About
122
Publications
15,356
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,319
Citations
Publications
Publications (122)
This research examines the significance of privacy of synthetic data in healthcare and biomedicine by an analysis of actual data. The significance of authentic health care data necessitates the secure transmission of such data exclusively to authorized users. Therefore, to minimise the reliance on actual data, synthetic data is developed by incorpo...
This research presents an analysis of smart grid units to enhance connected units’ security during data transmissions. The major advantage of the proposed method is that the system model encompasses multiple aspects such as network flow monitoring, data expansion, control association, throughput, and losses. In addition, all the above-mentioned asp...
In India an enhanced target that is related to affordable energy for increasing the sustainability among various classes of people must be achieved in subsequent years. As the growing population needs sustainable electricity in an affordable way it is essential to reduce the increasing demand and to increase possible generations in a regular way. H...
In this paper we propose Cyber Physical Systems (CPS) framework to mitigate intrusions in the existing dataset by constructing a distinctive system model with an analytical framework. With the exponential growth of data network topologies, the prevalence of CPS facing various sorts of invasions is evident across all data management strategies. Ther...
This work presents an enhanced identification procedure utilising bioinformatics data, employing optimisation techniques to tackle crucial difficulties in healthcare operations. A system model is designed to tackle essential difficulties by analysing major contributions, including risk factors, data integration and interpretation, error rates and d...
In this paper, the need for a quantum computing approach is analyzed for IoT applications using the 5G resource spectrum. Most of the IoT devices are connected for data transmission to end users with remote monitoring units, but there are no sufficient data storage units, and more data cannot be processed at minimized time periods. Hence, in the pr...
Background:
The majority of wearable technology is employed in the Internet of Medical Things (IoMT) health monitoring systems to recognize various bodily indicators. All monitored values are sent to a central server, where they are all treated by experts at the appropriate moment. Therefore, by expanding the use of wireless devices, it has been di...
This article examines the impact of utilizing generative artificial intelligence optimizations in automating the content generation process. This instance involves the identification of fraudulent content, which is often characterized by dynamic patterns, in addition to content production. The generated contents are constrained, which limits their...
This article examines the operational functionality of intelligent transport systems to enhance smart cities by reducing traffic congestion. Given the increasing populations of smart cities, there is a growing demand for public transit systems to address the issue of traffic congestion. Therefore, the suggested system is developed using a few param...
In this paper, advanced features of 6G networks by examining security of consumer electronic products are discussed. With rapid growth of consumer electronic products the network features are updated thus providing fast response to end users but security of transmission remains a major concern. Hence a collaborative framework is formulated in propo...
In contemporary real-time applications, diminutive devices are increasingly employing a greater portion of the spectrum to transmit data despite the relatively small size of said data. The demand for big data in cloud storage networks is on the rise, as cognitive networks can enable intelligent decision-making with minimal spectrum utilization. The...
The proliferation of integrated sensing techniques in Sixth Generation (6G) networks is an increasingly significant aspect in facilitating efficient end-to-end communication for all users. The suggested methodology employs a digital signal processed with terahertz bandwidth to assess the impact of 6G networks. The primary focus lies in the design o...
In this paper, a design model for resource allocation is formulated beyond 5G networks for effective data allocations in each network nodes. In all networks, data is transmitted only after allocating all resources, and an unrestrained approach is established because the examination of resources is not carried out in the usual manner. However, if da...
This paper proposes and executes an in-depth learning-based image processing approach for self-picking apples. The system includes a lightweight one-step detection network for fruit recognition. As well as computer vision to analyze the point class and anticipate a correct approach position for each fruit before grabbing. Using the raw inputs from...
In this study, machine learning methods are used to assess how well wireless sensor networks transmit and receive radar signals. Measurements are done with labeled and unlabeled data sets where output functions are modified in relation to transmitted input in order to test the transceiver of radar signals. The main contribution in the proposed meth...
The process of using robotic technology to examine underwater systems is still a difficult undertaking because the majority of automated activities lack network connectivity. Therefore, the suggested approach finds the main hole in undersea systems and fills it using robotic automation. In the predicted model, an analytical framework is created to...
