Abhishek Kumar

@cuchd.in

Assistant Director
Chandigarh University



                          

https://researchid.co/abhi_19

Dr. Abhishek Kumar is currently working as an Assistant director /Associate professor in Computer science & Engineering Department in Chandigarh University, Punjab, India .He is Doctorate in computer science from University of Madras and is doing Post-Doctoral Fellow in Ingenium Research Group Ingenium Research Group Lab, Universidad De Castilla-La Mancha, Ciudad Real, and Ciudad Real Spain. He has done M.Tech in Computer Sci. & Engineering and B.Tech in I.T. from, Rajasthan Technical University, Kota India. He has total Academic teaching experience of more than 11 years along with 2 years teaching assistantship. He is having more than 100 publications in reputed, peer reviewed National and International Journals, books & Conferences He has guided more than 30 M.Tech Projects at national and International level and guiding 6 PhD Scholar. His research area includes- Artificial intelligence, Renewable Energy Image processing, Computer Vision, Data Mining, Machine Learning. He has been Se

RESEARCH, TEACHING, or OTHER INTERESTS

Artificial Intelligence, Engineering, Health Information Management, Energy

94

Scopus Publications

1571

Scholar Citations

22

Scholar h-index

43

Scholar i10-index

Scopus Publications

  • Making hospital environment friendly for people: A concept of HMI
    P. Rihana Begum, Badrud Duza Mohammad, A. Saravana Kumar, and K.M. Muhasina

    Wiley

  • Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification
    S. Pradeep, Yogesh Kumar Sharma, Umesh Kumar Lilhore, Sarita Simaiya, Abhishek Kumar, Sachin Ahuja, Martin Margala, Prasun Chakrabarti, and Tulika Chakrabarti

    Springer Science and Business Media LLC
    AbstractSoftware-defined networking (SDN) has significantly transformed the field of network management through the consolidation of control and provision of enhanced adaptability. However, this paradigm shift has concurrently presented novel security concerns. The preservation of service path integrity holds significant importance within SDN environments due to the potential for malevolent entities to exploit network flows, resulting in a range of security breaches. This research paper introduces a model called "EnsureS", which aims to enhance the security of SDN by proposing an efficient and secure service path validation approach. The proposed approach utilizes a Lightweight Service Path Validation using Batch Hashing and Tag Verification, focusing on improving service path validation's efficiency and security in SDN environments. The proposed EnsureS system utilizes two primary techniques in order to validate service pathways efficiently. Firstly, the method utilizes batch hashing in order to minimize computational overhead. The proposed EnsureS algorithm enhances performance by aggregating packets through batches rather than independently; the hashing process takes place on each one in the service pathway. Additionally, the implementation of tag verification enables network devices to efficiently verify the authenticity of packets by leveraging pre-established trust relationships. EnsureS provides a streamlined and effective approach for validating service paths in SDN environments by integrating these methodologies. In order to assess the efficacy of the Proposed EnsureS, a comprehensive series of investigations were conducted within a simulated SDN circumstance. The efficacy of Proposed EnsureS was then compared to that of established methods. The findings of our study indicate that the proposed EnsureS solution effectively minimizes computational overhead without compromising on the established security standards. The implementation successfully reduces the impact of different types of attacks, such as route alteration and packet spoofing, increasing SDN networks' general integrity.


  • Preface


  • ED based spectrum sensing over IRS-assisted Rayleigh-FTR fading channels
    Rahul Kumar, Shweta Singh, Shweta Chauhan, Abhineet Anand, and Abhishek Kumar

    Elsevier BV

  • A security model for smart grid SCADA systems using stochastic neural network
    Osama Bassam J. Rabie, Shitharth Selvarajan, Daniyal Alghazzawi, Abhishek Kumar, Syed Hasan, and Muhammad Zubair Asghar

