About
72
Publications
27,464
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
427
Citations
Introduction
Skills and Expertise
Additional affiliations
July 2013 - August 2016
August 2016 - October 2016
Education
July 2013 - August 2016
July 2011 - July 2013
July 2007 - June 2011
Publications
Publications (72)
Background
Internet of Things (IoT) technology in smart urban homes has revolutionised sophisticated monitoring. This progress uses interconnected devices and systems to improve security, resource management, and resident safety. Smart cities use technology to improve efficiency, sustainability, and quality. Internet of Things-enabled intelligent m...
Efficient energy management is crucial given 2024's 4.1% worldwide electricity demand increase. This urgency emphasizes the necessity for various, sustainable energy sources in distribution grids. Short-term load prediction approaches using probabilistic power generation and energy storage are crucial for energy usage prediction. Urban energy plann...
Efforts to enhance the accuracy of protein sequence classification are of utmost importance in driving forward biological analyses and facilitating significant medical advancements. This study presents a cutting-edge model called ProtICNN-BiLSTM, which combines attention-based Improved Convolutional Neural Networks (ICNN) and Bidirectional Long Sho...
Protein sequence classi cation needs to be performed quickly and accurately to progress bioinformatics advancements and the production of pharmaceutical products. Extensive comparisons between large databases of known proteins and unknown sequences are necessary in traditional protein classi cation methods, which can be time-consuming. This labour-...
Cybertwin (CT) is an innovative network structure that digitally simulates humans and items in a virtual environment, significantly influencing Cybertwin instances more than regular VMs. Cybertwin-driven networks, combined with Mobile Edge Computing (MEC), provide practical options for transmitting IoT-enabled data. This research introduces a hybri...
The thyroid gland, a pivotal regulator of essential physiological functions, orchestrates the production and release of thyroid hormones, playing a vital role in metabolism, growth, development, and overall bodily functions. While thyroid nodules are predominantly benign, certain cases may manifest malignancy, leading to thyroid cancer. Despite the...
In smart cities, air pollution is a critical issue that affects individual health and harms the environment. The air pollution prediction can supply important information to all relevant parties to take appropriate initiatives. Air quality prediction is a hot area of research. The existing research encounters several challenges that is, poor accura...
Cloud computing provides outsourcing of computing services at a lower cost, making it a popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, cost, and reliability compared to traditional storage methods. However, despite the benefits of...
A major psychological problem that numerous new mothers experience is postpartum depression (PPD). A woman's capacity to care for herself and her child may be hampered by the sadness, anxiety, and weariness it can bring on. Using information from their past medical treatment, lifestyles, and habits, deep learning can assist in identifying women who...
Online cloud data storage is a rapidly growing pillar of the IT industry that offers data owners an array of attractive developments in highly sought-after online scalable storage services. Cloud users can easily access these services and have the flexibility to manage their process data effectively without worrying about the deployment or maintena...
In this paper, the Gynaecological Disease Diagnosis Expert System (GDDES) is a Graphical User Interface, developed with the Support Vector Classifier (Machine Learning Algorithm) and Natural Language Processing. It is language-independent, allowing women from any state in India to use the system in their own native tongue and have their disorders d...
Billions of gadgets are already online, making the IoT an essential aspect of daily life. However, the interconnected nature of IoT devices also leaves them open to cyber threats. The quantity and sophistication of cyber assaults aimed against Internet of Things (IoT) systems have skyrocketed in recent years. This paper proposes a next-generation c...
The patients’ vocal Parkinson’s disease (PD) changes could be identified early on, allowing for management before physically incapacitating symptoms appear. In this work, static as well as dynamic speech characteristics that are relevant to PD identification are examined. Speech changes or communication issues are among the challenges that Parkinso...
Online cloud data storage, a pillar of the IT industry, offers data owners a plethora of attractive developments in highly sought-after online scalable storage services for them to willing new inventive and investment business profit. Today, most cloud data security research focuses on improving the accuracy of outsourced data audits rather than pa...
Data can be processed quickly if it is in some order, whereas unsequenced data can take more time to obtain results. Sorting is used for data arrangement. It is also one of the essential requirement for most applications and this step helps to boost performance. Sorting is also a prerequisite in several computer applications like databases. Over ti...
