Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2024
Recommendation of Electronic Mobile Gadgets Using Infused Decision Score With Mobile Radiation and Federated Sentiment Score
IEEE Transactions on Consumer Electronics (ITOCE), Volume 70, Issue 1Pages 2566–2576https://doi.org/10.1109/TCE.2024.3349383Specific Absorption Rate (SAR), is a measure of the amount of Radio-frequency (RF) energy absorbed by the body when using a mobile phone or other wireless devices. Some studies have suggested that high levels of RF energy may be harmful to human health in ...
- research-articleOctober 2023
Enhancing P2Cast VoD Streaming Performance: A Node Behaviour-Driven Parent Selection Approach Considering VCR Actions
IEEE Transactions on Consumer Electronics (ITOCE), Volume 70, Issue 1Pages 4226–4238https://doi.org/10.1109/TCE.2023.3327708In traditional VoD streaming architecture like P2Cast, a parent node for an incoming child node gets selected based on bandwidth-first and local-information-first principles. But since they do not take node behavior into account, they are bound to ...
- research-articleJanuary 2023
A Compound Class of Unit Burr XII Model: Theory, Estimation, Fuzzy, and Application
- Punit Gupta,
- Mohammad A. Zayed,
- Amal S. Hassan,
- Ehab M. Almetwally,
- Ahmad M. Aboalkhair,
- Abdullah H. Al-Nefaie,
- Hisham M. Almongy
The current research offers an enhanced three-parameter lifetime model that combines the unit Burr XII distribution with a power series distribution. The novel class of distribution is named the unit Burr XII power series (UBXIIPS). This compounding ...
- research-articleJune 2022
Prediction of malicious objects using prey-predator model in Internet of Things (IoT) for smart cities
Computers and Industrial Engineering (CINE), Volume 168, Issue Chttps://doi.org/10.1016/j.cie.2022.108061Highlights- The study of malicious objects in the IoT network in smart cities.
- Proposed models using the pre-predator model to detect malicious objects.
- Stochastic behaviour of malicious objects in real dynamics is detected.
- The study of ...
Presently, the interconnected networks in smart cities are increasing at a high pace using the Internet of Things (IoT), which allows the user to access the device from anywhere and gather the data. With such massive networks, data analysis plays ...
- research-articleAugust 2022
Audio Segmentation Techniques and Applications Based on Deep Learning
- Punit Gupta,
- Shruti Aggarwal,
- Vasukidevi G,
- S. Selvakanmani,
- Bhaskar Pant,
- Kiranjeet Kaur,
- Amit Verma,
- Geleta Negasa Binegde
Audio processing has become an inseparable part of modern applications in domains ranging from health care to speech-controlled devices. In automated audio segmentation, deep learning plays a vital role. In this article, we are discussing audio ...
-
- research-articleJanuary 2022
Nature inspired fault tolerant task allocation in cloud computing using neural network model
- Punit Gupta,
- Pradeep Rawat,
- Rajan Prasad Tripathi,
- Ankit Mundra,
- Shikha Mundra,
- Mayank Kumar Goyal,
- Mandeep Kaur,
- Ruchi Agarwal,
- Valentina Emilia Balas
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 2Pages 1959–1968https://doi.org/10.3233/JIFS-219296Cloud computing in the current scenario comes with a large pool of resources, pay-per-use model and reliable infrastructure. Cloud optimization relies on resource optimization to improve the performance and reliability of the cloud. Fault in the cloud ...
- research-articleJanuary 2022
Fault aware intelligent resource allocation using Big Bang-Big Crunch trained neural network for cloud infrastructure
- Punit Gupta,
- Shikha Mundra,
- Mayank Kumar Goyal,
- Supriya Khaitan,
- Ritu Dewan,
- Ankit Mundra,
- Abha Kiran Rajpoot,
- Valentina Emilia Balas
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 2Pages 1947–1957https://doi.org/10.3233/JIFS-219295This Ongoing COVID-19 epidemic situation, which has resulted in the loss of lives and economics. In this scenario, social distancing is the only way to prevent ourselves. In such a scenario to boost the economy, a globally large number of industries and ...
- research-articleJanuary 2022
Classification of imbalanced medical data: An empirical study of machine learning approaches
- Shikha Mundra,
- Shounak Vijay,
- Ankit Mundra,
- Punit Gupta,
- Mayank Kumar Goyal,
- Mandeep Kaur,
- Supriya Khaitan,
- Abha Kiran Rajpoot,
- Valentina Emilia Balas
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 2Pages 1933–1946https://doi.org/10.3233/JIFS-219294Thousands of patients around the world affecting their health with various factor as age, body mass index, cholesterol levels, albumin levels and several other factor. Prediction of health outcome due to these factors at a proper time can be served as an ...
