Publications

1. (2024). PUDT: Plummeting uncertainties in digital twins for aerospace applications using deep learning algorithms. Future Generation Computer Systems.

Cite DOI URL

2. (2024). SL-RI: Integration of supervised learning in robots for industry 5.0 automated application monitoring. Measurement: Sensors.

Cite DOI URL

3. (2024). SCMC: Smart city measurement and control process for data security with data mining algorithms. Measurement: Sensors.

Cite DOI URL

4. (2024). A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs). International Journal of Information Security.

Cite DOI URL

5. (2024). Application of Improved Support Vector Machine for Pulmonary Syndrome Exposure with Computer Vision Measures. Current Bioinformatics.

Cite URL

6. (2024). An improved GBSO-TAENN-based EEG signal classification model for epileptic seizure detection. Scientific Reports.

Cite DOI URL

7. (2024). A novel IoT intrusion detection framework using Decisive Red Fox optimization and descriptive back propagated radial basis function models. Scientific Reports.

Cite DOI URL

8. (2023). White shark optimizer with optimal deep learning based effective unmanned aerial vehicles communication and scene classification. Scientific Reports.

Cite DOI URL

9. (2023). Federated learning optimization: A computational blockchain process with offloading analysis to enhance security. Egyptian Informatics Journal.

Cite DOI URL

10. (2023). Diagnostic structure of visual robotic inundated systems with fuzzy clustering membership correlation. PeerJ Computer Science.

Cite DOI URL

11. (2023). Sliding principal component and dynamic reward reinforcement learning based IIoT attack detection. Scientific Reports.

Cite DOI URL

12. (2023). Fabrication and investigation of agricultural monitoring system with IoT & AI. SN Applied Sciences.

Cite DOI URL

13. (2023). QoS enhancement in wireless ad hoc networks using resource commutable clustering and scheduling. Wireless Networks.

Cite DOI URL

14. (2023). Optimization of IoT circuit for flexible optical network system with high speed utilization. Optical and Quantum Electronics.

Cite DOI URL

15. (2023). Obstacles Uncovering System for Slender Pathways Using Unmanned Aerial Vehicles with Automatic Image Localization Technique. International Journal of Computational Intelligence Systems.

Cite DOI URL

16. (2023). Development of edge computing and classification using The Internet of Things with incremental learning for object detection. Internet of Things.

Cite DOI URL

17. (2023). TasLA: An innovative Tasmanian and Lichtenberg optimized attention deep convolution based data fusion model for IoMT smart healthcare. Alexandria Engineering Journal.

Cite DOI URL

18. (2023). Resistance–capacitance optimizer: a physics-inspired population-based algorithm for numerical and industrial engineering computation problems. Scientific Reports.

Cite DOI URL

19. (2023). Attention-based bidirectional-long short-term memory for abnormal human activity detection. Scientific Reports.

Cite DOI URL

20. (2023). A conjugate self-organizing migration (CSOM) and reconciliate multi-agent Markov learning (RMML) based cyborg intelligence mechanism for smart city security. Scientific Reports.

Cite DOI URL

21. (2023). Secured data transmissions in corporeal unmanned device to device using machine learning algorithm. Physical Communication.

Cite DOI URL

22. (2023). Future transportation computing model with trifold algorithm for real-time multipath networks. Journal of Autonomous Intelligence.

Cite DOI URL

23. (2023). Artificial Neural Networks for Data Processing: A Case Study of Image Classification. Advanced Mathematical Applications in Data Science.

Cite DOI URL

24. (2023). Improved Security for Multimedia Data Visualization Using Hierarchical Clustering Algorithm. ACM Transactions on Multimedia Computing, Communications, and Applications.

Cite DOI URL

25. (2023). Pneumonia detection with QCSA network on chest X-ray. Scientific Reports.

Cite DOI URL

26. (2023). Disaster management ontology- an ontological approach to disaster management automation. Scientific Reports.