This study involves the integration of wireless technologies to enable the creation of digital twin representations for the purpose of monitoring smart cities. The analytical representations are created through the utilization of advanced technological resources, facilitating a comparison between the original values and reference values. Consequent...
The security of the Internet of Things (IoT) is crucial in various application platforms, such as the smart city monitoring system, which encompasses comprehensive monitoring of various conditions. Therefore, this study conducts an analysis on the utilization of blockchain technology for the purpose of monitoring Internet of Things (IoT) systems. T...
The Internet of Things (IoT) technology in various applications used in data processing systems requires high security because more data must be saved in cloud monitoring systems. Even though numerous procedures are in place to increase the security and dependability of data in IoT applications, the majority of outside users can decode any transfer...
In this study, unidentified flying machines are built with real-time monitoring in mid-course settings for obstacle avoidance in mind. The majority of the currently available methods are implemented as comprehensive monitoring systems, with significant success in monitored applications like bridges, railways, etc. So, the predicted model is develop...
Effective management and control of large-scale networks can be challenging in the absence of appropriate resource allocation. This paper presents a framework for highlighting the significance of resource allocation in mobile, wireless, and ad hoc networks. The model has been designed to incorporate a clustering protocol and a schedule-based resour...
Numerous members of society struggle with health care issues, and despite the use of sensing technology, diseases in the body are still unable to be detected. The main cause of this identification process failure is the absence of any recognized virtual technology on the market. The majority of health care solicitations seek to create a specific ap...
In this paper, the application of transportation systems in real-time traffic conditions is evaluated with data handling representations. The proposed method is designed in such a way as to detect the number of loads that are present in a vehicle where functionality tasks are computed in the system. Compared to the existing approach, the design mod...
The developments in the field of artificial intelligence (AI) and decision making systems are identified as virtuous models for banking and finance sector (BFS) applications. Even though AI provides great advantage in application changes it is essential to remodel the system using explainable artificial intelligence (XAI) design system. Also the st...
In this paper, a realization technique is designed with unique analytical model for transmitting multimedia data to appropriate end users. Transmission of multimedia data to all end users through a variety of visualization methods is the foundation of future computer systems. Yet, highly limited system resources prevent the updating of the methods...
Purpose: In the contemporary era, a significant number of individuals encounter various health issues, including digestive system ailments, even during their advanced years. The major purpose of this study is based on certain observations that are made in internal digestive systems in order to prevent severe cause that usually occurs in elderly peo...
Numerous users are experiencing unsafe communications due to the growth of big network mediums, where no node communication is detected in emergency scenarios. Many people find it difficult to communicate in emergency situations as a result of such communications. In this paper, a mobile cloud computing procedure is implemented in the suggested tec...
This article highlights the importance of learning models which prevent the resilient attack of robotic technology with a subset of trajectories. Many complement models are introduced in the field of path planning robots without any knowledge of representation procedures, so robotic data are subject to different attacks from several users. During s...
In recent days, all networks are connected by internet and all people around the world are able to control things in their remote locations. Even though these technologies have been used only by selected people, it is definite in the future that all people will use this technology and they will move towards building smart cities, homes, and industr...
It is significantly more challenging to extend the visibility factor to a higher depth during the development phase of a communication system for subterranean places. Even if there are numerous optical fiber systems that provide the right energy sources for intended panels, the visibility parameter is not optimized past a certain point. Therefore,...
Many people in society are facing problems related to health care, and diseases in the body are unable to be identified even with the presence of sensing technologies. The major reason for such failures in the identification process is that no virtual technologies are identified in the market. Most healthcare solicitations aim to design a particula...
Background
In many medically developed applications, the process of early diagnosis in cases of pulmonary disease does not exist. Many people experience immediate suffering due to the lack of early diagnosis, even after becoming aware of breathing difficulties in daily life. Because of this, identifying such hazardous diseases is crucial, and the s...
