Tajinder Kumar SainiSeth Jai Parkash Mukand Lal Institute Of Engineering & Technology | JMIT · IT
Tajinder Kumar Saini
Doctor of Philosophy
Ph.D
About
66
Publications
26,596
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations
Introduction
Tajinder Kumar Saini currently works at the IT, Seth Jai Parkash Mukand Lal Institute Of Engineering & Technology. Tajinder Kumar does research in Computer Engineering. Their most recent publication is 'An Improved Biometric Fusion System Based on Fingerprint and Face using Optimized Artificial Neural Network.
Additional affiliations
July 2007 - present
Education
January 2014 - July 2021
Publications
Publications (66)
The selection of methodology used is of great importance in business process modeling. It has a great impact on satisfaction of the customer. The aim of this paper is to fulfill the gaps of the existing model using agile methodology. There also exist several aspects in the business modeling as proposed by various scholars such as market-oriented as...
This Image_ enhancement technique is related to the pre-processing method. The chief goal of image _enhancement is to increase image features like contrast, brightness, and sharpness etc. In this paper, our main motive is to provide an enhanced biometric trait to the biometric recognition system so that the accuracy of the system can be improved. H...
This chapter explores the crucial nexus between cloud, fog, and edge computing security concerns and solutions, highlighting their vital role in promoting sustainable growth. Introducing these revolutionary technologies and their importance in contemporary computer designs opens the conversation. The first section of the chapter discusses the overv...
paper presentation certificate AI4S: Artificial Intelligence : Towards Sustainable Intelligence
Pre-Examination and Classification of Brain Tumor Dataset Using Machine Learning
The aim of this chapter is to improve accessibility for students with disabilities by extensively examining the growing role of Artificial Intelligence in altering special education. The chapter begins with a review of the challenges faced by students with disabilities and highlights the critical need for individualized and flexible learning strate...
Innovative research that is set to transform the aviation sector has been produced due to the integration of the Internet of Things (IoT) and Artificial Intelligence (AI) in hybrid and electric aircraft. Our research shows that real-time monitoring and predictive maintenance enabled by this convergence have considerably improved airline safety. IoT...
One Week FDP on Microsoft Power BI Tool
AI BASED NETWORK INTRUSION DETECTION DEVICE
INTERNATIONAL CONFERENCE
ON
COMPUTATIONAL INTELLIGENCE AND
COMPUTING APPLICATIONS (ICCICA-2024) MAY 23-24,2024
Reviewer Certificate for the 2nd IEEE International Conference International Conference on Computer, Electronics and Electrical Engineering and their Applications (IC2E3-2024)
A cloud-fog environment system for task scheduling based on requests from
Internet of Things devices includes one or more Internet of Things devices
; and a cloud server in communication with a plurality of cloud-fog layers
and a data center . The server having one or more processors to
perform operations to receive, by the fog layer , a plurality...
The increasing popularity of large-scale language models, such as ChatGPT, has led to growing worries about their safety, potential security threats, and ethical implications. This chapter thoroughly examines ChatGPT, an AI-powered chatbot that utilizes topic modeling and reinforcement learning to generate natural and coherent answers. Even though...
The increasing adoption of advanced technologies in healthcare, remote and real-time monitoring of patients has become feasible, enabling continuous health tracking and timely medical interventions. Recognizing the prevalence of heart disease in the community, early-stage diagnosis is crucial for saving
lives and promoting a healthy lifestyle. This...
This invention investigates a novel Three-Layered Trust Architecture that combines an extensive data security policy at the intermediary layer, normatives and procedures at the foundational layer, and the useful implementation of security measures on data, information systems, and networks at the operational layer. Regardless of a user's location o...
The present disclosure relates to the field of video surveillance and security systems, specifically addressing the challenges associated with the detection and localization of financial frauds in smart 10 surveillance environments. More particularly, the invention involves the application of deep learning techniques for enhancing the accuracy and...
Fourth International Conference on Information Technology (InCITe) Reviewer Certificate
The proposed invention, an IoT-based Smart Energy Management System using Distributed Ledger Technology (DLT), represents a groundbreaking advancement in the field of energy management and consumption. In order to fully appreciate the significance and potential impact of this innovation, it is essential to delve into the broader context of energy m...
Cloud computing has drastically changed the delivery and consumption of live streaming content. The designs, challenges, and possible uses of cloud computing for live streaming are studied. A comprehensive overview of the technical and business issues surrounding cloud‐based live streaming is provided, including the benefits of cloud computing, the...
For its potential use in he althcare, Generative Pre-trained Transformers (GPT) and comparable models have attracted a lot of attention. These models present opportunities fo r therapeutic decision assistance, effective recordkeeping, natural language interactions, and patient educ ation. Their application in healthcare, however, also has some draw...
Due to the characteristics of vehicular ad hoc networks, the increased mobility of nodes and the inconsistency of wireless communication connections pose significant challenges for routing. As a result, researchers find it to be a fascinating topic to study. Furthermore, since these networks are vulnerable to various assaults, providing an authenti...
Glaucoma is a group of optic neuropathies that have in common a progressive
degeneration of retinal ganglion cells (RGCs) and their axons, resulting in a
characteristic appearance of the optic disc and visual field loss. Assessment of
functional loss in glaucoma has been traditionally made using standard automated
perimetry (SAP). However, SAP...
The novelty resides in the shape and configuration of “MACHINE LEARNING-BASED HUMANOID DEVICE FOR OBJECT IDENTIFICATION” as illustrated.
