360 results on '"Parma Nand"'
Search Results
102. Object Recognition in a Cluttered Scene
- Author
-
Mandeep Kaur, Nitin Rakesh, Rashmee Shrestha, and Parma Nand
- Subjects
Computer science ,business.industry ,Cognitive neuroscience of visual object recognition ,Computer vision ,Artificial intelligence ,business - Published
- 2021
103. Deep Learning Methods for Chronic Myeloid Leukaemia Diagnosis
- Author
-
Parma Nand, Tanya Arora, and Mandeep Kaur
- Subjects
Computer science ,Cancer ,Disease ,Chronic myeloid leukaemia ,medicine.disease ,Blood cancer ,chemistry.chemical_compound ,medicine.anatomical_structure ,chemistry ,hemic and lymphatic diseases ,Immunology ,medicine ,Platelet ,Bone marrow ,Toxicant - Abstract
Chronic myeloid leukaemia (CML) is considered as the cancer of the blood or cancer of the bone marrow. Blood consists of three different cells, one that helps to fight diseases and some infections called white blood cells (WBCs), another that can carry oxygen to the tissues of the body called red blood cells (RBCs), and, last but not the least, those which help the formation of blood clots to stop bleeding termed as platelets. Cancer is observed as a disease ‘diversified in character’, which consists of many different subtypes. Blood cancer is the most common toxicant for the human body.
- Published
- 2021
104. A Comparative Study on Energy-Efficient And Non Energy-Efficient Routing Protocols In Underwater Sensor Networks
- Author
-
Karan Kumar Singh, Samiksha Kumar, Parma Nand, and Sasmita Mishra
- Published
- 2021
105. Facial Expression Recognition System
- Author
-
Nitin Rakesh, Parma Nand, Rahisha Pokharel, and Mandeep Kaur
- Subjects
Cognitive science ,Facial expression ,Mode (computer interface) ,Feeling ,media_common.quotation_subject ,Image processing ,Psychology ,Convolutional neural network ,Object (philosophy) ,Disgust ,Field (computer science) ,media_common - Abstract
A significant subject in the field of computer vision and artificial intelligence is outward appearance acknowledgment. There are two mode of correspondence one is verbal, and another is non-verbal [Xiaoxi, M., Weisi, L.: Facial emotion recognition. In: IEEE 2nd International Conference on Signal and Image Processing (2017)]. Among verbal and non-verbal methods for correspondence, outward appearance is non-verbal methods for correspondence. Outward appearance assumes a crucial job which encourages human to communicate their feelings, express their emotions, psychological wellness, viewpoint, and so on [Kaur, M., Vashisht, R.: Comparative study of facial expression recognition techniques. Int. J. Comput. Appl. (2011)]. Understanding gets simpler when human and computer interact with each other if computer can react to non-verbal correspondence of human which is only feelings communicated. In this paper, a calculation is introduced for object discovery dependent on Viola–Jones algorithm. In this paper, there are introduced the consequences of acknowledgment of seven emotion states (neutral, happy, sad, fear, disgust, fear, surprised) in view of outward appearances. The grouping of the highlights was performed utilizing managed learning strategy, i.e., convolutional neural network (CNN).
- Published
- 2021
106. Oxidative stress and antioxidant responses of mulberry (Morus alba) plants subjected to deficiency and excess of manganese
- Author
-
Tewari, Rajesh Kumar, Kumar, Praveen, and Sharma, Parma Nand
- Published
- 2013
- Full Text
- View/download PDF
107. Deep Learning for Healthcare Services
- Author
-
Parma Nand, Vishal Jain, Dac-Nhuong Le
- Published
- 2009
108. IoT-Based Voice-Controlled Automation
- Author
-
Parma Nand, Neha Tyagi, Mandeep Kaur, Shreya Srivastava, Anjali Singh, Kartik Kumar, Shahid Imran, and Nitin Rakesh
- Subjects
business.industry ,Computer science ,Embedded system ,business ,Internet of Things ,Automation - Published
- 2021
109. Advances in pulmonary drug delivery targeting microbial biofilms in respiratory diseases
- Author
-
Niraj Kumar Jha, Dhruv Kumar, Gaurav Gupta, Vineet Kumar Goswami, Susan Hawthorne, Kajal Dahiya, Sibi Raj, Yiota Gregoriou, Dinesh Kumar Chellappan, Sally A. El-Zahaby, Harish Dureja, Shreesh Ojha, Sachin Kumar Singh, Saurabh Kumar Jha, Kamal Dua, Ankur Sharma, R. C. Srivastava, Parma Nand, and Samuel Girgis
- Subjects
medicine.medical_specialty ,Biomedical Engineering ,Medicine (miscellaneous) ,Bioengineering ,Pulmonary infection ,Development ,Drug Delivery Systems ,Effective treatment ,Medicine ,General Materials Science ,Respiratory system ,0306 Physical Chemistry (incl. Structural), 1004 Medical Biotechnology, 1007 Nanotechnology ,Nanoscience & Nanotechnology ,Intensive care medicine ,Lung ,Microbial Biofilms ,business.industry ,Biofilm ,biochemical phenomena, metabolism, and nutrition ,Anti-Bacterial Agents ,Pharmaceutical Preparations ,Treatment modality ,Biofilms ,Drug delivery ,Nanoparticles ,Nanocarriers ,business - Abstract
The increasing burden of respiratory diseases caused by microbial infections poses an immense threat to global health. This review focuses on the various types of biofilms that affect the respiratory system and cause pulmonary infections, specifically bacterial biofilms. The article also sheds light on the current strategies employed for the treatment of such pulmonary infection-causing biofilms. The potential of nanocarriers as an effective treatment modality for pulmonary infections is discussed, along with the challenges faced during treatment and the measures that may be implemented to overcome these. Understanding the primary approaches of treatment against biofilm infection and applications of drug-delivery systems that employ nanoparticle-based approaches in the disruption of biofilms are of utmost interest which may guide scientists to explore the vistas of biofilm research while determining suitable treatment modalities for pulmonary respiratory infections.
- Published
- 2021
110. Fog Assisted-IoT Based Health Monitoring System
- Author
-
Jyotsna and Parma Nand
- Subjects
Fog computing ,Computer science ,business.industry ,Quality of service ,Distributed computing ,Response time ,Cloud computing ,Monitoring system ,business ,Internet of Things ,Cloud server - Abstract
Cloud computing, from a very long time has played an integral part in processing, analysing and managing large quantum of data related to heath care system. Healthcare IoT devices are responsible for generation, processing and integration of large volumes of data which is then stored in cloud servers. Nevertheless, this results in huge compromise by delay in response time, which is due to centralized location of cloud servers storing related data. This lag in response time could prove vital while dealing with critical patients like those presenting with cardiac arrest or myocardial infarction and other quality of service (QoS), thus proving the inefficacy of cloud computing in meeting such intense demand. In order to avoid such delay, it necessitates introduction of a novel technology such as Fog computing. In the present publication, we propose, fog computing architecture and the rationale in switching from cloud computing to fog computing for prompt response time.
- Published
- 2021
111. Financial Fraud Detection in Plastic Payment Cards using Isolation Forest Algorithm
- Author
-
Sonu Kumar Mahto, Madhav Singh Chahar, Parma Nand, Ankaj Kumar, Gouri Sankar Mishra, and Blue Eyes Intelligence Engineering and Sciences Publication(BEIESP)
- Subjects
General Computer Science ,Isolation (health care) ,Computer science ,Computer security ,computer.software_genre ,Payment card ,ComputingMethodologies_PATTERNRECOGNITION ,Mechanics of Materials ,100.1/ijitee.G88730510721 ,In This Research We Have Proposed A New Methodology By Using The Isolation Forest Algorithm And Local Outlier Detection Algorithm To Detect The Financial Fraud ,2278-3075 ,Electrical and Electronic Engineering ,Financial fraud ,computer ,Civil and Structural Engineering - Abstract
The need for technology has always found space in Financial Transaction as the number of fraud in financial transactions increases day by day. In this research we have proposed a new methodology by using the isolation forest algorithm and local outlier detection algorithm to detect the financial fraud. A standard data set is used in experimentation to classify a transaction occurred is a fraudulent or not. We have used neural networks and machine learning for classification. We have focused on the deployment of anomaly detection algorithms that is Local Outlier Factor and Isolation Forest algorithm (IFA) on financial fraud transactions data.
