- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Cryptography and Data Security
- Distributed and Parallel Computing Systems
- Information and Cyber Security
- Internet of Things and AI
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- AI in cancer detection
- Data Stream Mining Techniques
- COVID-19 diagnosis using AI
- Radiomics and Machine Learning in Medical Imaging
- Anomaly Detection Techniques and Applications
Birla Institute of Technology, Mesra
2012-2024
Birla Institute of Technology and Science, Pilani
2013
The concept oft Cloud computing has significantly changed the field of parallel and distributed systems today.Cloud enables a wide range users to access distributed, scalable, virtualized hardware and/or software infrastructure over Internet.Load balancing is methodology distribute workload across multiple computers, or other resources network links achieve optimal resource utilization, maximize throughput, minimum response time, avoid overload.With recent advent technology, control load in...
Technology today has progressed to an extent wherein collection of data is possible for every granular aspect a business, in real time. Electronic devices, power grids and modern software all generate huge volumes data, which the form petabytes, exabytes zettabytes. It important secure existing big environments due increasing threats breaches leaks from confidential increased adoption cloud technologies ability buying processing storage on-demand. This exposing traditional new warehouses...
Cancer is a major global health challenge, emphasizing the critical need for early detection to enhance patient outcomes. This study thoroughly investigates applications of advanced machine learning methods cancer and prevention, aiming develop robust algorithms that can accurately identify cancerous cells assess severity based on key parameters. The authors synthesize insights from previous prevention research through an in-depth literature review. sets specific objectives, including...
Healthcare data is increasingly being digitized today and the collected coming in from all modern devices, has reached a significant volume over world. In US, UK other European countries, healthcare needs to be secured Patient Health Records (PHR) need protected so that re-identification of patients cannot done basic information. Privacy an important aspect governed by Acts (e.g. HIPAA) hence falling into wrong hands or breached malicious insiders. It secure existing big environments due...
Cloud computing is a paradigm for large-scale distributed that makes use of existing technologies such as virtualization, service-orientation, and grid computing. In cloud environment, pool virtual resources always changing. Thus allocating the particular job in this dynamic environment challenging. Objective paper to present load balancing, specifically resource allocation scheme environment. This proposes novel balancing algorithm jobs. Allocation made on basis requirement submitted by...
Abstract In today's world m-Health (also termed as Mobile Health) is an integral part of the healthcare industry. M-health uses various kinds mobile devices such phones, personal digital assistants, tablets, laptops, and wireless-based arrangements to collect transfer run-time medical data between patients institutions. The entire process m-healthcare system dependent on a cloud system. As result services provided through platform, it observed that network equipment likely prone different...
Abstract Electronic Medical Records (E.M.Rs) comprise sensitive and private information of the patients in m-healthcare, passing data across different medical institutions poses severe challenges. Leakage could destroy privacy data, availability at runtime may be disrupted by DDoS (Distributed Denial Service) attack. Distributed Ledger Technology (DLT) helps overcome challenges trusted decentralized database. It is possible to validate all stakeholders a single-step authentication process...