- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- Software-Defined Networks and 5G
- Cognitive Computing and Networks
- Cloud Computing and Resource Management
- Digital Transformation in Industry
- Advanced Optical Network Technologies
- Blockchain Technology Applications and Security
- Graph Theory and Algorithms
- Stellar, planetary, and galactic studies
- Web Data Mining and Analysis
- Nuclear physics research studies
- Mobile Ad Hoc Networks
- Gamma-ray bursts and supernovae
- IPv6, Mobility, Handover, Networks, Security
- Plant and animal studies
- Cybersecurity and Information Systems
- Information Systems and Technology Applications
- Smart Cities and Technologies
- Geographic Information Systems Studies
- Big Data and Business Intelligence
- Network Packet Processing and Optimization
- Advanced Database Systems and Queries
- Distributed and Parallel Computing Systems
- Scientific Computing and Data Management
Aarhus University
2021-2024
Government Medical College
2019
Weatherford College
2019
University of Bremen
2012-2013
Indian Institute of Technology Indore
2004
Dataspace and emerging technologies play a key role in developing value chain systems using cross-domain data, services integration. Therefore, this study has conducted comprehensive literature review for six years (2017-2022) on the convergence of Internet Things (IoT), Artificial Intelligence (AI) Distributed Ledger (Blockchain) supporting integration efforts at Edge. As an outcome, identified relevant challenges that include heterogeneity, interoperability, distributed security, trust,...
Due to the rapid development of Internet Things (IoT) and consequently, availability more IoT data sources, mechanisms for searching integrating sources become essential leverage all relevant improving processes services. This paper presents search framework IoTCrawler. The IoTCrawler is not only another framework, it a system systems which connects existing solutions offer interoperability overcome fragmentation. In addition its domain-independent design, features layered approach, offering...
Emerging technologies such as the Industrial Internet of Things (IIoT), hyper-connected societies, and cyber-physical systems in Industry 5.0 (I5.0) have increased data volume substantially. Conventionally, process analysis are carried out within boundaries organizations that can be perceived edges closer to sources, resulting generated values stuck organizations. However, this enable a cross-organizational pool, based on which lots semantics context-driven services developed monetized...
Cloud computing is a stage for growing capacities and creating potential powerfully without utilizing new framework, faculty, or programming frameworks.What's more, distributed started from business venture idea, formed into thriving IT development.In any case, considering that impressive data on people organizations distinguished in the cloud, concerns have been raised with respect to security of cloud climate.Regardless publicity encompassing computing, clients stay hesitant send their...
A novel scheme for routing data packets in high-speed communication networks is presented and described detail. Simulations have been performed on randomly constructed 25 100 node networks, which demonstrate excellent IP throughput the capability to adapt dynamic network conditions. The most important benefit of this simplify route look-up tasks save resources required processing, updates, storage, memory access, information exchange. can be used as a stand-alone protocol or with...
Goal of traffic engineering in packet networks is to improve the network performance by providing support for congestion management, higher bandwidth utilization (or throughput), and QoS or priority-based services. Open shortest path first with extensions (OSPF-TE) (J. Moy, April 1998) multiprotocol label switching (MPLS) protocols are commonly viewed as possible solutions. Both, OSPF-TE optimized link weights MPLS explicit optimal set-ups, work ideally under static conditions a known...
This paper presents an IoT enabled real time occupancy semantic search system leveraging ETSI defined context information and interface meta model standard- "Next Generation Service Interface for Linked Data" (NGSI-LD). It facilitates interoperability, integration federation of exchange related to spatial infrastructure among geo-distributed deployed entities, different stakeholders, process domains. system, in the presented use case, solves problem adhoc booking meetings through discovery...
Optimum network resource utilization and pooling to deal with congestion in present time is one of the biggest challenges faced by various research, development monitoring groups or organisations. IETF research group has proposed solutions improve Quality Service (QoS) internet communication. Routing effective operations can enhance performance managing resources efficiently, which turn end TCP/IP connections. In this paper a comprehensive solution called OSPFxQoS-LSFM, based on OSPF QoS...
QoS/QoE becomes increasingly important due to the growing usage of multimedia applications. In this paper, a solution is presented where Multipath TCP which supports mobility on transport layer combined with QoS-enabled OSPF for performance-aware route selection. For latter protocol, novel extension called QoSxOSPF-LSFM (Load Sensitive Flow Management) introduced increases stability OSPFxQoS routing by evaluating link utilization and reducing frequency changes. comparison, results are shown...
Epidermoid cysts are developmental cystic malformations that rarely observed in the submental region.Most of patients present with a painless slow growing lump.We report rare case giant epidermoid cyst 19-year-old male patient complaining swelling.The differential diagnosis included dermoid cyst, epidermoid, plunging ranula, and abnormalities during embryonic development.The lesion was surgically excised using an extra-oral approach.The histopathological examination revealed cyst.
Cloud computing is the process of maintaining one's own software and hardware environment while outsourcing communications about IT industry via internet.It an on-demand service made possible through CSP (Cloud Service Provider).It accessible whenever needed, in any quantity, at a cost based on usage.The main worry cloud security.The two primary cryptography algorithms, DES (Data Encryption Standard) AES (Advanced have been elaborated this research paper along with discussion fundamentals...