- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- Anomaly Detection Techniques and Applications
- Internet Traffic Analysis and Secure E-voting
- Blockchain Technology Applications and Security
- Information and Cyber Security
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Innovative Approaches in Technology and Social Development
- Image and Signal Denoising Methods
- Parallel Computing and Optimization Techniques
- Internet of Things and AI
- Real-Time Systems Scheduling
- Video Surveillance and Tracking Methods
- Smart Cities and Technologies
- Bluetooth and Wireless Communication Technologies
- Child Development and Digital Technology
- Advanced Memory and Neural Computing
- Embedded Systems Design Techniques
- Family and Disability Support Research
- Opportunistic and Delay-Tolerant Networks
- Cloud Data Security Solutions
- Brain Tumor Detection and Classification
- Big Data and Business Intelligence
International Institute of Information Technology
2014-2025
Institute of Management Technology
2023
The emerging trend of ubiquitous and pervasive computing aims at embedding everyday devices such as wrist-watches, smart phones, home video systems, autofocus cameras, intelligent vehicles, musical instruments, kitchen appliances etc. with microprocessors imparts them wireless communication capability. This advanced paradigm, also known the Internet Things or cyber-physical computing, leads internet to appear everywhere anywhere using any device location. With maximum appreciation due...
With the state of art advancements in internet technology and wireless communication consistent miniaturization electronics hardware, recent trend engineering research has been to embed everyday objects with computers communication. This computing power capability is imparted by adding compact small silicon chips equipped micro-processors sensors these objects. Such ubiquitous availability coupled protocols makes information processing a process permeating almost every type object. These are...
Cloud computing is a technology that offers dynamic resources to the users with enhanced scalability and flexibility. The major concerns in cloud environment has direct impact on throughput of system contentment problem task scheduling resource allocation. time taken execute tasks cost incurred for computation are significant objectives affect performance system. This work proposes multi-objective allocation technique using meta-heuristic optimization algorithm. Enhanced Honey Badger...
The escalating complexity of computer networks on a daily basis has increased the probability malicious exploitation. Even rare vulnerability in single might compromise network security an entire organisation. Intrusion Detection Systems form integral component mechanisms designed to prevent internet and data communication systems from such attacks. attacks comprise information gathering modification through unauthorized access resources denial service legitimate users. IDS play key role...
The number of vehicles is increasing every day, and hence traffic congestion, especially in intersections, becoming a major issue. This paper presents novel approach for analysis signal prediction using combination deep learning techniques.3000 images were utilized to train on CNN (Convolutional Neural Network) spatial feature extraction the Yolov5 algorithm. Then those features given GCN (Graph Convolutional as input by creating DGL graph. findings from this research provide valuable...
The Internet of Things (IoT) system makes it possible for different gadgets to connect each other and send receive data without any problems. But it’s not easy make sure that the being sent received within this structure is safe correct. A Lightweight Authenticated Key Management Mechanism (LAKMM) suggested as a way solve problem. goal LAKMM improve security transfer in IoT settings while reducing processing waste resource use, which are important factors devices don’t have lot resources....
Damage from DDoS attack in increasing day by and an efficient detection algorithm is urgently needed. Many current algorithms are based on anomaly detections which ineffective real environment. Detection can be tackled effectively with pattern classification flow of packet machine learning algorithms. In this paper three such classificationsbased for discussed. Implementation these gives better accuracy limited time memory space; hence it’s one the highly scalable effective attack.
In computer music, instrument recognition is a critical part of sound modeling. Pitch, timbre, loudness, duration, and spatialization are all components musical sounds. All these play significant in determining the quality tonal sound. It possible to alter first four parameters, but timbre always poses challenge [6]. was inevitable that would take center stage. Musical instruments distinguished from one other by their distinct quality, independent pitch or volume. To distinguish between...
The abundant availability of medical data from healthcare organizations increases the application Machine learning (ML) techniques in field. Reliable and trustworthy ML models needs to be developed order maintain efficacy providers. are used extensively make reliable disease predictions while also safeguarding collected through Internet Medical Things (IoMT) devices. Federated Learning (FL) suitable for preserving IoMT since it retains only trained progresses with information dispersed...
The paper provides a comprehensive exploration of brain-computer interfaces (BCIs) and their application in addressing communication control challenges neurological disorders like Amyotrophic Lateral Sclerosis (ALS), locked-in syndrome, Parkinson’s disease, Spinal Cord Injury. It traces BCI advancements from foundational information theory principles to current state. Neurological severely impact abilities, with ALS causing muscle weakness paralysis, syndrome confining individuals within...
This study examines silicone polymer with aniline's ability to transmit liquids. The mass of the ingested liquid is found in flexible rubber's filling and contact classic., as shown by muscle shift after being immersed water., saltwater workaround., or hydrogen peroxide., well cleaning air another exposure assess. Filler earth's crust change can stop material from penetrating vulcan latex. low solubility rubber structure allows for a simpler coolant easily penetrate within it rather than...
This literature study and experimentation aim to the current best performing architectures in domain of image classification. In particular, we investigate approaches for characterising Convolutional Neural Network (CNN) extracting features from frames our task video regression. Weather Forecasting wind speed are important factors many economic, business management sectors. Generalizability was successfully demonstrated by network accurately predicting based on recorded speeds other flags...