Satish Chand
YOU?
Author Swipe
View article: DCRU-Net: Dynamic Contextual Residual U-Net for Medical Image Segmentation
DCRU-Net: Dynamic Contextual Residual U-Net for Medical Image Segmentation Open
Accurate medical image segmentation (MIS) is crucial for computer-assisted diagnosis and treatment planning. This research proposes a deep learning (DL) architecture for accurate and efficient MIS, named Dynamic Contextual Residual U-Net (…
View article: Indigenously Developed Robotic Devices for Inspection of Critical Components in Power Plants
Indigenously Developed Robotic Devices for Inspection of Critical Components in Power Plants Open
The growing global population, combined with rapid industrialization and rising living standards, has resulted in a substantial increase in energy demand. This trend necessitates the development of innovative energy technologies that align…
View article: From Pro, Anti to Informative and Hesitant: An Infoveillance study of COVID-19 vaccines and vaccination discourse on Twitter
From Pro, Anti to Informative and Hesitant: An Infoveillance study of COVID-19 vaccines and vaccination discourse on Twitter Open
COVID-19 pandemic has brought unprecedented challenges to the world, and vaccination has been a key strategy to combat the disease. Since Twitter is one of the most widely used public microblogging platforms, researchers have analysed COVI…
View article: A secure three-factor authentication protocol for mobile networks
A secure three-factor authentication protocol for mobile networks Open
User authentication is a necessary mechanism to communicate securely for mobile networks. Recently, Xie et al. have discussed a three-factor authentication (3FA) scheme using elliptic curve cryptography (ECC) for mobile networks and claime…
View article: A Reinduction-Based Approach for Efficient High Utility Itemset Mining from Incremental Datasets
A Reinduction-Based Approach for Efficient High Utility Itemset Mining from Incremental Datasets Open
High utility itemset mining is a crucial research area that focuses on identifying combinations of itemsets from databases that possess a utility value higher than a user-specified threshold. However, most existing algorithms assume that t…
View article: DeVi Deep Learning Framework for Misogyny Identification in Multimodal Data
DeVi Deep Learning Framework for Misogyny Identification in Multimodal Data Open
In recent times, there has been a notable upsurge in the frequency of memes across a wide range of social media platforms. Memes provide amusement to people with their humour, but unfortunately, some memes exploit this humour as a cover to…
View article: An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage Open
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement …
View article: High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain
High-Capacity Reversible Data Hiding Based on Two-Layer Embedding Scheme for Encrypted Image Using Blockchain Open
In today’s digital age, ensuring the secure transmission of confidential data through various means of communication is crucial. Protecting the data from malicious attacks during transmission poses a significant challenge. To achieve this,…
View article: Computer vision-based framework for pedestrian movement direction recognition
Computer vision-based framework for pedestrian movement direction recognition Open
Pedestrians are the most critical and vulnerable moving objects on roads and public areas. Learning pedestrian movement in these areas can be helpful for their safety. To improve pedestrian safety and enable driver assistance in autonomous…
View article: GeoCovaxTweets: COVID-19 Vaccines and Vaccination-specific Global Geotagged Twitter Conversations
GeoCovaxTweets: COVID-19 Vaccines and Vaccination-specific Global Geotagged Twitter Conversations Open
Social media platforms provide actionable information during crises and pandemic outbreaks. The COVID-19 pandemic has imposed a chronic public health crisis worldwide, with experts considering vaccines as the ultimate prevention to achieve…
View article: GeoCovaxTweets: COVID-19 Vaccines and Vaccination-specific Global Geotagged Twitter Conversations
GeoCovaxTweets: COVID-19 Vaccines and Vaccination-specific Global Geotagged Twitter Conversations Open
GeoCovaxTweets: Geotagged Covid-19 Vaccine Conversations on Twitter The following metadata is available for tweets in GeoCpvaxTweets: id: tweet identifier created_at: DateTime when the tweet was created author_id: the unique identifier of …
View article: Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern
Pairing-Friendly Elliptic Curves: Revisited Taxonomy, Attacks and Security Concern Open
Major families of pairing-friendly elliptic curves, including BN, BLS12, BLS24, KSS16, and KSS18 have recently been vulnerable to number field sieve (NFS) attacks. Due to the recent attacks on discrete logs in F_(q^k ), selecting such curv…
View article: Provable Secure Escrow-Free Identity-Based Signature Scheme for Smart City Environment
Provable Secure Escrow-Free Identity-Based Signature Scheme for Smart City Environment Open
Smart city is a concept of digitalizing the ecosystem to solve many urban area issues such as crime reduction, transportation, waste management, and governance. However, the security and threat-related issues are still neglected. This pape…
