- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Generative Adversarial Networks and Image Synthesis
- Image Retrieval and Classification Techniques
- Advanced Optical Network Technologies
- AI in cancer detection
- Handwritten Text Recognition Techniques
- Image Processing Techniques and Applications
- Spam and Phishing Detection
- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Digital Imaging for Blood Diseases
- Cell Image Analysis Techniques
- Brain Tumor Detection and Classification
- Security in Wireless Sensor Networks
- Law in Society and Culture
- Anomaly Detection Techniques and Applications
- Wildlife-Road Interactions and Conservation
- Vehicle License Plate Recognition
- IoT-based Smart Home Systems
- Wireless Body Area Networks
- Artificial Intelligence in Healthcare
- EEG and Brain-Computer Interfaces
- Advanced Malware Detection Techniques
- Rabies epidemiology and control
Punjab Agricultural University
2021-2024
Indian Institute of Technology Jammu
2024
Rajasthan University of Veterinary and Animal Sciences
2023
Institute of Engineering
2021
All India Institute of Medical Sciences
2020
All India Institute of Medical Sciences Bhopal
2020
All India Institute of Medical Sciences Raipur
2020
Punjab Technical University
2016-2018
Poornima University
2018
Netaji Subhas University of Technology
2018
Phishing is a network type attack where the attacker creates fake of an existing webpage to fool online user into elicit personal Information. The prime objective this review do literature survey on social engineering attack: and techniques detect attack. combination technical methods convince reveal their data. paper discusses about theoretically issues in life human Beings. typically carried out by Email spoofing or instant messaging. It targets who has no knowledge attacks, internet...
Plant species detection aims at the automatic identification of plants. Although a lot aspects like leaf, flowers, fruits, seeds could contribute to decision, but leaf features are most significant. As plant is always more accessible as compared other parts plants, it obvious study for identification. The present paper introduced novel classifier based on extraction morphological using Multilayer Perceptron with Adaboosting. proposed framework comprises pre-processing, feature extraction,...
The spread of COVID-19 around the entire world has placed humankind in an unprecedented situation. Because rise number cases and its subsequent load on organizations wellbeing experts, some immediate strategies are required to envision future. In this article, authors have presented two data-driven estimation techniques, namely, Auto-Regressive Integrated Moving Average (ARIMA) Long Short-Term Memory (LSTM) for prediction cumulative deaths due COVID-19. Various measures goodness fit such as...
Abstract The syndrome called COVID‐19 which was firstly spread in Wuhan, China has already been declared a globally “Pandemic.” To stymie the further of virus at an early stage, detection needs to be done. Artificial Intelligence‐based deep learning models have gained much popularity many diseases within confines biomedical sciences. In this paper, neural network‐based “LiteCovidNet” model is proposed that detects cases as binary class (COVID‐19, Normal) and multi‐class Normal, Pneumonia)...
One of the most prevalent neurological ailments, Epilepsy, affects around 1-2% entire population earth. It is second only stroke when it comes to sickness. The excessive and hypersynchronous activity neurons in brain occurred due unanticipated breakdown synchronization a set leads an epileptic seizure. Most neurologists widely use Electroencephalogram (EEG) signals identify epilepsy by recording brain's electrical directly. Nonetheless, for long EEG, visual interpretation turns out so...
<b>Background:</b> Malaria diagnosis presents a challenge to all laboratories. In malaria-endemic areas, there is need for rapid, sensitive and cost-effective method effectively screen samples, especially when the workload very high. Various hematology analyzers have been investigated detection of malaria in past. Here, we present our experience cancer hospital where large number complete blood count requests are received either before or during chemotherapy. Fever, being common symptom...
Phishing is a serious threat in the virtual world and it has affected information system. mostly conducted via email, other methods such as instant messaging social networking sites Facebook twitter. In this paper, we proposed method to classify Uniform Resource Locator (URL) into URL or Non phishing URL. Artificial neural network been trained by using particle swarm optimization (PSO) URLs improve performance of ANN. The model run on different ratio learning activation function number...
Bacterial Foraging Optimization (BFO) is optimization technique proposed by K. M. Passino in 2002 To tackle complex search problems of the real world, scientists have been drawing inspiration from nature and natural creatures for years.Bacterial a burgeoning inspired to find optimal solution problem.A Color images Quantization necessary if display on which specific image presented works with less colors than original image.While lot color reduction techniques exist literature, they are...
The stability of Wireless Sensor Networks (WSNs) is a crucial requirement in real-time applications such as military, defense, and other surveillance systems. Clustering WSNs one the most predominant techniques, offering benefits minimizing communication time, optimizing energy utilization, lengthening network lifespan, ensuring stability. Moreover, achieving balance between consumption maintaining significantly influenced by cluster size. This research paper addresses challenges associated...
This paper describes the design and implementation of a light-weight, autonomous, patient-centric, portable medical unit that allows for anytime/anywhere monitoring can find use in many scenarios like home-care, hospital wards, emergency help disaster relief. The proposed called “ TelePatient” achieves portability by exploiting PDA mobility through cellular technology, enabling complete ubiquity. is based on open standards cost-effective. We incorporate transcoding software to fit data...
Image hashing is one of the techniques used to generate hash value for each image in database. These values generated images can be content based retrieval, database indexing, and authentication, avoiding mitigating tampering digital images. In information era, increasing availability multimedia data form has led a tremendous growth tools manipulate multimedia. To ensure trustworthiness, authentication have emerged verify integrity prevent forgery. this paper, novel approach proposed Forgery...