Cite DOI URL

27. (2023). An archetypal determination of mobile cloud computing for emergency applications using decision tree algorithm. Journal of Cloud Computing.

Cite DOI URL

28. (2023). A quantum trust and consultative transaction-based blockchain cybersecurity model for healthcare systems. Scientific Reports.

Cite DOI URL

29. (2023). Implementation of Internet of Things With Blockchain Using Machine Learning Algorithm: Enhancement of Security With Blockchain. Advances in Logistics, Operations, and Management Science.

Cite DOI URL

30. (2023). Efficient data transmission on wireless communication through a privacy-enhanced blockchain process. PeerJ Computer Science.

Cite DOI URL

31. (2023). Connotation of fuzzy logic system in Underwater communication systems for navy applications with data indulgence route. Sustainable Computing: Informatics and Systems.

Cite DOI URL

32. (2023). Preserving Resource Handiness and Exigency-Based Migration Algorithm (PRH-EM) for Energy Efficient Federated Cloud Management Systems. Mobile Information Systems.

Cite DOI URL

33. (2023). Physical Stint Virtual Representation of Biomedical Signals With Wireless Sensors Using Swarm Intelligence Optimization Algorithm. IEEE Sensors Journal.

Cite DOI URL

34. (2023). SCBC: Smart city monitoring with blockchain using Internet of Things for and neuro fuzzy procedures. Mathematical Biosciences and Engineering.

Cite DOI URL

35. (2023). RLIS: Resource Limited Improved Security Beyond Fifth-Generation Networks Using Deep Learning Algorithms. IEEE Open Journal of the Communications Society.

Cite DOI URL

36. (2023). Resource-Efficient Synthetic Data Generation for Performance Evaluation in Mobile Edge Computing Over 5G Networks. IEEE Open Journal of the Communications Society.

Cite DOI URL

37. (2023). Prognosis of urban environs using time series analysis for preventing overexploitation using artificial intelligence. International Journal of Data Analysis Techniques and Strategies.

Cite DOI URL

38. (2023). MSI-A: An Energy Efficient Approximated Cache Coherence Protocol. IEEE Access.

Cite DOI URL

39. (2023). Mathematical approach of fiber optics for renewable energy sources using general adversarial networks. Frontiers in Ecology and Evolution.

Cite URL

40. (2023). IoT based arrhythmia classification using the enhanced hunt optimization-based deep learning. Expert Systems.

Cite DOI URL

41. (2023). Intelligent Intrusion Detection Algorithm Based on Multi-Attack for Edge-Assisted Internet of Things. Security and Risk Analysis for Intelligent Edge Computing.

Cite DOI URL

42. (2023). Improved Transportation Model with Internet of Things Using Artificial Intelligence Algorithm. Computers, Materials & Continua.

Cite DOI URL

43. (2023). From Hype to Reality: Unveiling the Promises, Challenges and Opportunities of Blockchain in Supply Chain Systems. Sustainability.

Cite DOI URL

44. (2023). Distinctive Measurement Scheme for Security and Privacy in Internet of Things Applications Using Machine Learning Algorithms. Electronics.

Cite DOI URL

45. (2023). Certain investigation on optimization technique for sensor nodes in the bio medical recording system. Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology.

Cite DOI URL

46. (2023). An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems. Journal of Cloud Computing (Heidelberg, Germany).

Cite DOI

47. (2023). Adaptive neuro-fuzzy inference system and particle swarm optimization: A modern paradigm for securing VANETs. IET Communications.

Cite DOI URL

48. (2023). A security model for smart grid SCADA systems using stochastic neural network. IET Generation, Transmission & Distribution.

Cite DOI URL

49. (2023). A Novel Trust Evaluation and Reputation Data Management Based Security System Model for Mobile Edge Computing Network. Security and Risk Analysis for Intelligent Edge Computing.

Cite DOI URL

50. (2023). A comparative recognition research on excretory organism in medical applications using artificial neural networks. Frontiers in Bioengineering and Biotechnology.

