About
36
Publications
6,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
553
Citations
Introduction
Current institution
Publications
Publications (36)
In the real world, most of the collections of data are dynamic in nature, i.e. their size may grow with time. This dynamic nature of the data not only reduces the performance of the classifiers but also demands more optimized models for retaining the performance. Due to this, machine learning models developed in a static environment cannot be deplo...
Hyper-parameter optimization is a crucial task for designing kernel-based machine learning models. Their values can be set by using various optimization algorithms. But a data-dependent objective function makes hyper-parameter’s configuration changes over time in a dynamic environment. A dynamic environment is an environment where training data kee...
Building an Intrusion Detection System (IDS) in non-stationary environment is challenging because, in such an environment, intrusion-related data grow every day. A machine learning model trained in a stationary environment where training data does not change, often fails to retain its performance in real world environment IDS is deployed. This is b...
The multicore systems are designed to give excellent performance by parallelly executing the various tasks on different cores. The execution of tasks requires lots of energy which can be saved if the tasks are scheduled efficiently on cores. In this work, we present an approach for scheduling of memory-intensive tasks in mutli-core systems. The giv...
At present, underwater wireless ad hoc networks (UWAN) are widely used in enormous applications. At the same time, UWAN faced many security issues, like energy leaks. The energy hole will make the network lifetime end soon. However, most existing underwater research has not taken security as serious threat. This article aims to provide a new secure...
Online signature verification is most popular in the field of biometrics and forensics. Due to its popularity and recent demand, the major challenges are to improve its performance and complexity. This paper presents a novel approach for online signature validation based on local weight learning. The different features like, x coordinate, y coordin...
In today’s scenario, data transmission is established through the single or multi-hop relay nodes in Wireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques undergo collusion attacks, increased energy consumption, delay, and reduced network lifetime. To cope with these problems, we propose a Quantum Atom Search Optimization co...
Breast cancer is one of the common reasons for deaths of women over the globe. It has been found that a Computer-Aided Diagnosis (CAD) system can be designed using X-ray mammograms for early-stage detection of breast cancer, which can decrease the death rate to a large extent. This paper work proposes a novel 2-way threshold-based intelligent water...
Breast cancer is as one of the common reasons of deaths in women. To detect this cancer in early stage, a computer-aided diagnosis (CAD) system can be designed using X-ray mammograms, which further can assist the doctors and radiologists in their clinical decisions. This paper work proposes a CAD system which is designed by extracting the local bin...
Non-functional requirements (NFR) play a crucial role in designing safety–critical and control systems. The failure of such systems leads to substantial financial loss, threats to human life, and adverse impact on the environment. Therefore, we develop a framework using a state-space model to quantify reliability in the design phase of the developm...
Business critical systems (BCS) are those systems whose failure may lead to loss of business or damage to reputation in the market. This is often due to the interruption of service caused by the system being unusable. Therefore, non functional requirements (NFRs) such as availability and security play a crucial role during the development of BCS to...
Instrumentation and control system (I&Cs) plays a key role in nuclear power plants (NPP) whose failure may cause the major issue in a form of accidents, hazardous radiations, and environmental loss. That is why importantly ensure the reliability of such system in NPP. In this proposed method, we effectively analyze the reliability of the instrument...
Social media has become a vital platform for individuals, organizations, and governments worldwide to communicate and express their views. During the coronavirus disease 2019 (COVID-19) pandemic, social media sites play a crucial role in people communicating, sharing, and expressing their perceptions on various topics. Analyzing such textual data c...
The Emergency Diesel Generator (EDG) is a critical and essential part of the Nuclear Power Plant (NPP). Due to past catastrophic disasters, critical systems of NPP like EDG are designed to meet high dependability requirements. Therefore, we propose a framework for the dynamic reliability assessment using the Fault Tree and the Dynamic Bayesian Netw...
Breast cancer is one of the common reasons for deaths of women over the globe. It has been found that a Computer- Aided Diagnosis (CAD) system can be designed using X-ray mammograms for early-stage detection of breast cancer, which can decrease the death rate to a large extend. This paper work proposes a novel 2-way threshold based Intelligent wate...
Since any risk in the safety‐critical systems (SCSs) might lead to a terrible disaster, the utmost quality attribute of these systems is safety. Researchers are putting their efforts to ensure the safety of such systems. This paper summarizes the state‐of‐the‐art in the area of the safety attribute of such critical systems. The in depth literature...
With the rapid increase in the use of the Internet, sentiment analysis has become one of the most popular fields of natural language processing (NLP). Using sentiment analysis, the implied emotion in the text can be mined effectively for different occasions. People are using social media to receive and communicate different types of information on...
Today, numerous reliability prediction methods exist for electronic systems. A detailed literature survey is conducted to investigate the various techniques/models to ensure electronic components/system's reliability. Based on such a method's merits and limitations, we recommend using the hybrid model to predict an electronic system's reliability p...
Non-functional requirement analysis is the most critical factor for safety-critical system construction as it reduces the risk of catastrophic loss of assets by taking measurable actions in the design phase. Reliability and performance analysis are the two main components of non-functional requirement analysis. In this paper, a reliability analysis...
Reducing energy consumption in processors has become a critical issue in cluster systems. The dynamic voltage and frequency scaling (DVFS) is one of the effective techniques to minimize energy consumption in processors when executing parallel applications. These applications may consist of many interrelated tasks that may be computed when their pre...
Internet of things (IoT) is one of the emerging paradigms in the current era that has attracted many researchers due to its widespread applications. Due to the open nature of the device accessibility and heterogeneity, a rapid increase in connected devices leads to several vulnerabilities and threats in the IoT devices. Hence, security is one of th...
Unified Modeling Language (UML) has been frequently used as one of the most powerful object-oriented graphical modeling tool for designing and modeling a safety-critical and control system since past decades. UML can capture all the system requirements, and the developed model is well understood by all the stakeholders. However, UML model has some...
Probabilistic Safety Assessment approach has been successfully applied in engineering, economics, computer science, and statistics to resolve a wide range of safety-related problems. However, using the Probabilistic Safety Assessment for quantifying the safety of a safety-critical system is a challenging task in the Safety Engineering community. Th...
Using Probabilistic Reliability analysis for Quantifying Reliability of a system is already a common practice in the Reliability Engineering community. This method plays an essential role in analyzing the Reliability of nuclear plants and their various components. In Nuclear Power Plants Reactor Core Cooling System is a component of prime importanc...
In the past several decades, significant attention has been devoted to the quality assessment of safety-critical (SC) and control systems from many perspectives such as its reliability, safety, and performance. Researchers are continuing to put their efforts to ensure these dependability attributes. This study summarises the state of the art in the...
The state space models has been successfully applied in engineering, statistics, computer science and economics to solve a broad range of dynamical systems problems; like safety analysis, reliability analysis, performability analysis, etc. However, embedding the complete and accurate system requirements in such models is quite challenging. Analyzin...
Any risk in safety-critical or control applications may lead to catastrophic disaster; hence, safety is a primary concern for such applications. The impact of risk varies from minor inconvenience and cost to personal injury, significant economic loss, and death. Therefore, a safety assessment process should be an inherent part of the system develop...
State-space modeling is useful for prognostics of safety-critical systems. However, building such a model that embeds all the system requirements is a challenge. Furthermore, it requires expertise and hence isn't easily understood by all the stakeholders. UML can handle these challenges. A proposed approach converts a UML model into a state-space m...