The study of ad hoc networks and their different varieties, including wireless sensor networks, wireless mesh networks, and mobile ad hoc networks, is discussed in this paper. Wireless devices link to one another directly in an ad hoc network without the use of a central Wireless Access Point (WAP). Data transit between wireless devices is frequent...
Tile-based architecture is broadly utilized in the structuring of the system-on-chip by different vendors. Nevertheless, the performance of the system-on-chip (SoC) is incredibly influenced by the performance of the network hidden on a chip named network-on-chip (NoC). Routing of network-on-chip network chips plays a crucial role in the overall per...
The massive increase in communications technology creates a distributed network, which will be creating a massive quantity of data in billions of network devices. Digital and broadband networks are a significant contributor to this transition which calls for different technological paradigms in a resource-driven world that provides low latency with...
Sentiment Analysis which is also referred to as opinion mining focuses to use the tools that can automatically detect different types of emotions such as feelings, attitudes, and opinions expressed in a text. Sentiment Analysis is a field of text mining in which research is ongoing. This survey paper includes insights into various proposed Sentimen...
The effects of coronavirus are not only human but also economic. It has led to lockdowns and the stoppage of all economic activity. All current security and access systems suffer from numerous flaws that make them an inferior option to our proposed dual-layer security and face pattern consisting of the preliminary stage of facial recognition, and f...
This paper provides an overview of blockchain technology’s security and privacy features, as well as an overview of IoT-based cache memory and single-bit six transistor static random-access memory cell sense amplifier architecture. Each chip’s memory is used for recorded as blocks, which are encrypted and used as a blockchain for other memory devic...
Clustering is one of the critical parts of machine learning algorithms. K-Means clustering is the standard technique that various data analysts use for clustering the data among the various clusters. Even though the K means clustering algorithm can work effectively, there is a need to tune the value of K according to the dataset under consideration...
Presently, methods Accessible for Glaucoma detection revolves around the usage of devices such as Digital Single-Lens Reflex (DSLR) camera, these are extremely pricey. Same are the instances for eye and skin cancer. Apart from the fact that these are costly methods, they are also inaccessible to a majority of people. Thus, the main objective behind...
With the advent of computers and the rapidly increasing speed of technological advancements, data is now being collected at breakneck speeds. Accelerating increase in the amount and speed at which data is collected has been matched with advancements in data storage and data analysis technology. Crime data has been steadily collected for many decade...
Estimation of the economy of a developed country is affected by the performance of share market of the country. Predicting stock prices has been a major research challenge. There is an influx of various approaches that attempt to address this problem. Stock markets generate massive data, almost as much as social media, which can be used to identify...
A quantitative and yield analysis of single bit cache memory architecture has been
analyzed. A single bit cache memory architecture is made up of a write driver circuit, SRAM
cell, and sense amplifier. Apart from it, the power reduction technique has been applied over
different blocks of single bit cache memory architecture such as sense amplifier...
Mesh topology is commonly used in system on chips. This paper proposes a variant of honeycomb mesh that is inspired by the mesh and the cube topology. The proposed topology 3D honeycomb mesh has high throughput and low latency in comparison to the traditional honeycomb topology. The proposed topology is compared with the existing 2D honeycomb mesh...
With massive advancements in the fields of data analysis and data mining, a new importance has been gained by data visualization. Data visualization focuses on visualizing and abstracting complex data to make it comprehensible and easy to understand using visual representation of information. Analysis of crime and crime-related data has been steadi...
Based on the generalized definition of a network, we know that it is made up of a number of nodes. Sending and receiving of data takes place via these nodes. This process is characterized by the permission provided and requirement of sharing data. Basically, networking helps the nodes across the globe to connect and enable data transfer. Software D...
Pervasive computing has been greatly supported by the internet of things. The use of internet of things has created the environment that helps in the management of the different modules that are the part of the complete system, which can work effectively without the interference with the other components of the system. The cloud environment with th...
The identification of a person through images has been on cards for a long while but identification/recognition through video is not so common that is what we have tried to explain by the use of some classifiers like HAAR, Local Binary Pattern (LBP) and Local Binary Pattern Histogram (LBPH). These all classifiers are used for facial detection & rec...
