
Gunjan Chhabra- Ph.D.
- Professor (Associate) at Graphic Era Hill University
Gunjan Chhabra
- Ph.D.
- Professor (Associate) at Graphic Era Hill University
Looking forward to collaborative research, projects & publication: Sharing knowledge, accelerating progress
About
159
Publications
0
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
901
Citations
Introduction
I am working in the domain of human intelligence and understanding the key behind human psychology and the physiology of humans under different environmental conditions. Hence, started analyzing human aura and its pattern in different conditions. It will be great to work with like-minded people to get a breakthrough for robust system development.
Current institution
Additional affiliations
June 2014 - October 2022
Position
- Professor (Assistant)
Description
- I started my journey as an academician in June 2014 at UPES, Dehradun. During this period I have handled different roles as course coordinator, activity coordinator, and subject coordinator. Along with this, I have also been a part of various extracurricular activities like sports, technical event management, and others. Additionally, I have also conducted placement-related activities, conference technical committee members, and research collaborative groups.
Publications
Publications (159)
A BSTRACT
Background
The mulberry leaves have far more flavonoids than other berries while having much less catechin. The aim and objective of this study were assessment of the antibacterial efficacy of ethanolic extract of mulberry fruit and leaves on Streptococcus mutans and Lactobacillus acidophilus.
Material and Methods
The ethanol extracts o...
The integration of IoT in health care is a game changer, transforming patient care, clinical workflows, and health management. Its significance stems from the ability to monitor patient vitals in real time, share data seamlessly, and make informed decisions. This work is an attempt to investigate the integration of Internet of Things (IoT) technolo...
For humans, weather prediction is vital in making rational everyday choices and avoiding risk. Accurate weather forecasting is regarded as one of the world's most difficult issues. New weather forecasting, unlike conventional techniques, relies on a mixture of computer simulations, observation (via balloons and satellites), and information of patte...
The paper delves into the critical significance of incorporating Artificial Intelligence (AI) into Human Resource (HR) functions. It extensively explores the multifaceted challenges encountered by organizations during AI implementation in HR, with a particular focus on the vital aspect of employee understanding and acceptance. To elucidate these ch...
Several parameters affect our brain's neuronal system and can be identified by analyzing electroencephalogram (EEG) signals. One of the parameters is alcoholism, which affects the pattern of our EEG signals. By analyzing these EEG signals, one can derive information regarding the alcoholic or normal stage of an individual. Many road accident cases...
The field of automatic modulation classification using deep neural networks has undergone significant development in recent years. In this research, M-QAM and N-PSK modulation formats have been considered for classification. The deep neural network architecture is directly fed with raw signals that are often corrupted with channel noise and fading...
Monkeypox is a viral disease found in Central and West Africa, and it presents notable public health challenges due to its potential for human-to-human transmission and its clinical similarity to smallpox. Recent outbreaks in over 40 countries have underscored the urgent need for quick and accurate diagnosis, especially in settings with limited res...
The identification of gas leakages is a significant factor to be taken into consideration in various industries such as coal mines, chemical industries, etc., as well as in residential applications. In order to reduce damage to the environment as well as human lives, early detection and gas type identification are necessary. The main focus of this...
This book highlights the numerous potentials and concerns involved with using the metaverse. Furthermore, the project discusses countermeasures to protect any firm from these risks. Insights into practical solutions may assist organizations in using this new business model by raising awareness and preparing them to improve. The book helps readers g...
The deployment of fifth-generation (5G) wireless networks has already laid the ground-work for futuristic smart cities but along with this, it has also triggered the rapid growth of a wide range of applications, for example, the Internet of Everything (IoE), online gaming, extended/virtual reality (XR/VR), telemedicine, cloud computing, and others,...
The proliferation of Internet of Things (IoT) devices poses potential challenges in the fast-developing field of smart cities, especially in cybersecurity. This work is an attempt to present an extensive comparative analysis of AI-based intrusion detection systems (IDS) designed for smart cities. The necessity of robust intrusion detection systems...
Because of developments in the online sector, the occurrence of data breaches in web-based business systems is rising quickly. The attackers employ a range of different methods, including Distributed-Denial-of-Service attacks, Hacking Current Sessions, Reusing of Usernames and Passwords, Injections of Structured Query Language, and Phishing Attacks...
