Ketan Kotecha

Ketan Kotecha
Symbiosis International University | SIU · Symbiosis Centre for Applied Artificial Intelligence

Doctor of Philosophy

About

312
Publications
113,268
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,911
Citations
Citations since 2017
281 Research Items
2779 Citations
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000
201720182019202020212022202302004006008001,000

Publications

Publications (312)
Article
Full-text available
Reinforcement learning (RL) is revolutionizing the artificial intelligence (AI) domain and significantly aiding in building autonomous systems with a higher level comprehension of the world as we observe it. Deep learning (DL) facilitates RL to scale and resolve previously intractable problems, for instance, allowing supervision principles designed...
Article
Full-text available
Lyme disease diagnosis poses a significant challenge, with blood tests exhibiting an alarming inaccuracy rate of nearly 60% in detecting early-stage infections. As a result, there is an urgent need for improved diagnostic methods that can offer more accurate detection outcomes. To address this pressing issue, our study focuses on harnessing the pot...
Article
Full-text available
Human behaviour reflects cognitive abilities. Human cognition is fundamentally linked to the different experiences or characteristics of consciousness/emotions, such as joy, grief, anger, etc., which assists in effective communication with others. Detection and differentiation between thoughts, feelings, and behaviours are paramount in learning to...
Article
Full-text available
Stock exchanges are places where buyers and sellers meet to trade shares in public companies. Stock exchanges encourage investment. Companies can grow, expand, and generate jobs in the economy by raising cash. These investments play a crucial role in promoting trade, economic expansion, and prosperity. We compare the three well-known deep learning...
Chapter
Blockchain technology has the potential to minimize fraud and increase the efficiency of payroll systems. Every government, corporation, and other entity must have a payroll administration system in place to ensure correct and timely employee payment. Poor-country payroll systems face challenges such as a lack of decentralization, ghost work, cyber...
Chapter
Today, passwords are a very popular mode of authentication in the modern web and applications. But as we have known for a long time, passwords are not secure. To improve its security, OTP and other mechanisms are used. One of the newer methods is the WebAuthn protocol, developed by the FIDO alliance. However, this is not widely applicable for all d...
Chapter
The human brain primarily controls the humanoid system. Brain cancer is brought on by the persistent growth of brain tumors, which are brought on by the relationship between aberrant brain cell development and proliferation and human health. A big part is played by computer vision, which lessens the need for human judgment to produce accurate findi...
Chapter
Digital recordings are now affordable, quick to make, and straightforward to upload on web platforms because of the widespread availability of video recording technology in smartphones and other digital devices. The truth of films published on social media cannot be trusted. With the latest tools used for video editing tools, movies may now be read...
Chapter
As the applications of image classification models have grown, there has emerged a need to develop classifier models which are invariant to the orientation of the image. Traditionally, image augmentation is applied during training of classification models to encourage the quality of rotation invariance. In our work, we propose an alternate method o...
Article
Full-text available
The milling machine serves an important role in manufacturing because of its versatility in machining. The cutting tool is a critical component of machining because it is responsible for machining accuracy and surface finishing, impacting industrial productivity. Monitoring the cutting tool’s life is essential to avoid machining downtime caused due...
Article
Full-text available
Artificial Intelligence (AI) has been used for processing data to make decisions, Interact with humans, and understand their feelings and emotions. With the advent of the Internet, people share and express their thoughts on day-to-day activities and global and local events through text messaging applications. Hence, it is essential for machines to...
Preprint
Full-text available
In the current age, human lifestyle has become more knowledge oriented leading to generation of sedentary employment. This has given rise to a number of health and mental disorders. Mental wellness is one of the most neglected but crucial aspects of today's world. Mental health issues can, both directly and indirectly, affect other sections of huma...
Article
The stemming process is crucial and significant in the pre-processing step of natural language processing. The stemmer oversees the stemming process. It facilitates the extraction of morphological variants of a root or base word from the provided word. Over the period, several stemmers for various vernacular languages have been proposed. However, v...