    Institution of Engineering and Technology (IET)
    AbstractDetection of cyber‐threats in the smart grid Supervisory Control and Data Acquisition (SCADA) is still remains one of the complex and essential processes need to be highly concentrated in present times. Typically, the SCADA is more prone to the security issues due to their environmental problems and vulnerabilities. Therefore, the proposed work intends to design a new detection approach by integrating the optimization and classification models for smart grid SCADA security. In this framework, the min‐max normalization is performed at first for noise removal and attributes arrangement. Here, the correlation estimation mechanism is mainly deployed to reduce the dimensionality of features by choosing the relevant features used for attack prediction. Moreover, the optimal features are selected by using the optimal solution provided by the Holistic Harris Hawks Optimization (H3O). Finally, the Perceptron Stochastic Neural Network (PSNN) is utilized to categorize the normal and attacking data flow in the network with minimal processing time and complexity. By using the combination of proposed H3O‐PSNN technique, the detection accuracy is improved up to 99% for all datasets used in this study, and also other measures such as precision to 99.2%, recall to 99%, f1‐score to 99.2% increased, when compared to the standard techniques.

  • Correction to: LTE-NBP with holistic UWB-WBAN approach for the energy efficient biomedical application (Multimedia Tools and Applications, (2023), 10.1007/s11042-023-15093-7)
    Abhishek Kumar, Pramod Sing Rathore, Ashutosh Kumar Dubey, Rashmi Agrawal, and Kanta Prasad Sharma

    Springer Science and Business Media LLC

  • LTE-NBP with holistic UWB-WBAN approach for the energy efficient biomedical application
    Abhishek Kumar, Pramod Sing Rathore, Ashutosh Kumar Dubey, Rashmi Agrawal, and Kanta Prasad Sharma

    Springer Science and Business Media LLC


  • IoT based arrhythmia classification using the enhanced hunt optimization-based deep learning
    Abhishek Kumar, Swarn Avinash Kumar, Vishal Dutt, S. Shitharth, and Esha Tripathi

    Wiley

  • Design and Development of Consensus Activation Function Enabled Neural Network-Based Smart Healthcare Using BIoT
    Ilyas Benkhaddra, Abhishek Kumar, Mohamed Ali Setitra, and Lei Hang

    Springer Science and Business Media LLC

  • Deep learning and its applications using Python


  • Concepts of circular economy for sustainable management of electronic wastes: challenges and management options
    Arun Lal Srivastav, Markandeya, Naveen Patel, Mayank Pandey, Ashutosh Kumar Pandey, Ashutosh Kumar Dubey, Abhishek Kumar, Abhishek Kumar Bhardwaj, and Vinod Kumar Chaudhary

    Springer Science and Business Media LLC

  • Prevention of DDoS attacks using an optimized deep learning approach in blockchain technology
    Benkhaddra Ilyas, Abhishek Kumar, Mohamed Ali Setitra, ZineEl Abidine Bensalem, and Hang Lei

    Wiley
    The attack named Distributed Denial of Service (DDoS) that takes place in the large blockchain network requires an efficient and robust attack detection and prevention mechanism for authenticated access. Blockchain is a distributed network in which the attacker tries to hack the network by utilizing all the resources with the application of enormous requests. Several methods like Rival Technique, filter modular approach and so on, were developed to detect and prevent the DDoS attack in the blockchain; still, detection accuracy is a challenging task. Hence, this research introduces an efficient technique using optimization‐based deep learning by considering the blockchain network and smart contract for the detection and prevention of DDoS attacks. Based on the user request, the traffic is analyzed, and the verification using the smart contract is made to find the authenticated user. After the verification, the response is provided for the authenticated user, and the suspicious traffic is utilized for the detection of DDoS attacks using the Poaching Raptor Optimization‐based deep neural network (Poaching Raptor‐based DNN), in which the classifier is tuned using the proposed optimization algorithm to reduce the training loss. The proposed algorithm is designed by hybridizing the habitual practice of the raptor by considering the concurring behavior, hunting style along with poaching behavior of the Lobo to enhance the detection accuracy. After the attack detection, the nonattacker is responded, and the attacker is prevented by entering the IP/MAC address in the logfile. The performance of the proposed method is evaluated in terms of recall, precision, FPR, and accuracy and obtained the values of 96.3%, 98.22%, 3.33%, and 95.12%, respectively.

