About
103
Publications
24,431
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
661
Citations
Introduction
Current institution
Publications
Publications (103)
Visibility of functional requirement(FR) is very much clear in software development so in this area lot of research has been done but non functional requirement(NFR) are hidden in nature so very less research has been done in tis area Even it is hidden requirement but still it play very important role in software development because it specifies qu...
Facial recognition technology is based on a person's facial features. It is often the core of applications such as biometrics, access control, and forensics. However, due to environmental factors such as dust accumulation on the camera lens or equipment failure, the accuracy of the system is often questioned; especially when it comes to noise and p...
The locomotion and route planning of humanoid robots has become one of the utmost promising areas of research as humanoids are used more frequently in various fields of industrial automation and manufacturing. In this study, an effective solution for the navigation of humanoid robots is promised by fuzzy logic controllers. The fuzzy rule-base built...
In order to seamlessly identify the links between various DNA sequences on a broad scale, DNA sequencing is a crucial tool. But there is still more potential for advancement in sequencing quality. A highly well-liked method for determining sequence similarities is the alignment-free technique. As per their chemical characteristics, the four bases o...
In order to seamlessly identify the links between various DNA sequences on a broad scale, DNA sequencing is a crucial tool. But there are still more potential for advancement in sequencing quality. A highly well-liked method for determining sequence similarities is the alignment-free technique. As per their chemical characteristics, the four bases...
Parkinson’s disease (PD) is a neurological condition that impacts the quality of life for millions of people all over the world. A prompt and precise diagnosis of PD is absolutely necessary for the successful treatment and management of the condition. For the detection of PD, numerous methods exist in the literature, including speech-based methods,...
Lung cancer is a prevalent and deadly disease with a high global incidence rate. For efficient treatment with a positive prognosis for patients, early identification with precise subtype categorization of lung cancer is essential. Bio-inspired algorithms have emerged as promising tools for solving complex medical problems in recent years. This pape...
Online customer feedback is essential for promoting online buying. The e-commerce sector has experienced exponential growth since COVID-19. Now days the growth of any business in e-commerce industry is highly influenced by the online consumer reviews and a lot of research has been conducted by numerous researchers in this regard to determine the re...
Parkinson’s disease (PD) is a chronic central nervous system condition that largely affects the body movement. If left untreated at a nascent stage, it could be life threatening. PD leads to sluggishness of movement and causes muscle inflexibility and tremors. There are numerous methods available in literatures such as speech-based method, gait-bas...
Cancer is a deadly illness affected by a confluence of genetic disorders and metabolic abnormalities. Cancer is the second biggest reason of mortality universal, with lung cancer having a substantially higher death rate than other types of cancer. The discovery of such nodes/cancer histopathologically is typically the maximum critical factor in sel...
In today's world, breast Cancer is one of the most deadly diseases among women, although early detection drastically improves survival rate. CNN Models are the category of DL learning that was developed to improve accuracy in breast cancer categorization. Compared to traditional methods, CNN has demonstrated better classification efficiency and tum...
p>The infrastructure of smart cities is intended to save citizens’ time and effort. After COVID-19, one of such available infrastructure is electronic shopping. Online consumer reviews have a big influence on the electronic retail market. A lot of customers save time by deciding which products to buy online by evaluating the products’ quality based...
Software defined networking (SDN) is a network, which is of utmost importance from the perspective of dynamic requirement of modern infrastructure. SDN is centrally and remotely controlled, but it can lead to different attacks due to its centralized architecture. SDN has capability to detect and monitor network security problems because of its prog...
Autonomous electric vehicle safety is crucially dependent on the accurate recognition of pedestrians in diverse situations. Current pedestrian detection techniques, however, face significant limitations due to reduced visibility and poor-quality images under low-lighting scenarios. With the aim of overcoming these challenges, this article proposes...