Article
Parkinson's disease (PD) is a progressive neurodegenerative disorder. Various symptoms and diagnostic tests are used in combination for the diagnosis of PD; however, accurate diagnosis at early stages is difficult. Blood-based markers can support physicians in the early diagnosis and treatment of PD. In this study, we used Machine Learning (ML) bas...
Chapter
Obesity is a dangerous epidemic worldwide and is the root cause of many diseases. It is difficult for people to have the same diet with an optimized calorie intake as it becomes monotonous and boring. It will be much better if a dynamic diet can be generated depending upon the calories burnt by a person and their current Body Mass Index (BMI). The...
Preprint
Full-text available
The open road poses many challenges to autonomous perception, including poor visibility from extreme weather conditions. Models trained on good-weather datasets frequently fail at detection in these out-of-distribution settings. To aid adversarial robustness in perception, we introduce WEDGE (WEather images by DALL-E GEneration): a synthetic datase...
Preprint
Full-text available
In autonomous driving systems, the semantic segmentation task involves scene partition into numerous expressive portions by classifying and labeling every image pixel for semantics. The algorithm used for semantic-segmentation has a vital role in autonomous driving architecture. The main contribution of this paper is the design of UNET architecture...
Article
Machine learning has proven to be a practical medical image processing technique for pattern discovery in low-quality labelled and unlabeled datasets. Deep vein thrombosis and pulmonary embolism are both examples of venous thromboembolism, which is a key factor in patient mortality and necessitates prompt diagnosis by experts. An immediate diagnosi...
Article
Full-text available
The unexpected and rapid spread of the COVID-19 pandemic has amplified the acceptance of remote healthcare systems such as telemedicine. Telemedicine effectively provides remote communication, better treatment recommendation, and personalized treatment on demand. It has emerged as the possible future of medicine. From a privacy perspective, secure...
Chapter
Full-text available
Voice recognition is a biometric technique based on the unique qualities of a person’s voice that has become more convenient, safer, and secure than ever before thanks to recent breakthroughs in computing technology. Speech is the most basic method of human communication. A speech recognition system is a technology that converts a human voice into...
Article
Industry 4.0 is an era of smart manufacturing. Manufacturing is impossible without the use of machinery. The majority of these machines comprise rotating components and are called rotating machines. The engineers’ top priority is to maintain these critical machines to reduce the unplanned shutdown and increase the useful life of machinery. Predicti...
Article
Full-text available
The manufacturing world is subject to ever-increasing cost optimization pressures. Maintenance adds to cost and disrupts production; optimized maintenance is therefore of utmost interest. As an autonomous learning mechanism reinforcement learning (RL) is increasingly used to solve complex tasks. While designing an optimal, model-free RL solution fo...
Article
Full-text available
Feature selection and feature extraction have always been of utmost importance owing to their capability to remove redundant and irrelevant features, reduce the vector space size, control the computational time, and improve performance for more accurate classification tasks, especially in text categorization. These feature engineering techniques ca...
Article
Full-text available
This research paper focuses on developing an effective gesture-to-text translation system using state-of-the-art computer vision techniques. The existing research on sign language translation has yet to utilize skin masking, edge detection, and feature extraction techniques to their full potential. Therefore, this study employs the speeded-up robus...
Article
Full-text available
Social media platforms play a key role in fostering the outreach of extremism by influencing the views, opinions, and perceptions of people. These platforms are increasingly exploited by extremist elements for spreading propaganda, radicalizing, and recruiting youth. Hence, research on extremism detection on social media platforms is essential to c...
Article
Full-text available
Breast cancer is the leading cause of death among women around the world. It is a primary malignancy for which genetic markers have revealed the ability for clinical decision making. It is a genetic disease that generates due to gene mutations, but the cost of a genetic test is relatively high for a number of patients in developing nations like Ind...
