Tajinder Kumar Saini

Tajinder Kumar Saini
Seth Jai Parkash Mukand Lal Institute Of Engineering & Technology | JMIT · IT

Doctor of Philosophy
Ph.D

About

66
Publications
26,596
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
107
Citations
Introduction
Tajinder Kumar Saini currently works at the IT, Seth Jai Parkash Mukand Lal Institute Of Engineering & Technology. Tajinder Kumar does research in Computer Engineering. Their most recent publication is 'An Improved Biometric Fusion System Based on Fingerprint and Face using Optimized Artificial Neural Network.
Additional affiliations
July 2007 - present
Seth Jai Parkash Mukand Lal Institute Of Engineering & Technology
Position
  • Professor (Assistant)
Education
January 2014 - July 2021
Punjab Technical University
Field of study
  • Biometrics

Publications

Publications (66)
Chapter
Full-text available
The selection of methodology used is of great importance in business process modeling. It has a great impact on satisfaction of the customer. The aim of this paper is to fulfill the gaps of the existing model using agile methodology. There also exist several aspects in the business modeling as proposed by various scholars such as market-oriented as...
Research
Full-text available
This Image_ enhancement technique is related to the pre-processing method. The chief goal of image _enhancement is to increase image features like contrast, brightness, and sharpness etc. In this paper, our main motive is to provide an enhanced biometric trait to the biometric recognition system so that the accuracy of the system can be improved. H...
Chapter
This chapter explores the crucial nexus between cloud, fog, and edge computing security concerns and solutions, highlighting their vital role in promoting sustainable growth. Introducing these revolutionary technologies and their importance in contemporary computer designs opens the conversation. The first section of the chapter discusses the overv...
Poster
Full-text available
paper presentation certificate AI4S: Artificial Intelligence : Towards Sustainable Intelligence Pre-Examination and Classification of Brain Tumor Dataset Using Machine Learning
Chapter
The aim of this chapter is to improve accessibility for students with disabilities by extensively examining the growing role of Artificial Intelligence in altering special education. The chapter begins with a review of the challenges faced by students with disabilities and highlights the critical need for individualized and flexible learning strate...
Chapter
Full-text available
Innovative research that is set to transform the aviation sector has been produced due to the integration of the Internet of Things (IoT) and Artificial Intelligence (AI) in hybrid and electric aircraft. Our research shows that real-time monitoring and predictive maintenance enabled by this convergence have considerably improved airline safety. IoT...
Poster
Full-text available
One Week FDP on Microsoft Power BI Tool
Patent
Full-text available
AI BASED NETWORK INTRUSION DETECTION DEVICE
Poster
Full-text available
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING APPLICATIONS (ICCICA-2024) MAY 23-24,2024
Article
Full-text available
Reviewer Certificate for the 2nd IEEE International Conference International Conference on Computer, Electronics and Electrical Engineering and their Applications (IC2E3-2024)
Patent
Full-text available
A cloud-fog environment system for task scheduling based on requests from Internet of Things devices includes one or more Internet of Things devices ; and a cloud server in communication with a plurality of cloud-fog layers and a data center . The server having one or more processors to perform operations to receive, by the fog layer , a plurality...
Chapter
Full-text available
The increasing popularity of large-scale language models, such as ChatGPT, has led to growing worries about their safety, potential security threats, and ethical implications. This chapter thoroughly examines ChatGPT, an AI-powered chatbot that utilizes topic modeling and reinforcement learning to generate natural and coherent answers. Even though...
Patent
Full-text available
The increasing adoption of advanced technologies in healthcare, remote and real-time monitoring of patients has become feasible, enabling continuous health tracking and timely medical interventions. Recognizing the prevalence of heart disease in the community, early-stage diagnosis is crucial for saving lives and promoting a healthy lifestyle. This...
Patent
Full-text available
This invention investigates a novel Three-Layered Trust Architecture that combines an extensive data security policy at the intermediary layer, normatives and procedures at the foundational layer, and the useful implementation of security measures on data, information systems, and networks at the operational layer. Regardless of a user's location o...
Patent
Full-text available
