Manjit Kaur

Manjit Kaur
  • PhD
  • Postdoctrol researcher at Gwangju Institute of Science and Technology

About

137
Publications
88,723
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,805
Citations
Current institution
Gwangju Institute of Science and Technology
Current position
  • Postdoctrol researcher

Publications

Publications (137)
Preprint
Full-text available
The rapid growth of the global population and the continuous decline in cultivable land pose significant threats to food security. This challenge worsens as climate change further reduces the availability of farmland. Soilless agriculture, such as hydroponics, aeroponics, and aquaponics, offers a sustainable solution by enabling efficient crop cult...
Article
Full-text available
The rising global population and shrinking arable land present critical challenges for sustaining food security, especially under the pressures of climate change. Soilless farming has emerged as a transformative agricultural method, leveraging controlled and protected environments to address these challenges. Soilless cultivation methods, such as h...
Article
Full-text available
Coronavirus (also known as COVID-19) is an extremely contagious disease spreading around the globe. An efficient and fast diagnostic method must be designed to identify COVID-19 patients. There are several methods for identification and monitoring of the disease, namely radiological imaging of the patient's chest and polymerase chain reaction (RT-P...
Article
Drug combination therapy is crucial in cancer treatment, but accurately predicting drug synergy remains a challenge due to the complexity of drug combinations. Machine learning and deep learning models have shown promise in drug combination prediction, but they suffer from issues such as gradient vanishing, overfitting, and parameter tuning. To add...
Chapter
The area of optical color picture encryption has recently emerged as one of the most talked-about subjects in the pitch of data security. Although it has been suggested that certain techniques used to encrypt color images, the majority of these techniques have traditionally been based on symmetric cryptographic modules. This paper present an altern...
Article
Full-text available
Blockchain technology has revolutionized the financial landscape, witnessing widespread adoption of cryptocurrencies due to their decentralized and transparent nature. As sentiments expressed on social media platforms wield substantial influence over cryptocurrency market dynamics, sentiment analysis has emerged as a crucial tool for gauging public...
Article
Full-text available
Poor weather conditions, such as haze, fog, and smog, present significant challenges in capturing clear and visually appealing images. To address this issue, we propose a Deep Custom Spatial and Spectral Consistency Layer-based Dehazing Network (DSSCNet) that effectively removes haze from images while preserving important spatial and spectral detai...
Article
Clear visibility of the road is crucial for autonomous vehicles, but adverse weather conditions can significantly reduce road visibility, impacting their performance. To address this challenge, a visibility restoration model is essential for autonomous driving and navigation. This paper proposes a Lightweight Visibility Restoration Network (LVR-Net...
Article
The resilient and secure image encryption method presented in this research combines the benefits of Lorenz maps and double random phase encoding (DRPE) with compressed sensing. The suggested method attempts to maximize the use of storage resources while maintaining the security and integrity of sensitive image data during transmission and storage....
Article
Full-text available
Leaf mining, rust, bacterial blight, and berry pathology are major diseases in coffee plants. These diseases not only reduce yield but also affect quality. Early detection and targeted treatment are crucial to mitigate their effects. This paper introduces an efficient hybrid deep learning model, SUNet, for prediction and classification of healthy a...
Article
Full-text available
Acute lymphoblastic leukemia (ALL) is a life-threatening hematological malignancy that requires early and accurate diagnosis for effective treatment. However, the manual diagnosis of ALL is time-consuming and can delay critical treatment decisions. To address this challenge, researchers have turned to advanced technologies such as deep learning (DL...
Article
Full-text available
The escalating population and rapid industrialization have led to a significant rise in environmental pollution, particularly air pollution. This has detrimental effects on both the environment and human health, resulting in increased morbidity and mortality. As a response to this pressing issue, the development of air quality prediction models has...
Article
This research suggests a unique picture encoding technique based on OFT and block-based transformation in order to communicate image data over an open network. First, a transformation technique was used to create a transformed picture, and then an optical Fourier transform (OFT) algorithm was used to encode the newly-created encrypted version of th...
Article
Optical encryption techniques in over the last 10 years have become more important in the area of optical information processing. Several applications, including online payments, medical or biometric image storage or transmission, private military applications, police identification techniques, online banking platforms, governmental services, ident...
