M. Anand Kumar

ORCID: 0000-0003-0394-7008
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Artificial Intelligence in Healthcare
  • IoT and Edge/Fog Computing
  • Internet Traffic Analysis and Secure E-voting
  • Brain Tumor Detection and Classification
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Body Area Networks
  • Spam and Phishing Detection
  • EEG and Brain-Computer Interfaces
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Cryptographic Implementations and Security
  • Green IT and Sustainability
  • Coding theory and cryptography
  • ECG Monitoring and Analysis
  • Imbalanced Data Classification Techniques
  • Mobile Ad Hoc Networks
  • Smart Grid Security and Resilience
  • Advanced Text Analysis Techniques
  • Infrared Thermography in Medicine
  • Meteorological Phenomena and Simulations
  • ICT in Developing Communities
  • Autonomous Vehicle Technology and Safety
  • Molecular Communication and Nanonetworks

Presidency University
2023-2024

Graphic Era University
2021-2023

Karpagam Academy of Higher Education
2012-2016

College of Applied Sciences, Nizwa
2012

News article are the source of historic information that can be accessed whenever required. Today in modern world, Internet is also doing same task and full online news on multiple topics which contains some irrelevant or unhelpful information. People living a very busy hectic life they does not have enough time to read complete article. They want as per their area interest. Therefore, it becomes important process content classify them into various categories like sports, entertainment,...

10.1109/confluence56041.2023.10048856 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2023-01-19

Satellite image water body identification is an important part of scientific progress. Because factors such as aquatic vegetation, the unique lake or river hues, sediments along bank, and so on, it can be difficult to determine where one ends another begins. To improve process extracting bodies from satellite photos, both variety characteristics information they provide about their meaning need expanded. It may utilized in a contexts, forecasting occurrence natural catastrophes identifying...

10.1109/migars57353.2023.10064508 article EN 2023-01-27

Owing to the latest advancements in networking devices and functionalities, there is a need build future intelligent networks that provide intellectualization, activation, customization. Software-defined (SDN) are one of most trusted technologies method network management provides virtualization. Although traditional still have strong presence industry, software-defined begun replace them at faster rates. When emerge steady rate, SDN will be implemented higher rates upcoming years all...

10.3390/su141911950 article EN Sustainability 2022-09-22

Stroke-related diseases are rapidly increasing day by due to the changes in environmental factors including lifestyles, food habits, and stress-related working cultures. According a recent report from World Health Organization (WHO), Stroke is second largest disease after cardiovascular that leads death. Early diagnosis of stroke-related was one major requirements for patients as well medical professionals. Deep learning techniques those methods suitable stroke when deployed properly. This...

10.1109/cises54857.2022.9844403 article EN 2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES) 2022-05-20

The growth rate of the internet exceeds than any other technology which is measured by users and bandwidth. Internet has been growing at a rapid since its conception, on curve geometric sometimes exponential. Today, moving exponentially in three different directions such as size, processing power, software sophistication making it fastest humankind ever created. With internet, there need to protect sensitive data from unauthorized access. Cryptography plays vital role field network security....

10.5815/ijcnis.2012.02.04 article EN International Journal of Computer Network and Information Security 2012-03-24

In every nation, democratic elections are a momentous and weighty occurrence, the voting system that is now in place requires use of ballots or electronic machines (EVM). Transparency, poor turnout, vote manipulation, distrust electoral organizations, fabrication unique IDs (voting party IDs), delays posting results some issues arise as result these procedures. The matter safety utmost importance. When considering installation computerized system, voter confidentiality has always been one...

10.1109/icac3n56670.2022.10074164 article EN 2022-12-16

Conventional networks have grown more complicated, making it difficult for system administrators to administer them. For instance, contemporary frequently include numerous computing devices such as mobiles, clients, and server systems. These are used with different technologies wireless, wired, network virtualization. Vendor-based methods configure equipment like gateways, routers, switches. The topology of the may dynamically change a result assaults on users devices' mobility, failure...

10.1109/accthpa57160.2023.10083336 article EN 2023-01-20

Vehicular ad hoc networks (VANETs) are a rapidly evolving field at the intersection of intelligent transportation systems, emphasizing need for stable and scalable VANET topology to accommodate growing vehicular densities. The intricate challenge route selection calls advanced clustering protocols bolster road safety message routing. This research introduces novel approach routing protocols, leveraging heuristic-based solutions built upon an enhanced ant colony optimizer (ACO) framework....

10.3390/su152215903 article EN Sustainability 2023-11-14

A CAPTCHA is used to reduce the misuse in case of rising automated bots or software systems and also avoid any corruption web services. The Captcha as solving a turing test problem by users, before they get access system. paper discusses about model that extracts alphanumeric characters from either audio text-based captchas. Finally, model's performance found based on different parameters like accuracy level, specificity, precision etc.