View article: Mushroom Cultivation for Increasing Income and Sustainable Development of Small and Marginal Farmers
Mushroom Cultivation for Increasing Income and Sustainable Development of Small and Marginal Farmers Open
A mushroom is the fleshy and spore-bearing fruiting body of a fungus and belongs to the class Basidiomycetes. Mushroom cultivation is a low-cost, high-return activity that has proven to be an additional source of income. Because the vegeta…
View article: An efficient mining scheme for high utility itemsets
An efficient mining scheme for high utility itemsets Open
Knowledge discovery in databases aims at finding useful information, which can be deployed for decision making. The problem of high utility itemset mining has specifically garnered huge research focus in the past decade, as it aims to find…
View article: Recommending Researchers in Machine Learning based on Author-Topic Model
Recommending Researchers in Machine Learning based on Author-Topic Model Open
The aim of this paper is to uncover the researchers in machine learning using the author-topic model (ATM). We collect 16,855 scientific papers from six top journals in the field of machine learning published from 1997 to 2016 and analyze …
View article: Pairing for Greenhorn: Survey and Future Perspective
Pairing for Greenhorn: Survey and Future Perspective Open
Pairing is the most powerful tool in cryptography that maps two points on the elliptic curve to the group over the finite field. Mostly cryptographers consider pairing as a black box and use it for implementing pairing-based cryptographic …
View article: Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling
Intra-Block Correlation Based Reversible Data Hiding in Encrypted Images Using Parametric Binary Tree Labeling Open
In this paper, a high capacity reversible data hiding technique using a parametric binary tree labeling scheme is proposed. The proposed parametric binary tree labeling scheme is used to label a plaintext image’s pixels as two different ca…
View article: Food image recognition based on Mobile NetV2 using support vector machine
Food image recognition based on Mobile NetV2 using support vector machine Open
The rapid growth in deep learning has made convolutional neural networks deeper and more complex to realize higher accuracy. But many day-to-day recognition tasks need be performed in a limited computational platform. One of the applicatio…
View article: A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC
A Secure IoT-Based Mutual Authentication for Healthcare Applications in Wireless Sensor Networks Using ECC Open
The role of wireless medical sensor networks (WMSNs) is very significant in healthcare applications of IoT. Online report generation and sharing the reports reduce the time and make the treatment of patients very fast. Here, the safety of …
View article: Possible association between <scp>IgA</scp> vasculitis and <scp>COVID</scp> ‐19
Possible association between <span>IgA</span> vasculitis and <span>COVID</span> ‐19 Open
The authors declare that data supporting the findings of this case are available within the article [and its supplementary information files].
View article: Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps
Cryptanalysis and improvement of a user authentication scheme for wireless sensor networks using chaotic maps Open
One of the challenging issues in wireless sensor networks (WSNs) is to provide secure communication as the channel used is wireless. User authentication is a mechanism that is used to provide secure communication. The authors analyse the s…
View article: An adaptive multipopulation genetic algorithm for the optimization of active magnetic bearings
An adaptive multipopulation genetic algorithm for the optimization of active magnetic bearings Open
Active magnetic bearings (AMBs)are mechatronic systems to support the rotors without any physical contact. Compact AMBs are required for better performance. Present work aims at optimization of AMB for achieving the compact size. Genetic a…
View article: Fiji within the CER
Fiji within the CER Open
Given the global tendency towards regionalism, should a small island nation such as Fiji join the Closer Economic Relations (CER) trade agreement between Australia and New Zealand? In this paper it is argued that, under the assumption that…
View article: A Trend Analysis of Machine Learning Research with Topic Models and Mann-Kendall Test
A Trend Analysis of Machine Learning Research with Topic Models and Mann-Kendall Test Open
This paper aims to systematically examine the literature of machine learning for the period of 1968~2017 to identify and analyze the research trends.A list of journals from well-established publishers ScienceDirect, Springer, JMLR, IEEE (a…
View article: A Hybrid Approach for Requirements Prioritization Using LFPP and ANN
A Hybrid Approach for Requirements Prioritization Using LFPP and ANN Open
Requirements prioritization is a most important activity to rank the requirements as per their priority of order .It is a crucial phase of requirement engineering in software development process.In this research introduced a MCDM model for…