banner

Publications

VOICE ENABLE PORTAL

Journal

Journal NameNational Journal - Biannual Publication

Title of PaperVOICE ENABLE PORTAL

PublisherKSV-JSTR

Volume Number1

Page Number41-44

Published YearJune 2010

ISSN/ISBN No0974-9780

M-ticket- An M-commerce Application

Conference

Title of PaperM-ticket- An M-commerce Application

Proceeding NameGREEN-IT & OPEN SOURCE

OrganizationSinhgad Institute of Management (SIOM)

Year , VenueApril 2010 , Sinhgad Institute of Management (SIOM) , Pune

Page Number540-542

ISSN/ISBN No978-93- 80043-89-0

Study Of Effect of Parallelism on Time Complexities on Various Operations for Tree Data Structure

Conference

Title of PaperStudy Of Effect of Parallelism on Time Complexities on Various Operations for Tree Data Structure

Year , VenueSeptember 2016 , Aurangabad

Page Number108-112

ISSN/ISBN No9789386171054

Indexed INOthers

Various Approaches to Recognise Human Emotions

Journal

Journal NameInternational Journal of Computer Science and Engineering

Title of PaperVarious Approaches to Recognise Human Emotions

Volume Number7

Page Number173-176

Published YearMarch 2016

ISSN/ISBN No09737391

Indexed INOthers

Fusion in stock market prediction: A decade survey on the necessity, recent developments, and potential future directions

Journal

Journal NameInformation Fusion

Title of PaperFusion in stock market prediction: A decade survey on the necessity, recent developments, and potential future directions

PublisherElsevier

Volume Number65

Page Number95-107

Published YearJanuary 2021

ISSN/ISBN No1566-2535

Indexed INScopus, Web of Science

Abstract

Investment in a financial market is aimed at getting higher benefits; this complex market is influenced by a large number of events wherein the prediction of future market dynamics is challenging. The investors’ etiquettes towards stock market may demand the need of studying various associated factors and extract the useful information for reliable forecasting. Fusion can be considered as an approach to integrate data or characteristics, in general, and enhance the prediction based on the combinational approach that can aid each other. We conduct a systematic approach to present a survey for the years 2011–2020 by considering articles that have used fusion techniques for various stock market applications and broadly categorize them into information fusion, feature fusion, and model fusion. The major applications of stock market include stock price and trend prediction, risk analysis and return forecasting, index prediction, as well as portfolio management. We also provide an infographic overview of fusion in stock market prediction and extend our survey for other finely addressed financial prediction problems. Based on our surveyed articles, we provide potential future directions and concluding remarks on the significance of applying fusion in stock market.

Predicting stock trend using an integrated term frequency–inverse document frequency-based feature weight matrix with neural networks

Journal

Journal NameApplied Soft Computing

Title of PaperPredicting stock trend using an integrated term frequency–inverse document frequency-based feature weight matrix with neural networks

PublisherElsevier

Volume Number96

Page Number1-13

Published YearAugust 2020

ISSN/ISBN No1568-4946

Indexed INScopus, Web of Science

Abstract

The financial market consists of various money-making strategies wherein trading through a stock market is an important example. The complex non-linear behaviors of volatile stock markets attract researchers to study inherent patterns. As the primary motivation for investment in such markets is to gain higher profits, potential stocks are given considerable attention using various weighting strategies that can enhance future returns. Term frequency–inverse document frequency (TF–IDF) is a statistical approach with remarkable applications in the financial domain for information retrieval from textual data; it identifies the importance of a term in the given document of a corpus. However, the application of TF–IDF for the numerical data representation is explored to a limited extent. In this article, we propose to extend the applicability of TF–IDF for the numerical time-series stock market data; we process the data and prepare them to be suitable for TF–IDF. We utilize this statistical approach to derive feature weight matrix from the historical stock market data and further, integrate it with the widely explored neural network architectures namely, backpropagation neural network (BPNN), long short-term memory (LSTM), and gated recurrent unit (GRU) for predicting stock market trend. Simulation results show that the proposed integrated approach using TF–IDF-based feature weight matrix and neural networks outperforms the considered recent approaches. The results are statistically supported with p-value less than .01 using a Wilcoxon signed-rank test; our proposed approach is supported with illustrative examples to develop better understanding of the work. Also, remarks on the conclusions and potential future scope are discussed.

A Comprehensive Survey on Portfolio Optimization, Stock Price and Trend Prediction Using Particle Swarm Optimization

Journal

Journal NameArchives of Computational Methods in Engineering

Title of PaperA Comprehensive Survey on Portfolio Optimization, Stock Price and Trend Prediction Using Particle Swarm Optimization

PublisherSpringer Nature

Volume NumberYet to be assigned

Page Number1-32

Published YearJune 2020

ISSN/ISBN No1886-1784

Indexed INScopus, Web of Science, EBSCO

Abstract

Stock market trading has been a subject of interest to investors, academicians, and researchers. Analysis of the inherent non-linear characteristics of stock market data is a challenging task. A large number of learning algorithms are developed to study market behaviours and enhance the prediction accuracy; they have been optimized using swarm and evolutionary computation such as particle swarm optimization (PSO); its global optimization ability with continuous data has been exploited in financial domains. Limitations in the existing approaches and potential future research directions for enhancing PSO-based stock market prediction are discussed. This article aims at balancing the economics and computational intelligence aspects; it also analyzes the superiority of PSO for stock portfolio optimization, stock price and trend prediction, and other related stock market aspects along with implications of PSO.

Attack classification using feature selection techniques: a comparative study

Journal

Journal NameJournal of Ambient Intelligence and Humanized Computing

Title of PaperAttack classification using feature selection techniques: a comparative study

PublisherSpringer

Volume Numberyet to be assigned

Page Number1-18

Published YearJune 2020

ISSN/ISBN No1868-5145

Indexed INScopus, Web of Science, EBSCO

Abstract

The goal of securing a network is to protect the information flowing through the network and to ensure the security of intellectual as well as sensitive data for the underlying application. To accomplish this goal, security mechanism such as Intrusion Detection System (IDS) is used, that analyzes the network traffic and extract useful information for inspection. It identifies various patterns and signatures from the data and use them as features for attack detection and classification. Various Machine Learning (ML) techniques are used to design IDS for attack detection and classification. All the features captured from the network packets do not contribute in detecting or classifying attack. Therefore, the objective of our research work is to study the effect of various feature selection techniques on the performance of IDS. Feature selection techniques select relevant features and group them into subsets. This paper implements Chi-Square, Information Gain (IG), and Recursive Feature Elimination (RFE) feature selection techniques with ML classifiers namely Support Vector Machine, Naïve Bayes, Decision Tree Classifier, Random Forest Classifier, k-nearest neighbours, Logistic Regression, and Artificial Neural Networks. The methods are experimented on NSL-KDD dataset and comparative analysis of results is presented.

A Comprehensive Survey on Energy-Efficient Power Management Techniques

Journal

Journal NameProcedia Computer Science

Title of PaperA Comprehensive Survey on Energy-Efficient Power Management Techniques

PublisherScienceDirect

Volume Number167

Page Number1189-1199

Published YearApril 2020

ISSN/ISBN No1877-0509

Indexed INScopus, Others

Abstract

In the current age of machine intelligence, computer literacy has been achieved in terms of its knowledge and ability of utilization at various stages. As compared to the urge of demanding for high computer functionalities as well as performance, the concern towards the cost in attaining such goals has been limited. The developers try to empower a large number of operations which may consume a large amount of energy. The power consumption has been perceived as an important aspect for the stability and growth of an economy of the country; it has also been recognized as one of the factors that impact the environment. This article has considered the prime implication of energy-efficient power management techniques; it discusses the necessity of adopting the energy-aware computer and reviews the existing works on relevant components. This article may be helpful to attain the essentials of green computing.

A Review of the Advancement in Intrusion Detection Datasets

Journal

Journal NameProcedia Computer Science

Title of PaperA Review of the Advancement in Intrusion Detection Datasets

PublisherScienceDirect

Volume Number167

Page Number636-645

Published YearApril 2020

ISSN/ISBN No1877-0509

Indexed INScopus, Others

Abstract

The research in the field of Cyber Security has raised the need to address the issue of cybercrimes that have caused the requisition of the intellectual properties such as break down of computer systems, impairment of important data, compromising the confidentiality, authenticity, and integrity of the user. Considering these scenarios, it is essential to secure the computer systems and the user using an Intrusion Detection System (IDS). The performance of IDS studied by developing an IDS dataset, consisting of network traffic features to learn the attack patterns. Intrusion detection is a classification problem, wherein various Machine Learning (ML) and Data Mining (DM) techniques applied to classify the network data into normal and attack traffic. Moreover, the types of network attacks changed over the years, and therefore, there is a need to update the datasets used for evaluating IDS. This paper list the different IDS datasets used for the evaluation of IDS model. The paper presents an overview of the ML and DM techniques used for IDS along with the discussion on CIC-IDS-2017 and CSE-CIC-IDS-2018. These are recent datasets consisting of network attack features and include new attacks categories. This paper discusses the recent advancement in the IDS datasets that can be used by various research communities as the manifesto for using the new IDS datasets for developing efficient and effective ML and DM based IDS.

CREST: Cross-Reference to Exchange-based Stock Trend Prediction using Long Short-Term Memory

Journal

Journal NameProcedia Computer Science

Title of PaperCREST: Cross-Reference to Exchange-based Stock Trend Prediction using Long Short-Term Memory

PublisherScienceDirect

Volume Number167

Page Number616-625

Published YearApril 2020

ISSN/ISBN No1877-0509

Indexed INScopus, Others

Abstract

Due to a large number of tradings in the stock market, it generally experiences fluctuations throughout the day. Such oscillations influence market capitals of the companies listed on a stock exchange. Hence, in order to take suitable trading steps, prediction of the future stock price as well as trend direction becomes a crucial task. National Stock Exchange (NSE) and Bombay Stock Exchange (BSE) cover the largest market capitalization in India. A company’s shares are traded according to the stock exchange it is listed on; it can also be listed on multiple exchanges. Various approaches have tried to predict stock markets in terms of future indices, price movement, and returns perspectives, however, analyzing stocks of a company, which is listed on multiple exchanges, has been limited to the financial perspectives. In this article, a cross-reference to exchange-based stock trend (CREST) prediction method is proposed using long short-term memory (LSTM). The daily stock prices of Wipro Limited (WIPRO) company, which is listed on NSE as well as BSE, have been collected and the stock price movement of WIPRO in one exchange has been analyzed for predicting the trend in the other exchange. To identify the applicability of our approach, CREST has also experimented with Infosys Limited and Larsen & Toubro Infotech Limited companies. The performance is evaluated using root-mean-square error and directional accuracy along with precision, recall, and F-measure for the results of all three companies.

Role of swarm and evolutionary algorithms for intrusion detection system: A survey

Journal

Journal NameSwarm and Evolutionary Computation

Title of PaperRole of swarm and evolutionary algorithms for intrusion detection system: A survey

PublisherScienceDirect

Volume Number53

Page Number1-34

Published YearMarch 2020

ISSN/ISBN No2210-6502

Indexed INScopus, Web of Science

Abstract

The growth of data and categories of attacks, demand the use of Intrusion Detection System(IDS) effectively using Machine Learning (ML) and Deep Learning (DL) techniques. Apart from the ML and DL techniques, Swarm and Evolutionary (SWEVO) Algorithms have also shown significant performance to improve the efficiency of the IDS models. This survey covers SWEVO-based IDS approaches such as Genetic Algorithm(GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Artificial Bee Colony Optimization(ABC), Firefly Algorithm (FA), Bat Algorithm (BA), and Flower Pollination Algorithm (FPA). The paper also discusses applications of the SWEVO in the field of IDS along with challenges and possible future directions.

Sentiment analysis: an empirical comparison between various training algorithms for artificial neural network

Journal

Journal NameInternational Journal of Innovative Computing and Applications

Title of PaperSentiment analysis: an empirical comparison between various training algorithms for artificial neural network

PublisherInderscience Publishers (IEL)

Volume Number11

Page Number9-29

Published YearFebruary 2020

ISSN/ISBN No1751-6498

Indexed INScopus, Others

VIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme

Journal

Journal NameInternational Journal of Information and Computer Security

Title of PaperVIKAS: a new virtual keyboard-based simple and efficient text CAPTCHA verification scheme

PublisherINDERSCIENCE

Volume Number12

Page Number90-105

Published YearDecember 2019

ISSN/ISBN No1744-1773

Indexed INScopus, Others

A Comprehensive Survey on Travel Recommender Systems

Journal

Journal NameArchives of Computational Methods in Engineering

Title of PaperA Comprehensive Survey on Travel Recommender Systems

PublisherSpringer Netherlands

Page Number1-27

Published YearOctober 2019

ISSN/ISBN No1886-1784

Indexed INScopus, EBSCO

Abstract

Travelling is a combination of journey, transportation, travel-time, accommodation, weather, events, and other aspects which are likely to be experienced by most of the people at some point in their life. To enhance such experience, we generally look for assistance in planning a tour. Today, the information available on tourism-related aspects on the Internet is boundless and exploring suitable travel package/product/service may be time-consuming. A recommender system (RS) can assist for various tour-related queries such as top destinations for summer vacation, preferable climate conditions for tracking, the fastest way to transport, or photography assistance for specific destinations. In this survey, we have presented a pervasive review on travel and associated factors such as hotels, restaurants, tourism package and planning, and attractions; we have also tailored recommendations on a tourist’s diverse requirements such as food, transportation, photography, outfits, safety, and seasonal preferences. We have classified travel-based RSs and presented selection criteria, features, and technical aspects with datasets, methods, and results. We have briefly supplemented research articles from diverse facets; various frameworks for a travel-based RS are discussed. We believe our survey would introduce a state-of-the-art travel RS; it may be utilized to solve the existing limitations and extend its applicability.

Travelling Salesman Problem: An Empirical Comparison Between ACO, PSO, ABC, FA and GA

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author Name Kinjal Chaudhari, Ankit Thakkar

Page Number397-405

Chapter TitleTravelling Salesman Problem: An Empirical Comparison Between ACO, PSO, ABC, FA and GA

Published YearSeptember 2019

ISSN/ISBN No978-981-13-6000-8

Indexed INScopus

A Voting-Based Sentiment Classification Model

Book Chapter

Book Name Advances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author NameDhara Mungra, Anjali Agrawal, Ankit Thakkar

Page Number 551-558

Chapter TitleA Voting-Based Sentiment Classification Model

Published YearAugust 2019

ISSN/ISBN No978-981-13-8617-6

Indexed INScopus

Survey on handwriting-based personality trait identification

Journal

Journal NameExpert Systems with Applications

Title of PaperSurvey on handwriting-based personality trait identification

PublisherElsevier

Volume Number124

Page Number282-308

Published YearJune 2019

ISSN/ISBN No0957-4174

Indexed INScopus, Web of Science

Abstract

Personality is a combination of various characteristics and qualities of an individual. It may be affected by the growth and evolution of one’s values, attributes, relationships with the community, personal memories of life events, habits, and skills. Behaviours and decisions of an individual are largely directed by his/her personality. Identification of such a personality trait can be performed b

A Survey on Intelligent Transportation System Using Internet of Things

Book Chapter

Book Name Advances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author NamePalak Patel, Zunnun Narmawala, Ankit Thakkar

Page Number231-240

Chapter TitleA Survey on Intelligent Transportation System Using Internet of Things

Published YearMay 2019

Indexed INScopus

Necessary Precautions in Cognitive Tutoring System

Book Chapter

Book Name Advances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author NameKevin Vora, Shashvat Shah, Harshad Harsoda, Jeel Sheth, Ankit Thakkar

Page Number 445-452

Chapter TitleNecessary Precautions in Cognitive Tutoring System

Published YearJanuary 2019

ISSN/ISBN No978-981-13-8617-6

Indexed INScopus

The Fog Computing Paradigm: A Rising Need of IoT World

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author NameShivani Desai, Ankit Thakkar

Page Number387-393

Chapter TitleThe Fog Computing Paradigm: A Rising Need of IoT World

Published YearOctober 2018

ISSN/ISBN No978-981-13-1609-8

Indexed INScopus

Emotion Recognition from Sensory and Bio-Signals: A Survey

Book Chapter

Book Name Advances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Author NameKevin Vora, Shashvat Shah, Harshad Harsoda, Jeel Sheth, Seema Agarwal, Ankit Thakkar, Sapan H Mankad

Page Number345-355

Chapter TitleEmotion Recognition from Sensory and Bio-Signals: A Survey

Published YearOctober 2018

ISSN/ISBN No978-981-13-1609-8

Indexed INScopus

A Simple and Efficient Text-Based CAPTCHA Verification Scheme Using Virtual Keyboard

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer, Cham

Author NameKajol Patel and Ankit Thakkar

Page Number121-126

Chapter TitleA Simple and Efficient Text-Based CAPTCHA Verification Scheme Using Virtual Keyboard

Published YearAugust 2017

ISSN/ISBN No978-3-319-63644-3

Indexed INScopus, Others

DEAL: Distance and Energy Based Advanced LEACH Protocol

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer, Cham

Author NameAnkit Thakkar

Page Number370-376

Chapter TitleDEAL: Distance and Energy Based Advanced LEACH Protocol

Published YearAugust 2017

ISSN/ISBN No978-3-319-63644-3

Indexed INScopus, Others

An improved advanced low energy adaptive clustering hierarchy for a dense wireless sensor network

Conference

Title of PaperAn improved advanced low energy adaptive clustering hierarchy for a dense wireless sensor network

Proceeding Name2016 International Conference on Communication and Electronics Systems (ICCES), IEEE

PublisherIEEE

Author NameAnkit Thakkar

Page Number1-6

Published YearOctober 2016

ISSN/ISBN No978-1-5090-1066-0

Indexed INScopus, Others

An improved modified LEACH-C algorithm for energy efficient routing in Wireless Sensor Networks

Journal

Journal NameNirma University Journal of Engineering and Technology (NUJET)

Title of PaperAn improved modified LEACH-C algorithm for energy efficient routing in Wireless Sensor Networks

PublisherNirma University

Volume Number4

Page Number1-5

Published YearDecember 2015

ISSN/ISBN No2231-2870

Indexed INOthers

A new Bollinger Band based energy efficient routing for clustered wireless sensor network

Journal

Journal NameApplied Soft Computing

Title of PaperA new Bollinger Band based energy efficient routing for clustered wireless sensor network

PublisherElsevier

Volume Number32

Page Number144-153

Published YearJuly 2015

ISSN/ISBN No1568-4946

Indexed INScopus

Abstract

Designing of scalable routing protocol with prolonged network lifetime for a wireless sensor network (WSN) is a challenging task. WSN consists of large number of power, communication and computational constrained inexpensive nodes. It is difficult to replace or recharge battery of a WSN node when operated in a hostile environment. Cluster based routing is one of the techniques to provide prolonged network lifetime along with scalability. This paper proposes a technique for cluster formation derived from “Grid based method”. We have also proposed a new decentralized cluster head (CH) election method based on Bollinger Bands. Bollinger Bands are based on Upper Bollinger Band and Lower Bollinger Band, both of these bands are extremely reactive to any change in the inputs provided to them. We have used this property of Bollinger Bands to elect CH. Simulation result shows significant improvement in the network lifetime in comparison with other decentralized and ant based algorithms.

SKIP: a novel self-guided adaptive clustering approach to prolong lifetime of wireless sensor networks

Book Chapter

Book NameCommunication and Computing Systems

PublisherTaylor & Francis Group, London

Author NameAnkit Thakkar

Page Number335-340

Chapter TitleSKIP: a novel self-guided adaptive clustering approach to prolong lifetime of wireless sensor networks

Published YearFebruary 2015

ISSN/ISBN No978-1-138-02952-1

Indexed INScopus

Abstract

Wireless Sensor Network (WSN) consists of energy constraint sensor nodes, and it is difficult to replace or recharge batteries of these nodes when they operate in hostile environments. Hence, prolonging the lifetime of WSN nodes is an important issue for any WSN. Cluster based routing techniques improve the lifetime of WSNs, wherein longer stability and shorter instability periods are important aspects to measure network lifetime. Stable period ensures reliability of the data received from the network, as all nodes are alive during this period. This paper discusses a novel distributed adaptive clustering approach, Skip that guides every node to take part in the Cluster Head (CH) election process or not for the current epoch, based on residual energy of a node. Extensive simulations have been carried out to compare the proposed approach with prominent clustering techniques such as Low Energy Adaptive Clustering Hierarchy (LEACH), Stable Election Protocol (SEP) and enhanced Stable Election Protocol (SEP-E). Simulation results show that the proposed approach outperforms to LEACH, SEP and SEP-E protocols. The proposed approach Skip provides longer stability and does not deteriorate instability period. The performance of Skip is also validated using statistical test.

Cluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network

Journal

Journal NameIEEE Sensors Journal

Title of PaperCluster Head Election for Energy and Delay Constraint Applications of Wireless Sensor Network

PublisherIEEE

Volume Number14

Page Number 2658 - 2664

Published YearAugust 2014

ISSN/ISBN No1530-437X

Indexed INScopus, Web of Science

Abstract

Designing of a multi-hop Wireless Sensor Network (WSN) depends upon the requirements of the underlying sensing application. The main objective of WSNs is to monitor physical phenomenon of interest in a given region of interest using sensors and provide collected data to sink. The WSN is made of a large number of energy, communication, and computational constraint nodes, to overcome energy constrains, replacing or recharging the batteries of the WSN nodes is an impossible task, once they are deployed in a hostile environment. Therefore, to keep the network alive as long as possible, communication between the WSN nodes must be done with load balancing. Time critical applications like forest fire detection, battle field monitoring demands reception of data by the sink with the bounded delay to avoid disasters. Hence, there is a need to design a protocol which enhances the network lifetime and provides information to the sink with a bounded delay. This paper will address this problem and solution. In this paper, a routing algorithm is proposed by introducing Energy Delay Index for Trade-off (EDIT) to optimize both objectives-energy and delay. The EDIT is used to select cluster heads and “next hop” by considering energy and/or delay requirements of a given application. Proposed approach is derived using two different aspects of distances between a node and the sink named Euclidean distance and Hop-count, and further prove using realistic parameters of radio to get data closest to the test bed implementation. The results aspire to give sufficient insights to others before doing test bed implementation.

