About
99
Publications
61,352
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,563
Citations
Introduction
I am presently work in Dept. of Computer Science and Engg., National Institute of technology Patna(NIT Patna). I generally work in field of Semantic Web, Ontology, Machine Learning. Recently I have started working in field of Probabilistic Ontology, Fuzzy Ontology , Approximation, model checking and sentimental Analysis.
Current institution
Additional affiliations
Education
September 2012 - November 2018
Publications
Publications (99)
The productivity of agriculture plays a critical role in the Indian economy. Growing crop production is a critical responsibility nowadays to accommodate citizen demand and provide farmers with greater rewards. Therefore, a machine learning (ML) technique is employed to more precisely identify diseases and pests on leaves and other crop parts. This...
Healthcare 4.0 is considered the most promising technology for gathering data from humans and strongly couples with a communication system for precise clinical and diagnosis performance. Though sensor-driven devices have largely made our everyday lives easier, these technologies have been suffering from various security challenges. Because of data...
In the evolving landscape of smart cities, the integration of technology and real-time data management presents a dual-edged challenge and opportunity for urban accessibility. The web of devices, from smartphones and connected cars to homes and citizens, forms the backbone of a smart city's infrastructure. As cities strive to become technologically...
The convergence of Internet of Things (IoT) technology and blockchain offers transformative potential for the development of smart cities, enhancing industry operations and healthcare systems. IoT devices generate vast amounts of data to optimize urban infrastructure and improve service delivery, while blockchain provides a secure, transparent fram...
The rapid growth of the internet has reached the fourth generation, i.e. web 4.0, which supports Sentiment Analysis (SA) in many applications such as social media, marketing, risk management, healthcare, businesses, websites, data mining, e-learning, psychology, and many more. Sentiment analysis is a powerful tool for governments, businesses, and r...
Pneumonia is a widespread and acute respiratory infection that impacts people of all ages. Early detection and treatment of pneumonia are essential for avoiding complications and enhancing clinical results. We can reduce mortality, improve healthcare efficiency, and contribute to the global battle against a disease that has plagued humanity for cen...
Introduction
The smart city infrastructure consist of technologies and applications which link devices, fetch and manages real time data from a set of devices. The data gathered from sensors that generate real time information, intelligence and analytics which aims to transform the city accessibility in a smart technology enhanced city. In recent y...
The authenticity, privacy, and nonrepudiation of IoT applications are all guaranteed by the ID-Based Signature (IDBS) cryptographic technique. Digital communication presents challenges for information evaluation and removal-back transmission. Security was consequently needed in a cloud-based system to interact with the correct location or nodes. Fu...
The geographical location of any region, as well as large-scale environmental changes caused by a variety of factors, invite a wide range of disasters. Floods, droughts, earthquakes, cyclones, landslides, tornadoes, and cloudbursts are all common natural disasters that destroy property and kill people. On average, 0.1% of the total deaths globally...
Distributed Denial of Service (DDoS) attacks are common and increasing in frequency. It renders the service inaccessible to legitimate users and degrades network performance. A complex structural environment called a Cyber-Physical System (CPS) is created by combining computation, connectivity, and physical parameters. Software-Defined Networking (...
Energy consumption has become an essential factor in designing modern computer system architecture. Because of physical limits, the termination of Moore’s law and Dennard’s scaling has forced the computer design community to investigate new approaches to meet the requirements for computing resources. Approximate computing has emerged as a promising...
According to a report published by Business Wire, the market value of e-commerce reached US$ 13 trillion and is expected to reach US$ 55.6 trillion by 2027. In this rapidly growing market, product and service reviews can influence our purchasing decisions. It is challenging to manually evaluate reviews to make decisions and examine business models....
Nowadays, finding genetic components and determining the likelihood that treatment would be helpful for patients are the key issues in the medical field. Medical data storage in a centralized system is complex. Data storage, on the other hand, has recently been distributed electronically in a cloud-based system, allowing access to the data at any t...
Recommendation System is one of such solutions to overcome information overload issues and to identify products most relevant to users and provide suggestions to users for items they might be interested in consuming or elements matching their needs. The significant challenge of several recommendation approaches is that they suggested a huge number...
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrus...
