Rupali Mahajan

Rupali Mahajan
  • Vishwakarma Institute Of Information Technology, Pune

About

61
Publications
18,997
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
254
Citations

Publications

Publications (61)
Article
In a time when vaccination records are critical to public and individual health, a tamper-proof system is needed to manage and validate vaccination data. This article outlines a novel approach to creating an immutable, safe platform for inputting and verifying vaccination data using blockchain technology. The system uses a distributed approach for...
Preprint
Full-text available
Financial predictive modeling plays a crucial role in decision-making, risk management, and strategic planning within financial markets and financial institutions. Ensuring the veracity and accuracy of synthetic data is a major challenge when it comes to developing forecasting models. Otherwise, inaccurate model predictions and flawed decisions are...
Article
Full-text available
Digital technology must be integrated into every part of a company in order to revolutionize how it runs and provides value to customers. Starbucks is a prime example, as it launched mobile ordering and payment features via their app. This change not only improved customer service but also produced a wealth of information about demographics, prefer...
Article
Planning irrigation well is a key part of using water more efficiently, getting better food yields, and keeping resources safe in farming. Traditional methods don't always take into account how the climate and land are changing, which wastes water. This study looks into how Artificial Intelligence (AI) tools, such as machine learning (ML), deep lea...
Article
In a time when vaccination records are critical to public and individual health, a tamper-proof system is needed to manage and validate vaccination data. This article outlines a novel approach to creating an immutable, safe platform for inputting and verifying vaccination data using blockchain technology. The system uses a distributed approach for...
Preprint
Full-text available
A small size microstrip fed ultra-wide bandwidth (UWB) antenna with quad band notch characteristics has been described in this paper. Band notch characteristics are achieved by loading dual number of two via double-slot type electromagnetic band gap (TVDS EBG) structures. The size of TVDS - EBG structure is less compared to other conventional EBG c...
Article
Full-text available
The evolution of wheelchair technology has been transformative for millions facing mobility challenges, enhancing their quality of life and promoting independence. Traditional manual wheelchairs often require assistance from another person, significantly restricting the user's autonomy. Recognizing the need for more independence, this paper introdu...
Article
Within the age of "huge information," real-time peculiarity spotting is an imperative portion of keeping complex frameworks secure and working appropriately in numerous regions, such as healthcare, back, and organize security. Conventional strategies for finding irregularities regularly can't keep up with the sheer sum, speed, and variety of big in...
Chapter
Finding birth flaws early is important for getting help right away. Machine learning (ML) methods promise recognition processes more accurate and faster. Convolutional neural networks (CNNs) and gradient boosting machines (GBMs) are used to find complicated patterns that could point to early birth problems. A variety of datasets like fetal ultrasou...
Chapter
Smart ultrasound images mixed with soft computing analysis is a cutting-edge method for medical diagnosis that promises to make healthcare more accurate, efficient, and open to everyone. Combining ultrasound technology with computer programs will completely change medical imaging analysis. Smart ultrasound imaging uses cutting-edge tools, like high...
Article
In order to protect the maternal and infant safety, birth weight is an important indicator during fetal development. A doctor's experience in clinical practice, however, helps estimate birth weight by using empirical formulas based on the experience of the doctors. Recently, birth weights have been predicted using machine learning (ML) technologies...
Article
Full-text available
The Internet of Things (IoT), which connects billions of gadgets to expedite operations and enhance our lives, has completely changed the way we interact with our environment. With MQTT (Message Queuing Telemetry Transport) emerging as a popular communication protocol within the IoT ecosystem, the vast proliferation of networked devices has, howeve...
Chapter
Full-text available
“Echoes of Tomorrow: Navigating Business Realities With AI and Digital Twins” charts a visionary course where artificial intelligence and digital twins converge to reshape the business landscape. With AI's cognitive insights and digital twins' dynamic reflections, this paradigm promises enhanced decision-making, streamlined operations, and a transp...
Chapter
Full-text available
This research explores the synergies among blockchain, artificial intelligence (AI), and digital twins, showcasing their collective impact on reshaping contemporary business dynamics. The study examines practical applications across various industries, emphasizing transparency, cognitive capabilities, and virtual representations. The integration of...
Article
Full-text available
In modern, ever-changing network environments, QoS must be high to provide reliable and efficient services. This study tests Deep Learning (DL), specifically CNN, LSTM, and a hybrid CNN-LSTM model, to identify abnormalities using QoS measurements like Availability, Bandwidth, Latency, Jitter, and Packet Loss. The study evaluates DL-based QoS manage...
Chapter
In our interconnected digital world, opportunities for communication and productivity abound. However, digital safety concerns loom. Mobile apps are crucial in protecting personal and data security. They provide tools for antivirus, secure communication, and privacy. These apps empower users to manage their digital lives with features like app perm...
Chapter
In our digitally connected world, the chapter takes a holistic approach to combat the pervasive challenges of online harassment and cyberbullying. These issues extend beyond screens, with far-reaching societal, psychological, and emotional consequences. This study delves into the multifaceted nature of online harassment, examining its psychological...
Chapter
In today's technology-driven era, workplace safety remains a paramount global concern. To proactively prevent accidents, mitigate risks, and ensure employee well-being, this chapter introduces the research project 'AI-Driven Predictive Safety Analytics Enhancing Workplace Security'. This initiative leverages artificial intelligence (AI) and data an...
Article
Strong security is crucial as Wireless Sensor Network (WSN) become more common. Dynamic Lattice-Based Key Revocation (DLBKR) is a novel method for improving key revocation in WSN. Lattice-based cryptography helps DLBKR overcome compromised keys and evolving security threats in dynamic sensor networks. Key revocation mechanisms are examined in detai...
