Manish Prateek
YOU?
Author Swipe
View article: An efficient algorithmic framework to minimize the summand matrix in binary multiplication
An efficient algorithmic framework to minimize the summand matrix in binary multiplication Open
Binary multiplication is a key operation in digital systems, often limited by the complexity of generating and summing numerous partial products. Traditional methods, like Booth’s algorithm, produce a summand matrix proportional to the ope…
View article: IDM STRATEGIES FOR MANAGING POTATO CROP DISEASES IN KEY REGIONS OF UTTAR PRADESH
IDM STRATEGIES FOR MANAGING POTATO CROP DISEASES IN KEY REGIONS OF UTTAR PRADESH Open
Solanum tuberosum L., or potato, is one of the world's most important staple crops, and India ranks at the second position in the list after China. At the state level, Uttar Pradesh is on the first position with 15,812.62 thousand metric t…
View article: A Comparative Analysis of CNN-based Deep Learning Models for Semantic Segmentation of PolSAR data
A Comparative Analysis of CNN-based Deep Learning Models for Semantic Segmentation of PolSAR data Open
The advent of Deep Learning models for computer vision problems has opened the floodgates of opportunities.The same deep learning models have been highly effective in solving many challenges in the field of remote sensing and geoinformatic…
View article: A Novel Design of Hybrid Fuzzy Poisson Fractional Order Proportional Integral Derivative Controller for the Wind Driven Permanent Magnet Synchronous Generator
A Novel Design of Hybrid Fuzzy Poisson Fractional Order Proportional Integral Derivative Controller for the Wind Driven Permanent Magnet Synchronous Generator Open
The article presents the design and implementation of a hybrid fuzzy poisson fractional order proportional integral derivative controller (h-FL-PO-FPID controller) in the wind-driven permanent magnet synchronous generator (PMSG). The h-FL-…
View article: Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs
Hybrid Genetic Firefly Algorithm-Based Routing Protocol for VANETs Open
Vehicular Adhoc Networks (VANETs) are used for efficient communication among the vehicles to vehicle (V2V) infrastructure. Currently, VANETs are facing node management, security, and routing problems in V2V communication. Intelligent trans…
View article: Semantic segmentation of PolSAR image data using advanced deep learning model
Semantic segmentation of PolSAR image data using advanced deep learning model Open
View article: WITHDRAWN: PBeiD Priority-based Information Dissemination Protocol for V2V Communication
WITHDRAWN: PBeiD Priority-based Information Dissemination Protocol for V2V Communication Open
In Vehicular Ad-hoc Networks (VANET)s, efficient information dissemination plays a vital role in its successful deployment. Broadcasting has proven as one of the better ways for Information Dissemination over vehicular Networks, and cooper…
View article: Index
Index Open
internet of everything.see
View article: Prediction of Interpolants in Zero Diluted Images
Prediction of Interpolants in Zero Diluted Images Open
This paper provides an algorithmic procedure to predict interpolants of zero diluted images. Given a digital image, one can zero dilute it by right adjoining a column consisting of ‘0s’ to every column except the last column and inserting …
View article: Multi-Dimensional Rajan Transform
Multi-Dimensional Rajan Transform Open
In this paper, we describe the formulation of a novel transform called Multi-Dimensional Rajan Transform, which is an extension of Rajan Transform. Basically, Rajan Transform operates on a number sequence, whose length is a power of two. I…
View article: SUBSURFACE IMAGING USING GROUND PENETRATING RADAR FOR UNDERGROUND OIL AND MINERALS EXPLORATION
SUBSURFACE IMAGING USING GROUND PENETRATING RADAR FOR UNDERGROUND OIL AND MINERALS EXPLORATION Open
A drilling company operates in accordance with a contract which specifies that an oil well will be drilled to a specific depth. The average cost to find and develop an oil and gas property in the United States is $17.01/ barrels-of-oil-equ…
View article: Set Theoretic Rajan Transform and its Properties
Set Theoretic Rajan Transform and its Properties Open
In this paper, we describe the formulation of a novel transform called Set Theoretic Rajan Transform (STRT) which is an extension of Rajan Transform (RT). RT is a coding morphism by which a number sequence (integer, rational, real, or comp…
View article: A V2I BASED APPROACH TO MULTICAST IN VEHICULAR NETWORKS
A V2I BASED APPROACH TO MULTICAST IN VEHICULAR NETWORKS Open
The present research work proposes a novel approach for efficient information dissemination in Vehicular Networks using V2I based communication. This approach makes use of the V2I communication to establish the connectivity between the clo…
View article: Comparative Study of Learning and Execution of Bipedal by Using Forgetting Mechanism in Reinforcement Learning Algorithm
Comparative Study of Learning and Execution of Bipedal by Using Forgetting Mechanism in Reinforcement Learning Algorithm Open
A bipedal which resembles humans are programmed for performing specific tasks.The proposed work scope was to design, program, and validate RL based algorithms for navigation of Bipedal walking.The bipedal navigation implements forgetting m…
View article: Localization of Nuclei in Breast Cancer Using Whole Slide Imaging System Supported by Morphological Features and Shape Formulas
Localization of Nuclei in Breast Cancer Using Whole Slide Imaging System Supported by Morphological Features and Shape Formulas Open
Anil Kumar, Manish Prateek School of Computer Science, University of Petroleum and Energy Studies, Dehradun 248007, IndiaCorrespondence: Anil Kumar Email [email protected]: Cancer rates are exponentially increasing worldwide…
View article: <p>Localization of Nuclei in Breast Cancer Using Whole Slide Imaging System Supported by Morphological Features and Shape Formulas</p>
Localization of Nuclei in Breast Cancer Using Whole Slide Imaging System Supported by Morphological Features and Shape Formulas Open
With the help of the k-means clustering algorithm, morphological features, and shape formula, it is possible to recognize the region of interest using the whole slide imaging concept.