Article
The VMIE techniques follow two steps: pre-encryption and embedding. In the first phase of the proposed method, the 5D chaotic map and zig-zag transformation are used for encryption, which provides higher security. In the second phase, the U-Net architecture-based encoder is implemented to hide the encrypted image in the reference image. Furthermore...
Article
Full-text available
This paper proposes a lightweight image encryption approach for medical Internet of Things (MIoT) networks using compressive sensing and a modified seven-dimensional ( MSD ) hyperchaotic map. Initially, 7D hyperchaotic map is modified to generate more secure and complex secret keys. SHA-512 is used to create the initial conditions for MSD , whic...
Article
Full-text available
In recent years, data security has been a challenging endeavor, especially when the data is being transmitted every second. Internet of Things (IoT) involves continuously sending data over public networks, making the data vulnerable to various security threats. Therefore, ensuring the secure end-to-end communication of IoT data is critical. Cryptog...
Article
Full-text available
Consistently the web and online media producing terabytes of images. Furthermore, the picture stockpiling and important recovery is a difficult task. Content Based Image Retrieval (CBIR) is the most common way of recovering pertinent photos regarding query images from the assortment of images. CBIR profoundly relies upon three elements: determinati...
Article
The visually meaningful image encryption (VMIE) technique is used to offer additional security to the noise-like encrypted image by implanting the secret image in the cover image. Generally, VMIE techniques follow two steps: pre-encryption and embedding. In this paper, an advanced V-Net architecture based VMIE technique is presented. V-Net architec...
Preprint
Full-text available
Modern societies have adopted government-issued fiat currencies many of which exist today mainly in the form of digits in credit and bank accounts. Fiat currencies are controlled by central banks for economic stimulation and stabilization. Boom-and-bust cycles are created. The volatility of the cycle has become increasingly extreme. Social inequali...
Article
Crop disease is a critical concern for the farmers which needs to be addressed to mitigate production loss. Multifarious frameworks have been proposed for the rapid recognition of tomato crop diseases, however, their practical deployment is a daunting task. The existing models suffer from performance issues such as overfitting and gradient vanishin...
Article
With the advancement in artificial intelligence (AI) based E-healthcare applications, the role of automated diagnosis of various diseases has increased at a rapid rate. However, most of the existing diagnosis models provide results in a binary fashion such as whether the patient is infected with a specific disease or not. But there are many cases w...
Article
One of the leading causes of cancer-related deaths among women is cervical cancer. Early diagnosis and treatment can minimize the complications of this cancer. Recently, researchers have designed and implemented many deep learning-based automated cervical cancer diagnosis models. However, the majority of these models suffer from over-fitting, param...
Article
Full-text available
Increasing data infringement while transmission and storage have become an apprehension for the data owners. Even the digital images transmitted over the network or stored at servers are prone to unauthorized access. However, several image steganography techniques were proposed in the literature for hiding a secret image by embedding it into cover...
Article
Full-text available
Acute leukemia is a cancer that starts in the bone marrow and is characterized by an abnormal growth of white blood cells. It is a disease that affects people all over the world. Hematologist study blood smears from patients to appropriately diagnose this anomaly. The methods used for diagnosis can be influenced by factors including the hematologis...
Article
Full-text available
Sometimes a group of similar types of dimensions is also treated as nodes. However, these groups can be considered as bunch nodes which may contain several nodes. This paper also justifies the study on bunch graphs which introduced a concept of graphs, where bunch nodes are also allowed. The auto-encoder, a specific type of feedforward neural netwo...
Article
Purpose Reliability and maintainability are the key system effectiveness measures in process and manufacturing industries, and treatment plants, especially in E-waste management plants. The present work is proposed with a motto to develop a stochastic framework for the e-waste management plant to optimize its availability integrated with reliabilit...
Article
Nowadays, various image editing tools are available that can be utilized for manipulating the original images; here copy-move forgery is most common forgery. In copy-move forgery, some part of the original image is copied and pasted into the same image at some other location. However, Artificial Intelligence (AI) based approaches can extract manipu...
Article
Full-text available
In December 2019, the novel coronavirus disease 2019 (COVID-19) appeared. Being highly contagious and with no effective treatment available, the only solution was to detect and isolate infected patients to further break the chain of infection. The shortage of test kits and other drawbacks of lab tests motivated researchers to build an automated dia...
Article
With the rapid growth of multimedia technologies, many images are communicated over public channels. Therefore, significant interest has been given to providing secure transmission of images over public channels. Encryption approaches are extensively utilized to secure multimedia data. However, the encrypted images are meaningless, so attackers can...
