Arun Kumar

ORCID: 0000-0002-4184-0781
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Non-Invasive Vital Sign Monitoring
  • Wireless Body Area Networks
  • Reinforcement Learning in Robotics
  • Quality and Supply Management
  • Financial Reporting and Valuation Research
  • Accounting Theory and Financial Reporting
  • Smart Agriculture and AI
  • ECG Monitoring and Analysis
  • Outsourcing and Supply Chain Management
  • Recommender Systems and Techniques
  • Vehicle License Plate Recognition
  • Water Systems and Optimization
  • Speech and dialogue systems
  • Video Surveillance and Tracking Methods
  • Software System Performance and Reliability
  • Heart Rate Variability and Autonomic Control
  • Fractal and DNA sequence analysis
  • Leaf Properties and Growth Measurement
  • Robotics and Sensor-Based Localization
  • Numerical Methods and Algorithms
  • Music and Audio Processing
  • Traffic Prediction and Management Techniques
  • IoT-based Smart Home Systems

National Institute of Technology Rourkela
2022-2024

Sharda University
2024

National Institute of Technology Sikkim
2023

Laboratoire d'Informatique de Paris-Nord
2022

Chhatrapati Shahu Ji Maharaj University
2022

RMIT University
2010-2021

University of Georgia
2021

Madan Mohan Malaviya University of Technology
2020

University of Minnesota
2016-2019

University of Minnesota System
2019

Development of communication technologies and e-commerce has made the credit card as most common technique payment for both online regular purchases. So, security in this system is highly expected to prevent fraud transactions. Fraud transactions data transaction are increasing each year. In direction, researchers also trying novel techniques detect such frauds. However, there always a need some that should precisely efficiently these This paper proposes scheme detecting frauds which uses...

10.1109/icesc48915.2020.9155615 article EN 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC) 2020-07-01

Wireless sensor networks (WSN) became very popular in last few years. They are deployed distributed manner for collecting variety of data. There a lot research issues and challenges WSN viz; energy efficiency, security, localization etc. Outlier or anomaly detection is one such area to prevent malicious attacks reducing the errors noisy data millions wireless networks. models should not compromise with quality We have identify anomalies offline mode online accuracy, better performance intake...

10.1109/confluence47617.2020.9058311 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2020-01-01

IoT solutions improve the quality of patient care in healthcare system by allowing patients to connect devices that monitor and evaluate essential health data. However, massive amounts data generated carry serious security threats, which are self-inflicted detecting abnormal behaviours can indicate a possible breach or failure. Usually, anomaly detection is done employing heuristic algorithms on labeled datasets. real-world applications, several privacy barriers dump hinder obtaining This...

10.52783/jisem.v10i37s.6429 article EN Journal of Information Systems Engineering & Management 2025-04-18

IoT solutions improve the quality of patient care in healthcare system by allowing patients to connect devices that monitor and evaluate essential health data. However, massive amounts data generated carry serious security threats, which are self-inflicted detecting abnormal behaviours can indicate a possible breach or failure. Usually, anomaly detection is done employing heuristic algorithms on labeled datasets. real-world applications, several privacy barriers dump hinder obtaining This...

10.52783/jisem.v10i37s.6419 article EN Journal of Information Systems Engineering & Management 2025-04-18

This study looks at how corporate governance is being impacted by artificial intelligence (AI). The feasibility, acceptability, along with the obligation to automate board-level collective decision making are assessed from viewpoints of business, technology, and society. Five possibilities for AI suggested in article: aided, enhanced, amplified, autonomous, autopoietic intelligence. We evaluate strengths weaknesses both human machine learning, we examine consequences future governance. ends...

10.53555/bm.v11i1.6310 article EN IJRDO - Journal of Business Management 2025-01-01

Now-a-days, Internet of Things (IoT) based systems are developing very fast which have various type wireless sensor networks (WSN) behind it. These applications viz., healthcare, agricultural, industrial and military applications. Anomaly or outlier detection is one the important research problems in such where a huge amount data collected. helps to find out defective, erroneous, noisy nodes. There many techniques used detect anomalies. Machine learning algorithm (MLA) approaches much useful...