Cite URL

51. (2022). Towards improving e-commerce customer review analysis for sentiment detection. Scientific Reports.

Cite DOI URL

52. (2022). Grow of Artificial Intelligence to Challenge Security in IoT Application. Wireless Personal Communications.

Cite DOI URL

53. (2022). An optimization-based machine learning technique for smart home security using 5G. Computers and Electrical Engineering.

Cite DOI URL

54. (2022). Reconnoitering the significance of security using multiple cloud environments for conveyance applications with blowfish algorithm. Journal of Cloud Computing.

Cite DOI URL

55. (2022). Mathematical Framework for Wearable Devices in the Internet of Things Using Deep Learning. Diagnostics.

Cite DOI URL

56. (2022). Exploration of Despair Eccentricities Based on Scale Metrics with Feature Sampling Using a Deep Learning Algorithm. Diagnostics.

Cite DOI URL

57. (2022). Empirical Compression Features of Mobile Computing and Data Applications Using Deep Neural Networks. Security and Communication Networks.

Cite DOI URL

58. (2022). Web User Profile Generation and Discovery Analysis using LSTM Architecture. 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS).

Cite DOI URL

59. (2022). Prophetic Energy Assessment with Smart Implements in Hydroelectricity Entities Using Artificial Intelligence Algorithm. International Transactions on Electrical Energy Systems.

Cite DOI URL

60. (2022). Malware Detection Classification using Recurrent Neural Network. 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS).

Cite DOI URL

61. (2022). Hyper spectral image classifications for monitoring harvests in agriculture using fly optimization algorithm. Computers and Electrical Engineering.

Cite DOI URL

62. (2022). Detection of superfluous in channels using data fusion with wireless sensors and fuzzy interface algorithm. Measurement: Sensors.

Cite DOI URL

63. (2022). Content and Popularity-Based Music Recommendation System. International Journal of Information System Modeling and Design (IJISMD).

Cite DOI URL

64. (2022). CNN based Prediction Analysis for Web Phishing Prevention. 2022 International Conference on Edge Computing and Applications (ICECAA).

Cite DOI URL

65. (2022). Integrating Industrial Appliances for Security Enhancement in Data Point Using SCADA Networks with Learning Algorithm. International Transactions on Electrical Energy Systems.

Cite DOI URL

66. (2022). Environmental Fault Diagnosis of Solar Panels Using Solar Thermal Images in Multiple Convolutional Neural Networks. International Transactions on Electrical Energy Systems.

Cite DOI URL

67. (2022). Connotation of Unconventional Drones for Agricultural Applications with Node Arrangements Using Neural Networks. 2022 IEEE 96th Vehicular Technology Conference (VTC2022-Fall).

Cite DOI URL

68. (2022). Optimal Feature Selection Based on Evolutionary Algorithm for Intrusion Detection. SN Computer Science.

Cite DOI URL

69. (2022). FogDedupe: A Fog-Centric Deduplication Approach Using Multi-Key Homomorphic Encryption Technique. Journal of Sensors.

Cite DOI URL

70. (2022). Construal Attacks on Wireless Data Storage Applications and Unraveling Using Machine Learning Algorithm. Journal of Sensors.

Cite DOI URL

71. (2022). Machine Learning Technique for Precision Agriculture Applications in 5G-Based Internet of Things. Wireless Communications and Mobile Computing.

Cite DOI URL

72. (2022). Healthcare Data Security Using IoT Sensors Based on Random Hashing Mechanism. Journal of Sensors.

Cite DOI URL

73. (2022). LSTM-Based RNN Framework to Remove Motion Artifacts in Dynamic Multicontrast MR Images with Registration Model. Wireless Communications and Mobile Computing.

Cite DOI URL

74. (2022). An Efficient Mechanism for Deep Web Data Extraction Based on Tree-Structured Web Pattern Matching. Wireless Communications and Mobile Computing.

