- Video Surveillance and Tracking Methods
- Image Enhancement Techniques
- Advanced Vision and Imaging
- Remote-Sensing Image Classification
- Remote Sensing and Land Use
- Remote Sensing in Agriculture
- Autism Spectrum Disorder Research
- Advanced Image and Video Retrieval Techniques
- Human Pose and Action Recognition
- Advanced Malware Detection Techniques
- Functional Brain Connectivity Studies
- Anomaly Detection Techniques and Applications
- Osteoarthritis Treatment and Mechanisms
- Advanced Image Processing Techniques
- Spam and Phishing Detection
- Wireless Communication Networks Research
- Network Security and Intrusion Detection
- Chaos-based Image/Signal Encryption
- Advanced Neural Network Applications
- Gait Recognition and Analysis
- Artificial Intelligence in Healthcare and Education
- Advanced Steganography and Watermarking Techniques
- Image Retrieval and Classification Techniques
- Advanced Wireless Network Optimization
- Emotion and Mood Recognition
Cardiff Metropolitan University
2022-2025
University of Copenhagen
2022
SRM University
2019-2020
JK Lakshmipat University
2016-2018
Indian Institute of Technology Dhanbad
2015-2017
Indian Institute of Technology Roorkee
2012-2013
Motilal Nehru National Institute of Technology
2011
For specific identification process, Identity Management details an ailment of supplying authorized owners with secure and easy admittance to information solutions. choosing the individual's identity, primary goal is actually executing secured feature. PINs, keys, gain access cards, passwords, tokens are private determining elements which utilized within standard methods may have a tendency drawbacks such as cracking, stealing, copying posting. Biometrics grounded needed having perspective...
Abstract Software security vulnerabilities are significant for the software development industry. Exploration is conducted industry landscape, eco-system and system customer landscape. The focus to explore data sources that can provide team with insights act upon proactively. Across these modules of leveraged using artificial intelligence approaches identify insights. also on building a smart knowledge management integrates information processed across into central system. This be further...
Moving-object detection is one of the basic and most active research domains in field computer vision. This paper proposes a novel efficient approach for moving object under static background. Proposed first performs pre-processing tasks to remove noise from video frames. Secondly, it finds difference between current frame previous consecutive as well next separately. The algorithm then selects maximum pixel intensity value both frames, which we consider an improvement over approaches. Next...
Although IoT technology is advanced, wireless systems are prone to faults and attacks. The replaying information about routing in the case of multi-hop has led problem identity deception among nodes. devastating attacks against protocols as well harsh network conditions make situation even worse. most research literature aim at making system more trustworthy ensuring faultlessness, it still a challenging task. Motivated by this, present proposal introduces trust-aware mechanism (TARM), which...
Abstract Margin, in typography, is described as the space between text content and document edges often essential information for consumer of document, digital or physical. In present age disruption, it customary to store retrieve documents digitally automatically from when necessary. Margin one such non-textual that becomes important some business processes, demand computing margins algorithmically mounts facilitate RPA. We propose a computer vision-based localization model, utilizing...
Abstract The proliferation of spam emails, a predominant form online harassment, has elevated the significance email in daily life. As consequence, substantial portion individuals remain vulnerable to fraudulent activities. Despite Gmail’s “spam mail filtration system,” its effectiveness is not absolute. It occasionally misclassifies legitimate messages, leading their confinement folder, or overlooks potentially harmful emails. This results occurrence false positives. research scrutinizes...
A strong earthquake with magnitude 7.7 that shook the Indian Province of Gujarat on morning January 26, 2001 caused wide spread destruction and casualties. Earthquakeinduced ground failures, including liquefaction lateral spreading, were observed in many areas. Optical remote sensing offers an excellent opportunity to understand post-earthquake effects both qualitatively quantitatively. The impact using conventional indices from Landsat-7 temporal images for is empirically investigated...
Moving-object tracking is one of the basic and hot research domains in computer vision area. This work presents a novel effective method to track moving objects under static background. Proposed first executes pre-processing tasks remove noise from video frames. Then, with help rectangular window, we select target object region frame (reference frame). Next, it applies Laplacian operator on selected for sharpening edge detection. The algorithm then DCT selects few high energy coefficients....
The majority of people in the modern biosphere struggle with depression as a result coronavirus pandemic's impact, which has adversely impacted mental health without warning. Even though individuals are still protected, it is crucial to check for post-corona virus symptoms if someone feeling little lethargic. In order identify post-coronavirus and attacks that present human body, recommended approach included. When harmful spreads inside post-diagnosis considerably more dangerous, they not...
IEEE 802.16 WiMAX provides high data rate but limited coverage area and 3G is well established network with low as comparison to network. So if we will combine both then it ubiquitous speed access attract wider user base. In this paper have taken component which used in interworking architecture, security consideration, authentication procedure, fast handoff between heterogeneous (WiMAX-3G) networks. At last talk about effect of architecture on IMS (IP multimedia subsystem) signal delay.