Surendra Kumar Shukla

ORCID: 0000-0003-4120-5953
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Internet of Things and AI
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Smart Systems and Machine Learning
  • Parallel Computing and Optimization Techniques
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Artificial Intelligence in Healthcare
  • Brain Tumor Detection and Classification
  • Embedded Systems Design Techniques
  • Advanced Malware Detection Techniques
  • Interconnection Networks and Systems
  • Cloud Data Security Solutions
  • Advanced Steganography and Watermarking Techniques
  • Smart Grid Security and Resilience
  • Industrial Vision Systems and Defect Detection
  • IoT-based Smart Home Systems
  • Video Surveillance and Tracking Methods
  • Manufacturing Process and Optimization
  • COVID-19 diagnosis using AI
  • Security in Wireless Sensor Networks
  • Quantum-Dot Cellular Automata
  • Anomaly Detection Techniques and Applications
  • Cryptography and Data Security
  • Digital Media Forensic Detection

Graphic Era University
2021-2024

Narsee Monjee Institute of Management Studies
2023-2024

Hemwati Nandan Bahuguna Garhwal University
2022

Devi Ahilya Vishwavidyalaya
2019

Chameli Devi Group of Institutions
2014

Himachal Pradesh University
2007

Alzheimer’s disease is characterized by the presence of abnormal protein bundles in brain tissue, but experts are not yet sure what causing condition. To find a cure or aversion, researchers need to know more than just that there differences from usual; they also how these nerves form so remedy may be discovered. Machine learning study computational approaches for enhancing performance on specific task through process learning. This article presents an detection framework consisting image...

10.1155/2022/5261942 article EN Computational Intelligence and Neuroscience 2022-03-28

Data collection from sensitive places must be done remotely due to laborious communication protocols. In this paper, the deployment of wireless sensor networks is investigated on battlefield in terms specific parameters such as node power, latency, and network survival. It investigates simulated environment at three different levels while using a simulator. Continuous data gathering significant power consumption are necessary during early phase networks. The wiring stage then where usage...

10.1109/ictacs56270.2022.9987887 article EN 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2022-10-10

The successful distribution of computer services, including software, storage needs, analytics, intelligence, and many others, is reflected in cloud computing. Additionally, it provides quicker innovation while simultaneously providing flexible resources.Deep learning (DL), a subset artificial intelligence (AI) machine learning, widely seen as key technology the Fourth Industrial Revolution (4IR or Industry 4.0). neural network (ANN)-based technique known deep (DL) has gained popularity...

10.1109/icacite57410.2023.10182738 article EN 2023-05-12

An IoT system is a smart network that connects all items to the Internet and exchanges data using Engineering Task Force established protocols. As consequence, everything instantly accessible from any place at time. The of Things (IoT) built on backbone tiny sensors embedded in common objects. There no need for human intervention interactions devices. security risk cannot be ignored. Untrusted networks, such as Internet, are utilized provide remote access result, systems susceptible broad...

10.1155/2022/4477507 article EN Security and Communication Networks 2022-05-17

The introductory part of the research mainly focuses on importance using block chain facilities by 5G Network that can be useful for data privacy and security. It said all benefits technology in order to protect access relevant implementing intelligent contracts enhancing security framework related use networks protection activities. Literature review concentrates merits applying both growth as well development privacy. All merits, demerits facility, have been also discussed throughout...

10.1109/icacite53722.2022.9823471 article EN 2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE) 2022-04-28

Abstract The goal of this work is to investigate how the self‐awareness characteristic autonomic computing, paired with existing performance optimization rules, may be used in applications minimise multi‐core processor concerns. suggested technique can assist self‐execution while also assisting other executing system optimal resource usage and reducing conflicts a collaborative manner. It means created application get resources, schedules itself, running autonomically respect runtime...

10.1049/cmu2.12505 article EN cc-by IET Communications 2022-09-27

People are becoming used to fake world and vocal communication as technology advances. There a few ways communicate with people online in this modern invention. A large number of individuals often choose use the simplest form reporting, namely email. The era encrypted email allows users other by posting signals also facilitates cross-border corporate communication. Some unable take advantages due their ignorant or lack necessary visible screen ability. Therefore, Speech completely messaging...

