Hiren Kumar Thakkar
YOU?
Author Swipe
View article: Ensuring integrity and security of medical image transmission in IoMT using highly imperceptible and robust watermarking approach
Ensuring integrity and security of medical image transmission in IoMT using highly imperceptible and robust watermarking approach Open
With the technological revolution, the Internet of medical things (IoMT) has developed to be of immense benefit. In IoMT, medical images and patients' data are widely transmitted through private/public network. An ideal transmission should…
View article: On the Design of Unstructured Student Feedback Summarization Model using Transformer Architecture for Quality Education
On the Design of Unstructured Student Feedback Summarization Model using Transformer Architecture for Quality Education Open
View article: DOMINER: Domain Feature Mining from Unstructured Data for Effective Text Summarization
DOMINER: Domain Feature Mining from Unstructured Data for Effective Text Summarization Open
View article: Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare
Robust and Secure Medical Image Watermarking for Edge-Enabled e-Healthcare Open
Advancements in networking technologies have enabled doctors to remotely diagnose and monitor patients using the Internet of Medical Things (IoMT), telemedicine, and edge-enabled healthcare. In e-healthcare, medical reports and patient rec…
View article: Student Placement Probabilistic Assessment Using Emotional Quotient With Machine Learning: A Conceptual Case Study
Student Placement Probabilistic Assessment Using Emotional Quotient With Machine Learning: A Conceptual Case Study Open
The primary goal of the proposed study is to measure a student’s Emotional Quotient (EQ) for job placement and to correlate the EQ with the ability of the student to survive in the industry. EQ is expected to be influenced by several demog…
View article: Color Image Retrieval Method Using Low Dimensional Salient Visual Feature Descriptors for IoT Applications
Color Image Retrieval Method Using Low Dimensional Salient Visual Feature Descriptors for IoT Applications Open
Digital data are rising fast as Internet technology advances through many sources, such as smart phones, social networking sites, IoT, and other communication channels. Therefore, successfully storing, searching, and retrieving desired ima…
View article: A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization
A New Robust and Secure 3-Level Digital Image Watermarking Method Based on G-BAT Hybrid Optimization Open
This contribution applies tools from the information theory and soft computing (SC) paradigms to the embedding and extraction of watermarks in aerial remote sensing (RS) images to protect copyright. By the time 5G came along, Internet usag…
View article: On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment
On the Design of Secured and Reliable Dynamic Access Control Scheme of Patient E-Healthcare Records in Cloud Environment Open
Traditional healthcare services have changed into modern ones in which doctors can diagnose patients from a distance. All stakeholders, including patients, ward boy, life insurance agents, physicians, and others, have easy access to patien…
View article: A Decisive Metaheuristic Attribute Selector Enabled Combined Unsupervised-Supervised Model for Chronic Disease Risk Assessment
A Decisive Metaheuristic Attribute Selector Enabled Combined Unsupervised-Supervised Model for Chronic Disease Risk Assessment Open
Advanced predictive analytics coupled with an effective attribute selection method plays a pivotal role in the precise assessment of chronic disorder risks in patients. Traditional attribute selection approaches suffer from premature conve…
View article: Clairvoyant: AdaBoost with Cost-Enabled Cost-Sensitive Classifier for Customer Churn Prediction
Clairvoyant: AdaBoost with Cost-Enabled Cost-Sensitive Classifier for Customer Churn Prediction Open
Customer churn prediction is one of the challenging problems and paramount concerns for telecommunication industries. With the increasing number of mobile operators, users can switch from one mobile operator to another if they are unsatisf…
View article: Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT
Region-Based Hybrid Medical Image Watermarking Scheme for Robust and Secured Transmission in IoMT Open
With the growth in Internet and digital technology, Internet of Medical Things (IoMT) and Telemedicine have become buzzwords in healthcare. A large number of medical images and information is shared through a public network in these applic…
View article: PRMS: Design and Development of Patients’ E-Healthcare Records Management System for Privacy Preservation in Third Party Cloud Platforms
PRMS: Design and Development of Patients’ E-Healthcare Records Management System for Privacy Preservation in Third Party Cloud Platforms Open
