Neetu Faujdar

Neetu Faujdar
GLA University · Department of Computer Engineering & Applications

PhD

About

72
Publications
27,464
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
427
Citations
Additional affiliations
July 2013 - August 2016
Jaypee University of Information Technology
Position
  • Researcher
August 2016 - October 2016
Amity University
Position
  • Professor (Assistant)
Education
July 2013 - August 2016
Jaypee University of Information Technology
Field of study
  • Computer Science
July 2011 - July 2013
Invertis University
Field of study
  • Computer Science
July 2007 - June 2011
Visvesvaraya Technological University
Field of study
  • Information Technology

Publications

Publications (72)
Article
Background Internet of Things (IoT) technology in smart urban homes has revolutionised sophisticated monitoring. This progress uses interconnected devices and systems to improve security, resource management, and resident safety. Smart cities use technology to improve efficiency, sustainability, and quality. Internet of Things-enabled intelligent m...
Article
Full-text available
Efficient energy management is crucial given 2024's 4.1% worldwide electricity demand increase. This urgency emphasizes the necessity for various, sustainable energy sources in distribution grids. Short-term load prediction approaches using probabilistic power generation and energy storage are crucial for energy usage prediction. Urban energy plann...
Article
Full-text available
Efforts to enhance the accuracy of protein sequence classification are of utmost importance in driving forward biological analyses and facilitating significant medical advancements. This study presents a cutting-edge model called ProtICNN-BiLSTM, which combines attention-based Improved Convolutional Neural Networks (ICNN) and Bidirectional Long Sho...
Article
Full-text available
Protein sequence classi cation needs to be performed quickly and accurately to progress bioinformatics advancements and the production of pharmaceutical products. Extensive comparisons between large databases of known proteins and unknown sequences are necessary in traditional protein classi cation methods, which can be time-consuming. This labour-...
Article
Full-text available
Cybertwin (CT) is an innovative network structure that digitally simulates humans and items in a virtual environment, significantly influencing Cybertwin instances more than regular VMs. Cybertwin-driven networks, combined with Mobile Edge Computing (MEC), provide practical options for transmitting IoT-enabled data. This research introduces a hybri...
Article
Full-text available
The thyroid gland, a pivotal regulator of essential physiological functions, orchestrates the production and release of thyroid hormones, playing a vital role in metabolism, growth, development, and overall bodily functions. While thyroid nodules are predominantly benign, certain cases may manifest malignancy, leading to thyroid cancer. Despite the...
Article
Full-text available
In smart cities, air pollution is a critical issue that affects individual health and harms the environment. The air pollution prediction can supply important information to all relevant parties to take appropriate initiatives. Air quality prediction is a hot area of research. The existing research encounters several challenges that is, poor accura...
Article
Full-text available
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost, and reliability compared to traditional storage methods. However, despite the benefits of...
Article
Full-text available
A major psychological problem that numerous new mothers experience is postpartum depression (PPD). A woman's capacity to care for herself and her child may be hampered by the sadness, anxiety, and weariness it can bring on. Using information from their past medical treatment, lifestyles, and habits, deep learning can assist in identifying women who...
Article
Full-text available
Online cloud data storage is a rapidly growing pillar of the IT industry that offers data owners an array of attractive developments in highly sought-after online scalable storage services. Cloud users can easily access these services and have the flexibility to manage their process data effectively without worrying about the deployment or maintena...
Article
Full-text available
In this paper, the Gynaecological Disease Diagnosis Expert System (GDDES) is a Graphical User Interface, developed with the Support Vector Classifier (Machine Learning Algorithm) and Natural Language Processing. It is language-independent, allowing women from any state in India to use the system in their own native tongue and have their disorders d...
Article
Full-text available
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats. The quantity and sophistication of cyber assaults aimed against Internet of Things (IoT) systems have skyrocketed in recent years. This paper proposes a next-generation c...
Article
Full-text available
The patients’ vocal Parkinson’s disease (PD) changes could be identified early on, allowing for management before physically incapacitating symptoms appear. In this work, static as well as dynamic speech characteristics that are relevant to PD identification are examined. Speech changes or communication issues are among the challenges that Parkinso...
Article
Full-text available
Online cloud data storage, a pillar of the IT industry, offers data owners a plethora of attractive developments in highly sought-after online scalable storage services for them to willing new inventive and investment business profit. Today, most cloud data security research focuses on improving the accuracy of outsourced data audits rather than pa...
Article
Full-text available
Data can be processed quickly if it is in some order, whereas unsequenced data can take more time to obtain results. Sorting is used for data arrangement. It is also one of the essential requirement for most applications and this step helps to boost performance. Sorting is also a prerequisite in several computer applications like databases. Over ti...
