Preeti Gulia

Preeti Gulia
Verified
Preeti verified their affiliation via an institutional email.
Verified
Preeti verified their affiliation via an institutional email.
Maharshi Dayanand University | MDU · Department of Computer Science & Applications

Doctor of Philosophy

About

123
Publications
135,940
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
818
Citations
Introduction
Machine Learning/Deep Learning Big Data IoT Component based Software Engineering Sentiment Analysis

Publications

Publications (123)
Article
Full-text available
The most common carcinoma-related cause of death among women is breast cancer. Early detection is crucial, and the manual screening method may lead to a delayed diagnosis, which would delay treatment and put lives at risk. Mammography imaging is advised for routine screening to diagnose breast cancer at an early stage. To improve generalizability,...
Article
Full-text available
The Internet of Things (IoT) has recently attracted substantial interest because of its diverse applications. In the agriculture sector, automated methods for detecting plant diseases offer numerous advantages over traditional methods. In the current study, a new model is developed to categorize plant diseases within an IoT network. The IoT network...
Article
Full-text available
Digital evidence processing can be more critical in the heterogeneous Internet-of-Things (IoT) paradigm due to the lack of transparency, trust, integrity, and immutability. Researchers have conducted a substantial range of research over the past few decades to improve the digital chain of custody and forensic investigation. In a digital forensic in...
Article
Full-text available
Fake profiles, on Instagram, pose significant challenges in online spaces. These profiles are fabricated with the intention to mislead and deceive by assuming the identity of genuine persons or institutions. These individuals often disseminate false information, participate in spamming, or carry out criminal acts, which negatively impact user confi...
Article
Full-text available
A smart city is deemed smart enough because it has the capability to make decisions on its own. Artificial intelligence needs a lot of data from the physical world to make correct decisions. IoT sensor devices collect data from the surroundings, which is further used for predictive analytics. Collected data may be balanced or imbalanced. Unbalanced...
Article
Full-text available
The widespread adoption of cloud computing has dramatically altered how data is stored, processed, and accessed in an era. The rapid development of digital technologies characterizes all this. The widespread adoption of cloud services has introduced new obstacles to guaranteeing secure and expeditious access to sensitive data. Organizations of all...
Article
Full-text available
Thousands of devices communicate globally to share data and information without any human intervention. A network of physical objects with numerous sensors and other network hardware to exchange data with servers and additional devices that are linked is referred to as the "internet of things (IoT)”. The actions hurting the communication system are...
Preprint
Full-text available
Fake profiles, on Instagram, pose significant challenges in online spaces. These profiles are fabricated with the intention to mislead and deceive by assuming the identity of genuine persons or institutions. These individuals often disseminate false information, participate in spamming, or carry out criminal acts, which negatively impact user confi...
Article
Full-text available
IoT devices produce a gigantic amount of data and it has grown exponentially in previous years. To get insights from this multi-property data, machine learning has proved its worth across the industry. The present paper provides an overview of the variety of data collected through IoT devices. The conflux of machine learning with IoT is also explai...
Article
Full-text available
There is an increasing demand for efficient and precise plant disease detection methods that can quickly identify disease outbreaks. For this, researchers have developed various machine learning and image processing techniques. However, real-field images present challenges due to complex backgrounds, similarities between different disease symptoms,...
Article
Full-text available
In agriculture, crops are severely affected by illnesses, which reduce their production every year. The detection of plant diseases during their initial stages is critical and thus needs to be addressed. Researchers have been making significant progress in the development of automatic plant disease recognition techniques through the utilization of...
Article
Full-text available
Video analytics can achieve increased speed and efficiency by operating directly on the compressed video format, thereby alleviating the decoding burden on the analytics server. The encoded video streams are rich in semantic binary information and this information can be utilized more efficiently to train the classifiers. Motivated by the same noti...
Article
Full-text available
When recognizing underwater images, problems, including poor image quality and complicated backdrops, are significant. The main problem of underwater images is the blurriness and invisibility of objects present in an image. This study presents a unique object identification design built on a YOLOv8 (You Only Look Once) framework upgraded to address...
Article
Full-text available
The Internet of Things (IoT) is being prominently used in smart cities and a wide range of applications in society. The benefits of IoT are evident, but cyber terrorism and security concerns inhibit many organizations and users from deploying it. Cyber-physical systems that are IoT-enabled might be difficult to secure since security solutions desig...
