertheless, most these highly rely on availability high amount labeled data, being an essential step supervised machine learning...

10.1109/tem.2021.3094544 article EN IEEE Transactions on Engineering Management 2021-07-28

Identification and authentication play a significant role in security controls. The manual process of user identification is time-consuming tedious. proposed research work aims to overcome this drawback achieve through an automated method using the Aadhar card. project developed by Unique Authority India merging biometrics digitization. details are stored form quick response code along with 12-digit card number. A model built capture information from mobile phones used obtain data validation...

10.1109/access.2019.2896324 article EN cc-by-nc-nd IEEE Access 2019-01-01

Data is the most crucial component of a successful ML system. Once machine learning model developed, it gets obsolete over time due to presence new input data being generated every second. In order keep our predictions accurate we need find way models up date. Our research work involves finding mechanism which can retrain with automatically. This also exploring possibilities automating processes. We started this project by training and testing using conventional methods. The outcome was then...

10.35940/ijitee.l3322.1081219 article EN International Journal of Innovative Technology and Exploring Engineering 2019-10-22

Anemia is a disease caused due to the lack of healthy Red blood cells.Red cells are mainly responsible for carrying oxygen different parts body.It releases generated red into bloodstream after proper maturation.Anemia primarily classified as chronic or acute.Chronic anemia continues exist long time.Acute occurs rapidly.It causes sickle cell that in shape crescent moon.The irregular makes it get stuck which leads reduced flow oxygen.The primary aim this work overcome problems involved manual...

10.25103/jestr.122.10 article EN cc-by-nc Journal of Engineering Science and Technology Review 2019-01-01

Malicious software is posing a great challenge to Cybersecurity by causing huge damage enterprises and users. Traditional signature-based techniques have found it challenging detect malware as has changed evolved over time. Machine learning become popular for detection but they are based on heuristic feature engineering, which expensive requires domain expertise. In the recent years, deep learning, being actively investigated this crucial application achieve robust solutions with higher...

10.1109/icccnt51525.2021.9579750 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2021-07-06

Purpose The purpose of the study is to develop a secure, efficient, and enhanced user authentication mechanism achieve reliable authenticated connection. In online transactions, users resources are located at different places, sensitive information be protected transferred using suitable, mechanism. Design/methodology/approach One latest approach handle requirement by Public Key Infrastructure (PKI) or its variant Wireless (WPKI). Fundamental management techniques required very secure vital...

10.1108/idd-02-2019-0012 article EN Information Discovery and Delivery 2019-09-20

Public key cryptography is widely used for secure data transfer in various applications. The infrastructure provides a foundation that supports public cryptography, and it required to deliver the keys existing systems or users securely. exchanged digitally form of digital certificates having certain period validity. Circumstances may arise under which validity should be ceased, they need revoked. fast growth e-commerce demands verification transfers done minimum time maintain high efficiency...

10.1080/19393555.2018.1516836 article EN Information Security Journal A Global Perspective 2018-07-04

Cervical Cancer arises in the Cervix. progresses slowly from normal stage to pre-cancerous stage, and hence it provides an opportunity diagnose prevent it. Visual inspection of pap smear is tedious time-consuming. Commercial systems for automated analysis are costly which makes unaffordable most hospitals. The primary aim this research work develop a computer-aided diagnosis tool identify if cervical cancer Squamous Cell Carcinoma or Adenocarcinoma by segmenting images. Image segmentation...

10.1109/icacci.2018.8554911 article EN 2018-09-01

A distracted driver is an invitation to a fatal vehicle accident. People lose their lives every day due driving and using mobile phones while one of the primary reasons behind road accidents. Hence, detection phone usage alert or for autonomous system take over becomes extremely important. In attempt solve this issue driving, authors proposed Convolution Neural Network (CNN)Â based model detect by driver. The work presents not only practical solution problem but also comparison between...

10.14419/ijet.v7i4.41.24307 article EN International Journal of Engineering & Technology 2018-12-19

Refractory delirium is a complex, often underdiagnosed, and difficult-to-treat phenomenon. It poses significant challenges to healthcare providers, especially in patients without prior intravenous access. In extreme cases, anesthetic management may be needed treat refractory delirium. Here, we present unique case of postoperative hyperactive patient access, ultimately requiring for resolution.

10.7759/cureus.45694 article EN Cureus 2023-09-21
Coming Soon ...