Manoj Bangare - Academia.edu (original) (raw)
Papers by Manoj Bangare
Artificial Intelligent Systems and Machine Learning, 2018
Nature has been an unlimited source of motivation to all manhood. Current activities in Soft Comp... more Nature has been an unlimited source of motivation to all manhood. Current activities in Soft Computing is close the progress of technologies which have source and correspondence with biological phenomenon linked with human as evolutionary computation. Soft Computing is combination of several methods as Artificial Neural Network, Fuzzy Logic and Genetic Algorithm. This paper focuses on the search based optimization technique i.e. Genetic Algorithm. Optimization is the scheme of building a something best. The biological concepts of Genetic Algorithm are discussed. Steps required for implementing Genetic Algorithm i.e. Initialization, Encoding, Genetic Operators, Mutation and Termination are described. The traveling Salesman Problem is well-known problem of search based optimization. This problem is considered for discussion. The results are discussed for different number of cities to be travelled with minimum cost function.
Artificial Intelligent Systems and Machine Learning, 2018
This paper presents the basic concepts of Artificial Neural Networks (ANNs) which helps to beginn... more This paper presents the basic concepts of Artificial Neural Networks (ANNs) which helps to beginner of ANN. The history of ANN, different applications of ANN, different learning rules and different types of architectures are discussed in the introductory part of this paper. The architecture of ANN has been described in detail. The McCulloch Pitts model is explained with mathematical equations. The McCulloch Pitts model is implemented for AND, OR, NOT and XOR gate. The algorithms for implementation of above gates have been given. To help users MATLAB code is also given in this paper.
Materials Today: Proceedings, 2022
Tourism is viewed as a major economy booster. Although tourism has a beneficial influence on the ... more Tourism is viewed as a major economy booster. Although tourism has a beneficial influence on the economy in terms of national income generation, job creation, tax revenue generation and foreign exchange generation, it is a multi-segment sector. As a primary goal of higher education institutions, improving student performance is a top priority. Before a performance improvement program can be designed, it is necessary to map the students' current situation. Traditional computer techniques in the IT industry differ from machine learning. To describe or solve a problem, computers utilize a set of well-written instructions. Data inputs for factual research can be prepared using master learning approaches by computers. We'll look at how machine learning can be used in the tourist and education sectors.
BioMed Research International, Jul 26, 2022
The liver is in charge of a plethora of tasks that are critical to healthy health. One of these r... more The liver is in charge of a plethora of tasks that are critical to healthy health. One of these roles is the conversion of food into protein and bile, which are both needed for digestion. Inhaled and possibly harmful chemicals are flushed from the body. It destroys numerous nutrients acquired through the gastrointestinal system and limits the release of cholesterol by utilizing vitamins, carbohydrates, and minerals stored in the liver. The body's tissues are made up of tiny structures known as cells. Cells proliferate and divide in order to create new ones in the normal sequence of events. When an old or damaged cell has to be replaced, a new cell must be synthesized. In other circumstances, the procedure is a total and utter failure. If the tissues of dead or damaged cells that have been cleared from the body are not removed, they may give birth to nodules and tumors. The liver can produce two types of tumors: benign and malignant. Malignant tumors are more dangerous to one's health than benign tumors. This article presents a technique for the classification and identification of liver cancers that is based on image processing and machine learning. The approach may be found here. During the preprocessing stage of picture creation, the fuzzy histogram equalization method is applied in order to bring about a reduction in image noise. After that, the photographs are divided into many parts in order to zero down on the area of interest. For this particular classification task, the RBF-SVM approach, the ANN method, and the random forest method are all applied.