Alive nodes based improved low energy adaptive clustering hierarchy for wireless sensor network

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer, Cham

Author NameAnkit Thakkar, Ketan Kotecha

Page Number51-58

Chapter TitleAlive nodes based improved low energy adaptive clustering hierarchy for wireless sensor network

Published YearApril 2014

ISSN/ISBN No978-3-319-07350-7

Indexed INScopus, Others

A new hybrid method for face recognition

Conference

Title of PaperA new hybrid method for face recognition

Proceeding NameEngineering (NUiCONE), 2013 Nirma University International Conference on

PublisherIEEE

Author NameAnkit Thakkar, N Jivani, J Padasumbiya, CI Patel

Published YearNovember 2013

ISSN/ISBN No2375-1282

Indexed INScopus, Others

Aggregate features approach for texture analysis

Conference

Title of PaperAggregate features approach for texture analysis

Proceeding Name2012 Nirma University International Conference on Engineering (NUiCONE)

PublisherIEEE

Author NameRipal Patel, Chirag I Patel, Ankit Thakkar

Published YearDecember 2012

ISSN/ISBN No2375-1282

Indexed INScopus, Others

Power Aware Scheduling for Adhoc sensor Network Nodes

Conference

Title of PaperPower Aware Scheduling for Adhoc sensor Network Nodes

Proceeding Name 2009 3rd International Conference on Signal Processing and Communication Systems

PublisherIEEE

Author NameAnkit Thakkar, SN Pradhan

Published YearSeptember 2009

ISSN/ISBN No978-1-4244-4473-1

Indexed INScopus, Others

Implementation of Word Sense Disambiguation on Hadoop Using Map-Reduce

Book Chapter

Book NameInformation and Communication Technology for Intelligent Systems

PublisherSpringer, Singapore

Author NameSuresh Chandra Satapathy, Amit Joshi

Page Number573-580

Chapter TitleImplementation of Word Sense Disambiguation on Hadoop Using Map-Reduce

Published YearDecember 2018

ISSN/ISBN No978-981-13-1741-5

Indexed INScopus

Abstract

In Natural Language Processing, it is essential to find a correct sense of sentences or document is written for these type of problem is called word sense disambiguation problem. Currently, any machine learning application based on natural language processing requires to solve this type of problem. To identify the correct sense, pywsd (Python implementations of word sense disambiguation technologi

MobiCloud: Performance Improvement, Application Models and Security Issues

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer

Author NameSuresh Chandra Satapathy, Amit Joshi

Page Number466-472

Chapter TitleMobiCloud: Performance Improvement, Application Models and Security Issues

Published YearAugust 2017

ISSN/ISBN No2190-3018

Indexed INScopus

Abstract

Recent years have seen an exponential increase in cloud computing for services such as high computational capabilities, vast storage, applications etc. that they provide. Moreover, today’s world is a constant shift from desktop or laptop devices towards handheld smartphones because of the wide range of applications that are supported. This paper discusses the present state of cloud computing for m

Survey on Cluster Based Data Aggregation in Wireless Sensor Network

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperSurvey on Cluster Based Data Aggregation in Wireless Sensor Network

PublisherInternational Journal of Advanced Research in Computer Science

Volume Number8

Page Number311-314

Published YearMay 2017

ISSN/ISBN No0976-5697

Indexed INUGC List

Software Engineering Aided By Multimedia and Hypermedia

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperSoftware Engineering Aided By Multimedia and Hypermedia

Volume Number7

Page Number101-107

Published YearJune 2016

ISSN/ISBN No0973-7391

Indexed INUGC List

AdWords : A Study of Usage and Tools

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperAdWords : A Study of Usage and Tools

Volume Number7

Page Number95-99

Published YearFebruary 2016

ISSN/ISBN No0973-7391

Indexed INUGC List

Big Data Analytics Model for the Education Sector

Journal

Journal NameInternational Journal of Innovative Technology and Exploring Engineering

Title of PaperBig Data Analytics Model for the Education Sector

PublisherBlue Eyes Intelligence Engineering and Science Publication

Volume Number8

Page Number5

Published YearOctober 2019

ISSN/ISBN No2278-3075

Indexed INScopus

Abstract

With an array of innovative technologies, the 21st century has struck at our door. Many sectors are embracing the implementation of a revolutionary technology called Big Data Analytics. The education sector has lately jumped on the bandwagon. With the new evolving education technology capable of generating Big Data, stakeholders have firmly started adopting the use of Big Data Analytics in the education sector. This paper proposes a model for Big Data Analytics depicting various required components, for the education sector. Various sources of education data provide the necessary input to the model and model produces useful results in the form of the output using various tools and technologies of Big Data ecosystem. The outputs are going to be consumed by various stakeholders of the education sector. The paper also describes the concept of Big Data, new technologies influencing the education sector and explains why Big Data Analytics is going to be core technology in analyzing the data and taking the world of education to new heights. We have also listed beneficiaries and benefits.

Big Data Mining in Education Sector: Critical Issues and Current Status in Indian Context

Journal

Journal NameInternational Journal of Advanced Research in Computer Science and Software Engineering

Title of PaperBig Data Mining in Education Sector: Critical Issues and Current Status in Indian Context

Volume Number5

Page Number1007-1011

Published YearMay 2015

ISSN/ISBN No2277 128X

Abstract

Information and communications technology is revolutionizing education sector. Data about students’ online activities are collected in large volumes and analysed to produce and recommend actions that improve outcomes. Being a largest democracy, India is also trying to join this e-learning era. In terms of the number of Internet users, India stands third in the world. India has immense potential to use big data and mining in education sector. However, there are some critical issues that are blocking fast adoption of this technology. In this paper, we discuss critical issues that are not allowing India to leverage the result of educational data analytics. We also discuss initiatives taken by government and corporate, current status and stakeholders in current digital learning revolution age.

Irregularity Detection in Clinical Data of Patients Encountering Heart Surgery

Journal

Journal NameInternational Journal of Innovations & Advancement in Computer Science IJIACS

Title of PaperIrregularity Detection in Clinical Data of Patients Encountering Heart Surgery

PublisherAcademic Science

Volume NumberVolume 7, Issue 5

Page Number331-339

Published YearMay 2018

ISSN/ISBN No2347 – 8616

Indexed INUGC List, Others

Abstract

We depict two approaches to manage distinguishing abnormalities in time course of action of multi-parameter clinical data: (1) metric and model-based markers and (2) information astound. (1) Metric and model-based markers are ordinarily used as early advised signs to perceive progresses between substitute states in light of individual time course of action. Here we explore the real nature of existing pointers to perceive fundamental (peculiarities) from non-essential conditions in patients encountering heart surgery, in perspective of a little anonymized clinical trial dataset. We find that a mix of time-fluctuating autoregressive show, kurtosis, and skewness markers successfully perceived fundamental from non-essential patients in 5 out of 36 blood parameters at a window size of 0.3 (ordinary of 37 hours) or higher. (2) Information bewilder measures how the development of one patient's condition fluctuates from that of rest of the people in perspective of the cross-territory of time course of action. With the most outrageous awe and slope features we recognize each and every essential patient at the 0.05 significance level. Moreover we show that a sincere special case acknowledgment does not work, displaying the necessity for the more intricate philosophies examined here. Our preliminary results suggest that future enhancements in early advised systems for persevering condition watching may foresee the start of fundamental advance and allow remedial mediation balancing calm passing. Advance methodology change is relied upon to decline overfitting and deceiving results, and keep an eye on considerable clinical datasets.

Iterative Deconvolution Approach for High Resolution Satellite Imagery

Journal

Journal NameJournal of Geomatics

Title of PaperIterative Deconvolution Approach for High Resolution Satellite Imagery

PublisherIndian Society of Geomatics

Volume Number10

Page Number114-120

Published YearOctober 2016

ISSN/ISBN No2

Indexed INOthers

Recognition of Fruits Using Hybrid Features and Machine Learning

Conference

Title of PaperRecognition of Fruits Using Hybrid Features and Machine Learning

Proceeding NameIEEE International Conference on Computing, Analytics and Security Trends

PublisherIEEE

Year , VenueDecember 2016 , College of Engineering , Pune

Page Number572-577

ISSN/ISBN No978-1-5090-1338-8

Empirical Performance Comparison of OODBMS over RDBMS

Journal

Journal NameIJCSC

Title of PaperEmpirical Performance Comparison of OODBMS over RDBMS

Volume Number7

Page Number83-88

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INOthers

Review on Generic Object Recognition Techniques : Challenges and Opportunities

Journal

Journal NameIJARET

Title of PaperReview on Generic Object Recognition Techniques : Challenges and Opportunities

Volume Number6

Page Number104-133

Published YearDecember 2015

ISSN/ISBN No0976-6480

Indexed INUGC List

Analyzing the Comprehensibility of Aspect-Oriented Modelling and Design of Software System

Journal

Journal NameInternational Journal of Computer Application

Title of PaperAnalyzing the Comprehensibility of Aspect-Oriented Modelling and Design of Software System

Volume Number95

Page Number7-11

Published YearJune 2014

ISSN/ISBN No0975 - 8887

Indexed INEBSCO

An Efficient Approach for Job Scheduling in Cloud Computing

Journal

Journal NameInternational Journal of Computer Science Engineering and Information Technology Research (IJCSEITR)

Title of PaperAn Efficient Approach for Job Scheduling in Cloud Computing

PublisherTRANSSTELLAR

Volume Number4-4

Page Number9-14

Published YearAugust 2014

ISSN/ISBN No2249-7943

Indexed INOthers

Analyzing Large-Scaled Applications in Cloud Computing Environment

Journal

Journal NameInternational Journal of Computer Science Engineering and Information Technology Research (IJCSEITR)

Title of PaperAnalyzing Large-Scaled Applications in Cloud Computing Environment

PublisherTRANSSTELLAR

Volume Number4-4

Page Number1-8

Published YearAugust 2014

ISSN/ISBN No2249-7943

Indexed INOthers

Implementation of Attribute based Symmetric Encryption through Vertically Partitioned Data in PPDM

Journal

Journal NameInternational Journal of Engineering and Advanced Technology

Title of PaperImplementation of Attribute based Symmetric Encryption through Vertically Partitioned Data in PPDM

PublisherBlue Eyes Intelligence Engineering & Sciences Publication

Volume Number8

Page Number5384-5390

Published YearAugust 2019

ISSN/ISBN No2249 – 8958

Indexed INScopus

Critical study and analysis for deciding sensitive and non-sensitive attributes of medical healthcare dataset through survey and using association rule mining

Journal

Journal NameInternational Journal of Recent Scientific Research

Title of PaperCritical study and analysis for deciding sensitive and non-sensitive attributes of medical healthcare dataset through survey and using association rule mining

Volume Number8

Page Number17218-17222

Published YearMay 2017

ISSN/ISBN No0976-3031

Indexed INUGC List

Challenges & Opportunities in Privacy Preserving Data Mining for Healthcare Dataset

Conference

Title of PaperChallenges & Opportunities in Privacy Preserving Data Mining for Healthcare Dataset

Proceeding NameICRISET-2017

Author NameDevendra Vashi

OrganizationBirla Vishvakarma Mahavidyalaya Engineering College, VV Nagar

Year , VenueFebruary 2017 , BVM, VV Nagar

Page Number133

ISSN/ISBN No978-93-84339-38-8

Indexed INOthers

Abstract

Now a day’s medical organization, health care Centres, insurance companies are very much interested to do analysis for various diseases. Their objective is to make aware the societies about diseases causes and patterns. Also, insurance companies may introduce medical health care policies as per the analysis of medical data. One of the problems faced during such data mining is that personal or sensitive data is exposed to the public which most of the people may not like. Hence one of the requirements of data extraction during data mining is to preserve the privacy of sensitive/personal data. This is possible using various Privacy Preserving Data Mining (PPDM) techniques. This paper reviews and compares the different PPDM techniques with data mining methods and privacy analysis. Paper also discusses the challenges faced and its solutions during PPDM.

OPTIMAL LECTURE PLANNING FOR TEACHING THE SUBJECT USING AGILE METHODOLOGY

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology

Title of PaperOPTIMAL LECTURE PLANNING FOR TEACHING THE SUBJECT USING AGILE METHODOLOGY

Publisher IAEME

Volume Number7

Page Number64–68

Published YearMarch 2016

ISSN/ISBN No0976-6499

Comparative stud of some cryptographic algorithms

Conference

Title of PaperComparative stud of some cryptographic algorithms

Author NameDevendra Vashi

OrganizationSN Patel Institute Of Technology & Research Centre

Year , VenueApril 2015 , SN Patel Institute Of Technology & Research Centre, Bardoli

ISSN/ISBN No978-81-929339-1-7

Indexed INOthers

Abstract

in privacy-preserving data mining technique, the cryptographic process is good to implement properly for making data private while sending data to the third party. This paper is just a study of some of the encryption and decryption technique like DES, RSA and hash function which can be implemented for cryptography. This paper is also emphasized on a comparative study on different encryption technique and how is useful in the cryptographic technique

Study of various methods used in Reverse Engineering

Journal

Journal NameInternational Journal of Research in Electronics and Computer Engineering

Title of PaperStudy of various methods used in Reverse Engineering

Volume Number6

Page Number1457-1459

Published YearJune 2018

ISSN/ISBN No23482281

Indexed INUGC List

Strategies for implementing the Knapsack Problem

Journal

Journal NameInternational Journal of Science, Technology and Management

Title of PaperStrategies for implementing the Knapsack Problem

Volume Number6

Page Number419-427

Published YearJune 2017

ISSN/ISBN No23941537

Indexed INOthers

Swine Flu Predication Using Machine Learning

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer

Author NameDvijesh Bhatt, Malaram Kumhar, Daiwat Vyas, Ajay Patel

Page Number611-617

Chapter TitleSwine Flu Predication Using Machine Learning

Published YearJanuary 2019

ISSN/ISBN No2190-3018

Indexed INScopus

Abstract

Disease identification is one of the critical and time-consuming tasks in medical diagnosis system. Machine learning is a foremost technique used to predict and identify diseases at different levels.

Augmented Reality (AR) Applications: A survey on Current Trends, Challenges, & Future Scope

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperAugmented Reality (AR) Applications: A survey on Current Trends, Challenges, & Future Scope

PublisherAdvance Academic Publisher

Volume Number8

Page Number2724-2730

Published YearMay 2017

ISSN/ISBN No0976-5697

Indexed INEBSCO

Abstract

In the last decade with the advances in computer hardware technologies, display devices, controller devices, software enhancements has tremendously aided the Augmented Reality (AR) Technology to grow from leaps to bounds. Augmented Reality (AR) is a technique that enables users to interact with their physical environment through the overlay of digital information. AR is a field of computer science which deals with combination of reality with computer generated data i.e it aids enhancement over a real world environment in real time. Virtual Reality (VR) and Augmented Reality (AR) are technologies that have a wide spread reach in various technological fronts and has a very promising prospect for various diversified research avenues. An in-depth understanding of trends, challenges, future scope for AR systems is discussed in this survey paper. Authors have made a conscious effort to investigate the state of the art in AR Technologies and its diversified engineering application areas. Various aspects of the design of an AR system are taken into consideration, like the interface devices for interacting with virtual world, software's, the hardware etc. Also, described are a few specific applications that have been developed using the AR technology and possible avenues for future research in the field of AR. Latest trends & evolution of this technology have been touched upon for better understanding. Various applications have been explored and possible approach for enhancing the use of this technology have been discussed. We have discussed some of the limitations in developing such systems. Tools available for development of AR applications that satisfy the current requirements are included. Future directions and suggestions for effectively and efficiently improving the application areas have been focused upon. This paper will provide a better insight for anyone who wishes to do research in the field of AR.

IoT: trends, challenges and future scope

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperIoT: trends, challenges and future scope

PublisherCS Journal

Volume Number7

Page Number 186-197

Published YearSeptember 2015

ISSN/ISBN No09737391

Indexed INOthers

Abstract

IoT (Internet of Things) one of the most exiting trends and innovation in the recent history of technological advancement. Also the advances in computer hardware, embedded system devices, networking devices, display devices, control devices, software enhancements etc. has tremendously supported IoT to grow slowly and steadily from leaps to bounds.

Medical Diagnosis System Using Machine Learning

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperMedical Diagnosis System Using Machine Learning

PublisherCS Journals

Volume Number7

Page Number177-182

Published YearSeptember 2015

ISSN/ISBN No09737391

Indexed INOthers

Abstract

Disease prediction is one of the critical tasks while designing medical diagnosis software. Artificial intelligence and neural network are two primary techniques which are already used to solve this type of medical diagnosis problem. Recently, Machine Learning techniques have been successfully utilized in different applications including to assist in medical diagnosis. It is very effortless and on time process for patients to analyze disease based on clinical and laboratory symptoms with appropriate data and give more efficient result for a specific disease. In this paper, first we have observed the current scenario of the medical diagnosis system with different data mining techniques and later we have proposed an algorithm to predicate the Swine Flu disease based on several attributes

Focused Web Crawler

Conference

Title of PaperFocused Web Crawler

Proceeding NameAdvances in Soft-computing, E-Learning, Information & Communication Technology

PublisherKrishi Sanskriti Publications

OrganizationAdvances in Soft-computing, E-Learning, Information & Communication Technology

Year , VenueMarch 2015 , Delhi

Page Number18

ISSN/ISBN No2393-9907

Indexed INOthers

Abstract

With the rapid development and increase in global data on the World Wide Web and with increased and rapid growth in web users across the globe, an acute need has arisen to improve and modify or design search algorithms that help in effectively and efficiently searching the specific required data from the huge repository available. Various search engines use a different web Crawlers for obtaining search results efficiently. Some search engines use focused web crawler that collects different web pages that usually satisfy some specific property, by effectively prioritizing the crawler frontier and managing the exploration process for the hyperlink. A focused web crawler analyzes its crawl boundary to locate the links that are likely to be most relevant for the crawl and avoids irrelevant regions of the web. This leads to significant savings in hardware and network resources and helps keep the crawl more up-to-date. The process of focused web crawler is to nurture a collection set of web documents that are focused on some topical subspaces. It identifies the next most important and relevant link to follow by relying on probabilistic models for effectively predicting the relevancy of the document. Researchers have proposed various algorithms for improving the efficiency of a focused web crawler. We try to investigate various types of crawlers with their pros and cons. The major focus area is focused on web crawler. Future directions for improving the efficiency of focused web crawler have been discussed. This will provide a base reference for anyone who wishes in researching or using the concept of focused web crawler in their research work that he/she wishes to carry out. The performance of a focused web crawler depends on the richness of links in the specific topic being searched by the user, and it usually relies on a general web search engine for providing starting points for searching.

Improved clustering technique for ITI-PrefixSpan

Conference

Title of PaperImproved clustering technique for ITI-PrefixSpan

Proceeding NameNUiCONE 2013

PublisherIEEE

OrganizationIEEE

Year , VenueNovember 2013 , Nirma University

Page Number1-5

ISSN/ISBN No2375-1282

Indexed INScopus

Abstract

Sequential data mining is the process to find out the frequent sub-sequences from the given sequential dataset. Sequential pattern mining can only reveal the sequence (order) of items, but it does not determine the time interval between two successive events. Time interval sequential mining processes to find out sequential patterns with a time interval between two successive events. In this paper, we will introduce the new cluster technique so we will get a dynamic cluster range rather than fixed. We improve the result of new ITI-PrefixSpan and compare our algorithm with other algorithms in terms of computing time and memory.

Open Issues in Named Data Networking – A Survey

Book Chapter

Book Name Smart Innovation, Systems and Technologies (SIST, volume 83)

PublisherSpringer, Cham

Page Number 285-292

Chapter TitleOpen Issues in Named Data Networking – A Survey

Published YearAugust 2017

ISSN/ISBN No978-3-319-63673-3

Abstract

Internet is now being used as content distribution network also. Internet users are interested in specific contents rather than host machines where the content is located. Named Data Networking (NDN) is a step towards future Internet architecture that would be based on named data rather than numerically identified hosts. Many projects are in progress to architect the structure of the Internet.

Natural Language Interface for Multilingual Database

Conference

Title of PaperNatural Language Interface for Multilingual Database

PublisherInternational Conference on Information and Communication Technology for Intelligent Systems (ICTIS)

OrganizationSpringer

Page Number113-120

Published YearAugust 2017

ISSN/ISBN No978-3-319-63644-3

Open Issues in Named Data Networking-A Survey

Conference

Title of PaperOpen Issues in Named Data Networking-A Survey

PublisherSpringer

Year , VenueJanuary 2017 , Ahmedabad , India

Page Number285-292

ISSN/ISBN No978-3-319-63672-6

Securing Application Layer Protocol for IOT

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of Paper Securing Application Layer Protocol for IOT

PublisherIJCSC

Volume Number7

Page Number42-48

Published YearSeptember 2016

Enhancing data delivery with density controlled clustering in wireless sensor networks

Journal

Journal NameMicrosystem Technologies

Title of PaperEnhancing data delivery with density controlled clustering in wireless sensor networks

PublisherSpringer

Volume Number23 (3)

Page Number613-631

Published YearMay 2016

ISSN/ISBN No1432-1858

Optimization of clustering process in WSN with meta-heuristic techniques - a survey

Conference

Title of PaperOptimization of clustering process in WSN with meta-heuristic techniques - a survey

PublisherIEEE

Year , VenueMarch 2016 , 2016 3rd International Conference on Recent Advances in Information Technology (RAIT)

ISSN/ISBN No978-1-4799-8579-1

Improving Data Delivery with Density Control based Clustering in Wireless Sensor Networks

Conference

Title of PaperImproving Data Delivery with Density Control based Clustering in Wireless Sensor Networks

Year , VenueDecember 2014 , At Puri, Odisha, India

ISSN/ISBN No81-85824-46-0

Performance Comparison of Various Clustering Techniques in Wireless Sensor Networks

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of Paper Performance Comparison of Various Clustering Techniques in Wireless Sensor Networks

PublisherIJCSC

Volume Number5

Page Number116-223

Published YearJuly 2014

3-D Localization in Wireless Sensor Networks

Journal

Journal NameInternational Journal of Computer Engineering and Technology (IJCET)

Title of Paper3-D Localization in Wireless Sensor Networks

PublisherIJCET

Volume NumberVolume 5, Issue 3, March 2014, pp. 09-22

Published YearMarch 2014

ISSN/ISBN NoISSN 0976 – 6367(Print) ISSN 0976 – 6375(Online)

Optimization of Clustering Techniques Using Energy Thresholds in Wireless Sensor Networks

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology (IJARET)

Title of PaperOptimization of Clustering Techniques Using Energy Thresholds in Wireless Sensor Networks

PublisherIJARET

Volume Number4, Issue 7

Published YearJanuary 2014

ISSN/ISBN NoISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online)

Optimization of Collection Tree Protocol

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperOptimization of Collection Tree Protocol

Volume Number4,Issue 8

Published YearJanuary 2013

Optimization of Hierarchical Routing Protocol for Wireless Sensor Networks with Identical Clustering

Conference

Title of PaperOptimization of Hierarchical Routing Protocol for Wireless Sensor Networks with Identical Clustering

PublisherProceedings of International Conference on Advances in Communication, Network, and Computing, 2010

Year , VenueOctober 2010 , Calicut

Page Number119-123

ISSN/ISBN No978-0-7695-4209-6

Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks

Conference

Title of PaperProblem Area Identification with Secure Data Aggregation in Wireless Sensor Networks

PublisherProceedings of International Conference on Sensor Networks, 2010

Year , VenueSeptember 2010 , Kochi, Kerala, India

Page Number258-266

ISSN/ISBN No978-3-642-15766-0_37

Performance Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Networks

Conference

Title of PaperPerformance Analysis of Hierarchical Routing Protocol (LEACH) for Wireless Sensor Networks

Proceeding NameNational Conference on Advances in Wireless Communications-2010

Page Number40-43

Published YearJune 2010

Multi Resolution Feature Based Active Handwritten Character Recognition

Conference

Title of PaperMulti Resolution Feature Based Active Handwritten Character Recognition

Proceeding NameInternational Conference on Trends & Advances in Computation & Engineering (TRACE),

PublisherProceedings of International Conference on Trends and Advances in Computation and Engineering, 2010

Page Number963-971

Published YearFebruary 2010

Performance Evaluation of Routing Protocols for Wireless Sensor Networks

Conference

Title of PaperPerformance Evaluation of Routing Protocols for Wireless Sensor Networks

PublisherExcel India Publishers

Published YearJanuary 2010

ISSN/ISBN No978-93-80043-70-8

Problem Area Identification with Secure Data Aggregation in Wireless Sensor Networks

Book Chapter

Book Name Communications in Computer and Information Science

PublisherSpringer Berlin Heidelberg

Page Number258-266

Chapter TitleProblem Area Identification with Secure Data Aggregation in Wireless Sensor Networks

Published YearJanuary 2010

ISSN/ISBN No978-3-642-15766-0

Abstract

The primary use of wireless sensor networks (WSNs) is to collect and process data. Most of the energy consumption is due to data transmission. Because of the unique properties of WSNs all raw data samples are not directly sent to the sink node instead data aggregation is preferred. Since sensor nodes are deployed in an open environment such as a battlefield or similar applications

Survey on Energy Efficient Hierarchical Routing Algorithms in Wireless Sensor Networks – A Survey

Conference

Title of PaperSurvey on Energy Efficient Hierarchical Routing Algorithms in Wireless Sensor Networks – A Survey

Proceeding NameProceedings of National Conference, NUCONE

PublisherNUCONE

Published YearJanuary 2009

Analyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies

Conference

Title of PaperAnalyzing the Performance of Centralized Clustering Techniques for Realistic Wireless Sensor Network Topologies

PublisherElsevier

Year , VenueAugust 201 , 3rd International Conference on Recent Trends in Computing 2015 (ICRTC-2015)

ISSN/ISBN No1026 – 1035

Comparative Study of Sentiment Analysis and Text Summarization for Commercial Social Networks

Book Chapter

Book NameCommunications in Computer and Information Science

Publisher© Springer Nature Singapore Pte Ltd. 2020

Author NameHamza Abubakar Kheruwala, Jimeet Viren Shah, Jai Prakash Verma

Page Number213-224

Chapter TitleComparative Study of Sentiment Analysis and Text Summarization for Commercial Social Networks

Published YearJuly 2020

ISSN/ISBN No18650929

Indexed INScopus

Abstract

The rapid shift towards digitalization today has actually transferred the market to an entirely digitalized platform. The participation of such a large number of users has given rise to a huge amount of data over the internet, proving the need for proper structuring and removal of unwanted and redundant data. The presence of a system that gives them the complete overview of a product is a dire need for the public today. Diving deep, we nd technologies that help us in the analysis and modification of data found over the internet. Sentiment analysis helps us nd the opinions people have towards a variety of entities, through a series of processes. Along with this, we have text summarisation which aids in the attainment of meaningful information from the wide range of irrelevant and redundant data found online. Clubbing these two, we can obtain concise reviews in addition to the overall sentiment towards selected entities. Here, we propose a model where we convolve into a system that provides the user with the overall recommendation found on popular e-commerce websites (Amazon, Flipkart and TripAdvisor). Starting with the collection of data from given sources, we pre-process the data, we combine machine learning with a lexicon-based approach, obtain the summaries and sentiments and eventually provide the user with the popular opinion behind the product.

