
Rupali Mahajan- Vishwakarma Institute Of Information Technology, Pune
Rupali Mahajan
- Vishwakarma Institute Of Information Technology, Pune
About
61
Publications
18,997
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
254
Citations
Introduction
Publications
Publications (61)
In a time when vaccination records are critical to public and individual health, a tamper-proof system is needed to manage and validate vaccination data. This article outlines a novel approach to creating an immutable, safe platform for inputting and verifying vaccination data using blockchain technology. The system uses a distributed approach for...
Financial predictive modeling plays a crucial role in decision-making, risk management, and strategic planning within financial markets and financial institutions. Ensuring the veracity and accuracy of synthetic data is a major challenge when it comes to developing forecasting models. Otherwise, inaccurate model predictions and flawed decisions are...
Digital technology must be integrated into every part of a company in order to revolutionize how it runs and provides value to customers. Starbucks is a prime example, as it launched mobile ordering and payment features via their app. This change not only improved customer service but also produced a wealth of information about demographics, prefer...
Planning irrigation well is a key part of using water more efficiently, getting better food yields, and keeping resources safe in farming. Traditional methods don't always take into account how the climate and land are changing, which wastes water. This study looks into how Artificial Intelligence (AI) tools, such as machine learning (ML), deep lea...
In a time when vaccination records are critical to public and individual health, a tamper-proof system is needed to manage and validate vaccination data. This article outlines a novel approach to creating an immutable, safe platform for inputting and verifying vaccination data using blockchain technology. The system uses a distributed approach for...
A small size microstrip fed ultra-wide bandwidth (UWB) antenna with quad band notch characteristics has been described in this paper. Band notch characteristics are achieved by loading dual number of two via double-slot type electromagnetic band gap (TVDS EBG) structures. The size of TVDS - EBG structure is less compared to other conventional EBG c...
The evolution of wheelchair technology has been transformative for millions facing mobility challenges, enhancing their quality of life and promoting independence. Traditional manual wheelchairs often require assistance from another person, significantly restricting the user's autonomy. Recognizing the need for more independence, this paper introdu...
Within the age of "huge information," real-time peculiarity spotting is an imperative portion of keeping complex frameworks secure and working appropriately in numerous regions, such as healthcare, back, and organize security. Conventional strategies for finding irregularities regularly can't keep up with the sheer sum, speed, and variety of big in...
Finding birth flaws early is important for getting help right away. Machine learning (ML) methods promise recognition processes more accurate and faster. Convolutional neural networks (CNNs) and gradient boosting machines (GBMs) are used to find complicated patterns that could point to early birth problems. A variety of datasets like fetal ultrasou...
Smart ultrasound images mixed with soft computing analysis is a cutting-edge method for medical diagnosis that promises to make healthcare more accurate, efficient, and open to everyone. Combining ultrasound technology with computer programs will completely change medical imaging analysis. Smart ultrasound imaging uses cutting-edge tools, like high...
In order to protect the maternal and infant safety, birth weight is an important indicator during fetal development. A doctor's experience in clinical practice, however, helps estimate birth weight by using empirical formulas based on the experience of the doctors. Recently, birth weights have been predicted using machine learning (ML) technologies...
The Internet of Things (IoT), which connects billions of gadgets to expedite operations and enhance our lives, has completely changed the way we interact with our environment. With MQTT (Message Queuing Telemetry Transport) emerging as a popular communication protocol within the IoT ecosystem, the vast proliferation of networked devices has, howeve...
“Echoes of Tomorrow: Navigating Business Realities With AI and Digital Twins” charts a visionary course where artificial intelligence and digital twins converge to reshape the business landscape. With AI's cognitive insights and digital twins' dynamic reflections, this paradigm promises enhanced decision-making, streamlined operations, and a transp...
This research explores the synergies among blockchain, artificial intelligence (AI), and digital twins, showcasing their collective impact on reshaping contemporary business dynamics. The study examines practical applications across various industries, emphasizing transparency, cognitive capabilities, and virtual representations. The integration of...
In modern, ever-changing network environments, QoS must be high to provide reliable and efficient services. This study tests Deep Learning (DL), specifically CNN, LSTM, and a hybrid CNN-LSTM model, to identify abnormalities using QoS measurements like Availability, Bandwidth, Latency, Jitter, and Packet Loss. The study evaluates DL-based QoS manage...
In our interconnected digital world, opportunities for communication and productivity abound. However, digital safety concerns loom. Mobile apps are crucial in protecting personal and data security. They provide tools for antivirus, secure communication, and privacy. These apps empower users to manage their digital lives with features like app perm...
In our digitally connected world, the chapter takes a holistic approach to combat the pervasive challenges of online harassment and cyberbullying. These issues extend beyond screens, with far-reaching societal, psychological, and emotional consequences. This study delves into the multifaceted nature of online harassment, examining its psychological...
In today's technology-driven era, workplace safety remains a paramount global concern. To proactively prevent accidents, mitigate risks, and ensure employee well-being, this chapter introduces the research project 'AI-Driven Predictive Safety Analytics Enhancing Workplace Security'. This initiative leverages artificial intelligence (AI) and data an...
Strong security is crucial as Wireless Sensor Network (WSN) become more common. Dynamic Lattice-Based Key Revocation (DLBKR) is a novel method for improving key revocation in WSN. Lattice-based cryptography helps DLBKR overcome compromised keys and evolving security threats in dynamic sensor networks. Key revocation mechanisms are examined in detai...
Paucity of literature to integrate the duality of customer and employee strategic orientations of an organization with its service operational inputs for achieving superior returns has provided an impetus to examine the significance of internal processes and behaviors as a mediating mechanism in the entrepreneurial orientation-firm performance rela...
