Amit Kumar Tyagi
YOU?
Author Swipe
View article: Blockchain for smart finance: A review of architectures, integration trends and future research directions
Blockchain for smart finance: A review of architectures, integration trends and future research directions Open
View article: Comparative Analysis of Drought Indices for Different Climatic Zones in Benin
Comparative Analysis of Drought Indices for Different Climatic Zones in Benin Open
The Standardized Precipitation Index (SPI) and the Standardized Precipitation Evapotranspiration Index (SPEI) are essential indices for assessing drought characteristics. This study evaluates the performance of SPI and SPEI across three cl…
View article: Optimizing Heart Disease Prediction with Feature Sensitivity and Risk Reduction Strategies Using Machine Learning Classifiers
Optimizing Heart Disease Prediction with Feature Sensitivity and Risk Reduction Strategies Using Machine Learning Classifiers Open
View article: An Energy Efficient based Optical Network using Cloud Computing Techniques under an Improved Layer of Honeypots for Security
An Energy Efficient based Optical Network using Cloud Computing Techniques under an Improved Layer of Honeypots for Security Open
Energy proficiency is significant for optical organizations regarding versatility, minimal expense activity, and maintainability.Understanding energy with regards to optical organizations starts with a comprehension of the constituent part…
View article: A blockchain-based deep learning approach for cyber security in next-generation medical cyber-physical systems
A blockchain-based deep learning approach for cyber security in next-generation medical cyber-physical systems Open
Cyber-physical systems (CPSs) have been employed to seamlessly integrate numerous processes and physical components with integrated computing facilities and data storage, aiming to achieve a heightened level of effectiveness and efficiency…
View article: An Overview of Quantum Computing–Based Hidden Markov Models
An Overview of Quantum Computing–Based Hidden Markov Models Open
The basic concept of Markov chains has been known to mathematicians and engineers for the last 80 years, but it was only in the last decade that it was directly applied to speech processing difficulties. One of the significant reasons why …
View article: Autonomous face mask detection using single shot multibox detector, and ResNet-50 with identity retrieval through face matching using deep siamese neural network
Autonomous face mask detection using single shot multibox detector, and ResNet-50 with identity retrieval through face matching using deep siamese neural network Open
View article: Evaluating the Utility of Stroboscopic Research Instrument in the Diagnosis of Laryngopharyngeal Reflex
Evaluating the Utility of Stroboscopic Research Instrument in the Diagnosis of Laryngopharyngeal Reflex Open
Objectives: To evaluate the role of Stroboscopic research instrument in the diagnosis of laryngopharyngeal reflex patients. Methods:Patients coming to otorhinolaryngology OPD after informed consent were grouped into cases and controls acco…
View article: Blockchain—Internet of Things Applications: Opportunities and Challenges for Industry 4.0 and Society 5.0
Blockchain—Internet of Things Applications: Opportunities and Challenges for Industry 4.0 and Society 5.0 Open
Today, blockchain is becoming more popular in academia and industry because it is a distributed, decentralised technology which is changing many industries in terms of security, building trust, etc. A few blockchain applications are bankin…
View article: Metastasis to Thyroid Gland from Neuroendocrine Carcinoma of Endometrium: A Rare Entity
Metastasis to Thyroid Gland from Neuroendocrine Carcinoma of Endometrium: A Rare Entity Open
View article: Occipital Artery-Based Fascio-Cutaneous Pedicle Flap in Reconstruction of Head and Neck Defects: A Saviour Under Challenging Times
Occipital Artery-Based Fascio-Cutaneous Pedicle Flap in Reconstruction of Head and Neck Defects: A Saviour Under Challenging Times Open
View article: Correction to: Fabrication of Three-Dimensional Bioactive Composite Scaffolds for Hemostasis and Wound Healing
Correction to: Fabrication of Three-Dimensional Bioactive Composite Scaffolds for Hemostasis and Wound Healing Open
View article: Index
Index Open
criteria recommender system, 54 customer satisfaction, 57 discovery, 58 personalization, 57 provide reports, 58 revenue, 57 AI-as-a-service, 104 Alzheimer's disease (AD), 208-210 prediction of, 215, 217-220 various algorithms on detection …
View article: Human Activity Recognition Using Cell Phone-Based Accelerometer and Convolutional Neural Network
Human Activity Recognition Using Cell Phone-Based Accelerometer and Convolutional Neural Network Open
Human Activity Recognition (HAR) has become an active field of research in the computer vision community. Recognizing the basic activities of human beings with the help of computers and mobile sensors can be beneficial for numerous real-li…
View article: A simple, effective distance and density based outlier detection algorithm
A simple, effective distance and density based outlier detection algorithm Open
Outliers are eccentric data points with anomalous nature. Clustering with outliers has received a lot of attention in the data processing community. But, they inordinately affect the quality of the results obtained in case of popular clust…