Article
Full-text available
Effective traffic congestion prediction is need of the hour in a modern smart city to save time and improve the quality of life for citizens. In this study, AB_AO (ARIMA Bi-LSTM using Aquila optimizer), a hybrid predictive model, is proposed using the most effective time-series data prediction statistical model ARIMA (Autoregressive Integrated Movi...
Article
Full-text available
Inpatient falls from beds in hospitals are a common problem. Such falls may result in severe injuries. This problem can be addressed by continuous monitoring of patients using cameras. Recent advancements in deep learning-based video analytics have made this task of fall detection more effective and efficient. Along with fall detection, monitoring...
Article
Full-text available
Internet of Things (IoT) plays an essential contribution in connecting devices and enabling seamless data exchange, leading to increased efficiency and convenience. However, security concerns in IoT systems are significant, as compromised devices can lead to data breaches and privacy violations. Blockchain technology can enhance IoT security by pro...
Article
Full-text available
Predictive algorithms, also known as mathematical models, utilize historical data to accurately predict future outcomes. These algorithms identify patterns and relationships within the data, resulting in precise predictions. The growing importance of predictive algorithms in various domains, such as finance, healthcare, marketing, weather forecasti...
Article
Full-text available
In recent years, machine learning (ML) has shown a significant impact in tackling various complicated problems in different application domains, including healthcare, economics, ecological, stock market, surveillance, and commercial applications. Machine Learning techniques are good enough to deal with a wide range of data, uncover fascinating link...
Article
Full-text available
Automatic detection of a medical disease is a need of the hour as it helps doctors diagnose diseases and provide fast medical reports. COVID-19 is a deadly disease for which an automated detection system may be helpful. This study proposes a unique hybrid deep learning model, COVIDet, based on CNN and the speeded-up robust features (SURF) extractio...
Article
Full-text available
The Internet of Things (IoT) has revolutionized our daily lives, impacting everything from healthcare to transportation and even home automation and industrial control systems. However, as the number of connected devices continues to rise, so do the security risks. In this review, we explore the different types of attacks that target various layers...
Article
Full-text available
In the above article [1] , references 56 and 92 were retracted. As the works in these references are no longer reliable, we are removing these references and the related discussions in [1] . These references do not have any impact on the data, analysis, or conclusion in our article and the purpose of using these references was to provide an in-...
Conference Paper
Full-text available
The impact of computing on society is intricate and far-reaching both physically and virtually. Computers have led to an increase in productivity since they have made a wide variety of operations simpler and more efficient. Specifically, Internet of Things has made maintaining infrastructure faster, cheaper, and greener. When it comes to the releva...
Article
Full-text available
Nowadays, enormous amounts of data are produced every second. These data also contain private information from sources including media platforms, the banking sector, finance, healthcare, and criminal histories. Data mining is a method for looking through and analyzing massive volumes of data to find usable information. Preserving personal data duri...
Article
In recent years, the proliferation of fake accounts on social media has become a significant concern for individuals, organizations, and society. Fake accounts play an important role in spreading fake news, rumors, spam, unethical harassment, and other mischievous motives on social media platforms. Detecting such accounts manually is time-consuming...
Chapter
The term “Internet of Things” (IoT) is used to describe the global network of billions of devices, buildings, cars, and other physical things that are interconnected and exchange information. IoT security is necessary for the secure connection of devices and the components of such devices, as well as for the protection of those devices from cyberat...
Article
Full-text available
Video Analytics is widely used by the internet‐based platforms to govern the mass consumption of videos. Traditionally, it is carried out from the decoded format of the videos. This requires the analytics server to perform both decoding and analytics computation. This process can be made fast and efficient if performed over the compressed format of...
Article
Full-text available
The online social network is the largest network, more than 4 billion users use social media and with its rapid growth, the risk of maintaining the integrity of data has tremendously increased. There are several kinds of security challenges in online social networks (OSNs). Many abominable behaviors try to hack social sites and misuse the data avai...
Chapter
Due to gender-specific job stresses, occupational stress is becoming more common in a variety of sectors and may be a problem of uneven size for working women. Even while these pressures haven’t received much attention up until now, new research indicates that they can have a negative impact on health. Numerous diseases, such as cardiovascular dise...
Article
Full-text available
In recent years the application of digital images has increased in a rapid manner, but due to noise the limited applications are currently openly adopting these applications. The noise can degrade the image quality and the application’s quality of service too. However, in literature, there are a number of different kinds of noise available and to r...
Chapter
Full-text available
A novel idea called the metaverse combines various technologies to offer a lifelike experience in a virtual setting. To realize its full potential, the idea must still be refined. People's opinions of the phrase are conflicted. Whether the metaverse is a beneficial thing or whether it will harm our future has been heavily disputed. Many critics thi...