The goal of Content-Based Image Retrieval (CBIR) is to compare a query image with similar images from a large dataset. Typically, the ranking of retrieved photos is based on how similar the representative features of the query image and the dataset images are. Machine learning (ML) methods have been investigated as a practical approach to decrease...
The multi agent path planning strategy for unmanned aerial vehicles (UAVs) might play a crucial role in seeking the most feasible path in 3D environment owning to power limitations and other environmental factors. UAVs path planning is a high precision task that is needed for wide range of commercial, military, and rescue operations. However, the p...
Vehicular ad hoc networks (VANETs) are susceptible to information threat, wherein an aggressor aims to pose duplicate information or reprise the present information. Every vehicle in VANET broadcast short packet of data which is called as beacon packets. Beacon Packets carries the vehicle identifier, vehicle's present geographical location and spee...
In the current market scenario, online customer reviews had a significant impact on boosting the sale of online products. Recently, there has been exponential growth in e-commerce industry owning to the online customer reviews. Over the years, researchers has observed the importance of online consumer reviews for purchasing online products. Hence,...
The HNN is often used as a human-like associative memory (AM). Nonetheless, HNNs suffered from limited noise tolerance and limited storage capacity. However, unfortunately, Hopfield neural networks suffered from limited tolerance to noise and limited storage capacity. This study proposes a novel approach for overcoming these limitations using the c...
Online consumer reviews play a pivotal role in boosting online shopping. After Covid-19, the e-commerce industry has been grown exponentially. The e-commerce industry is greatly impacted by the online customer reviews, and a lot of work has been done in this regard to identify the usefulness of reviews for purchasing online products. In this propos...
The occurrence of disease in plants might affect the crop production at a large scale, resulting into decline of the economic growth rate of the country. The disease in plants can be detected and treated at an early stage. Machine learning (ML), deep learning (DL), and computer vision-based techniques could play a pivotal role in detecting and clas...
Computed tomography (CT) advancement and extensive usage have raised the public’s worry regarding the
patient’s associated radiation dose. Reducing the radiation dose may lead to more noise and artifacts, which
may harm the reputation of radiologists. The instability of low-dose CT reconstruction necessitates better image
reconstruction, which incr...
Foreground object recognition in video is critical in many computer vision applications and automated video surveillance systems. Object detection and tracking are critical steps in navigation, object recognition and surveillance schemes. Object detection is process of separating foreground and background items in photographs. In this paper, we pro...
Mobile ad hoc networks (MANETs) are considered as decentralized networks, which can communicate without pre-existing infrastructure. Owning to utilization of open medium access and dynamically changing network topology, MANETs are vulnerable to different types of attacks such as blackhole attack, gray hole attack, Sybil attack, rushing attack, jell...
Breast cancer is the most widely recognized malignancy affecting women. The risk of death has been consistently associated with breast cancer. In addition, the cyber-physical system (CPS)is the processing and data transfer of physical processes. This study presents a safe, intrusive, blockchain-based data transfer using the CPS classification model...
Diabetic Retinopathy (DR) is a disease that damages the retina of the human eye due to diabetic complications, resulting in a loss of vision. Blindness may be avoided If the DR disease is detected at an early stage. Unfortunately, DR is irreversible process, however, early detection and treatment of DR can significantly reduce the risk of vision lo...
In this brief, a novel design of hybrid multiplier is proposed. The hybrid multiplier is a combination of two different types of multipliers. The latest computing systems require low-power, area, and delay multipliers. In this work, we extend a new idea of high-performance hybrid multiplier by using Wallace–Dadda and Vedic multipliers. The addition...
Breast cancer continues to be a major health problem throughout the world impacting almost 2.1 million women each year. Delineation of breast cancer at an early stage can play a key role in the mitigation of the mortality rate in women. The presence of calcifcations and suspicious mass regions (i.e. lesions) in digital mammograms are considered to...
