Dr Anurag Jain

@rgibhopal.com

Professor CSE



                 

https://researchid.co/anuragakjain

EDUCATION

PHD in Information Technology

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering, Computer Science Applications, Information Systems, Artificial Intelligence

12

Scopus Publications

953

Scholar Citations

14

Scholar h-index

23

Scholar i10-index

Scopus Publications

  • Systematic Analysis based on Conflux of Machine Learning and Internet of Things using Bibliometric analysis
    , Nasib Nasib, , , , , , Santosh Reddy Addula, Anurag Jain, Preeti Gulia,et al.

    ASPG Publishing LLC
    IoT devices produce a gigantic amount of data and it has grown exponentially in previous years. To get insights from this multi-property data, machine learning has proved its worth across the industry. The present paper provides an overview of the variety of data collected through IoT devices. The conflux of machine learning with IoT is also explained using the bibliometric analysis technique. This paper presents a systematic literature review using bibliometric analysis of the data collected from Scopus and WoS. Academic literature for the last six years is used to explore research insights, patterns, and trends in the field of IoT using machine learning. This study analyses and assesses research for the last six years using machine learning in seven IoT domains like Healthcare, Smart City, Energy systems, Industrial IoT, Security, Climate, and Agriculture. The author’s and country-wise citation analysis is also presented in this study. VOSviewer version 1.6.18 is used to provide a graphical representation of author citation analysis. This study may be quite helpful for researchers and practitioners to develop a blueprint of machine learning techniques in various IoT domains.

  • A decision tree C4.5-based voltage security events classifier for electric power systems
    Sanjiv Kumar Jain, Shweta Agrawal, Prashant Kumar Shukla, Piyush Kumar Shukla, and Anurag Jain

    Inderscience Publishers

  • Personalized Liver Cancer Risk Prediction Using Big Data Analytics Techniques with Image Processing Segmentation
    Anurag Jain, Ahmed Nadeem, Huda Majdi Altoukhi, Sajjad Shaukat Jamal, Henry kwame Atiglah, and Haitham Elwahsh

    Wiley
    A technology known as data analytics is a massively parallel processing approach that may be used to forecast a wide range of illnesses. Many scientific research methodologies have the problem of requiring a significant amount of time and processing effort, which has a negative impact on the overall performance of the system. Virtual screening (VS) is a drug discovery approach that makes use of big data techniques and is based on the concept of virtual screening. This approach is utilised for the development of novel drugs, and it is a time‐consuming procedure that includes the docking of ligands in several databases in order to build the protein receptor. The proposed work is divided into two modules: image processing‐based cancer segmentation and analysis using extracted features using big data analytics, and cancer segmentation and analysis using extracted features using image processing. This statistical approach is critical in the development of new drugs for the treatment of liver cancer. Machine learning methods were utilised in the prediction of liver cancer, including the MapReduce and Mahout algorithms, which were used to prefilter the set of ligand filaments before they were used in the prediction of liver cancer. This work proposes the SMRF algorithm, an improved scalable random forest algorithm built on the MapReduce foundation. Using a computer cluster or cloud computing environment, this new method categorises massive datasets. With SMRF, small amounts of data are processed and optimised over a large number of computers, allowing for the highest possible throughput. When compared to the standard random forest method, the testing findings reveal that the SMRF algorithm exhibits the same level of accuracy deterioration but exhibits superior overall performance. The accuracy range of 80 percent using the performance metrics analysis is included in the actual formulation of the medicine that is utilised for liver cancer prediction in this study.

  • A Machine Learning-Based Big EEG Data Artifact Detection and Wavelet-Based Removal: An Empirical Approach
    Shalini Stalin, Vandana Roy, Prashant Kumar Shukla, Atef Zaguia, Mohammad Monirujjaman Khan, Piyush Kumar Shukla, and Anurag Jain

    Hindawi Limited
    The electroencephalogram (EEG) signals are a big data which are frequently corrupted by motion artifacts. As human neural diseases, diagnosis and analysis need a robust neurological signal. Consequently, the EEG artifacts’ eradication is a vital step. In this research paper, the primary motion artifact is detected from a single-channel EEG signal using support vector machine (SVM) and preceded with further artifacts’ suppression. The signal features’ abstraction and further detection are done through ensemble empirical mode decomposition (EEMD) algorithm. Moreover, canonical correlation analysis (CCA) filtering approach is applied for motion artifact removal. Finally, leftover motion artifacts’ unpredictability is removed by applying wavelet transform (WT) algorithm. Finally, results are optimized by using Harris hawks optimization (HHO) algorithm. The results of the assessment confirm that the algorithm recommended is superior to the algorithms currently in use.