Cite DOI URL

75. (2022). Circuit Manufacturing Defect Detection Using VGG16 Convolutional Neural Networks. Wireless Communications and Mobile Computing.

Cite DOI URL

76. (2022). A machine learning algorithm for classification of mental tasks. Computers and Electrical Engineering.

Cite DOI URL

77. (2022). Mechanism of Internet of Things (IoT) Integrated with Radio Frequency Identification (RFID) Technology for Healthcare System. Mathematical Problems in Engineering.

Cite DOI URL

78. (2022). LSTM based decision support system for swing trading in stock market. Knowledge-Based Systems.

Cite DOI URL

79. (2022). Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm. International Journal of Web-Based Learning and Teaching Technologies (IJWLTT).

Cite DOI URL

80. (2022). Deep Learning Approaches for Prognosis of Automated Skin Disease. Life.

Cite DOI URL

81. (2022). Ensemble Learning by High-Dimensional Acoustic Features for Emotion Recognition from Speech Audio Signal. Security and Communication Networks.

Cite DOI URL

82. (2022). Three-phase service level agreements and trust management model for monitoring and managing the services by trusted cloud broker. IET Communications.

Cite DOI URL

83. (2022). Probabilistic Framework Allocation on Underwater Vehicular Systems Using Hydrophone Sensor Networks. Water.

Cite DOI URL

84. (2022). Prevention of Cyber Security with the Internet of Things Using Particle Swarm Optimization. Sensors.

Cite DOI URL

85. (2022). Perception Exploration on Robustness Syndromes With Pre-processing Entities Using Machine Learning Algorithm. Frontiers in Public Health.

Cite URL

86. (2022). Interaction of Secure Cloud Network and Crowd Computing for Smart City Data Obfuscation. Sensors.

Cite DOI URL

87. (2022). Improved Handover Authentication in Fifth-Generation Communication Networks Using Fuzzy Evolutionary Optimisation with Nanocore Elements in Mobile Healthcare Applications. Journal of Healthcare Engineering.

Cite DOI URL

88. (2022). Design of Soccer League Optimization Based Hybrid Controller for Solar-Battery Integrated UPQC. IEEE Access.

Cite DOI URL

89. (2022). Deep Conviction Systems for Biomedical Applications Using Intuiting Procedures With Cross Point Approach. Frontiers in Public Health.

Cite URL

90. (2022). Classification of Normal and Anomalous Activities in a Network by Cascading C4.5 Decision Tree and K-Means Clustering Algorithms. Social Network Analysis.

Cite DOI URL

91. (2022). Cervical Cancer Diagnosis Using Intelligent Living Behavior of Artificial Jellyfish Optimized With Artificial Neural Network. IEEE Access.

Cite DOI URL

92. (2022). Biomedical Signals for Healthcare Using Hadoop Infrastructure with Artificial Intelligence and Fuzzy Logic Interpretation. Applied Sciences.

Cite DOI URL

93. (2022). An Intelligent Security Framework Based on Collaborative Mutual Authentication Model for Smart City Networks. IEEE Access.

Cite DOI URL

94. (2022). An Innovative Perceptual Pigeon Galvanized Optimization (PPGO) Based Likelihood Naïve Bayes (LNB) Classification Approach for Network Intrusion Detection System. IEEE Access.

Cite DOI URL

95. (2022). An Appraisal of Cyber-Attacks and Countermeasures Using Machine Learning Algorithms. Artificial Intelligence and Data Science.

Cite DOI

96. (2022). A Radical Safety Measure for Identifying Environmental Changes Using Machine Learning Algorithms. Electronics.

Cite DOI URL

97. (2022). A Proficient ZESO-DRKFC Model for Smart Grid SCADA Security. Electronics.

Cite DOI URL

98. (2022). A Comprehensive Study on Eucalyptus, Open Stack and Cloud Stack. Artificial Intelligence and Data Science.

Cite DOI

99. (2022). A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security. Energies.

