- Mobile Ad Hoc Networks
- Advanced Steganography and Watermarking Techniques
- Imbalanced Data Classification Techniques
- Energy Harvesting in Wireless Networks
- Face recognition and analysis
- Security in Wireless Sensor Networks
- Energy Efficient Wireless Sensor Networks
- Chaos-based Image/Signal Encryption
- Opportunistic and Delay-Tolerant Networks
- Advanced Wireless Communication Technologies
- AI in cancer detection
- IoT-based Smart Home Systems
- Medical Image Segmentation Techniques
- Hydrological Forecasting Using AI
- Machine Learning and Data Classification
- Financial Distress and Bankruptcy Prediction
- User Authentication and Security Systems
- Image Processing Techniques and Applications
- Evolutionary Algorithms and Applications
- Face and Expression Recognition
- Metaheuristic Optimization Algorithms Research
- Cloud Data Security Solutions
- Emotion and Mood Recognition
- Antenna Design and Analysis
- Power Line Communications and Noise
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2015-2022
In the era of technology data security and information sharing is always a hot topic to talk on. There are lot methods that being used in for secret such as cryptography, steganography, watermarking etc. another by people QR code based but this not enough provide privacy sharing. Therefore, there need better algorithm which can be secure communication have efficiency accuracy than others. paper author proposed cryptographic technique uses 3 layer
Wireless Sensor Network is an emerging new technology extensively used for large-scale real-time data processing due to its characteristics and in application areas such as civilian military domains.These networks are vulnerable several security attacks.In this paper, we emphasize on Sybil attack, which a harmful threat sensor proposed algorithm attack detection based Time difference of Arrival (TDOA) localization method, detects the malicious behavior head node member nodes cluster network.
Cloud Computing (CC) offers recent facilities to enterprises, companies, and the general, public delivers low cost computing infrastructure for IT-based solutions. CC is not organizations e.g. academies, research laboratories, military in developed countries has long utilized networks communiqué, but conditions cloud more recent. being, increasingly offered over web as technology become faster complex. A network, there no complete security solution secure data applications or services,...
Notice of Violation IEEE Publication Principles <br><br>"Crime Identification using FP-Growth and Multi Objective Particle Swarm Optimization" <br> by Shivangee Agrawal, Vikas Sejwar <br>in the Proceedings International Conference on Trends in Electronics Informatics, 2017<br><br>After careful considered review content authorship this paper a duly constituted expert committee, has been found to be violation IEEE's Principles. <br><br>This contains duplicated from cited below. The original...
Digital image segmentation belongs to the vast area of processing. Segmentation with help Genetic Algorithm is useful in many functions and has much better performance comparison existing techniques. applied applications (enhancement, segmentation, etc.) distant fields (medical analysis, satellite images, remote images incorporating noise itself a challenging issue analysis. We have recommended unique approach for noise, which adequate segmenting containing various kinds noise. The...
Mobile ad-hoc network is growing field of research where lots work done regarding to security network.Due its infrastructure and mobility nodes change their position newly node easily enter or exit from networks it highly vulnerable attacks.In this we study about MANET various attacks after that technique prevent our attacks, but all have some issues so overcome problem proposed a trust based in which communication occurred only between trusted nodes.Implementation on ns-2.35 uniqueness...
In this research, we presented another implanting calculation for QR Code Image Steganography and Text Hiding, which is based on 3-discrete wavelet transform (DWT) improved RSA algorithm.Firstly, enter the text message choose four random numbers encryption.After that, take pictures: one cover image secret image.In process of embedding, divide RGB into three planes: Red, Green Blue.In work, embed multiple color images a single providing security.At last, encrypted concealed an embedded...
In today's economy, credit card (CC) plays a major role. It is an inevitable part of household, business & global business. While using CCs can offer huge advantages if used cautiously and safely, significant financial damage be incurred by fraudulent activity. Several methods to deal with the rising fraud (CCF) have been suggested. Both such strategies, though, are meant prevent CCFs; each them has its own drawbacks, benefits, functions. CCF become concern because growth e-commerce...
Mobile Ad hoc Network (MANET) is a self organizing wireless network for mobile devices.They do not need any fixed infrastructure to be configured which makes it more suitable used in environments that require on-the-fly setup.The present work discusses the challenging issues MANET routing security.It presents improved DSR, trust-based scheme securing DSR protocol using friendship mechanism and gateway.The path most optimum chosen as final route from source destination.The gateway nodes...
The selection of features is crucial as an essential pre-processing method, used in the area research Data Mining, Text mining, and Image Processing. Raw datasets for machine learning, comprise a combination multidimensional attributes which have huge amount size. They are making predictions. If these classification, due to majority presence that inconsistent redundant, it occupies more resources according time produces incorrect results effects on classification. With intention improving...
The mobile Adhoc network is deployed in the environment where traditional wired cannot be established due to its required features and their limitation.Use of directional antenna one most promising technique for high speed wireless such as IEEE 802.11.Proposed a new MAC protocol address Directional Hidden terminal problem Exposed Terminal Problem.
International Journal of Computer Sciences and Engineering (A UGC Approved indexed with DOI, ICI Approved, DPI Digital Library) is one the leading growing open access, peer-reviewed, monthly, scientific research journal for scientists, engineers, scholars, academicians, which gains a foothold in Asia opens to world, aims publish original, theoretical practical advances Science,Information Technology, (Software, Mechanical, Civil, Electronics & Electrical), all interdisciplinary streams...
In given propose paper we have worked on the water quality of river ganga, not only for management resources, but also prevention pollution, forecast has a more practical significance. To evolvesuitableideals (WQ) insidethe physiquesobtainingcontaminant samples & then to confirm that these standards are encountered, this is environmentalWQ program goal. realistic standard setting, institutional capacity basin’s science, environmental, land usagesituations, possibleusages getting bodies,...
Human emotions may be characterized by the expressions on their faces, which is goal of research in FER (facial expression recognition). These include biometric security and human-computer interface as well robotics clinical care treatment for illnesses like autism sadness. Face analysis technology examined this dissertation, development artificially intelligent systems practical usage. In order to improve FER, a combination geometric textural domain feature extractors several machine...