  • Predicting Hospital Readmission Risk for Heart Failure Patients Using Machine Learning Techniques: A Comparative Study of Classification Algorithms
    Venkata Raghuveer Burugadda, Prashant S. Pawar, Abhishek Kumar, and Neha Bhati

    IEEE
    Heart failure is a frequent cause of hospitalization and readmission because of the severity of the disease. Researchers explored using Machine Learning (ML) algorithms to forecast whether heart failure patients must be readmitted to the hospital. This study examines ML algorithms that use data from electronic health records to forecast hospital readmissions for patients with heart failure. We will assess the accuracy, precision, recall, and F1-score of logistic regression, decision trees, random forests, Support Vector Machines (SVM), and artificial neural networks. The study's results will show how well ML algorithms predict heart failure patients' hospital readmission risk, which could lead to personalized therapies that improve patient outcomes and save healthcare costs. Comparing studies in this field shows gaps in model interpretability, generalizability, and socioeconomic determinants of health in prediction models.

  • A Machine Learning-Based Algorithm for Early Detection of Sepsis in Hospitalized Patients: Development and Evaluation
    Venkata Raghuveer Burugadda, Priyanka Makrand Mane, Abhishek Kumar, and Neha Bhati

    IEEE
    Early sepsis detection improves patient outcomes and care. This research provides a Machine Learning (ML) system for hospitalized sepsis detection. Gradient boosting, an ensemble learning method, analyses patient data to detect sepsis early. A comprehensive electronic health record database, MIMIC-III, was used to design and test the algorithm. The algorithm's sepsis detection accuracy, precision, recall, F1 score, and ROC AUC were measured. The proposed approach was more accurate than traditional models. It accurately predicted sepsis patients and aid treatment. Real-time clinical decision-making is possible with the algorithm's fast prediction and training. It could revolutionize sepsis management by giving doctors a dependable early detection and intervention tool. The algorithm must be tested in various healthcare environments and patient demographics. To implement this technology widely, privacy and ethics must be addressed. The approach may improve patient outcomes and lower healthcare costs by detecting sepsis early.

  • Hybrid Algorithm for Real-Time Sign Language Detection System
    Oskar Krishna Shrestha, Sakar Khatiwada, Adarsha Ghimire, Bibhuti Rajbhandari, and A Vijay Kumar

    IEEE
    This research paper suggests a machine learning-based system designed to interpret sign languages in real-time from a video feed to help deaf and hard of hearing individuals overcome communication barriers. Sign languages employ hand gestures, facial expressions, and body language to convey ideas and meaning visually. Unfortunately, individuals with hearing impairments face communication difficulties, limited access to information and services, and social isolation. The proposed system captures the subject's gestures using a camera, which are then processed using a TensorFlow object detection API that predicts based on a pre-trained machine learning model. The system's methodology incorporates supervised learning, Single Shot MultiBox Detector (SSD) object detection algorithm, and the luminosity method for converting colour images to grayscale. For dataset creation, hand gesture image samples were captured and labelled using open-source graphical annotation software LabelImg, and the model was trained. The system proposed achieved an average accuracy of 95% and has the potential to improve communication and reduce marginalization for deaf and hard of hearing individuals.

  • Boosting the Accuracy of Cardiovascular Disease Prediction Through SMOTE
    Rajasrikar Punugoti, Vishal Dutt, Abhishek Kumar, and Neha Bhati

    IEEE
    Cardiovascular Disease (CVD) affects deaths and hospitalisations. Clinical data analytics struggles to predict heart disease survival. This report compares machine learning-based cardiovascular disease prediction studies. The authors use a Kaggle dataset of 70,000 records and 16 features to show a SMOTE model with hyperparameter-optimized classifiers. Random Forest outperforms KNN with 13 elements in cardiovascular disease prediction. Naive Bayes outperforms SVM on complete feature sets. The proposed model achieves 86% accuracy, and the optimised SMOTE technique outperforms the traditional SMOTE technique in all metrics. This study analyses the strengths and weaknesses of existing models for making cardiovascular disease predictions with machine learning and suggests a promising new method.