Urbanization's rapid pace and the growing need for smart city technology have given rise to computing at the edge and in the fog paradigms. These paradigms show promise in addressing the problems with processing, storing, and transmission in smart cities. This paper presents a systematic mapping study that aims to comprehensively analyze the body o...
Sign language serves as a vital medium of communication for individuals who are hearing and speech impaired, yet the communication gap between this community and the general public persists due to limited understanding of sign language. In response, this research introduces a comprehensive application aimed at fostering inclusive communication. The...
Analysis of forest fires True video surveillance is a challenging task. The same is due to differences in appearance, changes in lighting, and variations in speeds. This study suggested a mechanism for effectively monitoring fires in forests that can instantly identify the movement of traffic. Our research generally contributes to the development o...
The use of Generative Adversarial Networks (GANs) has been increasing in speech recognition tasks but there has been significant hurdle due to limited availability. The use of GAN have shown promise in speech synthesis tasks, yet their application in low-resource speech systems faces a significant hurdle owing to limited data availability. The prog...
Most of the time, people use their voices for communication and their vision to interact with the external environment. There are people who do not have the opportunity to use their vision to interact with the external environment due to different factors of disability. One of those community groups is the blind people. Blind people can communicate...
Heart disease has recently risen to prominence as one of the leading killers and most pervasive diseases in the globe. Detection of heart disease in an early stage using heart disease symptoms is an exciting task. In developing nations such as Ethiopia where the number of cardiologists is limited and most of the population lives in rural and remote...
The computer science field has witnessed the popularity of machine learning (ML) in discriminating low achieving and high-achieving students. However, various ML methods have different performances in predicting student performance. Therefore, the investigative analysis of their effectiveness in the discrimination of student based on their academic...
The research article titled "Human-AI Collaboration: Bridging the Gap for Enhanced Problem Solving" delves into the integration of human intelligence and artificial intelligence (AI) to enhance collaborative problem-solving capabilities. Considering the advancing AI landscape, understanding the dynamics and implications of Human-AI collaboration is...
Regular monitoring of the maintenance manhole
system is imperative to uphold the city’s health and cleanliness
standards. Our study offers an intelligent manhole that monitors
the manhole’s condition, water level, and gases. We tested the status, gas, and water levels of our revolutionary, innovative manhole in several places. Our system’s Blink ap...
Improving additive manufacturing (AM) process modelling is necessary to better understand the relationship between process parameters and material properties, and current developments in AI and ML offer promising avenues for this. Although the proliferation of labelled datasets from experiments or high-fidelity simulations has been the main driver...
The mechanized development of electric power systems realized via the application of artificial intelligence is proposed in this research as a new approach. Existing methods only evaluate dependability for a predetermined collection of design variables or don't take the program's dependability into account as a performance criterion. This methodolo...
In order to keep electrical grids running reliably and efficiently, power system stability is essential. The optimisation of power systems is fraught with complexity and uncertainty, yet soft computing approaches have been shown to be an excellent tool for dealing with these issues. In order to improve the reliability of the power system, this arti...
HTML smuggling is a type of web-based attack that exploits vulnerabilities in web applications to deliver malicious content to unsuspecting users. This attack has become increasingly popular in recent years, as cybercriminals continue to look for new ways to circumvent security measures and deliver malware to users. Mitigating HTML smuggling attack...
In today’s competitive business landscape, optimizing customer relations is paramount for sustained success. Harnessing the power of machine learning, this research presents a data-driven approach to achieve this objective. By leveraging three prominent algorithms, namely Linear Regression (LR), decision tree (DT), and support vector machine (SVM),...
In Ethiopia, imported and locally manufactured electric stoves are used for cooking and baking food. An imported electric stove consumes less electric power, whereas locally manufactured electric stoves are the most energyconsuming appliances in the household. In both cases, electric power is dissipated in the form of heat through the resistor even...
The Application Programming Interface provides multiple functionalities in the software development task. Collaboration from third-party developers can also be achieved by using Application Programming Interface. Attackers often target network infrastructure to take advantage of system vulnerabilities for fetching the client's sensitive information...
Tuberculosis, generally referred to as TB is a bacterial disease that affects the lungs and is one of the leading causes of death on a worldwide scale. TB is a bacterial illness that is caused by Mycobacterium tuberculosis. This lung disease is highly infectious and can potentially infect other human body organs. Early diagnosis and treatment of tu...