- Published
- 2021
- Full Text
- View/download PDF
112. Complex redo surgery to treat a large thymoma invading the right atrium
- Author
-
Peter Alison, Parma Nand, and Navneet Singh
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,Lung ,business.industry ,030204 cardiovascular system & hematology ,medicine.disease ,Cardiac surgery ,law.invention ,Surgery ,03 medical and health sciences ,0302 clinical medicine ,medicine.anatomical_structure ,030228 respiratory system ,Aortic valve replacement ,Great vessels ,Superior vena cava ,law ,Circulatory system ,cardiovascular system ,medicine ,Cardiopulmonary bypass ,Pericardium ,Cardiology and Cardiovascular Medicine ,business - Abstract
BACKGROUND AND AIM Anterior mediastinal masses which invade the great vessels and heart are rare. We report a case of a 76-year-old male presenting with a large invasive anterior mediastinal mass following recent cardiac surgery (coronary artery bypass grafting and aortic valve replacement via sternotomy). MATERIALS AND METHODS This is a case report study with clinical patient information retrieved from hospital electronic records. RESULTS Computed tomography scanning revealed a large heterogeneous 6.5 × 7.2 × 7.0 cm right anterior mediastinal mass. The mass directly propagated via the left innominate vein into the superior vena cava (SVC) and proximal right atrium. The patient underwent redo sternotomy with the aid of cardiopulmonary bypass and hypothermic circulatory arrest to remove the mass. The mass was sitting in the right pleural cavity and was adherent to the right lung and pericardium. Tumor material was removed from the right atrium, SVC and left innominate vein. The mass was excised en bloc along with a portion of the upper lobe of the right lung. DISCUSSION AND CONCLUSION Histology of the mass revealed the diagnosis of invasive type A thymoma with transvenous and transcardiac invasion. We advocate for surgeons to be aggressive in their operative resection of such tumours to ensure the best prognostic outlook for the patient.
- Published
- 2020
113. An effective antioxidant defense provides protection against zinc deficiency‐induced oxidative stress in Zn‐efficient maize plants
- Author
-
Praveen Kumar, Rajesh Kumar Tewari, and Parma Nand Sharma
- Subjects
Antioxidant ,Chemistry ,medicine.medical_treatment ,Zinc deficiency ,medicine ,Soil Science ,Plant Science ,Food science ,medicine.disease ,medicine.disease_cause ,Zea mays ,Oxidative stress - Published
- 2019
114. Enhancing Quality of service in IoT Healthcare services using Fog Computing
- Author
-
Parma Nand and Jyotsna
- Subjects
business.industry ,Computer science ,Quality of service ,Distributed computing ,Node (networking) ,Health care ,Bandwidth (computing) ,Latency (audio) ,Process (computing) ,Cloud computing ,Energy consumption ,business - Abstract
Data is generated from various heterogeneous sources in healthcare. To manage and process large amount of healthcare data, cloud computing has been proposed as a solution. However, some challenges like high latency, bandwidth and energy consumption are associated with such solution that reduces the associated quality of service associated. As heath data sets become larger, the probability of occurring errors in processing and transmitting data increases as well. In order to overcome the challenges, fog computing technology has been introduced. Fog computing is considered as an extension of cloud computing. It’s primarily objective is to assist with cloud computing and lately reduces the processing burden of cloud computing. Fog computing helps to provide decentralization of resources, reduced latency and finally improves the overall quality of service in healthcare being the latency sensitive system. Fog computing supports the real-time interaction to update and process the patient data. In first part of the paper, characteristics of fog computing is being defined. And in the second part, an idea is proposed to process data at fog node.
- Published
- 2021
115. Removal of cesium by spherical resorcinol–formaldehyde resin beads: Sorption and kinetic studies
- Author
-
Dwivedi, Charu, Pathak, Sanjay Kumar, Kumar, Manmohan, Tripathi, Subhash Chandra, and Bajaj, Parma Nand
- Published
- 2013
- Full Text
- View/download PDF
116. Intelligent Networks : Techniques, and Applications
- Author
-
Vivek Kumar Singh, Anil Kumar Sagar, Parma Nand, Rani Astya, Omprakash Kaiwartya, Vivek Kumar Singh, Anil Kumar Sagar, Parma Nand, Rani Astya, and Omprakash Kaiwartya
- Abstract
The book presents the latest developments in intelligent communication networks based on applicability from various domains of artificial intelligence and machine learning including channel modeling, model-based structure, channel prediction, and signal detection. It further explains important topics such as vehicular mobility modeling, human-centric network applications, security and privacy in social networks, and trust-based intelligent transportation systems. This book: Presents a model-based approach to constructing an effective network by using state-of-the-art artificial intelligent techniques. Discusses the theoretical and practical applications of channel prediction and signal detection. Introduces the fundamental concepts and application of vehicular networks in conjunction with artificial intelligence. Explores wireless communication network techniques enabled by human-centric applications, designed, and developed with artificial intelligence characteristics. Highlights the challenges in designing and developing an effective and intelligent communication network that can be applied in different domains of human activities for finding sustainable solutions. It is primarily written for senior undergraduate, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, computer engineering, and information technology.
- Published
- 2024
117. Software-Defined Network Frameworks : Security Issues and Use Cases
- Author
-
Mandeep Kaur, Vishal Jain, Parma Nand, Nitin Rakesh, Mandeep Kaur, Vishal Jain, Parma Nand, and Nitin Rakesh
- Subjects
- Software-defined networking (Computer network tech, Computer networks--Security measures
- Abstract
Software-Defined Networks (SDN) work by virtualization of the network and the Cognitive Software-Defined Network (CSDN) combines the efficiencies of SDN with cognitive learning algorithms and enhanced protocols to automatize SDN. Partial deployment of SDN along with traditional networking devices forms a Hybrid Software-Defined Network (HSDN). Software-Defined Network Frameworks: Security Issues and Use Cases consolidates the research relating to the security in SDN, CSDN, and Hybrid SDNs. The security enhancements derived from the use of various SDN frameworks and the security challenges thus introduced, are also discussed. Overall, this book explains the different architectures of SDNs and the security challenges needed for implementing them.Features: Illustrates different frameworks of SDN and their security issues in a single volume Discusses design and assessment of efficient SDN northbound/southbound interfaces Describes cognitive computing, affective computing, machine learning, and other novel tools Illustrates coupling of SDN and traditional networking – Hybrid SDN Explores services, technologies, algorithms, and methods for data analysis in CSDN The book is aimed at researchers and graduate students in software engineering, network security, computer networks, high performance computing, communications engineering, and intelligent systems.
- Published
- 2024
118. Image and Video Technology : 11th Pacific-Rim Symposium, PSIVT 2023, Auckland, New Zealand, November 22–24, 2023, Proceedings
- Author
-
Wei Qi Yan, Minh Nguyen, Parma Nand, Xuejun Li, Wei Qi Yan, Minh Nguyen, Parma Nand, and Xuejun Li
- Subjects
- Multimedia systems
- Abstract
This book constitutes the refereed conference proceedings of the 11th Pacific-Rim Symposium on Image and Video Technology, PSIVT 2023, held in Auckland, New Zealand, during November 22–24, 2023.The 34 full papers presented in this book were carefully reviewed and selected from 75 submissions. The main conference focuses on Image and Video Technology, a conference that gathers researchers and practitioners from around the globe to discuss the latest breakthroughs in image and video processing, analysis, and applications.