Article
Full-text available
Orthogonal regression is one of the prominent approaches for linear regression used to adjust the estimate of predictor errors. It can be considered as a least square regression with orthogonal constraints. It can maintain more discriminative constraints in the projection subspace than the least square regression and can avoid trivial solutions. In...
Article
Full-text available
Saffron, also known as “the golden spice”, is one of the most expensive crops in the world. The expensiveness of saffron comes from its rarity, the tedious harvesting process, and its nutritional and medicinal value. Different countries of the world are making great economic growth due to saffron export. In India, it is cultivated mostly in regions...
Article
Full-text available
Background: Artificial intelligence techniques are widely used in solving medical problems. Recently, researchers have used various deep learning techniques for the severity classification of Chikungunya disease. But these techniques suffer from overfitting and hyper-parameters tuning problems. Methods: In this paper, an artificial intelligence-bas...
Article
Full-text available
Blockchain technology and its applications are gaining popularity day by day. It is a ground-breaking technology that allows users to communicate without the need of a trusted middleman. A smart contract (self-executable code) is deployed on the blockchain and auto executes due to a triggering condition. In a no-trust contracting environment, smart...
Article
Full-text available
Colorectal Cancer (CRC) is the third most dangerous cancer in the world and also increasing day by day. So, timely and accurate diagnosis is required to save the life of patients. Cancer grows from polyps which can be either cancerous or noncancerous. So, if the cancerous polyps are detected accurately and removed on time, then the dangerous conseq...
Article
Full-text available
With the advancements in Internet technologies, a huge amount of images are transferred over the public networks. Therefore, during the transmission process, the images are prone to various security threats. To protect images against any unauthorized access, many researchers have designed various approaches such as encryption, stenography, and visu...
Article
Full-text available
Orthogonal regression is one of the prominent approaches for linear regression used to adjust the estimate of predictor errors. It can be considered as a least square regression with orthogonal constraints. It can maintain more discriminative constraints in the projection subspace than the least square regression and can avoid trivial solutions. In...
Article
Full-text available
Pneumothorax is a thoracic disease leading to failure of the respiratory system, cardiac arrest, or in extreme cases, death. Chest X-ray (CXR) imaging is the primary diagnostic imaging technique for the diagnosis of pneumothorax. A computerized diagnosis system can detect pneumothorax in chest radiographic images, which provide substantial benefits...
Article
Full-text available
Remote sensing images taken during poor environmental conditions are degraded by the scattering of atmospheric particles, which affects the performance of many imaging systems. Hence, an efficient visibility restoration model is required to remove haze from distorted images. But, the design of visibility restoration models is an ill-posed problem a...
Article
Full-text available
Cross channel scripting (XCS) is a common web application vulnerability, which is a variant of a cross-site scripting (XSS) attack. An XCS attack vector can be injected through network protocol and smart devices that have web interfaces such as routers, photo frames, and cameras. In this attack scenario, the network devices allow the web administra...
Article
Full-text available
With the advancements in Internet technologies, a huge amount of images are transferred over the public networks. Therefore, during the transmission process, the images are prone to various security threats. To protect images against any unauthorized access, many researchers have designed various approaches such as encryption, stenography, and visu...
Article
Full-text available
In the last decade, the proactive diagnosis of diseases with artificial intelligence and its aligned technologies has been an exciting and fruitful area. One of the areas in medical care where constant monitoring is required is cardiovascular diseases. Arrhythmia, one of the cardiovascular diseases, is generally diagnosed by doctors using Electroca...
Article
Full-text available
Coronavirus disease (COVID-19) is a viral infection caused by SARS-CoV-2. The modalities such as computed tomography (CT) have been successfully utilized for the early stage diagnosis of COVID-19 infected patients. Recently, many researchers have utilized deep learning models for the automated screening of COVID-19 suspected cases. An ensemble deep...
Article
Full-text available
A Mobile Ad Hoc Network (MANET) is an autonomous network developed using wireless mobile nodes without the support of any kind of infrastructure. In a MANET, nodes can communicate with each other freely and dynamically. However, MANETs are prone to serious security threats that are difficult to resist using the existing security approaches. Therefo...