In this paper, we propose a multiconnection-based Hopfield neural network (MC-HNN) based on the hamming distance and Lyapunov energy function to address the limited storage and inadequate recalling capability problems of Hopfield Neural Network (HNN). This study uses the Lyapunov energy function and Hamming Distance to recall correct stored pattern...
This work demonstrated a potential LDMOS structure based on trench-gate on SOI known as dual-channel trench LDMOS (DCTLDMOS). DCTLDMOS structure is designed by incorporating trenches in the conventional LDMOS to improve the cutoff frequency (ft), drain current (ID), transconductance (gm), maximum oscillation frequency (fmax), and breakdown voltage...
ZnO material exhibits superior properties required for several electronic 1 applications. It has been noticed that the different temperature-based models of 2 conventional AlGaN/GaN HEMTs have been widely studied; however, physics-3 based analytical models including the effect of temperature for MgZnO/ZnO HEMT 4 are not sufficiently explored much a...
Automatic fingerprint recognition has received significant attention because of its excellent fingerprint stability characteristics. Fingerprints will now explode in popularity as online stores allow payments and secure smartphones. The main objective of this study is to develop a fingerprint recognition system to identify individuals by using a ne...
Globally, breast cancer is considered a major reason for women’s morality. Earlier and accurate identification of breast cancer is essential to increase survival rates. Therefore, computer-aided diagnosis (CAD) models are developed to help radiologists in the detection of mammographic lesions. Presently, machine-learning (ML) and deep-learning (DL)...
The elicitation of non-functional and functional needs is one of the most critical jobs of a requirement engineer. This scenario involves the imposition of limits on non-functional needs, whereas functional requirements call for the operation of a system in order to carry out functionality. Over the last few years, agile software development approa...
Effective productivity estimates of fresh produced crops are essential for efficient farming, commercial planning, and logistical support. In the past 10 years, machine learning (ML) algorithms have been widely used for grading and classification of agricultural products in the agriculture sector. However, the precise and accurate assessment of the...
Regression testing (RT) provides confidence for any software to work properly after incorporating modifications in the software functionalities. The amendments in the software are visible due to the evolution or the adoption of the new functionalities in the software. New test cases might be added or removed from the test suit during the RT. TCP se...
The inspection of insulator faults is an important task to prevent catastrophic failures in the operation of an electric substation. Manual inspection of overhead power line insulators can be very dangerous owning to the presence of high voltage in power sub-stations. Hence, in this paper, we present an infrared thermal (IRT) camera based non-invas...
Crowdsourcing cognitive science (CCS) provides a cutting-edge development strategy for scientific advancement and innovation to leverage the positive features of the platform. Utilizing the positive qualities of the platform and mitigating risk is the prime decisive task. The crowdsourcing paradigm shortens software development time by increasing t...
Road region and non-road region separation in the unstructured road intends to be an important task for safe navigation and collision avoidance for autonomous driving vehicles. The road that connects rural areas and cities to the national highways are considered as unstructured roads. Absence of clear lane marking on these unstructured roads makes...
The integration of WSN with IoT is growing exponentially for implementing real time applications in today’s world. Also an Intelligent WSN design is required for implementing these applications. This paper discusses a MWSN based system for detection and alert of the pipeline leakage. In this method all the nodes are not allowed to communicate with...
Diabetic retinopathy (DR) is an eye infirmity, which can make the visual impedance in the patients. Around the age 50 onwards, the person can suffer from this disease. When the blood vessels in the tissue at the rear of the eye (retina) got damaged, then DR gets triggered. DR can be detected through retinal fundus images, examined by ophthalmologis...
The World Wide Web has befallen into a truly pervasive and metamorphic force in our life since past two decades. Web applications serving millions of web pages on regular basis. Though, web applications have became asynchronous, interactive and dynamic due to several assessment phases. Thus, web application's security is necessary as a result of it...
Abstract. Path planning for robots plays a vital role to seek the most feasible path due to power requirement, environmental
factors and other limitations. The path planning for the autonomous robots is tedious task as the robot needs to locate a
suitable path to move between the source and destination points with multifaceted nature. In this paper...