- Published
- 2024
119. Federated Learning for Smart Communication Using IoT Application
- Author
-
Kaushal Kishor, Parma Nand, Vishal Jain, Neetesh Saxena, Gaurav Agarwal, Rani Astya, Kaushal Kishor, Parma Nand, Vishal Jain, Neetesh Saxena, Gaurav Agarwal, and Rani Astya
- Subjects
- TK5105.8857
- Abstract
The effectiveness of federated learning in high‑performance information systems and informatics‑based solutions for addressing current information support requirements is demonstrated in this book. To address heterogeneity challenges in Internet of Things (IoT) contexts, Federated Learning for Smart Communication using IoT Application analyses the development of personalized federated learning algorithms capable of mitigating the detrimental consequences of heterogeneity in several dimensions. It includes case studies of IoT‑based human activity recognition to show the efficacy of personalized federated learning for intelligent IoT applications.Features: Demonstrates how federated learning offers a novel approach to building personalized models from data without invading users'privacy Describes how federated learning may assist in understanding and learning from user behavior in IoT applications while safeguarding user privacy Presents a detailed analysis of current research on federated learning, providing the reader with a broad understanding of the area Analyses the need for a personalized federated learning framework in cloud‑edge and wireless‑edge architecture for intelligent IoT applications Comprises real‑life case illustrations and examples to help consolidate understanding of topics presented in each chapter This book is recommended for anyone interested in federated learning‑based intelligent algorithms for smart communications.
- Published
- 2024
120. Emerging Trends for Securing Cyber Physical Systems and the Internet of Things
- Author
-
Bharat Bhushan, Sudhir Kumar Sharma, Parma Nand, Achyut Shankar, Ahmed J. Obaid, Bharat Bhushan, Sudhir Kumar Sharma, Parma Nand, Achyut Shankar, and Ahmed J. Obaid
- Subjects
- Cooperating objects (Computer systems)
- Abstract
In the past decades, cyber-physical systems (CPSs) have been widely applied to fields such as smart grids, environment monitoring, aerospace, smart transportation, and industrial automation. Great strides have been made in CPSs to improve the computing mechanism, communication, and quality of service by applying optimization algorithms. Currently, these efforts are integrated with the applications of machine learning (ML) and artificial intelligence (AI). To maintain system reliability and stability, CPSs such as smart grids face numerous challenges, including large-scale Internet-of-Things (IoT) device adaptation, ever-increasing demands of electrical energy, and the rise of a wide range of security threats. These challenges bring forth the need to find sustainable and advanced solutions to guarantee reliable and secure operations in these systems.The goal of this book is to foster transformative, multidisciplinary, and novel approaches that ensure CPS security by taking into consideration the unique security challenges present in the environment. This book attracts contributions in all aspects pertaining to this multidisciplinary paradigm, which includes the development and implementation of Smart CPS, Supervisory Control and Data Acquisition (SCADA) systems, CPS for Industry 4.0, CPS architecture for IoT applications, and CPS forensics.This book: Discusses concepts including wireless sensor networks (WSNs), CPSs, and the IoT in a comprehensive manner. Covers routing protocols in sensor networks, attacks, and vulnerabilities in WSNs, the Internet of Cyber-Physical Things, and CPSs for industrial applications. Highlights technological advances, practical solutions, emerging trends, and prototypes related to privacy in CPSs and the IoT. Presents a pathway and architecture for proactive security schemes in CPSs to counter vulnerabilities, including phishing attacks, malware injection, internal stealing of data, and hacking. Discusses the most recent research and development on the enabling technologies for IoT-based CPSs. Owing to the scope and diversity of topics covered, the book will be of interest not only to researchers and theorists but also to professionals, material developers, technology specialists, and methodologists dealing with the multifarious aspects of data privacy and security enhancement in CPSs. The book will provide these professionals an overview of CPS security and privacy design, as well as enlighten them to promising solutions to research problems such as cyberattacks in CPS, risk identification and management in CPS, ML-based trust computational models for CPSs, nature-inspired algorithms for CPSs, and distributed consensus algorithms for event detection in CPSs. The secondary target audience of this book includes legal practitioners, hackers, cyber law policymakers, cyber forensic analysts, and global security consortiums who may use it to further their research exposure to pertinent topics in cybersecurity.
- Published
- 2024
121. Artificial Intelligence for Cyber Defense and Smart Policing
- Author
-
S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, Parma Nand, S Vijayalakshmi, P Durgadevi, Lija Jacob, Balamurugan Balusamy, and Parma Nand
- Subjects
- Computer crimes, Law enforcement, Artificial intelligence
- Abstract
The future policing ought to cover identification of new assaults, disclosure of new ill-disposed patterns, and forecast of any future vindictive patterns from accessible authentic information. Such keen information will bring about building clever advanced proof handling frameworks that will help cops investigate violations. Artificial Intelligence for Cyber Defense and Smart Policing will describe the best way of practicing artificial intelligence for cyber defense and smart policing.Salient Features: Combines AI for both cyber defense and smart policing in one place Covers novel strategies in future to help cybercrime examinations and police Discusses different AI models to fabricate more exact techniques Elaborates on problematization and international issues Includes case studies and real-life examples This book is primarily aimed at graduates, researchers, and IT professionals. Business executives will also find this book helpful.
- Published
- 2024
122. Bio-Inspired Computational Paradigms : Security and Privacy in Dynamic Smart Networks
- Author
-
Vijayalakshmi S, Gayathri SP, Samiksha Shukla, Parma Nand, Balamurugan Balusamy, Vijayalakshmi S, Gayathri SP, Samiksha Shukla, Parma Nand, and Balamurugan Balusamy
- Subjects
- Natural computation, Smart cities
- Abstract
Smart cities with various technological innovations have played an important role and influenced society as well. Due to voluminous data transactions within smart cities, security and privacy concerns need to be dealt with. Though taking care of safety and privacy is challenging, it is essential for a smart city to understand the bio-inspired computing paradigms. This book discusses the utilization of bio-inspired computing procedures for effective computational devices.• Discusses real-world usage of bio-inspired computations• Highlights how bio-inspired computations hold the potential to significantly increase network security and privacy• Talks about how society can avoid consequences of cyber security breaches• Examines the combination of bio-inspired computational methods with IoT, AI and big dataThis book is primarily aimed at graduates, researchers, IT and industry professionals.
- Published
- 2024
123. Drowsiness detection using behavioral-centered technique-A Review
- Author
-
Manish Verma, Rani Astya, Parma Nand, and Anjali Awasthi
- Subjects
Hardware_MEMORYSTRUCTURES ,Computer science ,Head (linguistics) ,business.industry ,Cognitive neuroscience of visual object recognition ,Computer vision ,Artificial intelligence ,business - Abstract
Drowsiness during driving has been seen as one of the main reason for the accidents, which results in life and economical loss. Drowsiness is detected by three conventional methods i.e. Behavior based method, vehicular based method and physiological based method. A lot of work has been done to detect the drowsiness. Different researcher uses different machine learning algorithms to identify drowsiness. The objective of this research is to compare the machine learning algorithms used by different researchers to identify the drowsiness based on behavior centered techniques like eyes, movement of head, yawning etc. for drowsiness detection.
- Published
- 2021
124. A Comprehensive Survey on Effective Feature Selection Approaches for Text Sentiment Classification Process
- Author
-
Parma Nand, Abha Kiran Rajpoot, and Ali Imam Abidi
- Subjects
Information retrieval ,Scope (project management) ,Process (engineering) ,Computer science ,Sentiment analysis ,Feature extraction ,Feature selection ,02 engineering and technology ,Text categorization ,020204 information systems ,Web page ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Selection (genetic algorithm) - Abstract
Feature Selection (FS) is the selection of certain features by using a criterion assessment application. In the age of technological advancements and innovations, there has been a significant rise in the use of different social networking applications such as Facebook, YouTube, Twitter, and e-commerce platforms such as Amazon, Alibaba, Flipkart, and others. It has increased the use of sentiment analysis in the different real-world applications so that there is a classification of text in different preset polarities such as optimistic, pessimistic, and impartial. The current research aims to find out the selection process involved in choosing the optimal features for classification using sentimental textual data. The study presents the scope of the sentimental analysis using textual data, fundamentals of the classification process, and the significance of the feature selection schemes so that there is an implementation of effective feature selection for text classification and analysis of sentiments.