Article
Full-text available
Metaheuristic algorithms are extensively utilized to find solutions and optimize complex industrial systems’ performance. In this paper, metaheuristic algorithms are utilized to predict the optimum value of the operational availability of a cooling tower in a steam turbine power plant. These techniques have some flaws like poor convergence speed, b...
Article
Full-text available
Blockchain is a revolutionary technology that enables users to communicate in a trust-less manner. It revolutionizes the modes of business between organizations without the need for a trusted third party. It is a distributed ledger technology based on a decentralized peer-to-peer (P2P) network. It enables users to store data globally on thousands o...
Article
Information extraction plays a vital role in natural language processing, to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture...
Article
Full-text available
The rate of infant mortality (IMR) in a population under one year of age is a marker for infant mortality. It is a major sensitive marker of a community’s overall physical health. Protecting the lives of newborns has become a challenging issue in public health, development programs, and humanitarian initiatives. Almost 10.1% infants died in the Uni...
Article
Full-text available
An automated risk assessment approach is explored in this work. The focus is to optimize the conventional threat modeling approach to explore software system vulnerabilities. Data produced in the software development processes are better leveraged using Machine Learning approaches. A large amount of industry knowledge around security vulnerabilitie...
Article
Full-text available
Kuzushiji, a cursive writing style, had been extensively utilized in Japan for over a thousand years starting from the $8^{th}$ century. In 1900, Kuzushiji was not included in regular school curricula due to the change in the Japanese writing system. Nowadays Japanese natives are unable to read historical books that were written using Kuzushiji l...
Article
Full-text available
A great amount of data is being created these days, which is kept in massive datasets with different irrelevant attributes that are unrelated to the goal notion. Feature selection deals with the selection of the most pertinent features that also aid to increase the classification accuracy. The topic of feature selection is viewed as a multiobjectiv...
Article
Full-text available
Due to advancements in technology, digital images are widely used in various applications like medical field, military communication, remote sensing, etc. These images may contain sensitive and confidential information. Therefore, images are required to be protected from unauthorized access. Many image protection techniques have been proposed in pa...
Article
Full-text available
Security of the software system is a prime focus area for software development teams. This paper explores some data science methods to build a knowledge management system that can assist the software development team to ensure a secure software system is being developed. Various approaches in this context are explored using data of insurance domain...
Article
Full-text available
This paper proposes a multivariate and online prediction of stock prices via the paradigm of kernel adaptive filtering (KAF). The prediction of stock prices in traditional classification and regression problems needs independent and batch-oriented nature of training. In this article, we challenge this existing notion of the literature and propose a...
Article
Full-text available
We live in a world where people are suffering from many diseases. Cancer is the most threatening of them all. Among all the variants of cancer, skin cancer is spreading rapidly. It happens because of the abnormal growth of skin cells. The increase in ultraviolet radiation on the Earth’s surface is also helping skin cancer spread in every corner of...
Article
Full-text available
The network-on-chip (NoC) technology is frequently referred to as a front-end solution to a back-end problem. The physical substructure that transfers data on the chip and ensures the quality of service begins to collapse when the size of semiconductor transistor dimensions shrinks and growing numbers of intellectual property (IP) blocks working to...
Article
Full-text available
Coronavirus disease-19 (COVID-19) has rapidly spread all over the world. It is found that the low sensitivity of reverse transcription-polymerase chain reaction (RT-PCR) examinations during the early stage of COVID-19 disease. Thus, efficient models are desirable for early-stage testing of COVID-19 infected patients. Chest X-ray (CXR) images of COV...
Article
Full-text available
Image encryption protects the sensitive and confidential information of images. This protection comes from the combination of secret keys, encryption, and decryption algorithms. Chaotic maps are widely utilized by researchers to perform image encryption. Encryption with chaotic maps is very sensitive to initial conditions. Therefore, it can produce...
Article
Full-text available
Fast and accurate screening of novel coronavirus (COVID-19) suspected subjects plays a vital role in timely quarantine and medical care. Deep transfer learning-based screening models on chest X-ray (CXR) are effective for countering the COVID-19 outbreak. However, an efficient screening of COVID-19 is still a huge task due to the spatial complexity...
Article
Full-text available
Nowadays, due to the increase in information resources, the number of parameters and complexity of feature vectors increases. Optimization methods offer more practical solutions instead of exact solutions for the solution of this problem. The Emperor Penguin Optimizer (EPO) is one of the highest performing meta-heuristic algorithms of recent times...