No claim is made by virtue of this registration in respect of any action of the mechanism whatever or in respect of any mode or principle of construction of the article.
No claim is made by virtue of the registrat...
International Conference on Advanced Computing & Communication Technologies Conference Certificate
Reviewer certificates for the International Conference on Advanced Computing & Communication Technologies
Biometric System Integration in Public Health: Challenges and
Solutions
https://www.registered-design.service.gov.uk/find/6329013
The Internet of Things (IoT) makes it possible to equip billions of objects with network connectivity to gather and share real-time data to deliver intelligent services. Since CAD risk assessment is expensive for low-income countries, it is important to look for surrogate biomarkers for risk stratification of CVD in DR patients. Due to the common g...
Contributed as a member of
Technical Program Committee of 5th International Conference on Entrepreneurship, Innovation and Leadership (ICEIL)
held from 14th – 16th September 2023 at Amity University Uttar Pradesh
Member of
Technical Program Committee of 5th International Conference on Entrepreneurship, Innovation and Leadership (ICEIL)
held from 14th – 16th September 2023 at Amity University Uttar Pradesh. The certificate is awarded for his/her significant contribution.
We found him sincere, hardworking, dedicated and result oriented. He worked well as part of the team during his training. We take this opportunity to thank him and wish him all the best for his future.
Medical images like MRI, CAT scan, and ultrasound play role of back bone in diagnostics. Images generated
from various medical diagnostic machines are transmitted through channels before used by clinical experts. Transmission
through noise channel sometimes degrades and corrupts the image making it inappropriate for accurate diagnose. The
aim of th...
Cloud computing is a promising new technology that is revolutionizing the old Internet computing paradigm and the entire IT sector. Customers and many firms, such as Apple, Google, Facebook, and Amazon, are increasingly adopting mobile cloud computing technology. Because of the rapid advancements in wireless access technologies, cloud computing is...
Machine and Deep Learning Approaches For Brain Tumor Identification:
Technologies, Applications, and Future Direction
online two-week Interdisciplinary Refresher Course in
“ADVANCED RESEARCH METHODOLOGY”
from 23 January - 06 February, 2023
Citation: Tanwar, J.; Kumar, T.; Mohamed, A.A.; Sharma, P.; Lalar, S.; Keshta, I.; Garg, V. Project Management for Cloud Compute and Storage Deployment: B2B Model. Processes 2023, 11, 7. https://doi. Abstract: This paper explains the project's objectives, identifies the key stakeholders, defines the project manager's authority and provides a prelim...
This latex document will help the students and professionals to design their resumes. As a sample, the resume of Mr. Jaswinder Tanwar is created in the file. The code is taken from various sources. The purpose is to help the students and other people.
This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optimization algorithm based on mobile cloud computing to protect data from any assault. Mobile users who use protected mobile cloud computing (Mobi-Cloud) must trust the cloud service provider to keep the data sent from their mobile devices safe when mobile...
Certificate of participation in FDP on Convolution Neural Network By APPWARS Technologies
Medical images like MRI, CAT scan, and ultrasound play role of back bone in diagnostics. Images generated from various medical diagnostic machines are transmitted through channels before used by clinical experts. Transmission through noise channel sometimes degrades and corrupts the image making it inappropriate for accurate diagnose. The aim of th...
“Uni Uni-modal Biometric systems has been widely implemented for maintaining security and privacy in various applications like mobile phones, banking apps, airport access control, laptop login etc. Due to Advancement in technologies, imposters designed various ways to breach the security and most of the designed biometric applications security can...
In the field of wireless multimedia authentication unimodal biometric model is commonly used but it suffers from spoofing and limited accuracy. The present work proposes the fusion of features of face and fingerprint recognition system as an Improved Biometric Fusion System (IBFS) leads to improvement in performance. Integrating multiple biometric...
This code will Resize the multiple images available in the folder and save the resized images with the same name. This code will be used to resize the face and eye data sets used with Convolution Neural Network.
This research presents an improved biometric fusion system (IBFS) that integrates fingerprint and face as a subsystem. Two authentication systems, namely, Improved Fingerprint Recognition System (IFPRS) and Improved Face Recognition System (IFRS), are introduced respectively. For both, Atmospheric Light Adjustment (ALA) algorithm is used as an imag...
6 Days Faculty Enablement Program on
“InfyTQ based Foundation Program” held online using a webinar platform from
12th to 19th July 2019 conducted by Infosys Limited.
This Image_ enhancement technique is related to the pre-processing method. The chief goal of image _enhancement is to increase image features like contrast, brightness, and sharpness etc. In this paper, our main motive is to provide an enhanced biometric trait to the biometric recognition system so that the accuracy of the system can be improved. H...
An extensive amount of system needs reliable schemes for personal recognition to confirm the individual identity demanding the services. The aim of these schemes is the authentication of services that can be executed from the genuine user only. Tremendous growth has been seen from last few years in biometric recognition because of the increased req...
Questions
Questions (98)
How does the orchestration of microservices enhance resource scalability and elasticity in edge computing architectures?
What role does edge computing play in mitigating resource constraints and optimizing performance in resource-constrained devices?
What strategies can be implemented for efficient and adaptive resource provisioning in edge computing for varying workloads?
How does the integration of machine learning algorithms contribute to intelligent resource management in edge computing systems?
How does the orchestration of microservices enhance resource scalability and elasticity in edge computing architectures?
How can dynamic resource allocation strategies optimize performance and energy efficiency in edge computing environments?
What are the challenges and opportunities in the integration of edge computing with blockchain technology?