  • A survey on cost aware task allocation algorithm for cloud environment
    Manisha Gupta and Anurag Jain

    IEEE
    Cloud computing is a reliable computing platform for large computational intensive or data intensive tasks. This has been accepted by many industrial giants of software industry for their software solutions, companies like Microsoft, Accenture, Ericson etc has adopted cloud computing as their first choice for cheap and reliable computing. But which increase in number of clients adopting this there is requirement of much more cost efficient and high performance computing for more trust and reliability among the client and the service provide to guarantee cheap and more efficient solutions. So the tasks in cloud need to be allocated in an efficient manner to provide high resource utilization and least execution time for high performance, at the same time provide least computational cost as cloud follows pay-per use model. Many resource algorithms are been proposed to improve the performance, but are not cost efficient at same time. Algorithms like genetic, particle swarm and ant colony algorithm are efficient solutions but not cost efficient. So this paper presets an study of various existing algorithms.

  • SMS text compression and encryption on Android O.S
    Manoj Patil, Vinay Sahu, and Anurag Jain

    IEEE
    Today in the world of globalization mobile communication is one of the fastest growing medium though which one sender can interact with other in short time. During the transmission of data from sender to receiver, size of data is important, since more data takes more time. But one of the limitations of sending data through mobile devices is limited use of bandwidth and number of packets transmitted. Also the security of these data is important. Hence various protocols are implemented which not only provides security to the data but also utilizes bandwidth. Here we proposed an efficient technique of sending SMS text using combination of compression and encryption. The data to be send is first encrypted using Elliptic curve Cryptographic technique, but encryption increases the size of the text data, hence compression is applied to this encrypted data so the data gets compressed and is send in short time. The Compression technique implemented here is an efficient one since it includes an algorithm which compresses the text by 99.9%, hence a great amount of bandwidth gets saved.The hybrid technique of Compression-Encryption of SMS text message is implemented for Android Operating Systems.

  • A efficient key strategy for prolonging network lifetime in wireless network
    Neha Gupta, Anurag Jain, and Harsh Kumar Singh

    IEEE
    This paper provides on introduction on key strategy for wireless sensor network. Many key Strategy are focus on proposed pair wise based on key strategy technique. Key management Mechanism Provide a security over a Wireless sensor network. Many Scheme are focus on proposing new pair wise based key management strategy. The key management mechanism combines trusted-server and key pre-distribution scheme which meets the security requirement of WSN. Some features of key management strategy we need a lot of energy to communicate a node with each other and increase a network size over a network through a insert a new node. Many Scheme provide a various protocol over a network. The key management Scheme contain a static and dynamic key management Strategy. We use a particular Protocol to select and analysis a accurate performance of sensor network. We use a AODV (ADHOC on demand distance vector routing protocol) Protocol use a network model. AODV Protocol basically use a network layer.

  • Hybrid association-classification algorithm for anomaly extraction
    Gaurav Shelke, Anurag Jain, and Shubha Dubey

    IEEE
    Knowledge extraction is a process of filtering some informative knowledge from the database so that it can be used wide variety of applications and analysis. Due to this highly efficient algorithm is required for data mining and for accessing data from large datasets. Although there are various techniques implemented for the detection of anomalies using frequent item sets using apriori algorithm but the technique applied are not suitable for large database and contains more error rate and also the classification ratio is less. Hence in this paper an efficient technique is implemented using the combinatorial method of Classification and association rule mining. First the fuzzy apriori algorithm is applied to generate frequent item sets and then CART algorithm is applied for the classification of the network anomalies.