Article
Full-text available
The manufacture of raw materials to deliver the product to the consumer in a traditional supply chain system is a manual process with insufficient data and transaction security. It also takes a significant amount of time, making the entire procedure lengthy. Overall, the undivided process is ineffective and untrustworthy for consumers. If blockchai...
Article
Full-text available
The process of detecting language from an audio clip by an unknown speaker, regardless of gender, manner of speaking, and distinct age speaker, is defined as spoken language identification (SLID). The considerable task is to recognize the features that can distinguish between languages clearly and efficiently. The model uses audio files and convert...
Article
Full-text available
The increase in computational power in recent years has opened a new door for image processing techniques. Three-dimensional object recognition, identification, pose estimation, and mapping are becoming popular. The need for real-world objects to be mapped into three-dimensional spatial representation is greatly increasing, especially considering t...
Article
Full-text available
Information extraction plays a vital role in natural language processing , to extract named entities and events from unstructured data. Due to the exponential data growth in the agricultural sector, extracting significant information has become a challenging task. Though existing deep learning-based techniques have been applied in smart agriculture...
Article
Full-text available
Nowadays, the most challenging and important problem of computer vision is to detect human activities and recognize the same with temporal information from video data. The video datasets are generated using cameras available in various devices that can be in a static or dynamic position and are referred to as untrimmed videos. Smarter monitoring is...
Article
Balance in exploration and exploitation is the basic requirement of any optimization algorithm, lack of which can easily lead to premature convergence of algorithm. Asynchronous Differential Evolution (ADE), a variant of Differential Evolution (DE) algorithm has strong exploration and parallel optimization characteristics. It immediately updates th...
Article
Full-text available
In March 2020, the World Health Organization declared the coronavirus disease (COVID-19) outbreak as a pandemic due to its uncontrolled global spread. Reverse transcription polymerase chain reaction is a laboratory test that is widely used for the diagnosis of this deadly disease. However, the limited availability of testing kits and qualified staf...
Article
Full-text available
In recent trends, digital images are commonly used for communication, storage, medical imaging, etc. These images may contain confidential data. Image encryption and steganography are popular techniques to provide information security. In image encryption, a secret image is encoded using an encryption key, and in image steganography, a secret image...
Article
Full-text available
Diabetic retinopathy (DR) is a diabetes complication that affects the eye and can cause damage from mild vision problems to complete blindness. It has been observed that the eye fundus images show various kinds of color aberrations and irrelevant illuminations, which degrade the diagnostic analysis and may hinder the results. In this research, we p...
Article
Full-text available
Images contain very sensitive and confidential information. Because images play a significant role in many applications such as military communication, remote-sensing, and medical-imaging, therefore, it is necessary to protect sensitive and confidential information from unauthorized use and modification. To achieve this objective, encryption is one...
Article
Full-text available
Seagull Optimization Algorithm (SOA) is a metaheuristic algorithm that mimics the migrating and hunting behaviour of seagulls. SOA is able to solve continuous real-life problems, but not to discrete problems. The eight different binary versions of SOA are proposed in this paper. The proposed algorithm uses four transfer functions, S-shaped and V-sh...
Article
Full-text available
Asynchronous differential evolution (ADE) supports parallel optimization and effective exploration. The updation in population is done immediately when a vector with better fitness is found in ADE algorithm. The working of ADE and Differential Evolution (DE) is similar except the instant population updation feature and asynchronous nature. In this...
Article
Full-text available
Alzheimer’s disease has been one of the major concerns recently. Around 45 million people are suffering from this disease. Alzheimer’s is a degenerative brain disease with an unspecified cause and pathogenesis which primarily affects older people. The main cause of Alzheimer’s disease is Dementia, which progressively damages the brain cells. People...
Article
Full-text available
Evolutionary computing is an exciting sub-field of soft computing. Many evolutionary algorithm based on the Darwinian principles of natural selection are developed under the umbrella of EC in the last two decades. EAs provide a set of optimal solutions in single simulation unlike traditional optimization techniques for dealing with large-scale glob...
Article
Full-text available
Recent years have witnessed the use of metaheuristic algorithms to solve the optimization problems that usually require extensive computations and time. Among others, scatter search is the widely used evolutionary metaheuristic algorithm. It uses the information of global optima, which is stored in a different and unique set of solutions. In this p...