: The signal propagation over wireless channels cannot be predicted perfectly due to numerous factors such as fading, channel interference and obstacles. An interference footprint is required to be estimated accurately for evaluation of the spatial spectrum opportunity. It is difficult to determine the spatial spectrum opportunities available in up...
: In this paper, smart volume controller (SVC) using fuzzy logic is developed for mobile phones in order to improve the voice quality in the presence of background noise. The SVC uses the noise level and class information as an input to automatically raise the volume of the cell phone in the presence of background noise. Smart volume controller mai...
In all biometric traits, a fingerprint is considered as a foremost trait due to its high security level, reliability, universality, uniqueness, robustness, low costs, and user convenience. Due to the high level security and affordability, there is a large demand of deployment of fingerprint recognition systems which also arising lot of challenges i...
This paper includes a design analysis of an inductorless low-power (LP) low-noise amplifier (LNA) with active load for Ultra Wide Band (UWB) applications. The proposed LNA consists of two parallel paths, one is the common source (CS) path and second is the CG path. The CG path has the edge advantage of improving overall Noise figure (NF) due to wid...
In this paper, authors made an attempt to implement the active noise control technique (ANC) to decrease the amplitude of noise communicating through the environment using an electro-acoustic (EA) system with the help of measurement sensors such as microphones and output actuators such as loudspeakers. In general, the noise signal is generated from...
In this paper, authors propose an efficient system for the segmentation of lesions in digital mammograms. The proposed detection system comprises three steps. In the first step, efficient pre-processing technique is developed using top-hat morphological transform, wavelet transform, and morphological opening–closing reconstruction filter followed b...
Breast cancer continues to be a major health problem in the world. Detection of breast cancer at an early stage can reduce the mortality rate in women. Calcifications and masses are treated as the early sign of breast cancer. However, it is difficult to distinguish mass regions from surrounding tissues due to their low contrast and ambiguous margin...
Abstract: This paper discusses the recent developments in EEG signal acquisition and processing for the detection of various neurological disorders like Epileptic Seizure, Stroke, tetraplegia and Alzheimer etc. Meanwhile a brief study is also made with MEG signal processing as the future detection method. This paper also discusses integration of EE...
In this paper, an improved algorithm for codebook design is proposed for vector quantization (VQ) in image coding. Based on proposed Orthogonal Polynomials transformation, significant features of the training image vectors are extracted. By partitioning these feature vectors into a binary tree an improved codebook design algorithm is developed Each...
This paper presents an efficient system for the detection of suspicious lesions in mammograms. The proposed detection system consists of three steps. In the first step, an efficient pre-processing technique is developed using Top-Hat morphological filter and NL means filter. In the second step, threshold selection procedure is developed using a com...
In this paper, a robust marker-controlled watershed method is proposed to yield more accurate segmentation results to delineate the masses in mammograms. The proposed method consists of three main steps: pre-processing, marker extraction and the final segmentation. In the first step, pre-processing algorithm is developed using top-hat morphological...
Detection and quantification of breast cancer is a very critical step in mammograms and therefore, needs an accurate and standard technique for breast tumor segmentation. In the last four decades, a number of algorithms have been published in the literature. Each one has their own merits and demerits. The aim of this paper is to make a comparative...
An accurate and standard techniques for breast tumor segmentation plays a pivotal role in detecting and quantifying breast cancers. Segmentation of breast tumor in mammograms presents many challenges related to selection of optimal threshold in various segmentation techniques. In this paper, a mean based region growing segmentation (MRGS) is presen...
The objective of this paper is to present a novel approach for the segmentation and characterization of breast tumor. The authors have developed an efficient tumor segmentation technique using conventional Ostu thresholding method aided by morphological reconstruction filtering technique. The parameters extracted are area, major and minor axis leng...