The present disclosure relates to the field of video surveillance and security systems, specifically addressing the challenges associated with the detection and localization of financial frauds in smart 10 surveillance environments. More particularly, the invention involves the application of deep learning techniques for enhancing the accuracy and...
Poster
Full-text available
Fourth International Conference on Information Technology (InCITe) Reviewer Certificate
Patent
The proposed invention, an IoT-based Smart Energy Management System using Distributed Ledger Technology (DLT), represents a groundbreaking advancement in the field of energy management and consumption. In order to fully appreciate the significance and potential impact of this innovation, it is essential to delve into the broader context of energy m...
Article
Full-text available
Cloud computing has drastically changed the delivery and consumption of live streaming content. The designs, challenges, and possible uses of cloud computing for live streaming are studied. A comprehensive overview of the technical and business issues surrounding cloud‐based live streaming is provided, including the benefits of cloud computing, the...
Conference Paper
Full-text available
For its potential use in he althcare, Generative Pre-trained Transformers (GPT) and comparable models have attracted a lot of attention. These models present opportunities fo r therapeutic decision assistance, effective recordkeeping, natural language interactions, and patient educ ation. Their application in healthcare, however, also has some draw...
Article
Full-text available
Due to the characteristics of vehicular ad hoc networks, the increased mobility of nodes and the inconsistency of wireless communication connections pose significant challenges for routing. As a result, researchers find it to be a fascinating topic to study. Furthermore, since these networks are vulnerable to various assaults, providing an authenti...
Patent
Full-text available
Glaucoma is a group of optic neuropathies that have in common a progressive degeneration of retinal ganglion cells (RGCs) and their axons, resulting in a characteristic appearance of the optic disc and visual field loss. Assessment of functional loss in glaucoma has been traditionally made using standard automated perimetry (SAP). However, SAP...
Patent
Full-text available
The novelty resides in the shape and configuration of “MACHINE LEARNING-BASED HUMANOID DEVICE FOR OBJECT IDENTIFICATION” as illustrated. No claim is made by virtue of this registration in respect of any action of the mechanism whatever or in respect of any mode or principle of construction of the article. No claim is made by virtue of the registrat...
Poster
Full-text available
International Conference on Advanced Computing & Communication Technologies Conference Certificate
Poster
Full-text available
Reviewer certificates for the International Conference on Advanced Computing & Communication Technologies
Patent
Full-text available
The Internet of Things (IoT) makes it possible to equip billions of objects with network connectivity to gather and share real-time data to deliver intelligent services. Since CAD risk assessment is expensive for low-income countries, it is important to look for surrogate biomarkers for risk stratification of CVD in DR patients. Due to the common g...
Poster
Full-text available
Contributed as a member of Technical Program Committee of 5th International Conference on Entrepreneurship, Innovation and Leadership (ICEIL) held from 14th – 16th September 2023 at Amity University Uttar Pradesh
Poster
Full-text available
Member of Technical Program Committee of 5th International Conference on Entrepreneurship, Innovation and Leadership (ICEIL) held from 14th – 16th September 2023 at Amity University Uttar Pradesh. The certificate is awarded for his/her significant contribution.
Poster
Full-text available
We found him sincere, hardworking, dedicated and result oriented. He worked well as part of the team during his training. We take this opportunity to thank him and wish him all the best for his future.
Article
Full-text available
Medical images like MRI, CAT scan, and ultrasound play role of back bone in diagnostics. Images generated from various medical diagnostic machines are transmitted through channels before used by clinical experts. Transmission through noise channel sometimes degrades and corrupts the image making it inappropriate for accurate diagnose. The aim of th...
Conference Paper
Full-text available
Cloud computing is a promising new technology that is revolutionizing the old Internet computing paradigm and the entire IT sector. Customers and many firms, such as Apple, Google, Facebook, and Amazon, are increasingly adopting mobile cloud computing technology. Because of the rapid advancements in wireless access technologies, cloud computing is...
Poster
Full-text available
Machine and Deep Learning Approaches For Brain Tumor Identification: Technologies, Applications, and Future Direction
Poster
Full-text available