- Published
- 2021
125. Role of IoT in Enhancing Smart Agriculture System
- Author
-
Parma Nand, Sudeep Varshney, Nitin Rakesh, and Mandeep Kaur
- Subjects
Computer science ,business.industry ,Agriculture ,Environmental economics ,Internet of Things ,business ,Field monitoring - Abstract
Internet of things (IoT) has shown a different research direction in the domain of farming and agriculture. Smart agriculture has reduced the farmer’s effort and improved their capability in managing their crops, soil, water, field monitoring, pesticide control, etc. IoT-based solutions have increased the farmer’s attention toward humidity, temperature, pH value and environment conditions that are the most important concern in agriculture. The unique features of Internet of things like faster access to application and data, reduced human efforts, efficient communication and the global connectivity through different devices have made it a fast-growing technology in providing agriculture solutions. This paper explored various IoT smart agriculture systems and the challenges faced in deploying these systems.
- Published
- 2021
126. Hand Character Recognition Systems: A Review
- Author
-
Akhlaque Ali, Atif Azeez, Neha Tyagi, Anvay Mall, Parma Nand, Nitin Rakesh, Imaduddin Khoobtar, Vijendra Singh, and Mandeep Kaur
- Subjects
Artificial neural network ,business.industry ,Computer science ,Feature extraction ,computer.software_genre ,Field (computer science) ,Expert system ,Reduction (complexity) ,Character (mathematics) ,Handwriting ,Factor (programming language) ,Artificial intelligence ,business ,computer ,Natural language processing ,computer.programming_language - Abstract
“Handwritten Char. Recognition”, is also known as “HCR”. It is a dynamic and developing area which has seen substantial improvements due to the use of in various areas. One of the exciting fields of machine learning and artificial intelligence is text detection. Numerous methods and techniques are used to classify characters. However, the techniques for translating textual content from a paper document into a machine-readable form were defined as preliminary studies and paperwork. The character recognition system may be a critical factor in establishing a paperless world by digitizing existing paper documents in the coming days. Numerous researches have been conducted in this field, but as handwriting styles differ from each human, it remained an active area of research. The biggest challenge is to obtain the highest possible character recognition accuracy rate, which will inevitably lead to a reduction in manual paperwork. The aim's to enhance handwriting text recognition s/w with a better accuracy, which makes it perfect, reducing the complexity of its space-time. Several papers have implemented a new diagonal-based feature extraction method, which generates a high precision rate than traditional feature extraction methods. This project aims at designing an expert system for "HCR (English) using Neural Network." Using the Artificial Neural Network approach, this can effectively recognize a specific character of type format. This paper shows an overview of the field of recognition of Handwritten Text.
- Published
- 2021
127. Deep Learning for Healthcare Services
- Author
-
Parma, Nand, Vishal, Jain, Dac, Nhuong Le, Jyotir, Moy Chatterjee, Ramani, Kannan, Abhishek, S. Verma, Parma, Nand, Vishal, Jain, Dac, Nhuong Le, Jyotir, Moy Chatterjee, Ramani, Kannan, and Abhishek, S. Verma
- Subjects
- Deep learning (Machine learning), Medical care--Data processing, Medical care--Technological innovations
- Abstract
This book highlights the applications of deep learning algorithms in implementing big data and IoT enabled smart solutions to treat and care for terminally ill patients. It presents 5 concise chapters showing how these technologies can empower the conventional doctor patient relationship in a more dynamic, transparent, and personalized manner. The key topics covered in this book include:- The Role of Deep Learning in Healthcare Industry: Limitations- Generative Adversarial Networks for Deep Learning in Healthcare- The Role of Blockchain in the Healthcare Sector- Brain Tumor Detection Based on Different Deep Neural Networks Key features include a thorough, research-based overview of technologies that can assist deep learning models in the healthcare sector, including architecture and industrial scope. The book also presents a robust image processing model for brain tumor screening. Through this book, the editors have attempted to combine numerous compelling views, guidelines and frameworks. Healthcare industry professionals will understand how Deep Learning can improve health care service delivery.
- Published
- 2023
128. Artificial Intelligence in Cyber-Physical Systems : Principles and Applications
- Author
-
Anil Kumar Sagar, Parma Nand, Neetesh Kumar, Sanjoy Das, Subrata Sahana, Anil Kumar Sagar, Parma Nand, Neetesh Kumar, Sanjoy Das, and Subrata Sahana
- Subjects
- Computer security, Artificial intelligence, Cooperating objects (Computer systems), Internet of things
- Abstract
Artificial Intelligence (AI) and the Internet of Things (IoT) are growing rapidly in today's business world. In today's era, 25 billion devices, including machines, sensors, and cameras, are connected and continue to grow steadily. It is assumed that in 2025, 41.6 billion IoT devices will be connected, generating around 79.4 zettabytes of data.IoT and AI are intersecting in various scenarios. IoT-enabled devices are generating a huge amount of data, and with the help of AI, this data is used to build various intelligent models. These intelligent models are helpful in our daily lives and make the world smarter.Artificial Intelligence in Cyber Physical Systems: Principles and Applications addresses issues related to system safety, security, reliability, and deployment strategies in healthcare, military, transportation, energy, infrastructure, smart homes, and smart cities.
- Published
- 2023
129. Modulation of copper toxicity-induced oxidative damage by excess supply of iron in maize plants
- Author
-
Kumar, Praveen, Tewari, Rajesh Kumar, and Sharma, Parma Nand
- Published
- 2008
- Full Text
- View/download PDF
130. Object Recognition Using Image Segmentation
- Author
-
Nitin Rakesh, Manish Chaturvedi, Mandeep Kaur, and Parma Nand
- Subjects
050101 languages & linguistics ,Contextual image classification ,business.industry ,Computer science ,05 social sciences ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Cognitive neuroscience of visual object recognition ,Process (computing) ,02 engineering and technology ,Image segmentation ,Object (computer science) ,Object detection ,Image (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,0501 psychology and cognitive sciences ,Computer vision ,Artificial intelligence ,business - Abstract
The aim of the paper is to develop a system that can recognize various targeted objects in real-time by incorporating some computer vision techniques and advanced boosted Machine Learning algorithms to solve the problem of object recognition with high accuracy. The task of object detection is a combination of both, image classification and image localization. Image classification identifies the class of target object whereas localization identifies its position inside the input image. Viola-Jones is an algorithm that can work effectively for recognizing a large number of categories such as airplanes, cars, faces, etc. It works on feature extraction and uses Haar-Like features to achieve the objective. So, Viola-J ones is the algorithm that will be used for the development purpose of this paper. Also, instead of using a normal image, the image segmentation technique will be used to create segments in the image that will make it easy to analyze and process the image for further computations.
