Mohit Mittal
YOU?
Author Swipe
View article: A DEMATEL-Based Framework for Combating Digital Piracy in Media & Entertainment Industry through Blockchain: A Critical Success Factor Analysis
A DEMATEL-Based Framework for Combating Digital Piracy in Media & Entertainment Industry through Blockchain: A Critical Success Factor Analysis Open
The media and entertainment sector remain under threat from digital piracy, with an estimated annual revenue loss of over USD 30 billion resulting from the illegal distribution and consumption of digital content. Blockchain technology (BT)…
View article: ETHICAL CHALLENGES IN AI-BASED HEALTHCARE: BALANCING INNOVATION WITH PATIENT PRIVACY AND FAIRNESS
ETHICAL CHALLENGES IN AI-BASED HEALTHCARE: BALANCING INNOVATION WITH PATIENT PRIVACY AND FAIRNESS Open
View article: NEXT-GENERATION CRM IN HEALTHCARE: THE ROLE OF AI, PREDICTIVE ANALYTICS, AND PATIENT JOURNEY MAPPING
NEXT-GENERATION CRM IN HEALTHCARE: THE ROLE OF AI, PREDICTIVE ANALYTICS, AND PATIENT JOURNEY MAPPING Open
View article: AI-DRIVEN CLINICAL DECISION SUPPORT SYSTEMS: EVALUATING IMPACT ON DIAGNOSIS AND TREATMENT ACCURACY
AI-DRIVEN CLINICAL DECISION SUPPORT SYSTEMS: EVALUATING IMPACT ON DIAGNOSIS AND TREATMENT ACCURACY Open
View article: DEEP LEARNING MODELS FOR AUTOMATED MEDICAL IMAGING: ACCURACY, ETHICS, AND DEPLOYMENT CHALLENGES
DEEP LEARNING MODELS FOR AUTOMATED MEDICAL IMAGING: ACCURACY, ETHICS, AND DEPLOYMENT CHALLENGES Open
View article: AI IN HEALTHCARE: THE NEXT FRONTIER IN MEDICAL DIAGNOSIS
AI IN HEALTHCARE: THE NEXT FRONTIER IN MEDICAL DIAGNOSIS Open
View article: Randomness in quantum random number generator from vacuum fluctuations with source-device-independence
Randomness in quantum random number generator from vacuum fluctuations with source-device-independence Open
The application for random numbers is ubiquitous. We experimentally build a well-studied quantum random number generator from homodyne measurements on the quadrature of the vacuum fluctuations. Semi-device-independence in this random numbe…
View article: Simulations of distributed-phase-reference quantum key distribution protocols
Simulations of distributed-phase-reference quantum key distribution protocols Open
Quantum technology can enable secure communication for cryptography purposes using quantum key distribution. Quantum key distribution protocols provide a secret key between two users with security guaranteed by the laws of quantum mechanic…
View article: A Blockchain Enabled Solution for Royalty Tracking in Movies and Music Industry
A Blockchain Enabled Solution for Royalty Tracking in Movies and Music Industry Open
View article: Modeling and parameters optimization of biocomposite using box-Behnken response surface methodology
Modeling and parameters optimization of biocomposite using box-Behnken response surface methodology Open
The primary objective of this work includes modeling and optimization of the mechanical properties of natural fiber biocomposites using three-factor, three-level Box-Behnken design (BBD). In this context, the effect of three independent pe…
View article: Severe Acute Epididymo-orchitis Complicated with Testicular Necrosis
Severe Acute Epididymo-orchitis Complicated with Testicular Necrosis Open
Acute epididymo-orchitis (EO) (the inflammation of one or both testes and epidermis) is an emergency condition that usually responds to conservative management and is diagnosed based on symptoms and clinical examination. The diagnosis is u…
View article: A Secure Multi-factor Authentication Protocol for Healthcare Services Using燙loud-based SDN
A Secure Multi-factor Authentication Protocol for Healthcare Services Using燙loud-based SDN Open
Cloud-based SDN (Software Defined Network) integration offers new kinds of agility, flexibility, automation, and speed in the network. Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized b…
View article: An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches
An efficient quality of services based wireless sensor network for anomaly detection using soft computing approaches Open
View article: Quantum Machine Learning: Harnessing Quantum Algorithms for Supervised and Unsupervised Learning
Quantum Machine Learning: Harnessing Quantum Algorithms for Supervised and Unsupervised Learning Open
Quantum machine learning (QML) provides a transformative approach to data analysis by integrating the principles of quantum computing with classical machine learning methods. With the exponential growth of data and the increasing complexit…
View article: A Self-Adaptable Angular Based K-Medoid Clustering Scheme (SAACS) for Dynamic VANETs
A Self-Adaptable Angular Based K-Medoid Clustering Scheme (SAACS) for Dynamic VANETs Open
Prior study suggests that VANET has two types of communications: Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communications. V2V is very important and ensures cooperative communications between vehicles and safety measures…
View article: Modeling and performance optimization of starch-based biocomposite films using response surface methodology
Modeling and performance optimization of starch-based biocomposite films using response surface methodology Open
The primary objective of this study is to optimize the significant parameters (filler type, filler size, and content) for improving the performance of starch-based biocomposite films. The mathematical and statistical tools such as response…
View article: The Metaverse and Web3: A New Era of Decentralized Digital Ecosystems
The Metaverse and Web3: A New Era of Decentralized Digital Ecosystems Open