  • Effective dictionary based data compression and pattern searching in dictionary based compressed data
    Pooja Jain, Anurag Jain, and Chetan Agrawal

    IEEE
    Effective data compression is the most important concern in data management methods. The LZW Compression method is one of the most popular algorithms in different compression method. There is one more concern i.e. compressed pattern matching. Compressed pattern matching is an emerging research area that addresses the problem in which finding patterns in the compressed data and report all the occurrences of the patterns without decompressing the compressed data. In this thesis has developed, analyzed and test a new data compression technique “Compression data Based on Dictionary” and "Searching Algorithm in Compressed data". This Algorithm generates the compression codes for words and maintains a dictionary for compression as well as decompression. Searching algorithm uses the quick search string matching algorithm for finding the required patterns.

  • A novel defense scheme against DDOS attack in VANET
    Ayonija Pathre, Chetan Agrawal, and Anurag Jain

    IEEE
    Vehicular ad hoc network (VANET) has extensively used to enhance protection of the passengers and reduce occasion of traffic congestion. Consistent communication in vehicular ad-hoc networks is important to provide functional and reliable traffic safety and efficiency applications. Security is the major issue in the network due to the mobile nature of the vehicle. In this paper we proposed the novel traffic congestion detection and removal scheme against DDOS attack Here the attacker behavior is broadcast the huge numbers of false information packets in network i.e. the false information about the traffic. The number of nodes or vehicles that receives the false packet information are affected from attack are called Node. Now if the traffic is jammed or congestion occurring and their information goes to Roadside Unit (RSU) then RSU must be detected and excluded permanently from the network after applying proposed effective approach. Proposed scheme against DDOS attack aims to identify and exclude attackers from the network. In the presence of misbehaving in network the false information is transferred in the network by that the vehicles are deciding to do the routing according to false information. Proposed security scheme recovers control information and improves the performance of VANET in the presence of an attacker.

  • Restoration of blur & noisy images using hybrid kernel-padding algorithm with transformation technique
    Rohina Ansari, Himanshu Yadav, and Anurag Jain

    IEEE
    Digital world is a dire need of the current scenario. Now these days equipments take the digital snapshots which may be blur due to bad focus of camera, relative motion between camera and scene to be capture etc. This is an extensive problem to restore this sort of images. This paper proposed a hybrid methodology to recover these images in order to improve the quality. This work uses the basic concept of kernel and padding. This work also applies the Haar wavelet Transform for filtering the image in order to reconstruct image which have the noise and blur. The results of this paper show that the proposed method gives the better result from the previous methods. It seems to be that the PSNR, Mean Square Rate and execution time is better in the proposed scheme.

  • Hybrid model for preserving brightness over the digital image processing
    Vaishali Ahirwar, Himanshu Yadav, and Anurag Jain

    IEEE
    Digital image processing is versatile research in this era. Many researchers implement different types of organizations like image restoration, image enhancement, color image processing, image segmentation etc. Image enhancement technique is among the simplest and most appealing area of digital image processing. Enhancement techniques like brightness preservation, contrast enhancement highlight certain features means depend which part of the image want to be enhance some application some input image including noise, reduction or removal of noise is also form of image enhancement. Brightness preservation has enhanced visual quality of digital image so that the limitation contained in these images is used for various applications in a better way. A very popular technique for image enhancement is histogram equalization (HE) and curvelet transformation. HE technique is commonly employed for image enhancement because of its simplicity and comparatively better performance on almost all types of images. Another widely used technique is curvelet transformation. This technique is identified and separate bright regions of image but more error rate and low peak signal to noise ratio(PSNR), result of this technique is brightness preservation level is low and output image is gray. This paper design a hybrid model through discrete cosine transformation, discrete wavelet transformation and combine output of both techniques with image fusion. Proposed algorithm enhanced features and removal noise by decomposition of image using DWT and discrete cosine transformation, adaptive histogram equalization is very important part in this algorithm for smooth image. The tested results of different images are comparing with previous method, generating result with different parameters; less mean square error and high PSNR for improve the quality of an image. This paper presents a hybrid model used various parameter for enhance images like satellite images, medical images etc.