For the development of smart cities, electronic waste generation is one of the significant issues to tackle. According to the United Nations, India is the third-largest e-waste generator. The management of e-waste is complex because of less awareness. This paper aims to improve e-waste management by segregating them from general waste, tracking the...
Past international trade practices have been associated with opaque information flows that have hindered traceability and created hurdles in hassle‐free trade. Blockchain and allied technologies have been investigated as a panacea for the problems faced by the Cloud‐Based Manufacturing industry. However, previous literature has focused on limited a...
Role Back Access Control model (RBAC) allows devices to access cloud services after authentication of requests. However, it does not give priority in Big Data to devices located in certain geolocations. Regarding the crisis in a specific region, RBAC did not provide a facility to give priority access to such geolocations. In this paper, we planned...
In the field of information retrieval, query expansion (QE) has long been used as a technique to deal with the fundamental issue of word mismatch between a user’s query and the target information. In the context of the relationship between the query and expanded terms, existing weighting techniques often fail to appropriately capture the term-term...
With the rise of artificial intelligence and machine learning in the last decade, there has been an increasing interest in developing a solid theory and implementing algorithmic fairness, which has eventually resulted in a large volume of work over the past few years. Despite the enormous amount of work done on the topic over a concise period, ther...
Even in the modern era, where communication with other Humans does not seem to be a costly affair, Depression still serves as a global problem. Despite Depression being recognised as a severe disease by many international bodies and organisations, counteractions against it do not even solve the problem by a fractional per cent. The core problem lie...
The end of Moore’s law and Dennard scaling is shifting the typical computing paradigm towards Approximate Computing. This paper aims to explain an enhanced version of the MESI(Modified Exclusive Shared Invalid) cache coherence protocol using approximation and verifying its correctness with a model checker. In this proposed MESI-A(MESI-APPROX) cache...
Background
Infectious disease happens when an individual is defiled by a micro-organism/virus from another person or an animal. It is troublesome that causes hurt at both individual and huge scope scales.
Case Presentation
The ongoing episode of COVID-19 ailment brought about by the new coronavirus first distinguished in Wuhan China, and its quick...
Automatic extraction of background knowledge of news articles, published over the web is a complex task and less explored by knowledge-mining researchers. Suppose there is no source of background or related information available on editorial, in this case, the reader needs to search it, which is a time-consuming process of manually going over possi...
Multilabel scene classification has emerged as a critical research area in the domain of remote sensing. Contemporary classification models primarily emphasis on a single object or multiobject scene classification of satellite remote sensed images. These classification models rely on feature engineering from images, deep learning, or transfer learn...
Coughing analysis stays a region that has gotten meager consideration from AI scientists. This can be credited to a few factors, for example, wasteful auxiliary frameworks, high costs in getting databases, or trouble in building classifiers. The current paper classifies and audits the advancement on coughing sound investigation, AI models, and the...
Ontologies are considered as a cornerstone for knowledge-based systems and semantic web for reusing and sharing the knowledge by explicit specification of shared conceptualizations. For representing and organizing knowledge, ontology needs a conceptual model to express the real-world objects. The conceptual model explores a series of entities, rela...
Smart cities or Smart societies require Internet of Things (IoT), for connecting numerous devices to enormous asset pools in cloud computing. This coordination of embedded tools plus cloud servers conveys the extensive applicability of IoT in Smart Cities. However, authentication and data protection, play a major job in secure coordination of these...
Serious concerns regarding vulnerability and security have been raised as a result of the constant growth of computer networks. Intrusion detection systems (IDS) have been adopted by network administrators to provide essential network security. Commercial IDS in the market do not have the capability to identify novel attacks but generate false alar...
Blockchain and allied technologies have been investigated as panacea for the problems faced by supply chain and logistics industry. However, earlier literatures have focused on limited aspects of a typical supply chain such as monitoring assets, securing traceability widely neglecting data integrity, and data access. To overcome such drawbacks, the...
Decision making using Machine Learning can be efficiently applied to security. Malware has become a big risk in today’s times. In order to provide protection for the same, we present a machine-learning based technique for predicting Windows PE files as benign or malignant based on fifty-seven of their attributes. We have used the Brazilian Malware...