This intersection of Web3 technology and the metaverse constitutes a major leap into decentralized digital environments. Web3, which is based on blockchain technology, offers a user-centric architecture that allows users to own and control…
View article: Investigating the Use of Spatialized Audio Augmented Reality to Enhance the Outdoor Running Experience
Investigating the Use of Spatialized Audio Augmented Reality to Enhance the Outdoor Running Experience Open
View article: A Technology Acceptance Model-Based Analytics for Online Mobile Games Using Machine Learning Techniques
A Technology Acceptance Model-Based Analytics for Online Mobile Games Using Machine Learning Techniques Open
In recent years, the enhancement in technology has been envisioning for people to complete tasks in an easier way. Every manufacturing industry requires heavy machinery to accomplish tasks in a symmetric and systematic way, which is much e…
View article: Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks
Machine Learning Techniques for Energy Efficiency and Anomaly Detection in Hybrid Wireless Sensor Networks Open
Wireless sensor networks (WSNs) are among the most popular wireless technologies for sensor communication purposes nowadays. Usually, WSNs are developed for specific applications, either monitoring purposes or tracking purposes, for indoor…
View article: Malaria detection using deep residual networks with mobile microscopy
Malaria detection using deep residual networks with mobile microscopy Open
Automatic segmentation of erythrocytes in microscopic blood smear phone images is a critical step to visualize and identify malaria using machine learning technologies. However, it still remains a challenging problem due to the scarcity of…
View article: An Efficient Segmentation and Classification System in Medical Images Using Intuitionist Possibilistic Fuzzy C-Mean Clustering and Fuzzy SVM Algorithm
An Efficient Segmentation and Classification System in Medical Images Using Intuitionist Possibilistic Fuzzy C-Mean Clustering and Fuzzy SVM Algorithm Open
The herpesvirus, polyomavirus, papillomavirus, and retrovirus families are associated with breast cancer. More effort is needed to assess the role of these viruses in the detection and diagnosis of breast cancer cases in women. The aim of …
View article: The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems
The Use of Ensemble Models for Multiple Class and Binary Class Classification for Improving Intrusion Detection Systems Open
The pursuit to spot abnormal behaviors in and out of a network system is what led to a system known as intrusion detection systems for soft computing besides many researchers have applied machine learning around this area. Obviously, a sin…
View article: Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition
Analyzing the Effectiveness and Contribution of Each Axis of Tri-Axial Accelerometer Sensor for Accurate Activity Recognition Open
Recognizing human physical activities from streaming smartphone sensor readings is essential for the successful realization of a smart environment. Physical activity recognition is one of the active research topics to provide users the ada…
View article: Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation
Optimal Cooperative Offloading Scheme for Energy Efficient Multi-Access Edge Computation Open
The distributed cooperative offloading technique with wireless setting and power transmission provides a possible solution to meet the requirements of next-generation Multi-access Edge Computation (MEC). MEC is a model which avails cloud c…
View article: Unsupervised Deep Learning CAD Scheme for the Detection of Malaria in Blood Smear Microscopic Images
Unsupervised Deep Learning CAD Scheme for the Detection of Malaria in Blood Smear Microscopic Images Open
Recent advances in deep learning, coupled with the onslaught of unlabelled medical data have drawn ever-increasing research interests by discovering multiple levels of distributed representations and solving complex medical related problem…
View article: A Survey on Energy-Aware Wireless Sensor Routing Protocols
A Survey on Energy-Aware Wireless Sensor Routing Protocols Open
A technological evolution in digital electronics gives birth to micro-electro-mechanical systems (MEMS). This evolution generates drastic change in the field of micro-sensors. Micro-sensors are advanced in capabilities of low-cost, less en…
View article: Diagnosis and guided interventions in antrolateral compartment of ankle: Ultrasound as first line imaging
Diagnosis and guided interventions in antrolateral compartment of ankle: Ultrasound as first line imaging Open
Poster: ECR 2019 / C-1782 / Diagnosis and guided interventions in antrolateral compartment of ankle: Ultrasound as first line imaging by: M. Kumar 1, D. K. Singh2, M. K. Mittal2, N. KUMAR2, B. K. Nayak3, S. Tomar2, S. Suman2, A…
View article: Exploring Generative Adversarial Networks (GANs) For Realistic Image Synthesis
Exploring Generative Adversarial Networks (GANs) For Realistic Image Synthesis Open
Image synthesis is the process of generating new images from the ground up, frequently utilizing preexisting data or models. By definition, super-resolution methods produce supplementary image content and features that are not present in t…
View article: Big Data Trends and Analytics: A Survey
Big Data Trends and Analytics: A Survey Open
Big Data is nowadays one of the apex fields of research area.It is due to expansion in technological field at rapid rate.Expansion of storage area and data has been seen from past five year which is exponentially.It is envisioned that conc…