  • An Advance Approach for Diabetes Detection by Implementing Machine Learning Algorithms
    Shagun Preet Kour, Abhishek Kumar, and Sachin Ahuja

    IEEE
    Early identification of diabetes is vital since it's an incurable condition with no complete cure. We used data mining and machine learning strategies in our investigation to anticipate diabetes. 768 individuals and their relevant attributes are the focus of the hour. Few machine learning methods have been applied to the dataset for the goal of forecasting the occurrence of diabetes. The implemented algorithms' consistency and harshness have been investigated using methods that focused on correlating accuracy and F-1 rankings. Comparison between algorithms is done to increase the accuracy in comparison. We predicted Extra Tree Classifier gives 80% accuracy compared to support vector Machine. The goal of this study is to create a feasible strategy that will aid medical personnel with the diagnosis of diabetic complications at a tender point.

  • Intelligent Embedded Advanced Machine Learning Approach for Smartphone Movement Identification using Stacked Auto-Encoders


  • Multimodal Neuroimaging Data in Early Detection of Alzheimer's Disease: Exploring the Role of Ensemble Models and GAN Algorithm
    Uday Shankar Sekhar, Narayan Vyas, Vishal Dutt, and Abhishek Kumar

    IEEE
    This research aimed to evaluate numerous deep-learning models for Alzheimer's disease detection using several different neuroimaging techniques. Ten recent studies were selected for comparison based on their methodology, conclusions, and limitations. The Generative Adversarial Network (GAN) algorithm is applied fictitiously to the Alzheimer's Disease Neuroimaging Initiative (ADNI) dataset, and results are provided. A comparison was made between the results of the GAN algorithm and the selected studies. Evaluation metrics were presented in a table and a graph. The study concludes that ensemble models and multi-modal approaches improve Alzheimer's Disease detection performance. However, there is a need for further work to be done to address issues, including limited sample sizes and a lack of external validation.

  • Machine Learning Model for Face Spoof Detection with Textural Feature Extraction
    Rishabh Dhiman, Anupam Baliyan, and Abhishek Kumar

    IEEE
    Face spoof detection is a scheme for detecting the spoofed faces. Various techniques have been designed for the face spoof detection, based on features, machine learning (ML) and deep learning (DL) in the past few years, and has drawn great interest in a variety of domains that are most accessible and leads to maintain abundant information in day-to-day life. Face spoof detection techniques which are based on Artificial Intelligence (AI) contain several stages such as pre-process the data, extract the features and classify the faces. The earlier method makes the deployment of K-Nearest Neighbor with Grey Level Co-occurrence Matrix to detect the face spoofing, but at lower accuracy. Moreover, $\\text{DWT}-\\text{LBP}-\\text{DCT}+\\text{SVM}$ algorithm is also implemented to detect the face-spoofing. However, the accuracy of these algorithms is found lower. This work projects a hybrid technique in which RF, K-Nearest Neighbor (KNN) and Support Vector Machine algorithms are put together. The simulation results exhibited the supremacy of the projected technique as compared to other methods concerning accuracy.

  • Performance Validation of Secret Data in IoT using Blockchain
    Priya Batta, Sachin Ahuja, and Abhishek Kumar

    IEEE
    Many industries have serious concerns about the secure transmission of sensitive data, and the use of blockchain technology, steganography, and optimization algorithms has emerged as a potent remedy. Steganography and optimization algorithms can hide data and increase the effectiveness of the transmission process, while blockchain technology offers a transparent and secure platform for data storage and transfer. The employment of these technologies in tandem to offer a reliable and secure solution for the transfer of sensitive data is provided in this paper. We also go over this strategy's possible advantages and difficulties and offer suggestions for successfully putting it into practice. Overall, a promising method for the secure transfer of confidential data in the current digital era is provided by the combination of blockchain, steganography, and optimization algorithms. This tactic ensures the development of a reliable and efficient blockchain platform for the management of sensitive data while upholding predetermined standards.