Article
Full-text available
IoT devices collect time-series traffic data, which is stochastic and complex in nature. Traffic flow prediction is a thorny task using this kind of data. A smart traffic congestion prediction system is a need of sustainable and economical smart cities. An intelligent traffic congestion prediction model using Seasonal Auto-Regressive Integrated Mov...
Chapter
Video data analytics is rapidly evolving and transforming the way we live in urban environments. In Video Data Analytics for Smart City Applications: Methods and Trends, data science experts present a comprehensive review of the latest advances and trends in video analytics technologies and their extensive applications in smart city planning and en...
Chapter
Video data analytics is rapidly evolving and transforming the way we live in urban environments. In Video Data Analytics for Smart City Applications: Methods and Trends, data science experts present a comprehensive review of the latest advances and trends in video analytics technologies and their extensive applications in smart city planning and en...
Conference Paper
Full-text available
The smart grid is a complex network infrastructure that integrates multiple energy sources, advanced communication technologies, and various intelligent devices. This complexity and the increasing use of connected devices make the smart grid vulnerable to cyber threats, which could cause significant disruptions to the power supply and potentially a...
Article
Full-text available
Object detection and object recognition are the most important applications of computer vision. To pursue the task of object detection efficiently, a model with higher detection accuracy is required. Increasing the detection accuracy of the model increases the model’s size and computation cost. Therefore, it becomes a challenge to use deep learning...
Conference Paper
Full-text available
With advancement in technology, there is an increase in number of users using social media platforms. This result in huge amount of data on the online social media platforms. As a result attackers get attracted to these platforms and create fake accounts known as fake profiles, with some mischievous motives. Fake profiles are used for playing a sig...
Conference Paper
IoT is proven to be a revolutionary technology which has been indulged in common people’s life. Smartphones, wearable devices, Unmanned Arial Vehicles (UAV), and other sensors bearing machines have made human life effortless. These devices generate a huge amount of raw data which needs to be addressed in-order to get valuable insights. Big data col...
Conference Paper
Full-text available
The RFID group developed the concept of IoT in 1999 and continues to grow more significant to the world, owing to the advancement of cloud computing, embedded and universal interaction, and data analysis. The Internet of Things (IoT) is a brand-new paradigm that combines the Internet with actual physical objects from a number of different industrie...
Conference Paper
Full-text available
Anomaly detection is an essential task in Internet of Things (IoT) environments, as it can help identify abnormal behavior and potential security threats in connected devices and systems. Deep learning models have shown promising results in detecting anomalies in IoT data due to their ability to learn complex patterns and relationships. This paper...
Conference Paper
The term "Internet of Things" (IoT) is used to describe the global network of billions of devices, buildings, cars, and other physical things that are interconnected and exchange information. IoT security is necessary for the secure connection of devices and the components of such devices, as well as for the protection of those devices from cyberat...
Article
Full-text available
Because of the rise in the number of cyberattacks, the devices that make up the Internet of Things (IoT) environment are experiencing increased levels of security risks. In recent years, a significant number of centralized systems have been developed to identify intrusions into the IoT environment. However, due to diverse requirements of IoT device...
Article
Full-text available
Machine learning (ML) provides effective solutions to develop efficient intrusion detection system (IDS) for various environments. In the present paper, a diversified study of various ensemble machine learning (ML) algorithms has been carried out to propose design of an effective and time-efficient IDS for an Internet of Things (IoT) enabled enviro...
Article
Full-text available
The rapid rise of technological advancements led to the increased consumption of electronic gadgets. This change expedited the requirement for sustainable technologies to meet the growing consumer requirements with minimum computational costs. Nowadays, video content shares a large proportion of the internet bandwidth. Object Detection from the vid...
Article
Full-text available
Computer vision technologies have greatly improved in the last few years. Many problems have been solved using deep learning merged with more computational power. Action recognition is one of society's problems that must be addressed. Human Action Recognition (HAR) may be adopted for intelligent video surveillance systems, and the government may us...
Article
With the growth of the Internet of Things (IoT), security attacks are also rising gradually. Numerous centralized mechanisms have been introduced in the recent past for the detection of attacks in IoT, in which an attack recognition scheme is employed at the network’s vital point, which gathers data from the network and categorizes it as “Attack” o...
Article
Full-text available
The growth of superfluous video content over the internet led to the emergence of highly proficient video compression techniques. These novel techniques make optimal use of the available varying bandwidths to deliver quality video content. The traditional techniques of video compression are mainly based on block designs and remove the redundancies...