View article: Swarm Intelligence Based Algorithm for Efficient Routing in VANET
Swarm Intelligence Based Algorithm for Efficient Routing in VANET Open
Many recent researchers are working to optimize solutions in the field of Vehicular Adhoc Network. However, none of them has yet claimed that it will fulfill all the challenges of such a dynamic region. VANET in itself is a complete area o…
View article: Automated Detection and Classification of Ki-67 Stained Nuclear Section Using Machine Learning Based on Texture of Nucleus to Measure Proliferation Score for Prognostic Evaluation of Breast Carcinoma
Automated Detection and Classification of Ki-67 Stained Nuclear Section Using Machine Learning Based on Texture of Nucleus to Measure Proliferation Score for Prognostic Evaluation of Breast Carcinoma Open
Background: This study aimed significance of Ki-67 labels and calculated the proliferation score based on the counting of immunopositive and immunonegative nuclear sections with the help of machine learning to predict the intensity of brea…
View article: Secure Cloud Data Audit using Protocol and Digital Signature Techniques
Secure Cloud Data Audit using Protocol and Digital Signature Techniques Open
Cloud computing is one of the important business models in the modern Information Technology. It provides various services (hardware, software) to the users with minimal interaction and low-cost. Storage service is one of the most useful s…
View article: An Efficient Path Planning Algorithm for Networked Robots using Modified Optimization Algorithm
An Efficient Path Planning Algorithm for Networked Robots using Modified Optimization Algorithm Open
Path planning has played a significant role in major numerous decision-making techniques through an automatic system involved in numerous military applications. In the last century, pathfinding and generation were carried out by multiple i…
View article: Data Security Measures using Hybrid Encryption Technique
Data Security Measures using Hybrid Encryption Technique Open
Data security is a process of enhancing the data privacy measures to filebase, database, websites while preventing unauthorized access to the datasets and data-streams. Encryption is the key data security technique that prevents the access…
View article: Swarm Intelligence based efficient routing algorithm for platooning in VANET through Ant Colony Optimization
Swarm Intelligence based efficient routing algorithm for platooning in VANET through Ant Colony Optimization Open
Today’s era is of smart technology, Computing intelligence and simulations. Many areas are now fully depended on simulation results for implementing real time workflow. Worldwide researchers and many automobile consortium are working to ma…
View article: Design, development and deployment of a RSSI based wireless network for post disaster management
Design, development and deployment of a RSSI based wireless network for post disaster management Open
The wide spectrum of applications of wireless sensor networks in real time monitoring of disaster prone areas makes it very promising and reliable. The present work focuses on communication link establishment for the first 72 hours just af…
View article: Wireless Sensor Node Localization based on LNSM and Hybrid TLBO- Unilateral technique for Outdoor Location
Wireless Sensor Node Localization based on LNSM and Hybrid TLBO- Unilateral technique for Outdoor Location Open
The paper aims at localization of the anchor node (fixed node) by pursuit nodes (movable node) in outdoor location. Two methods are studied for node localization. The first method is based on LNSM (Log Normal Shadowing Model) technique to …
View article: Cloud Computing: Overview and its Deployment Model
Cloud Computing: Overview and its Deployment Model Open
We live in the era of gigantic complexity.With the daze elevation in technology, the IT infrastructure has remoulded to the core.However, in the fullness of time the epoch of cloud computing is now arising also acknowledged as on-demand co…
View article: Vehicular Adhoc Network (VANET) - An Introduction
Vehicular Adhoc Network (VANET) - An Introduction Open
International audience
View article: Kinematic Modelling of Multi-Terrain Pine Needle Collecting Robot (PiNCoR) for the Hilly areas of Uttarakhand
Kinematic Modelling of Multi-Terrain Pine Needle Collecting Robot (PiNCoR) for the Hilly areas of Uttarakhand Open
Uttarakhand – a northern state of India in the foothills of Himalayas has approximately 64.8% of forest. Pine (Pinus roxburghii) is an important tree species which is because of its numerous uses becomes more prominent in this hil…
View article: Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing
Graph Structured Data Security using Trusted Third Party Query Process in Cloud Computing Open
Cloud computing enables the users to outsource and access data economically from the distributed cloud server.Once the data leaves from data owner premises, there is no privacy guarantee from the untrusted parties in cloud storage system.P…