Ranjeet Kumar Singh

ORCID: 0000-0002-0670-723X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • QR Code Applications and Technologies
  • Vehicle License Plate Recognition
  • Optimization and Mathematical Programming
  • Diabetes and associated disorders
  • Liver Disease Diagnosis and Treatment
  • Advanced Data Compression Techniques
  • COVID-19 Clinical Research Studies
  • Fault Detection and Control Systems
  • Multi-Criteria Decision Making
  • Advanced Malware Detection Techniques
  • Coronary Artery Anomalies
  • Pancreatic function and diabetes
  • COVID-19 Impact on Reproduction
  • Advanced Combustion Engine Technologies
  • High Entropy Alloys Studies
  • Adipokines, Inflammation, and Metabolic Diseases
  • Vascular anomalies and interventions
  • Video Coding and Compression Technologies
  • COVID-19 diagnosis using AI
  • Long-Term Effects of COVID-19
  • Mechanical Engineering and Vibrations Research
  • Additive Manufacturing Materials and Processes

Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2022-2023

Sarala Birla University
2021-2022

Central Potato Research Institute
2021

Dehradun Institute of Technology University
2015-2021

Madan Mohan Malaviya University of Technology
2021

National Institute of Technology Jamshedpur
2015-2020

Government Medical College
2019

Cleveland Clinic
2016

University of Kent
2015

Apex Heart Institute
2015

This paper introduces a simplified presentation of new computing procedure for solving the fuzzy Pythagorean transportation problem. To design algorithm, we have described arithmetic and numerical conditions in three different models environment. achieve our aim, first extended initial basic feasible solution. Then an existing optimality method is used to obtain cost transportation. justify proposed method, few experiments are given show effectiveness model. Finally, some conclusion future...

10.1007/s40747-019-0108-1 article EN cc-by Complex & Intelligent Systems 2019-05-06

Aluminum phosphide (ALP) poisoning is one of the major causes suicidal deaths. Toxicity by ALP caused liberation phosphine gas, which rapidly cell hypoxia due to inhibition oxidative phosphorylation, leading circulatory failure. Treatment toxicity mainly supportive as there no specific antidote. We recently managed 7 cases with severe hemodynamic effects. Patients were treated measures including gastric lavage diluted potassium permanganate, coconut oil and sodium-bicarbonate first person...

10.4103/0972-5229.151019 article EN Indian Journal of Critical Care Medicine 2015-01-01

Now a day information security is the biggest issue of social network. there are numerous technique available for image and data security, watermarking one them. Digital way which used to verify authenticate texts, image, video etc. Watermarking Technique not only video, audio it's also authentication, protection, rights documents In this perspective experiment we explain impact different noise on LSB Watermarking, Experimental Analysis its effect watermarking. The results simulated by...

10.1016/j.procs.2015.06.071 article EN Procedia Computer Science 2015-01-01

Informal availability of Internet and easy accessibility network resources to a general public has created new era security design challenge for multimedia contents which is available in the form image, text, video audio etc. This paper presents novel technique employ mechanism transmission digital over network. The proposed method uses multilevel image encryption/decryption algorithm based on quantum chaos map sparse sampling. In initial phase an original divided into blocks equal size each...

10.1016/j.jksuci.2018.05.012 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2018-06-01

To enhance the conventional LSB technique of digital image watermarking, paper introduces a novel approach based on matrix multiplication process. This selects non-consecutive pixels to replace last three bits each RGB components cover by watermark image. The filtering process is applied block select suitable for embedding Extraction just reverse non-uniform substitution makes system more vigorous in terms robustness, imperceptibility and security. Although proposed method non blind type...

10.1016/j.jksuci.2021.01.013 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2021-02-05

Now days, the protection of digital data in multimedia communication, form image, text, video and audio has become an important problem because it can be copied modified easily. Therefore, with rapid development network systems, content authenticationand copyright have challenging issues. In past couple years, a lot techniques been proposed to address these issues watermarking technique is one them. This hides piece media/information original image this hidden media used for purpose...