BACKGROUND
The role of spirituality in people’s lives, particularly the lives of health professionals, as well as its impact on mental health issues like anger and aggressiveness and resilience, are particularly significant. Therefore, the purpose of this study was to examine the link between the propensity for violence and personal resilience in d...
The idea of developing a smart contact lens that can help persons who are visually impaired with their daily routines is presented in this paper. In fact, blind people face various difficulties. They usually need constant help in almost all situations, especially in their daily routine. The biggest obstacle is that it is difficult to move from one...
Every year, the apple sector loses a significant amount of money due to diseases and pests. Farmers have a hard time pinpointing the source of apple disease since symptoms induced by several diseases may be quite similar and may even coexist. In IoT-based agriculture, machine learning (ML) and image processing (IP) methods are the major expertise n...
The field of cyber threat detection in Software-Defined Networks (SDNs) is explored in this research article, which provides a thorough model supported by machine learning techniques. In order to strengthen network security, the model installs AI-Enabled Servers at the application and control levels. These servers are designed to quickly detect and...
Precise prediction and detection of epilepsy, a
common neurological condition marked by sporadic and
repeated seizures, is necessary for efficient management and
patient care. To do accurate and reliable seizure detection,
machine learning (ML) on electroencephalogram (EEG)
recordings is a good choice because of its capacity to provide
insightful i...
The act of fruit identification entails the
discernment and classification of various fruit varieties,
predicated upon their visual attributes. This task can be
accomplished through various methods, including manual
inspection, traditional computer vision techniques, and more
advanced approaches using machine learning and deep learning.
Our work re...
Alzheimer’s disease is a complex
neurodegenerative disorder with profound implications for
individuals and health- care systems. Early and accurate
diagnosis is critical for effective intervention and treatment. This
study explores the potential of deep learning algorithms to
predict Alzheimer’s disease stages using MRI segmentation data.
Four dist...
Many database operational and analytical systems
are adopting Big Data analytics tools and techniques to meet the
upcoming business challenges. Migration to Hadoop Distributed
File System has a specialized migration process that maps the
current schema models to the batch processing schemes. The
database schemas hold many data semantics designed ac...
This paper proposes an image processing-based method for detecting plant diseases. The system's three key phases are acquisition, pre-processing, and disease identification. Pictures of plant leaves are taken during the image acquisition stage using a digital camera. The image preprocessing stage involves enhancing and pre-processing the collected...
In IT infrastructure, security is the first and foremost important factor to maintain a system’s confidentiality, integrity and availability. Compromising any of these factors can have disastrous effects on a system or a company. History has taught us the consequences of neglecting security needs. So, information security has become a topic of inte...
Tuberculosis and pneumonia are debilitating respiratory diseases that pose significant health challenges around the world. For these disorders to be treated and controlled effectively, a timely and precise diagnosis is essential. The aforementioned advancements have resulted in the emergence of novel technologies utilized for the identification and...
As Internet of Things (IoT) devices are being involved in abundant applications, security, and privacy of the IoT users have been of more concern. The security threats are rapidly growing making the solutions of security and privacy not inadequate. Thereby, each thing on the internet can be a point of target for hackers. Accordingly, ML algorithms...
Although there has been a lot of study done on traffic monitoring, control, modeling, and the use of artificial intelligence to handle these problems, there are still a lot of critical problems that need to be solved. In existing traffic signal research, a major problem is longer delays and queues, causing significant traffic congestion. Our resear...
The present research focuses on an integrated architecture for extraction and identification of disease in the cotton plants. The deep learning architecture provided in the paper is capable of extracting the features from the cotton images and then create feature map of the same. The methods provide an automated approach for disease detection using...
The construction of wireless body area networks (WBANs) has been facilitated by the shrinking of electrical devices (invasive/non-invasive) along with the widespread applicability of the wireless network. With a WBAN, a patient’s vital information may be tracked in real time without interfering with his or her regular routine. Technologies that can...
For the purpose of generating artificial intelligence (AI) in a number of industries, including insurance, oil, and natural gas, sensors and smart devices interact with AI software in different ways. In the fields of healthcare and nutrition, patients could use mobile devices and wearables to acquire information on probable diagnoses for their symp...
