- Network Time Synchronization Technologies
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Real-Time Systems Scheduling
- Security and Verification in Computing
- Mobile Ad Hoc Networks
- Cloud Data Security Solutions
- EEG and Brain-Computer Interfaces
- Wireless Body Area Networks
- Petri Nets in System Modeling
- IoT-based Smart Home Systems
- Microbial Community Ecology and Physiology
- Cryptography and Data Security
- Context-Aware Activity Recognition Systems
- Network Security and Intrusion Detection
- Smart Agriculture and AI
- Machine Learning in Healthcare
- Artificial Intelligence in Healthcare
- Energy Harvesting in Wireless Networks
- Opportunistic and Delay-Tolerant Networks
- Spreadsheets and End-User Computing
- Internet of Things and AI
ABES Engineering College
2022-2025
Institute of Management Technology
2022-2025
Amity University
2014-2023
Amity University
2018-2021
Delhi Technological University
2020-2021
Guru Gobind Singh Indraprastha University
2014-2017
India Meteorological Department
1973-1994
Met Office
1994
In recent days, the IoT along with wireless sensor networks (WSNs), have been widely deployed for various healthcare applications. Nowadays, industries use electronic sensors to reduce human errors while analysing illness more accurately and effectively. This paper proposes an IoT-based health monitoring system investigate body weight, temperature, blood pressure, respiration heart rate, room humidity, ambient light synchronised clock model. The is divided into two phases. first phase,...
In the present paper, an attempt has been made to examine Mentha production in different categories of farmers entitled Profitability Analysis Growers Ambedkar Nagar District Uttar Pradesh. Hundred sample (marginal 48, Small 31, & medium 21) where interviewed form 5 villages Baskhari block district. Data was analysis and found that Average holding Size is 1.17 ha. Cropping intensity farms 201.64 percent which highest on marginal 226.09 followed by 214.17 190.99 respectively. On cost...
Efficient and low power utilizing clock synchronization is a challenging task for wireless-sensor network (WSN). Therefore, it crucial to design light weight protocols these networks. An adaptive offset prediction model WSN proposed in this paper that exchanges fewer messages improve the accuracy efficiency. Timing information required collected by setting small set up investigate soil condition control irrigation agriculture. The networks soils moisture, temperature, humidity, pressure...
Abstract This paper introduces a novel integrated hybrid malware attack detection algorithm, focusing on enhancing cybersecurity within blockchain systems by addressing the prevalent challenges of Byzantine fault tolerance, Reentrancy, and DDOS attacks. The significance this research lies in its contribution to safeguarding technology, cornerstone for secure, decentralized digital transactions, against sophisticated threats. Current solutions frequently fall short offering complete defense...
Nature inspired algorithms are gaining popularity for optimizing complex problems. These have been classified into 2 general categories, namely Evolutionary and Swarm Intelligence, which further divided a couple of algorithms. This paper presents comparative study between Bat Algorithm, Genetic algorithm, Artificial Bee Colony Algorithm Ant Optimization Algorithm. compared on the basis various factors such as Efficiency, Accuracy, Performance, Reliability Computation Time. At end, table has...
Energy efficient routing is a crucial area of research for wireless sensor network(WSN). The communication between the nodes handled by protocols. nature link, low power and limited recourse makes it difficult task to design an energy performance protocol WSN. This paper proposes energy-efficient route selection multi-hop network with static link deployment in field agriculture. An model also given this evaluate consumption network. proposed multi-hop(ESM) evaluated based on parameters...
Android OS protects user data and system resources with the help of permission based model which requires android application developers to declare be used by their well in advance. The user's would not accessible developer unless grants acceptance permissions being asked developer. In order install on mobile, has allow access all requested permissions. There is no method granting some denying rest others. Such a case leads accepting like reading messages or accessing contacts etc. puts...
Nowadays, heart-related diseases are common to people of all ages. Early detection anomalies can help save a life. This generates demand for an efficient heart disease prediction system. An individual use this system track his irregularities and be deployed in the medical health field hospitals. paper proposes learning algorithm based The proposed work is implemented on two algorithms, logistic regression random forest overall classification performance. In paper, evaluation tool model...
Data uncertainty in face recognition due to various environmental factors and spoofing with 3D- masks are two major threats gain illegitimate access. A single image of has got high representing the since varies illumination, facial expression pose. Thus a can only be considered as an observation but not absolute accurate representation face. The accuracy improved by obtaining more images from same person. However real-world we have limited number available thus there is uncertainty. In this...
Cloud computing is an enticing field nowadays due to its cost effective nature, easy accessibility, the pay per use service and shared resources. These resources, accessibility storage of resources are responsible for putting confidential information under a great deal risk. Although cloud becoming gigantic day by but efficiency being hampered considerably threats in environment. The environment not only account external attacks which launched with intention hampering work flow provider...
Hadoop is based upon framework and the files that are stored in Distributed File System which better known as HDFS. The data these databases huge there can be multiple user, who would want to access file from This paper discusses about way contents of not distorted when users accessing same file.
Modern advancement in efficient and affordable electronic devices has developed a huge range of applications the domain wireless networks. An essential problem addressed this Wireless sensor network is that nodes communicate with each other or base station without any infrastructure central administration. They can using channels exchange data multiple hops. For timely delivery messages, reliable routing protocols are required by these networks for communication. Through paper, critical...