Gitanjali R. Shinde
YOU?
Author Swipe
Integration of deep learning algorithms for real-time vehicle accident detection from surveillance videos Open
Major road accidents have increased due to the rapid rise of vehicles on the roads due to affordability and accessibility. While minor accidents can be resolved without the need for escorting to hospitals, significant accidents that involv…
Empower BreastNet: breast cancer detection with transfer learning VGG Net-19 Open
Breast cancer is a major cause of death among women globally, making early detection crucial for effective treatment. This study introduces a new deep learning (DL) method using transfer learning (TL) to automatically detect and diagnose b…
DEMNET NeuroDeep: Alzheimer detection using electroencephalogram and deep learning Open
Alzheimer’s disease (AD) stands out as the most prevalent neurological brain disorder, and its diagnosis relies on various laboratory techniques. The electroencephalogram (EEG) emerges as a valuable tool for identifying AD, offering a quic…
Exploring the efficacy of various CNN architectures in diagnosing oral cancer from squamous cell carcinoma Open
Deep learning models, particularly MobileNetV2, achieved high classification accuracy (95.41 %) for OCSCC.CNN-based methods show promise for early-stage OCSCC and oral dysplasia diagnosis. Performance parameters like precision, recall, and…
DeepCervix: enhancing cervical cancer detection through transfer learning with VGG-16 architecture Open
Cervical cancer remains a significant global health concern, emphasizing the urgent need for improved detection methods to ensure timely treatment. This research introduces a sophisticated methodology leveraging recent advances in medical …
Histopathological parameter and brain tumor mapping using distributed optimizer tuned explainable AI classifier Open
Brain tumors represent a critical and severe challenge worldwide early and accurate diagnosis is necessary to increase the predictions for individuals with brain tumors. Several studies on brain tumor mapping have been conducted recently; …
Improving Explainable AI Interpretability: Mathematical Models for Evaluating Explanation Methods. Open
AI has transformed various industries. Understanding and trusting AI decision-making processes is crucial as they become more integrated into our lives. Explainable AI (XAI) aims to provide transparency and interpretability to AI models, a…
Lung pressure predictive model using LSTM: A deep learning techniques Open
The human body relies on controlled breathing to ensure oxygen reaches all cells while filtering out contaminants to protect the lungs. However, infections like the Delta virus and SARS-CoV2 (COVID-19) have led to Acute Respiratory Distres…
Enhanced Quantum Key Distribution Algorithm for Underwater Optical Wireless Sensor Network Open
The research aims to develop an attack-free underwater optical communication channel at a distance of 50 meters. In this work, we have emphasized the importance of Quantum Key Distribution (QKD) in Naval and many other applications. An in-…
Policy-aware Distributed and Dynamic Trust based Access Control Scheme for Internet of Things Open
The use of smart devices is driving the Internet of Things (IoT) trend today. Day by day IoT helps to support more services like car services, healthcare services, home automation, and security services, weather prediction services, etc, t…
Performance-Aware Green Algorithm for Clustering of Underwater Wireless Sensor Network Based on Optical Signal-to-Noise Ratio Open
Underwater wireless sensor network (UWSN) has limited bandwidth, long propagation delays, and unrechargeable batteries, which forces the development of techniques minimizing the energy consumption of UWSNs. One solution is clustering that …
Intrusion prevention system using convolutional neural network for wireless sensor network Open
Now-a-days, there is exponential growth in the field of wireless sensor network. In wireless sensor networks (WSN’s), most of communication happen through wireless media hence probability of attacks increases drastically. With the help of …
Rethinking Blockchain for Access Control in the Internet of Things Open
IoT is a network of interconnected heterogeneous devices which sense, accumulate the data and forward the same to the cloud platform for analytical purposes. There are various IoT verticals in which huge research is going on. IoT security …
Learning Techniquesforpre Malignancy Detection in Human Cells a Review Open
Cancer is uncontrolled cell growth which starts consuming cell nourishment and keeps on multiplying indefinably. There are 100 plus different types of cancers that may affect any part of the body. In the past 26 years, the cancer incidence…
Data Analytics: COVID-19 Prediction Using Multimodal Data Open
Globally, there is massive uptake and explosion of data and challenge is to address issues like scale, pace, velocity, variety, volume and complexity of this big data. Considering the recent epidemic in China, modeling of COVID-19 epidemic…
Predictive Analytics of COVID-19 Using Information, Communication and Technologies Open
Globally, there is massive uptake and explosion of data and challenge is to address issues like scale, pace, velocity, variety, volume and complexity of the data. Considering the recent epidemic in China, modeling of COVID-19 epidemic for …
Forecasting Models for Coronavirus (COVID-19): A Survey of the State-of-the-Art Open
When new virus and its respective disease cause more infections, it is very important to decide the strategies to control the spread and determine its impact. Considering the recent example of Coronavirus initially identified in Wuhan Chin…
Forecasting Models for Coronavirus (COVID-19): A Survey of the State-of-the-Art Open
When new virus and its respective disease cause more infections, it is very important to decide the strategies to control the spread and determine its impact. Considering the recent example of Coronavirus initially identified in Wuhan Chin…
3. Threat analysis and attack modeling for machine-to-machine communication toward Internet of things Open
The wide variety of Internet of thing (IoT) applications demands a secure and efficient communication channel that resists against a variety of modern attacks and fulfils application requirement.There are various IoT threats and challenges…
5. Users’ privacy at online social networks in Indian context: comprehensive multiaged group survey and discussion Open
Nowadays, social media has become an important part of life.People across the world use social media for random purposes.They post their accomplishments, achievements, vacation photos and others on the social media.However, they do not oft…