- Big Data and Business Intelligence
- Neonatal and fetal brain pathology
- Network Security and Intrusion Detection
- Anomaly Detection Techniques and Applications
- Radiomics and Machine Learning in Medical Imaging
- Stock Market Forecasting Methods
- Gestational Diabetes Research and Management
- Occupational Health and Safety Research
- IoT and Edge/Fog Computing
- Pregnancy and preeclampsia studies
- Artificial Intelligence in Healthcare
- Blockchain Technology Applications and Security
- Security in Wireless Sensor Networks
- Quality and Safety in Healthcare
- Risk and Safety Analysis
- Digital Transformation in Industry
- Artificial Intelligence in Healthcare and Education
- Advanced Authentication Protocols Security
- Advanced Technologies and Applied Computing
- Wireless Communication Security Techniques
- Statistical Mechanics and Entropy
- Cryptographic Implementations and Security
- Neural Networks and Applications
- Machine Learning in Materials Science
- Gaussian Processes and Bayesian Inference
Singapore Institute of Technology
2025
International Institute of Information Technology
2023-2024
MIT Art, Design and Technology University
2022-2023
Secure communication is crucial in today’s increasingly interconnected world, especially distributed contexts where several parties must cooperate while maintaining confidentiality and authenticity. In order to overcome these difficulties, this work introduces a novel Group Key Agreement Protocol (SGKAP) strengthened with Elliptic Curve Secret Sharing (ECSS).The proposed SGKAP uses the strength of elliptic curve cryptography provide shared secret key across participants, assuring data...
<title>Abstract</title> Financial predictive modeling plays a crucial role in decision-making, risk management, and strategic planning within financial markets institutions. Ensuring the veracity accuracy of synthetic data is major challenge when it comes to developing forecasting models. Otherwise, inaccurate model predictions flawed decisions are likely result if artificial created does not look like real-world patterns. A research study has tended apply generative techniques on...
The present study focused on the formulation, characterization, and evaluation of a nanoemulsion-based gel incorporating apigenin, chitosan, eucalyptus oil for enhanced drug delivery antibacterial activity. Three formulations—blank nanoemulsion, chitosan-based nanoemulsion gel, nanoemulsion—were developed subjected to physicochemical characterization thermodynamic stability testing. formulations exhibited optimal droplet size (59.54–87.48 nm), zeta potential (-22.4 +27.2 mV), polydispersity...
Purpose Ovarian cancer (OC) is the most common type of gynecologic in world with a high rate mortality. Due to manifestation generic symptoms and absence specific biomarkers, OC usually diagnosed at late stage. Machine learning models can be employed predict driver genes implicated causative mutations. Design/methodology/approach In present study, comprehensive next generation sequencing (NGS) analysis whole exome sequences 47 patients was carried out identify clinically significant Nine...
The Internet of Things (IoT), which connects billions gadgets to expedite operations and enhance our lives, has completely changed the way we interact with environment. With MQTT (Message Queuing Telemetry Transport) emerging as a popular communication protocol within IoT ecosystem, vast proliferation networked devices has, however, presented serious security challenges. In order strengthen security, this study suggests using an improved symmetric algorithm.Existing implementations...
This paper examines how artificial Intelligence (AI) algorithms can be used to improve seek engine consequences. It outlines key terms, demanding situations, and opportunities related AI -based totally search optimization. initial studies shows that AI-based tactics display promising ability increase accuracy relevancy in strategies such as natural language processing (NLP), system getting know (ML), sentiment analysis are explored element. additionally, the compares current answers rent...
Strong security is crucial as Wireless Sensor Network (WSN) become more common. Dynamic Lattice-Based Key Revocation (DLBKR) a novel method for improving key revocation in WSN. Lattice-based cryptography helps DLBKR overcome compromised keys and evolving threats dynamic sensor networks. mechanisms are examined detail, with focus on their limitations Due to these networks limited resources ever-changing structure, we propose way minimize the risks of keys. featured flexible reactive solution...