10.1080/02522667.2017.1372137 article EN Journal of Information and Optimization Sciences 2017-08-18

In this paper a novel image based data security and authentication based, watermarking scheme that combines the discrete wavelet transform (DWT) Singular value decomposition (SVD) is proposed. This explains dual with different algorithm. At first original divided into its appropriate levels by using DWT, convert LL sub-band to red, green blue component, obtained colour component of non-overlapping blocks, final apply SVD on each block singular for watermarking. The second chose HH converts...

10.1080/02522667.2017.1372153 article EN Journal of Information and Optimization Sciences 2017-11-10

Now a days, in communication technology safety of digital data the form text, image, and video, audio is biggest problem. With rapid development network multimedia systems, security issue. Digital watermarking one solutions to these problems. It hides some secret into original image this information use for authentication security. This paper Focus an application using Hybrid approach Cryptography technique dual purpose Providing highly data. cryptography QR Code combined LSB DCT water...

10.4018/ijisp.2018010101 article EN International Journal of Information Security and Privacy 2017-10-17

Hip replacement is a surgical process where natural hip joints are replaced by artificial joint that helps the human being for getting better lifestyle reduction in unavoidable pain and leg movement. The selection of material durability serious significance implantation, because it determines how load transferred through stem. In materials, various problems related to found like adverse tissue reaction, allergic wear corrosion resistance etc. To overcome this problem one has create different...

10.4314/ijest.v13i1.4s article EN International Journal of Engineering Science and Technology 2021-07-08

Now days, digital data security over network is a big issue. Digital and authentication challenge able research area in the field of computer science. A lot mechanisms are available for privacy. For purpose secure communication encryption mechanism available, also several watermarking techniques available. In this paper authors mainly focus based on image approach by using least significant bit substitutions. Here represent comparative studies different LSB approach.This focuses spatial...

10.4018/ijsesd.298332 article EN International Journal of Social Ecology and Sustainable Development 2022-02-25

This paper presents a new metamaterial, based on SRR structure and systematically investigate the various properties of metamaterial structure. The resonant frequency proposed is first estimated using its equivalent circuit model value thus obtained then compared with values by High Frequency Structure Simulator (HFSS) simulations. negative refraction in unit cell demonstrated estimating ε µ placing waveguide well defined PEC/PMC boundary conditions. Finally cells are combined...

10.5897/sre2014.5827 article EN Scientific Research and Essays 2015-02-28

This article represents a dual security mechanism based on compressive sensing, quantum chaos map, random pixel exchange, and frequency division approach. It also provides the digital data authentication system combined approach of DWT SVD. Two watermarks are used for purposes sensing is to provide parallel compression encryption. The detail algorithm explained in next section. more effective than other conventional approachs takes less time space complexity others i.e. AES, DES RSA type...

10.4018/ijsesd.326758 article EN cc-by International Journal of Social Ecology and Sustainable Development 2023-07-24

10.33545/26174693.2024.v8.i10sf.2524 article EN International Journal of Advanced Biochemistry Research 2024-10-01

This paper presents a method for evaluating the utility of deep transfer learning in development classifier detecting COVID-19 positive patients using CT scan images. Deep Learning (DL) is good at cases, according to research. For expanding training dataset reduce overfitting and improve model's generalization capacity data augmentation approach employed. The proposed study has evaluated set pretrained neural networks Convolutional Neural Network (CNN). suggested model used DenseNet with Res...

10.1109/icirca54612.2022.9985655 article EN 2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA) 2022-09-21

This paper aims to showcase one of the latest automatic identification technology concepts.In recent past concept Quick Response Code (QR Code) has attained a significant recognition and is being used as data representation mean.2D Barcode are widely due high capacity storage fast processing step, QR such types 2D barcode.Advertising education top most span where utility this application continues grow.This on providing detailed information all concepts Code.It expresses significance,...

10.5120/10463-5174 article EN International Journal of Computer Applications 2013-02-15

Objective: The objective of the study was to epidemiological and clinical profile COVID-positive children without pre-existing comorbidities at a dedicated COVID care hospital in eastern state Jharkhand. Materials Methods: This retrospective conducted Jharkhand on up 18 years age admitted between May 2020 October 2020. case files all children, with positive reverse transcription polymerase chain reaction (RTPCR) report for severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) virus,...

10.32677/ijch.2021.v08.i05.001 article EN Indian Journal of Child Health 2021-05-25
Coming Soon ...