Article
Full-text available
The study of ad hoc networks and their different varieties, including wireless sensor networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper. Wireless devices link to one another directly in an ad hoc network without the use of a central Wireless Access Point (WAP). Data transit between wireless devices is frequent...
Article
Full-text available
Tile-based architecture is broadly utilized in the structuring of the system-on-chip by different vendors. Nevertheless, the performance of the system-on-chip (SoC) is incredibly influenced by the performance of the network hidden on a chip named network-on-chip (NoC). Routing of network-on-chip network chips plays a crucial role in the overall per...
Chapter
The massive increase in communications technology creates a distributed network, which will be creating a massive quantity of data in billions of network devices. Digital and broadband networks are a significant contributor to this transition which calls for different technological paradigms in a resource-driven world that provides low latency with...
Conference Paper
Sentiment Analysis which is also referred to as opinion mining focuses to use the tools that can automatically detect different types of emotions such as feelings, attitudes, and opinions expressed in a text. Sentiment Analysis is a field of text mining in which research is ongoing. This survey paper includes insights into various proposed Sentimen...
Chapter
The effects of coronavirus are not only human but also economic. It has led to lockdowns and the stoppage of all economic activity. All current security and access systems suffer from numerous flaws that make them an inferior option to our proposed dual-layer security and face pattern consisting of the preliminary stage of facial recognition, and f...
Article
Full-text available
This paper provides an overview of blockchain technology’s security and privacy features, as well as an overview of IoT-based cache memory and single-bit six transistor static random-access memory cell sense amplifier architecture. Each chip’s memory is used for recorded as blocks, which are encrypted and used as a blockchain for other memory devic...
Article
Full-text available
Clustering is one of the critical parts of machine learning algorithms. K-Means clustering is the standard technique that various data analysts use for clustering the data among the various clusters. Even though the K means clustering algorithm can work effectively, there is a need to tune the value of K according to the dataset under consideration...
Chapter
Presently, methods Accessible for Glaucoma detection revolves around the usage of devices such as Digital Single-Lens Reflex (DSLR) camera, these are extremely pricey. Same are the instances for eye and skin cancer. Apart from the fact that these are costly methods, they are also inaccessible to a majority of people. Thus, the main objective behind...
Chapter
With the advent of computers and the rapidly increasing speed of technological advancements, data is now being collected at breakneck speeds. Accelerating increase in the amount and speed at which data is collected has been matched with advancements in data storage and data analysis technology. Crime data has been steadily collected for many decade...
Chapter
Estimation of the economy of a developed country is affected by the performance of share market of the country. Predicting stock prices has been a major research challenge. There is an influx of various approaches that attempt to address this problem. Stock markets generate massive data, almost as much as social media, which can be used to identify...
Conference Paper
Full-text available
A quantitative and yield analysis of single bit cache memory architecture has been analyzed. A single bit cache memory architecture is made up of a write driver circuit, SRAM cell, and sense amplifier. Apart from it, the power reduction technique has been applied over different blocks of single bit cache memory architecture such as sense amplifier...
Chapter
Mesh topology is commonly used in system on chips. This paper proposes a variant of honeycomb mesh that is inspired by the mesh and the cube topology. The proposed topology 3D honeycomb mesh has high throughput and low latency in comparison to the traditional honeycomb topology. The proposed topology is compared with the existing 2D honeycomb mesh...
Chapter
With massive advancements in the fields of data analysis and data mining, a new importance has been gained by data visualization. Data visualization focuses on visualizing and abstracting complex data to make it comprehensible and easy to understand using visual representation of information. Analysis of crime and crime-related data has been steadi...
Conference Paper
Based on the generalized definition of a network, we know that it is made up of a number of nodes. Sending and receiving of data takes place via these nodes. This process is characterized by the permission provided and requirement of sharing data. Basically, networking helps the nodes across the globe to connect and enable data transfer. Software D...
Chapter
Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with th...
Article
Full-text available
The identification of a person through images has been on cards for a long while but identification/recognition through video is not so common that is what we have tried to explain by the use of some classifiers like HAAR, Local Binary Pattern (LBP) and Local Binary Pattern Histogram (LBPH). These all classifiers are used for facial detection & rec...
Article
Full-text available