International journal of next-generation computing, Oct 31, 2022
A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are var... more A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are various types of tumours, each with its own set of characteristics and treatment plan. The goal of this study is to create a reliable algorithm for detecting tumours in brain MRI images. Image segmentation is critical for detecting brain tumours. One of the most difficult, but crucial, processes is detecting a brain tumour. As a result, accurate segmentation of Magnetic Resonance Imaging (MRI) images is critical for subsequent diagnosis. The ongoing research into automatic detection of brain structures is motivated by a desire to learn more about the connections between the anatomy of brain tissues and various mental and physical disorders in humans. These days, medical professionals are particularly interested in computer-aided technologies that can identify and characterise certain organs or medical characteristics. Using image processing and machine learning, this study proposes a strategy for the early and accurate detection of brain tumours. The SVM, ANN, and ID3 algorithms are all utilised in some capacity within the context of this framework's procedures for extracting features and segmenting images. Metrics such as accuracy, specificity, and sensitivity are utilised in the evaluation process so that we can determine how well an algorithm performs.
Paladyn, 2023
Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become ... more Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become an emerging technology in today's world. To minimize an accessory adaptation for Customer Equipment (CE) in AR, it may be feasible to offload the AR workload onto the onboard devices. Mobile-Edge Computation (MEC) will improve the throughput of a CE. MEC has caused enormous overhead or communication omissions on wireless media, making it difficult to choose the optimal payload proposition. The proposed system explores on-board devices that work together to achieve an AR goal. Code splitting is a Bayesian network used to examine the overall interdependence of efforts. From a longevity and endurance perspective, it is used to reduce the Probability of Supplier Failure (PSF) of an MEC-enabled AR environment. Weighed Particle Swarm Optimization (WPSO) was proposed despite the reality based on the emphasis on balancing the issue. As a result, a heuristic-based WPSO facilitates to improve the performance measures. A hybrid method could significantly increase the assertion of a predicted PSF in various network scenarios compared to the existing communication technologies. A preliminary iterative approach is suitable for AR operations and IRLC scenarios to generalize the attributes.
International Journal of Advanced Research in Science, Communication and Technology, May 22, 2022
Agriculture is the number one source of livelihood for approximately 58 percent of India’s popula... more Agriculture is the number one source of livelihood for approximately 58 percent of India’s population and is the most crucial part of GDP. Indian farming is based totally on economic advantages from crop yields, but now day’s agricultural generation has failed to verified satisfactory crop choice techniques and to boom crop yield in all over India. So, lower in crop yield will increase the trouble in farmer’s monetary health situations. So, it will become the maximum trending hassle for our agricultural region to invent such noble technique to advocate super appropriate crop for a particular region. To reap high-quality appropriate crop desire for areas primarily based on parameters like soil conditions, rainfall and weather we have got applied gadget studying method. Secondary hassle is lack of understanding or absence of steering even as farming. Lack of guidance in Indian farmers may follow incorrect farming strategies or inefficient traditional strategies. Most of farmers are uneducated and non-technical backgrounds so they'll be relying on conventional crop choice and farming techniques which falls them into reasonable loss. With the assist of disorder assessment tool, we predict the crop disease prediction and propose the precaution from the ones illnesses. Last and most essential hassle isn't any right marketplace assessment at the equal time as cultivation of any unique crop, which can also reason a cheap lack of farmers.
In remote server system, user authentication is an essential requirement. To verify the authentic... more In remote server system, user authentication is an essential requirement. To verify the authenticity of the remote users over insure channel, various authentication methods have been proposed so far. The use of passwords for user authentication is very simple and commonly used method. The password selected by clients may be simple and easy to remember. Hence, it is responsibility of password authentication schemes to securely exchange password related information between server and client over insecure channel. Many password authentication schemes have been published but found susceptible to various attacks. ECC based existing password authentication scheme provides different features and efficient in some way. But it is found that the existing password authentication scheme is vulnerable to offline password guessing attack, stolen verifier attack and denial of service attack. The proposed password authentication scheme is based on ECC and password verifier. ECC is a public key cryptography system better than RSA cryptography because with the same key size, it gives a higher security level than RSA. Proposed scheme allows the client and server to select two random numbers independently and perform computations without exchanging them. Hence the attacker can't guess password from dictionary as he or she is unaware of random numbers selected by the client and server. Proposed password authentication scheme provides prevention scheme for an offline password guessing attack based on ECC. It also helps to securely share id based secret key between client and server.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Feb 23, 2022
Cloud computing provides customers with enormous compute power and storage capacity, allowing the... more Cloud computing provides customers with enormous compute power and storage capacity, allowing them to deploy their computation and data-intensive applications without having to invest in infrastructure. Many firms use cloud computing as a means of relocating and maintaining resources outside of their enterprise, regardless of the cloud server's location. However, preserving the data in cloud leads to a number of issues related to data loss, accountability, security etc. Such fears become a great barrier to the adoption of the cloud services by users. Cloud computing offers a high scale storage facility for internet users with reference to the cost based on the usage of facilities provided. Privacy protection of a user's data is considered as a challenge as the internal operations offered by the service providers cannot be accessed by the users. Hence, it becomes necessary for monitoring the usage of the client's data in cloud. In this research, we suggest an effective cloud storage solution for accessing patient medical records across hospitals in different countries while maintaining data security and integrity. In the suggested system, multifactor authentication for user login to the cloud, homomorphic encryption for data storage with integrity verification, and integrity verification have all been implemented effectively. To illustrate the efficacy of the proposed strategy, an experimental investigation was conducted.