GeoHash tag based mobility detection and prediction for traffic management

Journal

Journal NameSN Applied Sciences

Title of PaperGeoHash tag based mobility detection and prediction for traffic management

PublisherSpringer International Publishing

Volume Number2

Page Number1-13

Published YearJuly 2020

ISSN/ISBN No2523-3963 / 2523-3971

Indexed INWeb of Science

Abstract

User mobility detection and prediction can help in many ways for planning and monitoring a population distribution and displacement in a specific area or location. It also helps in planning for resource distribution and allocation. In this paper, we present a study on the mobility of the population which can be monitored by sensors, GPS devices through location detection. All the public transports like buses, taxis, etc. have GPS devices posted that can provide movement of a vehicle in city traffic. For experimental analysis, the T-Drive Taxi Trajectories dataset was selected, in which taxi location data are collected with the information of taxi ID, timestamp, latitude, and longitude. GeoHash tags were generated for the location of a taxi based on latitude and longitude. A graph was built based on vertices as GeoHash tag and edges as a direct link between the GeoHash tags. Graph-Based data analysis was applied to identify the importance of GeoHash tag based on the in-degree and PageRank of the vertices. The mobility path and movement of traffic can be predicted that can be used for disaster management and urban development for city planning.

A Graph Based Analysis of User Mobility for a Smart City Project

Book Chapter

Book NameCommunications in Computer and Information Science

PublisherSpringer

Author NameJai Prakash Verma, Sapan H Mankad, Sanjay Garg

Page Number140-151

Chapter TitleA Graph Based Analysis of User Mobility for a Smart City Project

Published YearNovember 2019

ISSN/ISBN No18650929

Indexed INScopus

Abstract

Information and Communication Technologies (ICT) and Internet of Things (IOT) devices generate large amount of data for any Smart City projects. Data structure for storing multidisciplinary large scale data extracted from these types of data loggers become a challenging task. Research work presented in this paper emphasizes on robust data extraction (data streaming), data preprocessing, and integration. A graph based data analysis on different mobile movement is generated by different mobile tracer (data loggers) placed in diverse locations. Using data ingestion tools like Kafka/Flume/MQTT and Spark-Streaming data can be stored in a distributed storage, HDFS is used for storing such huge size of data. As we know due to the data volume and data generation speed, this problem is considered under Big Data Analysis (BDA) problem. Heat map has been used to depict the movement of customer carrying mobile phone in different locations of store. A ping signal collected whenever a person is moving from the range of sensor device. PageRank algorithm is used to assign a numerical rank to each vertex as per the in-degree links to that vertex. It considers a random walk from any selected vertex with the traversed connected vertexes. The rank of vertices that are representing mobile tracer sensors shows the movement of customers during a specific time period. It can be used for making decision about the reorganization of a store layout.

Big Data Analytics: Performance Evaluation for High Availability and Fault Tolerance using MapReduce Framework with HDFS

Conference

Title of PaperBig Data Analytics: Performance Evaluation for High Availability and Fault Tolerance using MapReduce Framework with HDFS

Proceeding Name2018 IEEE - Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC - 2018)

PublisherIEEE

Author NameJai Prakash Verma, Sapan H Mankad, Sanjay Garg

OrganizationJAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, Himachal Pradesh, India

Year , VenueJune 2019 , JAYPEE UNIVERSITY OF INFORMATION TECHNOLOGY, Himachal Pradesh, India

Page Number770-775

Indexed INScopus

Abstract

Big data analytics helps in analyzing structured data transaction and analytics programs that contain semi-structured and unstructured data. Internet clickstream data, mobile-phone call details, server logs are examples of big data. Relational database-oriented dataset doesn't fit in traditional data warehouse since big data set is updated frequently and large amount of data are generated in real time. Many open source solutions are available for handling this large scale data. The Hadoop Distributed File System (HDFS) is one of the solutions which helps in storing, managing, and analyzing big data. Hadoop has become a standard for distributed storage and computing in Big Data Analytic applications. It has the capability to manage distributed nodes for data storage and processing in distributed manner. Hadoop architecture is also known as Store everything now and decide how to process later. Challenges and issues of multi-node Hadoop cluster setup and configuration are discussed in this paper. The troubleshooting for high availability of nodes in different scenarios for Hadoop cluster failure are experimented with different sizes of datasets. Experimental analysis carried out in this paper helps to improve uses of Hadoop cluster effectively for research and analysis. It also provides suggestions for selecting size of Hadoop cluster as per data size and generation speed.

Evaluation of Pattern Based Customized Approach for Stock Market Trend Prediction With Big Data and Machine Learning Techniques

Journal

Journal NameInternational Journal of Business Analytics

Title of PaperEvaluation of Pattern Based Customized Approach for Stock Market Trend Prediction With Big Data and Machine Learning Techniques

PublisherIGI Global

Volume Number6

Page Number1-15

Published YearFebruary 2019

ISSN/ISBN No2334-4547

Indexed INScopus, Web of Science

Abstract

The stock market is very volatile and non-stationary and generates huge volumes of data in every second. In this article, the existing machine learning algorithms are analyzed for stock market forecasting and also a new pattern-finding algorithm for forecasting stock trend is developed. Three approaches can be used to solve the problem: fundamental analysis, technical analysis, and the machine learning. Experimental analysis done in this article shows that the machine learning could be useful for investors to make profitable decisions. In order to conduct these processes, a real-time dataset has been obtained from the Indian stock market. This article learns the model from Indian National Stock Exchange (NSE) data obtained from Yahoo API to forecast stock prices and targets to make a profit over time. In this article, two separate algorithms and methodologies are analyzed to forecast stock market trends and iteratively improve the model to achieve higher accuracy. Results are showing that the proposed pattern-based customized algorithm is more accurate (10 to 15%) as compared to other two machine learning techniques, which are also increased as the time window increases.

Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems

Conference

Title of PaperData Consumption-Aware Load Forecasting Scheme for Smart Grid Systems

Proceeding Name2018 IEEE Globecom Workshops (GC Wkshps),

PublisherIEEE Globecom

Author NameJai Prakash Verma

Organization2018 IEEE Globecom Workshops (GC Wkshps), Abu Dhabi, United Arab Emirates, United Arab Emirates

Year , VenueDecember 2018 , Abu Dhabi, United Arab Emirates, United Arab Emirates

Page Number1-6

ISSN/ISBN NoISBN: 978-1-5386-4920-6 , ISBN: 978-1-5386-6977-8

Indexed INScopus

Abstract

With the realisation of the Smart Grids (SG) infrastructure at a large scale, demand predictions can be mapped more accurately. Systems base forecasts on user consumption patterns have mined from old feedback systems to modern extensive sensor based network technologies. Therefore, to derive the usage functions, it is essential to perceive such conditions. These directly impact the power needs and the lifestyle of the consumers, and hence, aid in understanding the user behavior and correspondingly manage power generation. This study propounds mean weather conditions as pivotal to determining power usage. Employing a time based data driven approach, this research functions to predict load expectation in various utilization sectors. Repositioning the adoption of climatic conditions from absolute to relative, the investigation establishes the dependence of collective load prediction on the general weather. The simulation results prove that the time dependent load forecasting model accurately predicts the energy demand of residential and commercial sector.

A Range-Based Approach for Long-Term Forecast of Weather Using Probabilistic Markov Model

Conference

Title of PaperA Range-Based Approach for Long-Term Forecast of Weather Using Probabilistic Markov Model

Proceeding Name 2018 IEEE International Conference on Communications Workshops (ICC Workshops)

Publisher 2018 IEEE International Conference on Communications Workshops (ICC Workshops)

Author NameJai Prakash Verma

Organization 2018 IEEE International Conference on Communications Workshops (ICC Workshops)

Year , VenueMay 2018 , Kansas City, MO, USA

Page Number1-6

ISSN/ISBN No2474-9133

Indexed INScopus

Abstract

Weather forecasts serve to incline individual behaviors and interactions, commercial intentions and organizational efforts. A normal user is usually indifferent to weather statistics and corresponding value predictions but obtains an approximate idea from the average weather conditions. Forecasts justifying overall conditions for a duration which is usually rely on previous observations. Correspondingly, they extend the probability of inducing incorrect predictions as relatively insignificant variations consequently compound to substantial errors. As such, long term predictions are usually limited and unreliable. This paper aims to bridge this gap, by adopting a range specific approach to a probabilistic markov model (PMM). To develop a certainty in availability, we employ a cloud server to house for the analytics. We have achieved a considerable rise in accuracy in the results, along with a simplistic convenience for the user as compared to other available state-of- the-art methods.

Evaluation of Unsupervised Learning based Extractive Text Summarization Technique for Large Scale Review and Feedback Data

Journal

Journal NameIndian Journal of Science and Technology

Title of PaperEvaluation of Unsupervised Learning based Extractive Text Summarization Technique for Large Scale Review and Feedback Data

PublisherIndian Journal of Science and Technology

Volume Number10

Page Number17-22

Published YearMay 2017

ISSN/ISBN NoISSN (Print) : 0974-6846, ISSN (Online) : 0974-5645

Indexed INWeb of Science

Abstract

Background/Objectives: Supervised techniques uses human generated summary to select features and parameter for summarization. The main problem in this approach is reliability of summary based on human generated parameters and features. Many researches have shown the conflicts in summary generated. Due to diversity of large scale datasets, supervised techniques based summarization also fails to meet the requirements. Big data analytics for text dataset also recommends unsupervised techniques than supervised techniques. Unsupervised techniques based summarization systems finds representative sentences from large amount of text dataset. Methods/Statistical Analysis: Co-selection based evaluation measure is applied for evaluating the proposed research work. The value of recall, precision, f-measure and similarity measure are determined for concluding the research outcome for the respective objective. Findings: The algorithms like KMeans, MiniBatchKMeans, and Graph based summarization techniques are discussed with all technical details. The results achieved by applying Graph Based Text Summarization techniques with large scale review and feedback data found improvement over previously published results based on sentence scoring using TF and TF-IDF. Graph based sentence scoring method is much efficient than other unsupervised learning techniques applied for extractive text summarization. Application/Improvements: The execution of graph based algorithm with Spark’s Graph X programming environment will secure execution time for this types of large scale review and feedback dataset which is considered under Big Data Problem.

Web Warehouse: Issues and Challenges for Web Data Mining

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperWeb Warehouse: Issues and Challenges for Web Data Mining

Publisher International Journal of Advanced Research in Computer Science

Volume Number8

Page Number645-649

Published YearMay 2017

Indexed INEBSCO

Abstract

Web Mining defines as extracting knowledge from web. Its types are web uses mining, web content mining, and web structured mining. Each category requires handling the issues of heterogeneous behaviour of web data. This paper will focus on the issues of web data, web mining and its applications. The detailed architecture of web warehouse is also proposed. Each component of architecture requires more exploration and research. As well as paper describe Knowledge as a Service (KAAS) and Web Warehousing as a Service (WWAAS) as web mining applications with cloud computing. The implementation of web warehouse as KAAS and WWAAS with cloud computing is proposed as future extension of this work.

Text Data Analysis: Computer Aided Automated Assessment System

Conference

Title of PaperText Data Analysis: Computer Aided Automated Assessment System

Proceeding Name3rd IEEE International Conference on "Computational Intelligence and Communication Technology" (IEEE-CICT 2017)

Publisher 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)

Author NameJai Prakash Verma

Organization 2017 3rd International Conference on Computational Intelligence & Communication Technology (CICT)

Year , VenueFebruary 2017 , Ghaziabad, India

Page Number1-5

ISSN/ISBN No ISBN: 978-1-5090-6218-8, ISBN: 978-1-5090-6219-5

Indexed INScopus

Abstract

Computer aided evaluation systems are generally considered objective types of questionnaires. Evaluation based on subjective answer is consider a problem under text analytics, where text answer will be compare with available correct text answer. This paper is emphasizing the issues of computer aided automated assessment and proposing a model for handling these issues. Using such mechanism a faculty can avoid the evaluation process manually. Students can be automatically graded using the application and given a summary report.

Comparison of MapReduce and Spark Programming Frameworks for Big Data Analytics on HDFS

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperComparison of MapReduce and Spark Programming Frameworks for Big Data Analytics on HDFS

PublisherInternational Journal of Computer Science & Communication

Volume Number7

Page Number80-84

Published YearJune 2016

Abstract

Use of internet and all the types of computer automated systems generates large amount of data in different forms. Due to large volume, different types of varieties, and high velocity of this type of data emerges the Big Data Problem. Spark and MapReduce programming frameworks provide an effective open source solution for managing and analyzing the Big Data. Today researcher are comparing both the frameworks and making many interpretations which also generates many misconceptions about the performances and efficiency. In this paper we are discussing the working model of both the programming frameworks and by experimental analysis, we are also finding that Spark is three to four times faster than MapReduce paradigm on single node implementation of Hadoop Distributed File System.

An Extractive Text Summarization approach for Analyzing Educational Institution’s Review and Feedback Data

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperAn Extractive Text Summarization approach for Analyzing Educational Institution’s Review and Feedback Data

PublisherInternational Journal of Computer Applications

Volume Number143

Page Number51-55

Published YearJune 2016

ISSN/ISBN No0975 – 8887

Indexed INEBSCO

Abstract

Big Data analytics helps the enterprises and institutions to understand and identify the usability of large amount of data generated by their routine operations. All most third forth part of these types of data is semi-structured text data. Many types of actionable insights can be found from these type of semistructured text data that can help strategic management for making right decision. In this paper we are proposing a recommendation system model for understanding and finding actionable insight from the large amount of text data generated for an educational institution. Here we are discussing different type of data generation sources of this types of data as well as data cleaning processes required. The wordcloud for an educational institution is published that help strategic management for understanding the sentiment of different stack holders mainly students. Herewith we are identifying different types of findings from these sets of words that helps for betterment in the functionaries of an Educational Institution.

Big data analysis: recommendation system with Hadoop framework

Conference

Title of PaperBig data analysis: recommendation system with Hadoop framework

Proceeding Name2015 IEEE International Conference on Computational Intelligence & Communication Technology

Publisher2015 IEEE International Conference on Computational Intelligence & Communication Technology

Author NameJai Prakash Verma

Organization2015 IEEE International Conference on Computational Intelligence & Communication Technology

Year , VenueFebruary 2015 , Ghaziabad, India

Page Number92-97

ISSN/ISBN NoISBN: 978-1-4799-6023-1,

Indexed INScopus

Abstract

Recommendation system provides the facility to understand a person's taste and find new, desirable content for them automatically based on the pattern between their likes and rating of different items. In this paper, we have proposed a recommendation system for the large amount of data available on the web in the form of ratings, reviews, opinions, complaints, remarks, feedback, and comments about any item (product, event, individual and services) using Hadoop Framework. We have implemented Mahout Interfaces for analyzing the data provided by review and rating site for movies.

Web Mining: Opinion and Feedback Analysis for Educational Institutions

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperWeb Mining: Opinion and Feedback Analysis for Educational Institutions

PublisherInternational Journal of Computer Applications

Volume Number84

Page Number17-22

Published YearDecember 2013

ISSN/ISBN No0975 – 8887

Indexed INEBSCO

Abstract

Big amount of data available in the forms of reviews, opinions, feedbacks, remarks, comments, observations, clarifications, and explanations that require a robust mechanism to store, retrieve, analyze, and management. In this paper, we are proposing system that provides review or summary of above mention text data available on web for an educational institute. Due to big data size above system can be extended as real time recommendation system for Big Data analysis as future enhancement.

Image to Sound Conversion

Journal

Journal NameInternational Journal of Advance Research in Computer Science and Management Studies

Title of PaperImage to Sound Conversion

PublisherInternational Journal of Advance Research in Computer Science and Management Studies

Volume Number1

Page Number34 - 39

Published YearNovember 2013

ISSN/ISBN NoISSN: 2321-7782 (Online)

Indexed INOthers

Abstract

In this paper we are proposing a system to convert pictures into sound. This proposed system will identify the object from its picture and person will be able to listen to the name of the objects, in the picture. Here we will first get the image from a digital camera then by removing noise by Grey scale and after this Thresholding will be applied. In image processing, thresholding is used to split an image into smaller segments, or junks, using at least one color or grayscale value to define their boundary. After that Object recognizing can be done with Memory-Based Object Recognition Algorithm and object will be identified as Textual name and this name will be stored in the database. Then Optical Character Recognition will be applied to convert text into machine Text. This Text will be converted finally to sound.

Efficient computing of OLAP in Big data warehouse

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperEfficient computing of OLAP in Big data warehouse

PublisherIJARCS

Volume Number9

Page Number201-205

Published YearJanuary 2018

ISSN/ISBN No0976-5697

Indexed INIndian citation Index, UGC List

Big Data Harmonization –Challenges and Applications

Journal

Journal NameInternational Journal on Recent and Innovation Trends in Computing and Communication

Title of PaperBig Data Harmonization –Challenges and Applications

Publisheri

Volume Number5

Page Number206-208

Published YearJune 2017

ISSN/ISBN No2321-8169

Indexed INIndian citation Index, UGC List, Others

Abstract

As data grow, need for big data solution gets increased day by day. Concept of data harmonization exist since two decades. Asdata is to be collected from various heterogeneous sources and techniques of data harmonization allow them to be in a single format at same place it is also called data warehouse. Lot of advancement occurred to analyses historical data by using data warehousing. Innovations uncover the challenges and problems faced by data warehousing every now and then. When the volume and variety of data gets increased exponentially, existing tools might not support the OLAP operations by traditional warehouse approach. In this paper we tried to focus on the research being done in the field of big data warehouse category wise. Research issues and proposed approaches on various kind of dataset is shown. Challenges and advantages of using data warehouse before data mining task are also explained in detail.

Women carrer in IT sector

Conference

Title of PaperWomen carrer in IT sector

Proceeding NameIndian Journal of Technical Education

PublisherGTU

Author NameJigna Patel

OrganizationBVM Engineering College,V.V.Nagar

Year , VenueJanuary 2016 , India

Page Number4

ISSN/ISBN NoISSN:0971-3034

Indexed INOthers

Big data for better health planning

Conference

Title of PaperBig data for better health planning

Proceeding NameIEEE International Conference on Advances in Engineering & Technology Research (ICAETR -2014)

PublisherIEEE Xplore

Author NameJigna Patel

Year , VenueAugust 2014 , Dr. Virendra Swarup Group ofinstitutions, Unnao, India

Page Number4

Indexed INScopus

Abstract

he exponential evolution of data in health care has brought a lot of challenges in tenns of data transfer, storage, computation and analysis. For healthcare usage and applications, ample patient infonnation and historical data, which enclose rich and significant insights that can be exposed using advanced tools and techniques as well as latest machine learning algorithms. Though, the size and rapidity of such great dimensional data requires new big data analytics framework. This paper introduces the thought of data in healthcare and the results of various surveys to show the impact of big data. Few case studies of big data analytics in healthcare is presented. Last section is about the tools and techniques comprising Hadoop, Stonn, Spark and HPCC -big data solution offered to solve big data issues and challenges

Traffic control using fuzzy logic

Journal

Journal NameInternational Journal of Electronics, Communication & InstrumentationEngineering Research and Development

Title of PaperTraffic control using fuzzy logic

PublisherTJPRC

Volume NumberVolume4-4

Page NumberPage no: 27-35

Published YearAugust 2014

ISSN/ISBN No2249-7951

Indexed INOthers

Abstract

Fuzzy Logic is based on distinguish between Binary variable which is present in Classical sets which are restricted. Fuzzy Logic helps us to build linguistic variable which enables us to create minute differences in any application. This paper covers the basics of Fuzzy logic. The entire concept of fuzzy logic is presented in well-defined manner. When to use and how to use fuzzy logic is explained. There are many application in which fuzzy logic is used and I have implemented one of them. I have demonstrated a C++ code with algorithm to detect the traffic flow on roads and I have discussits results. Future scope with the extension of existing code would be helpful

A Survey on Security Issues in MANETs

Conference

Title of PaperA Survey on Security Issues in MANETs

Proceeding NameInternational Conference on Recent Innovations in Applied Science, Engineering and Technologies

OrganizationInstitution of Engineers, India

Year , VenueJune 2018 , IEI, Mumbai

Page Number146-155

ISSN/ISBN No987-93-87793-30-2

Review on Different types of Spam Filtering Techniques

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperReview on Different types of Spam Filtering Techniques

Volume Number8

Page Number2720-2723

Published YearJune 2017

ISSN/ISBN No0976-5697

Indexed INOthers

Computational Analysis of different Vertex Cover alorithms of various graphs

Conference

Title of PaperComputational Analysis of different Vertex Cover alorithms of various graphs

Proceeding NameInternational Conference on Intelligent Computing and Control Systems

PublisherIEEE

OrganizationVaigai College of Engineering

Year , VenueJune 2017 , Madurai India.

Page Number730-734

A Review on Different types of Spam Filtering Techniques

Journal

Journal NameIJARCS

Title of PaperA Review on Different types of Spam Filtering Techniques

Volume Number8

Published YearJanuary 2017

ISSN/ISBN No0976-5697

Indexed INUGC List

Twitter Followee Recommender System

Conference

Title of PaperTwitter Followee Recommender System

PublisherInternational conference on recent trends in engineering science and management

Year , VenueApril 2016 , Vendant college of Engineering and Technology,Bundi,Rajasthan

Page Number524-534

ISSN/ISBN No978-81-932074-4-4

Deep Learning Algorithms

Journal

Journal Name International Journal of Computer Science & Communication

Title of PaperDeep Learning Algorithms

Volume Number7

Page Number258-263

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INOthers

Assembling a Web Crawler

Conference

Title of PaperAssembling a Web Crawler

Proceeding NameInternational Conference on Recent Innovations in Science, Engineering and Management

Year , VenueMay 2015 , New Delhi

Page Number710-794

ISSN/ISBN No978-81-931039-4-4

USING JFLAP IN ACADEMICS TO UNDERSTAND AUTOMATA THEORY IN A BETTER WAY

Conference

Title of PaperUSING JFLAP IN ACADEMICS TO UNDERSTAND AUTOMATA THEORY IN A BETTER WAY

PublisherInstitute of Research and Journal

OrganizationInternational conference on Networking communication and Computing Technology

Published YearMarch 2018

ISSN/ISBN No 2393-2835

Abstract

As it is been observed that the things get much easier once we visualize it and hence this paper is just a step towards it. Usually many subjects in computer engineering curriculum like algorithms, data structures, and theory of computation are taught theoretically however it lacks the visualization that may help students to understand the concepts in a better way.