IoT today resembles the Internet itself, as it was in its earliest stages around 2 decades back, loaded with guarantee and potential yet at the same time a calculated jump for some people. The era of wireless devices has begun and the use of wired connection devices has reduced at an exponential rate. Now every device is connected wire lessly and e...
The network on chip is the key component of the achieving the high performance required by the system designed on the single chip. The mesh and torus topologies have found there places in various system on chips. Still there is an exploration for the better topologies, which can help in reducing the latency of the packet delivered from one core to...
The gold standard for the diagnosis of malaria is
microscopy in which the blood slide is examined under a
microscope, but the reliability, accuracy and timely diagnosis of
the results are highly based on the proficiency of the technician
examining the slide. False Detection can occur in the case of
poorly skilled technician. In this research work w...
The current study is focused towards a sorting algorithm referred as Library Sort. Previous scientific limitations have revealed many utilities of sorting algorithms. Each sorting algorithm varies according to their strength and weaknesses. The Bender et al proposed the library sort with uniform gap distribution (LUGD) i.e. there is equal number of...
From history, people have used commodity currency (i.e. commodity currency consists of objects that have value in
themselves as well as value in their use as money). Fiat currency is the most dominant form of money. Now, comes the currency
that is neither fiat currency nor commodity money. It is a new development that is growing at a very unpredict...
Cryptographic mechanism is a major security component of operating system in securing its
communication paths and its system. In maximum cases cryptography is only tool that can solve some problems
like network level security. Usually cryptography also does not give guarantee for its security by itself, when
applied in a correct manner it may impro...
In today’s world time and life are the most valuable asset that humans have. The development of such autonomous
cars will help mainly in saving time and preventing accidents which are mostly due to human errors. In this paper the authors
have modelled the research direction towards the various technologies that the autonomous cars use to operate an...
Titanic disaster occurred 100 years ago on April
15, 1912, killing about 1500 passengers and crew members.
The fateful incident still compel the researchers and analysts to
understand what can have led to the survival of some passengers
and demise of the others. With the use of machine learning
methods and a dataset consisting of 891 rows in the tr...
In todays world, sorting is a basic need and appropriate method starts with searching. Several sorting algorithms
has been developed on CPU (Central Processing Unit). But
according to current scenario, CPU is not so efficient in sorting.
To get the more speedup of sorting algorithms parallelization
should be done. There are many ways of Parallelizi...
Presently GPU computing is in big call with the
sphere of sorting. This paper presents the design of GPU (Graphic
Processing Unit) bubble sort with CUDA (Compute Unified
Device Architecture) hardware. The bubble sort is considered as
comparison based sorting. The design of bubble sort using many
core GPUs was previously unknown. The paper also pres...
The bucket sort is a non-comparison sorting algorithm in which elements are scattered over the buckets. We have
concluded, based on state-of-art that most of the researchers have
been using the insertion sort within buckets. The other sorting
technique is also used in many papers over the buckets. From
the state-of-art of bucket sort, we have analy...
Sorting huge data requires an enormous amount of time. The time needed for this task can be minimised
using parallel processing devices like GPU. The odd-even transposition sorting network algorithm is
based on the idea that each level uses an equal number of comparators to arrange data. The existing
parallel OETSN algorithm compares the elements i...
Objective: Sorting is considered a very important application in many areas of computer science. Nowadays parallelization of sorting algorithms using GPU computing, on CUDA hardware is increasing rapidly. The objective behind using GPU computing is that the users can get, the more speedup of the algorithms. Methods: In this paper, we have focused o...
The Sorting can be of two ways first is sequential sorting and second is parallel sorting. Now a day’s it is not a good idea to do the sorting of data sequentially as in the present life we require the huge data and many applications with large computational requirements and data-intensive applications are rapidly evolving in many scientific domain...
Sorting is a huge demand research area in
computer science. One of the fundamental issues in computer
science is how to order the data in lexicographic order. In
practical application computing requires things to be in order.
The performance of any computation depends on the sorting
algorithms. A lot of sorting algorithm has been developed by
many...
In data mining frequent item-sets mining is one of the important tasks. Apriori is used to mine the frequent item-sets but, Apriori also has some problem as in Apriori finding of support count is very time consuming procedure. To overcome this problem of Apriori, BitApriori algorithm is proposed for mining frequent item-sets, but the BitApriori als...