Piyush Kumar Shukla
YOU?
Author Swipe
View article: Enhancing breast cancer detection in mammographic imaging using explainable clinical decision support system and framework
Enhancing breast cancer detection in mammographic imaging using explainable clinical decision support system and framework Open
View article: Enhancing fake news detection for Sustainable Supply Chain Management using DistilBERT-based multi-stacked LSTM approach
Enhancing fake news detection for Sustainable Supply Chain Management using DistilBERT-based multi-stacked LSTM approach Open
View article: Surface defect detection on bolt surface using a real-time fine-tuned YOLOv6 model
Surface defect detection on bolt surface using a real-time fine-tuned YOLOv6 model Open
Assessing metallic components for surface imperfections is essential for ensuring product quality, enhancing manufacturing efficiency, and reducing expenses. Detecting minor surface imperfections is essential for guaranteeing the reliabili…
View article: Instagram fake profile detection using an ensemble learning method
Instagram fake profile detection using an ensemble learning method Open
Counterfeit accounts still pose a big problem for Instagram users. Trust is being eroded, and online security is being compromised as a result of these accounts’ constant contribution to Instagram’s spam, harmful information, and deceptive…
View article: Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm
Advances to IoT security using a GRU-CNN deep learning model trained on SUCMO algorithm Open
The rapid expansion of the Internet of Things (IoT) has significantly improved the various aspects of our daily life. However, along with its benefits, new security threats such as Denial of Service (DoS) attacks and Botnets have emerged. …
View article: High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning Open
View article: Enhancing Churn Prediction through AdvancedMachine Learning Techniques for ModernEducation in Computer Science
Enhancing Churn Prediction through AdvancedMachine Learning Techniques for ModernEducation in Computer Science Open
View article: Applying YOLOv6 as an ensemble federated learning framework to classify breast cancer pathology images
Applying YOLOv6 as an ensemble federated learning framework to classify breast cancer pathology images Open
The most common carcinoma-related cause of death among women is breast cancer. Early detection is crucial, and the manual screening method may lead to a delayed diagnosis, which would delay treatment and put lives at risk. Mammography imag…
View article: PHILOSOPHICAL STUDY OF MORAL EDUCATION AND VALUE EDUCATION IN THE FIELD OF EDUCATION
PHILOSOPHICAL STUDY OF MORAL EDUCATION AND VALUE EDUCATION IN THE FIELD OF EDUCATION Open
In the present times when the tendencies of materialism, competition, moral degradation and self-centredness are intensifying in the society, the importance of moral education and value education in the field of education has increased mor…
View article: Deep Learning Algorithm for Optimized Sensor Data Fusion in Fault Diagnosis and Tolerance
Deep Learning Algorithm for Optimized Sensor Data Fusion in Fault Diagnosis and Tolerance Open
Environmental perception is one of the key technologies to realize autonomous vehicles. The fault diagnosis process involves identifying the fault that occurred or the cause of the out-of-control condition. Here, the major objective is to …
View article: Predictive analytics technique based on hybrid sampling to manage unbalanced data in smart cities
Predictive analytics technique based on hybrid sampling to manage unbalanced data in smart cities Open
A smart city is deemed smart enough because it has the capability to make decisions on its own. Artificial intelligence needs a lot of data from the physical world to make correct decisions. IoT sensor devices collect data from the surroun…
View article: A systematic review on blockchain-based access control systems in cloud environment
A systematic review on blockchain-based access control systems in cloud environment Open
The widespread adoption of cloud computing has dramatically altered how data is stored, processed, and accessed in an era. The rapid development of digital technologies characterizes all this. The widespread adoption of cloud services has …
View article: Empowering Marketing Management and Gaming Consumer Interaction Through AI and Citizen Science
Empowering Marketing Management and Gaming Consumer Interaction Through AI and Citizen Science Open
There has been a significant revolution seen by AI getting incorporated in the management and customer relations of companies. The research of the present AI Revolution that influence variety of fields i.e. video games is the topic of the …
View article: Investigating attention mechanisms for plant disease identification in challenging environments
Investigating attention mechanisms for plant disease identification in challenging environments Open
There is an increasing demand for efficient and precise plant disease detection methods that can quickly identify disease outbreaks. For this, researchers have developed various machine learning and image processing techniques. However, re…
View article: Improving the End to End Protection in E-voting using BVM - Blockchain based e-Voting Mechanism
Improving the End to End Protection in E-voting using BVM - Blockchain based e-Voting Mechanism Open
The voting is always a crucial topic of public attention for democratic reasons. Due to its simplicity, ease of use, and low cost, e-voting is frequently used for such decision outcomes. The tremendous authority and intervening data in cur…
View article: Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review
Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review Open
Internet of Things (IoT) plays an essential contribution in connecting devices and enabling seamless data exchange, leading to increased efficiency and convenience. However, security concerns in IoT systems are significant, as compromised …
View article: Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring System
Design of a Lightweight Compressed Video Stream-Based Patient Activity Monitoring System Open
