- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Hydrological Forecasting Using AI
- COVID-19 diagnosis using AI
- SARS-CoV-2 detection and testing
- SARS-CoV-2 and COVID-19 Research
- Geophysical and Geoelectrical Methods
- Groundwater flow and contamination studies
- EEG and Brain-Computer Interfaces
- Spam and Phishing Detection
- Web Application Security Vulnerabilities
- Big Data and Digital Economy
- Advanced X-ray and CT Imaging
- IoT-based Smart Home Systems
- Artificial Intelligence in Healthcare and Education
- Blockchain Technology Applications and Security
- Anomaly Detection Techniques and Applications
- Nuclear and radioactivity studies
- Micro and Nano Robotics
- Data Visualization and Analytics
- Fire Detection and Safety Systems
- Internet of Things and AI
- Biosensors and Analytical Detection
- Physical Unclonable Functions (PUFs) and Hardware Security
University of Houston - Victoria
2020-2025
University of Houston
2023-2025
Florida International University
2017-2019
Raritan Bay Medical Center
2017
Gujarat Technological University
2016
Nuclear infrastructure systems play an important role in national security. The functions and missions of nuclear are vital to government, businesses, society citizen's lives. It is crucial design for scalability, reliability robustness. To do this, we can use machine learning, which a state the art technology used various fields ranging from voice recognition, Internet Things (IoT) device management autonomous vehicles. In this paper, propose develop learning algorithm perform predictive...
In everyday life, electricity is necessary, and proper use critical. To strengthen home control, the existing systems have been examined over years. However, PMAS method’s error ratio higher does not allow for a remote monitoring system. Therefore, this study proposes smart control system (SMACS) household appliances. The application’s significance to monitor appliances’ usage using hardware Internet of Things (IoT) methods. prototype proposed designed developed considering Arduino UNO,...
People's health is adversely affected by environmental changes and poor nutritional habits, emphasizing the importance of awareness. The healthcare system encounters significant challenges, including data insufficiency, threats, errors, delays. To address these issues advance medical care, we propose a secure prediction method, prioritizing patient privacy transmission efficiency. Quantum-inspired heuristic algorithm combined with Kril Herd Optimization (QKHO) introduced for prediction,...
Australia faces a dryness disaster whose impact may be mitigated by rainfall prediction. Being an incredibly challenging task, yet accurate prediction of plays enormous role in policy making, decision making and organizing sustainable water resource systems. The ability to accurately predict patterns empowers civilizations. Though short-term predictions are provided meteorological systems, long-term is has lot factors that lead uncertainty. Historically, various researchers have experimented...
The emergence of new SARS-CoV-2 variants made the COVID-19 infection pandemic and/or endemic more severe and life-threatening due to ease transmission, rapid infection, high mortality, capacity neutralize therapeutic ability developed vaccines. These consequences raise questions on established management strategies based nano-assisted approaches, including diagnostics, therapeutics, efficient trapping virus eradication through stimuli-assisted masks filters composed nanosystems. Considering...
Abstract The growing cognizance of spectrum scarcity has become a more significant concern in wireless radio communications. Due to the exponential growth data transmission intelligent sensor networks, energy detection promising solution for resolving shortages. Primary user emulation attack (PUEA) been identified as vector cognitive (CR) domain's physical layer. In comparison, CR is method increase efficiency by allowing unlicensed secondary users (SUs) access licensed frequency bands...
Student attendance system is used to measure student participation in a classroom. Before pandemic was taken manually like sheets or registers. But when the hit, everything online, so even classes. The count very important problem that administrator needs be more careful about taking during online classes as there are many chances of proxy happening. So, we came up with this proposed "Student using QR code" This paper proposes an based on code-based system. students need scan class according...
Millions of lives could be saved annually if liver tumours detected early with computed tomography. But it's a huge strain for radiologists to read hundreds or even tens these CT scans. Therefore, developing an autonomous, rapid, and reliable method reading, detecting, assessing scans is important. However, extracting the region from bottleneck any approach. This paper introduces three-part automatic process. Initial processing includes noise suppression image enhancement. Optimized...
The monitoring of groundwater levels hexavalent chromium is a vital task for the US Department Energy's (DOE) remediation efforts at Hanford Site, decommissioned nuclear production facility operated by Office Environmental Management. While previous methods have shown promise accurately modeling contaminants concern DOE sites, some contaminants, such as chromium, remain challenge to model due high variability and frequency data collection. Recent Machine Learning (ML) techniques...
Objectives: This work aims to develop an automated video summarising methodology and timestamping that uses natural language processing (NLP) tools extract significant information.Methods: The comprises extracting the audio from video, splitting it into chunks by size of pauses, transcribing using Google's speech recognition. transcribed text is tokenised create a summary, sentence word frequencies are calculated, most relevant sentences selected. summary quality assessed ROUGE criteria,...
Change detection (CD) is the process of detecting changes from multi-temporal satellite images that have undergone spatial due to natural phenomena and/or human-induced activities. Mango a major fruit crop in India, but mango crops remains challenging task because reason many perennial similar reflectance profiles. Therefore, potent change technique required for different applications such as rate deforestation, urban developments, damage evaluation, and resource monitoring. Compared annual...
The modern web application processes a huge amount of data to deliver customized services the users, lack security makes this becomes victim cyberattacks. injection attacks line SQLI and XSS are that commonly take place. firewall is implemented in various layers OSI model provide for assets. Each layer uses different techniques provides functionality prevent attack. One important designs Application firewall, which also known as WAF, used examine external request, protocols such XSS....
In this letter, we demonstrate that a multiple-input deep neural network architecture can be used for the solution of one-dimensional (1-D) second-order boundary value problem. We investigate 1-D Poisson equation, while using sinc- and cosine-type functions to emulate typically found electromagnetic field distributions. Network architecture, modeling derivative, condition criteria are implemented, test cases validation. For considered problems, obtain -80 dB error convergence in 8.2 s,...
The U. S. Department of Energy's Office Environmental Management handles one the world's most significant groundwater and soil remediation efforts. Hanford Site in Washington State contains several decommissioned nuclear production reactors, laboratories, chemical reprocessing plants, which are source various contaminants concern reservoirs. While previous research has yielded insight into behavior at Site, plumes that contain carcinogens such as hexavalent chromium can be challenging to...
Rapid changes and new consequential attacks to IT infrastructure are precipitously on the rise requiring need for systems that designed enhance network security. The potential vulnerability of is ousted by these making ethical hackers aware impending their networks. Conducting a forensic analysis security ability collect analyze data find out evidence could lead specific break in intrusion detection. Wireshark protocol analyzer tool helps hacker reveal loop-holes cyber at user level. In this...