Search Results - "Singh, Sukhdip"
-
1
An Efficient Security Testing for Android Application Based on Behavior and Activities Using Improved PCA and DNN-KNN Classifier
Published in Wireless personal communications (01-03-2024)“…Privacy and the safety of users are seriously threatened by Android, a mobile operating system that is becoming more and more popular. Due to the single…”
Get full text
Journal Article -
2
Chronic headache and backache are long-term sequelae of unintentional dural puncture in the obstetric population
Published in Journal of clinical anesthesia (01-05-2015)“…Abstract Introduction Unintentional dural puncture (UDP) and postdural puncture headache (PDPH) occur during the course of epidural catheter placement for…”
Get full text
Journal Article -
3
Epidural Catheter Placement in Morbidly Obese Parturients with the Use of an Epidural Depth Equation prior to Ultrasound Visualization
Published in TheScientificWorld (01-01-2013)“…Background. Previously, Balki determined the Pearson correlation coefficient with the use of ultrasound (US) was 0.85 in morbidly obese parturients. We aimed…”
Get full text
Journal Article -
4
Prosthodontic status and needs of elderly institutionalized residents in Mangalore: A prospective study
Published in Indian journal of dental research (01-05-2013)“…Aim: The aim of the present study is to assess the prevalence of Kennedy′s classification, status of existing prosthodontic appliances if any, awareness of the…”
Get full text
Journal Article -
5
An efficient security testing mechanism for Android Apps based on malware analysis and optimized XGBoost
Published in Multimedia tools and applications (17-01-2024)“…Security Testing of Android Applications is a difficult issue. Malicious apps are a threat to the Android platform's security. Traditional solutions are…”
Get full text
Journal Article -
6
An efficient security testing for android application based on behavior and activities using RFE-MLP and ensemble classifier
Published in Multimedia tools and applications (20-06-2024)Get full text
Journal Article -
7
Enhancing android application security: A novel approach using DroidXGB for malware detection based on permission analysis
Published in Security and privacy (01-03-2024)“…The prevalence of malicious Android applications targeting the platform has introduced significant challenges in the realm of security testing. Traditional…”
Get full text
Journal Article -
8
Security risk management in IoT environment
Published in Journal of discrete mathematical sciences & cryptography (19-05-2019)“…The internet of things (IoT) devices envision great usage in military, civilian contexts, smart grids to smart cities and internet of battlefields to internet…”
Get full text
Journal Article -
9
CovLIS-MUnet segmentation model for Covid-19 lung infection regions in CT images
Published in Neural computing & applications (01-05-2024)“…One of the most serious health concerns facing the world is coronavirus disease (COVID-19). COVID-19 is a virus that is highly infectious and contagious. The…”
Get full text
Journal Article -
10
Performance analysis and comparison of Machine Learning and LoRa-based Healthcare model
Published in Neural computing & applications (01-06-2023)“…Diabetes Mellitus (DM) is a widespread condition that is one of the main causes of health disasters around the world, and health monitoring is one of the…”
Get full text
Journal Article -
11
A 5-year audit of accidental dural punctures, postdural puncture headaches, and failed regional anesthetics at a tertiary-care medical center
Published in TheScientificWorld (01-01-2009)“…Obstetric anesthesia-related complications occur as a result of labor epidural or spinal placement. The purpose of this continuous quality-improvement audit…”
Get full text
Journal Article -
12
Machine learning and IoT‐based model for patient monitoring and early prediction of diabetes
Published in Concurrency and computation (01-11-2022)“…Summary Health monitoring is one of the sustainable development areas throughout the globe and Diabetes Mellitus is a common disease worldwide that is one of…”
Get full text
Journal Article -
13
A Review on existing IoT Architecture and Communication Protocols used in Healthcare Monitoring System
Published in Journal of the Institution of Engineers (India). Series B, Electrical Engineering, Electronics and telecommunication engineering, Computer engineering (01-02-2022)“…Nowadays, due to modernization or advancement in the Internet of Things (IoT) especially in the Healthcare area, we want to take care of our elders with some…”
Get full text
Journal Article -
14
Artificial intelligent environments: Risk management and quality assurance implementation
Published in Journal of discrete mathematical sciences & cryptography (02-01-2020)“…This research not only elaborates literature on AI techniques for risks management but also proposes a new Neuro-Fuzzy workflow process for mitigating…”
Get full text
Journal Article -
15
Android malware analysis and detection: A systematic review
Published in Expert systems (25-10-2023)“…Android malware has been emerged as a significant threat, which includes exposure of confidential information, misrepresentation of facts and execution of…”
Get full text
Journal Article -
16
A Survey of Soft Computing Approaches in Biomedical Imaging
Published in Journal of healthcare engineering (02-08-2021)“…Medical imaging is an essential technique for the diagnosis and treatment of diseases in modern clinics. Soft computing plays a major role in the recent…”
Get full text
Journal Article -
17
A Review of Conventional Techniques used for Optimized Utilization of Resources in Blockchain Network
Published in 2024 International Conference on Computational Intelligence and Computing Applications (ICCICA) (23-05-2024)“…Blockchain technology is a game-changing technology that can completely overhaul number of domains by proposing decentralized, transparent, and unchangeable…”
Get full text
Conference Proceeding -
18
WoS Bibliometric-based Review for Security Testing of Android Applications using Malware Analysis
Published in 2024 5th International Conference on Innovative Trends in Information Technology (ICITIIT) (15-03-2024)“…Android, the world's predominant mobile operating system, witnesses a constant influx of new applications. Amid this surge, the realm of Android application…”
Get full text
Conference Proceeding -
19
A Case of Thoracic Endometriosis Syndrome Presenting with Recurrent Catamenial Pneumothorax
Published in The American journal of case reports (17-05-2018)“…BACKGROUND Catamenial pneumothorax (CP) is a spontaneous pneumothorax commonly associated with menstrual periods. Endometrial tissues most commonly involve the…”
Get full text
Journal Article -
20
Maternal outcomes in women supplemented with a high-protein drink in labour
Published in Australian & New Zealand journal of obstetrics & gynaecology (01-08-2013)“…Background Because of the potential aspiration risk, oral intake is restricted during labour. Aims To determine whether high‐protein drink supplementation in…”
Get full text
Journal Article