Search Results - "Srivastava, Gautam"
-
1
A Decentralized Privacy-Preserving Healthcare Blockchain for IoT
Published in Sensors (Basel, Switzerland) (15-01-2019)“…Medical care has become one of the most indispensable parts of human lives, leading to a dramatic increase in medical big data. To streamline the diagnosis and…”
Get full text
Journal Article -
2
Effective Heart Disease Prediction Using Hybrid Machine Learning Techniques
Published in IEEE access (2019)“…Heart disease is one of the most significant causes of mortality in the world today. Prediction of cardiovascular disease is a critical challenge in the area…”
Get full text
Journal Article -
3
A survey on security and privacy of federated learning
Published in Future generation computer systems (01-02-2021)“…Federated learning (FL) is a new breed of Artificial Intelligence (AI) that builds upon decentralized data and training that brings learning to the edge or…”
Get full text
Journal Article -
4
Internet of Things Based Blockchain for Temperature Monitoring and Counterfeit Pharmaceutical Prevention
Published in Sensors (Basel, Switzerland) (16-07-2020)“…The top priority of today's healthcare system is delivering medicine directly from the manufacturer to end-user. The pharmaceutical supply chain involves some…”
Get full text
Journal Article -
5
Optimization of Big Data Scheduling in Social Networks
Published in Entropy (Basel, Switzerland) (01-09-2019)“…In social network big data scheduling, it is easy for target data to conflict in the same data node. Of the different kinds of entropy measures, this paper…”
Get full text
Journal Article -
6
Blockchain-Based Lightweight and Secured V2V Communication in the Internet of Vehicles
Published in IEEE transactions on intelligent transportation systems (01-07-2021)“…Vehicle to vehicle (V2V) communication has gained importance in recent times because of the increasing number of traffic accidents and advancements in…”
Get full text
Journal Article -
7
A systematic literature review on machine learning applications for consumer sentiment analysis using online reviews
Published in Computer science review (01-08-2021)“…Consumer sentiment analysis is a recent fad for social media-related applications such as healthcare, crime, finance, travel, and in academia. Disentangling…”
Get full text
Journal Article -
8
Applications of Wireless Sensor Networks and Internet of Things Frameworks in the Industry Revolution 4.0: A Systematic Literature Review
Published in Sensors (Basel, Switzerland) (08-03-2022)“…The 21st century has seen rapid changes in technology, industry, and social patterns. Most industries have moved towards automation, and human intervention has…”
Get full text
Journal Article -
9
Agent architecture of an intelligent medical system based on federated learning and blockchain technology
Published in Journal of information security and applications (01-05-2021)“…Multi-agent systems enable the division of complicated tasks into individual objects that can cooperate. Such architecture can be useful in building solutions…”
Get full text
Journal Article -
10
SP2F: A secured privacy-preserving framework for smart agricultural Unmanned Aerial Vehicles
Published in Computer networks (Amsterdam, Netherlands : 1999) (14-03-2021)“…The current advancement in Unmanned Aerial Vehicles (UAVs) and the proliferation of the Internet of Things (IoT) devices is revolutionizing conventional…”
Get full text
Journal Article -
11
An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
Published in IEEE journal of biomedical and health informatics (01-05-2022)“…The Internet of Health Things (IoHT) is a medical concept that describes uniquely identifiable devices connected to the Internet that can communicate with each…”
Get full text
Journal Article -
12
Neural image reconstruction using a heuristic validation mechanism
Published in Neural computing & applications (01-09-2021)“…Image reconstruction is a mathematical process, where the image is compressed into a small representation and derived from this form. The general use of the…”
Get full text
Journal Article -
13
Cyberbullying detection solutions based on deep learning architectures
Published in Multimedia systems (01-06-2023)“…Cyberbullying is disturbing and troubling online misconduct. It appears in various forms and is usually in a textual format in most social networks…”
Get full text
Journal Article -
14
Automatic recognition algorithm of traffic signs based on convolution neural network
Published in Multimedia tools and applications (01-05-2020)“…Because of the hierarchical significance of traffic sign images, the traditional methods do not effectively control and extract the brightness and features of…”
Get full text
Journal Article -
15
Contour Feature Extraction of Medical Image Based on Multi-Threshold Optimization
Published in Mobile networks and applications (01-02-2021)“…During the process of fine segmentation of medical images, although a single threshold can improve the efficiency of processing, there will be the problem of…”
Get full text
Journal Article -
16
Decentralized Authentication of Distributed Patients in Hospital Networks Using Blockchain
Published in IEEE journal of biomedical and health informatics (01-08-2020)“…In any interconnected healthcare system (e.g., those that are part of a smart city), interactions between patients, medical doctors, nurses and other…”
Get full text
Journal Article -
17
Overview and methods of correlation filter algorithms in object tracking
Published in Complex & intelligent systems (01-08-2021)“…An important area of computer vision is real-time object tracking, which is now widely used in intelligent transportation and smart industry technologies…”
Get full text
Journal Article -
18
Speech Emotion Recognition Enhanced Traffic Efficiency Solution for Autonomous Vehicles in a 5G-Enabled Space-Air-Ground Integrated Intelligent Transportation System
Published in IEEE transactions on intelligent transportation systems (01-03-2022)“…Speech emotion recognition (SER) is becoming the main human-computer interaction logic for autonomous vehicles in the next generation of intelligent…”
Get full text
Journal Article -
19
Image watermarking using soft computing techniques: A comprehensive survey
Published in Multimedia tools and applications (01-08-2021)“…Image watermarking techniques are used to provide copyright protection and verify ownership of media/entities. This technique refers to the concept of…”
Get full text
Journal Article -
20
Delay-Sensitive Secure NOMA Transmission for Hierarchical HAP-LAP Medical-Care IoT Networks
Published in IEEE transactions on industrial informatics (01-08-2022)“…Medical-care Internet of Things enables rapid medical assistance by providing comprehensive and clear healthy information. However, due to the limited…”
Get full text
Journal Article