About
20
Publications
9,602
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
224
Citations
Introduction
I am currently working on deep learning based colorectal cancer(CRC) detection using gut microbiome in human stool.
Skills and Expertise
Current institution
Publications
Publications (20)
The emergence of Next Generation Sequencing (NGS) technology has catalyzed a paradigm shift in clinical diagnostics and personalized medicine, enabling unprecedented access to high-throughput microbiome data. However, the inherent high dimensionality, noise, and variability of microbiome data present substantial obstacles to conventional statistica...
Colorectal cancer (CRC) ranks second highest in global mortality among nonsex-related cancers. Conventional machine learning (ML) algorithms applied to microbiome-based CRC detection often yield suboptimal accuracy. Conversely, deep neural network (DNN)-based methods encounter limitations due to scarce labeled samples, data imbalance, and dominant...
The demand for clean and sustainable energy has increased the popularity of photovoltaic (PV) solar panels. PV solar panels are the most effective technology for transforming the sun's rays into a valuable energy source. To maximize the amount of energy captured, the rays of light from the sun must be at a 90-degree angle to the surface of the PV p...
Colorectal Cancer (CRC) is among the top three cancers in world. The current clincal methods for CRC detection have several limitations which range from low accuracy, discomfort and high costs. Availability of next generation sequencing (NGS) technology has opend an opportunity for non invasive detection of CRC which uses gut-microbiome abundance i...
In the field of disaster crisis management, the utilization of social media platforms has gained significant recognition. It helps in disseminating and gathering information during disasters, offering real-time updates on events, infrastructure damage reports, and casualty information. However, the information comes with a substantial amount of irr...
Solar tracking systems have gained attention in recent years due to their potential to increase the efficiency of various solar energy applications. Both traditional machine learning (ML) and deep learning (DL) techniques have been employed in various solar tracking systems. However, traditional ML models have limitations in processing large datase...
Although photovoltaic (PV) panels are extensively used to convert solar energy into electric energy, the continuous change in the sun's angle with reference to the earth's surface limits their capacity to collect sufficient energy. To improve efficiency, solar trackers are used to constantly adjust the PV panels towards the sun to maximize energy c...
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
In the above article
[1]
, the acknowledgment for the research grant was referencing an incorrect grant reference number.
In the above article
[1]
, the acknowledgment for the research grant was referencing an incorrect grant reference number.
Solar tracking helps maximize the efficiency of solar applications, such as photovoltaic (PV) solar panels. In the recent past, machine learning (ML) techniques have been extensively used to implement automatic solar tracking. However, applying predictive models in solar trackers is a non-trivial task due to the randomness and non-linearity of mete...
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
Machine learning (ML)-based detection of diseases using sequence based gut microbiome data has been of great interest within the artificial intelligence in medicine (AIM) community. The approach offers a non-invasive alternative in colorectal cancer detection, where data can be obtained from stool samples. Considering limitations of existing method...
ABSTRACT Colorectal cancer (CRC) is the third most deadly cancer worldwide. The use of gut microbiome in early detection of the disease has attracted much attention from the research community, mainly because of its noninvasive nature. Recent achievements in next generation sequencing technology have led to increased availability of sequence data a...
Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to...
Crypto-mining attacks have emerged as a new generation of web-based attacks which have seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack vector has by far been the most widely employed attack methodology but it faces the task of luring the victim to the infected web resources. However, cryptojacking injection prese...
Ransomware has emerged as a resilient type of malware to reckon with which has inadvertently forced security researchers and companies into a game of cat and mouse. The media has not helped matters even as the inaccuracies and myths surrounding ransomware continue to deepen. In this paper, we endeavor to debunk WannaCry ransomware through its netwo...
The popularity of cryptocurrencies has continued to grow drastically over the past decade and this has drawn significant attention to various threat actors. Cybercriminals are now employing unconventional means to acquire cryptocurrencies at the expense of benign Internet users. This paper investigates the state-of-the-art crypto mining attacks by...
Agile development is a software development process that advocates adaptive planning, early delivery, evolutionary development and continuous betterment and supports rapid and flexible response to change. The purpose of Agile development is minimize project failure through customer interactions and responding to change. However, Agile development i...
The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the contemporary issues currently being faced by application developers as they create, update and maintain mobile web ap...