More significant data are available thanks to the present Internet of Things (IoT) application trend, which can be accessed in the future using some platforms for data storage. An external storage space is required for practical purposes whenever a data storage platform is created. However, in the IoT, certain cutting-edge storage methods have been...
This research study examines the integration of wireless system and solar cells for detection and location of faults in power grids by implementing minimum number of Phasor Measurement Units (PMUs) after considering zero injection buses. A fault in the grid networks indicates a failure in the entire network that interfaces the normal flow of curren...
This study explores the feasibility of allocating finite resources beyond fifth generation networks for extended reality applications through the implementation of enhanced security measures via offloading analysis (RLIS). The quantification of resources is facilitated through the utilization of parameters, namely energy, capacity, and power, which...
Due to the enormous data sizes involved in mobile computing and multimedia data transfer, it is possible that more data traffic may be generated, necessitating the use of data compression. As a result, this paper investigates how mobile computing data are compressed under all transmission scenarios. The suggested approach integrates deep neural net...
The majority of people in the modern biosphere struggle with depression as a result of the coronavirus pandemic’s impact, which has adversely impacted mental health without warning. Even though the majority of individuals are still protected, it is crucial to check for post-corona virus symptoms if someone is feeling a little lethargic. In order to...
To avoid dire situations, the medical sector must develop various methods for quickly and accurately identifying infections in remote regions. The primary goal of the proposed work is to create a wearable device that uses the Internet of Things (IoT) to carry out several monitoring tasks. To decrease the amount of communication loss as well as the...
In recent years the process of transportation needs a highly effective traffic system in order to monitor all consumer goods as many goods are left out at different locations. To handle such moving cases cloud platform is highly helpful as with respect to geographical location the goods are mapped in correct form. However incorporation of single cl...
An encouraging development is the quick expansion of renewable energy extraction. Harnessing renewable energy is economically feasible at the current rate of technological advancement. Traditional energy sources, such as coal, petroleum, and hydrocarbons, which have negative effects on the environment, are coming under more social and financial pre...
Many cutting-edge technologies with regard to agricultural applications are not being employed by farmers for a number of reasons, including the fact that each piece of designed equipment is manufactured for a specific utilisation mechanism. In contrast, the use of hyperspectral remote sensing techniques is expanding to deliver more valuable data a...
Diabetes problems can lead to a condition called diabetic retinopathy (DR), which permanently damages the blood vessels in the retina. If not treated, DR is a significant cause of blindness. The only DR treatments currently accessible are those that block or delay vision loss, which emphasizes the value of routine scanning with high-efficiency comp...
The process of ensuring automatic operation for industrial appliances using both supervision and control techniques is a challenging task. Therefore, this article focuses on implementing Supervisory Control and Data Acquisition (SCADA) for controlling all industrial appliances. The design process of implementation case is performed using an analyti...
The major objective of the exploration work is to detect various emotions of an individual for protective measures and to avoid shudder activities. In day-to-day life, many people are facing high thwarting and it can be only realized from their sensations. It is observed on average that a maximum number of individuals is bountiful to different emot...
This article focuses on the process of improving health care in real-time experimental settings. Despite the fact that there are numerous solutions for health-care issues, no remote solution has been devised. As a result, a novel model has been devised in the suggested technique, in which all hospital administration processes are simplified through...
Lung disease is one of the most harmful diseases in traditional days and is the same nowadays. Early detection is one of the most crucial ways to prevent a human from developing these types of diseases. Many researchers are involved in finding various techniques for predicting the accuracy of the diseases. On the basis of the machine learning algor...
High security for physical items such as intelligent machinery and residential appliances is provided via the Internet of Things (IoT). The physical objects are given a distinct online address known as the Internet Protocol to communicate with the network’s external foreign entities through the Internet (IP). IoT devices are in danger of security i...
Cloud services are a popular concept used to describe how internet-based services are delivered and maintained. The computer technology environment is being restructured with respect to information preservation. Data protection is of critical importance when storing huge volumes of information. In today's cyber world, an intrusion is a significant...