Article
Full-text available
A breast tissue biopsy is performed to identify the nature of a tumour, as it can be either cancerous or benign. The first implementations involved the use of machine learning algorithms. Random Forest and Support Vector Machine (SVM) were used to classify the input histopathological images into whether they were cancerous or non-cancerous. The imp...
Article
Full-text available
In this paper, we propose a solution for optimizing the routes of Mobile Medical Units (MMUs) in the domain of vehicle routing and scheduling. The generic objective is to optimize the distance traveled by the MMUs as well as optimizing the associated cost. These MMUs are located at a central depot. The idea is to provide improved healthcare to the...
Chapter
Landmine is one of the most deadly kinds of warfare weapon being used in the current century. Technological advancements are forcing the use of sensory systems for landmine detection operations. By sensing the different characteristics of a landmine, its presence can be predicted. Multi-sensors based landmine detection systems have shown significan...
Article
Full-text available
Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of the most promising biometrics techniques, it is vulnerable to spoofing threats. Many researchers focus on face liveness detection to protect biometric authentication systems from spoofing attacks with printed photos, video replays,...
Article
Full-text available
The primary objective of this proposed framework work is to detect and classify various lung diseases such as pneumonia, tuberculosis, and lung cancer from standard X-ray images and Computerized Tomography (CT) scan images with the help of volume datasets. We implemented three deep learning models namely Sequential, Functional & Transfer models and...
Chapter
With growing concerns about network security, various ways to protect your network from unauthorized access have been proposed. A new style has been proposed to reveal implicit discrepancies that can harm the network. Vulnerability analysis is the most commonly used method. Vulnerability is the hidden weakness of a system that makes it vulnerable t...
Article
Full-text available
The speech and hearing-impaired community use sign language as the primary means of communication. It is quite challenging for the general population to interpret or learn sign language completely. A sign language recognition system must be designed and developed to address this communication barrier. Most current sign language recognition systems...
Article
Full-text available
Deep Neural Networks (DNNs) trained on one dataset (source domain) do not perform well on another set of data (target domain), which is different but has similar properties as the source domain. Domain Adaptation (DA) strives to alleviate this problem and has great potential in its application in practical settings, real-world scenarios, industrial...
Article
Full-text available
In VLSI circuit design, physical design is one of the main steps in placing the circuit into the chip area. Floorplanning is a crucial step in the physical design of IC design, which generates a blueprint for the placement of circuit modules into the chip. A floorplanning step accepts a netlist as its input, given by the circuit-partitioning step o...
Article
Full-text available
Multi-objective reliability-redundancy allocation problem (MORRAP) needs to maximize system reliability and minimize cost, weight, and volume with underlining constraints. In the systems’ design and analysis phase, uncertainties can occur from various sources, such as manufacturing variability, environmental conditions, user behavior, etc. To deal...
Article
Full-text available
Web Information Processing (WIP) has enormously impacted modern society since a huge percentage of the population relies on the internet to acquire information. Social Media platforms provide a channel for disseminating information and a breeding ground for spreading misinformation, creating confusion and fear among the population. One of the techn...
Article
Full-text available
Data security and integrity are becoming increasingly important as the volume of data being created and stored grows. A controlled third party that provides most of the existing big data security systems makes them susceptible to several security risks. By resolving current technology challenges, including scalability, non-tampering, trustworthines...
Article
Full-text available
Parkinson’s disease (PD) is a rapidly growing neurodegenerative disorder that primarily affects the elderly population. Until now, there has been no antidote for PD. However, diagnosing Parkinson’s disease in its early stages is difficult. Early treatment will help people with Parkinson’s disease improve their quality of life. The primary goal of t...
Article
Full-text available
The accurate and reliable derivation of the pap smear cell, which contains cytoplasm and nucleus regions, depends on the segmentation process employed in the cervical cancer detection mechanism. In this paper, an Improved Boykov’s Graph Cut-based Conditional Random Fields and Superpixel imposed Semantic Segmentation Technique (IBGC-CRF-SPSST) is pr...