Ant colony optimization algorithm: advantages, applications and challenges

Journal

Journal NameCOMPUTER MODELLING & NEW TECHNOLOGIES

Title of PaperAnt colony optimization algorithm: advantages, applications and challenges

PublisherMATHEMATICAL AND COMPUTER MODELLING

Volume Number21

Page Number69-70

Published YearFebruary 2017

ISSN/ISBN No1407-5806

Indexed INOthers

Abstract

Ant Colony optimization is a technique for optimization that was introduced in early 1990’s. ACO algorithm models the behaviour of real ant colonies in establishing the shortest path between food sources and nests and this technique is applied on number of combinatorial optimization problem, communication networks and robotics. This paper introduces the advantages of using the ACO algorithms with the help of some problem examples and the challenges faced for solving the problems. Initially, the paper discusses about the biological inspiration and behaviour of ant colony and then relates with the real life problems.

Fusion of Statistical and Machine Learning Approaches for Time Series Prediction using Earth Observation Data

Journal

Journal NameInternational Journal of Computational Science and Engineering

Title of PaperFusion of Statistical and Machine Learning Approaches for Time Series Prediction using Earth Observation Data

PublisherInderscience

Volume Number14

Page Number255-266

Published YearMay 2017

ISSN/ISBN No1742-7185

Indexed INScopus

Abstract

This paper focuses on fusion of statistical and machine learning models for improving the accuracy of time series prediction. Statistical model like integration of auto regressive (AR) and moving average (MA) is capable to handle non-stationary time series but it can deal with only single time series. The machine learning approach [i.e. support vector regression (SVR)] can handle dependency among different time series along with nonlinear separable domains, however it cannot incorporate the past behaviour of time-series. This led us to hybridise auto regressive integrated moving average (ARIMA) with SVR model, where focus has been given on minimisation of forecast error using residuals. Issue related to scalability has been handled by taking suitable representative samples from each sub-areas which helped in reducing number of models and drastic reduction in time for tuning different parameters. Results obtained show that the performance of proposed hybrid model is better than individual models.

Development and Validation of OPTICS Based Spatio -Temporal Clustering Technique

Journal

Journal NameElsevier

Title of PaperDevelopment and Validation of OPTICS Based Spatio -Temporal Clustering Technique

PublisherInformation Sciences

Volume Number369

Page Number388-401

Published YearJune 2016

ISSN/ISBN No0020-0255

Indexed INScopus

Abstract

Spatio-temporal data mining (STDM) is a process of the extraction of implicit knowledge, spatial and temporal relationships, or other patterns not explicitly stored in spatio-temporal databases. As data are growing not only from static view point, but they also evolve spatially and temporally which is dynamic in nature that is the reason why this field is now becoming very important field of research. In addition, spatio-temporal (ST) data tend to be highly auto-correlated, which leads to failure of assumption of independence, which is there in Gaussian distribution model. Vital issues in spatio temporal clustering technique for earth observation data is to obtain clusters of, good quality, arbitrary shape, problem of nested clustering and their validation. The present paper addresses these issues and proposes their solutions. In this direction, an attempt has been made to develop a clustering algorithm named as "Spatio-Temporal - Ordering Points to Identify Clustering Structure (ST-OPTICS)" which is modified version of existing density based technique - "Ordering Points to Identify Clustering Structure (OPTICS)". Experimental work carried out is analysed and found that quality of clusters obtained and run time efficiency are much better than existing technique i.e. ST-DBSCAN. In order to improve the visualization and the interpretation of obtained micro level clusters, sincere effort has been put in to merge the obtained clusters using agglomerative approach. Performance evaluation is done in both ways i.e. qualitatively and quantitatively for cross validating the results. Results show performance improvement of proposed ST-OPTICS clustering technique compared to ST-DBSCAN algorithm.

GDLC: A Software Engineering Approach in Game Development

Journal

Journal NameInternational Journal of Advance Research in Science and Engineering

Title of PaperGDLC: A Software Engineering Approach in Game Development

Volume Number6(6)

Page Number579-584

Published YearJune 2017

ISSN/ISBN No2319-8354

Indexed INUGC List

Software Engineering in freelancing

Journal

Journal NameInternational Journal of Research and Scientific Innovation

Title of PaperSoftware Engineering in freelancing

Volume Number4(5)

Page Number103-105

Published YearMay 2017

ISSN/ISBN No2321-2705

Indexed INUGC List

Survey Paper on Impact of Cloud Computing on Conventional Software Engineering

Journal

Journal NameInternationa Journal of Computer Science and Engineering

Title of PaperSurvey Paper on Impact of Cloud Computing on Conventional Software Engineering

Volume Number9(5)

Page Number149-152

Published YearMay 2017

ISSN/ISBN No0975-3397

Indexed INUGC List

Security Engineering

Conference

Title of PaperSecurity Engineering

Proceeding NameInternational Conference on Academic Research in Engineering and Management

OrganizationInstitution of Electronics and Telecommunication Engineers, Delhi

Year , VenueApril 2017 , Institution of Electronics and Telecomunication Engineers, Lodhi Road, Delhi

Page Number269 - 274

ISSN/ISBN NoISBN - 978-93-86171-43-6

Indexed INUGC List

Performance Evaluation of Transmission distance and Bit Rates in Inter-Satellite optical wireless communication system

Conference

Title of PaperPerformance Evaluation of Transmission distance and Bit Rates in Inter-Satellite optical wireless communication system

Proceeding Name3rd International Conference on Recent Innovations in Science Engineering and Management

OrganizationSri Venkateswara College of Engineering and Technology, Srikakulam,Andhra Pradesh

Year , VenueFebruary 2017 , Sri Venkateswara College of Engineering and Technology,Srikakulam, Andhrapradesh

Page Number36-40

ISSN/ISBN No978-81-932074-1-3

Indexed INUGC List

Performance evolution of optical link using dispersion compensation fiber and FBG

Conference

Title of PaperPerformance evolution of optical link using dispersion compensation fiber and FBG

Proceeding NameInternational Conference on Recent Trends in Engineering Science, Humanities and Management

OrganizationSri S Ramasamy Naidu Memorial College, Sattur, Tamilnadu

Year , VenueFebruary 2017 , Sri S Ramasamy Naidu Memorial College, Sattur, Tamilnadu

Page Number809-812

ISSN/ISBN NoISBN : 978-93-86171-18-4

Indexed INUGC List

A machine learning approach to improve the efficiency of fake website detection techniques

Journal

Journal NameInternational Journal of Computer Science and Communication

Title of PaperA machine learning approach to improve the efficiency of fake website detection techniques

Volume Number7

Page Number236-243

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INUGC List

A novel approach to improve the efficiency of fake website detection techniques: Survey

Conference

Title of PaperA novel approach to improve the efficiency of fake website detection techniques: Survey

Proceeding Name2nd International Conference on Recent Trends in Engineering Science and Management

OrganizationYMCA, New Delhi

Year , VenueFebruary 2016 , YMCA, New Delhi

Page Number71-78

ISSN/ISBN No978-81-932074-3-7

Indexed INUGC List

Affect Analysis of Multilingual Tweets for Predicting Voting Behavior

Journal

Journal NameInternational Journal of Innovative Technology and Exploring Engineering (IJITEE)

Title of PaperAffect Analysis of Multilingual Tweets for Predicting Voting Behavior

PublisherBlue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

Volume Number9

Page Number1768-1771

Published YearDecember 2019

ISSN/ISBN No2278-3075

Indexed INOthers

Abstract

Social media has been proved as wild card for its role in election campaign across the globe. It has been used for general election of India in year 2014 and year 2019 by political parties for election campaign. Thus social media provides opportunity for electoral prediction. Users from India use regional languages in addition to English language on social media. Multilingual data likely to give better prediction compared to single language data. Affect analysis gives deeper insight compared to sentiment analysis. This research study aims to predict voting behavior for 2019 general election of India using affect analysis of multilingual tweets. Three languages namely English, Hindi and Gujarati are used for this study. Volume-based method and machine learning algorithm based method are two approaches widely used in literature for electoral prediction. In this research study hybrid approach is used along with consideration of ratio of positive count and negative count of tweets. Experiment result shows efficacy of the proposed approach.

Multilabel Classification for Emotion Analysis of Multilingual Tweets

Journal

Journal NameInternational Journal of Innovative Technology and Exploring Engineering

Title of PaperMultilabel Classification for Emotion Analysis of Multilingual Tweets

PublisherBlue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

Volume Number9

Page Number4453-4457

Published YearNovember 2019

ISSN/ISBN No 2278-3075

Indexed INScopus

Abstract

Emotion Analysis of text targets to detect and recognize types of feelings expressed in text. Emotion analysis is successor of Sentiment analysis. The latter does coarse-level analysis and classify the text into positive and negative categories while former does fine-grain analysis and classify text in specific emotion categories like happy, surprise, angry. Analysis of text at fine-level provides deeper insight compared to coarse-level analysis. In this paper, tweets are classified in discrete eight basic emotions namely joy, trust, fear, surprise, sadness, anticipation, anger, disgust specified in Plutchik’s wheel of emotions [1]. Tweets for three languages collected out of which one is English language and rest two are Indian languages namely Gujarati and Hindi. The collected tweets are related to Indian politics and are annotated manually. Supervised Learning and Hybrid approach are used for classification of tweets. Supervised learning uses tf-idf as features while hybrid approach uses primary and secondary features. Primary features are generated using tf-idf weighting and two different algorithms of feature generation are proposed which generate secondary features using SenticNet resource. Multilabel classification is performed to classify tweets in emotion categories. Results of experiments show effectiveness of hybrid approach.

A sentiment analysis of Gujarati text using Gujarati senti word net

Journal

Journal NameInternational Journal of Innovative Technology and Exploring Engineering

Title of PaperA sentiment analysis of Gujarati text using Gujarati senti word net

PublisherBlue Eyes Intelligence Engineering and Sciences Publication (BEIESP)

Volume Number8

Page Number2290-2293

Published YearJuly 2019

ISSN/ISBN No2278-3075

Indexed INScopus

Abstract

Sentiment Analysis plays vital role in decision making. For English language intensive research work is done in this area. Very less work is reported in this domain for Indian languages compared to English language. Gujarati language is almost unexplored for this task. More data in form of movie reviews, product reviews, social media posts etc are available in regional languages as people like to use their native language on Internet which leads to need of mining these data in order to understand their opinion. Various tools and resources are developed for English language and few for Indian languages. Gujarati is resource poor language for this task. Motive of this paper is to develop sentiment lexical resource for Gujarati language which can be used for sentiment analysis of Gujarati text. Hindi SentiWordNet (H-SWN) [1] and synonym relations of words from IndoWordnet (IWN) [2] [3] are used for developing Gujarati SentiWordNet. Our contribution is twofold. (1) Gujarati SentiWordNet (G-SWN) is developed. (2) Gujarati corpus is prepared in order to evaluate lexical resource created. Evaluation result shows the usefulness of generated resource.

Affect Computation Models from Textual Aspect: A Brief Survey

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperAffect Computation Models from Textual Aspect: A Brief Survey

PublisherFoundation of Computer Science (FCS), NY, USA

Volume Number146

Page Number25-29

Published YearJuly 2016

ISSN/ISBN No0975-8887

Indexed INEBSCO

Abstract

Human emotions are outcome of the subjective evaluation of events that occur in the environment. There are various affect theories in psychology to understand human emotion. To make Human-Computer-Interaction (HCI) intelligent, affect theory are to be incorporated. In this paper, discussion of various affect theories and affect computation models have been presented.

Mobile App Monetization: Issues and Challenges

Journal

Journal NameInternational Journal of Engineering Technology, Management and Applied Sciences

Title of PaperMobile App Monetization: Issues and Challenges

PublisherAcademic Science

Volume Number3

Page Number13-15

Published YearMay 2015

ISSN/ISBN No2349-4476

Indexed INOthers

Abstract

In recent years, there has been tremendous advancement in the capabilities of mobile devices which in turn led increase in the development and use of mobile applications. Mobile device users are attracted towards feature-rich applications. The app developers are encouraged to develop applications to meet users need. The app developers can distribute and sell their applications in mobile application market. The rise of mobile application market opened up immense opportunities for mobile app developers to generate revenue by selling mobile applications to large number of consumers as well as to capture new customers. There exist various monetization models which developers opt for creation of economic value. Issues and challenges in this context are discussed in this paper.

Text Mining: Process and Techniques

Journal

Journal NameInternational Journal of Innovative Research in Computer Science & Technology (IJIRCST)

Title of PaperText Mining: Process and Techniques

PublisherInnovative Research Publication

Volume Number3

Page Number70-72

Published YearMay 2015

ISSN/ISBN No2347-5552

Indexed INIndian citation Index

Abstract

Massive amount of digital data is available in form of unstructured text. It is highly required to extract useful information from this textual data. The process to discover non-trivial information and knowledge which are previously unknown is knows as Text Mining. This paper discusses process and techniques with respect to Text Mining.

Software Defined Vehicular Networks: A Comprehensive Review

Journal

Journal NameInternational Journal of Communications:Software Defined Vehicular Networks: A Comprehensive Review

Title of PaperSoftware Defined Vehicular Networks: A Comprehensive Review

PublisherWiley

Volume Numberearly access

Page Numberearly access

Published YearJanuary

ISSN/ISBN No1099-1131

Indexed INScopus, Web of Science, EBSCO, UGC List, Others

Abstract

The recent breakthroughs in the automobile industries and telecommunication technologies along with the exceptional multimodal mobility services brought focus on Intelligent Transportation System (ITS), of which Vehicular Adhoc Networks (VANETs) gain much more attention. The distinctive features of Software Defined Networking (SDN) leverages the vehicular networks by its state of the centralized art having a comprehensive view of the network. Its potential to bring the flexibility, programmability and other extensive advancements to vehicular networks has set the stage for a novel networking paradigm termed as Software-Defined Vehicular Networks (SDVNs). Many researchers have demonstrated the SDN based VANETs with the various configuration of the SDN components in VANET architecture. However, a compilation of the work on the SDN based VANET system as a whole incorporating its architecture, use-cases, and opportunities is still inadequate. We start with the summary of the recent studies exist on the SDVNs, followed by the comprehensive explanation of its components. Next, we present the taxonomy of SDVN based on the architecture modes, protocols, access technologies and opportunities with trending technologies. Finally, we highlights the challenges, open research issues, and future research directions.

Trust Management and Monitoring at an IaaS Level of Cloud Computing

Conference

Title of PaperTrust Management and Monitoring at an IaaS Level of Cloud Computing

Proceeding NameSRRN Elsevier

PublisherSRRN Elsevier

Year , VenueJanuary , MNIT, Jaipur

Page Number-

ISSN/ISBN No1556-5068

Indexed INUGC List

Abstract

Now a days Cloud Computing is as a major utility, same as electricity and water bills where we pay as we go with the consumption of the said resources, as organization usages cloud computing services and pays as per their usage of the resources. In this research paper, the authors aspect are towards at what trust is and how trust value can be maintained to create its trust level among the end users and the cloud service provider with the help of on demand monitoring mechanism and invoking the monitoring techniques only when the trust fluctuates to maintain its dignity towards the trust shown by the end use .In monitoring the present status of the resources are analyzed and based upon the same the new instances will be created to satisfy the need of the end users to maintain the trust level.

Influence of Montoring: Fog and Edge Computing

Journal

Journal NameScalable Computing: Practice and Experience

Title of PaperInfluence of Montoring: Fog and Edge Computing

PublisherSCPE

Volume Number20

Page Number365–376

Published YearMay 2019

ISSN/ISBN No1895-1767

Indexed INScopus, Web of Science, UGC List

Abstract

The evolution of the Internet of Things (IoT) has augmented the necessity for Cloud, edge and fog platforms. The chief benefit of cloud-based schemes is they allow data to be collected from numerous services and sites, which is reachable from any place of the world. The organizations will be benefited by merging the cloud platform with the on-site fog networks and edge devices and as result, this will increase the utilization of the IoT devices and end users too. The network traffic will reduce as data will be distributed and this will also improve the operational efficiency. The impact of monitoring in edge and fog computing can play an important role to efficiently utilize the resources available at these layers. This paper discusses various techniques involved for monitoring for edge and fog computing and its advantages. The paper ends with a case study to demonstarte the need of monitoring in fog and edge in the healthcare system.

Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Journal

Journal NameProcedia computer science Elsevier:Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Title of PaperInspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

PublisherElsevier

Volume Number132

Page Number1280-1289

Published YearFebruary 2018

ISSN/ISBN No1877-0509

Indexed INScopus, UGC List

Abstract

Cloud Computing is an example of the distributed system where the end user has to connect to the services given by the cloud which is maintained by the cloud service provider (CSP). The user has to have certain trust upon the cloud as finally, the end user has to migrate the jobs into the cloud of some third party, as the on-premises data or sources are to be kept across the globe,the CSP have to maintain the trust level so that the end user can opt for the services given by the certain trusted Cloud.Ultimately there will be various elements of levels happening at the CSP side to maintain the trust level, like the safety features for security has to be identified ,federation related or Virtual Machine migration techniques status has to be always monitored to maintain and avoid certain uncertainty which will affect the trust level of the cloud, which can lead to the compromised situation in between the end user and CSP, as a result the trust value will decrease, In this paper we are proposing a techniques where the security features and conditions for load balancing monitoring technique with proactive actions will be analyzed to maintain the specified trust level .

Exhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing

Journal

Journal NameLNICST: Exhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing

Title of PaperExhausting Autonomic Techniques for Meticulous Consumption of Resources at an IaaS Layer of Cloud Computing

PublisherSpringer, Cham

Volume Number220

Page Number37-46

Published YearJanuary 2018

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

Internet based computing has provided lots of flexibility with respect to the usages of resources, as per the current demand of the users, and granting them the said resources has its own benefits, if given in proper manner i.e. exactly what the user has asked. In this paper the autonomic computing concepts has been discussed which will be very useful for the better utilisation of the resources at an IaaS (Infrastructure as a Service) level of the cloud computing. As Cloud Computing is highly scalable and virtualisation has become an important means for the efficient utilisation of the resources. Seeking the right amount of the resources at right time should be the goal of any CSP (Cloud service provider), On the other hand the CSPs has to deal with the situation of over provisioning and under provisioning, there should be some self-managing scheme through which the resources should be made available to the requesting user in an efficient manner to satisfy the need of their requirement with an improved resource utilisation. We have discussed the usage of autonomic computing to enhance the resource utilisation in the IaaS of cloud computing through various ways.

Capacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

Journal

Journal NameLNICST springer: Capacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

Title of PaperCapacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

PublisherSpringer, Cham

Volume Number220

Page Number66-74

Published YearAugust 2017

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

Cloud Computing is the exercise of using a network of remote servers held on the Internet to store, manage, and process data which have the characteristics as an elasticity, scalability or scalable resource sharing managed by the resource management. Even the growing demand of cloud computing has radically increased the energy consumption of the data centres, which is a critical scenario in the era of cloud computing, hence the resources has to be used efficiently, which ultimately will minimise the energy. Resource management itself will get the data from resource monitoring and resource prediction for the smooth conduction of the tasks and its allocated resources. In this paper the monitoring mechanism in the cloud has been discussed and its results are used to trigger the prediction rule engine which provides the cloud service provider (CSP) to start allocating the resources in the efficient manner, even the concept of failure handling has been mentioned based upon the certain parameter which will also inform the CSP to handle the failure task and try to mitigate this and again re schedule the failed task.

Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

Journal

Journal NameLNICST springer:Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

Title of PaperEfficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

PublisherSpringer, Cham

Volume Number220

Page Number47-55

Published YearAugust 2017

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

In this paper, we have discussed about the various techniques through which the cloud computing monitoring and prediction can be achieved, This paper provides the survey of the techniques related to monitoring and prediction for the efficient usages of the resources available at the IaaS level of cloud. As cloud provides the services, which are elastic, scalable or highly dynamic in nature, which binds us to make the correct usages of the resources, but in real situations the (Cloud Service Provider)CSP’s has to face the situation of under provisioning and over provisioning, where the resources are not fully utilized and being wasted, though this is the survey paper, it ends up with the proposed model where both the concepts of the Monitoring and Prediction will be combined together to give a better vision of the future resource demand in IaaS layer of Cloud Computing.

Enhancing data delivery with density controlled clustering in wireless sensor networks

Journal

Journal NameEnhancing data delivery with density controlled clustering in wireless sensor networks

Title of PaperEnhancing data delivery with density controlled clustering in wireless sensor networks

PublisherSpringer Berlin Heidelberg

Volume Number23

Published YearMay 2016

ISSN/ISBN No0946-7076

Abstract

Wireless sensor networks (WSN) are primarily used for sensing and collecting the information from environment. This information is sent to base station (BS), where, it is processed and analyzed by the underlying application. Functioning of WSN highly depend on the deployment strategy and the coordination among the sensor nodes. Preserving the energy is an important goal that must be considered when developing a routing protocol for WSNs. Radio communication in sensor nodes is highly expensive operation in terms of energy usage. Energy can be conserved in an efficient way with specifically customized routing techniques. Data aggregation methods when applied to sensor nodes, clusters are created where data generated from cluster members is aggregated. This kind of data collection strategy results into energy efficient communication. Integration of data aggregation and clustering approach is enabled through customized hierarchical routing strategies. Clustering technique is key to apply and exploit, the advantages in-network data processing offers. This paper compares various clustering protocols like LEACHC, K-means and its variants. The protocols are compared with respect to network lifetime, data delivery and energy consumption. These protocols only consider intra cluster distance of members while doing clustering, due to this non-uniform clusters are created. These kind of clusters do not deliver data periodically and uniformly from every corner of the field. A density control based approach is proposed which does balancing of cluster members assignment in a loose way. A loose density control (LDC) based approach is integrated with K-means clustering method. LDC based approach exhibits improved average data delivery per node, ensuring regular data availability from every corner of the deployment area as long as the nodes are alive. Not only it improves the amount of data delivered, it also improves the network lifetime considerably.