Design Engineering, Aug 8, 2021
Design Engineering, Aug 8, 2021
Enterprises always used organizational internal storage system for storing data. Mainly in a Cust... more Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage is there may be intruder's in the administrator side and they may acquire all the information about a customer. Above threats can happen in same service provider in a cloud computing environment. To overcome with this kind of challenges in cloud computing, there is need of an innovative algorithmic approach for data security in cloud computing. A CRM (Customer Relational Management) system services is represented in this paper using RC5 algorithm. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption of the user's data and then must delete data once encryption/decryption process is completed. In this paper the use of CRM services which demonstrates how the parties involved in secure storage and retrieval when data is saved to the cloud.
International journal of cloud computing, 2020
Recent technological revolution has been reported as the revolution of the cloud computing techno... more Recent technological revolution has been reported as the revolution of the cloud computing technology. The explosive availability of the unstructured data in the cloud has gained the attention of the researchers and the users store their data in the cloud without any right over controlling the data, causing the privacy concerns. Therefore, there is a need for the effective privacy protection techniques that assure the privacy of the user data in the cloud. Accordingly, this paper proposes a kernel interpolation-based technique for preserving the privacy of the data in the cloud. Privacy and accuracy are the two factors assuring the privacy for the data, which are afforded using the proposed technique that uses the proposed rider-cat swarm optimisation (R-CSO) algorithm for computing the kernel interpolation coefficient, which is associated with affording the privacy in the cloud. The proposed rider-cat swarm optimisation (R-CSO) algorithm is the integration of the standard cat swarm optimisation (CSO) in the standard rider optimisation algorithm (ROA). The analysis of the methods using the dataset from UCI machine learning repository reveals that the proposed method acquired the maximal accuracy and minimal database difference ratio (DBDR) of 80.552% and 15.58%, respectively.
SN Applied Sciences
Food instability has been linked to infertility, health issues, accelerated aging, incorrect insu... more Food instability has been linked to infertility, health issues, accelerated aging, incorrect insulin regulation, and more. Innovative approaches increased food availability and quality. Agriculture environment monitoring systems need IoT and machine learning. IoT sensors provide all necessary data for agriculture production forecast, fertilizer management, smart irrigation, crop monitoring, crop disease diagnosis, and pest control. Precision agriculture may boost crop yields by prescribing the right water-fertilizer-paste ratio. This article presents IOT based fertilizer recommendation system for Smart agriculture. This framework uses IoT devices and sensors to acquire agriculture-related data, and then machine learning is applied to suggest fertilizer in the correct quantity and at the appropriate time. The data acquisition phase collects input data, including soil temperature, moisture, humidity, regions' weather data, and crop details. Features are selected using the Sequenti...
Because there is more demand for freshwater around the world and the world's population is gr... more Because there is more demand for freshwater around the world and the world's population is growing at the same time, there is a severe lack of freshwater resources in the central part of the planet. The world's current population of 7.2 billion people is expected to grow to over 9 billion by the year 2050. The vast majority of freshwater is used for things like cooking, cleaning, and farming. Most industrialised countries are in desperate need of smart irrigation systems, which are now a must-have because of how quickly technology is improving. In article presents IoT based Sensor integrated intelligent irrigation system for agriculture industry. IoT based humidity and soil sensors are used to collect soil related data. This data is stored in a centralized cloud. Features are selected by CFS algorithm. This will help in discarding irrelevant data. Clustering of data is performed by K means algorithm. This will help in keeping similar data together. Then classification model ...