This article examines the effect of smart grid systems by implementing artificial intelligence (AI) technique with application of renewable energy sources (RES). The current state generation smart grid system follows a high demand on supply of equal energy load to all grid states. However, in conventional techniques, high demand is observed as manu...
Without integrating various sensor data sets, sensing information in the presence of leakage for large-scale pipeline systems is very challenging. A data fusion methodology, wherein more sensor data is merged to give relevant information, is necessary to transform the challenging process into a straightforward step-by-step operation. Ultrasonic sen...
A neurological disorder is a problem with the neural system of the body, as a brain tumor is one of the deadliest neurological conditions and it requires an early and effective detection procedure. The existing detection and diagnosis methods for image evaluation are based on the judgment of the radiologist and neurospecialist, where a risk of huma...
The run-on flat tire is an important technology in the area of vehicle safety technology. Nowadays, traveling by a personal vehicle from one place to another has increased due to the increase in the global economy. The main problem that is faced while traveling is tire puncture. The tire may get punctured by any sharp objects on the road such as sc...
Due to air pollution, pollutants that harm humans and other species, as well as the environment and natural resources, can be detected in the atmosphere. In real-world applications, the following impurities that are caused due to smog, nicotine, bacteria, yeast, biogas, and carbon dioxide occur uninterruptedly and give rise to unavoidable pollutant...
The majority of the current-generation individuals all around the world are dealing with a variety of health-related issues. The most common cause of health problems has been found as depression, which is caused by intellectual difficulties. However, most people are unable to recognize such occurrences in them, and no procedures for discriminating...
The production, testing, and processing of signals without any interpretation is a crucial task with time scale periods in today's biological applications. As a result, the proposed work attempts to use a deep learning model to handle difficulties that arise during the processing stage of biomedical information. Deep Conviction Systems (DCS) are em...
The power of wireless network sensor technologies has enabled the development of large-scale in-house monitoring systems. The sensor may play a big part in landslide forecasting where the sensor linked to the WLAN protocol can usefully map, detect, analyze, and predict landslide distant areas, etc. A wireless sensor network comprises autonomous sen...
In all developing countries, the application of biomedical signals has been growing, and there is a potential interest to apply it to healthcare management systems. However, with the existing infrastructure, the system will not provide high-end support for the transfer of signals by using a communication medium, as biomedical signals need to be cla...
In recent days, for smart grid network updates, video sensors are used where each node needs to be compressed before transmission. This is very much useful for developing countries as in future the smart grid communication process will play a major role in entire society. Therefore, in this article, minimization of power, energy consumption, and de...
In this article, malleable determinations have been made by integrating solar panels in the field of Power System State Estimation (PSSE) where the optimal placement using Phasor Measuring Units (PMUs) plays a major role in the integration process. This kind of integration provides a path for determining the importance of PMU and converting the gri...
Detecting intrusions from the supervisory control and data acquisition (SCADA) systems is one of the most essential and challenging processes in recent times. Most of the conventional works aim to develop an efficient intrusion detection system (IDS) framework for increasing the security of SCADA against networking attacks. Nonetheless, it faces th...
The estimated 30 million children and adults are suffering with diabetes across the world. A person with diabetes can recognize several symptoms, and it can also be tested using retina image as diabetes also affects the human eye. The doctor is usually able to detect retinal changes quickly and can help prevent vision loss. Therefore, regular eye e...
Mobile network nodes are trustworthy nodes; the data access in transmitting and receiving the data packet is not efficient in different network procedures. The malicious nodes are available in routing path making the packet loss, in packet transmission for time instance. Since the regular mobile network must not verify every mobile node approved el...
This article emphasis the importance of constructing an underwater vehicle monitoring system to solve various issues that are related to deep sea explorations. For solving the issues, conventional methods are not implemented, whereas a new underwater vehicle is introduced which acts as a sensing device and monitors the ambient noise in the system....
In modern days, for the perseverance of monitoring the vigor of a specific individual, the Wireless Body Sensor Networks have been emerging as an auspicious platform. The foremost challenge such as energy, path loss, and transmission distance that is prevalent from early days has been addressed in this article. The focal notion specified in this ex...