10.1109/confluence56041.2023.10048791 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2023-01-19

To minimize overall healthcare costs and enhance workflows processes, remote health monitoring solutions are needed in both clinics at home. One of the most effective communication technologies, Internet Things (IoT) offers ability integrated data access fusion across a variety applications. Depending on how each person's role is defined, users qualified professionals (like doctors nurses medical industry) may be able to data. The goal industry redefine system by bringing together all...

10.1109/icitiit57246.2023.10068616 article EN 2023-02-11

Quality of Service (QoS) provisioning is critical and mandatory in any Wireless Body Area Network (WBAN). Routing protocols for this kind networks need to be very efficient lightweight algorithms developed as WBANs are wireless interconnection resource constrained miniaturized sensors either implanted or worn in/on the body. Optimization Delay QoS parameter important requirement many WBAN applications, particularly those demanding real-time data delivery service. In paper, a routing protocol...

10.1109/icacci.2017.8125930 article EN 2017-09-01

Summary In order to make networks more adaptable and flexible, software‐defined networking (SDN) is an architecture that abstracts the many, easily distinct layers of a network. By enabling businesses service providers react swiftly shifting business requirements, SDN aims improve network control. has become important framework for Internet Things (IoT) 5G. Despite recent research endeavors focused on pinpointing constraints within design components, various security attacks persist,...

10.1002/cpe.8256 article EN Concurrency and Computation Practice and Experience 2024-09-03

Objectives: Exploratory data study is regularly indispensable to evaluate a potential premise for the subsequent studies such as grouping in clusters or diversifying classification. Very common incident real incompleteness. Methods/Statistical Analysis: This problem can result biased treatment comparisons and also impacts overall statistical power of study. Missing are proposed several methods. The central idea this method handle uncertainty missing values due vagueness arises world...

10.17485/ijst/2016/v9is1/94094 article EN Indian Journal of Science and Technology 2016-12-30

Recent developments in wireless communications, MicroElectroMechanical Systems (MEMS) technology and integrated circuits have enabled low-power, intelligent, miniaturized, invasive/non-invasive micro sensor nodes strategically placed or around the human body which forms Wireless Body Area Networks (WBANS) to be used various applications including remote health monitoring.Due inherent issues specific challenges, routing protocols designed for Mobile Adhoc (MANETs) Sensor (WSNs) are not...

10.17148/ijarcce.2017.6132 article EN IJARCCE 2017-02-03

Early and accurate detection of diseases affecting rice plants may have devastating impacts on productivity, early these is essential for mitigating their consequences. However, the current methods diagnosing are neither precise nor effective. When it comes to plant diseases, convolutional neural networks (CNNs) gold standard. The difficulty using CNN large-scale data analysis conventional remains a major barrier its wider adoption. In our work massive processing, we adapted technique use...

10.1109/aide57180.2022.10060157 article EN 2022-12-22

Normal skin is necessary for a healthy lifestyle since it the most crucial component of human body. However, has several dermatological complications. One these disorders psoriasis. The research proposes unique deep learning framework that assesses three separate scenarios, namely Visual Geometry Group-16, Group-19, and Inception v3, examines some cutting-edge algorithms using measures, including "AUC," CA, Precision, F1, Recall. Based on results, Group-19 chosen as feature extractor...

10.1109/iceconf57129.2023.10083536 article EN 2023-01-05

Objectives: The main objectives of this research work are to propose a new green based model for the Software engineering with no impact in environment. Analysis: In beginning stages, more importance is given ICT manufacturing companies and software developing \

10.17485/ijst/2016/v9i32/88499 article EN Indian Journal of Science and Technology 2016-08-30

Background/Objectives: This paper proposes to introduce a Green Software Database Design Model and create the awareness overcome energy consumption issues while designing database in prevailing state of world. Methods/Statistical Analysis: The main aspect work is contemplate during design phase database. Findings: approach concerned with using Computing Technique reduce power utilization pattern server at different workload conditions. subsequently designed estimate collision software...

10.17485/ijst/2016/v9i30/93118 article EN Indian Journal of Science and Technology 2016-08-22

Ischemic Stroke is one of the dangerous diseases that are rapidly increasing in modern era due to constant variations ecological aspects, comprising diet, lifestyles, and working environment. Rendering a new statement from World Health organization (WHO), was instant major illness, after heart disorder heads toward death. For both patient medical personnel, most important requirements early detection ischemic stroke illnesses. Deep learning methods blooming techniques healthcare disease...

10.1109/icsc56524.2022.10009499 article EN 2022 8th International Conference on Signal Processing and Communication (ICSC) 2022-12-01
Coming Soon ...