RECENT SCHOLAR PUBLICATIONS

  • Crop yield prediction using automated analytical and predictive techniques
    B Patidar, SK Sinha, A Jain
    Artificial Intelligence and Information Technologies, 441-446 2024

  • Systematic Analysis based on Conflux of Machine Learning and Internet of Things using Bibliometric analysis
    A Chahal, SR Addula, A Jain, P Gulia, NS Gill
    Journal of Intelligent Systems and Internet of Things 13 (1), 196-224 2024

  • Effective Cardiovascular Disease Prediction on Different Parameters
    MT Jain, A Jain
    International Journal of Scientific Research in Science, Engineering and 2023

  • Comparison of machine learning methods for OHSUMED -F Data Set: A Cardiovascular Diseases Simulation Study
    V Gupta, A jain, SK Sinha
    NeuroQuantology 20 (15), 385-390 2022

  • Impact of Minimum Support Price on Cropping Pattern
    B Patidar, SK Sinha, A Jain
    International Journal of Engineering Research in Current Trends (IJERCT) 4 (4) 2022

  • A Prototype Classification Algorithm for Stock Price Prediction using Optimized Variance of Attributes
    J Bhangre, A Jain
    Mathematical Statistician and Engineering Applications 71 (4), 1574-1586 2022

  • Optimized the Variation of Attribute for Stock Market Prediction Using Machine Learning
    J Bhangre, A Jain
    Mathematical Statistician and Engineering Applications 71 (4), 423-437 2022

  • DETECTION OF CYBER-ATTACKS IN CLOUD COMPUTING USING OPTIMIZATION OF TRAFFIC CONTENT AND ENSEMBLE CLASSIFIER
    JK GHAI, A JAIN
    Stochastic Modeling & Applications 26 (4), 157 – 164 2022

  • OPTIMIZATION OF BAG-OF-RESOURCE SCHEDULING IN CLOUD COMPUTING USING CLUSTERING ALGORITHM & PARTICLE SWARM OPTIMIZATION
    KS PATIL, A JAIN
    Stochastic Modeling & Applications 26 (3), 165 – 172 2022

  • A decision tree C4. 5-based voltage security events classifier for electric power systems
    SK Jain, S Agrawal, PK Shukla, PK Shukla, A Jain
    International Journal of Engineering Systems Modelling and Simulation 13 (4 2022

  • Personalized liver cancer risk prediction using big data analytics techniques with image processing segmentation
    A Jain, A Nadeem, HM Altoukhi, SS Jamal, H kwame Atiglah, H Elwahsh
    Computational Intelligence and Neuroscience 2022 2022

  • Performance Analysis Of Load Balancing Algorithms Based On Swarm Intelligence In Cloud Computing
    KS Patil, A Jain
    Design Engineering, 2515-2529 2021

  • A Comprehensive Review Of Cloud Computing Security Threats And Mitigation
    JK Ghai, A Jain
    Design Engineering, 2530-2544 2021

  • A Machine Learning‐Based Big EEG Data Artifact Detection and Wavelet‐Based Removal: An Empirical Approach
    S Stalin, V Roy, PK Shukla, A Zaguia, MM Khan, PK Shukla, A Jain
    Mathematical Problems in Engineering 2021 (1), 2942808 2021

  • A comprehensive review on online news popularity prediction using machine learning approach
    P Rathord, A Jain, C Agrawal
    SMART MOVES JOURNAL IJOSCIENCE 10 (20), 50 2019

  • A Literature Survey on Privacy-Preserving in Cloud Storage
    A Reley, DA Jain
    JOURNAL OF COMPUTING TECHNOLOGIES (JCT) 7 (2), 7-14 2018

  • Application potential of polymeric nanoconstructs for colon-specific drug delivery. Multifunctional nanocarriers for contemporary healthcare applications
    SK Jain, A Tiwari, A Jain, A Verma, S Saraf, PK Panda
    IGI Global 2018

  • Adaptive Approaches for IDS: A Review
    B Harode, A Jain
    International Journal of Research and Analytical Reviews (IJRAR) 5 (4), 361-363 2018

  • A survey on cost aware task allocation algorithm for cloud environment
    M Gupta, A Jain
    2017 4th International Conference on Signal Processing, Computing and 2017

  • An adaptive and Scalable Scheme for Intrusion Detection
    A Jain, B Verma, JL Rana
    International Journal of Scientific & Engineering Research Volume 8, Issue 8 2017

