- Network Security and Intrusion Detection
- Cryptography and Data Security
- Chaos-based Image/Signal Encryption
- Anomaly Detection Techniques and Applications
- Mobile Ad Hoc Networks
- Advanced Steganography and Watermarking Techniques
- Optimal Power Flow Distribution
- IoT and GPS-based Vehicle Safety Systems
- Microgrid Control and Optimization
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Artificial Intelligence in Healthcare
- Internet of Things and AI
- Stochastic Gradient Optimization Techniques
- Smart Grid Energy Management
- Computational and Text Analysis Methods
- Artificial Intelligence in Healthcare and Education
- AI in cancer detection
- Non-Invasive Vital Sign Monitoring
- Physical Unclonable Functions (PUFs) and Hardware Security
- UAV Applications and Optimization
- IoT-based Smart Home Systems
- Digital Media Forensic Detection
- IoT Networks and Protocols
- Brain Tumor Detection and Classification
Vikrama Simhapuri University
2024
Guntur Medical College
2022-2024
Minto Ophthalmic Hospital
2024
Bangalore Medical College and Research Institute
2024
G Pulla Reddy Dental College & Hospital
2024
Institute of Engineering
2017-2023
Bangalore University
2007-2010
Several technological and informational technologies are currently developing quickly profoundly altering our contemporary way of life. The Internet Things (IoT) has become one the most well-known frequently discussed out all those now in use. Researchers, doctors, patients facing a wide range new opportunities difficulties as result development numerous technologies. Yet, it is becoming increasingly challenging to manage process massive amounts data they produce on local systems. Cloud...
IoT, a global technology paradigm, allows variety of devices to be online at any time and from location. But the widespread use IoT has made them vulnerable risks vulnerabilities. Data breaches within networks, particularly those that exist beyond fog layer, have escalated as more businesses applications. In order address this security concern, deep learning models gained popularity threat detection mitigation techniques. An SSRNN-ELM hybrid approach is suggested in study for identification...
The safe storing of sensitive data, particularly image is crucial in the current digital world. Image data may not be sufficiently protected from sophisticated cyber threats by using traditional encryption techniques. This research suggests an innovative method for cloud security that incorporates steganography into architecture. art and science discreetly hiding within other so as to avoid suspicion known steganography. Steganography used this suggested design embed cover files appear...
Skin diseases are very common in our daily lives. In the present era, prevalence of skin is significant, resulting it being a prevalent health concern. Due to similarities appearance different conditions, automatically classifying them using lesion images poses challenging task.A small circular or randomly shaped spot on patient's may be identified as indicative disease. Under certain circumstances, this illness can represent serious threat when transforms into cancer. Multi-Class Diseases...
In today's linked world, essential infrastructure must be protected from unauthorized access. Traditional security measures often depend on closed-circuit television (CCTV) systems for perimeter monitoring. However, developing technologies provide substantial opportunity improving standards. This study presents a novel technique achieving enhanced real-time, long-range object monitoring capabilities by combining modern edge computing and varied spectrum of sensors, including LiDAR (Light...
Automation and control systems are becoming more networked thanks to the Industrial Internet of Things (IIoT). The SCADA network has also developed into a open interconnected system. In addition, by connecting industrial electronic devices network, interconnectivity efficiency methods have been significantly increased owing monitoring benefits SCADA. system is inextricably linked public security breaches cyber-attacks legitimate worry for We propose deter attackers from launching distributed...
Assessing significant AI moves toward that are utilized for the recognition of critical digital dangers in advanced climate is reason this exploration drive. In particular, centers around three vital ways to deal with AI: profound conviction organizations, choice trees, and backing vector machines! A comprehensive examination concerning these strategies remembered assessment. The will zero on spam discovery, interruption recognition, malware location, it utilize datasets consistently used as...
Summary Providing security to the data that stored in personal health record (PHR) is an emerging and critical task recent years. For this purpose, some of encryption key generation techniques are developed traditional works. But it has drawbacks such as lacks access control policies, reduced security, ineffective. So work implemented efficient techniques, namely, elliptic curve Diffie‐Hellman for secret identity attribute–based improving cloud data. Initially, user can request patient's PHR...
Cloud computing empowers the prototypical of data service outsourcing. To defend concealment, penetrating cloud has to be encrypted before outsourced salable public cloud. Traditional searchable encryption techniques provision only Boolean search and are not yet plenty meet operative utilization need that is inherently demanded by large number users enormous amount files in In this project, we delineate elucidate tricky sheltered ranked keyword over data. Ranked momentously enhances system...
Modern cyber security relies heavily on intrusion detection in network traffic to quickly identify and mitigate threats. Conventional systems frequently depend lone, stand-alone models that could find it difficult change with the ways attacks are evolving. In order overcome this difficulty, research study provides an ensemble-based strategy improves threat effectiveness accuracy by utilizing strength of several models. Increasing measures against data breaches invasions is essential due...
Many people use the Library Management System daily, yet many cannot access books in real-time. For a user, having system that can forecast availability of issued would be pretty helpful. Data from library is utilized this study to indicate when reader will available. Keres and SKlearn compare random forest, support vector, neural network results. The study's findings suggest published may tracked managed. Using model learned, it possible anticipate Because this, less accurate analyze data...
Artificial intelligence (AI) enables the diabetic patient's symptoms and biomarkers to be monitored. People with diabetes are weak, if a COVID-19 infection is present, patient must managed optimally, focus on fighting virus while simultaneously maintaining homeostasis glycemic control. This study examines present state of knowledge limitations in using AI prevent manage individuals infection. Furthermore, engagement care improved by media online. These innovative technological advancements...
This paper presents Adaptive Mutation Particle Swarm Optimization algorithm for minimization of losses a Reconfigured Radial Distribution Network. The salient feature the is, ability particle swarm optimization (PSO) to break away from local optimum is greatly improved by mutation. basic idea proposed is: during running time mutation probability adjusts in accordance variance population’s fitness and current optimal solution. Due this, will search regions where possibility locating more...