Deepak Kumar

ORCID: 0000-0003-2409-9706
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Software Reliability and Analysis Research
  • Software Engineering Techniques and Practices
  • Software System Performance and Reliability
  • Cloud Computing and Resource Management
  • Service-Oriented Architecture and Web Services
  • Software Testing and Debugging Techniques
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Information and Cyber Security
  • Cloud Data Security Solutions
  • Advanced Software Engineering Methodologies
  • Blockchain Technology Applications and Security
  • Network Security and Intrusion Detection
  • Big Data and Business Intelligence
  • Reliability and Maintenance Optimization
  • Collaboration in agile enterprises
  • Spam and Phishing Detection
  • Advanced Image Fusion Techniques
  • Artificial Intelligence in Healthcare
  • Security and Verification in Computing
  • Internet of Things and AI
  • Business Process Modeling and Analysis
  • ERP Systems Implementation and Impact
  • Sentiment Analysis and Opinion Mining

Amity University
2015-2024

Lovely Professional University
2018-2024

SRM Institute of Science and Technology
2022-2024

Bay Institute
2024

University of the Cumberlands
2024

Williams (United States)
2024

Amity University
2016-2023

Indian Institute of Toxicology Research
2022

Government Medical College
2020

Indian Institute of Technology Hyderabad
2020

Pseudorandom number generators (PRNGs) play a pivotal role in generating key sequences of cryptographic protocols. Among different schemes, simple chaotic PRNG (CPRNG) exhibits the property being extremely sensitive to initial seed and, hence, unpredictable. However, CPRNG is vulnerable if compromised. In this brief, we propose novel physical unclonable function-based (PUF-CPRNG), where secured by it from PUF. Furthermore, proposed PUF-CPRNG includes dynamic refreshing logic ensure that...

10.1109/tvlsi.2020.2979269 article EN IEEE Transactions on Very Large Scale Integration (VLSI) Systems 2020-03-24

Secret data writing is an important area of research in numerous fields. DNA cryptography a new field arising computing last few decades. Today, sequences are used for exposed cryptography, and storage because these contain large parallelism, extraordinary information density exceptional energy efficiency. This paper presents encryption as well decryption technique using the one time pad (OTP) through which can secure our within its structure. The first section provides introduction about...

10.1109/etncc.2011.6255930 article EN 2011-04-01

10.1007/s13198-016-0460-0 article EN International Journal of Systems Assurance Engineering and Management 2016-04-23

The present research investigates optimizing energy-efficient computing environments through dynamic resource allocation in edge settings.The primary objective is to enhance system efficiency and energy economic performance.A comprehensive data gathering analysis plan, incorporating simulation, has been designed gain insights into power usage patterns.Specifically, smart meter from Bareilly for the years 2020 2021 will be examined identify hourly seasonal fluctuations consumption.The...

10.7753/ijsea1307.1001 article EN International Journal of Science and Engineering Applications 2024-06-13

The e-healthcare management system could be enchanced extremelyby connecting tocurrent trend technology. This paper suggested a model of grouping adaptable services administration framework dependent on Cloud Computing. Along these lines, this prescribed planning distributed computing. recommended has been enhanced and incorporates different divisions to create healthcare framework. Health Data Management System based the client side, simple cloud application side creates readily attainable...

10.1109/aicai.2019.8701387 article EN 2019-02-01

Women and girls have been experiencing a lot of violence harassment in public places various cities starting from stalking leading to sexual or assault. This research paper basically focuses on the role social media promoting safety women Indian with special reference websites applications including Twitter platform Facebook Instagram. also how sense responsibility part society can be developed common people so that we should focus surrounding them. Tweets which usually contains images text...

10.1109/aicai.2019.8701247 article EN 2019-02-01

Mindfulness-based approaches have been shown to be useful in a variety of physical and mental health conditions including chronic pain, cancer, psoriasis, eating disorders, anxiety depression. Mindfulness based CBT finds its origins Eastern Buddhist meditation which began many centuries ago. Recent studies on with mindfulness psychological effectiveness across wide range clinical problems. These include anxiety, depression, stress management, OCD, social personality disorders. Clinical...

10.1177/0973134220100104 article EN Journal of Indian Association for Child and Adolescent Mental Health 2010-01-01

The growing volume of unwanted bulk e-mail (also known as junk-mail or spam) has generated a need for trustworthy antispam filters. Now day, many Machine learning techniques have been used which are robotically filter the junk in much unbeaten rate. In this paper, we one most popular machine Algorithm support vector (SVM) with different parameters using kernelfunctions (linear, polynomial, RBF, sigmoid) implemented on spambase-dataset. Comparison SVM performance all kernels (C-SVC, NU-SVC)...

10.5120/ijca2016908395 article EN International Journal of Computer Applications 2016-02-17

10.1007/s13198-024-02262-6 article EN International Journal of Systems Assurance Engineering and Management 2024-05-01

In today's digital era, cyber threats loom large, posing significant risks to individuals, organizations, and nations.The escalating frequency sophistication of these demand innovative solutions for detection prevention.Big data analytics, a powerful tool in the cybersecurity arsenal, has lot potential mitigate or block threat.By harnessing vast amounts generated ecosystem, big analytics can uncover patterns, anomalies, trends indicative security breaches.Advanced algorithms machine learning...

10.55248/gengpi.5.0624.1425 article EN International Journal of Research Publication and Reviews 2024-06-01

Internet of Things (IoT) has been one the innovative technologies in present times, which assemble model shift outdated healthcare methods. With start great correctness sensors and empowered therapeutic gadgets, human services can be a progressive localized from customary focus based methodology. These little structure factor IoT gadgets have diminished expense medicinal prompting reasonableness more extensive selection. This paper Communicate ongoing advances engineering just as framework...

10.1109/iscon47742.2019.9036287 article EN 2021 5th International Conference on Information Systems and Computer Networks (ISCON) 2019-11-01

The advent of machine learning in personalized medicine has revolutionized the healthcare industry by providing an enhanced diagnosis and treatment regimen to patients based on their unique characteristics such as genetic predispositions, lifestyle variables, medical history. Machine algorithms can analyze vast amounts patient data generate accurate diagnoses, establish tailored plans, improve outcomes. By combining multiple sources, identify patterns, predict likelihood specific illnesses,...

10.30574/wjarr.2024.21.2.0641 article EN cc-by-nc-sa World Journal of Advanced Research and Reviews 2024-02-28

Hyperspectral Imaging (HSI) plays a crucial role in detecting, identifying, and classifying wide range of natural resources, including minerals, geological phenomena like volcanic eruptions, vegetation. Segmentation classification HSI play vital roles extracting meaningful information identifying different land cover or use categories within the scene. One primary limitations associated with is scarcity labeled samples. Obtaining annotated samples laborious time-consuming process, posing...

10.1016/j.prime.2024.100704 article EN cc-by e-Prime - Advances in Electrical Engineering Electronics and Energy 2024-07-30

The Information Technology products are suffering from various security issues due to the flaws residing in software system. These allow violations of policy and leads into vulnerability. Once associated user discovers vulnerability number intrusions increases until vendor releases a patch. patching process helps maintaining stability reduces probability damage potential. Even after diffusion installation whether patch has successfully removed or not is great importance. Patch failures...

10.1142/s0218539316400131 article EN International Journal of Reliability Quality and Safety Engineering 2016-11-01
Coming Soon ...