About
20
Publications
14,207
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
223
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (20)
Solar energy, a renewable resource, is essential for the efficiency of solar photovoltaic (PV) panels. However, meteorological factors, such as solar irradiation, weather patterns, precipitation, and overall climate conditions, pose challenges to the seamless integration of energy production into the power grid. Accurate prediction of PV system pow...
Model optimization is a problem of great concern and challenge for developing an image classification model. In image classification, selecting the appropriate hyperparameters can substantially boost the model’s ability to learn intricate patterns and features from complex image data. Hyperparameter optimization helps to prevent overfitting by find...
Pneumonia is a potentially life-threatening infectious disease that is typically diagnosed through physical examinations and diagnostic imaging techniques such as chest X-rays, ultrasounds, or lung biopsies. Accurate diagnosis is crucial as wrong diagnosis, inadequate treatment or lack of treatment can cause serious consequences for patients and ma...
Internet usage is increasing day by day all over the world and as a result, technology is also developing to make daily life appliances as smart as possible. Millions of devices are connected using IoT technology, and the vulnerabilities of these devices are still exploitable by attackers. Having access to IoT devices through a Bot Master allows th...
An Internet of Things (IoT) network is prone to many ways of threatening individuals. IoT sensors are lightweight, lack complicated security protocols, and face threats to privacy and confidentiality. Hackers can attack the IoT network and access personal information and confidential data for blackmailing, and negatively manipulate data. This study...
Twitter has become the foremost standard of social media in today’s world. Over 335 million users are online monthly, and near about 80% are accessing it through their mobiles. Further, Twitter is now supporting 35+ which enhance its usage too much. It facilitates people having different languages. Near about 21% of the total users are from US and...
The biggest challenge in Electronic Commerce (E-Commerce) is understanding the demand of the market and customer perception regarding the products of online stores. Online user evaluations are faster than a direct poll for obtaining customers' perceptions. To predict the quality of service provided, sentiment analysis methodology is used, which ide...
The internet provides a very vast amount of sources of news and the user has to search for desirable news by spending a lot of time because the user always prefers their related interest, desirable and informative news. The clustering of the news article having a great impact on the preferences of the user. The unsupervised learning techniques such...
Elderly activity detection is one of the major issues in modern civilizations. Due to the increase in workload, people are not able to watch over their elderly ones and leave them into old homes for care and cure. In some countries, most elderly people like to live independently instead of living in old homes, which may leave them alone and helples...
Twitter has become the most popular social media in today’s world. More than 284 million users are online monthly, and 80% user accesses their twitter account through mobile. A tweet is limited to 140 characters, so it contains concise information about particulars. Due to its popularity and usage, near about 500 million tweets are sent per day tha...
Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible th...
. Every year, approximately one million patent documents are issued with unique patent number or symbol. In order to find the relevant patent document, several users query the IPC documents using IPC symbols. So, there is a need of automatic classification and ranking of patent documents w.r.t. user query. Automatic classification is only possible...
A key scheduling algorithm is the mechanism that generates and schedules all session-keys for the encryption and decryption process. The key space of conventional key schedule algorithm using the 2D hybrid cubes is not enough to resist attacks and could easily be exploited. In this regard, this research proposed a new Key Schedule Algorithm based o...
It is important to predict a time series because many problems that are related to prediction such as health prediction problem, climate change prediction problem and weather prediction problem include a time component. To solve the time series prediction problem various techniques have been developed over many years to enhance the accuracy of fore...
Forecasting natural occurring phenomena has been addressed and analyzed in many domains of science and gets more attention because of its vast range of applications. Traditional time series forecasting tools have some limitations like slow training process, less efficient training methods that effect on performance. Higher Order Neural Network (HON...
Prediction of time series grabs received much attention because of its effect on the vast range of real life applications. This paper presents a survey of time series applications using Higher Order Neural Network (HONN) model. The basic motivation behind using HONN is the ability to expand the input space, to solve complex problems it becomes more...
Cloud computing exhibits a remarkable potential to offer cost-effective and more flexible services on-demand to the customers over the network. It dynamically increases the capabilities of the organization without training new people, investment in new infrastructure or licensing new software. Cloud computing has grown dramatically in the last few...