- Published
- 2020
131. Deciphering the SSR incidences across viral members of Coronaviridae family
- Author
-
Ankur Sharma, Niraj Kumar Jha, Mohammad Amjad Kamal, Janne Ruokolainen, Kavindra Kumar Kesari, Dhruv Kumar, Parma Nand, Saurabh Kumar Jha, Rohit Satyam, and Rohan Kar
- Subjects
0301 basic medicine ,Untranslated region ,Coronaviridae ,Coronaviruses ,Evolution ,Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) ,Genome, Viral ,Simple sequence repeats (SSRs) ,Toxicology ,Genome ,Evolution, Molecular ,Betacoronavirus ,Viral Proteins ,03 medical and health sciences ,0302 clinical medicine ,Intergenic region ,Humans ,3' Untranslated Regions ,Genome size ,Polyproteins ,Genetics ,Base Composition ,Base Sequence ,biology ,SARS-CoV-2 ,food and beverages ,General Medicine ,biology.organism_classification ,030104 developmental biology ,030220 oncology & carcinogenesis ,Mutation ,Microsatellite ,GC-content ,Mutations ,Microsatellite Repeats ,Research Article - Abstract
Presence of Simple Sequence Repeats (SSRs), both in genic and intergenic regions, have been widely studied in eukaryotes, prokaryotes, and viruses. In the current study, we undertook a survey to analyze the frequency and distribution of microsatellites or SSRs in multiple genomes of Coronaviridae members. We successfully identified 919 SSRs with length ≥12 bp across 55 reference genomes majority of which (838 SSRs) were found abundant in genic regions. The in-silico analysis further identified the preferential abundance of hexameric SSRs than any other size-based motif class. Our analysis shows that the genome size and GC content of the genome had a weak influence on SSR frequency and density. However, we find a positive correlation of SSRs GC content with genomic GC content. We also report relatively low abundances of all theoretically possible 501 repeat motif classes in all the genomes of Coronaviridae. The majority of SSRs were AT-rich. Overall, we see an underrepresentation of SSRs across the genomes of Coronaviridae. Besides, our integrative study highlights the presence of SSRs in ORF1ab (nsp3, nsp4, nsp5A_3CLpro and nsp5B_3CLpro, nsp6, nsp10, nsp12, nsp13, & nsp15 domains), S, ORF3a, ORF7a, N & 3′ UTR regions of SARS-CoV-2 and harbours multiple mutations (3′UTR and ORF1ab SSRs serving as major mutational hotspots). This indicates the genic SSRs are under selection pressure against mutations that might alter the reading frame and at the same time responsible for rapid protein evolution. Our preliminary results indicate the significance of the limited repertoire of SSRs in the genomes of Coronaviridae., Highlights • 919 SSRs were found across 55 members of the Coronaviridae family. • Genomes exhibit under-representation of SSRs. • Commonly 12–13 nt long hexanucleotide repeats occupying the genic region. • Identified genic SSRs in SARS-CoV-2 are under selection pressure against mutations. • 29% of the total bases covered by SSRs in SARS-CoV-2 were found to be variants.
- Published
- 2020
- Full Text
- View/download PDF
132. Nanoparticulate RNA delivery systems in cancer
- Author
-
Sunny Dholpuria, Parma Nand, Kavindra Kumar Kesari, Niraj Kumar Jha, Kundan Chaurasiya, Janne Ruokolainen, Rani Astya, Aditya Narayan Jha, Vivek Kumar Singh, Ankur Sharma, Saurabh Kumar Jha, Prabhu Chandra Mishra, Kajal Dahiya, and Amit Kumar
- Subjects
Cancer Research ,Small interfering RNA ,Computer science ,Genetic Vectors ,Computational biology ,Review ,Small hairpin RNA ,Mice ,Clinical Trials, Phase II as Topic ,RNA interference ,Cell Line, Tumor ,Neoplasms ,Gene silencing ,Animals ,Humans ,RNA, Small Interfering ,Gene knockdown ,Drug Carriers ,Clinical Trials, Phase I as Topic ,RNA ,Genetic Therapy ,Xenograft Model Antitumor Assays ,Oncology ,Gene Knockdown Techniques ,Drug delivery ,Nanoparticles ,RNA Interference ,Nanocarriers - Abstract
Background Drug delivery system is a common practice in cancer treatment. RNA interference-mediated post-transcriptional gene silencing holds promise as an approach to knockdown in the expression of target genes responsible for cancer cell growth and metastasis. RNA interference (RNAi) can be achieved by delivering small interfering RNA (siRNA) and short hairpin RNA (shRNA) to target cells. Since neither interfering RNAs can be delivered in naked form due to poor stability, an efficient delivery system is required that protects, guides, and delivers the siRNA and shRNA to target cells as part of cancer therapy (chemotherapy). Recent findings In this review, a discussion is presented about the different types of drug delivery system used to deliver siRNA and shRNA, together with an overview of the potential benefits associated with this sophisticated biomolecular therapy. Improved understanding of the different approaches used in nanoparticle (NP) fabrication, along with an enhanced appreciation of the biochemical properties of siRNA/shRNA, will assist in developing improved drug delivery strategies in basic and clinical research. Conclusion These novel delivery techniques are able to solve the problems that form an inevitable part of delivering genes in more efficient manner and as part of more effective treatment protocols. The present review concludes that the nanoparticulate RNA delivery system has great possibility for cancer treatment along with several other proposed methods. Several NPs or nanocarriers are already in use, but the methods proposed here could fulfill the missing gap in cancer research. It is the future technology, which unravels the mystery of resolving genomic diseases that is, especially genomic instability and its signaling cascades.
- Published
- 2020
133. Therapeutic Potential of Green Synthesized Metallic Nanoparticles Against Staphylococcus aureus
- Author
-
Garima Chouhan, Meron Moges Tsegaye, Priya Tyagi, Molla Fentie, and Parma Nand
- Subjects
medicine.medical_specialty ,Staphylococcus aureus ,business.industry ,Health condition ,Metal Nanoparticles ,Drug resistance ,Microbial Sensitivity Tests ,Staphylococcal Infections ,medicine.disease ,medicine.disease_cause ,World health ,Psychiatry and Mental health ,Human health ,Bacteremia ,Drug Resistance, Multiple, Bacterial ,medicine ,Humans ,Intensive care medicine ,business ,Metal nanoparticles - Abstract
Background: The recent treatment challenges posed by the widespread emergence of pathogenic multidrug-resistant (MDR) bacterial strains cause huge health problems worldwide. Infections caused by MDR organisms are associated with longer periods of hospitalization, increased mortality, and inflated healthcare costs. Staphylococcus aureus is one of these MDR organisms identified as an urgent threat to human health by the World Health Organization. Infections caused by S. aureus may range from simple cutaneous infestations to life-threatening bacteremia. S. aureus infections easily escalate in severely ill, hospitalized, and or immunocompromised patients with an incapacitated immune system. Also, in HIV-positive patients, S. aureus ranks amongst one of the most common comorbidities where it can further worsen a patient’s health condition. At present, anti-staphylococcal therapy is typically reliant on chemotherapeutics that are gaining resistance and pose unfavorable side-effects. Thus, newer drugs are required that can bridge these shortcomings and aid effective control against S. aureus. Objective: In this review, we summarize drug resistance exhibited by S. aureus, lacunae in current anti-staphylococcal therapy and nanoparticles as an alternative therapeutic modality. The focus lies on various green synthesized nanoparticles, their mode of action, and their application as potent antibacterial compounds against S. aureus. Conclusion: The use of nanoparticles as anti-bacterial drugs has gained momentum in the recent past, and green synthesized nanoparticles, which involve microorganisms and plants or their byproducts for the synthesis of nanoparticles, offer a potent, as well as environment friendly solution in warfare against MDR bacteria.