The process of incorporating robotic technology and autonomous vehicles are increasing in all applications where for all real-time application developments time and energy can be saved for every single movement transfer as compared to human classifications. Thus, considering the advantage of autonomous process without any presence of an individual,...
This paper addresses the uncertainty that is present in the design of static random access memory (SRAM) cells using an artificial intelligence (AI) technique. The SRAM has much uncertainty in high-performance portable very large-scale integration (VLSI) chips due to their performance and storage density. This paper presents the way for solving the...
This article focuses on implementing wireless sensors for monitoring exact distance between two individuals and to check whether everybody have sanitized their hands for stopping the spread of Corona Virus Disease (COVID). The idea behind this method is executed by implementing an objective function which focuses on maximizing distance, energy of n...
Skin problems are among the most common ailments on Earth. Despite its popularity, assessing it is not easy because of the complexities in skin tones, hair colors, and hairstyles. Skin disorders provide a significant public health risk across the globe. They become dangerous when they enter the invasive phase. Dermatological illnesses are a signifi...
In current generation the concept of cyber twin technology has been emerging as an improved platform for different applications. This paper emphasize on examining the effect of cyber twin technology for manufacturing equipment in Industry 4.0 applications by solving three different elementary objectives. For the proposed conception a new system mod...
In this article, a contemporary tack of mental tasks on cognitive parts of humans is appraised using two different approaches such as wavelet transforms at a discrete time (DWT) and support vector machine (SVM). The put forth tack is instilled with the electroencephalogram (EEG) database acquired in real-time from CARE Hospital, Nagpur. Additional...
is article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the fa...
is article focuses on providing solutions for one important application termed as agriculture. In India, one major occupation for people living in urban and rural areas is agriculture where an economic rate depends only on the crops they yield. In such cases, if an intelligent monitoring device is not integrated then it becomes difficult for the fa...
This article deliberates various issues that are present in the integration of nanorobots in medical applications when real-time arrangements are used. In the current generation, there is a need for a device to recognize different diseases in a fast mode of operation where data transfer should be highly accurate. Even though many devices are existi...
With the advent of smart city networks and increased utilization of vehicles, the Internet of Vehicles (IoV) has attracted more attention from researchers. But, providing security to this type of network is one of the challenging and demanding tasks in the present day. For this purpose, the conventional works developed many networking frameworks an...
This article addresses the importance of parking system which makes the movement of moving vehicles to be unrestricted thus providing integration between hominid classification and sensing systems. If two distinct systems are combined, then all the vehicles can monitor the parking space, and they can directly move towards the destination end within...
This article focuses on intensifying in-vehicle biological wireless sensor networks for the persistence of monitoring the information on a precise vehicle. The wireless sensor networks will have enormous amount of nodules which are interrelated with each other. Therefore, these wireless sensor networks can be installed on a vehicle not only for mon...
For improving the working efficiency of sensors and for testing them under different conditions, a predictive algorithm is essential. This is possible only when deep learning methods are used, where different strategies are followed when any problem occurs on the network. The health‐monitoring system has been integrated with SDAE, and the results a...
In this article, data processing of a supply chain management system has been monitored using the Internet of Space (IoS) which can be able to create possessions for managing the business process. In modern circumstances, many business inventiveness are trading and exporting products on their possession, but in many cases, information on such manuf...
This article highlights the importance of implementing intelligent monitoring devices with the internet of things (IoT) for observing the amount of charges on different appliances in each household. In India, it has been observed that 20% of power is wasted due to commercial appliances where the amount of charge flow is much excess to corresponding...
In the current-generation wireless systems, there is a huge requirement on integrating big data which can able to predict the market trends of all application systems. Therefore, the proposed method emphasizes on the integration of nanosensors with big data analysis which will be used in healthcare applications. Also, safety precautions are conside...
The proposed research aims to provide solutions for major problems in construction of buildings using intelligent monitoring devices. There are many problems that can be observed during construction of buildings like low value of strain and improper ratio mixtures. These problems cannot be identified by using a construction engineer and therefore w...