Paladyn, Journal of Behavioral Robotics
Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become ... more Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become an emerging technology in today’s world. To minimize an accessory adaptation for Customer Equipment (CE) in AR, it may be feasible to offload the AR workload onto the onboard devices. Mobile-Edge Computation (MEC) will improve the throughput of a CE. MEC has caused enormous overhead or communication omissions on wireless media, making it difficult to choose the optimal payload proposition. The proposed system explores on-board devices that work together to achieve an AR goal. Code splitting is a Bayesian network used to examine the overall interdependence of efforts. From a longevity and endurance perspective, it is used to reduce the Probability of Supplier Failure (PSF) of an MEC-enabled AR environment. Weighed Particle Swarm Optimization (WPSO) was proposed despite the reality based on the emphasis on balancing the issue. As a result, a heuristic-based WPSO facilitates to improve the ...
International Journal of Next-Generation Computing
A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are var... more A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are various types of tumours, each with its own set of characteristics and treatment plan. The goal of this study is to create a reliable algorithm for detecting tumours in brain MRI images. Image segmentation is critical for detecting brain tumours. One of the most difficult, but crucial, processes is detecting a brain tumour. As a result, accurate segmentation of Magnetic Resonance Imaging (MRI) images is critical for subsequent diagnosis. The ongoing research into automatic detection of brain structures is motivated by a desire to learn more about the connections between the anatomy of brain tissues and various mental and physical disorders in humans. These days, medical professionals are particularly interested in computer-aided technologies that can identify and characterise certain organs or medical characteristics. Using image processing and machine learning, this study proposes a strate...
BioMed Research International
The liver is in charge of a plethora of tasks that are critical to healthy health. One of these r... more The liver is in charge of a plethora of tasks that are critical to healthy health. One of these roles is the conversion of food into protein and bile, which are both needed for digestion. Inhaled and possibly harmful chemicals are flushed from the body. It destroys numerous nutrients acquired through the gastrointestinal system and limits the release of cholesterol by utilizing vitamins, carbohydrates, and minerals stored in the liver. The body’s tissues are made up of tiny structures known as cells. Cells proliferate and divide in order to create new ones in the normal sequence of events. When an old or damaged cell has to be replaced, a new cell must be synthesized. In other circumstances, the procedure is a total and utter failure. If the tissues of dead or damaged cells that have been cleared from the body are not removed, they may give birth to nodules and tumors. The liver can produce two types of tumors: benign and malignant. Malignant tumors are more dangerous to one’s healt...
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)
Cloud computing provides customers with enormous compute power and storage capacity, allowing the... more Cloud computing provides customers with enormous compute power and storage capacity, allowing them to deploy their computation and data-intensive applications without having to invest in infrastructure. Many firms use cloud computing as a means of relocating and maintaining resources outside of their enterprise, regardless of the cloud server's location. However, preserving the data in cloud leads to a number of issues related to data loss, accountability, security etc. Such fears become a great barrier to the adoption of the cloud services by users. Cloud computing offers a high scale storage facility for internet users with reference to the cost based on the usage of facilities provided. Privacy protection of a user's data is considered as a challenge as the internal operations offered by the service providers cannot be accessed by the users. Hence, it becomes necessary for monitoring the usage of the client's data in cloud. In this research, we suggest an effective cloud storage solution for accessing patient medical records across hospitals in different countries while maintaining data security and integrity. In the suggested system, multifactor authentication for user login to the cloud, homomorphic encryption for data storage with integrity verification, and integrity verification have all been implemented effectively. To illustrate the efficacy of the proposed strategy, an experimental investigation was conducted.