- Published
- 2020
134. Toward a chimeric vaccine against multiple isolates of Mycobacteroides - An integrative approach
- Author
-
Parma Nand, Niraj Kumar Jha, Tulika Bhardwaj, Saurabh Kumar Jha, and Rohit Satyam
- Subjects
0301 basic medicine ,Signal peptide ,Proteome ,Epitopes, T-Lymphocyte ,Computational biology ,Biology ,Molecular Dynamics Simulation ,Proteomics ,Major histocompatibility complex ,030226 pharmacology & pharmacy ,Genome ,General Biochemistry, Genetics and Molecular Biology ,Epitope ,03 medical and health sciences ,Epitopes ,0302 clinical medicine ,Antigen ,Drug Resistance, Bacterial ,Humans ,Bacteriophages ,General Pharmacology, Toxicology and Pharmaceutics ,Peptide sequence ,Mycobacteriaceae ,Alleles ,Gram-Positive Bacterial Infections ,B-Lymphocytes ,Virulence ,Histocompatibility Antigens Class I ,Histocompatibility Antigens Class II ,Computational Biology ,General Medicine ,Genomics ,Gastrointestinal Microbiome ,Molecular Docking Simulation ,Vaccinology ,030104 developmental biology ,Bacterial Vaccines ,biology.protein ,Immunotherapy ,CRISPR-Cas Systems ,Genome, Bacterial - Abstract
Aim Nontuberculous mycobacterial (NTM) infection such as endophthalmitis, dacryocystitis, and canaliculitis are pervasive across the globe and are currently managed by antibiotics. However, the recent cases of Mycobacteroides developing drug resistance reported along with the improper practice of medicine intrigued us to explore its genomic and proteomic canvas at a global scale and develop a chimeric vaccine against Mycobacteroides. Main methods We carried out a vivid genomic study on five recently sequenced strains of Mycobacteroides and explored their Pan-core genome/proteome in three different phases. The promiscuous antigenic proteins were identified via a subtractive proteomics approach that qualified for virulence causation, resistance and essentiality factors for this notorious bacterium. An integrated pipeline was developed for the identification of B-Cell, MHC (Major histocompatibility complex) class I and II epitopes. Key findings Phase I identified the shreds of evidence of reductive evolution and propensity of the Pan-genome of Mycobacteroides getting closed soon. Phase II and Phase III produced 8 vaccine constructs. Our final vaccine construct, V6 qualified for all tests such as absence for allergenicity, presence of antigenicity, etc. V6 contains β-defensin as an adjuvant, linkers, Lysosomal-associated membrane protein 1 (LAMP1) signal peptide, and PADRE (Pan HLA-DR epitopes) amino acid sequence. Besides, V6 also interacts with a maximum number of MHC molecules and the TLR4/MD2 (Toll-like receptor 4/Myeloid differentiation factor 2) complex confirmed by docking and molecular dynamics simulation studies. Significance The knowledge harnessed from the current study can help improve the current treatment regimens or in an event of an outbreak and propel further related studies.
- Published
- 2020
135. Alterations in Metabolite-Driven Gene Regulation in Cancer Metabolism
- Author
-
Niraj Kumar Jha, Rahul Yadav, Parma Nand, Geetika Rawat, Ankur Sharma, Fahad Khan, Tanaya Gover, Neeraj Kumar, Saurabh Kumar Jha, Prabhjot Kaur, and Kumari Swati
- Subjects
Regulation of gene expression ,Metabolic pathway ,Anaerobic glycolysis ,Cancer cell ,Cancer research ,medicine ,Cancer ,Glycolysis ,Oxidative phosphorylation ,Tumor initiation ,Biology ,medicine.disease - Abstract
Cancer is the leading cause of mortality among humans globally. Knowing about the etiology underlying the advancement of cancer is imperative for curtailing the monetary and social burden of cancer. In addition to genetic mutations, altered metabolism involved metabolic rewiring is needed in cancer cells to support their high nutritional demand needed for energy generation. Cancer metabolism also refers to the perturbations in biochemical pathways that are reported in tumor cells compared with most of the normal cells. Metabolic impairments in tumor cells are more frequent which include aerobic glycolysis, decreased oxidative phosphorylation, and the accelerated production of biosynthetic intermediates crucial to the proliferative cells for their growth and development. Interruptions in metabolic cascades responsible for fueling energy into the cancer cells for their growth has been observed in most of the cancer forms. These interruptions, in turn, facilitates growth in tumor cells by ceasing biochemical signals used to inhibit tumor initiation, hence eventually increase the metastatic character of the tumor cells. However, the precise mechanisms whereby metabolic pathways contribute to the cancer prognosis remain uncertain. This chapter thus consolidates recent findings regarding cross talk between metabolic alterations and cancer biology. Further, a concrete and deep understanding of this heterogeneity may enable the advancement and optimization of potential therapeutic approaches that target biochemical pathways associated with proliferation of malignant cells.
- Published
- 2020
136. Clinical Relevance of 'Biomarkers' in Cancer Metabolism
- Author
-
Kavindra Kumar Kesari, Ankur Sharma, Mansi Agrahari, Neeraj Kumar, Pratibha Pandey, Rahul Yadav, Niraj Kumar Jha, Parma Nand, Nancy Sanjay Gupta, and Saurabh Kumar Jha
- Subjects
business.industry ,DNA repair ,Cancer metabolism ,Cancer screening ,medicine ,Cancer ,Clinical significance ,Cancer biomarkers ,Disease ,Biomarker discovery ,medicine.disease ,business ,Bioinformatics - Abstract
Nowadays, the field of biomarker discovery has become the topic of vivid research with the current emergence of novel technologies. Major progress in cancer control will be significantly aided by early detection for the diagnosis and treatment of cancer in its preinvasive state. Cancer being a diverse disease involves mutations in mostly three classes of genes such as oncogenes (proto-oncogenes), DNA repair genes, and tumor suppressor genes, presenting a wide range of opportunities for the development and formulation of various cancer biomarkers. Cancer biomarkers are used to follow up disease process before it becomes more severe and help in screening, thus greatly aid in cancer diagnosis and treatment. They also act as biochemical indicators to show the evidence of the presence of a tumor. There are various types of tumor biomarkers, which are classified on the basis of their functionalities. For instance, tumor diagnostic markers aid in predicting the occurrence of tumor during diagnosis, while tumor prognostic markers are clinical measures used to assist in bringing out an individual patients risk of a future consequence including disease reoccurrence after primary treatment. Similarly, various biomarkers are accountable for serving as a potential biochemical indicator to examine the processes of disease progression and help in disease diagnosis. However, the precise roles of cancer biomarkers in contributing to examine the cancer progression remain uncertain. This chapter therefore recapitulates about the recent findings of current and emerging biomarkers in cancer with fundamental insight into different markers used in cancer detection. Further, biomarkers based on these strategies may lead to remarkable improvement in cancer screening, prognosis, and management of therapeutic response in cancer patients.
- Published
- 2020
137. An Improved Selective Facial Extraction Model for Age Estimation
- Author
-
Lingmin He, Parma Nand, Chengwen Song, and Wei Qi Yan
- Subjects
Computer science ,business.industry ,Pattern recognition ,02 engineering and technology ,010501 environmental sciences ,Residual ,01 natural sciences ,Convolutional neural network ,Regression ,Correlation ,Multiclass classification ,Improved performance ,Kernel (image processing) ,Age estimation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,0105 earth and related environmental sciences - Abstract
In this paper, we propose an improved end-to-end learning algorithm to address the aggregation of multiclass classification and regression for age estimation by using deep Convolutional Neural Networks (CNNs). Inspired by Soft Stagewise Regression Network (SSR-Net), we take residual units embedded with channel and spatial feature response correlation values and dynamically adopted the kernel corresponding to these feature maps into our model. In addition, we used weight normalization at each layer by using input samples at the beginning of training and this weight normalization was beneficial both in terms of accuracy as well as training time. We validate the proposed model based on benchmark datasets and compare the MAE with seven other mainstream networks. The results reveal that our model achieves an improved performance. Our contribution is an updated algorithm for age estimation by adopting the latest attention and normalization mechanisms for balancing the efficiency and accuracy of the proposed model.
- Published
- 2019
138. Design adaptive Subnetting Hybrid Gateway MANET Protocol on the basis of Dynamic TTL value adjustment
- Author
-
Pankaj K. Agarwal, Parma Nand, and Kaushal Kishor
- Subjects
Notice ,Basis (linear algebra) ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Value (economics) ,General Materials Science ,Mobile ad hoc network ,Gateway (computer program) ,business ,Protocol (object-oriented programming) ,Computer network - Abstract
Mobile ad hoc Network is infrastructure less wireless network and decentralized way, and then for a large network number of nodes dynamically therefor the connection established between source node to destination node is really challenging. The challenge is interconnecting ad hoc network to the internet seems from the needs to inform ad hoc nodes about available gateways in an extremely challenging scenario while a making a minimum consumption of the source network resources. Then an efficient gateway discovery of an ad hoc network becomes one of the central factors to enable the economic consumption of hybrid ad hoc network in future mobile and wireless network. In mobile ad hoc network have multihop nature of MANET therefore several reachable gateways for mobile node at any period of time. If the mobile node receives gatways advertisement from more than one gateway. It has to determine which gateway to use for connecting to the net. Most existing protocol choose the gateway which is closer in terms of the number of physical hops. This paper has focused on design an efficient and adaptive subnetting hybrid gateway discovery mechanism on the basis of dynamic TTL value adjustment such that congestion and unnecessary overhead is reduced. Selecting the gateway on the basis of one and two parameters will increase the performance and throughput of the network. The main objective of adaptive gateway discovery to determine the optimal TTL value in terms of number of hops to determine the proactive area, nodes outside this area follow the reactive approach. Consequently, for achieving a good trade off between performanceand network operating expense.
