Surendra Kumar Shukla
YOU?
Author Swipe
View article: Blockchain-Enabled Edge Computing for Secure and Intelligent Decision-Making in Vehicular Ad Hoc Networks Using Deep Deterministic Policy Gradient
Blockchain-Enabled Edge Computing for Secure and Intelligent Decision-Making in Vehicular Ad Hoc Networks Using Deep Deterministic Policy Gradient Open
Vehicular Ad-hoc Networks (VANETs) are referred to as an effective solution for enhancing the competence and security is the standard transportation framework. Additionally, it offers several opportunities to create secure and effective tr…
View article: Energy-efficient multi factor authentication protocols in sustainable security for wireless networks using machine learning algorithm
Energy-efficient multi factor authentication protocols in sustainable security for wireless networks using machine learning algorithm Open
Given the limited energy resources and broadcast nature of wireless communication, the primary problems in wireless sensor networks (WSNs) are energy efficiency and security. As a result, there is a lot of interest in seeing how to increas…
View article: A generative adversarial network-based accurate masked face recognition model using dual scale adaptive efficient attention network
A generative adversarial network-based accurate masked face recognition model using dual scale adaptive efficient attention network Open
Masked identification of faces is necessary for authentication purposes. Face masks are frequently utilized in a wide range of professions and sectors including public safety, health care, schooling, catering services, production, sales, a…
View article: Universal Deep Neural Network-Based Model for Non-Coding RNA Classification
Universal Deep Neural Network-Based Model for Non-Coding RNA Classification Open
View article: Covid-19 India dataset analysis and predictions using machine learning techniques
Covid-19 India dataset analysis and predictions using machine learning techniques Open
World health organization has declared Covid 19 as pandemic and sought help and coordination from all countriesin fighting the Covid 19. India announced its first Covid-19 case on 30th Jan 2020 and after that number of cases intensely rais…
View article: An integration of autonomic computing with multicore systems for performance optimization in Industrial Internet of Things
An integration of autonomic computing with multicore systems for performance optimization in Industrial Internet of Things Open
The goal of this work is to investigate how the self‐awareness characteristic of autonomic computing, paired with existing performance optimization rules, may be used in applications to minimise multi‐core processor performance concerns. T…
View article: A Theoretical Graph based Framework for Parameter Tuning of Multi-core Systems
A Theoretical Graph based Framework for Parameter Tuning of Multi-core Systems Open
Multi-core systems are outperforming nowadays.Therefore, various computing paradigms are intrinsically incorporated in the multicore domain to exploit its potential and solve well known computing problems.Parameter tuning is a well-known c…
View article: Hybrid artificial neural network algorithm for air pollution estimation
Hybrid artificial neural network algorithm for air pollution estimation Open
In recent years, airborne broadcasting has grown more prevalent in cities. Air quality degradation is a severe air pollution issue that exists daily. To forecast the amount of pollutants, Artificial Neural Network (ANN) and Linear Vector Q…
View article: Load balancing technique based on hybrid resource utilization in cloud computing
Load balancing technique based on hybrid resource utilization in cloud computing Open
Cloud computing uses the internet to supply dynamic services including memory, data, bandwidth and applications. Work schedules have an influence on cloud service reliability and performance. A proper provisioning method is required for a …
View article: Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things
Towards Development of Machine Learning Framework for Enhancing Security in Internet of Things Open
An IoT system is a smart network that connects all items to the Internet and exchanges data using Internet Engineering Task Force established protocols. As a consequence, everything is instantly accessible from any place and at any time. T…
View article: Apprehending the Effect of Internet of Things (IoT) Enables Big Data Processing through Multinetwork in Supporting High-Quality Food Products to Reduce Breast Cancer
Apprehending the Effect of Internet of Things (IoT) Enables Big Data Processing through Multinetwork in Supporting High-Quality Food Products to Reduce Breast Cancer Open
Medical science in recent times has witnessed the large implications of AI-based IoT approaches that made the clinical process easier than before. However, effective IoT technologies can connect as well as exchange necessary clinical data …
View article: Machine Learning and Image Processing Enabled Evolutionary Framework for Brain MRI Analysis for Alzheimer’s Disease Detection
Machine Learning and Image Processing Enabled Evolutionary Framework for Brain MRI Analysis for Alzheimer’s Disease Detection Open
Alzheimer’s disease is characterized by the presence of abnormal protein bundles in the brain tissue, but experts are not yet sure what is causing the condition. To find a cure or aversion, researchers need to know more than just that ther…
View article: SCNTA
SCNTA Open
Real-time network inspection applications face a threat of vulnerability as high-speed networks continue to expand. For companies and ISPs, real-time traffic classification is an issue. The classifier monitor is made up of three modules: C…
View article: 5G‐Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique
5G‐Telecommunication Allocation Network Using IoT Enabled Improved Machine Learning Technique Open
Recent improvements in communication technology have undergone a significant shift over the last two decades, with state‐of‐the‐art communication equipment, standards, and protocols simplifying the lives of consumers everywhere. For more t…
View article: CHARACTER IDENTIFICATION AND MOUSECONTROL USING HAND GESTURES: A SURVEY
CHARACTER IDENTIFICATION AND MOUSECONTROL USING HAND GESTURES: A SURVEY Open
