Sanjay Kumar
YOU?
Author Swipe
View article: Crop Identification by using Real Time Object Detection
Crop Identification by using Real Time Object Detection Open
View article: Machine Learning Based Prediction of Chronic Liver Disease using Integrated Projection with Feature Extraction Method
Machine Learning Based Prediction of Chronic Liver Disease using Integrated Projection with Feature Extraction Method Open
View article: Modelling of integrated bio-dynamic human model with full car using bond graph for IRC:99-1988 bump
Modelling of integrated bio-dynamic human model with full car using bond graph for IRC:99-1988 bump Open
View article: Classification of white blood cells (leucocytes) from blood smear imagery using machine and deep learning models: A global scoping review
Classification of white blood cells (leucocytes) from blood smear imagery using machine and deep learning models: A global scoping review Open
Machine learning (ML) and deep learning (DL) models are being increasingly employed for medical imagery analyses, with both approaches used to enhance the accuracy of classification/prediction in the diagnoses of various cancers, tumors an…
View article: A Statistical Fractal Diffie-Hellman Key Exchange Authentication Protocol for Intelligent IoT Irrigation Systems
A Statistical Fractal Diffie-Hellman Key Exchange Authentication Protocol for Intelligent IoT Irrigation Systems Open
Encourage the use of sensors in the intelligent interconnected future, we use statistical fractal analysis to create a network of wireless sensors (WSN) key distribution simulation.Among the wireless sensor networks is growing technologies…
View article: HumourHindiNet: Humour detection in Hindi web series using word embedding and convolutional neural network
HumourHindiNet: Humour detection in Hindi web series using word embedding and convolutional neural network Open
Humour is a crucial aspect of human speech, and it is, therefore, imperative to create a system that can offer such detection. While data regarding humour in English speech is plentiful, the same cannot be said for a low-resource language …
View article: LLMEra: Impact of Large Language Models
LLMEra: Impact of Large Language Models Open
View article: Modelling of integrated bio-dynamic human model with full car using bond graph for IRC:99-1988 bump
Modelling of integrated bio-dynamic human model with full car using bond graph for IRC:99-1988 bump Open
View article: Resp-BoostNet: Mental Stress Detection From Biomarkers Measurable by Smartwatches Using Boosting Neural Network Technique
Resp-BoostNet: Mental Stress Detection From Biomarkers Measurable by Smartwatches Using Boosting Neural Network Technique Open
To maintain overall health and well-being, it is crucial to manage mental stress. This study focuses on developing a deep learning model for recognizing mental stress levels using the sensors of smartwatches. Most related research with not…
View article: Negative Stances Detection from Multilingual Data Streams in Low-Resource Languages on Social Media Using BERT and CNN-Based Transfer Learning Model
Negative Stances Detection from Multilingual Data Streams in Low-Resource Languages on Social Media Using BERT and CNN-Based Transfer Learning Model Open
Online social media allows users to connect with a large number of people across the globe and facilitate the exchange of information efficiently. These platforms cater to many of our day-to-day needs. However, at the same time, social med…
View article: Classification of All Blood Cell Images using ML and DL Models
Classification of All Blood Cell Images using ML and DL Models Open
Human blood primarily comprises plasma, red blood cells, white blood cells, and platelets. It plays a vital role in transporting nutrients to different organs, where it stores essential health-related data about the human body. Blood cells…
View article: Stock Market Prediction using RNN-based Models with Random and Tuned Hyperparameters
Stock Market Prediction using RNN-based Models with Random and Tuned Hyperparameters Open
The stock market in India has become more passionate in recent years.Because of the maneuverability of the stock market, it is also difficult to predict future trends and patterns in the stock market.Various Deep Learning (DL) methods, suc…
View article: Fuzz-ClustNet: Coupled fuzzy clustering and deep neural networks for Arrhythmia detection from ECG signals
Fuzz-ClustNet: Coupled fuzzy clustering and deep neural networks for Arrhythmia detection from ECG signals Open
Electrocardiogram (ECG) is a widely used technique to diagnose cardiovascular diseases. It is a non-invasive technique that represents the cyclic contraction and relaxation of heart muscles. ECG can be used to detect abnormal heart motions…
View article: COVID-19 Detection from Chest X-rays Using Trained Output Based Transfer Learning Approach
COVID-19 Detection from Chest X-rays Using Trained Output Based Transfer Learning Approach Open
View article: SIRA: a model for propagation and rumor control with epidemic spreading and immunization for healthcare 5.0
SIRA: a model for propagation and rumor control with epidemic spreading and immunization for healthcare 5.0 Open
View article: HM2LP: Hybrid Multilevel Multihop LEACH Protocol for Conserving Energy in Large Area WSN