This paper gives precise and comprehensive detail along with a proposed system for malware detection using ML and Deep Learning techniques by integrating both behavior-based detection methods and signature-based methods. The primary purpose of this paper is (A) Outline difficulty identified with malware detection. (B) Represent detail and categoriz...
Cough is a symptom in over a hundred respiratory diseases. The audio features in cough signals contain erudition about the predicament of the respiratory system. Using deep learning or signal processing, these features can be used to build an effective disease prediction system. However, cough analysis remains an area that has received scant attent...
Past international trade practices have been associated with opaque information flows that have hindered traceability and created hurdles in hassle-free trade. Blockchain and allied technologies have been investigated as a panacea for the problems faced by supply chain and logistics industry. Network analysis also uncovered twenty types of legal an...
Cyberattacks are increasing rapidly with rapid Internet advancement and, the cybersecurity situation is not optimistic. Anomaly detection is one of the challenging sectors of network security, which shows a significant role in any organization. Many anomaly detection systems identify malicious activities by deploying machine learning and deep learn...
Traditional technique for determining the soil texture and other soil properties is performed in laboratory which is a time consuming task. In this paper, machine learning algorithms are deployed to classify the soil texture and its properties without any intervention of laboratory equipment using the satellite images recorded by Landsat 8. These i...
Bitcoin system (or Bitcoin) is a peer-to-peer and decentralized payment system that uses cryptocurrency named bitcoins (BTCs) and was released as open-source software in 2009. Bitcoin platform has attracted both social and antisocial elements. On the one hand, it is social as it ensures the exchange of value, maintaining trust in a cooperative, com...
Training a machine learning model always requires an ample quantity of data as the effectiveness of the model depends on how good it is trained. It is not always that easy, using Zero-shot learning this paper is concentrated on intent classification in different speeches given the model is trained only in one language. Several machine learning mode...
Background: Interoperability of health information systems is a challenge due to the heterogeneity of existing systems at both the technological and semantic levels of their data. The lack of existing data about interoperability disrupts intra-unit and inter-unit medical operations as well as creates challenges in conducting studies on existing dat...
In the age of start-ups and technical research, the demand for high-end computing power and loads of space is ever increasing. Machine learning techniques have become an inseparable part of the big data analytics. Setting up one’s own infrastructure to deal with all this vastness is usually not feasible due to high expenses and lack of desired expe...
The aim of this paper is to retrieve the most relevant expansion words for expanding the initial query of the user in order to enhance the outcomes of web search results. Query expansion plays a major role in reformulating a user’s initial query to a one more pertinent to the user’s intended meaning. The reformulated query is then used to obtain mo...
This paper discusses an ontology based clinical decision support system for the specialty of Geriatric Medicine. We created a domain level ontology based on Handbook of Geriatrics and then mapped it to an upper level Basic Formal Ontology. The decision support system has been developed in Prolog. For accessing this ontology, we created an interacti...
The domain of the railway system is vast and complex since it includes several sub-domains hierarchy in it. These sub-domains include different branches of technology and operational hierarchy. Many types of research are running on and have happened in this vast domain along with different technologies. Among all available technologies ontology is...
Hidden interests of an individual can be inferred by keenly observing their social profile data and blending this data with a semantic network. Getting user interests without user’s manual intervention is very beneficial for companies feeding on user’s regular behavior. This paper provides the entire idea of how to retrieve the user’s hidden intere...
Background:
Interoperability of health information systems is a challenge due to the heterogeneity of existing systems at both the technological and semantic levels of their data. The lack of existing data about interoperability disrupts intra-unit and inter-unit medical operations as well as creates challenges in conducting studies on existing da...
BACKGROUND
Interoperability of health information systems is a challenge due to the heterogeneity of existing systems at both the technological and semantic levels of their data. The lack of existing data about interoperability disrupts intra-unit and inter-unit medical operations as well as creates challenges in conducting studies on existing data...
Phylogenetic trees represent evolutionary relationships among sets of organisms. Popular phylogenetic reconstruction approaches typically yield hundreds to thousands of trees on a common leafset. Storing and sharing such large collection of trees requires considerable amount of space and bandwidth. Furthermore, the huge size of phylogenetic tree da...