online two-week Interdisciplinary Refresher Course in “ADVANCED RESEARCH METHODOLOGY” from 23 January - 06 February, 2023
Article
Full-text available
Citation: Tanwar, J.; Kumar, T.; Mohamed, A.A.; Sharma, P.; Lalar, S.; Keshta, I.; Garg, V. Project Management for Cloud Compute and Storage Deployment: B2B Model. Processes 2023, 11, 7. https://doi. Abstract: This paper explains the project's objectives, identifies the key stakeholders, defines the project manager's authority and provides a prelim...
Code
This latex document will help the students and professionals to design their resumes. As a sample, the resume of Mr. Jaswinder Tanwar is created in the file. The code is taken from various sources. The purpose is to help the students and other people.
Article
Full-text available
This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optimization algorithm based on mobile cloud computing to protect data from any assault. Mobile users who use protected mobile cloud computing (Mobi-Cloud) must trust the cloud service provider to keep the data sent from their mobile devices safe when mobile...
Poster
Full-text available
Certificate of participation in FDP on Convolution Neural Network By APPWARS Technologies
Article
Full-text available
Medical images like MRI, CAT scan, and ultrasound play role of back bone in diagnostics. Images generated from various medical diagnostic machines are transmitted through channels before used by clinical experts. Transmission through noise channel sometimes degrades and corrupts the image making it inappropriate for accurate diagnose. The aim of th...
Article
Full-text available
“Uni Uni-modal Biometric systems has been widely implemented for maintaining security and privacy in various applications like mobile phones, banking apps, airport access control, laptop login etc. Due to Advancement in technologies, imposters designed various ways to breach the security and most of the designed biometric applications security can...
Article
Full-text available
In the field of wireless multimedia authentication unimodal biometric model is commonly used but it suffers from spoofing and limited accuracy. The present work proposes the fusion of features of face and fingerprint recognition system as an Improved Biometric Fusion System (IBFS) leads to improvement in performance. Integrating multiple biometric...
Code
This code will Resize the multiple images available in the folder and save the resized images with the same name. This code will be used to resize the face and eye data sets used with Convolution Neural Network.
Poster
Full-text available
AI Master Class Using MATLAB
Poster
Full-text available
One month Matlab Master Class certificate
Poster
Full-text available
Online Workshop on Research Methodology
Article
Full-text available
This research presents an improved biometric fusion system (IBFS) that integrates fingerprint and face as a subsystem. Two authentication systems, namely, Improved Fingerprint Recognition System (IFPRS) and Improved Face Recognition System (IFRS), are introduced respectively. For both, Atmospheric Light Adjustment (ALA) algorithm is used as an imag...
Poster
Full-text available
6 Days Faculty Enablement Program on “InfyTQ based Foundation Program” held online using a webinar platform from 12th to 19th July 2019 conducted by Infosys Limited.
Article
Full-text available
This Image_ enhancement technique is related to the pre-processing method. The chief goal of image _enhancement is to increase image features like contrast, brightness, and sharpness etc. In this paper, our main motive is to provide an enhanced biometric trait to the biometric recognition system so that the accuracy of the system can be improved. H...
Chapter
Full-text available
An extensive amount of system needs reliable schemes for personal recognition to confirm the individual identity demanding the services. The aim of these schemes is the authentication of services that can be executed from the genuine user only. Tremendous growth has been seen from last few years in biometric recognition because of the increased req...

Questions

Questions (98)
Question
How does the orchestration of microservices enhance resource scalability and elasticity in edge computing architectures?
Question
What role does edge computing play in mitigating resource constraints and optimizing performance in resource-constrained devices?
Question
What strategies can be implemented for efficient and adaptive resource provisioning in edge computing for varying workloads?
Question
How does the integration of machine learning algorithms contribute to intelligent resource management in edge computing systems?
Question
How does the orchestration of microservices enhance resource scalability and elasticity in edge computing architectures?
Question
How can dynamic resource allocation strategies optimize performance and energy efficiency in edge computing environments?
Question
What are the challenges and opportunities in the integration of edge computing with blockchain technology?

Network

Cited By