- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Smart Agriculture and AI
- Distributed and Parallel Computing Systems
- Scheduling and Optimization Algorithms
- Remote Sensing in Agriculture
- Spectroscopy and Chemometric Analyses
- Metaheuristic Optimization Algorithms Research
- Vehicular Ad Hoc Networks (VANETs)
- Fire Detection and Safety Systems
- Mobile Ad Hoc Networks
- Biometric Identification and Security
- Cloud Data Security Solutions
- Health, Environment, Cognitive Aging
- Mental Health Research Topics
- Network Security and Intrusion Detection
- Data Stream Mining Techniques
- Multidisciplinary Science and Engineering Research
- User Authentication and Security Systems
- Hydrological Forecasting Using AI
- Genetics and Plant Breeding
- Anomaly Detection Techniques and Applications
- Advanced Authentication Protocols Security
- Evolutionary Algorithms and Applications
Vellore Institute of Technology University
2013-2024
Chaudhary Charan Singh Haryana Agricultural University
2007
India is the cultivating country and our biggest maker in agricultural products. So, we have to classify exchange Manual arranging tedious it requires works. The automatic grading system less time for of Image processing technique helpful examination evaluating In this paper proposed a vegetable disease detection recognizing diseased vegetables. Here utilize reviewing Vegetables are recognized dependent on their features. features color, shape, size, texture. We extract these utilizing...
Task scheduling for virtual machines (VMs) has shown to be essential the effective development of cloud computing at lowest cost and fastest turnaround time. A number research gaps about job schedule optimization are included in current paper. thorough analysis data generated by this activity is resolving resource allocation mechanism architecture. To fully utilize with a similar weight distribution, strategy-oriented mixed support load balancing structure been developed work. minimize...
The process of mapping virtual machines to physical is known as machine placement. In cloud computing environment optimal placement plays an important role for the improvement in power efficiency and resource utilization. this paper, we study Ant Colony optimisation Multi-Objective Genetic Algorithm problem. We propose algorithm that combines both multi-objective ant colony optimization. also have designed architecture proposed system. algorithms were tested using some instances from...
Collaborative Cloud computing is an emergent and encouraging computational prototype for sharing on-demand cloud resources in a multi-cloud environment. In collaborative environment, we make use of unused within interconnected network to provide seamless service the customers. SLA (Service Level Agreement) means legal agreement signed among consumer provider guarantee better quality service. Nowadays due more user request, suppliers are not able deliver guaranteed Quality Service (QoS)...
With industrial development deepening, the share of energy in overall consumption has notably risen. To assess accurately, this paper proposes a method employing interval type-2 fuzzy sets (IT2FSs) to represent assessment information effectively. Additionally, it analyzes decision-makers (DMs) as social network alleviate individual biases. IT2FSs are chosen handle uncertainties assessing consumption. Addressing biases DMs' opinions, group consensus model aids reaching process (CRP)....
Data mining is a viable innovation to break down and extract patterns from crude information, which can change the original data into up-to-date information. Predictive analytics includes an assortment of factual systems that analyze present historical facts make forecasts about future or generally obscure occasions. Machine learning incorporates statistical methods for regression classification. The objective machine create predictive model unclear correct model. assessed relative execution...
The rising trend of online shopping has become increasingly prevalent in today's generation. With the convenience browsing and purchasing products from comfort one's own home, it reshaped way people shop. In this digital age, having a dedicated app necessity for businesses looking to tap into growing market. These apps offer seamless navigation, personalized recommendations, secure payment options, catering preferences expectations tech-savvy consumers. As world continues embrace e-commerce,...
Abstract Crop phenology has a vital role in sustainable agriculture, facilitating farmers to make informed decisions throughout the crop-growing season. The traditional method of phenological detection relies on vegetation index calculations and time-series data, which can be extremely costly difficult obtain. In contrast, deep learning algorithms estimate stages directly from images, overcoming Vegetative Index (VI)-based limitations. Unmanned Aerial Vehicles (UAVs) offer high spatial...
Cloud computing is a network of resources that are delivered to various customers as service over internet. Resources available dynamically the users; however, management in dynamic fashion stands vast area for researchers. Resource provisioning process determining, how allocated among user's request such way that, it has reduce overall response time and cost. Various want run different kinds applications on cloud server. Each customer may have quality (QoS) requirements based their...
The effects of the global pandemic are wide spreading. Many sectors like tourism and recreation have been temporarily suspended, but construction, development maintenance not halted due to their importance society. Such projects involve people working together in close proximity, thus leaving them susceptible infection. It is recommended that maintain social distance wear a face mask reduce spread COVID-19. To this effect, we propose COVID Vision - system consisting convolutional neural...
The Cloud Computing is a next generation platform, which provides virtualization with resource pool. There are three types of cloud service models, Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). Most the scientific research focus on IaaS model, manage storage. allows customer to scale based user demand only pays for usage. Data security plays crucial role in environment trust most challenging problem services. This paper proposed new...
Fraud and Identity Theft constitute for huge financial loss to the telecom industry fraud accounts a major cause of revenue loss. Among them, roaming has highest impact over network service providers, it also become concern few companies. The present paper intends provide solution on with help block chain-based network, which is used as secure data storage. This technology helps in minimizing loss, improving trust ensures reduction latency communication between host visitor provider....
Swarm Intelligence (SI) is increasing day by in the various research fields. There are many swarm-based optimizations introduced since early '60s, Evolutionary Algorithms (EA) most updated one. All have proved their capability to resolve of optimization problems. These algorithms using for training neural networks this paper. The main difficulty any problem selecting correct values parameters get possible results. idea best convergence rate and performance vary algorithms. This paper...
Mobile Ad-hoc Network (MANET) is a technology that has been developed for real-world applications. The routing information system of MANET can be said to the back bone process which also represents characteristics or behaviours nodes. performance improved if done based on nodes behaviours. Thus, classification and prediction behaviour could lead proper data analysis decision making through an effective model developed. Association among attributes help us predict similarity but it possible...
Cloud computing becomes an important application development platform for processing user data with high security. Service providers are accustomed to providing storage centers outside the trusted location preferred by owner. Thus, ensuring security and confidentiality of while in centralized network is very difficult. The secured key transmission between sender receiver a huge challenge managing most sensitive among cloud network. Intruders active over like real authenticated hack personal...
Vehicular Ad Hoc Networks (VANETs) is the most growing research area in wireless communication and has been gaining significant attention over recent years due to its role designing intelligent transportation systems. Wireless multi-hop forwarding VANETs challenging since data be relayed as soon possible through intermediate vehicles from source destination. This paper proposes a modified fuzzy-based greedy routing protocol (MFGR) which an enhanced version of fuzzy logic-based (FLGR). Our...
Task scheduling using Virtual Machines (VMs) has been essential for effectively developing cloud computing at the least cost and quickest time to provide resources. Numerous research gaps job schedule optimization are included in present article. It is examine data generated by this effort order address resource allocation mechanism existing architecture. To make most of virtual machines with a comparable weight distribution, strategy-oriented mixed support load balancing structure developed...