About
40
Publications
7,683
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
288
Citations
Introduction
Skills and Expertise
Publications
Publications (40)
The integration of cloud and edge computing, along with machine learning, plays a vital role in the development of efficient healthcare systems in smart cities. However, machine and deep learning (DL) models are prone to delayed convergence and Type-I and Type-II errors due to data vastness and high degree imbalance. To overcome the shortcomings of...
The brain is regarded as the central part of the human body and has a very complicated structure. The abnormal growth of tissue inside the brain is called a brain tumour. Tumour detection at an early stage is the most difficult task in the discipline of health. In this review article, the authors have deeply analysed and reviewed the brain tumour d...
An unusual increase of nerves inside the brain, which disturbs the actual working of the brain, is called a brain tumor. It has led to the death of lots of lives. To save people from this disease timely detection and the right cure is the need of time. Finding of tumor-affected cells in the human brain is a cumbersome and time- consuming task. Howe...
The unexpected growth of nerves inside the human brain that interferes with the normal function of the brain is referred to as a brain tumor. Magnetic Resonance Imaging (MRI) is used to provide images of better resolution of the brain. This paper proposes a system that applies a compound filter, along with a Convolution Neural Network (CNN) and Sup...
In today’s Internet environment, copyright protection of digital multimedia material is a major concern. Digital image watermarking provides the concept of secured copyright protection—the strength and quality of the watermark image loss due to geometrical attacks. However, minimization of the impact of geometrical attacks is a major challenge. Thi...
Targeted community detection is a network analysis involving identifying specific subsets or clusters of nodes (communities) within a more extensive network that are particularly relevant to a topic or phenomenon. Unlike traditional community detection methods, which aim to identify all communities within a network, targeted community detection met...
Nonnegative matrix factorization (NMF) is widely used in community discovery because of its effectiveness and easy interpretability. However, most of the existing NMF-based community detection methods are linear. They cannot effectively deal with the nonlinear characteristics of complex networks, resulting in further improvement in community detect...
The active use of the Internet and multimedia content has recently escalated copyright violations. Digital content, especially images and videos are subject to vulnerable attacks. It is also possible that an attacker might remove the watermark from the original image. Therefore, the copyright of digital images must be secured to prevent them from b...
An unusual increase of nerves inside the brain, which disturbs the actual working of the brain, is called a brain tumor. It has led to the death of lots of lives. To save people from this disease timely detection and the right cure is the need of time. Finding tumor-affected cells in the human brain is a cumbersome and time- consuming task. However...
Recent studies have shown that computed tomography (CT) scan images can characterize COVID-19 disease in patients. Several deep learning (DL) methods have been proposed for diagnosis in the literature, including convolutional neural networks (CNN). But, with inefficient patient classification models, the number of 'False Negatives' can put lives at...
During the COVID-19 pandemic, the patient care delivery paradigm rapidly shifted to remote technological solutions. Rising rates of life expectancy of older people, and deaths due to chronic diseases (CDs) such as cancer, diabetes and respiratory disease pose many challenges to healthcare. While the feasibility of Remote Patient Monitoring (RPM) wi...
Community structure over social media (SM) is the collaborative group of globally spread users with identical characteristics and ideologies. The collective features of SM are inherent with both the implicit and explicit nature of end-users. This paper presents an analytical and methodological community detection framework to bind passive users’ im...
Background. In world, patients suffering from chronic and lifestyle diseases are substantially increasing that effects social as well as economic life. Purpose. In this work, initially a broad survey of ubiquitous, smart and networked healthcare systems for monitoring of patients with chronic and lifestyle diseases are presented. Afterwards, Smart...
Purpose The aim of this study is to propose a smart predictive healthcare framework for patients suffering from chronic diseases and are under observation at home. To appropriately predict the patient’s actual health status and for better recommendation and assistive services, the framework utilizes a novel Deep Learning (DL) model. The DL model ut...
Big data is tremendously developing in all the fields of science and engineering. The potential of enormous information is much essential to introduce innovative thinking and robust methods for addressing different challenges. Analyzing big data enables the optimization process thereby empowering decision making and insight discovery. The study dea...
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy of digital data loss the brand value of documents and products. For the prevention of piracy used the digital watermarking technique. The digital watermarking techniques...
Network is a connection of devices in either a wired or wireless manner. Networking has become a part and parcel of computing in the present world. They form the backbone of the modern-day computing business. Hence, it is important for networks to remain alive, up, and reliable all the time. A way to ensure that is network traffic analysis. Network...
Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspe...
Big Data is defined by 3Vs which stands for variety, volume and velocity. The volume of data is very huge, data exists in variety of file types and data grows very rapidly. Big data storage and processing has always been a big issue. Big data has become even more challenging to handle these days. To handle big data high performance techniques have...
Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspe...
With the several changes happening every day in societies and in thoughts say knowledge challenges are increasing day by day which is to be faced by business as well as other organizations. To tackle these challenges many tactics are implemented and are in the process of further improvement. Handling of these challenges requires a system under whic...
Clustering problem is among the foremost quests in Machine Learning Paradigm. The Big Data sets, being versatile, multisourced & multivariate, could have noise, missing values, & may form clusters with arbitrary shape. Because of unpredictable nature of Big Data Sets, the clustering method should be able to handle missing values, noise, & should be...