Artificial Intelligent Systems and Machine Learning, 2018
Nature has been an unlimited source of motivation to all manhood. Current activities in Soft Comp... more Nature has been an unlimited source of motivation to all manhood. Current activities in Soft Computing is close the progress of technologies which have source and correspondence with biological phenomenon linked with human as evolutionary computation. Soft Computing is combination of several methods as Artificial Neural Network, Fuzzy Logic and Genetic Algorithm. This paper focuses on the search based optimization technique i.e. Genetic Algorithm. Optimization is the scheme of building a something best. The biological concepts of Genetic Algorithm are discussed. Steps required for implementing Genetic Algorithm i.e. Initialization, Encoding, Genetic Operators, Mutation and Termination are described. The traveling Salesman Problem is well-known problem of search based optimization. This problem is considered for discussion. The results are discussed for different number of cities to be travelled with minimum cost function.
Artificial Intelligent Systems and Machine Learning, 2018
This paper presents the basic concepts of Artificial Neural Networks (ANNs) which helps to beginn... more This paper presents the basic concepts of Artificial Neural Networks (ANNs) which helps to beginner of ANN. The history of ANN, different applications of ANN, different learning rules and different types of architectures are discussed in the introductory part of this paper. The architecture of ANN has been described in detail. The McCulloch Pitts model is explained with mathematical equations. The McCulloch Pitts model is implemented for AND, OR, NOT and XOR gate. The algorithms for implementation of above gates have been given. To help users MATLAB code is also given in this paper.
Materials Today: Proceedings, 2022
Tourism is viewed as a major economy booster. Although tourism has a beneficial influence on the ... more Tourism is viewed as a major economy booster. Although tourism has a beneficial influence on the economy in terms of national income generation, job creation, tax revenue generation and foreign exchange generation, it is a multi-segment sector. As a primary goal of higher education institutions, improving student performance is a top priority. Before a performance improvement program can be designed, it is necessary to map the students' current situation. Traditional computer techniques in the IT industry differ from machine learning. To describe or solve a problem, computers utilize a set of well-written instructions. Data inputs for factual research can be prepared using master learning approaches by computers. We'll look at how machine learning can be used in the tourist and education sectors.
BioMed Research International, Jul 26, 2022
The liver is in charge of a plethora of tasks that are critical to healthy health. One of these r... more The liver is in charge of a plethora of tasks that are critical to healthy health. One of these roles is the conversion of food into protein and bile, which are both needed for digestion. Inhaled and possibly harmful chemicals are flushed from the body. It destroys numerous nutrients acquired through the gastrointestinal system and limits the release of cholesterol by utilizing vitamins, carbohydrates, and minerals stored in the liver. The body's tissues are made up of tiny structures known as cells. Cells proliferate and divide in order to create new ones in the normal sequence of events. When an old or damaged cell has to be replaced, a new cell must be synthesized. In other circumstances, the procedure is a total and utter failure. If the tissues of dead or damaged cells that have been cleared from the body are not removed, they may give birth to nodules and tumors. The liver can produce two types of tumors: benign and malignant. Malignant tumors are more dangerous to one's health than benign tumors. This article presents a technique for the classification and identification of liver cancers that is based on image processing and machine learning. The approach may be found here. During the preprocessing stage of picture creation, the fuzzy histogram equalization method is applied in order to bring about a reduction in image noise. After that, the photographs are divided into many parts in order to zero down on the area of interest. For this particular classification task, the RBF-SVM approach, the ANN method, and the random forest method are all applied.
International journal of next-generation computing, Oct 31, 2022
A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are var... more A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are various types of tumours, each with its own set of characteristics and treatment plan. The goal of this study is to create a reliable algorithm for detecting tumours in brain MRI images. Image segmentation is critical for detecting brain tumours. One of the most difficult, but crucial, processes is detecting a brain tumour. As a result, accurate segmentation of Magnetic Resonance Imaging (MRI) images is critical for subsequent diagnosis. The ongoing research into automatic detection of brain structures is motivated by a desire to learn more about the connections between the anatomy of brain tissues and various mental and physical disorders in humans. These days, medical professionals are particularly interested in computer-aided technologies that can identify and characterise certain organs or medical characteristics. Using image processing and machine learning, this study proposes a strategy for the early and accurate detection of brain tumours. The SVM, ANN, and ID3 algorithms are all utilised in some capacity within the context of this framework's procedures for extracting features and segmenting images. Metrics such as accuracy, specificity, and sensitivity are utilised in the evaluation process so that we can determine how well an algorithm performs.