Advances in Single Image Super-Resolution: A Deep Learning Perspective

Book Chapter

Book NameLecture Notes in Networks and Systems

PublisherSpringer

Author NameKaransingh Chauhan, Hrishikesh Patel, Ridham Dave, Jitendra Bhatia and Malaram Kumhar

Page Number443-455

Chapter TitleAdvances in Single Image Super-Resolution: A Deep Learning Perspective

Published YearMay 2020

ISSN/ISBN No978-981-15-3368-6

Indexed INScopus

Quality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research Directions

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer

Author NameMalaram Kumhar, Gaurang Raval and Vishal Parikh

Page Number330-336

Chapter TitleQuality Evaluation Model for Multimedia Internet of Things (MIoT) Applications: Challenges and Research Directions

Published YearMarch 2020

ISSN/ISBN No978-3-030-39874-3

Indexed INScopus

Swine Flu Predication Using Machine Learning

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer

Author NameDvijesh Bhatt, Daiwat Vyas, Malaram Kumhar and Ajay Patel

Page Number611-617

Chapter TitleSwine Flu Predication Using Machine Learning

Published YearDecember 2018

ISSN/ISBN No978-981-13-1746-0

Indexed INScopus

Medical Diagnosis System Using Machine Learning

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperMedical Diagnosis System Using Machine Learning

PublisherIJCSC

Volume Number7

Page Number177-182

Published YearApril 2016

ISSN/ISBN No0973-7391

Indexed INOthers

Improving Security in P2P File Sharing Based on Network Coding for DTN

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperImproving Security in P2P File Sharing Based on Network Coding for DTN

PublisherIJCSC

Volume Number7

Page Number167-172

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INOthers

Ransomware: A Threat to Cyber security

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperRansomware: A Threat to Cyber security

PublisherIJCSC

Volume Number7

Page Number224-227

Published YearSeptember 2015

ISSN/ISBN No0973-7391

Indexed INOthers

Perspective Study on Load Balancing Paradigms in Cloud Computing

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperPerspective Study on Load Balancing Paradigms in Cloud Computing

PublisherIJCSC

Volume Number6

Page Number112-120

Published YearMarch 2015

ISSN/ISBN No0973-7391

Indexed INOthers

Survey on QoS Aware Routing Protocols for Wireless Multimedia Sensor Networks

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperSurvey on QoS Aware Routing Protocols for Wireless Multimedia Sensor Networks

PublisherIJCSC

Volume Number6

Page Number121-128

Published YearMarch 2015

ISSN/ISBN No0973-7391

Indexed INOthers

Parallelization of Velvet using Hybrid Computing

Conference

Title of PaperParallelization of Velvet using Hybrid Computing

PublisherAcademic Science

Page Number62-67

Published YearDecember 2016

ISSN/ISBN No978-81-932712-2-3

Indexed INUGC List

Abstract

Advances in DNA sequencing technologies have revolutionized the field of genomics by providing solutions which are cost effective and provide high throughput. In the verge of achieving this goal researchers and academicians are putting efforts for optimizi ng bioinformatics operations using HPC and advanced computing. Sequence assembling is a primitive component in Bioinformati

One dimensional ocean waves displacement prediction system expanding mathematical string equation

Conference

Title of PaperOne dimensional ocean waves displacement prediction system expanding mathematical string equation

PublisherIEEE

OrganizationNirma University International Conference on Engineering (NUiCONE)

Year , VenueNovember 2015 , Ahmedabad, India

ISSN/ISBN No978-1-4799-9991-0

Indexed INScopus, UGC List

Abstract

Oceanography comprises of parameters like wave-height, ocean-pressure, ocean-density, ocean-winds, ocean-depth, surface tension, sea-surface topography, etc. Predictions of upcoming changes are made using these parameters as inputs. Real-time sensors are deployed under the ocean to fetch real time measurements of parameters. Our research describes the work with respect to ocean wave-height paramet

Sparse Matrix Sparse Vector Multiplication - A Novel Approach

Conference

Title of PaperSparse Matrix Sparse Vector Multiplication - A Novel Approach

PublisherIEEE

Organization44th International Conference on Parallel Processing Workshops

Year , VenueSeptember 2015 , Beijing, China

Page Number67-73

ISSN/ISBN No1530-2016

Indexed INScopus

Abstract

The terabytes of information available on the internet creates a severe demand of scalable information retrieval systems. Sparse Matrix Vector Multiplication (SpMV) is a well-known kernel for such computing applications in science and engineering world. This raises need of designing an efficient SpMV. Researchers are putting their continuous effort to optimize SpMV that deal with wide class of spa

A comprehensive survey on oceanography parameters for developing ocean wave displacement prediction system

Journal

Journal NameJournal of Chemical and Pharmaceutical Sciences

Title of Paper A comprehensive survey on oceanography parameters for developing ocean wave displacement prediction system

PublisherSPB Pharma society

Volume Number8

Page Number273-278

Published YearJune 2015

ISSN/ISBN No0974-2115

Indexed INScopus

Abstract

Earth is widely covered by ocean. There are many calamities observed as a result of various unpredicted behaviour of ocean wave movements, and Landscaping under ocean along with response to weather change. These dynamic and drastic behaviours of oceans can be measured by various parameters like. The paper describes in depth learning of various concerned parameters which cover impact of par

Optimizing Parallel Scan Smith Waterman Algorithm

Conference

Title of Paper Optimizing Parallel Scan Smith Waterman Algorithm

PublisherIRAJ

Page Number86-89

Published YearSeptember 2014

ISSN/ISBN No320 - 2106

Indexed INOthers

Abstract

Smith - Waterman is a well - known local sequence alignment algorithm that is used for finding regions of maximum similarity between two biological sequences and is known to be a highly compute intensive task. As it is based on dynamic programming it guarantees optimal results. But Dynamic Programming has its own drawbacks such as hea vy memory consumption and significant amount

An Efficient Sparse Matrix Multiplication for skewed matrix on GPU

Conference

Title of PaperAn Efficient Sparse Matrix Multiplication for skewed matrix on GPU

PublisherIEEE

Year , VenueOctober 2012 , Liverpool, UK

Page Number1301-1306

ISSN/ISBN No978-1-4673-2164-8

Indexed INScopus, UGC List

Abstract

This paper presents a new sparse matrix format ALIGNED_COO, an extension to COO format to optimize performance of large sparse matrix having skewed distribution of non-zero elements. Load balancing, alignment and synchronization free distribution of work load are three important factors to improve performance of sparse matrices representing power-law graph. Coordinate (COO) format is selected for

PROS - An Omnipresent Operating System

Journal

Journal NameInternational Journal of Recent Trends in Engineering

Title of PaperPROS - An Omnipresent Operating System

PublisherInternational Journal of Recent Trends in Engineering

Volume Number1

Page Number144-148

Published YearMay 2009

ISSN/ISBN No1797-9617

Indexed INOthers

Abstract

The central idea presented in this paper is to show the architecture and working of an Operating System running over the network, thus leading to global computing. "PROS", as it is named, provides transparency meaning it would work same as a real operating system on the PC without need of static installation. PROS would load up on the user's PC irrespective of the location along with user’s

Review of Machine Learning Techniques in Healthcare

Conference

Title of PaperReview of Machine Learning Techniques in Healthcare

PublisherSpringer

OrganizationCentral University of Jammu

Year , VenueMarch 2019 , Delhi

Indexed INScopus

homomorphic Cryptography and it's Applications in Various Domains

Journal

Journal NameLecture notes in Networks and Systems

Title of Paperhomomorphic Cryptography and it's Applications in Various Domains

PublisherSpringer

Volume Number55

Page Number269-278

Published YearNovember 2018

ISSN/ISBN No23673370

Indexed INScopus

Encryption Algorithm using Rubik’s Cube Principle for Secure Transmission of Multimedia Files

Conference

Title of PaperEncryption Algorithm using Rubik’s Cube Principle for Secure Transmission of Multimedia Files

Proceeding Name3ICMRP2016Conferenceproceeding

PublisherResearch and Scientific Innovation Society

Year , VenueDecember 2016 , AMA, IIM-A Road, Ahmedabad

Page Number239-243

Indexed INOthers

Wearable live streaming gadget using Raspberry pi

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperWearable live streaming gadget using Raspberry pi

Volume Number7

Page Number69-75

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INUGC List

Performance Evaluation of Unicast and Multicast Routing in Wireless Ad-hoc Networks

Conference

Title of PaperPerformance Evaluation of Unicast and Multicast Routing in Wireless Ad-hoc Networks

Proceeding NameICCCCIT 2015 conference proceeding

OrganizationTECHNICAL RESEARCH ORGANISATION INDIA

Year , VenueJuly 2015 , Bhopal

Page Number1-3

ISSN/ISBN No978-93-85225-37-6

Indexed INOthers

Tracking Cancer Patients Medical History Using Wireless Emerging Technology: Near Field Communication

Journal

Journal NameInternational Journal of VLSI design & Communication Systems (VLSICS)

Title of PaperTracking Cancer Patients Medical History Using Wireless Emerging Technology: Near Field Communication

Volume Number6

Published YearFebruary 2015

ISSN/ISBN No0976 - 1527

Indexed INEBSCO

Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperPerformance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

Volume Number5

Page Number51-53

Published YearMarch 2014

ISSN/ISBN No0973-7391

Indexed INUGC List

Optimized Data Aggregation Protocol in WSN for Automation of water Sprinklers

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperOptimized Data Aggregation Protocol in WSN for Automation of water Sprinklers

Volume Number5

Page Number46-50

Published YearMarch 2014

ISSN/ISBN No0973-7391

Indexed INUGC List

A Comparative Study on MANET Routing Protocols

Journal

Journal NameInternational Journal of Computer Science and Technology

Title of PaperA Comparative Study on MANET Routing Protocols

Volume Number3

Page Number821-832

Published YearJuly 2012

ISSN/ISBN No0976-8491

Indexed INOthers

A Survey on Security Issues in MANETs

Conference

Title of PaperA Survey on Security Issues in MANETs

OrganizationAET

Year , VenueJune 2018 , Mumbai

Survivability in MANETs

Journal

Journal NameInternational Journal of Advanced Research in Computer Engineering & Technology

Title of PaperSurvivability in MANETs

PublisherIJARCET

Volume Number7

Page Number7-10

Published YearJanuary 2018

Indexed INUGC List

Survey of Techniques Used for Tolerance of Flooding Attacks in DTN

Book Chapter

Book NameInformation and Communication Technology for Intelligent Systems

PublisherSpringer, Singapore

Page Number599-607

Chapter TitleSurvey of Techniques Used for Tolerance of Flooding Attacks in DTN

Published YearJanuary 2018

ISSN/ISBN No978-981-13-1742-2

Indexed INScopus, UGC List

Security in Mobile Ad Hoc Networks

Book Chapter

Book NameProceedings of International Conference on Communication and Networks

PublisherSpringer, Singapore

Author NamePimal Khanpara, Bhushan Trivedi

Page Number501-511

Chapter TitleSecurity in Mobile Ad Hoc Networks

Published YearApril 2017

ISSN/ISBN No978-981-10-2750-5

Indexed INScopus, UGC List

Abstract

Due to the proliferation of mobile devices, Mobile Ad hoc Networks (MANETs) are increasing in popularity. However, security of such networks is an important issue as MANETs are vulnerable to various attacks occurring at different layers of TCP/IP protocol suite. This paper focuses on the Network layer vulnerabilities as this layer is responsible for one of the basic MANET functions, routing.

A REVIEW ON FUZZY LOGIC BASED ROUTING IN AD HOC NETWORKS

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology

Title of PaperA REVIEW ON FUZZY LOGIC BASED ROUTING IN AD HOC NETWORKS

PublisherIAEME

Volume Number5

Page Number75-81

Published YearMay 2014

Indexed INOthers

Routing in Ad Hoc Network Using Ant Colony Optimization

Book Chapter

Book NameCommunication and Networking

PublisherSpringer, Berlin, Heidelberg

Page Number393-404

Chapter TitleRouting in Ad Hoc Network Using Ant Colony Optimization

Published YearMarch 2011

ISSN/ISBN No978-3-642-17604-3

Indexed INScopus, UGC List

Abstract

The ad hoc networks have a dynamic topology and are infrastructure less. So it is required to implement a new network protocol for providing an efficient end to end communication based on TCP/IP structure. There is a need to re-define or modify the functions of each layer of TCP/IP model to provide end to end communication between nodes.

Information and Communication Technology for Intelligent Systems

Book

PublisherSpringer, Singapore

Published YearJanuary 2019

Abstract

During the last few decades, an increase in the pollution rate has been noticed due to extreme consumption of fossil fuels, mainly in big residential areas. All petroleum-based conventional fuels can be substituted by renewable bio-based fuels such as biodiesel, hydrogen, bioethanol. Bioethanol is generally produced from starchy materials (such as corn, wheat, cereals), lignocellulosic biomass and sucrose-containing feedstocks. Saccharification of starch is done using enzymes, followed by a fermentation process using baker’s yeast Saccharomyces cerevisiae. Experiments are carried out to see the day-wise decrease in concentration of glucose and increase in the concentration of ethanol. This may induce manual error as regular monitoring of the process with skilled supervision is required. In this paper, we propose “Auto Monitor” to introduce the digital image processing to automate monitoring of the said chemical process. This automation will help us get timely and accurate monitoring of various parameters like percentage of the chemical formation.

Research oriented foss solution for automatic oil spill detection using risat-1 sar data

Conference

Title of PaperResearch oriented foss solution for automatic oil spill detection using risat-1 sar data

PublisherIEEE

Author NamePooja Shah, Tanish Zaveri, Raj Kumar, Shubham Sharma, Darshan Patel

Organization2017 IEEE International Geoscience and Remote Sensing Symposium (IGARSS)

Year , VenueJuly 2017 , Fort Worth, TX, USA

Page Number3121-3124

ISSN/ISBN No978-1-5090-4951-6

Abstract

Oil spill is a growing threat to marine eco-system, and it continues to grow with the growing marine traffic. Intentional or accidental oil discharges in the ocean are not limited to endangering marine eco-system but also coastal zones where the accumulated oil spill reaches as remains in form of tar. Automation of oil spill detection is challenging from SAR data. It is also surveyed that free and open source software (FOSS) solution for oceanographic applications is rare but essential for the scientists who are working in this area. Proposed FOSS framework also provides flexibility to apply standard data processing algorithms for the SAR data processing. In this paper, proposed FOSS framework to process C band RISAT-1 SAR data is described. This paper also provides the comparative study on shortcomings of the widely accepted tools for oil spill detection. The experimental results of super-pixel based segmentation technique for dark spot detection are described using proposed FOSS framework.

Oil spill detection from SAR image data for remote monitoring of marine pollution using light weight imageJ implementation

Conference

Title of PaperOil spill detection from SAR image data for remote monitoring of marine pollution using light weight imageJ implementation

PublisherIEEE

Author NameKruti Vyas, Pooja Shah, Usha Patel, Tanish Zaveri

Page Number1-6

Published YearNovember 2015

Abstract

Biogenic and Mineral oil spill in the ocean can harm the marine ecosystem significantly. Past research suggests image processing on images generated from Synthetic Aperture Radar (SAR) data are the most suitable way of remote oil spill detection. In this paper, the framework for oil spill detection is explained in three step process for oil spill detection viz., dark spot detection, feature extraction, and classification. The paper focuses on Hysteresis algorithm for segmenting the dark spots and decision tree for the classification of dark spots and look alikes. The major steps in oil spill detection have been implemented in imageJ which gives a light weight solution to existing softwares for the said application.

One dimensional ocean waves displacement prediction system expanding mathematical string equation

Conference

Title of PaperOne dimensional ocean waves displacement prediction system expanding mathematical string equation

PublisherIEEE

Author NameHiral Trivedi, Monika Shah, Pooja Shah

Organization2015 5th Nirma University International Conference on Engineering (NUiCONE)

Year , VenueNovember 2015 , Ahmedabad, India

Page Number1-5

ISSN/ISBN No978-1-4799-9991-0

Abstract

Oceanography comprises of parameters like wave-height, ocean-pressure, ocean-density, ocean-winds, ocean-depth, surface tension, sea-surface topography, etc. Predictions of upcoming changes are made using these parameters as inputs. Real-time sensors are deployed under the ocean to fetch real time measurements of parameters. Our research describes the work with respect to ocean wave-height parameter to predict a wave displacement. Waves in oceans are continuously moving and thus measuring the accurate movements of waves is complex. Waves get dispersed in the ocean, but their vibrations remain in the ocean. Numerous techniques are available for developing prediction systems, with their own strengths and weaknesses. The paper demonstrates the concepts and experimentation of prediction system developed using string equation to find wave displacement. It focuses on one dimension that is time, hence it is judged as one-dimensional wave displacement prediction system to measure the time taken by a wave to get settled on its surface.

Survey on Mobile Forensics

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperSurvey on Mobile Forensics

Published YearJanuary 2015

Abstract

With the continued growth of smart phone market, the probability of their use in criminal activities has continued to increase. Mobile phone nowadays comes with a wide variety of software application, new technologies and operating systems. Therefore it becomes complicated for a forensic investigator to examine the evidence from a mobile phone. A proper knowledge of forensic tools and their features is required to collect relevant information. This paper discusses about the mobile device characteristics, the steps for mobile forensic investigation and different tools for mobile forensics. The last section of the paper presents the experimental results of the tools Mobiledit Lite and Autopsy 3.1.2.

Automation of Marine Pollution monitoring using SAR images on Open Source Platform

Conference

Title of PaperAutomation of Marine Pollution monitoring using SAR images on Open Source Platform

Author NameKruti Vyas, Usha Patel, Pooja Shah

Organization5th International Conference on Computer Science and Information Technology (ICCIT 2015)

Published YearJanuary 2015

A comprehensive survey on oceanography parameters for developing ocean wave displacement prediction system

Conference

Title of PaperA comprehensive survey on oceanography parameters for developing ocean wave displacement prediction system

Author NameHiral Trivedi, Monika Shah, Pooja Shah

OrganizationInternational conference JEPPIAAR – ICONSTEM 2015 [THEME:- SEH 2015]

Published YearJanuary 2015

ISSN/ISBN No0974-2115

Abstract

Earth is widely covered by ocean. There are many calamities observed as a result of various unpredicted behaviourof ocean wave movements, and Landscaping under ocean along with response to weather change. These dynamic and drastic behavioursof oceans can be measured by various parameters like. The paper describes in depth learning of various concerned parameters which cover impact of parameters individually, different and co-related with each other. Disaster prediction requires analyzing the history and future of ocean parameters, which is a motivationfor forecasting parameters accurately and efficiently. The paper also discusses various approaches for forecasting future ocean parameters proposed by various researches and predicting one dimensional wave displacement.The various approaches that have been discussed in this paper are: Artificial Neural network, Data Assimilation methods, Genetic Algorithm, Statistical methods, Super ensemble methods and mathematical concepts like partial derivation and Fourier series transformations.

Oil spill detection from SAR image data for remote monitoring of marine pollution using light weight imageJ implementation

Conference

Title of PaperOil spill detection from SAR image data for remote monitoring of marine pollution using light weight imageJ implementation

Publisherieee

Author NameRajkumar Sharma Kruti Vyas,Pooja Shah, Usha Patel, Tanish Zaveri

OrganizationNUiCONE

Published YearJanuary 2015

Face Recognition techniques : A survey for forensics applications

Journal

Journal NameInternational Journal of Advanced Research in Computer Engineering & Technology (IJARCET)

Title of PaperFace Recognition techniques : A survey for forensics applications

Published YearJanuary 2015

Abstract

A wide variety of systems requires reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. Face Recognition is the most natural process for human beings and therefore it is the most natural biometric technique. It is widely used in the areas like information security, access management, law enforcement, criminal investigation etc. The goal of the paper is to have a comprehensive analysis of facial recognition in forensic investigation. It discusses the role of face recognition in investigation and law enforcement applications, with a brief background and origin of face recognition in forensic investigation. The paper also describes the applications of face recognition, a generic automated face recognition system and face recognition algorithms.

Enhancing The Capabilities Of Imagej By Incorporating Feature Extraction From SAR Images For Oil Spill Detection

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology (IJARET), Volume 6, Issue 4

Title of PaperEnhancing The Capabilities Of Imagej By Incorporating Feature Extraction From SAR Images For Oil Spill Detection

PublisherIAEME

Volume Number6

Page Number41-50

Published YearJanuary 2015

Abstract

Intentional and unintentional Oil spill in the ocean is significantly harmful to marine life, coastal area and whole environment. There are many softwares available which can detect oil spill but they are not application specific and some of them are paid. We have implemented feature extraction for oil spill detection using imageJ tool. This paper gives implementation details and results of features extraction from SAR data. The features selected for the study are most frequently used features assorted from the literature on research of oil spill detection by various scientists.

Benchmarking Niblack’s Binarization Algorithm Using OpenCV Library Integrated in C++ and FPGA Simulation

Journal

Journal NameInternational Journal of Emerging Technology and Advanced Engineering

Title of PaperBenchmarking Niblack’s Binarization Algorithm Using OpenCV Library Integrated in C++ and FPGA Simulation

PublisherInternational Journal of Emerging Technology and Advanced Engineering

Volume Number4

Page Number201-204

Published YearMarch 2014

ISSN/ISBN No2250-2459

Abstract

Today, real-time processing has become a stipulation in all practical fields especially in image processing. This paper presents an experimental comparison of implementation of Niblack’s Algorithm, a binarization algorithm for image-processing in Visual C++ using OpenCV library with its implementation on FPGA. It aims at addressing the real-time processing scenario and how to overcome the situation using the above implementations. The algorithm is developed using Very High Speed Integrated Circuit (VHSIC) Hardware Description Language (VHDL) and simulated for Field Programmable Gate Array (FPGA).

A digital image processing algorithm for automation of human karyotyping

Journal

Journal NameInternational Journal of Computer Science and Communication

Title of PaperA digital image processing algorithm for automation of human karyotyping

PublisherCS-Journals

Volume Number5

Page Number54-56

Published YearJanuary 2014

Abstract

This research work aims to propose and implement a compute efficient application for augmenting the process of paired chromosome alignment called karyotyping. The methodology is a combination of various digital image processing techniques which serves as an effective solution for analyzing and processing raw microscopic images. The different phases for analysis include image acquisition, object segmentation, feature selection and extraction, and finally classification. However, certain open issues need to be tackled such as presence of marker, twisted or overlapped chromosomes. Hence, the consistency of this system relies on image quality and resolution. Manual intervention to some extent accounts for robust identification and classification.

Performance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

Journal

Journal NameInternational Journal of Computer Science and Communication

Title of PaperPerformance Evaluation of Ad-Hoc on-Demand Distance Vector Routing Protocol and its Multi-Path Variant AOMDV

PublisherCS-Journals

Volume Number5

Page Number51-53

Published YearJanuary 2014

Automatic Karyotyping of Human Chromosomes Using Band Patterns

Journal

Journal NameInternational Journal of Scientific Research

Title of PaperAutomatic Karyotyping of Human Chromosomes Using Band Patterns

Publisherthe global journals

Volume Number2

Page Number154-156

Published YearDecember 2013

Image Creation Using Coordinate Information

Journal

Journal NameInternational Journal of Computer Science and Technology

Title of PaperImage Creation Using Coordinate Information

Publishercosmic journals

Volume Number3

Published YearDecember 2012

A Comparative Study on MANET Routing Protocols

Journal

Journal NameInternational Journal of Computer Science and Technology

Title of PaperA Comparative Study on MANET Routing Protocols

Volume Number3

Page Number831-832

Published YearSeptember 2012

Optimizing architecture of Vehicle to Infrastructure Communication

Journal

Journal Nameinternational journal of computer applications

Title of PaperOptimizing architecture of Vehicle to Infrastructure Communication

Volume Number53

Page Number29-35

Published YearSeptember 2012

Abstract

The road side infrastructure plays a vital role for any Vehicular Ad-hoc Network for implementing a rich set of applications like traffic monitoring and management, road disaster mitigation etc. This is the reason that efficient communication between the vehicles and the road side infrastructure is required. The application under consideration is providing a zero traffic lane (Z-Lane) for an ambulance. The scenarios are implemented with the help of Simulation of Urban Mobility (SUMO) which is a road traffic simulator based on Krauss Mobility Model. For the normal working of the said application, road side infrastructure broadcasts alert messages informing the vehicle drivers to vacant the lane. The problem addressed in this research work is the scenario where no infrastructure is present in the range of ambulance. In this case, the trigger from the ambulance must reach the nearest infrastructure as early as possible. For this purpose vehicle to vehicle communication is used. After analyzing various routing algorithms Ad-hoc On Demand Distance Vector (AODV) routing algorithm is chosen for the said communication. The AODV protocol has significant amount of end to end delay. The research work aims to modify AODV to reduce the Route REQuest (RREQ) packet generation. This is done using the geographic position of the neighboring node. The simulation results of the implementation of modified AODV shows that the number of RREQ packets reduces drastically and in turn end-to-end delay also reduces. The network traffic simulation is done with the help of Network Simulator-2.

