About
41
Publications
10,853
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
311
Citations
Introduction
Publications
Publications (41)
An Electronic Health Record (EHR) store essential and sensitive patient's medical information. Since health information is highly confidential data, it should be accessible with the consent of the patient. Blockchain based EHR management system offers improvised privacy and patient-centric approach. EHR management systems are available with multipl...
The imbalance between parking availability and demand has led to a rise in traffic challenges in many cities. The adoption of technologies like the Internet of Things and deep learning algorithms has been extensively explored to build automated smart parking systems in urban environments. Non-human-mediated, scalable smart parking systems that are...
The integration of Machine Learning (ML) and blockchain technology emphasizes their combined potential to revolutionize various sectors, including banking, healthcare, supply chain management, and security. By integrating the data-driven capabilities of ML with blockchain's secure, transparent, and decentralized platform, the study explores how the...
Although Bitcoin is the most popular cryptocurrency, it is very unstable even today. As the number of newsfeeds, articles, comments, trends, and opinions of influencers on popular social media platforms like Twitter is exponentially growing, they have a significant impact on the price of Bitcoin. People are often influenced by people who inspire th...
Social media platforms play a key role in fostering the outreach of extremism by influencing the views, opinions, and perceptions of people. These platforms are increasingly exploited by extremist elements for spreading propaganda, radicalizing, and recruiting youth. Hence, research on extremism detection on social media platforms is essential to c...
Biomedical text summarization (BTS) is proving to be an emerging area of work and research with the need for sustainable healthcare applications such as evidence-based medicine practice (EBM) and telemedicine which help effectively support healthcare needs of the society. However , with the rapid growth in the biomedical literature and the diversit...
Electronic Health Records (EHR) serve as a solid documentation of health transactions and as a vital resource of information for healthcare stakeholders. EHR integrity and security issues, however, continue to be intractable. Blockchain-based EHR architectures, however, address the issues of integrity very effectively. In this work, we suggest a de...
Purpose: Sign language is a communication media for hearing impaired people. Although sign language can be effectively used for communication between two disabled persons, the challenge is higher when they need to communicate with the outside world which rarely has the understanding toward sign language. The aim of this work is to develop computer...
How to deliver best care in various clinical settings remains a vexing problem. All pertinent healthcare-related questions have not, cannot, and will not be addressable with costly time- and resource-consuming controlled clinical trials. At present, evidence-based guidelines can address only a small fraction of the types of care that clinicians del...
Identifying the calorific value of food requires a correct estimate of its volume and size dimensions. The food volumetric estimation can be done rationally and efficiently by measuring the food dimensions in terms of surface parameters. Food volume estimation can be effectively implemented with a computer vision-based application. The food image s...
Interoperability in Electronic Health Records (EHR) is significant for the seamless sharing of information amongst different healthcare stakeholders. Interoperability in EHR aims to devise agreements in its interpretation, access, and storage with security, privacy, and trust. A study and survey of state-of-the-art literature, prototypes, and proje...
Social media platforms are a popular choice for extremist organizations to disseminate their perceptions, beliefs, and ideologies. This information is generally based on selective reporting and is subjective in content. However, the radical presentation of this disinformation and its outreach on social media leads to an increased number of suscepti...
Biometrics is progressively becoming vital due to vulnerabilities of traditional security systems leading to frequent security breaches. Biometrics is an automated device that studies human beings’ physiological and behavioral features for their unique classification. Iris-based authentication offers stronger, unique, and contactless identification...
In recent years, lifestyle has changed massively due to socio-economic effect. These changes in lifestyle have unfortunately been leading to increase in chronic illnesses. With flourishing digital market of various communication devices, a variety of tools which assist health-lovers to track their lifestyle with eating habits, exercising patterns a...
Social media platforms are popular for expressing personal views, emotions and beliefs. Social media platforms are influential for propagating extremist ideologies for group-building, fund-raising, and recruitment. To monitor and control the outreach of extremists on social media, detection of extremism in social media is necessary. The existing ex...
Clinical decision-making is based on knowledge, expertise, and authority, with clinicians approving almost every intervention-the starting point for delivery of "All the right care, but only the right care," an unachieved healthcare quality improvement goal. Unaided clinicians suffer from human cognitive limitations and biases when decisions are ba...
In the last decade, the vehicular ad-hoc network (VANET) field is growing drastically. In VANET the communication is the most important aspect through which the data transmission is taking place. Data transmission is maybe related to data in the form of multimedia messages, notifications, announcements, or some warning messages that are involved in...