In today's technology-driven era, workplace safety remains a paramount global concern. To proactively prevent accidents, mitigate risks, and ensure employee well-being, this abstract introduces the research project 'AI-Driven Predictive Safety Analytics Enhancing Workplace Security.' This initiative leverages artificial intelligence (AI) and data a...
The major intention of this research is to propose a secure authentication protocol for healthcare services in IoT based on a developed Q-Net-based secret key. Nine phases are included in the model. The sensor node, IoT device center, gateway node, and medical professional are the four entities involved in the key generation process. The designed m...
A crucial part of handling different data science problems is machine learning, a branch of artificial intelligence. One of its common uses is making predictions based on past data. Classification is a powerful machine learning technique that is frequently used to produce accurate predictions. On the other hand, some categorization algorithms may h...
In order to protect the maternal and infant safety, birth weight is an important indicator during fetal development. A doctor's experience in clinical practice, however, helps estimate birth weight by using empirical formulas based on the experience of the doctors. Recently, birth weights have been predicted using machine learning (ML) technologies...
This study examines how flexible optical networks may be used to combine adaptive software-defined networking (SDN) with vehicle-to-vehicle (V2V) communication in the Fifth Generation (5G) era. Commercial V2V (C-V2V) technology offers great potential to revolutionize current wireless infrastructure, possibly eliminating the need for specific short-...
Every year millions of hectares of forest are devastated by fire. Forest fires may occur due to Natural causes or Man-made causes. Natural causes include lightning which set trees on fire, High atmospheric temperatures and dryness (low humidity). Man-made causes include naked flame, cigarette or bidi, electric spark or any source of ignition that c...
Secure communication is crucial in today's increasingly interconnected world, especially in distributed contexts where several parties must cooperate while maintaining confidentiality and authenticity. In order to overcome these difficulties, this work introduces a novel Secure Group Key Agreement Protocol (SGKAP) strengthened with Elliptic Curve S...
This research paper introduces a novel approach to improve security and access control in smart door lock systems. The proposed system incorporates multi-factor authentication, combining a numerical keypad, mobile app, and RFID sensor. Each authentication method is associated with a specific lock, offering differentiated access control. Notably, th...
The importance of utilizing the facilities of IoMT to provide an efficient treatment to the patient with an accuracy. The need for security measures to ensure accurate, confidential, and accessible data during all collection, transmission, storage, and processing stages is emphasized. The healthcare industry relies heavily on significant data sourc...
Purpose
Ovarian cancer (OC) is the most common type of gynecologic cancer in the world with a high rate of mortality. Due to manifestation of generic symptoms and absence of specific biomarkers, OC is usually diagnosed at a late stage. Machine learning models can be employed to predict driver genes implicated in causative mutations.
Design/methodo...
Hybrid renewable energy sources with energy storage systems (ESS) are becoming more prevalent in offering remote consumers with efficient, affordable, and dependable energy alternatives to traditional systems. The ESS is essential for the integration of hybrid RES in order to balance the supply of power with demand. Simultaneously, the price fluctu...
Cancer is the most dreadful diseases across world and providing better therapy to cancer patients is still remains as a major challenging task due to drug resistance of tumor cells. This paper proposes a Sea Lion Crow Search Algorithm (SLCSA) for drug sensitivity prediction. The drug sensitivity from cultured cell lines is predicted using stacked a...
Background
Guided tissue regeneration-based root coverage has emerged as a promising treatment modality in the treatment of gingival recession. A variety of nonresorbable and bioresorbable membranes have been successfully used. Among resorbable membranes, collagen has been extensively studied. Recently, a third generation barrier membrane derived f...
Aim: Knowledge and oral health behavior of dental students and professionals play an important role in oral health education of patients and community at large. It is therefore important that their own oral health behavior conforms to expectations of the population. Hence, the aim of the present study was to evaluate the oral health knowledge, atti...
Novolac epoxy resins have recently been reported for inhibition of hydroxy terminated polybutadiene (HTPB) based composite propellants and their elongation has been improved by the incorporation of some flexibilizers. In the present investigation, curing behaviour of a novolac epoxy resin (Dobeckot E4) by hardeners (polyamide EH 411 and polyamine H...
Complexes of nitrocellulose (NC – low and high nitrogen content) with copper oxide (CuO) have been synthesized and studied
for morphological behaviour on heating from room temperature to 500°C with the help of hot stage microscopy (HSM).
During decomposition, NC:CuO complexes show contraction of fibrous boundaries followed by mass movement of matr...
High density polyurethane foam based on polyether, toluene diisocyanate (TDI) system with and without titanium dioxide (TiO2) as a filler has been studied to understand the sequence, nature and mechanism of ifs thermal degradation using thermogravimetry (TG), differential thermal analysis (DTA), evolved gas analysis (EGA) and infrared (IR) spectros...
Thermal degradation of some unsaturated polyesters synthesized by ‘1-step’, ‘2-step’ and ‘3-step’ polyesterification processes and designated as NUP-I, NUP-II and NUP-III, respectively, have been studied using thermogravimetry (TG), derivative thermogravimetry (DTG), differential thermal analysis (DTA), iso-thermal TG, infrared (IR) spectroscopy an...
The thermal decomposition of nitrocellulose (NC) 12.1% N, has been studied with regard to kinetics, mechanism, morphology and the gaseous products thereof, using thermogravimetry (TG), differential thermal analysis (DTA), IR spectroscopy, differential scanning calorimetry (DSC) and hot stage microscopy.
The kinetics of the initial stage of thermoly...