Achyut Shankar

ORCID: 0000-0003-3165-3293
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Energy Efficient Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Advanced Image Fusion Techniques
  • Network Security and Intrusion Detection
  • Artificial Intelligence in Healthcare
  • Internet of Things and AI
  • Image and Signal Denoising Methods
  • Internet Traffic Analysis and Secure E-voting
  • COVID-19 diagnosis using AI
  • Advanced Steganography and Watermarking Techniques
  • Cloud Computing and Resource Management
  • Remote-Sensing Image Classification
  • Anomaly Detection Techniques and Applications
  • IoT-based Smart Home Systems
  • Advanced Malware Detection Techniques
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Harvesting in Wireless Networks
  • Mobile Ad Hoc Networks
  • Brain Tumor Detection and Classification
  • Smart Grid Security and Resilience
  • Advanced Image Processing Techniques
  • Smart Agriculture and AI
  • Advanced Neural Network Applications
  • Privacy-Preserving Technologies in Data

University of Warwick
2022-2025

Bennett University
2025

Amity University
2018-2024

Chitkara University
2023-2024

Lovely Professional University
2023-2024

Chandigarh University
2024

Graphic Era University
2023-2024

Sri Manakula Vinayagar Educational Trust
2024

Amity University
2020-2022

University of Johannesburg
2022

AbstractThis research examines the influence of digital literacy on preschool children’s school readiness and mental health. The analysis dissects psychological resilience’s role as a mediator among digitally literate-conscious kids. underlying theory underpinning literature is social learning theory, which provides paradigm lens for effectively accessing evaluating available information. This study measures these proposed assumptions using structural equation modeling techniques. Data...

10.1080/10447318.2023.2248432 article EN International Journal of Human-Computer Interaction 2023-09-15

Medical image analysis plays a crucial role in healthcare systems of Internet Things (IoMT), aiding the diagnosis, treatment planning, and monitoring various diseases. With increasing adoption artificial intelligence (AI) techniques medical analysis, there is growing need for transparency trustworthiness decision-making. This study explores application explainable AI (XAI) context within cyber-physical (MCPS) to enhance trustworthiness. To this end, proposes an framework that integrates...

10.1109/jbhi.2023.3336721 article EN IEEE Journal of Biomedical and Health Informatics 2023-11-27

As 6G communication technology advances, there is a growing trend of incorporating blockchain technology, which has already demonstrated its effectiveness in multiple areas. Merging with opens up novel prospects for consumer electronics, facilitating the creation secure, private, and decentralized networks, along pioneering applications services. We explore synergistic incorporation networks to enable secure connectivity tailored electronics. To this end, multi-party, dependable framework...

10.1109/tce.2024.3371501 article EN IEEE Transactions on Consumer Electronics 2024-02-01

The most burning topic of today, calls for a holistic solution that is reliable, secure, privacy preserved, cost effective Cloud storage can tide over the turbulent conditions rapidly budding digital technologies. This send an outcry devoted solution, in form individualized, patient-centric care - IoMT augments precise disease identifications, decrease errors, reduction costs through support technology, allows patients to direct health information data doctors,manage drugs, keep Personal...

10.1109/access.2020.3040240 article EN cc-by IEEE Access 2020-01-01

In the hospital, because of rise in cases daily, there are a small number COVID-19 test kits available. For this purpose, rapid alternative diagnostic choice to prevent spread among individuals must be implemented as an automatic detection method. article, multi-objective optimization and deep learning-based technique for identifying infected patients with coronavirus using X-rays is proposed. J48 decision tree approach classifies feature corona affected X-ray images efficient patients....

10.1080/07391102.2021.1875049 article EN Journal of Biomolecular Structure and Dynamics 2021-01-21

Abstract Wireless sensor network (WSN) is used to sense the environment, collect data, and further transmit it base station (BS) for analysis. A synchronized tree-based approach an efficient aggregate data from various nodes in a WSN environment. However, achieving energy efficiency such tree formation challenging. In this research work, algorithm named fuzzy attribute-based joint integrated scheduling (FAJIT) technique parent node selection using logic heterogeneous proposed. FAJIT mainly...

10.1007/s40747-020-00258-w article EN cc-by Complex & Intelligent Systems 2021-01-08

Internet of Things (IoT) security is the act securing IoT devices and networks. devices, including industrial machines, smart energy grids, building automation, are extremely vulnerable. With goal shielding network systems from illegal access in cloud servers systems, Intrusion Detection Systems (IDSs) Network-based Prevention (NBIPSs) proposed this study. An intrusion prevention system to realize NBIPS safeguard top bottom engineering. The inspects activity streams identify counteract...

10.1016/j.dcan.2022.05.027 article EN cc-by-nc-nd Digital Communications and Networks 2022-06-16

Biometric technologies, such as handwritten signature verification, are extremely useful for identifying individuals inside an organization or finance department. The improvement of picture categorization using deep learning (DL) neural networks has offered opportunity to exhibit computer vision in contemporary research applications by applying image processing approaches. Manual verification is inefficient, error-prone, time-consuming, and inconvenient; therefore, it critical create...

10.1117/1.jei.31.4.041210 article EN Journal of Electronic Imaging 2022-02-10

As a component of the Intelligent Transportation System (ITS), Internet Vehicles (IoV) is becoming increasingly important in management and construction urban transportation as it can provide users with range applications related to traffic accident warnings, entertainment information, collaborative driving real-time road information through communication devices on vehicles. However, increasing variety services IoV, growing demand for user advances Unmanned Aerial Vehicle (UAV) technology,...

10.1109/tits.2024.3360251 article EN IEEE Transactions on Intelligent Transportation Systems 2024-03-01

Wireless sensor network (WSN) is considered as the resource constraint network, in which entire nodes have limited resources. In WSN, prolonging lifetime of remains unsolved point. Accordingly, this study intends to propose a hybrid GGWSO (Grouped Grey Wolf Search Optimisation) algorithm improve performance cluster head selection so that network's can be extended. The proposed method concerns main constraints associated with distance, delay, energy, and security. This compares several...

10.1049/iet-wss.2018.5008 article EN IET Wireless Sensor Systems 2018-09-25

In today's era drones and UAV are being used more for spying warfare. Their excessive use makes them vulnerable to be hacked malicious purposes. There also security loopholes in this technology like the radio waves which can exploited by rivals cause a large amount of destruction or loss data. This paper is written improve using blockchain technology. Blockchain highly secured as it uses private key cryptography peer network. By incorporating transmitting signals from controller drone UAV,...

10.1109/confluence.2019.8776613 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2019-01-01
Coming Soon ...