- Software Reliability and Analysis Research
- Software Engineering Research
- Reliability and Maintenance Optimization
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Software System Performance and Reliability
- User Authentication and Security Systems
- AI in cancer detection
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Technology Adoption and User Behaviour
- Cloud Computing and Resource Management
- Blockchain Technology Applications and Security
- Mobile Ad Hoc Networks
- ERP Systems Implementation and Impact
- Software Engineering Techniques and Practices
- Software Testing and Debugging Techniques
- Biometric Identification and Security
- Sentiment Analysis and Opinion Mining
- Cloud Data Security Solutions
- Vehicular Ad Hoc Networks (VANETs)
- IoT-based Smart Home Systems
- Artificial Intelligence in Healthcare
- Recommender Systems and Techniques
- Complex Network Analysis Techniques
Amity University
2016-2025
NTNU Samfunnsforskning
2024
Quality and Reliability (Greece)
2024
Amity University
2014-2022
Indian Institute of Information Technology Allahabad
2022
National University of Uzbekistan
2021
Indian Institute of Technology Kanpur
2021
Indian Institute of Technology Delhi
2020
University of Delhi
2019
University of Dubai
2019
IoT is a revolutionary technology that represents the future of communication & computing. These days used in every field like smart homes, traffic control cities etc. The area implementation vast and can be implemented field. This paper about Agriculture. helps better crop management, resource cost efficient agriculture, improved quality quantity, monitoring done. sensors proposed model are air temperature sensor, soil pH moisture humidity water volume sensor In this I surveyed typical...
As we all are aware that internet acts as a depository to store cyberspace data and provide service its user. cloud computing is technology by internet, where large amount of being pooled different users stored. The stored comes from various organizations, individuals, communities etc. Thus, security privacy utmost importance regardless the nature In this research paper use multiple encryption technique outlines protection. Also, what attacks issues might arise may corrupt data; therefore,...
Big Data is data of high volume and variety being produced or generated at velocity which cannot be stored, managed, processed analyzed using the existing traditional software tools, techniques architectures. With big many challenges such as scale, heterogeneity, speed privacy are associated but there opportunities well. Potential information locked in if properly leveraged will make a huge difference to business. help analytics, meaningful insights can extracted from heterogeneous nature...
Enterprise Resource Planning, ERP software has come a long way since its inception as Inventory Management and Control Systems of 1960s. The value Implementation Strategy been stressed over the years it included an important Critical Success Factor, CSF, recorded by previous researchers. Traditional implementation followed more or less sequential approach akin to Waterfall Model. Researchers have categorized methodology developed frameworks. These are based on varied observations. Given...
The world is exceedingly reliant on the Internet. Nowadays, web security biggest challenge in corporate world. It considered as principle framework for worldwide data society. Web applications are prone to attacks. securing a application layer from attacks by unauthorized users. A lot of issues that occur over mainly due improper input provided client. This paper discusses different aspects and it's weakness. main elements techniques such passwords, encryption, authentication integrity also...
Brain tumor diagnosis is a complex task due to the intricate anatomy of brain and heterogeneity tumors. While magnetic resonance imaging (MRI) commonly used for imaging, accurately detecting tumors remains challenging. This study aims enhance classification via deep transfer learning architectures using fine-tuned learning, an advanced approach within artificial intelligence. Deep methods facilitate analysis high-dimensional MRI data, automating feature extraction process crucial precise...
Cancer has been considered an incurable disease since its inception and had intimidating effect on mankind. Rapid technological advancement medical breakthroughs have indeed thwarted threat. is curable, provided it gets detected in the nascent stage. A growth or sore mouth that doesn't heal first sign of oral cancer. Despite advanced radiation therapy chemotherapy available, fatality rate projects a grim picture with enormous scope for improvement. This study aims to broaden use artificial...
During the last two decades many researchers have analyzed reliability growth of software during testing and operational phases proposed mathematical models to estimate predict measures. on detection a failure fault that has caused is isolated removed. Most existing research in this area considers similar efforts strategy are required each debugging effort. However may not be true practice. Different faults require different amount for their removal. In modeling order incorporate phenomenon...
Sentimental Analysis is one of the most popular technique which widely been used in every industry. Extraction sentiments from user's comments detecting user view for a particular company. can help predicting mood people affects stock prices and thus prediction actual prices. In this paper sentimental analysis performed on data extracted Twitter Stock Twits. The analyzed to compute comment. These are categorized into four category happy, up, down rejected. polarity index along with market...
Remote patient health monitoring system is an IoT device which could be used with patients or elderly at our homes whose real time readings such as temperature, blood pressure and electro-cardiogram monitored remotely on a hand held device. This will automatically send alert to the users in case of emergency this would fluctuation sensors beyond normal range. build using thermometer, sensor sphygmomanometer attached arduino transfer its data servers wifi-module. The then compute can...
The advancement of Internet Technology has lead to cyber crime, security issues, intruders and hackers. Social Media platforms have gained tremendous popularity as it is the most effective efficient way communicate share information. Over billion users are connected through lack awareness regarding privacy concern leads increase crime. Cyber Crime investigation one wide range applications Data Mining can be used predict & detect This benefits society promotes better living. In this research...
Deaths due to cardiovascular diseases are increasing at an alarming rate. It led nearly 2.1 million deaths in India 2015. Being one of the deadliest reasons death worldwide, heart have majorly affected lives rural people. According a recent study, it was found that disease among Indians surpassed those urban Indians. Such figures concerning, especially when 68% Indian population areas having poor access quality healthcare. This paper aims provide solution this problem by introducing new...
Intrusion Detection Systems (IDS) are administered by analysts for analysing system logs or data packets to predict malware in the network traffic. IDS automate this process continuously increasing using techniques based on machine learning and artificial intelligence, enabling packet detection without much human effort intervention. Using develop such systems can greatly influence delivering accurate faster results with complex intricate providing human-like responses, which have become...
India is a country where major source of living and economy through agriculture agricultural industry Prediction prices in commodity has always been problem for the farmers. Farmers aren't able to get desired price their crops that's why suicide rate increasing with every passing year. This paper mainly focuses on proposing decision making support model prediction commodities. also includes techniques data mining that will help farmers predict prices. The objective this project build system...
Mobile Ad-hoc network (MANET) is a collection of arbitrary moving autonomous nodes having routing capabilities. Theoretically, are expected to cooperate with each other facilitate communication not directly connected but in real scenario some the may be malicious. These compromised /malicious part or any node trying intrude network. A trust based framework proposed this paper make resilient malicious nodes. Trust calculated using route request and reply counter it simple scalable. Ad Hoc On-...
The e-healthcare management system could be enchanced extremelyby connecting tocurrent trend technology. This paper suggested a model of grouping adaptable services administration framework dependent on Cloud Computing. Along these lines, this prescribed planning distributed computing. recommended has been enhanced and incorporates different divisions to create healthcare framework. Health Data Management System based the client side, simple cloud application side creates readily attainable...
Sentiment Analysis or opinion mining have taken many leaps and turns from its starting in early 2000's till now. Advancement technology, mobile & internet services ease of access to these resulted more engagement people on the social media platforms for expressing their views collaborate with who share similar thoughts. This has led generation a large amount data subsequently need analysing this data. The sentiment analysis helps different organisations know how look products what changes...
To achieve higher security for IoT devices, in order to protect their network connection and commanding, lightweight encryption standard or techniques will be used decryption avoid the intruders access information. As small devices don't have huge processing storing power so they can only support light protocols. One should strong enough processor devices. In an existing network, there are very few cryptography standards which protection of An intruder break through control without physical...