Handling Fuzzy SQL on Crisp databases using Lex-YACC

Journal

Journal Nameinternational journal of computer applications

Title of PaperHandling Fuzzy SQL on Crisp databases using Lex-YACC

Volume Number4

Page Number5-8

Published YearJanuary 2010

Abstract

Conventional querying language presumes precision and certainty in user queries. But in factual situations the queries may be imprecise and may be desired to result in uncertain outcome. Introducing fuzziness in querying permits the realistic querying on the crisp data. In this paper, we propose the architecture for fuzzy querying along with an experimental implementation of the same. The implementation is using LEX and YACC that facilitate the lexical analysis of fuzzy terms and parsing the fuzzy query respectively. Fuzzy query is interpreted by the parser and the consequent semantic actions are carried out on MySQL database.

Study of Different Document Representation Models for Finding Phrase Based Similarity.

Journal

Journal Namesmart innovation, systems and technologies - Springer

Title of PaperStudy of Different Document Representation Models for Finding Phrase Based Similarity.

PublisherSpringer

Volume Number1

Page Number455-464

Published YearDecember 2018

ISSN/ISBN No21903018

Indexed INScopus, UGC List

Study of Various Methods Used in Reverse Engineering

Journal

Journal NameInternational Journal of Research in Electronics AND Computer Engineering

Title of PaperStudy of Various Methods Used in Reverse Engineering

PublisherI2OR Publication Services LLP

Volume Number6 APR.-JUNE 2018

Page Number1457-1459

Published YearApril 2018

ISSN/ISBN No2393-9028

Indexed INUGC List, Others

A NAIVE METHOD FOR ONTOLOGY CONSTRUCTION

Conference

Title of PaperA NAIVE METHOD FOR ONTOLOGY CONSTRUCTION

Proceeding NameNational Conference on Soft Computing and its application

OrganizationCharotar University of Science & Technology (CHARUSAT),

Page Number269-278

Published YearFebruary 2016

ISSN/ISBN No2319-1015

A Geo-Location based Mobile Service that Dynamically Locates and Notifies the nearest Blood Donors for Blood Donation during Medical Emergencies

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperA Geo-Location based Mobile Service that Dynamically Locates and Notifies the nearest Blood Donors for Blood Donation during Medical Emergencies

Volume NumberVolume 88 – No.3

Page Number34-39

Published YearFebruary 2014

ISSN/ISBN No0975 – 8887

Indexed INEBSCO, Others

A Comparative Study of Machine Learning Techniques for Emotion Recognition

Conference

Title of PaperA Comparative Study of Machine Learning Techniques for Emotion Recognition

Proceeding NameEmerging Research in Computing, Information, Communication and Applications

PublisherSpringer

OrganizationNitte Meenakshi Institute of Technology, Bangalore

Published YearJuly 2018

ISSN/ISBN No978-981-13-6001-5

Indexed INScopus

Efficient Training of Self Organizing Map Network for Pattern Recognition

Journal

Journal NameInternational Journal of Computer Application

Title of PaperEfficient Training of Self Organizing Map Network for Pattern Recognition

PublisherIOSR-JEC

Page Number25-27

Published YearJanuary 2014

ISSN/ISBN No0975 – 8887

Classifying the population as BPL or non-BPL using Multilayer Neural Network

Journal

Journal NameInternational Journal of Scientific and Research Publications

Title of PaperClassifying the population as BPL or non-BPL using Multilayer Neural Network

PublisherInternational Journal of Scientific and Research Publications

Volume Number2

Page Number3

Published YearDecember 2012

ISSN/ISBN No2250-3153

Software Defined Network-Based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Conference

Title of PaperSoftware Defined Network-Based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Proceeding NameInternational Conference on Futuristic Trends in Network and Communication Technologies

PublisherSpringer, Singapore

Page Number325-337

Published YearFebruary 2018

Indexed INScopus

Personalized Resource Recommendations using Learning from Positive and Unlabeled Examples

Journal

Journal NameNirma University Journal of Engineering and Technology

Title of PaperPersonalized Resource Recommendations using Learning from Positive and Unlabeled Examples

PublisherNirma University

Volume Number5

Page Number12-20

Published YearAugust 2016

ISSN/ISBN No2231-2870

Indexed INUGC List

Predicting stock market index using fusion of machine learning techniques

Journal

Journal NameExpert Systems with Applications

Title of PaperPredicting stock market index using fusion of machine learning techniques

PublisherElsevier

Volume Number42

Page Number2162-2172

Published YearMarch 2015

ISSN/ISBN No0957-4174

Indexed INScopus, UGC List

Predicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques

Journal

Journal NameExpert Systems with Applications

Title of PaperPredicting stock and stock price index movement using trend deterministic data preparation and machine learning techniques

PublisherElsevier

Volume Number42

Page Number259-268

Published YearJanuary 2015

ISSN/ISBN No0957-4174

Indexed INScopus, UGC List

Opinion spam detection using feature selection

Conference

Title of PaperOpinion spam detection using feature selection

Proceeding Name2014 International Conference on Computational Intelligence and Communication Networks (CICN)

PublisherIEEE

Page Number560-564

Published YearNovember 2014

Survey of Compressed Domain Video Summarization Techniques

Journal

Journal NameACM Computing Surveys

Title of PaperSurvey of Compressed Domain Video Summarization Techniques

PublisherACM

Published YearAugust 2019

Indexed INScopus

Tree-based Ant Colony Optimization Algorithm for Effective Multicast Routing in Mobile Adhoc Network

Journal

Journal NameRecent Patents on Computer Science

Title of PaperTree-based Ant Colony Optimization Algorithm for Effective Multicast Routing in Mobile Adhoc Network

Volume Number12

Page Number1-8

Published YearJanuary 2019

Indexed INScopus, UGC List

Abstract

Multimedia transmission over wireless communication is gaining momentum with rapid use of mobile hand-held devices. Providing a QoS based routing solution is a major challenge, due to the transient and inaccurate state of Mobile AdHoc Networks. Discovering optimal multicast routes is an NP-Problem and hence, QoS based routing is typically an optimization problem. Swarm Intelligence is a heuristic-based approach to find solutions to various complex problems using the principle of collective behavior of natural agents. Objective: We proposed an ACO based approach for optimization of QoS based multicast routing algorithm for multimedia streaming applications is proposed. Proposed approach performed well in comparison to other state-of-the-art approaches with respect to path maintenance, packet delivery ratio, and end-to-end delay. Method: The multicast routing model is simulated as a tree structure, where the nodes represent stations and the edges represent the link between the stations. Results: Results show that proposed approach is much faster in convergence speed than the conventional AntNet. With the increasing size of the MANET environment, the convergence time of proposed approach is much better than AntNet. This is mainly due to the trace maintenance, tree based approach for path selection and implementation of local update and global update of the pheromone values.

Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection

Book Chapter

Book NameAlgorithms and Architectures for Parallel Processing

PublisherSpringer

Author NameSwati Jain, Priyanka Sharma, Jaina Bhoiwala, Sarthak Gupta, Pramit Dutta, KK Gotewal, Naveen Rastogi, and Daniel Raju

Chapter TitleDeep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection

Published YearDecember 2018

ISSN/ISBN No978-3-030-05062-7

Indexed INScopus, UGC List

Abstract

Computerized human-machine interfaces are used to control the manipulators and robots for inspection and maintenance activities in Tokamak. The activities embrace routine and critical activities such as tile inspection, dust cleaning, equipment handling and replacement tasks. Camera(s) is deployed on the robotic arm which moves inside the chamber to accomplish the inspection task. For navigating the robotic arm to the desired position, an inverse kinematic solution is required. Such closed-form inverse kinematic solutions become complex in the case of dexterous hyper-redundant robotic arms that have high degrees of freedom and can be used for inspections in narrow gaps. To develop real-time inverse kinematic solver for robots, a technique called Reinforcement Learning is used. There are various strategies to solve Reinforcement problem in polynomial time, one of them is Q-Learning. It can handle problems with stochastic transitions and rewards, without requiring adaption or probabilities of actions to be taken at a certain point. It is observed that Deep Q-Network successfully learned optimal policies from high dimension sensory inputs using Reinforcement Learning.

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for Mobile Data Loading in Heterogeneous Networks (SCI, Impact Factor: 1.7)

Journal

Journal NameInternational Journal of Communication Systems

Title of Paper ADYTIA: Adaptive and Dynamic TCP Interface Architecture for Mobile Data Loading in Heterogeneous Networks (SCI, Impact Factor: 1.7)

PublisherInternational Journal of Communication Systems, Wiley Publication

Volume Number32

Published YearNovember 2018

Indexed INScopus, UGC List

Abstract

Due to the widespread popularity and usage of Internet of things (IoT)‐enabled devices, there is an exponential increase in the data traffic generated from these IoT devices. Most of these devices communicate with each other using heterogeneous links having constraints such as latency, throughput, and interference from concurrent transmissions. This results in an extra burden on the underlying communication infrastructure to manage the traffic within these constraints between source and destination. However, most of the existing applications use different Transmission Control Protocol (TCP) variants for traffic management between these devices and are dependent on the stage of the sender, irrespective of the application types and link characteristics. Each operating system (OS) has different TCP variant for all applications, irrespective of path characteristics. Hence, a single TCP variant cannot select the best suitable link, which results in degradation in throughput compared to the existing default. Moreover, it cannot use the full capacity of the available link for different applications and network links, especially in heterogeneous network such as IoT. To cope up with these challenges, in this paper, we propose an Adaptive and Dynamic TCP Interface Architecture (ADYTIA). ADYTIA allows the usage of different TCP variants based on application and link characteristics, irrespective of the physical links of the entire path. It allows the usage of different TCP variants based on their design principle across heterogeneous technologies, platforms, and applications. ADYTIA is implemented on NS‐2 and Linux kernel for real testbed experiments. Its ability to select the best suitable TCP variant results in 20% to 80% improvement in throughput compared with the existing default and single TCP variant on Linux and Windows.

A Proposed Method for Disruption Classification in Tokamak using Convolutional Neural Network

Book Chapter

Book NameTowards Extensible and Adaptable Methods in Computing

PublisherSpringer

Author NamePriyanka Sharma, Swati Jain, Vaibhav Jain, Sutapa Ranjan, R. Manchanda, Daniel Raju, J. GhoshR, L. Tanna

Page Number179-193

Chapter TitleA Proposed Method for Disruption Classification in Tokamak using Convolutional Neural Network

Published YearNovember 2018

ISSN/ISBN NoISBN 978-981-13-2347-8 ISBN 978-981-13-2348-5

Abstract

Thermonuclear fusion is one of the alternative sources of energy. Fusion reactors use a device called tokamak. Classification of favorable and non-favorable discharges in a tokamak is very important for plasma operation point of view. Non-favorable discharges are mainly disruptive in nature which causes certain losses of confinement that take place abruptly and affect the integrity of tokamak. During disruptions, the plasma energy gets transferred to the surrounding structures of vacuum vessel which causes to massive heat and serious damage. The objective of the proposed work is to classify such plasma discharges in tokamak among the other favorable discharges and make some suitable classifiers. The convolutional neural network can be implemented as one of the most viable and responsive tools to classify the disruption. In this paper, along with review on the various existing approaches, a proposed CNN-based disruption classification method specifically for Aditya tokamak is presented.

Performance Evaluation of a Pseudo-Random Number Generator against Various Attacks

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer

Author NameTrishla Shah, Srinivas Sampalli, Priyanka Sharma, Darshana Upadhyay

Chapter TitlePerformance Evaluation of a Pseudo-Random Number Generator against Various Attacks

Published YearOctober 2018

Indexed INScopus, UGC List

Abstract

Every user agrees upon a key-exchange protocol before initiating a communication over the Internet. These keys at the root level are a combination of highly unpredictable sequences of random numbers. It is crucial that the numbers generated are strong and secured. Ciphers are developed to generate these strong sets of keys. We conducted a thorough research on the existing hardware and software ciphers. Flaws were identified in the design complexity, platform dependency, application dimensions, and resource consumption. This led to the development of a generic n-bit LFSR based Cryptographically Secured Pseudo Random Number Generator (hardware-software co-simulation). As the generator forms the foundation for the security of the entire network, it has to be resistant to most attacks. The current ciphers which are used in real time applications like communication devices, online shopping and payments, group chats on social media, etc. are prone to attacks. This paper focuses on identifying those attacks and conducting the same on our cipher to evaluate its performance. To the best of our knowledge, we are the first to summarize these attacks from a wide domain of applications and prove it all experimentally in a single paper. Since a CSPRNG works at different layers of the communication cycle, attacks have been bifurcated into Cryptanalysis, LFSR, and Real-time attacks. Various test cases and results are discussed in order to ensure the effectiveness of the CSPRNG.

TCP-EXPO: Empirical Approach to Transport Layer Protocol for High-Speed Networks

Conference

Title of PaperTCP-EXPO: Empirical Approach to Transport Layer Protocol for High-Speed Networks

Proceeding NameIEEE International Conference on Communication (IEEE ICC-2018)

Publisher IEEE-Xplore as well as in SCOPUS

Author NameVanzara R K, Thakkar M, Sharma P, Bhatt H S, Tanwar S, Tyagi S, Kumar N, & Joel J P C Rodrigues,

Organization IEEE-Xplore as well as in SCOPUS

Year , VenueJanuary 2018 , Kansas City, MO, USA, 20-24th May, 2018, pp. 1-6

Page Number1-6

Acceleration of CNN-Based Facial Emotion Detection Using NVIDIA GPU

Book Chapter

Book NameIntelligent Computing and Information and Communication

Author NameBhakti Sonawane, Priyanka Sharma

Page Number257-264

Chapter TitleAcceleration of CNN-Based Facial Emotion Detection Using NVIDIA GPU

Published YearJanuary 2018

ISSN/ISBN No978-981-10-7244-4

Indexed INScopus, UGC List

Abstract

Emotions often mediate and facilitate interactions among human beings and are conveyed by speech, gesture, face, and physiological signal. Facial expression is a form of nonverbal communication. Failure of correct interpretation of emotion may cause for interpersonal and social conflict. Automatic FER is an active research area and has extensive scope in medical field, crime investigation, marketing, etc. Performance of classical machine learning techniques used for emotion detection is not well when applied directly to images, as they do not consider the structure and composition of the image. In order to address the gaps in traditional machine learning techniques, convolutional neural networks (CNNs) which are a deep Learning algorithm are used. This paper comprises of results and analysis of facial expression for seven basic emotion detection using multiscale feature extractors which are CNNs. Maximum accuracy got using one CNN as 96.5% on JAFFE database. Implementation exploited Graphics Processing Unit (GPU) computation in order to expedite the training process of CNN using GeForce 920 M. In future scope, detection of nonbasic expression can be done using CNN and GPU processing.

Deep Neural Network based classification of tumourous and non-tumorous Medical Images

Book Chapter

Book NameSmart Innovation, Systems and Technologies (SIST)

PublisherSpringer

Author NameSwati Jain, Priyanka Sharma, Vipin Makde, Jenise Bhavsar

Chapter TitleDeep Neural Network based classification of tumourous and non-tumorous Medical Images

Published YearAugust 2017

ISSN/ISBN NoDOI 978-3-319-63645-0_22

Indexed INScopus, UGC List

Abstract

Tumor identification and classification from various medical images is a very challenging task. Various image processing and pattern identification techniques can be used for tumor identification and classification process. Deep learning is evolving technique under machine learning that provides the advantage for automatically extracting the features from the images. The computer aided diagnosis system proposed in this research work can assist the radiologists in cancer tumor identification based on various facts and studies done previously. The system can expedite the process of identification even in earlier stages by adding up the facility of a second opinion which makes the process simpler and faster. In this paper, we have proposed a framework of convolution neural network (CNN), that is a technique under Deep Learning. The research work implements the framework on AlexNet and ZFNet architectures and have trained the system for tumor detection in lung nodules and well as brain. The accuracy for classification is more than 97% for both the architectures and both the datasets of lung CT and brain MRI images.

Enhancement of GSM Stream Cipher Security Using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer

Author NameDarshana Upadhyay, Priyanka Sharma, Srinivas Sampalli

Page Number175-183

Chapter TitleEnhancement of GSM Stream Cipher Security Using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers

Published YearMay 2016

ISSN/ISBN No978-3-319-30926-2, DOI 978-3-319-30927-9_18, © 2016

Indexed INScopus

Proposed system for mid-air holography projection using conversion of 2D to 3D Visualization

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology (IJARET)

Title of PaperProposed system for mid-air holography projection using conversion of 2D to 3D Visualization

Volume NumberVolume 7 (2)

Page Number159-167

Published YearMarch 2016

ISSN/ISBN NoISSN Print: 0976-6480 ISSN Online: 0976-6499

A Comparative Analysis of Different LFSR based ciphers and parallel computing platforms for development of Generic Cipher compatible on both hardware and software platforms

Conference

Title of PaperA Comparative Analysis of Different LFSR based ciphers and parallel computing platforms for development of Generic Cipher compatible on both hardware and software platforms

PublisherSpringer

Author NameTrishala Shah, Darshana Upadhyay, Priyanka Sharma

OrganizationICRWIP 2015

Published YearJanuary 2015

ISSN/ISBN NoDOI 978-81-322-2638-3_35, © 2016

Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR

Conference

Title of PaperCryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR

Author NameTrishala Shah, Darshana Upadhyay, Priyanka Sharma

Year , VenueJanuary 2015 , VDAT 2015

Indexed INScopus

Design, Implementation and Analysis of GSM stream cipher : Software simulators vs real test bed – FPGA

Conference

Title of PaperDesign, Implementation and Analysis of GSM stream cipher : Software simulators vs real test bed – FPGA

Proceeding NameIEEE 6th International Conference on Computational Intelligence and Computer Networks (CICN 2014),

Author NameDarshana Upadhyay, Ankit Shah, Priyanka Sharma

OrganizationIEEE

Year , VenueNovember 2014 , Udaipur, Rajasthan

Optimization of Real Time Scheduling using Ant Colony in Multimedia Systems

Journal

Journal NameElsevier, Procedia Engineering

Title of PaperOptimization of Real Time Scheduling using Ant Colony in Multimedia Systems

Publisher Elsevier

Published YearJanuary 2012

Procedia Engineering

Journal

Journal NameQoS Based Multimedia Routing in Adhoc Network using Ant Colony Optimization

Title of PaperProcedia Engineering

Publisher Elsevier

Published YearJanuary 2012

Parallelized ACO based routing for stagnation mitigation and avoidance of Multimedia traffic over MANETs

Journal

Journal NameInternational Journal of Applied Evolutionary Computation

Title of PaperParallelized ACO based routing for stagnation mitigation and avoidance of Multimedia traffic over MANETs

PublisherIGI- Global

Published YearJanuary 2012

ISSN/ISBN NoDOI: 10.4018/IJAEC, ISSN: 1942-3594, EISSN: 1942-3608.4/1/ 39-55

Indexed INUGC List

Abstract

Ant Colony Optimization (ACO) (Deepalakshmi & Radhakrishnan, 2009; Sharma & Kotecha, 2011; Sharma, Karkhanawala, & Kotecha, 2011) is a meta-heuristic, suitable for optimized solutions to routing problem in Mobile Adhoc Networks (MANETs). ACO based algorithms are fully distributed, self-organizing, fault tolerant, and intrinsically adapts to changing traffic patterns. However, if the best path is preferred for routing over longer period of time, the exploratory behaviour of the ants may be affected, thus leading to stagnation of the best paths. The authors have reviewed various techniques used for stagnation control and avoidance (Li, Ma, & Cao, 2005). These include, Pheromone control (Schoonderwoerd, Holland, Bruten, & Rothkrantz, 1996; Wedde & Farooq, 2006; De Rango & Socievole, 2011), Pheromone heuristics control (Sim & Sun, 2003), Privileged pheromone laying (Wedde & Farooq, 2006; Stuzle & Hoos, 2000), Multiple ant colony optimization (De Rango & Socievole, 2011; Sim & Sun, 2003), and Multiple path routing (Upadhyaya & Setiya, 2009b) techniques. They also present a comparative analysis of these schemes with respect to the parameter on which they depend for stagnation avoidance. The paper also focuses on stagnation leading to losses of data, which can lay a drastic effect on the quality of multimedia transmission. The authors propose a scheme to improve the exploratory behaviour of ants, by paralleled release of two streams of forward ants in each iteration, along the path from source to destination. It is mentioned that the technique will improve the quality of multimedia routed through MANETs, due to the multipath based enhancements.

A Survey on Various Cluster Head Election Algorithms for MANET

Conference

Title of PaperA Survey on Various Cluster Head Election Algorithms for MANET

PublisherIEEE NUiCONE 2011

Author NameSheetal Mehta, Priyanka Sharma and Ketan Kotecha

Year , VenueDecember 2011 , Ahmedabad, Gujarat

Indexed INScopus

QoS based Multimedia Routing in Adhoc Network using Ant Colony Optimization

Conference

Title of PaperQoS based Multimedia Routing in Adhoc Network using Ant Colony Optimization

Author NameSharma P, Karkhanawala Y, and Kotecha K

Organization ICMLC 2011

Year , VenueFebruary 2011 , Singapore Institute of Electronics (SIE), Singapore

Optimization in Stagnation Avoidance of ACO based routing of Multimedia Traffic over Hybrid MANETs

Journal

Journal NameInternational Journal of Computer Science and Technology

Title of PaperOptimization in Stagnation Avoidance of ACO based routing of Multimedia Traffic over Hybrid MANETs

Published YearJanuary 2011

ISSN/ISBN NoISSN:0976 - 8491 (online) ISSN:2229 - 4333 (print)/2/2/260-265 [UGC = 3295]

Indexed INUGC List

Parallelization of Clustered Ant Colonies for Effective QoS based Routing of IP based Multimedia Traffic

Conference

Title of PaperParallelization of Clustered Ant Colonies for Effective QoS based Routing of IP based Multimedia Traffic

Publisher MULTICONF -CCN 2010

Author NamePriyanka Sharma and K Kotecha

Year , VenueOctober 2010 , Orlando, USA

Bandwidth Constrained Routing of Multimedia Traffic over Hybrid MANETs using Ant Colony Optimization

Journal

Journal NameInternational Journal of Machine Learning and Computing

Title of Paper Bandwidth Constrained Routing of Multimedia Traffic over Hybrid MANETs using Ant Colony Optimization

Published YearJanuary 2010

ISSN/ISBN No ISSN: ISSN 2010 - 3700/1/3/ 242-246

Congestion Control based analysis of High Delay Tolerant network Transport Protocol

Conference

Title of PaperCongestion Control based analysis of High Delay Tolerant network Transport Protocol

Proceeding NameIEEE Explore

PublisherIEEE ISCCC 2009

Author NamePriyanka Sharma and S N Pradhan

Year , VenueJuly 2009 , Singapore

Page Number 9-11

Optimizing TCP Quality of Service parameter using linux kernel based tuning parameters for high performance networks

Conference

Title of PaperOptimizing TCP Quality of Service parameter using linux kernel based tuning parameters for high performance networks

PublisherIEEE ICCNT 2009

Author NamePriyanka Sharma, S N Pradhan and Hitesh Nimbark

Year , VenueJune 2009 , Chennai, Tamil Nadu

Priority Based Scheduling of Multimedia Traffic on Real Time Linux Operating System

Conference

Title of PaperPriority Based Scheduling of Multimedia Traffic on Real Time Linux Operating System

Publisher IEEE International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007)

Year , VenueDecember 2007 , Sivakasi, Tamilnadu

Page Number225-229

Indexed INScopus

Abstract

Multimedia traffics are conquering the computer networks. The multimedia communication system requires, the router's forwarding plane to forward the packet according to their QoS requirement. The computer network is an emerging challenge for the open source community. The paper covers mainly two basic components. The first is related to the installation and configuration aspects for implementing DiffServ Architecture using software routers (XORP). This is for priority based scheduling of multimedia traffic through a Real Time Linux OS. The second aspect is related to the development of a real time kernel module for queuing the multimedia UDP packets and background IP traffic into high and low priority based queues respectively, and releasing the former to the software based router(XORP) with higher priority. This involves interpreting the multimedia traffic based on their Type of Service(TOS) value in IPv4 setup and Traffic Class(TC) value in IPv6 network. Thus the module assists the XORP routers for the implementation of priority based scheduling.

