- Speech Recognition and Synthesis
- Natural Language Processing Techniques
- Mobile Ad Hoc Networks
- Topic Modeling
- Energy Efficient Wireless Sensor Networks
- Speech and Audio Processing
- Advanced Text Analysis Techniques
- Music and Audio Processing
- Handwritten Text Recognition Techniques
- Opportunistic and Delay-Tolerant Networks
- Smart Grid Energy Management
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Wireless Networks and Protocols
- Chaos-based Image/Signal Encryption
- IoT and Edge/Fog Computing
- Vehicle License Plate Recognition
- Cooperative Communication and Network Coding
- Energy Harvesting in Wireless Networks
- Cryptography and Data Security
- IoT-based Smart Home Systems
- Speech and dialogue systems
- Advanced Data Compression Techniques
- Nanofluid Flow and Heat Transfer
- AI in cancer detection
Siksha O Anusandhan University
2016-2025
Indian Institute of Water Management
2024
University of Huddersfield
2022
Iwate Prefectural University
2022
Bridge University
2022
Integrated Test Range
2015
University of Exeter
2013
The decentralization feature of public and private blockchain-based applications is achieved by selecting different nodes as validator or Certificate Authority ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">CA</i> ) for each transaction. Public blockchain uses Proof Work (PoW) to search the validator. PoW causes an enormous amount energy. Therefore, Stake xmlns:xlink="http://www.w3.org/1999/xlink">PoS</i> ),...
Relapse and metastasis occur in 30-40% of breast cancer patients, even after targeted treatments like trastuzumab for HER2-positive cancer. Accurate individual prognosis is essential determining appropriate adjuvant treatment early intervention. This study aims to enhance relapse prediction using an innovative framework with machine learning (ML) ensemble (EL) techniques. The developed analyzed Cancer Genome Atlas (TCGA) data, which has 123 patients. Our two-stage experimental approach first...
Emotion is fundamental to interpersonal interactions since it assists mutual understanding. Developing human-computer and a related digital product depends heavily on emotion recognition. Due the need for interaction applications, deep learning models voice recognition of emotions are an essential area research. Most speech algorithms only deployed in European few Asian languages. However, low-resource tribal language like KUI, dataset not available. So, we created applied some augmentation...
Blockchain technology is currently playing a significant role in providing secure and effective means to share information variety of domains, including the financial sector, supply chain management (SCM) various IoT, field health care systems (HCS). The HCS application's interoperability security allow patients vendors communicate seamlessly. absence such traits reveals patient's difficulties gaining access his or her own status. As result, incorporating blockchain will eliminate this...
Speech synthesis deals with artificial production of speech, and a Text-to-Speech (TTS) system in this aspect converts natural language text into corresponding spoken waveform or speech. There have been sufficient successes today the area speech processing that suggest these technologies will continue to be major research development creating intelligent systems. In paper we provide an overview TTS technology along details phases involved. The thrust has given explore usefulness technique...
Automatic text summarization a subfield of Natural Language Processing (NLP) aims at producing precise and non redundant aided by machine learning techniques. Using varied methods, especially techniques has enhanced its performance from different perspectives. The proposed work efficiently utilizes hierarchical clustering using cosine similarity measure for segregating sentences. model adopts an extractive method summarizing Odia document. It focuses on minimizing redundancy achieves it...
ABSTRACT Public key infrastructure (PKI) is a reliable solution for Internet communication. PKI finds applications in secure email, virtual private network (VPN), e‐commerce, e‐governance, and so on. It provides mechanism to authenticate users communications. The conventional system centralized, which exposes the many security issues. digital certificate generation validation processes suffer from high latency inadequate authentication processes. Moreover, it needs enormous time effort...
Wireless mesh networks (WMNs) have attracted increasing attention and deployment as a high-performance low-cost solution to last-mile broadband internet access. WMNs been broadly accepted in the conventional application sectors of ad hoc because their advantages over other wireless networks. Traffic routing has critical role determining performance Routing protocol design for is maintain reliability Thus or an algorithm should be carefully designed taking into account specific...
Wireless Ad hoc Sensor Network (WASN) is becoming a demandable and evolving area of engineering which has been currently engaged in various fields particularly to make wireless communication system effective reliable. WASN resolving real time applications the places where topographical, e cological terrains atmospheric phenomenon are ever fluctuating. In this paper, Hybrid Multi Hop Mobility assisted cluster routing protocol proposed for maximizing performance throughput under heterogeneous...
Efficient implementation of Mobile Ad Hoc Networks (MANETs) needs a set application specific Quality Service (QoS) parameters such as bandwidth, delay and power etc. be guaranteed on regular basis for the entire life time operation ad hoc network. To achieve this, required measures should taken at level corresponding routing protocol. Most protocols, especially on-demand protocols like Dynamic Source Routing (DSR), Ondemand Distance Vector (AODV), mostly concentrate determining route with...