Article
Full-text available
Coverage area optimization is always a challenging task to configure an efficient Wireless Sensor Network (WSN). This article proposes an energy-efficient coverage area optimization technique of WSN using a novel hybrid algorithm, called MOFAC-GA-PSO (Minimum Overlapped Full Area Coverage using hybridized Genetic Algorithm-Particle Swarm Optimizati...
Article
Cutting forces and vibrations generated during machining significantly affects the cutting tool and the integrity of the workpiece surface. Therefore, it is necessary to control or reduce those vibrations. Among the different vibration control methods, semi-active and active vibration control approaches are more effective than traditional methods....
Article
Full-text available
This paper aims at analyzing the performance of reinforcement learning (RL) agents when trained in environments created by a generative adversarial network (GAN). This is a first step towards the greater goal of developing fast-learning and robust RL agents by leveraging the power of GANs for environment generation. The RL techniques that we tested...
Article
Full-text available
Many robotics systems carrying certain payloads are employed in manufacturing industries for pick and place tasks. The system experiences inefficiency if more or less weight is introduced. If a different payload is introduced (either due to a change in the load or a change in the parameters of the robot system), the robot must be re-trained with th...
Article
Full-text available
Diabetic retinopathy occurs due to long-term diabetes with changing blood glucose levels and has become the most common cause of vision loss worldwide. It has become a severe problem among the working-age group that needs to be solved early to avoid vision loss in the future. Artificial intelligence-based technologies have been utilized to detect a...
Article
Full-text available
Self-supervised learning approaches have seen success transferring between similar medical imaging datasets, however there has been no large scale attempt to compare the transferability of self-supervised models against each other on medical images. In this study, we compare the generalisability of seven self-supervised models, two of which were tr...
Article
Full-text available
With the advances in brain imaging, magnetic resonance imaging (MRI) is evolving as a popular radiological tool in clinical diagnosis. Deep learning (DL) methods can detect abnormalities in brain images without an extensive manual feature extraction process. Generative adversarial network (GAN)-synthesized images have many applications in this fiel...
Article
Full-text available
Computational analysis methods including machine learning have a significant impact in the fields of genomics and medicine. High-throughput gene expression analysis methods such as microarray technology and RNA sequencing produce enormous amounts of data. Traditionally, statistical methods are used for comparative analysis of gene expression data....
Article
Emerging technologies such as blockchain and digital twins are essential for the rapid development and employment in Industry 5.0 revolution. With the growing number of industrial IoT nodes, optimizing the network and availing of limited resources to enable secure transmission is difficult. A digital twin is the virtual representation of a physical...
Article
Full-text available
The induction motor plays a vital role in industrial drive systems due to its robustness and easy maintenance but at the same time, it suffers electrical faults, mainly rotor faults such as broken rotor bars. Early shortcoming identification is needed to lessen support expenses and hinder high costs by using failure detection frameworks that give f...
Article
Full-text available
Human ideas and sentiments are mirrored in facial expressions. They give the spectator a plethora of social cues, such as the viewer’s focus of attention, intention, motivation, and mood, which can help develop better interactive solutions in online platforms. This could be helpful for children while teaching them, which could help in cultivating a...
Article
Full-text available
Cervical cancer earlier detection remains indispensable for enhancing the survival rate probability among women patients worldwide. The early detection of cervical cancer is done relatively by using the Pap Smear cell Test. This method of detection is challenged by the degradation phenomenon within the image segmentation task that arises when the s...
Article
Full-text available
Rotating machines is an essential part of any manufacturing industry. The sudden breakdown of such machines due to improper maintenance can also lead to the industries' shutdown. The era of the 4th industrial revolution is taking its major shape concerning maintenance strategies, notable being in predictive maintenance. Fault prediction and diagnos...
Article
Full-text available
Question Answer System (QAS) automatically answers the question asked in natural language. Due to the varying dimensions and approaches that are available, QAS has a very diverse solution space, and a proper bibliometric study is required to paint the entire domain space. This work presents a bibliometric and literature analysis of QAS. Scopus and...