DiffServ based Video streaming for Priority based Scheduling of Multimedia Traffic through software based IP routers

Conference

Title of PaperDiffServ based Video streaming for Priority based Scheduling of Multimedia Traffic through software based IP routers

PublisherNUCONE 2007

Author NamePriyanka Sharma, S N Pradhan

Published YearNovember 2007

MudraChain: Blockchain-Based Framework for Automated Cheque Clearance in Financial Institutions

Journal

Journal NameFuture Generation Computer Systems

Title of PaperMudraChain: Blockchain-Based Framework for Automated Cheque Clearance in Financial Institutions

PublisherElsevier BV

Published YearOctober 2019

ISSN/ISBN No0167-739X

Indexed INScopus, Web of Science

Modern optical data centers: Design challenges and Issues

Book Chapter

Book NameAlgorithms for Intelligent Systems

PublisherSpringer Berlin Heidelberg

Author NameArunendra Singh, Richa Singh, Pronaya Bhattacharya, Amod Kumar Tiwari

Chapter TitleModern optical data centers: Design challenges and Issues

Published YearAugust 2019

ISSN/ISBN No2524-7565

Indexed INScopus

BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management

Conference

Title of PaperBloHosT: Blockchain Enabled Smart Tourism and Hospitality Management

Proceeding NameInternational Conference on Computer, Information and Telecommunication Systems

PublisherIEEE

Author NameUmesh Bodkhe, Pronaya Bhattacharya, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, M.S. Obaidat

Year , VenueAugust 2019 , China

Indexed INScopus

GIS based DSS Model for Business Site Selection

Journal

Journal NameInternational Journal of Information Technology and Electrical Engineering

Title of PaperGIS based DSS Model for Business Site Selection

PublisherITEE International Journal of Information Technology and Electrical Engineering

Volume Number8

Page Number54-59

Published YearAugust 2019

ISSN/ISBN No2306-708X

Indexed INOthers

A proposed Buffer based Load balanced Optical Switch with AO- NACK scheme in modern Optical DataCentres

Book Chapter

Book NameSpringer Lecture notes in Electrical Engineering

PublisherSpringer Berlin Heidelberg

Author NamePronaya Bhattacharya, Amod Kumar Tiwari, Akhilesh Ladha, and Sudeep Tanwar

Chapter TitleA proposed Buffer based Load balanced Optical Switch with AO- NACK scheme in modern Optical DataCentres

Published YearJune 2019

ISSN/ISBN No1876-1100

Indexed INScopus

Dual-Buffer-Based Optical Datacenter Switch Design

Journal

Journal NameJournal of Optical Communications

Title of PaperDual-Buffer-Based Optical Datacenter Switch Design

PublisherDe Gryuters Gmbh

Volume NumberAhead of Print DOI: https://doi.org/10.1515/joc-2019-0023

Published YearMay 2019

ISSN/ISBN No0173-4911

Indexed INScopus, Web of Science

Abstract

The unbounded growth of Cloud-based services and Internet-of-Things (IoT) using Software Defined Networking (SDN) has resulted in bandwidth requirements that have grown enormously over the years. To meet this exponential growth that is currently outpacing Moore’s Law, we need Optical Interconnection Networks (OIN) that can satisfy the user’s requirements. In a similar direction Arrayed Waveguide Gratings (AWG)-based optical interconnects have been heavily investigated in past and many switch designs have emerged over the period of time. This paper proposes a dual-buffer-based optical switch design where the primary buffer stores the contending packets, while the secondary input buffer stores the contending packets which are blocked by AWG for one slot duration only. Moreover, if a blocked packet is generated on the same node then All-Optical Negative Acknowledgement (AO-NACK) will be used for blocked packets. This paper investigates the various issues related to storage of blocked packets, the analysis is done both at physical and network layers in terms of bit error rate (BER) and packet loss probability, respectively. It is found that with proposed switch design BER is 10 times lower than the earlier design, and the number of re-transmitted packets at the load of 0.8, reduces to 26 from 32 as in earlier switch design.

Mobile Edge Computing enabled Blockchain Framework-A survey

Book Chapter

Book NameSpringer Lecture notes in Electrical Engineering

PublisherSpringer Berlin Heidelberg

Author NamePronaya Bhattacharya, Sudeep Tanwar, Akhilesh Ladha, Rushabh Shah

Chapter TitleMobile Edge Computing enabled Blockchain Framework-A survey

Published YearMarch 2019

ISSN/ISBN No1876-1100

Indexed INScopus

Dual Buffers Optical Based Packet Switch incorporating Arrayed Waveguide Gratings

Journal

Journal NameJournal of Engineering Research

Title of PaperDual Buffers Optical Based Packet Switch incorporating Arrayed Waveguide Gratings

PublisherAcademic Publication Council

Volume Number7

Page Number1

Published YearMarch 2019

ISSN/ISBN No2307-1885

Indexed INScopus, Web of Science

Abstract

Optical packet switching is an upcoming and promising technology that can be used in optical data Centres and in next generation data transfer due to the enormous bandwidth of optical fiber. In recently proposed OPS design to resolve contention among packets fiber delay lines (FDLs) based buffering is preferred choice. In this paper, a dual buffer based optical packet switch design is proposed, where buffer sizes are chosen intelligently thus allowing storage of large number of contending packets within limited buffer storage. Hence, using a limited number of FDLs very low packet loss rate is possible.Through simulations, it has been shown that at the load of “0.9” a very low packet loss rate of the order of 10^-8 is possible.To the best of our knowledge, this is the lowest packet loss rate using FDLs till date in any switch design.The proposed switch design is also compared with recently published designs to prove its superiority over other designs. The analysis of the switch is done in terms of power budget analysis, cost analysis, and packet loss performance under different buffering conditions.

Bit Error Rate Analysis of Hybrid Buffer-Based Switch for Optical Data Centres

Journal

Journal NameJournal of Optical Communications

Title of PaperBit Error Rate Analysis of Hybrid Buffer-Based Switch for Optical Data Centres

PublisherDe Gryuters Gmbh

Volume NumberAhead of Print DOI: https://doi.org/10.1515/joc-2019-0008

Published YearFebruary 2019

ISSN/ISBN No2191-6322

Indexed INScopus, Web of Science

E-mail Spam Filtering using Genetic Algorithm based on Probabilistic Weights and Words Count

Journal

Journal NameInternational Journal of Integrated Engineering

Title of PaperE-mail Spam Filtering using Genetic Algorithm based on Probabilistic Weights and Words Count

PublisherPenerbit UTHM

Published YearJanuary 2019

ISSN/ISBN No2229-838X

Indexed INScopus, Web of Science

Optical Data Centres Router Design with Fiber Delay Lines and Negative Acknowledgement

Journal

Journal NameJournal of Engineering Research

Title of PaperOptical Data Centres Router Design with Fiber Delay Lines and Negative Acknowledgement

PublisherAcademic Publication Council

Published YearJanuary 2019

ISSN/ISBN No2307-1885

Indexed INScopus, Web of Science

A Systematic Review on Evolution of Blockchain Generations

Journal

Journal NameInternational Journal of Information Technology and Electrical Engineering

Title of PaperA Systematic Review on Evolution of Blockchain Generations

PublisherITEE

Volume Number7

Page Number1-8

Published YearDecember 2018

ISSN/ISBN No2306-708X

Indexed INUGC List

Challenges of Load Balancing Techniques in Grid Environment

Journal

Journal NameInternational Journal of Information Technology and Electrical Engineering

Title of PaperChallenges of Load Balancing Techniques in Grid Environment

PublisherITEE

Volume Number7

Page Number1-6

Published YearOctober 2018

ISSN/ISBN No2306-708X

Indexed INUGC List

A Distributed Credit Transfer Educational Framework based on Blockchain

Conference

Title of PaperA Distributed Credit Transfer Educational Framework based on Blockchain

Proceeding NameProceedings of the Second IEEE International Conference on Advances in Computing, Control and Communication Technology.

PublisherIEEE Digital Xplore

Author NameAbhishek Srivastava, Pronaya Bhattacharya, Arunendra Singh, Atul Mathur, Om Prakash, and Rajeshkumar Pradhan

OrganizationAllahabad University

Year , VenueSeptember 2018 , Allahabad University

Page Number54-59

ISSN/ISBN No978-1-5386-4146-0

Indexed INScopus

A Critical Review of Next Generation Data Centres

Journal

Journal NameInternational Journal of Information Technology and Electrical Engineering

Title of PaperA Critical Review of Next Generation Data Centres

PublisherUniversity

Volume Number7

Page Number12-17

Published YearApril 2018

ISSN/ISBN No2306-708X

Indexed INUGC List

Abstract

Demand for higher bandwidth is increasing as the day progresses. Current electronic switching used in data Centres are now facing bottleneck to match data rates. To alleviate such problem, fiber optic technology is used in backbone network, and switching is still performed using electronic circuitry after performing O/E conversion. However, till recent past, data transfer technology heavily relies on electronics. Therefore, researchers propose the used of both electrical and optical technology for high speed data transfer. Data center technology is emerging over the period of time. However, due to the commercial un-availability of tunable wavelength converters all-optical data Centres is not feasible till date. In the recent past many data Centres core switch designs are proposed, which uses both electronic packet switching (EPS) and optical circuit switching (OCS) depending on network requirements, and rate at which data arrives. This paper presents the overview of the recently proposed data Centres design along with their pros and cons. This paper reviews both well established and up-coming data Centres design which can be considered as near future designs.

Comparative Study for Proposed Algorithm for All-Optical Network with Negative Acknowledgement (AO-NACK)

Conference

Title of PaperComparative Study for Proposed Algorithm for All-Optical Network with Negative Acknowledgement (AO-NACK)

Proceeding NameProceedings of the 7th International Conference on Computer and Communication

PublisherACM Digital Library

Author NamePronaya Bhattacharya, Arunendra Singh, Akhilesh Kumar, Amod Kumar Tiwari, and Rajiv Srivastava

OrganizationACM

Year , VenueNovember 2017 , MNNIT Allahabad

Page Number47-51

ISSN/ISBN No978-1-4503-5324-3

Indexed INScopus

Abstract

This paper focuses on an efficient packet delivery mechanism for all-optical network. As optical networks use Wavelength Division Multiplexing (WDM) thus information can be transmitted in parallel. This paper focuses on achieving 100 percent throughput via using buffer and negative acknowledgement mechanisms. The proposed mechanism also reduces un-necessary traffic in the network while keeping the re-transmission of packets in check using optical buffer. For a typical four inputs and outputs switch without buffer some thousands of packets are dropped which can be bring down to some tens of packet with only a buffer size of 8 packets. Thus the re-transmitted packets also get reduced significantly.

Evolution of singular value decomposition in recommendation systems: a review

Journal

Journal NameInternational Journal of Business Intelligence and Data Mining

Title of PaperEvolution of singular value decomposition in recommendation systems: a review

PublisherInderscience Publishers

Volume NumberVol.14 No.4

Page Number20

Published YearApril 2019

Indexed INScopus

A review on matrix factorization techniques in recommender systems

Conference

Title of PaperA review on matrix factorization techniques in recommender systems

Proceeding Name2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA)

PublisherIEEE

Author NameRachana Mehta, Keyur Rana

Year , VenueApril 2017 , Mumbai, India

Page Number4

ISSN/ISBN No978-1-5090-4381-1

Indexed INScopus

An empirical analysis on SVD based recommendation techniques

Conference

Title of PaperAn empirical analysis on SVD based recommendation techniques

Proceeding NameInnovations in Power and Advanced Computing Technologies (i-PACT)

PublisherIEEE

Author NameRachana Mehta, Keyur Rana

Year , VenueApril 2017 , Vellore, India

Page Number7

ISSN/ISBN No978-1-5090-5682-8

Indexed INScopus

Student Attendance Management SystemUsing Fingerprint Scanner

Journal

Journal NameInternational Journal of Pure and Applied Mathematics

Title of PaperStudent Attendance Management SystemUsing Fingerprint Scanner

Volume Number119

Page Number2273-2277

Published YearJune 2018

Abstract

in order to identify person uniquely various things are used such as iris, lip print, fingerprint. In this paper we have developed Student Attendance Management System which is used to identify the students uniquely using their Fingerprints. For the development of this system we have used Raspberry Pi 3, Serial 16x2 Serial LCD and Fingerprint Scanner tools. By using this we have developed system which isstoring information of the student, verifying detail and generate report for the future use. During the attendance verification student keep his finger against the scanner and system will find whether the record is existing in the database or not, display proper message. We have also test system with various test case and found good results. By using this system teacher can save their time and increase accuracy in the results.

DATA EXCHANGE MODEL USING WEB SERVICE FOR HEROGENEOUS DATABASES

Journal

Journal NameINTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET)

Title of PaperDATA EXCHANGE MODEL USING WEB SERVICE FOR HEROGENEOUS DATABASES

PublisherIAEME

Volume Number6

Page Number107-111

Published YearApril 2015

ISSN/ISBN No0976 - 6499

Indexed INUGC List

Abstract

In this paper, we have purpose method to exchange the data between the various databases that are not having a same formats, due to the heterogeneous structure of the databases. Now in the information technology field there is fast development is there, due to that people are using different network, operating system and applications of heterogeneous platforms. So in order to sharing of information between the various databases we have purposed model using web service to exchange the data between the heterogeneous databases. This model is used to exchange data of various databases using some functions of databases, SOAP, XML, WSDL and UDDI.

Efficient Technique for FingerPrint Recognition

Journal

Journal NameInt. J. of Data Modeling and Knowledge Management

Title of PaperEfficient Technique for FingerPrint Recognition

PublisherMind Reader Publications

Volume Number1

Page Number45-50

Published YearDecember 2011

METHODOLOGY FOR DATA TRANSFER WITH ATTACHMENT USING WEB SERVICE

Journal

Journal NameINTERNATIONAL JOURNAL OF EMERGING TECHNOLOGIES AND APPLICATIONS IN ENGINEERING, TECHNOLOGY AND SCIENCES

Title of PaperMETHODOLOGY FOR DATA TRANSFER WITH ATTACHMENT USING WEB SERVICE

Volume Number4

Page Number409-411

Published YearJuly 2011

ISSN/ISBN No0974-3588

Abstract

Web service is supporting very simple requests with simple parameters to fully supporting modern, object-oriented languages. XML-RPC, arguably one of the earliest forms of Web services, only supported simple types -- strings, integers, Boolean etc. SOAP took this one step further with its encoding rules for object. In this paper we are going describe how binary data is transfer using web service. Binary data can be useful in many security applications to encrypt a data, multimedia application to work with image, movies, music and for some engineering application to represent data efficiently.

Brain Tumor Segmentation and Survival Prediction

Journal

Journal NameLecture Notes in Computer Science

Title of PaperBrain Tumor Segmentation and Survival Prediction

PublisherSpringer, Cham

Volume Number11992

Page Number338-348

Published YearMay 2020

ISSN/ISBN No1611-3349 / 978-3-030-46640-4

Indexed INScopus

Abstract

The paper demonstrates the use of the fully convolutional neural network for glioma segmentation on the BraTS 2019 dataset. Three-layers deep encoder-decoder architecture is used along with dense connection at the encoder part to propagate the information from the coarse layers to deep layers. This architecture is used to train three tumor sub-components separately. Sub-component training weights are initialized with whole tumor weights to get the localization of the tumor within the brain. In the end, three segmentation results were merged to get the entire tumor segmentation. Dice Similarity of training dataset with focal loss implementation for whole tumor, tumor core, and enhancing tumor is 0.92, 0.90, and 0.79, respectively. Radiomic features from the segmentation results predict survival. Along with these features, age and statistical features are used to predict the overall survival of patients using random forest regressors. The overall survival prediction method outperformed the other methods for the validation dataset on the leaderboard with 58.6% accuracy. This finding is consistent with the performance on the test set of BraTS 2019 with 57.9% accuracy.

Prediction of Overall Survival of Brain Tumor Patients

Conference

Title of PaperPrediction of Overall Survival of Brain Tumor Patients

Proceeding NameIEEE

PublisherIEEE

Author NameRupal A. Kapdi

OrganizationIEEE Region 10, Kochi

Year , VenueOctober 2019 , Kochi, India, India

Page Number31-35

Indexed INScopus

Abstract

Automated brain tumor segmentation plays an important role in the diagnosis and prognosis of the patient. In addition, features from the tumorous brain help in predicting patients’ overall survival. The main focus of this paper is to segment tumor from BRATS 2018 benchmark dataset and use age, shape and volumetric features to predict the overall survival of patients. The random forest classifier achieves overall survival accuracy of 59% on the test dataset and 67% on the dataset with resection status as gross total resection. The proposed approach uses fewer features but achieves better accuracy than state-of-the- art methods.

Brain Tumor Segmentation Using K-means–FCM Hybrid Technique

Journal

Journal NameAdvances in Intelligent Systems and Computing

Title of PaperBrain Tumor Segmentation Using K-means–FCM Hybrid Technique

PublisherSpringer

Volume Number696

Published YearMay 2018

ISSN/ISBN No2194-5357

Indexed INScopus, UGC List

Abstract

Automatic brain tumor segmentation and detection is always very challenging and difficult task with respect to accuracy which is more important as brain surgery is a critical and complicated process. The medical professional can interpret magnetic resonance images (MRI), but this task is time-consuming, error-prone and tedious. So automatic segmentation technique is needed which is the unsolved ch

Deep Learning for Automated Brain Tumor Segmentation in MRI Images

Book Chapter

Book NameSoft Computing based Medical Image Analysis

PublisherElsevier

Page Number183-201

Chapter TitleDeep Learning for Automated Brain Tumor Segmentation in MRI Images

Published YearJanuary 2018

ISSN/ISBN No978-0-12-813087-2

Indexed INScopus

Object Detection Using Deep Neural Network

Conference

Title of PaperObject Detection Using Deep Neural Network

Proceeding NameInternational Conference on Intelligent Computing and Control Systems

PublisherIEEE Explore

Author NameMalay Shah, Rupal Kapdi

OrganizationVaigai College of Engineering, Madurai, India

Year , VenueMay 2017 , Vaigai College of Engineering, Madurai, India

Page Number787-790

Indexed INScopus

Abstract

The problem discussed in this article is object detection using deep neural network especially convolution neural networks. Object detection was previously done using only conventional deep convolution neural network whereas using regional based convolution network [3] increases the accuracy and also decreases the time required to complete the program. The dataset used is PASCAL VOC 2012 which contains 20 labels. The dataset is very popular in image recognition, object detection, and other image processing problems. Supervised learning is also possible in implementing the problem using Decision trees or more likely SVM. But neural network works best in image processing because they can handle images well.

Case Study

Case Study TitleBrain Tumor Segmentation – Towards a better life

PublisherCSI Communication of India

Published YearDecember 2016

ISSN/ISBN No0970 647X

Indexed INScopus

Copy Move Forgery Detection Using SIFT and GMM

Conference

Title of PaperCopy Move Forgery Detection Using SIFT and GMM

Proceeding NameIEEE Explore

PublisherIEEE Explore

Author NameNeetu Yadav, Rupal Kapdi

OrganizationNirma University

Year , VenueNovember 2015 , Nirma University

Page Number1-4

ISSN/ISBN No978-1-4799-9990-3

Indexed INScopus

Abstract

Modifying or enhancing an image is ubiquitous but, when enhancement tends to change the interpretation of the image they are termed as an attempt of forgery on digital images. Copy move forgery (CMF) is a simple technique and has a number of well built tools in a number of image enhancement software. CMF detection techniques often tend to establish similarity between copied and pasted region on the same image as both are from same original image. Keypoint and block based techniques are used to determine the CMF. SIFT keypoints are combined with different techniques to accurately localize forgery. High imensionality of feature vector acts as a bottleneck in SIFT based analysis. We propose a method to detect CMF using SIFT descriptors which are clustered using GMM and segment the obtained suspect region speeding up the analysis.

Copy Move Forgery Detection Using SIFT Features – An Analysis

Journal

Journal NameNirma University Journal of Engineering and Technology

Title of PaperCopy Move Forgery Detection Using SIFT Features – An Analysis

PublisherNirma University

Volume Number4

Page Number11-14

Published YearJanuary 2015

ISSN/ISBN No2231-2870

Indexed INUGC List

Abstract

Emphasis on the need for authentication of image content has increased since images have been inferred to have some cognitive effects on human brain coupled along with the pervasiveness of images. General form of malicious image manipulations is Copy Move Forgery (CMF) in which a region is cloned from source location and pasted onto the same image at a target location. Techniques often used to hide or increase presence of an object in the image. This need to establish detection of image originality and authentication without using any prior details of the image has increased by many folds. In this paper, we present a list of comparisons on the detection of image forgeries mostly pertaining to CMF using SIFT method. An effort has been made to produce suffused paper by quoting most of the recent practices by providing an in-depth analysis of range of different techniques for forgery localization.

Comparative Performance Study of Various Content Based Image Retrieval Methods

Book Chapter

Book NameSmart Innovation, Systems and Technologies, VOLUME 50

PublisherSPRINGER

Author NameSuresh Chandra Satapathy , Swagatam Das

Page Number397-407

Chapter TitleComparative Performance Study of Various Content Based Image Retrieval Methods

Published YearJuly 2016

ISSN/ISBN No Print ISBN 978-3-319-30932-3 Online ISBN 978-3-319-30933-0

Indexed INScopus

Abstract

With the increase in the data storage and data acquisition technologies there is an increase in huge image database. Therefore we need to develop proper and accurate systems to manage this database. Here in this paper we focus on the transformation technique to search, browse and retrieve images from large database. Here we have discussed briefly about the CBIR technique for image retrieval using

Comparative Performance Study of Various Content Based Image Retrieval Methods

Conference

Title of PaperComparative Performance Study of Various Content Based Image Retrieval Methods

Proceeding NameProceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1

PublisherSPRINGER, CHAM

Author NameSuresh Chandra Satapathy , Swagatam Das

OrganizationVENUS COLLEGE OF ENGINEERING

Year , VenueNovember 2015 , AHMEDABAD

Page Number397-407

ISSN/ISBN NoPrint ISBN 978-3-319-30932-3 Online ISBN 978-3-319-30933-0

Indexed INScopus

Abstract

With the increase in the data storage and data acquisition technologies there is an increase in huge image database. Therefore we need to develop proper and accurate systems to manage this database. Here in this paper we focus on the transformation technique to search, browse and retrieve images from large database. Here we have discussed briefly about the CBIR technique for image retrieval using

Performance Analysis of Region of Interest Based Compression Method for Medical Images

Conference

Title of PaperPerformance Analysis of Region of Interest Based Compression Method for Medical Images

Proceeding Name2014 Fourth International Conference on Advanced Computing & Communication Technologies

PublisherConference Publishing Services (CPS) and IEEE Explore

Author NameIEEE

OrganizationROHTAK, HARYANA

Year , VenueFebruary 2014 , ROHTAK

Page Number53-58

ISSN/ISBN No978-1-4799-4910-6/14

Indexed INScopus

Abstract

In medical domain the high quality image data is maintained with the help of highly efficient servers across the network. There are some areas of medicine where it is sufficient to maintain high image quality only for diagnostically important regions, for example, tumor region of the brain MRI. Thus, the regions of interest

BMMI-tree: A Peer-to-Peer m-ary tree using 1-m node splitting for an efficient multidimensional complex query search

Journal

Journal NameJournal of Parallel and Distributed Computing

Title of PaperBMMI-tree: A Peer-to-Peer m-ary tree using 1-m node splitting for an efficient multidimensional complex query search

Volume Number125,

Page Number pp. 1-17

Published YearMarch 2019

Mapreduce based multilevel association rule mining from concept hierarchical sales data

Conference

Title of PaperMapreduce based multilevel association rule mining from concept hierarchical sales data

Proceeding NameCommunications in Computer and Information Science

PublisherSpringer Verlag

Author NameTyagi V.,Grosky W.,Gupta P.K.,Oren T.,Singh M.,Sharma A.