The advancement in technology and reliance on data has led to concerns with regard to data security and privacy. The healthcare industry in particular is data critical in nature and it is very essential to ensure the privacy and security of patient’s data. Electronic healthcare systems need to be patient-centric, wherein the patient is in control o...
Public health surveillance systems for infectious diseases, that can turn pandemic, need a regular intervention for diagnosis, treatment and control. For an effective disease monitoring and control system, there is a need to model a solution for organizing , sharing and analyzing the disease data with trusted, privacy preserving and interoperable m...
Opinion mining, an upcoming area of computational linguistics, deals with the analysis of public sentiment polarity of a product giving rise to a new platform on social media and e-commerce for users to express/explore opinions on products and/or product manufacturers for the betterment of the product development. A tentative product rating can be...
Humanity is considered as the most intelligent species on the earth and are health reactive. Today, due to increase in sluggish behavior there is reduction in physical activity and that leads to health problems. To overcome this cause, wearable technology helps human being to get updates about physical health behavior e.g. heart rate, blood pressur...
Agriculture is one of India’s crucial sectors in terms of its contribution to employment and the country’s (Gross Domestic Product) GDP. It has primarily emerged as an essential - growing sector in the global economy since independence. [21] However, the non-realization of the reasonable price for agricultural crop production leads to the introduct...
Purpose- Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods...
Smart wearables help real-time and remote monitoring of health data for effective diagnostic and preventive health care services. Wearable devices have the ability to track and monitor healthcare vitals such as heart rate, physical activities, BMI (Body Mass Index), blood pressure, and keeps an individual notified about the health status. Artificia...
Face Recognition Systems are used widely in all areas as a medium of authentication, the ease of implementation and accuracy provides it with a broader scope. The face recognition systems are vulnerable to some extent and are attacked by performing different types of attacks using a variety of techniques. The term used to describe the measures take...
The Internet has become an essential part of modern communication. People are sharing ideas, thoughts, and beliefs easily, using social media. This sharing of ideas has raised a big problem like the spread of the radicalized extremist ideas. The various extremist organizations use the social media as a propaganda tool. The extremist organizations a...
Purpose-Estimation of food portions is necessary in image based dietary monitoring techniques. The purpose of this systematic survey is to identify peer reviewed literature in image-based food volume estimation methods in Scopus, Web of Science and IEEE database. It further analyzes bibliometric survey of image-based food volume estimation methods...
Climate change refers to the fluctuations in the earth’s atmosphere that occurs over a longer period of time due to natural processes or human activities. Climate change causes increase in the occurrence of incidences and degree of severe climate events such as cyclones, heat waves, floods and droughts which are referred as direct effect. Gradual c...
Artificial Intelligence (AI) offers intellectual, customized and better decision-making capabilities for humans in diverse areas of applications and use-cases. All of these applications have far reaching effects on the human life and the living pattern. AI algorithms however are based on a centralized architecture, methodology and learning patterns...
The social media is growing at an astonishing rate; this has resulted in increased online communications. The online communication contains feedbacks, comments, and reviews that are posted on the internet by users. To analyze such data, the paper represents the Aspect-based unsupervised method that applies association rule mining on customer review...
The field of sentiment analysis identifies and analyzes the public’s favorability in terms of an entity. The advent of social media websites and e-commerce applications has enhanced the significance of analysis of user reviews for the product manufacturers to obtain insights into the acceptability of products. Aspect-level sentiment analysis helps...
Data security, data reliability and data availability are the challenges the world has always been solving. Election and Voter data are very crucial for a democratic nation. India, in this respect, brings its own challenges. A lot of financial resources are spent to conduct elections. At times, people are unable to cast their vote because they are...
Data security, data reliability and data availability are the challenges the world has always been solving. Election and Voter data are very crucial for a democratic nation. India, in this respect, brings its own challenges. A lot of financial resources are spent to conduct elections. At times, people are unable to cast their vote because they are...
Data consistency is an integral part of CAP (consistency-availability-partition) guarantees. Data consistency however is rationed to the permissible levels to achieve higher availability, scalability and other performance guarantees. The presented technique is a rationed consistency model applied to selected data objects and is further extensible t...
Contemporary web-applications are deployed on the cloud data-stores for realizing requirements like low latency and high scalability. Although cloud-based database applications exhibit high performance with these features, they compromise on the weaker consistency levels. Rationing the consistency guarantees of an application is a necessity to achi...