- Advanced Steganography and Watermarking Techniques
- Supply Chain and Inventory Management
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Software Reliability and Analysis Research
- Sustainable Supply Chain Management
- Software Testing and Debugging Techniques
- Software Engineering Research
- Advanced Malware Detection Techniques
- Software System Performance and Reliability
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Software Engineering Techniques and Practices
- Cloud Data Security Solutions
- Optimization and Mathematical Programming
- Big Data and Business Intelligence
- Imbalanced Data Classification Techniques
- Health and Medical Research Impacts
- Digital Media Forensic Detection
- Innovations in Medical Education
- Health Sciences Research and Education
- Telecommunications and Broadcasting Technologies
- ERP Systems Implementation and Impact
- Leaf Properties and Growth Measurement
- Advanced Queuing Theory Analysis
National Institute of Technology Jamshedpur
2014-2024
University of Southern Queensland
2022-2024
Khyber Medical College
2024
COMSATS University Islamabad
2022-2023
Indus Hospital
2023
Health Net
2023
Arab Open University
2022
Kaloji Narayana Rao University of Health Sciences
2022
Northwest General Hospital and Research Center
2019-2022
Division of Computer and Network Systems
2022
The Internet has become a vital source of knowledge and communication in recent times. Continuous technological advancements have changed the way businesses operate, everyone today lives digital world engineering. Because Things (IoT) its applications, people's impressions information revolution improved. Malware detection categorization are becoming more problem cybersecurity world. As result, strong security on could protect billions internet users from harmful behavior. In malware...
Informal availability of Internet and easy accessibility network resources to a general public has created new era security design challenge for multimedia contents which is available in the form image, text, video audio etc. This paper presents novel technique employ mechanism transmission digital over network. The proposed method uses multilevel image encryption/decryption algorithm based on quantum chaos map sparse sampling. In initial phase an original divided into blocks equal size each...
Recently, the life in Earth becomes turbulent with worldwide spread of novel coronavirus (COVID-19). This outbreak has been declared as a public health emergency level international concern by world organization (WHO). To reduce COVID19 entire adopted social distancing, where working and learning from home is new normal for this world. sustain economical revenue business growth companies that radically move into cloud infrastructure to support employees, who work remotely. With unprecedented...
Steganography is a hidden way of communication, where one person communicates with the other by using some medium under garb cover, without any suspicion created on part unauthorized intermediary about existence secret message. Linguistic steganography hiding information in natural language text. Synonym substitution an important transformation used linguistic steganography. In this paper, we are going to show method redesigning change tracking technique for message Microsoft Word document...
Background: Type 2 Diabetes develops in adulthood, and is caused due to failure of pancreatic B-cells secrete insulin, gradually causing desensitization glucose, leading insulin resistance1-5. According American Association, the chronicity this disease, long-term complications arise which mostly occur hyperglycemia microvascular macrovascular damage6. This brings about significant damage heart, eyes(retinopathy), kidneys (chronic kidney disease) nerves(neuropathy).5 Metabolic...
The most important and crucial activity to develop good quality software is testing. in testing find optimal test suite input domain satisfy a certain adequacy criteria. So an efficient approach generate data prime issue This paper proposes novel automatically for flow based on hybrid adaptive PSO-GA algorithm. APSO-GA developed conquer the weakness of GA PSO algorithms, especially A new fitness function also designed basis concept dominance relations, branch weight distance guide search...
Rijndael's Advanced Encryption Standard (AES) is the block cipher based symmetric-key cryptography to protect sensitive information.The key sizes of AES are 128, 192, 256 bits.AES on substitution-permutation strategy.It accepted by NIST in 2001 after five year security evaluation.It highly secured and efficient than Data (DES) other cryptographic algorithms.This paper depicts all valuable work done since it National Institute Standards Technology (NIST).
Steganography is the tactics of silent communication, where one person communicates with others through cover medium so that intermediary does not has suspicion about hidden information. In this paper we propose a modified approach for text steganography based on HTML tags and attributes. As rich in its attributes, easily communicated internet, source code checked rarely by anybody it can be used intelligently to perform steganography. By hiding secret data inside HTML, achieved. relation...
Developing organizations are spends lots of money to finding the Errors and bugs. In this article, an application defects removal effectiveness improve software quality fault prone analysis, methods solution parameters in linear regression models with cost estimating method. It describes approach quantitative management through defect statistical process control analysis historical project data. Software is going continuously monetary benefit perform well planning, achieve a new height....
Objectives: It is a challenging task to generate and identify an optimal test set that satisfies robust adequacy criterion, like data flow testing. A number of heuristic meta-heuristics algorithms GA, PSO have been applied optimize the Test Data Generation (TDG) problem. The aim this research work handle automatic Methods/Statistical Analysis: This focuses on application Artificial Bee Colony (ABC) algorithm guided by novel Fitness Function (FF) for TDG construction FF based concept...
The advancement of computer technology has raised significant issues with digital content piracy and copyright law. A popular method protecting related uses is watermarking. Various algorithms have been developed to address the need for invisible performance robustness in watermarking schemes. Here, we proposed a novel evolutionary algorithm, hybrid Grass Hopper Optimization Genetic algorithm (HGOAGA) optimizing multiple scaling factors scheme frequency domain Discrete Wavelet Transformation...
Background: Images are widely stored and transformed over public channel for communication, medical purpose or organizational uses. Mostly the images collected from remote location, therefore confidentiality of data becomes most important matter concern. The convenient way to protect (image) is encrypt it right after capturing sensors at locations. There a large number patents registered till date. We have covered all benchmark on encryption. Objective: This paper furnished an enhanced...