Given the rapid advancement of computer technology, this paper suggests a mouse control system that utilises hand motions recorded via a webcam utilising a colour detection algorithm.This system will let the user to pick, click, scroll, an…
View article: An Progression of Prioritization Techniques for Test Cases
An Progression of Prioritization Techniques for Test Cases Open
Prioritizing test cases involves sorting them according to the same predetermined criteria, with the end goal of catching bugs as soon as feasible and reducing testing expenses.The growing complexity of software systems means more test cas…
View article: Using Aco, Wsns Save Energy and Run for Longer
Using Aco, Wsns Save Energy and Run for Longer Open
WSNs are able to do both monitoring and communication.Due to their cheap cost and broad applicability, WSNs have attracted a lot of research.A WSN is a network of dispersed computing nodes that can perceive their surroundings by sending an…
View article: An ELK Stack Method with Machine Learning Algorithmfor Alerting Traffic anomaly
An ELK Stack Method with Machine Learning Algorithmfor Alerting Traffic anomaly Open
A network's logs are still not required to be flawless in perpetuity; this is not a requirement.It is inevitable for the behaviour of data traffic to occasionally deviate from what is expected, when this occurs, the behaviour of traffic is…
View article: POWER-AWARE BUS ENCODING TECHNIQUES FORI/O AND DATA BUSES: AN EMBEDDED SYSTEMANALYSIS
POWER-AWARE BUS ENCODING TECHNIQUES FORI/O AND DATA BUSES: AN EMBEDDED SYSTEMANALYSIS Open
Microprocessors with integrated LCD controllers and Flash ROM are used in mobile computer applications.The paper presents a software-only encoding strategy for lowering energy utilisation on the processor-memory bus when showing a picture …
View article: A STUDY OF THE USE OF EMBEDDED SENSORS ININDUSTRIAL PRODUCTS AND FACILITIES
A STUDY OF THE USE OF EMBEDDED SENSORS ININDUSTRIAL PRODUCTS AND FACILITIES Open
An output is produced by a sensor, which is a device that monitors changes in quantities or measurements.In general, when the inputs change, sensors produce an electrical or optical output signal.Two sensor types that are essentially hidde…
View article: Current Study on the Subject of Underground RadioPositioning Systems
Current Study on the Subject of Underground RadioPositioning Systems Open
This paper discusses the structural design of techniques for staff positioning in hazardous areas of underground mines, highlights the benefits and limitations of wireless sensor network technology, and addresses a cost-effective, continuo…
View article: Utilizing Steganography and Cryptography to ConcealInformation Within BMP Images
Utilizing Steganography and Cryptography to ConcealInformation Within BMP Images Open
Every day, more sophisticated methods will be needed to safeguard confidential data from intrusion and hacking attempts.Both cryptography and steganography are well-respected for their ability to protect confidential information during tra…
View article: Planning And Construction of a High-Tech Garage Door
Planning And Construction of a High-Tech Garage Door Open
In this post, we will discuss the planning and execution of a sophisticated garage door system.An Arduino microcontroller is at the heart of the system, with assistance from a smartphone app and Blynk's cloud server.Furthermore, the Blynk …
View article: The Internet of Things (IoT)-automated smart water levelindicator: a practical application of smart irrigation
The Internet of Things (IoT)-automated smart water levelindicator: a practical application of smart irrigation Open
Most people in India rely on farming for their income.Seventy percent of Indians have to make a living in the agricultural sector, and it provides thirty percent of the country's total revenue.The agricultural sector accounts for around 14…
View article: PREDICTION OF CROP YIELD IN PRECISIONAGRICULTURE USING MACHINE LEARNINGMETHODS
PREDICTION OF CROP YIELD IN PRECISIONAGRICULTURE USING MACHINE LEARNINGMETHODS Open
Crop yield estimationis crucial in agriculture.Remote sensing (RS) methods are rapidly being employed in the creation of decision support systems for modern agricultural systems to boost crop output and nitrogen control while lowering oper…
View article: Biometrics Application on Raspberry Pi for The Internet of Things
Biometrics Application on Raspberry Pi for The Internet of Things Open
As the field of information and communications technology (ICT) has developed, information security has emerged as an essential subfield to ensure users' privacy and security.In addition, this paper details how biometrics can leverage the …
View article: A Quick Overview of Cloud-Based Services
A Quick Overview of Cloud-Based Services Open
In the realm of Services Computing, Cloud Computing has developed into a scalable platform for the consumption and delivery of such services.Service-oriented architecture (SOA) and virtualizations of hardware and software are the technolog…
View article: DEEP LEARNING AND DATA MININGAPPLICATIONS IN THE CYBERSECURITYPARADIGM TO FIGHT CYBER-ATTACKS
DEEP LEARNING AND DATA MININGAPPLICATIONS IN THE CYBERSECURITYPARADIGM TO FIGHT CYBER-ATTACKS Open
In this study, a high-potential routing algorithm for cyber security that may be applied to IoT applications based on WSNs and with high traffic volumes is investigated.The most effective and cutting-edge method for identifying crucial, pr…
View article: An Examination Of The Use Of Deep Learning TechniquesTo Diagnose Diabetes Mellitus
An Examination Of The Use Of Deep Learning TechniquesTo Diagnose Diabetes Mellitus Open
Diabetes Mellitus (DM), a disorder that leads to organ dysfunction in patients, is brought on by uncontrolled diabetes.Early detection and treatment of DM are now more favourable than manual evaluation through an automated method because o…
View article: Protecting Cloud Information for Government OversightAudits Using a Zero-Knowledge Protocol
Protecting Cloud Information for Government OversightAudits Using a Zero-Knowledge Protocol Open
The innovative paradigm of cloud computing as a service has made it one of the most well-known buzzwords in the IT industry.It claims to reduce operating and support expenses while enhancing adaptability, scalability, and dependability.Man…