Cite DOI URL

100. (2022). “Palisade”—A Student Friendly Social Media Website. Intelligent Computing and Networking.

Cite DOI URL

101. (2021). Impact of Big Data Analysis on Nanosensors for Applied Sciences Using Neural Networks. Journal of Nanomaterials.

Cite DOI URL

102. (2021). Prediction of COVID-19 Wide Spread in India using Time Series Forecasting Techniques.

Cite DOI URL

103. (2021). Integrated Machine Learning Model for an URL Phishing Detection. International Journal of Grid and Distributed Computing.

Cite URL

104. (2021). A NOVEL METHOD TO DETECT ADVERSARIES USING MSOM ALGORITHM'S LONGITUDINAL CONJECTURE MODEL IN SCADA NETWORK.

PDF Cite

105. (2021). Predicting Epidemic Outbreaks Using IOT, Artificial Intelligence and Cloud. The Fusion of Internet of Things, Artificial Intelligence, and Cloud Computing in Health Care.

Cite DOI URL

106. (2021). Multiple Face Detection Using Haar - AdaBoosting, LBP-AdaBoosting and Neural Networks. IOP Conference Series: Materials Science and Engineering.

Cite DOI URL

107. (2021). Integration of cloud with AI to predict crop diseases.

Cite DOI URL

108. (2021). IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network. Architectural Wireless Networks Solutions and Security Issues.

Cite DOI URL

109. (2021). Handling tactful data in cloud using PKG encryption technique.

Cite DOI URL

110. (2021). Detecting impersonators in examination halls using AI.

Cite DOI URL

111. (2021). Data Security in Cloud Computing Using Abe-Based Access Control. Architectural Wireless Networks Solutions and Security Issues.

Cite DOI URL

112. (2021). An Enriched RPCO-BCNN Mechanisms for Attack Detection and Classification in SCADA Systems. IEEE Access.

Cite DOI URL

113. (2021). An Authentication Model with High Security for Cloud Database. Architectural Wireless Networks Solutions and Security Issues.

Cite DOI URL

114. (2020). A novel method to detect adversaries using MSOM algorithm’s longitudinal conjecture model in SCADA network. Solid State Technology.

Cite URL

115. (2020). An Appraisal over Intrusion Detection Systems in Cloud Computing Security Attacks. 2020 2nd International Conference on Innovative Mechanisms for Industry Applications (ICIMIA).

Cite DOI URL

116. (2020). Real Time Analysis of Air Pollution Level in Metropolitian Cities by Adopting Cloud Computing based Pollution Control Monitoring System using Nano Sensors. Solid State Technology.

Cite URL

117. (2020). SECURITY APPRAISAL CONDUCTED ON REAL TIME SCADA DATA SET USING CYBER ANALYTIC TOOLS. Solid State Technology.

Cite URL

118. (2020). Mining of intrusion attack in SCADA network using clustering and genetically seeded flora-based optimal classification algorithm. IET Information Security.

Cite DOI URL

119. (2018). OPTICAL 3D PUZZLE TOY MICROSCOPE APPARATUS.

Cite

120. (2018). ACCESS POINT SELECTION FOR FAIR LOAD BALANCING IN WIRELESS LOCAL AREA NETWORKS.

Cite

122. (2018). A Way to Cyberthon. Shanlax Publications.

Cite URL

123. (2017). An enhanced optimization based algorithm for intrusion detection in SCADA network. Computers & Security.

Cite DOI URL

124. (2017). Comparison of PRC based RVM classification versus SVM classification in SCADA network. Journal of Electrical Engineering.

Cite URL

125. (2016). A novel IDS technique to detect DDoS and sniffers in smart grid. 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).

Cite DOI URL

126. (2016). A NEW PROBABILISTIC RELEVANCY CLASSIFICATION (PRC) BASED INTRUSION DETECTION SYSTEM (IDS) FOR SCADA NETWORK. Journal of Electrical Engineering.

Cite URL