- Published
- 2018
139. Video Dynamics Detection Using Deep Neural Networks
- Author
-
Wei Qi Yan, Keji Zheng, and Parma Nand
- Subjects
Control and Optimization ,business.industry ,Event (computing) ,Computer science ,Speech recognition ,Deep learning ,Frame (networking) ,Convolutional neural network ,Computer Science Applications ,Computational Mathematics ,Recurrent neural network ,Artificial Intelligence ,Dynamics (music) ,Logic gate ,Artificial intelligence ,business ,Hidden Markov model - Abstract
In recent years, deep neural networks (DNNs) have achieved a remarkable progression in solving many complex problems. DNNs are suitable for dealing with the problems related to time series, such as speech recognition and natural language processing. Video dynamics detection, for instance, is time dependent. Apparently, video dynamics detection needs to utilize the present, previous, and next frames of a given video. If a frame change occurs, it triggers whether a video event happens or not. In this paper, video dynamics detection based on deep learning is implemented and our contributions are to effectively improve the accuracy of video dynamics detection. The contributions of this paper are as follows: 1) increasing the accuracy rate to 96% compared to an FSM-based video dynamics detection in real time; 2) By combining convolutional neural network and recurrent neural network (RNN) together, the training time is greatly reduced as we expected.
- Published
- 2018
140. SECURE COMMUNICATION USING PFS IN A DISTRIBUTED ENVIRONMENT
- Author
-
Rani Kumari, Parma Nand, and Suneet Chaudhary
- Subjects
Password ,Authentication ,computer.internet_protocol ,Computer science ,Network security ,business.industry ,Key distribution ,Computer security ,computer.software_genre ,Forward secrecy ,Authentication protocol ,Server ,Kerberos ,business ,computer - Abstract
Today millions of ordinary citizens are using networks for banking, shopping and filing their tax return. Network security has become a massive problem. All this requires network to identify its legal users for providing services. An authentication protocol used is Kerberos which uses strong secret key for user authentication but it is vulnerable in case of weak passwords. Authentication & key distribution protocols requires sharing secret key(s) with a view that only the concerned users know to derive the information from it. These protocols are vulnerable to key guessing attacks. Another important consideration is perfect forward secrecy in which our proposed scheme cover cases with application servers, authentication servers or clients key are revealed & their combination. In this paper our proposed scheme deal with key guessing attacks, perfect forward secrecy and protocols for few combinations of keys. All these protocols are based on the fact that the keys are weak & can be exploited easily.
- Published
- 2018
141. Blockchain Technology in Healthcare Applications : Social, Economic, and Technological Implications
- Author
-
Bharat Bhushan, Nitin Rakesh, Yousef Farhaoui, Parma Nand, Bhuvan Unhelkar, Bharat Bhushan, Nitin Rakesh, Yousef Farhaoui, Parma Nand, and Bhuvan Unhelkar
- Subjects
- Medical telematics, Blockchains (Databases), Medical care--Data processing
- Abstract
Tremendous growth in healthcare treatment techniques and methods has led to the emergence of numerous storage and communication problems and need for security among vendors and patients. This book brings together latest applications and state-of-the-art developments in healthcare sector using Blockchain technology. It explains how blockchain can enhance security, privacy, interoperability, and data accessibility including AI with blockchains, blockchains for medical imaging to supply chain management, and centralized management/clearing houses alongside DLT. Features: Includes theoretical concepts, empirical studies and detailed overview of various aspects related to development of healthcare applications from a reliable, trusted, and secure data transmission perspective. Provide insights on business applications of Blockchain, particularly in the healthcare sector. Explores how Blockchain can solve the transparency issues in the clinical research. Discusses AI with Blockchains, ranging from medical imaging to supply chain management. Reviews benchmark testing of AI with Blockchains and its impacts upon medical uses. This book aims at researchers and graduate students in healthcare information systems, computer and electrical engineering.
- Published
- 2022
142. Cyber-Physical Systems : Foundations and Techniques
- Author
-
Uzzal Sharma, Parma Nand, Jyotir Moy Chatterjee, Vishal Jain, Noor Zaman Jhanjhi, R. Sujatha, Uzzal Sharma, Parma Nand, Jyotir Moy Chatterjee, Vishal Jain, Noor Zaman Jhanjhi, and R. Sujatha
- Subjects
- Cooperating objects (Computer systems)
- Abstract
CYBER-PHYSICAL SYSTEMS The 13 chapters in this book cover the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement of existing technology such as machine learning, big data and robotics. Cyber-Physical Systems (CPS) is the interconnection of the virtual or cyber and the physical system. It is realized by combining three well-known technologies, namely “Embedded Systems,” “Sensors and Actuators,” and “Network and Communication Systems.” These technologies combine to form a system known as CPS. In CPS, the physical process and information processing are so tightly connected that it is hard to distinguish the individual contribution of each process from the output. Some exciting innovations such as autonomous cars, quadcopter, spaceships, sophisticated medical devices fall under CPS. The scope of CPS is tremendous. In CPS, one sees the applications of various emerging technologies such as artificial intelligence (AI), Internet of Things (IoT), machine learning (ML), deep learning (DL), big data (BD), robotics, quantum technology, etc. In almost all sectors, whether it is education, health, human resource development, skill improvement, startup strategy, etc., one sees an enhancement in the quality of output because of the emergence of CPS into the field. Audience Researchers in Information technology, artificial intelligence, robotics, electronics and electrical engineering.
- Published
- 2022
143. Computational Intelligence Applications for Software Engineering Problems
- Author
-
Parma Nand, Nitin Rakesh, Arun Prakash Agrawal, Vishal Jain, Parma Nand, Nitin Rakesh, Arun Prakash Agrawal, and Vishal Jain
- Subjects
- Computational intelligence, Software engineering
- Abstract
This new volume explores the computational intelligence techniques necessary to carry out different software engineering tasks. Software undergoes various stages before deployment, such as requirements elicitation, software designing, software project planning, software coding, and software testing and maintenance. Every stage is bundled with a number of tasks or activities to be performed. Due to the large and complex nature of software, these tasks can become costly and error prone. This volume aims to help meet these challenges by presenting new research and practical applications in intelligent techniques in the field of software engineering. Computational Intelligence Applications for Software Engineering Problems discusses techniques and presents case studies to solve engineering challenges using machine learning, deep learning, fuzzy-logic-based computation, statistical modeling, invasive weed meta-heuristic algorithms, artificial intelligence, the DevOps model, time series forecasting models, and more.
- Published
- 2022
144. Development of Textual Analysis using Machine Learning to Improve the Sentiment Classification
- Author
-
Abha Kiran Rajpoot, Parma Nand, and Ali Imam Abidi
- Subjects
History ,Computer Science Applications ,Education - Abstract
Rapid development in Internet and the increase in online information, the technology demanded for intelligently classifying the textual data has become significant role in Information Retrieval Process. Based on given query in the search box, the response from the internet has made open to the public. Thus, the scope of text mining is being explored by several researchers. Sentiment Analysis is one of the most popular process for analysing user opinions and feelings, and since, online communication has become the fast ever growing medium for expressing thoughts, therefore, there have been development in text classification to improve sentiment analysis. In this paper, some of the prior works on sentiment analysis and the advancements in text classification have been discussed.