Paladyn, 2023
Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become ... more Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become an emerging technology in today's world. To minimize an accessory adaptation for Customer Equipment (CE) in AR, it may be feasible to offload the AR workload onto the onboard devices. Mobile-Edge Computation (MEC) will improve the throughput of a CE. MEC has caused enormous overhead or communication omissions on wireless media, making it difficult to choose the optimal payload proposition. The proposed system explores on-board devices that work together to achieve an AR goal. Code splitting is a Bayesian network used to examine the overall interdependence of efforts. From a longevity and endurance perspective, it is used to reduce the Probability of Supplier Failure (PSF) of an MEC-enabled AR environment. Weighed Particle Swarm Optimization (WPSO) was proposed despite the reality based on the emphasis on balancing the issue. As a result, a heuristic-based WPSO facilitates to improve the performance measures. A hybrid method could significantly increase the assertion of a predicted PSF in various network scenarios compared to the existing communication technologies. A preliminary iterative approach is suitable for AR operations and IRLC scenarios to generalize the attributes.
International Journal of Advanced Research in Science, Communication and Technology, May 22, 2022
Agriculture is the number one source of livelihood for approximately 58 percent of India’s popula... more Agriculture is the number one source of livelihood for approximately 58 percent of India’s population and is the most crucial part of GDP. Indian farming is based totally on economic advantages from crop yields, but now day’s agricultural generation has failed to verified satisfactory crop choice techniques and to boom crop yield in all over India. So, lower in crop yield will increase the trouble in farmer’s monetary health situations. So, it will become the maximum trending hassle for our agricultural region to invent such noble technique to advocate super appropriate crop for a particular region. To reap high-quality appropriate crop desire for areas primarily based on parameters like soil conditions, rainfall and weather we have got applied gadget studying method. Secondary hassle is lack of understanding or absence of steering even as farming. Lack of guidance in Indian farmers may follow incorrect farming strategies or inefficient traditional strategies. Most of farmers are uneducated and non-technical backgrounds so they'll be relying on conventional crop choice and farming techniques which falls them into reasonable loss. With the assist of disorder assessment tool, we predict the crop disease prediction and propose the precaution from the ones illnesses. Last and most essential hassle isn't any right marketplace assessment at the equal time as cultivation of any unique crop, which can also reason a cheap lack of farmers.
In remote server system, user authentication is an essential requirement. To verify the authentic... more In remote server system, user authentication is an essential requirement. To verify the authenticity of the remote users over insure channel, various authentication methods have been proposed so far. The use of passwords for user authentication is very simple and commonly used method. The password selected by clients may be simple and easy to remember. Hence, it is responsibility of password authentication schemes to securely exchange password related information between server and client over insecure channel. Many password authentication schemes have been published but found susceptible to various attacks. ECC based existing password authentication scheme provides different features and efficient in some way. But it is found that the existing password authentication scheme is vulnerable to offline password guessing attack, stolen verifier attack and denial of service attack. The proposed password authentication scheme is based on ECC and password verifier. ECC is a public key cryptography system better than RSA cryptography because with the same key size, it gives a higher security level than RSA. Proposed scheme allows the client and server to select two random numbers independently and perform computations without exchanging them. Hence the attacker can't guess password from dictionary as he or she is unaware of random numbers selected by the client and server. Proposed password authentication scheme provides prevention scheme for an offline password guessing attack based on ECC. It also helps to securely share id based secret key between client and server.