IoT today resembles the Internet itself, as it was in its earliest stages around 2 decades back, loaded with guarantee and potential yet at the same time a calculated jump for some people. The era of wireless devices has begun and the use of wired connection devices has reduced at an exponential rate. Now every device is connected wire lessly and e...
Article
Full-text available
The network on chip is the key component of the achieving the high performance required by the system designed on the single chip. The mesh and torus topologies have found there places in various system on chips. Still there is an exploration for the better topologies, which can help in reducing the latency of the packet delivered from one core to...
Conference Paper
The gold standard for the diagnosis of malaria is microscopy in which the blood slide is examined under a microscope, but the reliability, accuracy and timely diagnosis of the results are highly based on the proficiency of the technician examining the slide. False Detection can occur in the case of poorly skilled technician. In this research work w...
Article
Full-text available
The current study is focused towards a sorting algorithm referred as Library Sort. Previous scientific limitations have revealed many utilities of sorting algorithms. Each sorting algorithm varies according to their strength and weaknesses. The Bender et al proposed the library sort with uniform gap distribution (LUGD) i.e. there is equal number of...
Article
Full-text available
From history, people have used commodity currency (i.e. commodity currency consists of objects that have value in themselves as well as value in their use as money). Fiat currency is the most dominant form of money. Now, comes the currency that is neither fiat currency nor commodity money. It is a new development that is growing at a very unpredict...
Article
Full-text available
Cryptographic mechanism is a major security component of operating system in securing its communication paths and its system. In maximum cases cryptography is only tool that can solve some problems like network level security. Usually cryptography also does not give guarantee for its security by itself, when applied in a correct manner it may impro...
Article
Full-text available
In today’s world time and life are the most valuable asset that humans have. The development of such autonomous cars will help mainly in saving time and preventing accidents which are mostly due to human errors. In this paper the authors have modelled the research direction towards the various technologies that the autonomous cars use to operate an...
Conference Paper
Titanic disaster occurred 100 years ago on April 15, 1912, killing about 1500 passengers and crew members. The fateful incident still compel the researchers and analysts to understand what can have led to the survival of some passengers and demise of the others. With the use of machine learning methods and a dataset consisting of 891 rows in the tr...
Conference Paper
Full-text available
In todays world, sorting is a basic need and appropriate method starts with searching. Several sorting algorithms has been developed on CPU (Central Processing Unit). But according to current scenario, CPU is not so efficient in sorting. To get the more speedup of sorting algorithms parallelization should be done. There are many ways of Parallelizi...
Conference Paper
Presently GPU computing is in big call with the sphere of sorting. This paper presents the design of GPU (Graphic Processing Unit) bubble sort with CUDA (Compute Unified Device Architecture) hardware. The bubble sort is considered as comparison based sorting. The design of bubble sort using many core GPUs was previously unknown. The paper also pres...
Conference Paper
The bucket sort is a non-comparison sorting algorithm in which elements are scattered over the buckets. We have concluded, based on state-of-art that most of the researchers have been using the insertion sort within buckets. The other sorting technique is also used in many papers over the buckets. From the state-of-art of bucket sort, we have analy...
Article
Full-text available
Sorting huge data requires an enormous amount of time. The time needed for this task can be minimised using parallel processing devices like GPU. The odd-even transposition sorting network algorithm is based on the idea that each level uses an equal number of comparators to arrange data. The existing parallel OETSN algorithm compares the elements i...
Article
Full-text available
Objective: Sorting is considered a very important application in many areas of computer science. Nowadays parallelization of sorting algorithms using GPU computing, on CUDA hardware is increasing rapidly. The objective behind using GPU computing is that the users can get, the more speedup of the algorithms. Methods: In this paper, we have focused o...
Article
Full-text available
The Sorting can be of two ways first is sequential sorting and second is parallel sorting. Now a day’s it is not a good idea to do the sorting of data sequentially as in the present life we require the huge data and many applications with large computational requirements and data-intensive applications are rapidly evolving in many scientific domain...
Conference Paper
Sorting is a huge demand research area in computer science. One of the fundamental issues in computer science is how to order the data in lexicographic order. In practical application computing requires things to be in order. The performance of any computation depends on the sorting algorithms. A lot of sorting algorithm has been developed by many...
Conference Paper
Full-text available
In data mining frequent item-sets mining is one of the important tasks. Apriori is used to mine the frequent item-sets but, Apriori also has some problem as in Apriori finding of support count is very time consuming procedure. To overcome this problem of Apriori, BitApriori algorithm is proposed for mining frequent item-sets, but the BitApriori als...

Network

Cited By