In the current digital era, personal data storage on public platforms is a major cause of concern with severe security and privacy ramifications. This is true especially in e-health data management since patient’s health data must be manag…
View article: On the Design of Student Assessment Model Based on Intelligence Quotient Using Machine Learning
On the Design of Student Assessment Model Based on Intelligence Quotient Using Machine Learning Open
The goal of this research is to figure out how to calculate academic achievements and students’ cognitive quotients for placement. This study will attempt to forecast students’ intelligence quotients or academic grades to measure the IQ of…
View article: An Explainable Intelligence Driven Query Prioritization Using Balanced Decision Tree Approach for Multi-Level Psychological Disorders Assessment
An Explainable Intelligence Driven Query Prioritization Using Balanced Decision Tree Approach for Multi-Level Psychological Disorders Assessment Open
Human emotions affect psychological health to a great level. Positive emotions relate to health improvement; whereas negative emotions may aggravate psychological disorders such as anxiety, stress, and depression. Although there exist seve…
View article: Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness
Blind and Secured Adaptive Digital Image Watermarking Approach for High Imperceptibility and Robustness Open
In the past decade, rapid development in digital communication has led to prevalent use of digital images. More importantly, confidentiality issues have also come up recently due to the increase in digital image transmission across the Int…
View article: A Comprehensive Review on Seismocardiogram: Current Advancements on Acquisition, Annotation, and Applications
A Comprehensive Review on Seismocardiogram: Current Advancements on Acquisition, Annotation, and Applications Open
In recent years, cardiovascular diseases are on the rise, and they entail enormous health burdens on global economies. Cardiac vibrations yield a wide and rich spectrum of essential information regarding the functioning of the heart, and t…
View article: Wearable Internet of Cardiac Health (IoCH) Monitoring: The need of the Hour
Wearable Internet of Cardiac Health (IoCH) Monitoring: The need of the Hour Open
In the recent years, the advancements in the wearable sensor technology has made it possible to apply sensor embedded IoT devices such as smart watch, smart glass, smart phone, and smart helmet to monitor the vital cardiac health parameter…
View article: A sustainable IoHT based computationally intelligent healthcare monitoring system for lung cancer risk detection
A sustainable IoHT based computationally intelligent healthcare monitoring system for lung cancer risk detection Open
View article: Predicting clinically significant motor function improvement after contemporary task-oriented interventions using machine learning approaches
Predicting clinically significant motor function improvement after contemporary task-oriented interventions using machine learning approaches Open
View article: MUVINE: Multi-Stage Virtual Network Embedding in Cloud Data Centers Using Reinforcement Learning-Based Predictions
MUVINE: Multi-Stage Virtual Network Embedding in Cloud Data Centers Using Reinforcement Learning-Based Predictions Open
The recent advances in virtualization technology have enabled the sharing of\ncomputing and networking resources of cloud data centers among multiple users.\nVirtual Network Embedding (VNE) is highly important and is an integral part of\nt…
View article: On the Design of an Efficient Cardiac Health Monitoring System Through Combined Analysis of ECG and SCG Signals
On the Design of an Efficient Cardiac Health Monitoring System Through Combined Analysis of ECG and SCG Signals Open
Cardiovascular disease (CVD) is a major public concern and socioeconomic problem across the globe. The popular high-end cardiac health monitoring systems such as magnetic resonance imaging (MRI), computerized tomography scan (CT scan), and…
View article: Pre-Scheduled and Self Organized Sleep-Scheduling Algorithms for Efficient K-Coverage in Wireless Sensor Networks
Pre-Scheduled and Self Organized Sleep-Scheduling Algorithms for Efficient K-Coverage in Wireless Sensor Networks Open
The K-coverage configuration that guarantees coverage of each location by at least K sensors is highly popular and is extensively used to monitor diversified applications in wireless sensor networks. Long network lifetime and high detectio…
View article: A Cardiac Early Warning System with Multi Channel SCG and ECG Monitoring for Mobile Health
A Cardiac Early Warning System with Multi Channel SCG and ECG Monitoring for Mobile Health Open
Use of information and communication technology such as smart phone, smart watch, smart glass and portable health monitoring devices for healthcare services has made Mobile Health (mHealth) an emerging research area. Coronary Heart Disease…