Mala Kalra

Mala Kalra
Verified
Mala verified their affiliation via an institutional email.
Verified
Mala verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor (Assistant) at National Institute of Technical Teachers Training and Research

About

65
Publications
7,966
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
998
Citations
Current institution
National Institute of Technical Teachers Training and Research
Current position
  • Professor (Assistant)

Publications

Publications (65)
Conference Paper
A smart lighting system leverages the power of IoT (Internet of Things) for optimal management of lighting facilities and substantial energy savings. To ensure the uninterrupted functionality of these systems, it is essential to prioritize detecting anomalies in time. The manual identification of individual anomalous smart lights is challenging whe...
Article
Full-text available
Glaucoma, the foremost contributor to permanent vision impairment worldwide, necessitates early and accurate detection methods to prevent vision loss. Traditional diagnostic approaches often rely on subjective analysis by specialists, which can be time-consuming and prone to variability. This is prompting researchers to sort out the issue using som...
Preprint
The metaheuristic optimization technique attained more awareness for handling complex optimization problems. Over the last few years, numerous optimization techniques have been developed that are inspired by natural phenomena. Recently, the propagation of the new COVID-19 implied a burden on the public health system to suffer several deaths. Vaccin...
Preprint
Full-text available
In the rapidly evolving Internet of Things (IoT) domain, artificial intelligence (AI) has transformed IoT systems into self-sufficient entities capable of making groundbreaking autonomous decisions. This paradigm shift has been bolstered by a remarkable increase in computational efficiency, allowing for AI integration, even within stringent resourc...
Preprint
Full-text available
In the rapidly evolving Internet of Things (IoT) domain, artificial intelligence (AI) has transformed IoT systems into self-sufficient entities capable of making groundbreaking autonomous decisions. This paradigm shift has been bolstered by a remarkable increase in computational efficiency, allowing for AI integration , even within stringent resour...
Article
Full-text available
Addressing the contemporary complexity inherent in anomaly detection within heterogeneous systems is paramount. This paper presents a novel methodology tailored to pinpoint appliance anomalies within the framework of Internet of Things (IoT) technology. By amalgamating the capabilities of IoT and Machine Learning (ML), this approach not only height...
Article
Addressing the contemporary complexity inherent in anomaly detection within heterogeneous systems is paramount. This paper presents a novel methodology tailored to pinpoint appliance anomalies within the framework of Internet of Things (IoT) technology. By amalgamating the capabilities of IoT and Machine Learning (ML), this approach not only height...
Article
Full-text available
Body area networks (BANs) play a pivotal role in modern healthcare, enabling real‐time data collection and monitoring of vital patient parameters, thereby empowering healthcare providers to respond swiftly to any serious health conditions. These networks depend on strategically placed sensors on the patient's body to collect important health data....
Chapter
IoT has eased our life by providing various smart applications such as Smart Homes, Industrial Automation, Smart Healthcare, Smart Traffic Monitoring, and Fleet Management, to name a few. Due to various vulnerabilities in IoT infrastructure and software, Anomaly Detection is one of the major concerns for application developers. In this paper, Smart...
Chapter
Chest computed tomography (CT) imaging is highly reliable and practical in diagnosing and analyzing COVID-19, mainly in the infectious region rather than reverse-transcription polymerase chain reaction (RT-PCR). The intelligent wolf optimization-deep convolutional neural network (deep CNN) classifier is proposed to classify COVID from the CT images...
Conference Paper
IoT has eased our life by providing various smart applications such as Smart Homes, Industrial Automation, Smart Healthcare, Smart Traffic Monitoring, and Fleet Management, to name a few. Due to various vulnerabilities in IoT infrastructure and software, Anomaly Detection is one of the major concerns for application developers. In this paper, Smart...
Conference Paper
Cloud Computing has gained popularity due to the on-demand resource allocation in the distributed computing environments and provides resources that are dynamically scalable on the “pay as you go” model. Over the past years, Amazon has started providing a new service called EC2 Spot Instances which provides their idle machines on rent in the spot m...
Article
Full-text available
COVID‐19 has affected more than 760 million people all over the world, as per the latest record of the WHO. The rapid proliferation of COVID‐19 patients not only created a health emergency but also led to an economic crisis. An early and accurate diagnosis of COVID‐19 can help in combating this deadly virus. In line with this, researchers have prop...
Chapter
Smart grid is a digital transformation of the electric power grid which uses automatic control and communications techniques for transmission and distribution of electricity. It enables self-monitoring to detect quickly changing electric demands and respond accordingly. Smart grids have self-healing capabilities and enable electricity customers to...
Chapter
Intelligent human-computer interaction (HCI) utilizes facial information, artificial intelligence, adaptive computation, and emotional awareness to improve human interaction with machines. Hence, analysis of face expression has been one of the important mediums for understanding actions and modeling emotions. This paper has introduced an Infrared T...
Article
Full-text available
Blockchain technology may be described as a distributed digital ledger database for transparent and immutable recording of transactions occurring between a groups of nontrusting parties. Transactions can be implemented without any intermediaries. Given this potential, it can play a great role in enhancing Supply chain management. Silk production an...
Article
Full-text available
Cloud computing is undoubtedly one of the most significant advances in the domain of information technology. It facilitates elastic and on-demand provisioning of high performance computing capabilities employing pay-per-use model that has snowballed its adoption by scientists and engineers over the past few years. They often exploit workflows to re...
Book
This book gathers selected research papers presented at the AICTE-sponsored International Conference on IoT Inclusive Life (ICIIL 2019), which was organized by the Department of Computer Science and Engineering, National Institute of Technical Teachers Training and Research, Chandigarh, India, on December 19–20, 2019. In contributions by active res...
Article