10.1109/aisc56616.2023.10085638 article EN 2023-01-27

Multi-core systems are outperforming nowadays.Therefore, various computing paradigms intrinsically incorporated in the multicore domain to exploit its potential and solve well known problems.Parameter tuning is a well-known problem field of Multicore domain.Addressing said hurdle would leverage performance enhancement systems.Various efforts this direction have been made through conventional parameter algorithms limited scope; however, yet not addressed completely.In research article, we by...

10.5815/ijwmt.2022.04.02 article EN International Journal of Wireless and Microwave Technologies 2022-08-08

Today, cosmetics have a big impact on how individuals look. It can be challenging to select the best skincare item. People ideal product for their skin type using predictive way it offers. Traditional methods cannot compare compositional notion. In IT departments and beauty care, complex procedures are streamlined deep learning algorithms. The client base selection of sector both grown over time. importance selecting grows as number goods consumers rises. A person's look (skin quality) is...

10.1109/ictacs56270.2022.9987850 article EN 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2022-10-10

Banks and other financial institutions will be able to adopt innovative products services, more importantly, endure disruptions their customers' experience, thanks advancements in artificial intelligence (AI). Financial would struggle thrive today's mechanized economy without the aid of fintech companies, which use innovation enhance or try supplant human specialists with complex calculations. To keep a critical upper hand, banking monetary organizations should take on man-made integrate it...

10.1109/ic3i56241.2022.10073077 article EN 2022-12-14

Cryptographic possibilities have received a lot of attention in art and the journalism, particularly banking payment sectors. At company level, one very new trend is use cryptocurrency as foundation for irreversibility security software. Industry 4.0 Smart manufacturing are examples emerging application fields (IIoT). Therefore, we thoroughly examine current block chain Ir IIoT scenarios this study. We specifically outline latest research developments all important industrial areas, along...

10.1109/aisc56616.2023.10085226 article EN 2023-01-27

Music has been considered a form of expression that can treat conditions such as stress, anxiety, and mood swings. The latest research in music psychology shows evokes palpable emotions listeners. People's personality determines what kind they prefer to listen to. areas the brain process thoughts also control tempo, timbre, music. Although person's response depends on many external factors, we classify kindness, patience, relaxation, passion, that's why is high-quality connector. Industries...

10.1109/icccis60361.2023.10425186 article EN 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 2023-11-03

Abstract A purified alkaline thermotolerant bacterial lipase from Bacillus coagulans BTS‐3 was immobilized on nylon‐6 matrix activated by glutaraldehyde. The showed ∼ 70% binding efficiency for lipase. bound used to perform transesterification in n ‐heptane. reaction studied conversion of vinyl acetate and butanol butyl alcohol. Synthesis as a parameter study the reaction. enzyme achieved 75% (100 mmol/L each) into ‐heptane at 55°C 12 h. When alkane C‐chain lower or higher than n‐ heptane an...

10.1002/app.25323 article EN Journal of Applied Polymer Science 2007-08-02

Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor made up three modules: Capturing_of_Packets (CoP) pre-processing, Reconciliation_of_Flow (RoF), categorization Machine Learning (ML). Based on parallel processing along with well-defined interfacing data, the modules are framed, allowing each module be modified upgraded separately....

10.4018/ijitwe.297971 article EN International Journal of Information Technology and Web Engineering 2022-02-23

Recent improvements in communication technology have undergone a significant shift over the last two decades, with state-of-the-art equipment, standards, and protocols simplifying lives of consumers everywhere. For more than decade, advancements mostly focused on increasing speed which information can be delivered retrieved from anywhere globe at any time day or night, regardless location. Four-generation (4G) technologies, already been developed implemented, are used to offer users seamless...

10.1155/2022/6229356 article EN cc-by Wireless Communications and Mobile Computing 2022-06-10
Coming Soon ...