  • Using Analytics to Measure the Impact of Pollution Parameters in Major Cities of India
    Manohar Kapse, N. Elangovan, Abhishek Kumar, and Joseph Durai Selvam

    Springer Nature Singapore

  • A Review on Double Spending Problem in Blockchain
    Abhishek Kumar, Bashant Kumar Sah, Tushar Mehrotra, and Gaurav Kumar Rajput

    IEEE
    The double-spending problem in blockchain technology is a significant challenge that threatens the integrity and trustworthiness of decentralized systems. This problem occurs when a user attempts to spend the same cryptocurrency unit twice, leading to a situation where the blockchain network must decide which transaction to accept and which to reject. One of the most urgent problems with blockchain technology is the issue of double spending, as it undermines the fundamental principles of trust and transparency that underlie decentralized systems. Various factors can contribute to the double-spending problem, including network latency, malicious actors, and the consensus mechanism used to validate transactions. This study investigates the many approaches put out to solve the double-spending issue in blockchain technology. The proof-of-work consensus mechanism, which necessitates network users to carry out difficult calculations in order to validate transactions, is one of the most popular alternatives. The proof-of-stake consensus technique is an additional remedy, which relies on participants staking their cryptocurrency units to validate transactions. While both mechanisms have their advantages and disadvantages, they are not foolproof and can be vulnerable to attacks. Emerging technologies, like multi-party computation and zero-knowledge proofs, are being investigated in addition to current solutions to the double-spending issue. Overall, this paper highlights the critical nature of the double-spending problem in blockchain technology and evaluates the existing and emerging solutions to the issue.

RECENT SCHOLAR PUBLICATIONS

  • Sustainable Management of Electronic Waste
    A Kumar, PS Rathore, AK Dubey, AL Srivastav, V Dutt, T Ananthkumar
    John Wiley & Sons 2024

  • An Adaptive Salp-Stochastic-Gradient-Descent-Based Convolutional LSTM With MapReduce Framework for the Prediction of Rainfall
    SO Manoj, A Kumar, AK Dubey, JP Ananth
    International Journal of Interactive Multimedia and Artificial Intelligence 2024

  • Parkinson's Disease Detection Using Machine Learning
    A Kabotra, A Baliyan, A Kumar
    2023 2nd International Conference on Futuristic Technologies (INCOFT), 1-3 2023

  • Shining a Light on Solar Power Forecasting: Machine Learning Techniques for Unprecedented Accuracy
    A Mangot, A Kumar, A Baliyan
    2023 3rd International Conference on Technological Advancements in 2023

  • ED based spectrum sensing over IRS-assisted Rayleigh-FTR fading channels
    R Kumar, S Singh, S Chauhan, A Anand, A Kumar
    AEU-International Journal of Electronics and Communications 171, 154908 2023

  • Deep Learning and Its Applications Using Python
    NK Basha, SB Khan, A Kumar, A Mashat
    John Wiley & Sons 2023

  • Developing an SDN security model (EnsureS) based on lightweight service path validation with batch hashing and tag verification
    S Pradeep, YK Sharma, UK Lilhore, S Simaiya, A Kumar, S Ahuja, ...
    Scientific Reports 13 (1), 17381 2023

  • Correction to: LTE-NBP with holistic UWB-WBAN approach for the energy efficient biomedical application
    A Kumar, PS Rathore, AK Dubey, R Agrawal, KP Sharma
    Multimedia Tools and Applications 82 (25), 39813-39813 2023

  • A security model for smart grid SCADA systems using stochastic neural network
    OBJ Rabie, S Selvarajan, D Alghazzawi, A Kumar, S Hasan, MZ Asghar
    IET Generation, Transmission & Distribution 17 (20), 4541-4553 2023

  • LTE-NBP with holistic UWB-WBAN approach for the energy efficient biomedical application
    A Kumar, PS Rathore, AK Dubey, R Agrawal, KP Sharma
    Multimedia Tools and Applications 82 (25), 39797-39811 2023