Article
Paucity of literature to integrate the duality of customer and employee strategic orientations of an organization with its service operational inputs for achieving superior returns has provided an impetus to examine the significance of internal processes and behaviors as a mediating mechanism in the entrepreneurial orientation-firm performance rela...
Chapter
In today's technology-driven era, workplace safety remains a paramount global concern. To proactively prevent accidents, mitigate risks, and ensure employee well-being, this abstract introduces the research project 'AI-Driven Predictive Safety Analytics Enhancing Workplace Security.' This initiative leverages artificial intelligence (AI) and data a...
Article
The major intention of this research is to propose a secure authentication protocol for healthcare services in IoT based on a developed Q-Net-based secret key. Nine phases are included in the model. The sensor node, IoT device center, gateway node, and medical professional are the four entities involved in the key generation process. The designed m...
Article
Full-text available
A crucial part of handling different data science problems is machine learning, a branch of artificial intelligence. One of its common uses is making predictions based on past data. Classification is a powerful machine learning technique that is frequently used to produce accurate predictions. On the other hand, some categorization algorithms may h...
Preprint
Full-text available
In order to protect the maternal and infant safety, birth weight is an important indicator during fetal development. A doctor's experience in clinical practice, however, helps estimate birth weight by using empirical formulas based on the experience of the doctors. Recently, birth weights have been predicted using machine learning (ML) technologies...
Article
Full-text available
This study examines how flexible optical networks may be used to combine adaptive software-defined networking (SDN) with vehicle-to-vehicle (V2V) communication in the Fifth Generation (5G) era. Commercial V2V (C-V2V) technology offers great potential to revolutionize current wireless infrastructure, possibly eliminating the need for specific short-...
Article
Every year millions of hectares of forest are devastated by fire. Forest fires may occur due to Natural causes or Man-made causes. Natural causes include lightning which set trees on fire, High atmospheric temperatures and dryness (low humidity). Man-made causes include naked flame, cigarette or bidi, electric spark or any source of ignition that c...
Article
Full-text available
Secure communication is crucial in today's increasingly interconnected world, especially in distributed contexts where several parties must cooperate while maintaining confidentiality and authenticity. In order to overcome these difficulties, this work introduces a novel Secure Group Key Agreement Protocol (SGKAP) strengthened with Elliptic Curve S...
Article
Full-text available
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, th...
Chapter
The importance of utilizing the facilities of IoMT to provide an efficient treatment to the patient with an accuracy. The need for security measures to ensure accurate, confidential, and accessible data during all collection, transmission, storage, and processing stages is emphasized. The healthcare industry relies heavily on significant data sourc...
Article
Purpose Ovarian cancer (OC) is the most common type of gynecologic cancer in the world with a high rate of mortality. Due to manifestation of generic symptoms and absence of specific biomarkers, OC is usually diagnosed at a late stage. Machine learning models can be employed to predict driver genes implicated in causative mutations. Design/methodo...
Article
Hybrid renewable energy sources with energy storage systems (ESS) are becoming more prevalent in offering remote consumers with efficient, affordable, and dependable energy alternatives to traditional systems. The ESS is essential for the integration of hybrid RES in order to balance the supply of power with demand. Simultaneously, the price fluctu...
Article
Full-text available
Cancer is the most dreadful diseases across world and providing better therapy to cancer patients is still remains as a major challenging task due to drug resistance of tumor cells. This paper proposes a Sea Lion Crow Search Algorithm (SLCSA) for drug sensitivity prediction. The drug sensitivity from cultured cell lines is predicted using stacked a...
Article
Full-text available
Background Guided tissue regeneration-based root coverage has emerged as a promising treatment modality in the treatment of gingival recession. A variety of nonresorbable and bioresorbable membranes have been successfully used. Among resorbable membranes, collagen has been extensively studied. Recently, a third generation barrier membrane derived f...
Article
Full-text available
Aim: Knowledge and oral health behavior of dental students and professionals play an important role in oral health education of patients and community at large. It is therefore important that their own oral health behavior conforms to expectations of the population. Hence, the aim of the present study was to evaluate the oral health knowledge, atti...
Article
Novolac epoxy resins have recently been reported for inhibition of hydroxy terminated polybutadiene (HTPB) based composite propellants and their elongation has been improved by the incorporation of some flexibilizers. In the present investigation, curing behaviour of a novolac epoxy resin (Dobeckot E4) by hardeners (polyamide EH 411 and polyamine H...
Article
Complexes of nitrocellulose (NC – low and high nitrogen content) with copper oxide (CuO) have been synthesized and studied for morphological behaviour on heating from room temperature to 500°C with the help of hot stage microscopy (HSM). During decomposition, NC:CuO complexes show contraction of fibrous boundaries followed by mass movement of matr...
Article
High density polyurethane foam based on polyether, toluene diisocyanate (TDI) system with and without titanium dioxide (TiO2) as a filler has been studied to understand the sequence, nature and mechanism of ifs thermal degradation using thermogravimetry (TG), differential thermal analysis (DTA), evolved gas analysis (EGA) and infrared (IR) spectros...
Article
Thermal degradation of some unsaturated polyesters synthesized by ‘1-step’, ‘2-step’ and ‘3-step’ polyesterification processes and designated as NUP-I, NUP-II and NUP-III, respectively, have been studied using thermogravimetry (TG), derivative thermogravimetry (DTG), differential thermal analysis (DTA), iso-thermal TG, infrared (IR) spectroscopy an...
Article
The thermal decomposition of nitrocellulose (NC) 12.1% N, has been studied with regard to kinetics, mechanism, morphology and the gaseous products thereof, using thermogravimetry (TG), differential thermal analysis (DTA), IR spectroscopy, differential scanning calorimetry (DSC) and hot stage microscopy. The kinetics of the initial stage of thermoly...

Network

Cited By