- Mobile Ad Hoc Networks
- Opportunistic and Delay-Tolerant Networks
- Energy Efficient Wireless Sensor Networks
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- Cooperative Communication and Network Coding
- Dialysis and Renal Disease Management
- ECG Monitoring and Analysis
- EEG and Brain-Computer Interfaces
- Network Security and Intrusion Detection
- Digital Media Forensic Detection
- Security in Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Phonocardiography and Auscultation Techniques
- Blood Pressure and Hypertension Studies
- Palliative Care and End-of-Life Issues
- Qur’anic Interpretation Studies
- Medical Malpractice and Liability Issues
- Age of Information Optimization
- Blind Source Separation Techniques
- Potassium and Related Disorders
- Scheduling and Timetabling Solutions
- Acute Kidney Injury Research
- Misinformation and Its Impacts
- Network Packet Processing and Optimization
Rajalakshmi Engineering College
2024
Manipal Academy of Higher Education
2014-2023
Kasturba Medical College, Manipal
2023
Manipal University Jaipur
2020-2023
Rajasthan Technical University
2020
Sarojini Naidu Medical College
2013
Maulana Azad National Institute of Technology
2012
K.S. Rangasamy College of Technology
2012
Indian Institute of Science Bangalore
2007
Indian Institute of Technology Roorkee
2005
In this Letter, a robust technique is presented to detect and classify different electrocardiogram (ECG) noises including baseline wander (BW), muscle artefact (MA), power line interference (PLI) additive white Gaussian noise (AWGN) based on signal decomposition mixed codebooks. These codebooks employ temporal spectral-bound waveforms which provide sparse representation of ECG signals can extract local waves as well BW, PLI, MA AWGN simultaneously. Further, statistical approaches features...
In cloud computing, a shared, configurable pool of computing resources is made accessible online and allocated to users according their needs. It essential for provider schedule jobs in the keep up service quality boost system efficiency. this paper, we present scheduling technique based on modified particle swarm optimization combat issues excessively long time high computation costs associated with environment. The PSO used allocate virtual machines order minimize objective function...
To empower the general mass through access to information and knowledge, organized efforts are being made develop relevant content in local languages provide language capabilities utility software. We have developed a Question Answering (QA) System for Hindi documents that would be masses using as primary of education. The user should able from E-learning friendly way, is by questioning system their native will return intended answer (also Hindi) searching context repository documents....
This paper formulates the college timetable scheduling (CTTS) as a constraint satisfaction problem (CSP) in manner that is easy to implement. Timetable process revised every academic session and requires lot of checking, so it inefficient check same type constraints repeatedly create proper schedule manually. CSP natural choice for automating this process. The prototype presented aimed offer such assistance classes different courses running an keeping given checking like limit maximum number...
Steganography is known as a secret data sharing technique. It method of protection which allows the user to send information in enveloped form. That means hidden cannot be seen by observer because one can only see media. This paper presents steganography technique using Pixel swapping-Quantum Hilbert image scrambling and discrete wavelet transformation, followed stego smoothing operation. Initial steps proposed include best suitable cover selection for image. process compares with different...
Sensor network applications such as environmental monitoring demand that the data collection process be carried out for longest possible time. Our paper addresses this problem by presenting a routing scheme ensures remains connected and hence live sensor nodes deliver longer duration. We analyze role of relay (neighbours base-station) in maintaining connectivity present strategy that, particular class networks, approaches optimal set becomes larger. then use these findings to develop an...
Mobile Ad hoc Networks were well - thought out as the independent deployment of mobile nodes. It is eminently said that MANET a self configuring infra structure less network do not count on centralized and organized connectivity Military networks, Disaster relief efforts are some common instance Networks. showed way for new form namely Intermittently Connected Network (ICMANET) which prominently Delay Tolerant Network. leads to ICMANET due sparse or high mobility in networks. The...
Summary Industrial wireless sensor networks (IWSNs) are very important to improve and simplify the way manage, monitor, control industrial factories. IWSNs have many benefits, but because of their vulnerability extremely complex variable contexts, they also limit some potential that is currently available present difficulties on numerous fronts. The proposed work develops energy‐efficient routing technique minimize overall energy consumption. Heterogeneous mobile nodes randomly deployed in...
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are kind wireless Networks that usually has routable networking environment on top Link Layer Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. traditional schemes not pertinent to the so called Intermittently Connected (ICMANET). ICMANET form Delay Tolerant Network, where...
The Intermittently Connected Mobile Networks (ICMN) is a disconnected mobile network where complete connectivity never exists. intermittent due to the dense nature of network. mainly high mobility nodes in Routing such sparse arduous. Due attribute network, encounter suspicious also remains tedious task. In this paper, we put forward secure routing that aids detecting and preventing intrusion malicious nodes. process made adorable through ANT colony optimization (ACO) technique. accordance...
. KEYWORDS :
Mobile Ad-hoc Networks (MANETs) is a most common studied and hot area of research over past few decades. This form network has aid data connectivity where wired solutions are impracticable but due to some unique personality it fetched many issues, design implementation an efficient routing protocol one the vital key challenging issues MANETs. However, since age MANETs number have been proposed by numerous researchers highly dynamic unrelated environment each every algorithm struggle maintain...
Today, Wireless Sensor Network (WSN) is a vital technology required in every phase of development. During data aggregation (WSN), there may be possibility various types failures. Apart from hardware failures, failures occur due to bad channel conditions and energy drain. Hence routing tree should built towards each sink which fault tolerant. In this study, we propose develop tolerant management technique node selects path the effectively also maintains backup simultaneously. This can...
Video fingerprinting is the process of extracting features from a given video. These fingerprints, are used to uniquely identify video other videos. The goal system decide whether two videos have same contents or not, by measuring distance between fingerprints extracted these This paper proposes, simple and fast matching method. proposed method based on centroids gradient orientation using Absolute Euclidean Distance (AED). Distance, chosen for because its low calculation complexity more...
Electroencephalogram (EEG) is widely exploited practice to measure the level of electrical motion rising from brain humans. With modest procedure this mechanism globally exploits vigorously assess functions. Since born age technique a rapid methodsof fashionable EEG indications aids medical experts recognize diseases and also simplifies an Emotions recognition This paper carried out survey over recent offered methodologies techniques.
Aimed at determining the time period for progression to ESRD and also find out major risk factors early ESRD. A retrospective cohort study was conducted in a tertiary care teaching hospital. The data collected from medical record dept. last two years (2012 2013) Demographic details clinical parameters of patients with were using descriptive statistics feature SPSS v20.0. total 240 included study. mean age population found be 54.6±14.2 years. Majority males (74.83%). Hypertension 67.1%,...
To examine the demographic, clinical characteristics and independent risk cause of sudden cardiac death in HD patients. We analyzed data 410 hemodialysis patients, who were undergoing a tertiary care teaching hospital followed for median 3 years. Baseline demographic data, comorbidities, biochemical parameters, ECG, ECHO all these was assessed form patient files. The logistic regression applied to obtain adjusted odds ratio 95% CI calculated. In tests, probability p < 0.05 considered as...