  • A Machine Learning-Based Algorithm for Early Detection of Sepsis in Hospitalized Patients: Development and Evaluation
    VR Burugadda, PM Mane, A Kumar, N Bhati
    2023 1st International Conference on Circuits, Power and Intelligent Systems 2023

  • Efficient Privacy Preserving Lightweight Cryptography for Multi-hop Clustering in Internet of Vehicles Network
    A Kumar, AK Dubey, S Ahuja, V Dutt
    2023

  • Predicting Hospital Readmission Risk for Heart Failure Patients Using Machine Learning Techniques: A Comparative Study of Classification Algorithms
    VR Burugadda, PS Pawar, A Kumar, N Bhati
    2023 Second International Conference on Trends in Electrical, Electronics 2023

  • Multimodal Neuroimaging Data in Early Detection of Alzheimer's Disease: Exploring the Role of Ensemble Models and GAN Algorithm
    US Sekhar, N Vyas, V Dutt, A Kumar
    2023 International Conference on Circuit Power and Computing Technologies 2023

  • Machine Learning Model for Face Spoof Detection with Textural Feature Extraction
    R Dhiman, A Baliyan, A Kumar
    2023 International Conference on Circuit Power and Computing Technologies 2023

  • Quantum Computing and Artificial Intelligence: Training Machine and Deep Learning Algorithms on Quantum Computers
    P Raj, A Kumar, AK Dubey, S Bhatia, O Manoj S
    De Gruyter 2023

  • IoT based arrhythmia classification using the enhanced hunt optimization‐based deep learning
    A Kumar, SA Kumar, V Dutt, S Shitharth, E Tripathi
    Expert Systems 40 (7), e13298 2023

  • An Advance Approach for Diabetes Detection by Implementing Machine Learning Algorithms
    SP Kour, A Kumar, S Ahuja
    2023 IEEE World Conference on Applied Intelligence and Computing (AIC), 136-141 2023

  • Performance Validation of Secret Data in IoT using Blockchain
    P Batta, S Ahuja, A Kumar
    2023 World Conference on Communication & Computing (WCONF), 1-6 2023

  • Boosting the Accuracy of Cardiovascular Disease Prediction Through SMOTE
    R Punugoti, V Dutt, A Kumar, N Bhati
    2023 International Conference on IoT, Communication and Automation 2023

MOST CITED SCHOLAR PUBLICATIONS

  • Study and analysis of SARIMA and LSTM in forecasting time series data
    AK Dubey, A Kumar, V Garca-Daz, AK Sharma, K Kanhaiya
    Sustainable Energy Technologies and Assessments 47, 101474 2021
    Citations: 126

  • Energy-efficient cluster head selection through relay approach for WSN
    PS Rathore, JM Chatterjee, A Kumar, R Sujatha
    The Journal of Supercomputing 77, 7649-7675 2021
    Citations: 102

  • A novel hybrid approach of SVM combined with NLP and probabilistic neural network for email phishing
    A Kumar, JM Chatterjee, VG Daz
    International Journal of Electrical and Computer Engineering 10 (1), 486 2020
    Citations: 81

  • Machine learning implementation on medical domain to identify disease insights using TMS
    SM Sasubilli, A Kumar, V Dutt
    2020 International Conference on Advances in Computing and Communication 2020
    Citations: 75

  • An approach for classification using simple CART algorithm in WEKA
    N Bhargava, S Dayma, A Kumar, P Singh
    2017 11th International Conference on Intelligent Systems and Control (ISCO 2017
    Citations: 69

  • Improving health care by help of internet of things and bigdata analytics and cloud computing
    SM Sasubilli, A Kumar, V Dutt
    2020 International Conference on Advances in Computing and Communication 2020
    Citations: 61

  • Multi model implementation on general medicine prediction with quantum neural networks
    SA Kumar, A Kumar, V Dutt, R Agrawal
    2021 Third International Conference on Intelligent Communication 2021
    Citations: 53