Artificial intelligence (AI) technology provides useful tools for therapies by combining approaches such as data analysis (creating new knowledge from a deep study of huge amounts of data) and insightful analysis. AI can detect current and foreseeable issues, as well as evaluate and validate forecasts and solutions. The goals of cognitive computing...
In a photograph or video, a human pose estimate attempts to predict the pose of several human body components. Since certain human motions frequently produce posing movements, understanding such poses is crucial for action recognition. This chapter focuses on recent developments in action recognition and their application to human pose estimation....
Nutrition, sport, and fitness are comparable types of domain that are usually linked with those who participate in sports with high levels of physical activity, such as weightlifting and bodybuilding. Swimmers put in much more physical effort; thus, they require much nutritional assistance. Athletes’ caloric needs are often higher than those of non...
With the help of predictive and performance analysis, it is simple to identify the elements of a good or service that might need the most improvement or that could benefit from cost-cutting techniques without degrading the product's quality as a whole. Different sports require different fitness levels to perform at their best. Factors such as endur...
For any development in the present digital era, artificial intelligence (AI) and the Internet of Things (IoT) are two prominent technologies. Even though both platforms are strong in their domain—AI is a source of knowledge and the IoT is the unique feature that enables cross-communication—this combination becomes a trigger for various intelligent...
To avoid obesity inside the human body, a healthy diet must be maintained at a consistent level. Automated classification of food photos and estimations of food qualities are presented in this research using a unique machine-learning-based classification system. To train the prototype system's convolutional neural network, this chapter is based on...
In the past several decades, automakers have installed a variety of sensors that can detect and diagnose issues with the car and the driver’s actions. In addition, the ever-increasing need for transportation services for both products and people, along with the development of ICT, have driven the transportation sector into a new age of intelligence...
More and more, individualized therapies are being employed to change eating habits and increase food intake. Since weight gain happens when energy intake exceeds energy expenditure, dietary practices and attitudes are crucial in the global obesity epidemic. A recent review discovered gaps in the knowledge base on the variables/determinants of healt...
Studies on weight reduction therapies have shown that an accurate assessment of the patient’s diet is crucial. However, the majority of existing techniques of nutritional evaluation rely on recall. With the availability of powerful mobile devices and extensive cloud services, it is now feasible to create a sophisticated computer-based food identifi...
In this chapter, data-science techniques are used to assess players’ ability. Both artificial intelligence and machine learning based viewpoints and mentoring alter team effectiveness. One might assume the opposing team’s strategy and build one’s own team to obtain the best outcomes. Data science provides another possibility for data engineers to g...
Unmanned Aerial Vehicles are remotely handled for fulfilling tasks like photojournalism, security, rescue efforts, and even package deliveries. These gadgets have a variety of sensors and cameras that enable them to gather data and provide real-time images to their administrators. These devices are vulnerable to cyber-attacks that can lead to hacki...
Quantum Key Distribution (QKD) protocols theo- retically propose a high-security level based on the advantages of quantum computing. This paper analyze the security level of one of the most well-known QKD protocols, BB84, against the man-in-the-middle attack strategy. Specifically, we leverage quantum entanglement to enhance communication security...
The Internet of Things helps the healthcare sector to embrace the methodologies with emerging technologies and facilitate technological change from traditional to highly equipped technology. Some of the frequent uses of the Internet of Things in healthcare include monitoring patient healthcare, enhancing proper healthcare and searching medical reso...
Deep Learning (DL), a subset of machine learning (ML) based on artificial neural networks, has experienced significant advancements in recent years. While it has demonstrated remarkable capabilities in various domains, the true potential of DL shines when it is applied to real-world problems. This article delves into the fascinating world of deep l...
Ayushman Bharat-Pradhan Mantri Jan Arogya Yojana is a chance to improve the health of hundreds of millions of Indians and get rid of or lessen medical poverty in the nation. Many individuals are excluded from the plan because of dishonest actions taken by the administrators or the recipients. In this research article, a blockchain-based solution fo...
Deep Learning (DL), a subset of machine learning (ML) based on artificial neural networks, has experienced significant advancements in recent years. While it has demonstrated remarkable capabilities in various domains, the true potential of DL shines when it is applied to real-world problems. This article delves into the fascinating world of deep l...
Questions
Question (1)
I am working on Natural Language Watermarking but I didn't found much literature for the same. If anyone working on this then please give me the latest methodology/algorithm used in this area.