- research-articleJanuary 2022
Hybrid Big Bang-Big Crunch based resource scheduling to improve QoS in cloud infrastructure
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 43, Issue 2Pages 1887–1895https://doi.org/10.3233/JIFS-219290The service-oriented computing paradigm changes the way of computing. Emerging technologies like grid computing, cloud computing, and smart health care application have changed the way we compute and communicate. Cloud computing has made computing huge ...
- research-articleJanuary 2022
Fault aware hybrid harmony search technique for optimal resource allocation in cloud
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 42, Issue 4Pages 3677–3689https://doi.org/10.3233/JIFS-211846The evolution of cloud computing is increasing exponentially which provides everything as a service. Clouds made it possible to move a huge amount of data over the networks on-demand. It removed the physical necessity of resources as resources are ...
- research-articleJanuary 2022
Enhancing Security of Mobile Cloud Computing by Trust- and Role-Based Access Control
- Punit Gupta,
- Arif Mohammad Abdul,
- Arshad Ahmad Khan Mohammad,
- P. Venkat Reddy,
- Praveena Nuthakki,
- Rakesh Kancharla,
- Rahul Joshi,
- N. Kannaiya Raja
The tremendous development in mobile technology attracts users’ attention. Thus, the users are shifting from traditional computational devices to smartphones and tablets, and because of that, mobile devices have anticipated most of the global IP traffic. ...
- research-articleJanuary 2022
A Football Shot Action Recognition Method Based on Deep Learning Algorithm
Football is regarded as the world’s number one sport and is loved by all countries, and large-scale football matches are held basically every year. The key to football matches is to shoot goals, and how to improve the accuracy of football shooting ...
- research-articleJanuary 2022
Optimization of Fuel Cell Stack Consistency Based on Multi-Model
With the proposal of cloud computing, fog computing, and edge computing, various simulation operations are greatly guaranteed, which benefits the multi-model operations of Matlab and CFD. This paper established the 1-D flow network model and 12 cm ∗ 8 cm ...
- research-articleJanuary 2022
Proactive Network Fault Management for Reliable Subscribed Network Slicing in Software-Defined Mobile Data IoT Services
Proactive network solutions (PNS) become the precise management and orchestration (MANO) in the applied artificial intelligence (AI) era. The PNS proposed to invent future mobile edge communications by predicting the fault networks for reliable slicing ...
- research-articleJanuary 2022
Sports Biology Seminar of Three-dimensional Movement Characteristics of Yoga Standing Based on Image Recognition
With the exponential improvement of the integration capabilities of electronic hardware devices, digital images have become an indispensable information carrier, thus promoting the development of image recognition, detection, or tracking technologies. At ...
- research-articleJanuary 2022
The Application of Edge Computing in the Urban Industrial Spatial Form of Macau
The proposal and development of edge computing provide new ideas for the management of industrial space forms in high-density cities. With the acceleration of China’s urbanization process, the spatial distribution system of industries in cities is ...
- research-articleJanuary 2022
A Reference Source Circuit Design for Voltage Controlled Oscillator Chips
The basic principle and typical structure of the bandgap voltage reference source are introduced in detail in this paper. The performance index of the bandgap voltage reference is analyzed. The core circuit of a bandgap voltage reference source with good ...
- research-articleJanuary 2022
Implementation of Digitalized Technologies for Fashion Industry 4.0: Opportunities and Challenges
- Punit Gupta,
- Shaik Vaseem Akram,
- Praveen Kumar Malik,
- Rajesh Singh,
- Anita Gehlot,
- Ashima Juyal,
- Kayhan Zrar Ghafoor,
- Sachin Shrestha
The Sustainable Development Goals of the United Nations prioritize sustainability by 2030. The fashion industry is one most substantial manufacturing industries that generate an economy of 3 trillion dollars and contributes to 2% of the world’s gross ...
- research-articleJanuary 2022
Artificial Intelligence and Metaheuristic-Based Location-Based Advertising
Location-based services (LBS) are necessary for obtaining the important details since the user needs vary based on the location. Location-based advertising (LBA) are utilized for abandoning the user location and to offer assistance by using the obtained ...
- research-articleJanuary 2022
IoT-Based Harmful Toxic Gases Monitoring and Fault Detection on the Sensor Dataset Using Deep Learning Techniques
- Punit Gupta,
- J. Praveenchandar,
- D. Vetrithangam,
- S. Kaliappan,
- M. Karthick,
- Naresh Kumar Pegada,
- Pravin P. Patil,
- S. Govinda Rao,
- Syed Umar
One of the main reasons for accidents among workers is harmful gas leakage. Many people die in chemical industries and their surrounding areas. The present invention is responsible for monitoring and controlling hazardous toxic gases like nitrogen dioxide ...