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), Feb 23, 2022
Cloud computing provides customers with enormous compute power and storage capacity, allowing the... more Cloud computing provides customers with enormous compute power and storage capacity, allowing them to deploy their computation and data-intensive applications without having to invest in infrastructure. Many firms use cloud computing as a means of relocating and maintaining resources outside of their enterprise, regardless of the cloud server's location. However, preserving the data in cloud leads to a number of issues related to data loss, accountability, security etc. Such fears become a great barrier to the adoption of the cloud services by users. Cloud computing offers a high scale storage facility for internet users with reference to the cost based on the usage of facilities provided. Privacy protection of a user's data is considered as a challenge as the internal operations offered by the service providers cannot be accessed by the users. Hence, it becomes necessary for monitoring the usage of the client's data in cloud. In this research, we suggest an effective cloud storage solution for accessing patient medical records across hospitals in different countries while maintaining data security and integrity. In the suggested system, multifactor authentication for user login to the cloud, homomorphic encryption for data storage with integrity verification, and integrity verification have all been implemented effectively. To illustrate the efficacy of the proposed strategy, an experimental investigation was conducted.
Design Engineering, Aug 8, 2021
Design Engineering, Aug 8, 2021
Enterprises always used organizational internal storage system for storing data. Mainly in a Cust... more Enterprises always used organizational internal storage system for storing data. Mainly in a Customer Relational Management i.e. CRM system, the internal storage will be used for storing all the data of the customer. On the other hand, the main drawbacks in the data storage is there may be intruder's in the administrator side and they may acquire all the information about a customer. Above threats can happen in same service provider in a cloud computing environment. To overcome with this kind of challenges in cloud computing, there is need of an innovative algorithmic approach for data security in cloud computing. A CRM (Customer Relational Management) system services is represented in this paper using RC5 algorithm. In the proposed system the party that uses cloud storage services must encrypt data before sending it to cloud while the service provider who is responsible for encryption/decryption of the user's data and then must delete data once encryption/decryption process is completed. In this paper the use of CRM services which demonstrates how the parties involved in secure storage and retrieval when data is saved to the cloud.
International journal of cloud computing, 2020
Recent technological revolution has been reported as the revolution of the cloud computing techno... more Recent technological revolution has been reported as the revolution of the cloud computing technology. The explosive availability of the unstructured data in the cloud has gained the attention of the researchers and the users store their data in the cloud without any right over controlling the data, causing the privacy concerns. Therefore, there is a need for the effective privacy protection techniques that assure the privacy of the user data in the cloud. Accordingly, this paper proposes a kernel interpolation-based technique for preserving the privacy of the data in the cloud. Privacy and accuracy are the two factors assuring the privacy for the data, which are afforded using the proposed technique that uses the proposed rider-cat swarm optimisation (R-CSO) algorithm for computing the kernel interpolation coefficient, which is associated with affording the privacy in the cloud. The proposed rider-cat swarm optimisation (R-CSO) algorithm is the integration of the standard cat swarm optimisation (CSO) in the standard rider optimisation algorithm (ROA). The analysis of the methods using the dataset from UCI machine learning repository reveals that the proposed method acquired the maximal accuracy and minimal database difference ratio (DBDR) of 80.552% and 15.58%, respectively.
SN Applied Sciences
Food instability has been linked to infertility, health issues, accelerated aging, incorrect insu... more Food instability has been linked to infertility, health issues, accelerated aging, incorrect insulin regulation, and more. Innovative approaches increased food availability and quality. Agriculture environment monitoring systems need IoT and machine learning. IoT sensors provide all necessary data for agriculture production forecast, fertilizer management, smart irrigation, crop monitoring, crop disease diagnosis, and pest control. Precision agriculture may boost crop yields by prescribing the right water-fertilizer-paste ratio. This article presents IOT based fertilizer recommendation system for Smart agriculture. This framework uses IoT devices and sensors to acquire agriculture-related data, and then machine learning is applied to suggest fertilizer in the correct quantity and at the appropriate time. The data acquisition phase collects input data, including soil temperature, moisture, humidity, regions' weather data, and crop details. Features are selected using the Sequenti...
Because there is more demand for freshwater around the world and the world's population is gr... more Because there is more demand for freshwater around the world and the world's population is growing at the same time, there is a severe lack of freshwater resources in the central part of the planet. The world's current population of 7.2 billion people is expected to grow to over 9 billion by the year 2050. The vast majority of freshwater is used for things like cooking, cleaning, and farming. Most industrialised countries are in desperate need of smart irrigation systems, which are now a must-have because of how quickly technology is improving. In article presents IoT based Sensor integrated intelligent irrigation system for agriculture industry. IoT based humidity and soil sensors are used to collect soil related data. This data is stored in a centralized cloud. Features are selected by CFS algorithm. This will help in discarding irrelevant data. Clustering of data is performed by K means algorithm. This will help in keeping similar data together. Then classification model ...
