- Image Retrieval and Classification Techniques
- Advanced Image and Video Retrieval Techniques
- Digital Media Forensic Detection
- Medical Image Segmentation Techniques
- Video Analysis and Summarization
- Image and Signal Denoising Methods
- Big Data and Business Intelligence
- Advanced Steganography and Watermarking Techniques
- Organ Donation and Transplantation
- Image Processing Techniques and Applications
- Renal and Vascular Pathologies
- Advanced Image Fusion Techniques
- Cloud Computing and Resource Management
- Advanced Wireless Communication Technologies
- Advanced Wireless Communication Techniques
- IoT-based Smart Home Systems
- Wireless Communication Networks Research
- Pediatric Urology and Nephrology Studies
- Urological Disorders and Treatments
- Image Processing and 3D Reconstruction
- Traffic control and management
- Cooperative Communication and Network Coding
- Traffic Prediction and Management Techniques
- IoT and Edge/Fog Computing
- Renal Transplantation Outcomes and Treatments
Jaypee University of Engineering and Technology
2015-2024
Sir Ganga Ram Hospital
2014-2024
Shobhit University
2022-2023
All India Institute of Medical Sciences Jodhpur
2023
Shell (Netherlands)
2022
Luton and Dunstable Hospital
2021-2022
Centre for Development of Telematics
2011-2020
University College of Medical Sciences
2013-2020
Guru Teg Bahadur Hospital
2013-2020
University of Delhi
2013-2020
Abstract Image manipulation has become an easy task due to the availability of user-friendly multimedia tools. The images can be manipulated in several ways. splicing is one such image methods which two or more are merged obtain a single composite image. These misused cheat others. This paper proposes deep learning-based method detect images. First, input preprocessed using technique called ‘Noiseprint’ get noise residual by suppressing content. Second, popular ResNet-50 network used as...
The paper discusses numerical prediction of erosion wear trends in centrifugal pump casing pumping dilute slurries. geometry is considered two-dimensional. Discrete Phase Model (DPM) FLUENT 6.1® utilized to obtain slurry flow field through the employing two-way coupling. Standard k — ε model used for turbulence. Effect several operational parameters viz. rate, speed (RPM), particle diameter and various conditions tongue curvature, slope discharge pipe width studied. Qualitative described...
Involvement of agrochemicals have been suggested in the development chronic kidney disease unknown etiology (CKDu). The association between CKDu and blood level organochlorine pesticides (OCPs) patients has examined present study.All recruited study subjects (n = 300) were divided three groups, namely, healthy control 100), with known (CKDk) 100). Blood OCP levels all groups analyzed by gas chromatography.Increased OCPs, namely α-HCH, aldrin, β-endosulfan, observed as compared to CKD...
This digital watermarking protocol is basically applied to preserve the rights for both parties involving in E-commerce i.e. buyer and seller. Principal component analysis used reduce correlation coefficient. uses wavelet transform with principal integrates techniques public key cryptosystem proving ownership of content. In this paper a watermark image that baby inserted into selected high frequency sub-bands discrete transformed. Then we have transformation selecting blocks. The process...
Image restoration is the operation of taking a degraded image and estimating clean image. Degradation in an occurs primarily due to blur noise. Restoration attempts reconstruct or recover that has been by using apriori knowledge degradation phenomenon. Thus techniques are oriented toward modeling applying inverse process order original This paper starts with basic model degradation/restoration proceeds towards enlisting commonly occurring blurs noises. Thereafter, it reviews some spatial...
Nowadays Intrusion Detection System (IDS) which is increasingly a key element of system security used to identify the malicious activities in computer or network.There are different approaches being employed intrusion detection systems, but unluckily each technique so far not entirely ideal.The prediction process may produce false alarms many anomaly based systems.With concept fuzzy logic, alarm rate establishing intrusive can be reduced.A set efficient rules define normal and abnormal...