10.1109/ice348803.2020.9122865 article EN 2020-02-01

A portable parameter monitoring and analysis system for physiological studies assisting patient-centric health care management is developed. The uses the network approach to acquire data from sensors transmit them a server through wireless propagation means. automates acquisition of parameters by continuous display on monitor screen. Programming done using industry strength software trends in real time standard PC. measured accurate lives up standards industry.

10.1109/tim.2004.834595 article EN IEEE Transactions on Instrumentation and Measurement 2005-01-17

Machine learning algorithms have found several applications in the field of robotics and control systems. The systems community has started to show interest towards machine from sub-domains such as supervised learning, imitation reinforcement achieve autonomous intelligent decision making. Amongst many complex problems, stable bipedal walking been most challenging problem. In this paper, we present an architecture design simulate a planar robot(BWR) using realistic simulator, Gazebo. robot...

10.48550/arxiv.1807.05924 preprint EN cc-by arXiv (Cornell University) 2018-01-01

Temporal autocorrelation present in functional magnetic resonance image (fMRI) data poses challenges to its analysis. The existing approaches handling fMRI time-series often presume a specific model of such as an auto-regressive model. main limitation here is that the correlation structure voxels generally unknown and varies different brain regions because levels neurogenic noises pulsatile effects. Enforcing universal on all leads bias loss efficiency In this paper, we propose mixed...

10.1109/tmi.2016.2520024 article EN IEEE Transactions on Medical Imaging 2016-01-20

A telemetric system that can measure physiological parameters in an unobtrusive way and transmit it for remote monitoring prove to be quite useful providing the ambulatory patients with freedom of mobility while their health is being monitored continuously. Such a equally monitor vital signs service personnel e.g. firefighters working hazardous environment during course duty. In this paper similar system, has been designed & developed continuous monitoring, described. The uses RF GSM...

10.1109/sficon.2004.1287163 article EN 2004-06-10

10.1016/j.cam.2004.08.005 article EN publisher-specific-oa Journal of Computational and Applied Mathematics 2004-10-05

A portable parameter monitoring and analysis system for physiological studies assisting patient-centric health care management is developed. The uses network approach to acquire the data from sensors transmit on a server through wireless means. automates acquisition of parameters by continuous display monitor screen. programming done using software traces in real time standard PC.

10.1109/imtc.2003.1207884 article EN 2004-05-06

The vast majority of recommender systems model preferences as static or slowly changing due to observable user experience. However, spontaneous changes in are ubiquitous many domains like media consumption and key factors that drive not directly observable. These latent sources preference change pose new challenges. When do track adapt users' tastes, users lose confidence trust, increasing the risk churn. We meet these challenges by developing a novelty learns tracks tastes. combine three...

10.1145/3025171.3025180 article EN 2017-03-07

Animal behavior is not driven simply by its current observations, but strongly influenced internal states. Estimating the structure of these states crucial for understanding neural basis behavior. In principle, can be estimated inverting models, as in inverse model-based Reinforcement Learning. However, this requires careful parameterization and risks model-mismatch to animal. Here we take a data-driven approach infer latent directly from observations behavior, using partially observable...

10.48550/arxiv.1902.00673 preprint EN other-oa arXiv (Cornell University) 2019-01-01

Abstract Deep learning models have become state of the art in many language modelling tasks. Among such tasks, source code auto-completion is one important areas research. This paper presents various methodologies for using different Learning Python and CSharp Programming Languages. In a resource-limited environment, it paramount to reduce overheads: way achieving that use sequences train evaluate rather than other structures as semantics. compares deep architectures like CodeGPT [1] from...

10.1007/s40747-022-00708-7 article EN cc-by Complex & Intelligent Systems 2022-04-06

10.1007/s11390-012-1260-x article EN Journal of Computer Science and Technology 2012-07-01

Modern computer vision technologies have served to bridge the gap between contemporary scientific analysis and machine learning assisted digital processing. Within field of biomechanics, applied strategies incorporating both conventional means shown great success in augmenting observations electromyogram graphical sensors; albeit within constraints specialized, multiple-source arrays. The ongoing study represents an endeavor utilize several distinct achieve similar results with application a...

10.47974/jdmsc-1741 article EN Journal of Discrete Mathematical Sciences and Cryptography 2023-01-01
Coming Soon ...