Tuberculosis (TB) has been one of the top ten causes of death in the world. As per the World Health Organization (WHO) around 1.8 million people have died due to tuberculosis in 2015. This paper aims to investigate the spatial and temporal variations in TB incident in South Asia (India, Bangladesh, Pakistan, Maldives, Nepal, and Sri-Lanka). Asia ha...
p>Tuberculosis (TB) has been one of the top ten causes of death in the world. As per the World Health Organization (WHO) around 1.8 million people have died due to tuberculosis in 2015. This paper aims to investigate the spatial and temporal variations in TB incident in South Asia (India, Bangladesh, Pakistan, Maldives, Nepal, and Sri-Lanka). Asia...
Medical data research and analysis is a heuristic-based system that analyzes disease in metropolitan cities of India like Delhi using input from the cyber social system. This provides information regarding the level of infections in different localities and correlations among events which cause that disease. The inputs from physical cyber social sy...
Today World Wide Web has emerged as a second world. Everything we can think of is now available on this digital world. In the real world there exists many kinds of people. Some are good, some are bad, and some are trustworthy while the rest are liars. Similarly, in the digital world, there exits many websites out of which some are good while the re...
Objective: The paper proposes the design of an intermediate Hadoop framework which will not only make Hadoop user friendly but also it is open source and free to use. Methods: The framework has been called Integrated Hadoop Cloud Framework (IHCF) and it also supports various Hadoop based frameworks like Hive, Pig as cloud services. It can be access...
Online shopping has witnessed explosive growth: there are hundreds of millions of online shoppers that are part of an online retail industry worth of hundreds of billions of dollars. While online shopping has its own advantages (such as convenience, product reviews, price and selection range), recent focus has been in using technology to mimic the...
This paper presents an ontology based formalism of existing system for TB (Tuberculosis) control and management in India that is RNTCP (Revised National TB Control Programme). India in recent years has been highest TB burden country. There are some geographical areas of India which are badly affected by TB. The formalism presented in the paper will...
In this paper, the authors have deployed a Social Web Graph over a Semantic Web Framework. A social web graph is a collection of nodes, connected via directed edges. A graph simplifies the search by reducing the sample space by half after every node. But this is a keyword based search and is not rather intelligent. On the other hand a Semantic web...
Metropolitan traffic research and analysis is a heuristic based system that analyses traffic congestion in metropolitan cities of India like Delhi using input from twitter feeds. It provides information regarding the level of congestion between source and destination in a route and correlations among events that cause traffic. The inputs from cyber...
Dr. Eye is an android application that focuses on the calculation of the vision acuity of a patient in a similar way an ophthalmologist checks the eyesight using Snellen chart. The calculation of vision acuity uses the text to speech conversion of android in a restricted way and also it uses the front camera to calculate the distance of the screen...
Keyword based search engine generally provides result set with a large number of web pages, mostly irrelevant. The world wide web is a large collection of web/hypertext document, so effort is required to provide relevant data for a given set of query with less response time. This paper implements the semantic-synaptic web mining algorithm, and comp...
With growing number of applications, and each user having different passwords for different applications, an improved single sign on design, which can address proper credentials management, dynamic session management, reduce background overload and solve security loop holes, is required. The above features can be easily implemented by enhancing the...
Today, World Wide Web has become an integral part of our life. We have entered into a digital era where everything we need is available online. For every task or information we think of, there exists a website for it. With so many websites running over the internet the amount of useless scripts, images, ads, videos, link have increased exponentiall...
Print
Request Permissions
Cloud computing involves deploying groups of remote servers and software networks, offering computational resources as a service to clients. The servers are virtualized, which means virtual machines are rapidly provisioned on demand and released without service provider's interaction. These virtual machines might interact...
Internet today has made the life of human beings almost completely dependent on it. Internet contains information regarding almost everything and anything. Among the information that a webpage contains, noises and non-essential information also constitute a large part of the webpage. These noises can be the pop-up advertisements, non-essential imag...
This research focuses on the development of a web based advisory system known as Student
Placement Advisory System (SPAS) using Semantic Web technology. The Semantic Web is a meaningful web
that gives a meaning to the data stored on the web, data which can be processed and inferred. Student Placement System is one of the critical service responsibi...