MOST CITED SCHOLAR PUBLICATIONS

  • A Machine Learning‐Based Big EEG Data Artifact Detection and Wavelet‐Based Removal: An Empirical Approach
    S Stalin, V Roy, PK Shukla, A Zaguia, MM Khan, PK Shukla, A Jain
    Mathematical Problems in Engineering 2021 (1), 2942808 2021
    Citations: 216

  • A Review of Content Based Image Classification using Machine Learning Approach
    S Kumar, Z Khan, A Jain
    International Journal of Advanced Computer Research 2 (5), 55-60 2012
    Citations: 39

  • A survey of IDS classification using KDD CUP 99 dataset in WEKA
    MU Modi, A Jain
    International Journal of Scientific & Engineering Research 6 (11), 947-954 2015
    Citations: 36

  • A novel defense scheme against DDOS attack in VANET
    A Jain, A Pathre, C Agrawal
    Wireless and Optical Communications Networks (WOCN), 2013 Tenth 2013
    Citations: 34

  • Identification of malicious vehicle in vanet environment from ddos attack
    A Pathre, A Jain
    Journal of Global Research in Computer Science 4 (6), 30-34 2013
    Citations: 33

  • Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network
    D Rathore, A Jain
    International Journal of Advanced Computer Research 2 (3), 181 2012
    Citations: 29

  • A Review: Image Encryption Techniques and its Terminologies
    A Oad, H Yadav, A Jain
    International Journal of Engineering and Advanced Technology (IJEAT) ISSN 3 2014
    Citations: 28

  • AN IMPROVED METHOD TO DETECT INTRUSION
    U Modi, A Jain
    Informatics Engineering, an International Journal (IEIJ) 4 (2), 17-29 2016
    Citations: 23

  • Mining Interesting Positive and Negative Association Rule Based on Improved Genetic Algorithm (MIPNAR_GA)
    N Rai, S Jain, A Jain
    Network and Complex Systems, IISTE journals 3 (10), 17-26 2013
    Citations: 23

  • Ensemble Neural Network and K-NN Classifiers for Intrusion Detection
    S Chaurasia, A Jain
    International Journal of Computer Science and Information Technologies 5 (2 2014
    Citations: k and K-NN Classifiers for Intrusion Detection

  • Review: Ensemble Neural Network and KNN Classifiers for Intrusion Detection
    S Chaurasia, A Jain
    International Journal of Scientific & Engineering Research 4 (12), 213-217 2013
    Citations: 22

  • Anomaly Intrusion Detection Techniques: A Brief Review
    A Jain, B Verma, JL Rana
    International Journal of Scientific & Engineering Research 5 (7), 1372-1383 2014
    Citations: 19

  • Classifier Selection Models for Intrusion Detection System (IDS)
    A Jain, B Verma, JL Rana
    Informatics Engineering, an International Journal (IEIJ) 4 (1), 1-11 2016
    Citations: 17

  • Location based Energy Efficient Scheme for Maximizing Routing Capability of AODV Protocol in MANET
    S Goswami, C Agrawal, A Jain
    International Journal Wireless and Microwave Technologies 5 (3), 33-44 2015
    Citations: 14

  • An Assessment of Fuzzy Temporal Association Rule Mining
    S Jain, S Jain, A Jain
    International Journal of Application or Innovation in Engineering 2013
    Citations: 14

  • Digital Watermarking Method Using Replacement of Second Least Significant Bit (LSB) with Inverse of LSB
    A Singh, S Jain, A Jain
    International Journal of Emerging Technology and Advanced Engineering 3 (2 2013
    Citations: 14

  • A Survey: Detection of Duplicate Record
    D Bharambe, S Jain, A Jain
    nternational Journal of Emerging Technology and Advanced Engineering 2 (11 2012
    Citations: 14

  • A comprehensive review on online news popularity prediction using machine learning approach
    P Rathord, A Jain, C Agrawal
    SMART MOVES JOURNAL IJOSCIENCE 10 (20), 50 2019
    Citations: 13

  • SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS
    V Dwivedi, H Yadav, A Jain
    International Journal of Security, Privacy and Trus t Management (IJSPTM) 4 2015
    Citations: 12

  • A Review Of Fast Clustering-Based Feature Subset Selection Algorithm
    P Gupta, S Jain, A Jain
    INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 3 (11), 86-91 2014
    Citations: 12