View article: Deadly Dual Fungal Infections in a Chronic Kidney Disease Patient
Deadly Dual Fungal Infections in a Chronic Kidney Disease Patient Open
View article: Cyber Physical Systems: Analyses, challenges and possible solutions
Cyber Physical Systems: Analyses, challenges and possible solutions Open
It is becoming more difficult to protect the authentication of our data in today's world of smart living. On the one hand, we are able to live in smart homes and smart cities with ease. Even if we use the most complicated passwords, we can…
View article: Autonomous Intelligent Vehicles (AIV): Research statements, open issues, challenges and road for future
Autonomous Intelligent Vehicles (AIV): Research statements, open issues, challenges and road for future Open
View article: AARIN: Affordable, accurate, reliable and innovative mechanism to protect a medical cyber-physical system using blockchain technology
AARIN: Affordable, accurate, reliable and innovative mechanism to protect a medical cyber-physical system using blockchain technology Open
The enhancement (in the past decade) in electronics devices/technology, a rise in most of the accidents concerning security and surveillance intruding the private lives of the users question the existing systems being used to combat this c…
View article: Twitter user’s Behavior and Events Affecting Their Mood
Twitter user’s Behavior and Events Affecting Their Mood Open
Sentiment Analysis is an art to analyze and understand the human behavior. The analysis could be done for any purpose such as e-commerce, business analysis/revenues, detecting latest trends and analyzing reviews. The major work done was re…
View article: Trust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review
Trust and Reputation Mechanisms in Vehicular Ad-Hoc Networks: A Systematic Review Open
An emerging trend has been observed in the Trust and Reputation (T & R) systems in field of decision-making support for a majority of the provisions propagated by the Internet.It is the extreme importance that peers (users) are able to tru…
View article: An Earth mover's distance-based undersampling approach for handling class-imbalanced data
An Earth mover's distance-based undersampling approach for handling class-imbalanced data Open
Imbalanced datasets typically make prediction accuracy difficult. Most of the real-world data are imbalanced in nature. The traditional classifiers assume a well-balanced class distribution for training data but in practical datasets show …
View article: Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security
Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security Open
In recent years, cyber security has been received interest from several research communities with respect to Intrusion Detection System (IDS).Cyber security is "a fast-growing field demanding a great deal of attention because of remarkable…
View article: An Earth mover's distance-based undersampling approach for handling class-imbalanced data
An Earth mover's distance-based undersampling approach for handling class-imbalanced data Open
Imbalanced datasets typically make prediction accuracy difficult. Most of the real-world data are imbalanced in nature. The traditional classifiers assume a well-balanced class distribution for training data but in practical datasets show …
View article: A novel approach for solving skewed classification problem using cluster based ensemble method
A novel approach for solving skewed classification problem using cluster based ensemble method Open
In numerous real-world applications, the class imbalance problem is prevalent. When training samples of one class immensely outnumber samples of the other classes, the traditional machine learning algorithms show bias towards the majority …
View article: Role of Emerging Technologies in COVID 19: Analyses, Predictions, and Future Countermeasures
Role of Emerging Technologies in COVID 19: Analyses, Predictions, and Future Countermeasures Open
View article: A Wide Scale Classification of Class Imbalance Problem and its Solutions: A Systematic Literature Review
A Wide Scale Classification of Class Imbalance Problem and its Solutions: A Systematic Literature Review Open
In today’s world, most of the data (real world) is present in imbalanced form by nature. This is because of not having efficient algorithms to put this data (i.e., generated data by billion of internet- connected devices (IoTs)) in r…
View article: Medical Cyber Physical Systems and Its Issues
Medical Cyber Physical Systems and Its Issues Open
In the previous decade, many technologies have attracted attention from several research communities. Internet of Things (IoT) is main invention of the recent/ past decade. When these smart devices or internet connected devices are interac…
View article: The Qualitative Study on Input – Output Channel Configurations in Wireless Body Area Network
The Qualitative Study on Input – Output Channel Configurations in Wireless Body Area Network Open
Increasing interest in wireless networks and the electrical devices with the help of semiconductor technology has empowered the active participation of people in the development of Wireless Body Area Networks. Sensor network's environment …
View article: Performance Analysis of Under-Sampling and Over-Sampling Techniques for Solving Class Imbalance Problem
Performance Analysis of Under-Sampling and Over-Sampling Techniques for Solving Class Imbalance Problem Open