- Published
- 2021
145. Machine Learning and Deep Learning in Efficacy Improvement of Healthcare Systems
- Author
-
Om Prakash Jena, Bharat Bhushan, Nitin Rakesh, Parma Nand Astya, Yousef Farhaoui, Om Prakash Jena, Bharat Bhushan, Nitin Rakesh, Parma Nand Astya, and Yousef Farhaoui
- Subjects
- Medical instruments and apparatus--Data processing, Medical informatics, Biomedical engineering--Data processing, Machine learning
- Abstract
The goal of medical informatics is to improve life expectancy, disease diagnosis and quality of life. Medical devices have revolutionized healthcare and have led to the modern age of machine learning, deep learning and Internet of Medical Things (IoMT) with their proliferation, mobility and agility. This book exposes different dimensions of applications for computational intelligence and explains its use in solving various biomedical and healthcare problems in the real world. This book describes the fundamental concepts of machine learning and deep learning techniques in a healthcare system. The aim of this book is to describe how deep learning methods are used to ensure high-quality data processing, medical image and signal analysis and improved healthcare applications. This book also explores different dimensions of computational intelligence applications and illustrates its use in the solution of assorted real-world biomedical and healthcare problems. Furthermore, it provides the healthcare sector with innovative advances in theory, analytical approaches, numerical simulation, statistical analysis, modelling, advanced deployment, case studies, analytical results, computational structuring and significant progress in the field of machine learning and deep learning in healthcare applications.FEATURES Explores different dimensions of computational intelligence applications and illustrates its use in the solution of assorted real-world biomedical and healthcare problems Provides guidance in developing intelligence-based diagnostic systems, efficient models and cost-effective machines Provides the latest research findings, solutions to the concerning issues and relevant theoretical frameworks in the area of machine learning and deep learning for healthcare systems Describes experiences and findings relating to protocol design, prototyping, experimental evaluation, real testbeds and empirical characterization of security and privacy interoperability issues in healthcare applications Explores and illustrates the current and future impacts of pandemics and mitigates risk in healthcare with advanced analytics This book is intended for students, researchers, professionals and policy makers working in the fields of public health and in the healthcare sector. Scientists and IT specialists will also find this book beneficial for research exposure and new ideas in the field of machine learning and deep learning.
- Published
- 2021
146. Intelligent Information Retrieval for Healthcare Systems
- Author
-
Parma Nand and Parma Nand
- Subjects
- Medical informatics, Medical instruments and apparatus--Data processi, Machine learning
- Abstract
Ontology–based information extraction is considered as an effective method to improve the performance of information extraction (IE) systems. For research and disbursal of customized healthcare services, a major challenge is to efficiently retrieve and analyze the individual patient data from a large volume of heterogeneous data over a long span of time. This requires effective ontology-based information retrieval approaches for clinical information systems. This book is an attempt to highlight the key advances in ontology-based information retrieval techniques especially in the healthcare domain. The varied chapters attempt to uncover the current challenges in the application of ontology-based information retrieval techniques to the healthcare systems. This book is the first of its kind that highlights the ontology-driven information retrieval mechanisms and techniques being applied to healthcare as well as clinical information systems. It can serve as a textbook for courses in healthcare systems. It can also serve as a reference book to medical practitioners and researchers involved in implementing as well as providing customized health care solutions to patients.
- Published
- 2021
147. Blockchain Technology for Data Privacy Management
- Author
-
Sudhir Kumar Sharma, Bharat Bhushan, Aditya Khamparia, Parma Nand Astya, Narayan C. Debnath, Sudhir Kumar Sharma, Bharat Bhushan, Aditya Khamparia, Parma Nand Astya, and Narayan C. Debnath
- Subjects
- Personal information management, Blockchains (Databases), Privacy, Right of
- Abstract
The book aims to showcase the basics of both IoT and Blockchain for beginners as well as their integration and challenge discussions for existing practitioner. It aims to develop understanding of the role of blockchain in fostering security. The objective of this book is to initiate conversations among technologists, engineers, scientists, and clinicians to synergize their efforts in producing low-cost, high-performance, highly efficient, deployable IoT systems. It presents a stepwise discussion, exhaustive literature survey, rigorous experimental analysis and discussions to demonstrate the usage of blockchain technology for securing communications. The book evaluates, investigate, analyze and outline a set of security challenges that needs to be addressed in the near future. The book is designed to be the first reference choice at research and development centers, academic institutions, university libraries and any institutions interested in exploring blockchain. UG/PG students, PhD Scholars of this fields, industry technologists, young entrepreneurs and researchers working in the field of blockchain technology are the primary audience of this book.
- Published
- 2021
148. Morphology and oxidative physiology of boron-deficient mulberry plants
- Author
-
Tewari, Rajesh Kumar, Kumar, Praveen, and Sharma, Parma Nand
- Published
- 2010
149. Utilizing typed dependency subtree patterns for answer sentence generation in question answering systems
- Author
-
M. Asif Naeem, Rivindu Perera, and Parma Nand
- Subjects
Information retrieval ,Computer science ,business.industry ,Factoid ,02 engineering and technology ,Linked data ,computer.file_format ,computer.software_genre ,Artificial Intelligence ,020204 information systems ,Dependency grammar ,0202 electrical engineering, electronic engineering, information engineering ,Question answering ,SPARQL ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Semantic Web ,computer ,Sentence ,Natural language processing ,RDF query language ,computer.programming_language - Abstract
Question Answering over Linked Data (QALD) refer to the use of Linked Data by question answering systems, and in recent times this has become increasingly popular as it opens up a massive Linked Data cloud which is a rich source of encoded knowledge. However, a major shortfall of current QALD systems is that they focus on presenting a single fact or factoid answer which is derived using SPARQL (SPARQL Protocol and RDF Query Language) queries. There is now an increased interest in development of human-like systems which would be able to answer questions and even hold conversations by constructing sentences akin to humans. In this paper, we introduce a new answer construction and presentation system, which utilizes the linguistic structure of the source question and the factoid answer to construct an answer sentence which closely emanates a human-generated answer. We employ both semantic Web technology and the linguistic structure to construct the answer sentences. The core of the research resides on extracting dependency subtree patterns from the questions and utilizing them in conjunction with the factoid answer to generate the answer sentence with a natural feel akin to an answer from a human when asked the question. We evaluated the system for both linguistic accuracy and naturalness using human evaluation. These evaluation processes showed that the proposed approach is able to generate answer sentences which have linguistic accuracy and natural readability quotients of more than 70%. In addition, we also carried out a feasibility analysis on using automatic metrics for answer sentence evaluation. The results from this phase showed that the there is not a strong correlation between the results from automatic metric evaluation and the human ratings of the machine-generated answers.
- Published
- 2017
150. Recent Advances in Natural Language Generation: A Survey and Classification of the Empirical Literature
- Author
-
Rivindu Perera and Parma Nand
- Subjects
Language identification ,Computer Networks and Communications ,Computer science ,68T50 ,Lexicalization ,Realization (linguistics) ,02 engineering and technology ,050905 science studies ,computer.software_genre ,USable ,0202 electrical engineering, electronic engineering, information engineering ,micro-planning ,03B65 ,business.industry ,Natural language processing ,05 social sciences ,Natural language generation ,Variety (linguistics) ,Computational Theory and Mathematics ,Hardware and Architecture ,020201 artificial intelligence & image processing ,surface realization ,Artificial intelligence ,0509 other social sciences ,business ,computer ,Software ,Natural language ,document planning ,Meaning (linguistics) - Abstract
Natural Language Generation (NLG) is defined as the systematic approach for producing human understandable natural language text based on non-textual data or from meaning representations. This is a significant area which empowers human-computer interaction. It has also given rise to a variety of theoretical as well as empirical approaches. This paper intends to provide a detailed overview and a classification of the state-of-the-art approaches in Natural Language Generation. The paper explores NLG architectures and tasks classed under document planning, micro-planning and surface realization modules. Additionally, this paper also identifies the gaps existing in the NLG research which require further work in order to make NLG a widely usable technology.
- Published
- 2017
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.