HM2LP: Hybrid Multilevel Multihop LEACH Protocol for Conserving Energy in Large Area WSN Open
Wireless Sensor Network (WSN) for a large area is the need of the hour due to ever-growing demand on the fly services in different application fields.More senders deployed in a large area will generate an enormous amount of data and will c…
View article: A Beginning to Existing: Understanding Colin Wilson’s “Outsiderism” in ‘Ritual In The Dark’ - An Eastern Perspective
A Beginning to Existing: Understanding Colin Wilson’s “Outsiderism” in ‘Ritual In The Dark’ - An Eastern Perspective Open
The phenomenon of “Outsiderism” found in the works of Colin Wilson has both individual and social implications which are intrinsically evolutionary. Wilson takes a stock of this ‘evolutionary man’ and concludes that ‘outsider is a god in m…
View article: Timer Based Optimized Clustering for Lifetime Enhancement in WSN
Timer Based Optimized Clustering for Lifetime Enhancement in WSN Open
The energy of a wireless sensor network is crucial.Energy optimization is one of the key areas where research is being conducted.The upgraded technology in wireless sensor network (WSN) protocols has been seen tending towards clustering of…
View article: Identifying Influential Nodes in Weighted Networks using k-shell based HookeRank Algorithm
Identifying Influential Nodes in Weighted Networks using k-shell based HookeRank Algorithm Open
Finding influential spreaders is a crucial task in the field of network analysis because of numerous theoretical and practical importance. These nodes play vital roles in the information diffusion process, like viral marketing. Many real-l…
View article: Modeling information diffusion in online social networks using a modified forest-fire model
Modeling information diffusion in online social networks using a modified forest-fire model Open
View article: Reinforcement Learning for Attack Mitigation in SDN-enabled Networks
Reinforcement Learning for Attack Mitigation in SDN-enabled Networks Open
With the recent progress in the development of low-budget sensors and machine-to-machine communication, the Internet-of-Things has attracted considerable attention. Unfortunately, many of today's smart devices are rushed to market with lit…
View article: Modeling Information Diffusion In Online Social Networks Using SEI Epidemic Model
Modeling Information Diffusion In Online Social Networks Using SEI Epidemic Model Open
Social networks act as a great platform for information diffusion where millions of people can exchange information. With the advent of online social networks, spread of information has escalated, thus, making social networks an interestin…
View article: Identification of Influential Spreaders in Social Networks using Improved Hybrid Rank Method
Identification of Influential Spreaders in Social Networks using Improved Hybrid Rank Method Open
Online Social Networks provide us a gateway towards valuable information regarding personal preferences, interests, and connections. Ranking nodes by centrality measures help us to identify some of the most critical and influential nodes i…
View article: Identifying Influential Spreaders On a Weighted Network Using HookeRank Method
Identifying Influential Spreaders On a Weighted Network Using HookeRank Method Open
View article: Deep in the Dark: A Novel Threat Detection System using Darknet Traffic
Deep in the Dark: A Novel Threat Detection System using Darknet Traffic Open
This paper proposes a threat detection system based on Machine Learning classifiers that are trained using darknet traffic. Traffic destined to Darknet is either malicious or by misconfiguration. Darknet traffic contains traces of several …
View article: A Survey Study of Various Software Cost Effort Estimation in Perspective of India
A Survey Study of Various Software Cost Effort Estimation in Perspective of India Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Extraction of Syntactically Similar Sentences from Huge Corpus for Language Research
Extraction of Syntactically Similar Sentences from Huge Corpus for Language Research Open
View article: An Investigation of List Heuristic Scheduling Algorithms for Multiprocessor System
An Investigation of List Heuristic Scheduling Algorithms for Multiprocessor System Open
The problem of obtaining an optimal scheduling of dependent tasks in homogeneous multiprocessor system is well known as an NP-hard problem. Heuristic is the best way to solve this problem. In a homogeneous multiprocessor system, task execu…
View article: A Network-Based Framework for Mobile Threat Detection
A Network-Based Framework for Mobile Threat Detection Open
Mobile malware attacks increased three folds in the past few years and continued to expand with the growing number of mobile users. Adversary uses a variety of evasion techniques to avoid detection by traditional systems, which increase th…
View article: Evaluation of ensemble machine learning methods in mobile threat detection
Evaluation of ensemble machine learning methods in mobile threat detection Open
The rapid growing trend of mobile devices continues to soar causing massive increase in cyber security threats. Most pervasive threats include ransom-ware, banking malware, premium SMS fraud. The solitary hackers use tailored techniques to…