With the evolution of internet, network security has emerged as one of the key areas of research. Network security is to safeguard the privacy, availability and integrity of the system. Identification of intrusion is core component to attain overall network security success. Therefore, intrusion detection (ID) is broadly explored by researchers and...
Article
Full-text available
Credit card frauds are on the rise and are getting smarter with the passage of time. Usually, fraudulent transactions are conducted by stealing the credit card. When the loss of the card is not noticed by the cardholder, a huge loss can be faced by the credit card company. In the existing work, it has been found that the researchers have utilized V...
Chapter
Cloud computing is a popular on-demand computing model that provides utility-based IT services to the users worldwide. However, the data centers which host cloud applications consume an enormous amount of energy contributing to high costs and carbon footprints to the environment. Thus, green cloud computing has emerged as an effective solution to i...
Chapter
Cloud data centers are always in demand of energy resources. There are very limited numbers of nonrenewable energy resources but data centers have large energy consumption as well as carbon footprints. It is a big challenge to reduce the energy consumption. VM migration techniques are used for server consolidation in order to reduce the power consu...
Article
Full-text available
Cloud Computing is increasingly favored by scientists for executing large‐scale workflow applications due to its appealing features such as availability of huge infrastructure, low operating costs, easy accessibility, and high scalability. Moreover, the resources in cloud are provisioned as per user's requirement following pay‐per‐use model. Schedu...
Conference Paper
Due to the advancement of Internet over last decade, network security has turned out to be one of the important areas of research. Therefore, Intrusion Detection (ID) is widely studied to achieve overall network security success. Aim of Intrusion Detection System (IDS) is to put checks on attacks and provide desirable support for defense management...
Chapter
Task scheduling is a big problem in the cloud computing. As large number of users simultaneously request for the resources, the tasks must be allocated to resources rapidly and in an optimized manner. Energy consumption by data centers worldwide has increased tremendously. This leads to focus on developing eco-friendly and energy-efficient scheduli...
Article
The problem of finding optimal solutions for scheduling scientific workflows in cloud environment has been thoroughly investigated using various nature-inspired algorithms. These solutions minimise the execution time of workflows, however may result in severe load imbalance among Virtual Machines (VMs) in cloud data centres. Cloud vendors desire th...
Conference Paper
With the rapid growth in online services and scarcity of professionals under same domain, there is a huge requirement for integaration of services with Cloud Computing (CC). It is a latest technological trend in present arena. It provide an efficient infrastructure, better services over the internet. In CC environment scheduling of services is one...
Conference Paper
Cloud computing is a well known computing technology that deals with large capacity of information or data using highly available geographically distributed resources that can be accessed by user via internet in terms of pay per use basis. In such a way, tasks should be scheduled efficiently such that user specified QoS constraints are satisfied. T...
Article
Full-text available
Cloud computing has become a buzzword in the area of high performance distributed computing as it provides on-demand access to shared pool of resources over Internet in a self-service, dynamically scalable and metered manner. Cloud computing is still in its infancy, so to reap its full benefits, much research is required across a broad array of top...
Article
Cloud computing is a provider of dynamic services which offers readily elastic on demand computing resources as per the customer's request in economical way. As there are a lot of requests fabricated by cloud users which are processed by the accessible resources, there exists a need for better and effective scheduling mechanism for efficient alloca...
Conference Paper
A focused crawler is a web crawler which returns relevant web pages on a given topic in traversing the web. In order to determine topical relevancy, focused crawler use different classification schemes. We propose a novel method of predicting the relevancy of links in topic specific search. In this paper we focus on classification of links using de...
Article
Component based software system approach is concerned with the system development by integrating components. The component based software construction primarily focuses on the view that software systems can be built up in modular fashion. The modular design is a logical collection of several independent developed components that are assembled with...
Chapter
The usage of smartphones has increased hastily over the past few years. The number of smartphones being sold is much more than the number of PC’s due to the smartphone’s mobile nature and good connectivity. However, they are still constrained by limited processing power, memory, and Battery. In this paper, we propose a framework for making the appl...
Chapter
Over the past few years, the usage and boost of handheld devices such as Personal Digital Assistants (PDAs) and smartphones have increased rapidly and estimates show that they will even exceed the number of Personal Computers (PCs) by 2013. Smartphones enable a rich, new, and ubiquitous user experience, but have limited hardware resources on comput...
Article
In modular-based software systems, each module has different alternatives with variation in their functional and nonfunctional properties, e.g., reliability, cost, delivery time, etc. The success of such systems largely depends upon the selection process of commercial-off-the shelf (COTS) components. In component-based software (CBS) development, i...
Conference Paper
Full-text available
In a large-scale cloud computing environment the cloud data centers and end users are geographically distributed across the globe. The biggest challenge for cloud data centers is how to handle and service the millions of requests that are arriving very frequently from end users efficiently and correctly. In cloud computing, load balancing is requir...
Article
Full-text available
Virtualization technology is currently becoming increasingly popular and valuable in cloud computing environments due to the benefits of server consolidation, live migration, and resource isolation. Live virtual machine migration is the process of moving virtual machine from one physical host to other without disturbing the users. Effective migrati...
Conference Paper
The usage of smart phones is increasing rapidly over the last few years. Due to their mobility and good connectivity, smartphones are increasing thrice as compared to PCs. However they are still constrained by limited processing power, memory and Battery. Thus, the applications cannot be made very rich. In this paper we propose a framework for maki...

Network

Cited By