Article
Full-text available
Artificial intelligence (AI) has made various developments in the image segmentation techniques in the field of medical imaging. This article presents a liver tumor CT image segmentation method based on AI medical imaging-based technology. This study proposed an artificial intelligence-based K-means clustering (KMC) algorithm which is further compa...
Article
This paper proposes a secure and energy-efficient Internet of Things (IoT) model for e-health. The main objective is to secure the transmission and retrieval of biomedical images over IoT networks. To achieve this, the compressive sensing and five-dimensional hyper-chaotic map (FDHC) are utilized to encrypt the biomedical images. However, FDHC suff...
Article
Background Until now, there are still a limited number of resources available to predict and diagnose COVID-19 disease. The design of novel drug-drug interaction for COVID-19 patients is an open area of research. Also, the development of the COVID-19 rapid testing kits is still a challenging task. Methodology This review focuses on two prime chall...
Article
Full-text available
In order to study the quality of life of patients with functional constipation based on dynamic magnetic resonance defecation, the biofeedback therapy combined with comprehensive nursing intervention was used to diagnose and treat the patients, so as to explore its clinical efficacy and its impact on patients’ quality of life. The obstructed defeca...
Article
Full-text available
Due to the physical restriction of current CMOS technology, emerging technologies that have majority logic gate as a base component are being explored. The process of transforming from boolean network to the majority logic network is called majority logic synthesis. Hence, the contributions of this work is as follows: (i) a novel heuristic-driven t...
Article
Full-text available
The extensively utilized tool to detect novel coronavirus (COVID-19) is a real-time polymerase chain reaction (RT-PCR). However, RT-PCR kits are costly and consume critical time, around 6 to 9 hours to classify the subjects as COVID-19(+) or COVID-19(-). Due to the less sensitivity of RT-PCR, it suffers from high false-negative results. To overcome...
Article
Full-text available
Harmony search algorithm is the recently developed metaheuristic in the last decade. It mimics the behavior of a musician producing a perfect harmony. It has been used to solve the wide variety of real-life optimization problems due to its easy implementation over other metaheuristics. It has an ability to provide the balance between exploration an...
Article
Full-text available
COVID-19 has affected the whole world drastically. A huge number of people have lost their lives due to this pandemic. Early detection of COVID-19 infection is helpful for treatment and quarantine. Therefore, many researchers have designed a deep learning model for the early diagnosis of COVID-19-infected patients. However, deep learning models suf...
Article
Full-text available
The WHO announced coronavirus disease a Public Health Emergency on 30 January 2020, and it spreads across the whole planet. Aftermath of outbreak of this disease at the global level is more frightening and panicking than anyone's worst nightmare. With more than 23 mln positive coronavirus cases and more than 800,000 causalities all over the world,...
Article
Real-time remote sensing imaging systems require high spatial resolution multispectral images. However, the remote sensing images obtained from a single satellite sensor do not provide a significant amount of information. Therefore, pansharpening techniques are desirable to provide high spatial resolution multispectral images. The hyperspectral pan...
Article
Full-text available
The advancements in automated diagnostic tools allow researchers to obtain more and more information from medical images. Recently, to obtain more informative medical images, multi-modality images have been used. These images have significantly more information as compared to traditional medical images. However, the construction of multi-modality i...
Article
Full-text available
Chaotic-based image encryption approaches have attracted great attention in the field of information security. The properties of chaotic maps such as randomness and sensitivity have given new ways to develop efficient encryption approaches. But chaotic maps require initial parameters to develop random sequences. The selection of these parameters is...
Article
Full-text available
Image acquisition is generally susceptible to poor environmental conditions such as fog, smog, haze, etc. However, designing an efficient image dehazing technique is still an ill posed problem. Extensive review of the competitive haze removal approaches reveal that the texture preservation and computational speed are still a challenging issues. The...
Article
Full-text available
The early detection and diagnosis of novel coronavirus disease 2019 (COVID-19) is required to cure the disease. Metaheuristic techniques can be used to develop the automated tool for detecting the symptoms of infected person and provide the appropriate precautionary measures. The metaheuristic-based software can be designed to analyze the radiograp...
Article
Purpose: In cancer therapies, drug combinations have shown significance accuracy and minimal side effects than the single drug administration. Therefore, the drug synergy has drawn great interest from pharmaceutical companies and researchers. Unfortunately, the prediction of drug synergy score by purely investigational means is only possible on sma...

Network

Cited By