  • An efficient ACO-PSO-based framework for data classification and preprocessing in big data
    AK Dubey, A Kumar, R Agrawal
    Evolutionary Intelligence 14, 909-922 2021
    Citations: 46

  • A holistic methodology for improved RFID network lifetime by advanced cluster head selection using dragonfly algorithm
    PS Rathore, A Kumar, V Garca-Daz
    International Journal of Interactive Multimedia and Artificial Intelligence 2020
    Citations: 44

  • Machine learning and big data implementation on health care data
    G Sasubilli, A Kumar
    2020 4th International Conference on Intelligent Computing and Control 2020
    Citations: 42

  • Parkinson’s disease prediction using adaptive quantum computing
    SR Swarna, A Kumar, P Dixit, TVM Sairam
    2021 Third International Conference on Intelligent Communication 2021
    Citations: 41

  • Framework for realization of green smart cities through the internet of things (iot)
    A Kumar, M Payal, P Dixit, JM Chatterjee
    Trends in Cloud-based IoT, 85-111 2020
    Citations: 40

  • IoT-based ECG monitoring for arrhythmia classification using Coyote Grey Wolf optimization-based deep learning CNN classifier
    A Kumar, SA Kumar, V Dutt, AK Dubey, V Garca-Daz
    Biomedical Signal Processing and Control 76, 103638 2022
    Citations: 36

  • Exploring the Effectiveness of Optimized Convolutional Neural Network in Transfer Learning for Image Classification: A Practical Approach
    SR Burri, S Ahuja, A Kumar, A Baliyan
    2023 International Conference on Advancement in Computation & Computer 2023
    Citations: 27

  • Performance estimation of machine learning algorithms in the factor analysis of COVID-19 dataset
    AK Dubey, S Narang, A Kumar, SM Sasubilli, V Garca-Daz
    Computers, Materials, & Continua 66 (2), 1921-1936 2021
    Citations: 27

  • Internet of things use cases for the healthcare industry
    P Raj, JM Chatterjee, A Kumar, B Balamurugan
    Springer 2020
    Citations: 26

  • Predictive intelligence for healthcare outcomes: An ai architecture overview
    SR Burri, A Kumar, A Baliyan, TA Kumar
    2023 2nd International Conference on Smart Technologies and Systems for Next 2023
    Citations: 25

  • Machine learning implementation for smart health records: A digital carry card
    A Kumar, T Sairam, V Dutt
    Eureka 2581, 5156 2019
    Citations: 24

  • A Novel Approach for Anomaly Detection in Time-Series Data using Generative Adversarial Networks
    R Raturi, A Kumar, N Vyas, V Dutt
    2023 International Conference on Sustainable Computing and Smart Systems 2023
    Citations: 22

  • Comparative Study on Machine Learning models for Early Diagnose of Alzheimer's Disease: Multi Correlation Method
    PK Kotturu, A Kumar
    2020 5th International Conference on Communication and Electronics Systems 2020
    Citations: 22

RESEARCH OUTPUTS (PATENTS, SOFTWARE, PUBLICATIONS, PRODUCTS)

Method Of Data Transmission In A Cluster Network
INDIAN PATENT OFFICE
System And Method For Cluster Head Selection And Cluster Formation For Improving Radio Frequency Identification
Network
INDIAN PATENT OFFICE
202111022269
Iot Enabled Wall Climbing Robot For Security
IP AUSTRALIA /GRANTED
2021101471
An Artificial Intelligence And IoT Based Method For Prevention Of Security Attack On Cloud Medical Data
IP AUSTRALIA/ GRANTED
2021102115
Iot Based Generic Framework For Computer Security Using Artificial Immune System
IP AUSTRALIA /GRANTED
2021102104
Podium with display facility, box and glass holder
INDIAN PATENT OFFICE/GRANTED
346057-001
Hexa Tube LED Bulb
INDIAN PATENT OFFICE/GRANTED
356883001
SMART SHOPPING CART
INDIAN PATENT OFFICE
202111061690

202111018897