Inpatient falls from beds in hospitals are a common problem.Such falls may result in severe injuries.This problem can be addressed by continuous monitoring of patients using cameras.Recent advancements in deep learningbased video analytics…
View article: The Banaras Convention: A Safe Reliable Technique for Axillary Dissection by Lateral exposure of Latissimus Dorsi Pedicle
The Banaras Convention: A Safe Reliable Technique for Axillary Dissection by Lateral exposure of Latissimus Dorsi Pedicle Open
Breast cancer is rising among women in India. Most of the cases are presented at the locally advanced stage where axillary dissection is needed. In this article, we have described our approach of axillary dissection in the technically chal…
View article: Corrections to “Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review”
Corrections to “Exploring the Potential of Blockchain Technology in an IoT-Enabled Environment: A Review” Open
In the above article [1], references 56 and 92 were retracted. As the works in these references are no longer reliable, we are removing these references and the related discussions in [1]. These references do not have any impact on the dat…
View article: An Automatic-Segmentation- and Hyper-Parameter-Optimization-Based Artificial Rabbits Algorithm for Leaf Disease Classification
An Automatic-Segmentation- and Hyper-Parameter-Optimization-Based Artificial Rabbits Algorithm for Leaf Disease Classification Open
In recent years, disease attacks have posed continuous threats to agriculture and caused substantial losses in the economy. Thus, early detection and classification could minimize the spread of disease and help to improve yield. Meanwhile,…
View article: Enhancing Iot Security in cryptocurrency with Smart model-based Blockchain integration: KAFKAIOT - A Distributed Access Control System
Enhancing Iot Security in cryptocurrency with Smart model-based Blockchain integration: KAFKAIOT - A Distributed Access Control System Open
Internet of Things (IoT) has rapidly expanded with the interconnection of various devices through wireless networks. However, this widespread deployment of IoT devices has posed challenges in managing access to device resources due to thei…
View article: HHOA_NCA – a Harris Hawk Optimization Algorithm (HHOA) on best possible Node Capture Attack (NCA) in Future WSN for Improving the Security of Ubiquitous Computing Intelligent System
HHOA_NCA – a Harris Hawk Optimization Algorithm (HHOA) on best possible Node Capture Attack (NCA) in Future WSN for Improving the Security of Ubiquitous Computing Intelligent System Open
Wireless Sensor Network (WSN) is exceedingly predisposed to quite a lot of complex attacks due to confine resource deployment in big network communiqué vicinity. The adversary initiates a node capture attack to future WSN for snatching the…
View article: Resource allocation and network pricing based on double auction in mobile edge computing
Resource allocation and network pricing based on double auction in mobile edge computing Open
By transferring power-hungry huge data centers to lightweight Internet of Things (IoT) mobile devices, mobile edge computing (MEC) has completely changed the IoT. For MEC, to optimize economic gains and motivate profit-oriented entities, t…
View article: Enhanced Drug Delivery System Using Mesenchymal Stem Cells and Membrane-Coated Nanoparticles
Enhanced Drug Delivery System Using Mesenchymal Stem Cells and Membrane-Coated Nanoparticles Open
Mesenchymal stem cells (MSCs) have newly developed as a potential drug delivery system. MSC-based drug delivery systems (MSCs-DDS) have made significant strides in the treatment of several illnesses, as shown by a plethora of research. How…
View article: Enhancing Software-Defined Networks with Intelligent Controllers to Improve First Packet Processing Period
Enhancing Software-Defined Networks with Intelligent Controllers to Improve First Packet Processing Period Open
Software-Defined Networking (SDN) has a detailed central model that separates the data plane from the control plane. The SDN controller is in charge of monitoring network security and controlling data flow. OpenFlow-enabled routers and swi…
View article: Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City
Improving Collaborative Intrusion Detection System Using Blockchain and Pluggable Authentication Modules for Sustainable Smart City Open
The threat of cyber-attacks is ever increasing in today’s society. There is a clear need for better and more effective defensive tools. Intrusion detection can be defined as the detection of anomalous behavior either in the host or in the …
View article: Adoption of Artificial Intelligence in Human and Clinical Genomics
Adoption of Artificial Intelligence in Human and Clinical Genomics Open
it is a pioneering approach to the world of academia, radically improving the way scholarly research is managed.The grand vision of Frontiers is a world where all people have an equal opportunity to seek, share and generate knowledge.Front…
View article: AES Based White Box Cryptography in Digital Signature Verification
AES Based White Box Cryptography in Digital Signature Verification Open
According to the standard paradigm, white box cryptographic primitives are used to block black box attacks and protect sensitive information. This is performed to safeguard the protected information and keys against black box assaults. An …
View article: Design of a high‐performance advanced phase locked loop with high stability external loop filter
Design of a high‐performance advanced phase locked loop with high stability external loop filter Open
For this task, an improved phase locked loop (PLL) was developed using a more sophisticated phase‐frequency detector with multiband flexible dividers that provide enhanced frequency resolution, a better spectrum, and a better output signal…
View article: Enhanced framework for COVID-19 prediction with computed tomography scan images using dense convolutional neural network and novel loss function
Enhanced framework for COVID-19 prediction with computed tomography scan images using dense convolutional neural network and novel loss function Open