In this paper, we propose a new framework for efficient feature extraction and feature set identification for prostate MRI images, which will be used for automated prostate cancer detection from 2D, or 3D MRI images using classifiers or decision tree. We framed a more robust PDF based image denoising and enhancement following with a hybrid method f...
Semantic-Synaptic web mining [1] aims to integrate
the best idea from the semantic web and synaptic web with web
mining at low entropy. Semantic entropy can help researchers
to decide not only how to work with words, but which words
to work with. Many researchers are struggling to upgrade the
result of web mining by capitalizing semantic structure...
This paper is related to implementation of remote client server interaction in a LAN through GSM. Mobile devices are becoming more and more popular and powerful and are providing a new notion of communication that we could once only imagine. A truly wireless mobile is new to the vast majority of computer users. This system allows a user to remotely...
The development of space communication technology is being a major challenge to the research community because the current internet architecture follows some critical assumptions that will not be acceptable in many emerging environments like long signal propagation delay, frequent communication link disruption, short communication windows, asymmetr...
Web mining is the application of data mining technique to automatically discover and gathered information from web documents and services which can be in structured, unstructured or semi-structured form. It is used to understand user behaviour, evaluate the effectiveness of a particular web and find out the relevant and efficient results from the w...
This paper makes use of Semantic web technologies for developing a model for web searching and data representation over the existing technologies. The paper here proposes the use of a novel-ontology-based semantic search engine which takes into consideration the domain or semantic meaning of the user’s query. The solution adopted here takes into co...
In recent years, the development in Information technology has unleashed new challenges and opportunities for new authentication systems and protocols. Authentication ensures that a user is who they claim to be. The trust of authenticity increases exponentially when more factors are involved in the verification process. When security infrastructure...
Multifactor Authentication is a term used to describe security mechanisms that make use of two or more distinct and different category of authentication mechanisms to increase the protection for valid authentication. Multifactor Authentication that uses two levels of security can be used to obtain Two-factor Authentication. Introducing One Time Pas...
Weather forecasting has become an important field of research in the last few decades. In most of the cases the researcher had attempted to establish a linear relationship between the input weather data and the corresponding target data. But with the discovery of nonlinearity in the nature of weather data, the focus has shifted towards the nonlinea...
The multilayered artificial neural network with learning by back-propagation algorithm configuration is the most common in use, due to of its ease in training. It is estimated that over 80% of all the neural network projects in development use back-propagation. In back-propagation algorithm, there are two phases in its learning cycle, one to propag...
Biometric recognition deals with recognition of an individual from distinctive anatomical and behavioural characteristics for effective identification solution. This paper presents a brief introduction on what is biometric, how it is helpful for security purposes and what are the various techniques that are being used in current scenario. A compari...
The use of Neural networks has found a variegated field of applications in the present world. This has led to the development of various models for financial markets and investment. This paper represents the idea how to predict share market price using Artificial Neural Network with a given input parameters of share market. Artificial Neural Networ...
Test automation is widely used in different practices all over the world often to save time or to reduce manual effort. However, regression analysis consists of mundane tasks that are performed by software engineers on a daily basis. Automation of a regression analysis raises our hopes by promising a reduction in time and effort, yet at the same ti...
The term Collaborative Filtering is used as a backbone in almost all Commercial Recommendation Systems today. This paper attempts to review all major developments in area of Collaborative Filtering. Main application area is outlined and examples of applications of Collaborative Filtering are presented.
For a long time now, RDF has shown great promise as a flexible format for storing, aggregating, and using metadata. Maybe for too long—its most well-known syntax, RDF/XML, is messy enough to have scared many people away from RDF. The W3C is developing a new, simpler syntax called RDFa (originally called "RDF/a") that is easy enough to create and to...
The paper describes the method of how to develop "Intelligent agents" for web searching and replacing the existing "User agents" with the "Intelligent agents". This process is described by developing a website (viz.Music Library) which runs on an inferencing engine which suggests the users the kind of music they like based upon its reasoning. The d...
Disasters never ring a bell before its arrival; it just arrives and destroys everything that comes in its way. Whether it is natural (Earthquakes, Cyclone) or manmade (System Failures, War), it doesn't matter. For a growing economy like India where the various sectors of Industry are giving stiff competition to their global counterparts, it becomes...