Paladyn, Journal of Behavioral Robotics
Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become ... more Improved Reliability and Low Latency Communication (IRLC) with Augmented Reality (AR) has become an emerging technology in today’s world. To minimize an accessory adaptation for Customer Equipment (CE) in AR, it may be feasible to offload the AR workload onto the onboard devices. Mobile-Edge Computation (MEC) will improve the throughput of a CE. MEC has caused enormous overhead or communication omissions on wireless media, making it difficult to choose the optimal payload proposition. The proposed system explores on-board devices that work together to achieve an AR goal. Code splitting is a Bayesian network used to examine the overall interdependence of efforts. From a longevity and endurance perspective, it is used to reduce the Probability of Supplier Failure (PSF) of an MEC-enabled AR environment. Weighed Particle Swarm Optimization (WPSO) was proposed despite the reality based on the emphasis on balancing the issue. As a result, a heuristic-based WPSO facilitates to improve the ...
International Journal of Next-Generation Computing
A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are var... more A tumour, as the name implies, is a tumorous growth of tissue anywhere in the body. There are various types of tumours, each with its own set of characteristics and treatment plan. The goal of this study is to create a reliable algorithm for detecting tumours in brain MRI images. Image segmentation is critical for detecting brain tumours. One of the most difficult, but crucial, processes is detecting a brain tumour. As a result, accurate segmentation of Magnetic Resonance Imaging (MRI) images is critical for subsequent diagnosis. The ongoing research into automatic detection of brain structures is motivated by a desire to learn more about the connections between the anatomy of brain tissues and various mental and physical disorders in humans. These days, medical professionals are particularly interested in computer-aided technologies that can identify and characterise certain organs or medical characteristics. Using image processing and machine learning, this study proposes a strate...
BioMed Research International
The liver is in charge of a plethora of tasks that are critical to healthy health. One of these r... more The liver is in charge of a plethora of tasks that are critical to healthy health. One of these roles is the conversion of food into protein and bile, which are both needed for digestion. Inhaled and possibly harmful chemicals are flushed from the body. It destroys numerous nutrients acquired through the gastrointestinal system and limits the release of cholesterol by utilizing vitamins, carbohydrates, and minerals stored in the liver. The body’s tissues are made up of tiny structures known as cells. Cells proliferate and divide in order to create new ones in the normal sequence of events. When an old or damaged cell has to be replaced, a new cell must be synthesized. In other circumstances, the procedure is a total and utter failure. If the tissues of dead or damaged cells that have been cleared from the body are not removed, they may give birth to nodules and tumors. The liver can produce two types of tumors: benign and malignant. Malignant tumors are more dangerous to one’s healt...
2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)
Cloud computing provides customers with enormous compute power and storage capacity, allowing the... more Cloud computing provides customers with enormous compute power and storage capacity, allowing them to deploy their computation and data-intensive applications without having to invest in infrastructure. Many firms use cloud computing as a means of relocating and maintaining resources outside of their enterprise, regardless of the cloud server's location. However, preserving the data in cloud leads to a number of issues related to data loss, accountability, security etc. Such fears become a great barrier to the adoption of the cloud services by users. Cloud computing offers a high scale storage facility for internet users with reference to the cost based on the usage of facilities provided. Privacy protection of a user's data is considered as a challenge as the internal operations offered by the service providers cannot be accessed by the users. Hence, it becomes necessary for monitoring the usage of the client's data in cloud. In this research, we suggest an effective cloud storage solution for accessing patient medical records across hospitals in different countries while maintaining data security and integrity. In the suggested system, multifactor authentication for user login to the cloud, homomorphic encryption for data storage with integrity verification, and integrity verification have all been implemented effectively. To illustrate the efficacy of the proposed strategy, an experimental investigation was conducted.