Chapter
Internet of Things (IoT) came out to be a robust platform that helps in connecting every domain of everyday life. Healthcare is one of the domains of the world which go hand in hand with state-of-the-art technologies. IoT has made a drastic change in the healthcare domain. Machine Learning plays a vital role in making healthcare system smart and au...
Article
Full-text available
With the rising usage of technology, a tremendous volume of data is being produced in the current scenario. This data contains a lot of personal data and may be given to third parties throughout the data mining process. Individual privacy is extremely difficult for the data owner to protect. Privacy-Preservation in Data Mining (PPDM) offers a solut...
Article
Full-text available
The stability of the power grid is concernment due to the high demand and supply to smart cities, homes, factories, and so on. Different machine learning (ML) and deep learning (DL) models can be used to tackle the problem of stability prediction for the energy grid. This study elaborates on the necessity of IoT technology to make energy grid netwo...
Article
Full-text available
Coronavirus disease (COVID-19) is an infectious disease caused by the SARS-CoV-2 virus and population vulnerability increased all over the world due to lack of effective remedial measures. Nowadays vaccines are available; but in India, only 18.8% population has been fully vaccinated till now. Therefore, social distancing is only precautionary norm...
Article
Full-text available
ABSTARCT Internet of Things (IoT) has emerged as a very significant research area. In IoT, billions of 'things' are connected which communicate with one another over a network. While communicating among 'things', their users face several types of application and technical challenges. IoT system infrastructure comprises several layers. Different res...
Article
Full-text available
Internet of Things (IoT) is the fastest growing technology that has applications in various domains such as healthcare, transportation. It interconnects trillions of smart devices through the Internet. A secure network is the basic necessity of the Internet of Things. Due to the increasing rate of interconnected and remotely accessible smart device...
Article
Full-text available
The sudden surge in the video transmission over internet motivated the exploration of more promising and potent video compression architectures. Though the frame prediction based hand designed techniques are performing well and widely used but the recent deep learning based researches in this domain provided further directions of pure deep learning...
Article
Full-text available
A smart grid is a comprehensive system that integrates various components with the power system and communication infrastructure to control it. As the communication infrastructure began to integrate, the potential security risks increased. Unlike the existing IT system, controlling the power system involves physical operations and processes, leadin...
Article
Full-text available
Coronavirus born COVID-19 disease has spread its roots in the whole world. It is primarily spread by physical contact. As a preventive measure, proper crowd monitoring and management systems are required to be installed in public places to limit sudden outbreaks and impart improved healthcare. The number of new infections can be significantly reduc...
Article
Full-text available
Sensor devices used in internet of things (IoT) enabled environment produce large amount of data. This data plays a major role in bigdata landscape. In recent years, correlation, and implementation of bigdata and IoT is being extrapolated. Nowadays, predictive analytics is gaining attention of many researchers for big IoT data analytics. This paper...
Article
Full-text available
The extensive use of Internet of Things (IoT) appliances has greatly contributed in the growth of smart cities. Moreover, the smart city deploys IoT-enabled applications, communications, and technologies to improve the quality of life, people’s wellbeing, quality of services for the service providers and increase the operational efficiency. Neverth...
Article
Full-text available
The growing number of Internet of Things (IoT) objects and the operational and security challenges in IoT systems are encouraging researchers to design suitable IoT architecture. Enormous data generated in the IoT environment face several kinds of security and privacy challenges. IoT system generally suffers from several issues like data storage, s...
Article
Full-text available
Today, a huge enhancement has taken place in our electricity grid system at every level either it is generation, transmission, distribution, or at the consumer side. More and more focuses are on making the grid reliable, efficient, and available all the time. Establishing a framework is a one-time process but maintaining and provides security is li...
Article
Full-text available
Being a time-consuming and costly activity, software testing always demands optimization and automation. Software testing is an important activity to achieve quality and customer satisfaction. This paper presents a comparative evaluation of different hybrid automated software testing techniques using the concepts of soft computing for overall quali...
Chapter
Video content over the Internet is growing rapidly. There arises a need for more powerful and proficient video compression techniques to handle beating stress of voluminous video over the limited bandwidth. Traditional video compression mechanisms are hand-designed, and their architecture is an amalgamation of different modules designed in such a w...
Article
Full-text available
span>Twitter is used by millions of people across the world, so the data collected from Twitter can be highly valuable for research and helpful in decision support. Here in this paper ‘Twitter US Airline data’ from Kaggle data repository is used for sentiment classification of customers’ reviews. The current research aims to implement various machi...