Year , VenueJanuary , 1st International Conference on Advances in Computing and Data Sciences, ICACDS 2016; Ghaziabad; India; 11 November 2016 through 12 November 2016; Code 195799

Page Number624-636

ISSN/ISBN NoISSN: 18650929 ISBN: 978-981105426-6

Indexed INScopus

Abstract

Multilevel association rule mining is one of the important techniques of data mining to analyze the sales data. Multilevel association rules provide detailed information as compare to single level association rules. Today’s era of e-commerce and e-business, various online marketing sites and social networking sites are generating tremendous amount of data in the form of sales, tweets, text mails,

Human gesture analysis for action recognition

Conference

Title of PaperHuman gesture analysis for action recognition

Proceeding NameConference Proceeding

PublisherInstitute of Electrical and Electronics Engineers Inc.

Year , VenueJanuary , 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology, ICAECCT 2016 7 June 2017, Article number 7942571, Pages 144-149 2016 IEEE International Conference on Advances in Electronics, Communication and Computer Technology, ICAECCT 2016; JSPM's Rajarshi Shahu College of Engineering (RSCOE)Pune; India; 2 December 2016 through 3 December 2016;

Page NumberPages 144-149

ISSN/ISBN No978-150903662-2

Indexed INScopus

Abstract

In this paper, we propose an algorithm for human gesture analysis for the action recognition using Microsoft kinect sensor to build physiotherapy application. Kinect is able to generate depth image from RGB image and generate human skeleton from the depth image. In this method, therapist may record the exercise and patients are required to mimic that exercise at home. This system is able to track

Human action recognition using fusion of features for unconstrained video sequences

Journal

Journal NameComputers and Electrical Engineering

Title of PaperHuman action recognition using fusion of features for unconstrained video sequences

PublisherElsevier Ltd

Volume Number70

Page NumberPages 284-301

Published YearAugust 2018

An ontology-based approach for automatic cloud service monitoring and management

Journal

Journal NameAdvances in Intelligent Systems and Computing

Title of PaperAn ontology-based approach for automatic cloud service monitoring and management

Publisher Springer Verlag

Volume Number645

Page Number Pages 1-16

Published YearJanuary 2018

Indexed INScopus

Dynamic Localization Algorithm for Wireless Sensor Networks

Conference

Title of PaperDynamic Localization Algorithm for Wireless Sensor Networks

PublisherSpringer Verlag

Year , VenueJanuary 2018 , International Conference on Advanced Computing and Intelligent Engineering, ICACIE 2016; Bhubaneswar; India; 23 December 2016 through 25 December 2016;

Page NumberPages 495-502

Indexed INScopus

Improved pre-copy algorithm using statistical prediction and compression model for efficient live memory migration

Journal

Journal NameInternational Journal of High Performance Computing and Networking

Title of PaperImproved pre-copy algorithm using statistical prediction and compression model for efficient live memory migration

Publisher Inderscience Enterprises Ltd.

Volume Number11 (1)

Page Number pp. 55-65

Published YearJanuary 2018

Indexed INScopus

Automatic cloud service monitoring and management with prediction-based service provisioning

Journal

Journal NameInternational Journal of Cloud Computing

Title of PaperAutomatic cloud service monitoring and management with prediction-based service provisioning

PublisherInderscience Enterprises Ltd.

Volume Number7 (1)

Page Number pp. 65-82

Published YearJanuary 2018

Performance modeling and optimization of live migration of virtual machines in cloud infrastru

Book Chapter

Book NameResearch Advances in Cloud Computing

PublisherSpringer Singapore

Author NamePatel, M., Chaudhary, S., Garg, S.

Page NumberPages 327-350

Chapter TitlePerformance modeling and optimization of live migration of virtual machines in cloud infrastru

Published YearDecember 2017

ISSN/ISBN No978-981105026-8;978-981105025-1

Indexed INScopus

Abstract

The cloud infrastructure is a base layer to support various types of computational and storage requirements of the users using Internet-based service provisioning. Virtualization enables cloud computing to compute different workloads using cloud service models. The performance of each cloud model depends on how effectively workloads aremanaged to give optimal performance. The process of workload m

MapReduce Based Multilevel Consistent and Inconsistent Association Rule Detection from Big Data Using Interestingness Measures

Journal

Journal NameBig Data Research

Title of PaperMapReduce Based Multilevel Consistent and Inconsistent Association Rule Detection from Big Data Using Interestingness Measures

PublisherElsevier Inc.

Volume Number9

Page NumberPages 18-27

Published YearSeptember 2017

ISSN/ISBN No22145796

Indexed INScopus

Abstract

Multilevel association rule mining in distributed environment plays an important role in big data analysis for making marketing strategy. Multilevel association rule provides more significant information than single level rule, and also discovers the conceptual hierarchy of knowledge from the hierarchical dataset. In this era of internet, various online marketing sites and social networking sites

Preserving output-privacy in data stream classification

Journal

Journal NameProgress in Artificial Intelligence

Title of PaperPreserving output-privacy in data stream classification

PublisherSpringer Verlag

Volume Number6

Page Number87-104

Published YearJune 2017

ISSN/ISBN No21926352

Indexed INScopus

Abstract

Privacy-preservation has emerged to be a major concern in devising a data mining system. But, protecting the privacy of data mining input does not guarantee a privacy-preserved output. This paper focuses on preserving the privacy of data mining output and particularly the output of classification task. Further, instead of static datasets, we consider the classification of continuously arriving dat

A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator

Journal

Journal NameEngineering Science and Technology, an International Journal

Title of PaperA survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator

PublisherElsevier B.V.

Volume Number20

Page Number705-720

Published YearApril 2017

ISSN/ISBN No22150986

Indexed INScopus

Abstract

Implementation of a P2P (Peer-to-Peer) overlay network directly on the realistic network environments is not a feasible initiative as scalability is a major challenge for P2P. The implementation of newly created P2P networks must be analyzed, well tested and evaluated through experiments by researchers and organizations. Various simulators have been developed to analyze and simulate P2P protocols

Performance modeling of skip models for VM migration using Xen

Conference

Title of PaperPerformance modeling of skip models for VM migration using Xen

Proceeding NameIEEE International Conference on Computing, Communication and Automation, ICCCA 2016 10 January 2017, Article number 7813909, Pages 1256-1261 2016 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016; Greater Noida; India; 29 April 2016 through 30 April 2016; Category numberCFP16IWY-ART

PublisherInstitute of Electrical and Electronics Engineers Inc.

Author NameSwaroop A.,Singh M.,Astya P.N.,Sharma V.

Page Number1256-1261

Published YearJanuary 2017

ISSN/ISBN No978-150901666-2

Indexed INScopus

Abstract

Cloud computing is the Internet based computing to deliver service. The major components to establish cloud are distributed systems, service oriented computing, web2.0, virtualization and utility computing. The integration of these components are required to make available data anytime and anywhere. Migration of virtual machines is the key issue to manage heterogenous cloud for load balancing. The

Efficient vehicle detection and classification for traffic surveillance system

Conference

Title of PaperEfficient vehicle detection and classification for traffic surveillance system

PublisherSpringer Verlag

Author Name Tyagi V.,Grosky W.,Gupta P.K.,Oren T.,Singh M.,Sharma A.

OrganizationCommunications in Computer and Information Science

Year , VenueJanuary 2017 , 1st International Conference on Advances in Computing and Data Sciences, ICACDS 2016; Ghaziabad; India; 11 November 2016 through 12 November 2016; Code 195799

Page Number495-503

ISSN/ISBN NoISSN: 18650929 ISBN: 978-981105426-6

Indexed INScopus

Abstract

Video surveillance systems is a key component of any security system. Making an intelligent system that can detect and track multiple moving objects from video and also deals with dynamic backgrounds, illumination problem and environment conditions is a challenging task. The proposed system is designed for real-time vehicle detection and classification. The traffic is increasing day by day due to

Fusion of statistical and machine learning approaches for time series prediction using earth observation data

Journal

Journal NameInternational Journal of Computational Science and Engineering

Title of PaperFusion of statistical and machine learning approaches for time series prediction using earth observation data

PublisherInderscience Enterprises Ltd.

Volume Number14

Page Number255-266

Published YearJanuary 2017

ISSN/ISBN NoISSN: 17427185

Indexed INScopus

Abstract

This paper focuses on fusion of statistical and machine learning models for improving the accuracy of time series prediction. Statistical model like integration of auto regressive (AR) and moving average (MA) is capable to handle non-stationary time series but it can deal with only single time series. The machine learning approach [i.e. support vector regression (SVR)] can handle dependency among

Development and validation of OPTICS based spatio-temporal clustering technique

Journal

Journal NameInformation Sciences

Title of PaperDevelopment and validation of OPTICS based spatio-temporal clustering technique

PublisherElsevier Inc.

Volume Number369

Page Number388-401

Published YearNovember 2016

ISSN/ISBN NoISSN: 00200255

Indexed INScopus

Abstract

Spatio-temporal data mining (STDM) is a process of the extraction of implicit knowledge, spatial and temporal relationships, or other patterns not explicitly stored in spatio-temporal databases. As data are growing not only from static view point, but they also evolve spatially and temporally which is dynamic in nature that is the reason why this field is now becoming very important field of resea

Data streams and privacy: Two emerging issues in data classification

Conference

Title of PaperData streams and privacy: Two emerging issues in data classification

PublisherInstitute of Electrical and Electronics Engineers Inc.

Published YearApril 2016

ISSN/ISBN NoISBN: 978-147999991-0

Indexed INScopus

Abstract

Several real-world applications generate data streams where the opportunity to examine each instance is concise. Effective classification of such data streams is an emerging issue in data mining. However, such classification can cause severe threats to privacy. There are several applications like credit card fraud detection, disease outbreak or biological attack detection, loan approval, etc. wher

Machine Learning Based Statistical Prediction Model for Improving Performance of Live Virtual Machine Migration

Journal

Journal NameJournal of Engineering (United States)

Title of PaperMachine Learning Based Statistical Prediction Model for Improving Performance of Live Virtual Machine Migration

PublisherHindawi Limited

Volume Number2016

Published YearJanuary 2016

ISSN/ISBN NoISSN: 23144904

Indexed INScopus

Abstract

Service can be delivered anywhere and anytime in cloud computing using virtualization. The main issue to handle virtualized resources is to balance ongoing workloads. The migration of virtual machines has two major techniques: (i) reducing dirty pages using CPU scheduling and (ii) compressing memory pages. The available techniques for live migration are not able to predict dirty pages in advance.

A QoS-aware approach for runtime discovery, selection and composition of semantic web services

Journal

Journal NameInternational Journal of Web Information Systems

Title of PaperA QoS-aware approach for runtime discovery, selection and composition of semantic web services

PublisherEmerald Group Publishing Ltd.

Volume Number12

Page Number177-200

Published YearJanuary 2016

ISSN/ISBN NoISSN: 17440084

Indexed INScopus

Abstract

Purpose - Web services play vital role in the development of emerging technologies such as Cloud computing and Internet of Things. Although, there is a close relationship among the discovery, selection and composition tasks of Web services, research community has treated these challenges at individual level rather to focus on them collectively for developing efficient solution, which is the purpos

Evaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network

Journal

Journal NameInternational Journal of Communication Networks and Distributed Systems

Title of PaperEvaluating the impact of fanout and dimension on the performance of a hybrid model for multidimensional indexing in peer-to-peer m-ary tree network

PublisherInderscience Publishers

Volume Number14

Page Number185-201

Published YearJanuary 2015

ISSN/ISBN NoISSN: 17543916

Indexed INScopus

Abstract

In the structured peer-to-peer (P2P) overlay networks, multidimensional indexing (MI) methods have emerged to address principally the efficiency concerns of complex queries. As per our observations, a hybrid model that combines P2P m-ary tree overlay network with traditional MI methods is preferable as it reduces the cost of search operations from log2N to logmN. We show an illustrative hybrid mod

Top-down and bottom-up cues based moving object detection for varied background video sequences

Conference

Title of PaperTop-down and bottom-up cues based moving object detection for varied background video sequences

PublisherHindawi Publishing Corporation

OrganizationAdvances in Multimedia

Year , VenueJanuary 2014 , Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, 382481, India bDepartment of Electronics and Communication Engineering, Institute of Technology, Nirma University, Ahmedabad, 382481, India cDA-IICT, Gandhinagar, 382007, India

ISSN/ISBN NoISSN: 16875680

Indexed INScopus

Wavelet based SAR data denoising and analysis

Conference

Title of PaperWavelet based SAR data denoising and analysis

PublisherIEEE Computer Society

Year , VenueJanuary 2014 , Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 2014, Article number 6779477, Pages 1087-1092 2014 4th IEEE International Advance Computing Conference, IACC 2014; Gurgaon; India; 21 February 2014 through 22 February 2014; Category numberCFP1439F-CDR

Indexed INScopus

A peer-to-peer multiway tree network with efficient range query search using multidimensional indexing

Conference

Title of PaperA peer-to-peer multiway tree network with efficient range query search using multidimensional indexing

PublisherIEEE Computer Society

Year , VenueJanuary 2014 , 2014 4th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2014 2014, Article number 6821646, Pages 1-6 2014 4th International Conference on Digital Information and Communication Technology and Its Applications, DICTAP 2014; Bangkok; Thailand; 6 May 2014 through 8 May 2014; Category numberCFP1416S-ART; Code 105700

ISSN/ISBN NoISBN: 978-147993724-0

Indexed INScopus

Abstract

Multidimensional complex query searching is difficult in Peer-to-Peer (P2P) overlay networks due to its characteristics of high scalability, dynamicity and decentralized architecture. On the other side, the P2P applications like searching of multimedia contents in social networking or multiplayer games (that combines the search based on the multiple game scenarios) are becoming popular among the e

Parallel frequent set mining using inverted matrix approach

Conference

Title of PaperParallel frequent set mining using inverted matrix approach

Year , VenueJanuary 2012 , 3rd Nirma University International Conference on Engineering, NUiCONE 2012 2012, Article number 6493178 3rd Nirma University International Conference on Engineering, NUiCONE 2012; Ahmedabad, Gujarat; India; 6 December 2012 through 8 December 2012;

ISSN/ISBN NoISBN: 978-146731720-7

Indexed INScopus

Abstract

Mining frequent patterns in large transactional database is considered as one of the most important data mining problems. The recent explosive growth in data collection made the current rule mining algorithms restricted and insufficient to analyze excessively large transaction sets because they suffer from many problems when mining massive transaction datasets. Some of the major problems are: (1)

An empirical analysis of multiclass classification techniques in data mining

Conference

Title of PaperAn empirical analysis of multiclass classification techniques in data mining

Year , VenueJanuary 2011 , 2011 Nirma University International Conference on Engineering: Current Trends in Technology, NUiCONE 2011 - Conference Proceedings 2011, Article number 6153244 2011 Nirma University International Conference on Engineering: Current Trends in Technology, NUiCONE 2011; Ahmedabad, Gujarat; India; 8 December 2011 through 10 December 2011;

ISSN/ISBN NoISBN: 978-145772169-4

Indexed INScopus

Abstract

Data mining has been an active area of research for the past couple of decades. Classification is an important data mining technique that consists of assigning a data instance to one of the several predefined categories. Various successful methods have been suggested and tested to solve the problem in the binary classification case. However, the multiclass classification has been attempted by only

Building high dimensional indexing structure based on cluster information for better space utilization

Journal

Journal NameInformation Technology Journal

Title of PaperBuilding high dimensional indexing structure based on cluster information for better space utilization

Volume NumberVolume - 5, Issue - 6

Page Number1038-1042

Published YearNovember 2006

ISSN/ISBN NoISSN: 18125638

Indexed INScopus

Abstract

An index structure organizes a data set to support efficient queries and clustering is an unsupervised analysis technique for discovering interesting data distributions and patterns in underlying data sets. Many approaches have been proposed to index multidimensional data sets. Even though many approaches can insert data points dynamically, their performance depends on the insertion order. An atte

Variations of k-mean algorithm: A study for high-dimensional large data sets

Journal

Journal NameInformation Technology Journal

Title of PaperVariations of k-mean algorithm: A study for high-dimensional large data sets

Volume NumberVolume - 5, Issue - 6

Page Number1132-1135

Published YearJanuary 2006

ISSN/ISBN NoISSN: 18125638

Abstract

Clustering algorithms are computationally intensive, particularly when they are used to analyze large amount of high dimensional data. Exploring faster algorithms for clustering is a vital and often encountered research problem. k-mean algorithm is a well known partition based clustering technique and so many variations of this basic algorithm are proposed by various researchers. In order to explo

Voice liveness detection under feature fusion and cross-environment scenario

Journal

Journal NameMultimedia Tools and Applications

Title of PaperVoice liveness detection under feature fusion and cross-environment scenario

PublisherSpringer

Published YearJuly 2020

ISSN/ISBN No1573-7721

Indexed INScopus

Development of a Novel Database in Gujarati Language for Spoken Digits Classification

Book Chapter

Book NameCommunications in Computer and Information Science

PublisherSpringer, Singapore

Page Number208-219

Chapter TitleDevelopment of a Novel Database in Gujarati Language for Spoken Digits Classification

Published YearMay 2020

ISSN/ISBN No978-981-15-4828-4

Indexed INScopus

Investigating Feature Reduction Strategies for Replay Antispoofing in Voice Biometrics

Book Chapter

Book NameLecture Notes in Computer Science

PublisherSpringer, Cham

Page Number400-408

Chapter TitleInvestigating Feature Reduction Strategies for Replay Antispoofing in Voice Biometrics

Published YearDecember 2019

ISSN/ISBN No978-3-030-34872-4

Indexed INScopus

On the Performance of Cepstral Features for Voice-Based Gender Recognition

Book Chapter

Book NameInformation and Communication Technology for Intelligent Systems

PublisherSpringer, Singapore

Page Number327-333

Chapter TitleOn the Performance of Cepstral Features for Voice-Based Gender Recognition

Published YearJanuary 2019

ISSN/ISBN No978-981-13-1747-7

Indexed INScopus, UGC List

Detection of Mimicry Attacks on Speaker Verification System for Cartoon Characters’ Dataset

Book Chapter

Book NameInformation and Communication Technology for Intelligent Systems

PublisherSpringer, Singapore

Page Number319-326

Chapter TitleDetection of Mimicry Attacks on Speaker Verification System for Cartoon Characters’ Dataset

Published YearJanuary 2019

ISSN/ISBN No978-981-13-1747-7

Indexed INScopus, UGC List

Towards Development of Smart and Reliable Voice Based Personal Assistants

Conference

Title of PaperTowards Development of Smart and Reliable Voice Based Personal Assistants

Proceeding NameTENCON 2018-2018 IEEE Region 10 Conference

PublisherIEEE

Author NameSapan H Mankad, Viramya Shah, Sanjay Garg

Year , VenueOctober 2018 , Jeju, South Korea

Page Number2473-2478

Emotion Recognition from Sensory and Bio-Signals: A Survey

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Page Number345-355

Chapter TitleEmotion Recognition from Sensory and Bio-Signals: A Survey

Published YearOctober 2018

ISSN/ISBN No978-981-13-1610-4

Indexed INScopus, UGC List

Investigating the Effect of Varying Window Sizes in Speaker Diarization for Meetings Domain

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer, Cham

Page Number361-369

Chapter TitleInvestigating the Effect of Varying Window Sizes in Speaker Diarization for Meetings Domain

Published YearAugust 2017

ISSN/ISBN No978-3-319-63645-0

Indexed INScopus, UGC List

Emerging Role of Crowdsourcing in MOOCs: A Review

Journal

Journal NameInternational Journal of Control Theory and Applications

Title of PaperEmerging Role of Crowdsourcing in MOOCs: A Review

PublisherInternational Science Press

Volume Number9

Page Number273-280

Published YearNovember 2016

ISSN/ISBN No09745572

Indexed INScopus

Automatic Weight Calculation Based Associative Classifier

Journal

Journal NameInternational Journal of Artificial Intelligence and Knowledge Discovery

Title of PaperAutomatic Weight Calculation Based Associative Classifier

PublisherRG Education Society

Volume Number6

Page Number1-5

Published YearOctober 2016

ISSN/ISBN No2231-0312

Indexed INOthers

Predicting learning behaviour of students: Strategies for making the course journey interesting

Conference

Title of PaperPredicting learning behaviour of students: Strategies for making the course journey interesting

Proceeding NameIntelligent Systems and Control (ISCO), 2016 10th International Conference on

PublisherIEEE

Year , VenueJuly 2016 , Karpagam Engineering College, Coimbatore

Page Number1-6

A new approach to address Subset Sum problem

Conference

Title of PaperA new approach to address Subset Sum problem

Proceeding NameConfluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference -

PublisherIEEE

Year , VenueSeptember 2014 , Amity University, Noida

Page Number953-956

Indexed INOthers

Application of Software Defined Radio for Noise Reduction Using Empirical Mode Decomposition

Book Chapter

Book NameAdvances in Intelligent and Soft Computing

PublisherSpringer, Berlin, Heidelberg

Author NameDavid C. Wyld, Jan Zizka, Dhinaharan Nagamalai

Page Number113-121

Chapter TitleApplication of Software Defined Radio for Noise Reduction Using Empirical Mode Decomposition

Published YearMay 2012

ISSN/ISBN No978-3-642-30157-5

Indexed INScopus

Smart Inbox: A comparison based approach to classify the incoming mails

Journal

Journal NameInternational Journal of Artificial Intelligence and Knowledge Discovery

Title of PaperSmart Inbox: A comparison based approach to classify the incoming mails

PublisherRG Education Society

Volume Number1

Page Number29-32

Published YearJanuary 2011

ISSN/ISBN No2231-0312

Indexed INOthers

Feature Weighted Linguistics Classifier for Predicting Learning Difficulty Using Eye Tracking

Journal

Journal NameACM Transactions on Applied Perception

Title of PaperFeature Weighted Linguistics Classifier for Predicting Learning Difficulty Using Eye Tracking

PublisherACM

Volume Number17-2

Page Number25

Published YearMay 2020

ISSN/ISBN No1544-3558

Indexed INScopus, Web of Science, EBSCO

Abstract

This article presents a new approach to predict learning difficulty in applications such as e-learning using eye movement and pupil response. We have developed 12 eye response features based on psycholinguistics, contextual information processing, anticipatory behavior analysis, recurrence fixation analysis, and pupillary response. A key aspect of the proposed approach is the temporal analysis of the feature response to the same concept. Results show that variations in eye response to the same concept over time are indicative of learning difficulty. A Feature Weighted Linguistics Classifier (FWLC) was developed to predict learning difficulty in real time. The proposed approach predicts learning difficulty with an accuracy of 90%.

Predicting Learning Difficulty based on Gaze and Pupil Response

Conference

Title of PaperPredicting Learning Difficulty based on Gaze and Pupil Response

Proceeding NameUMAP 2018 - Adjunct Publication of the 26th Conference on User Modeling, Adaptation and Personalization

PublisherACM 26th Conference on User Modeling, Adaptation and Personalization

OrganizationACM-UMAP

Year , VenueJuly 2018 , Singapore

Page Number5

ISSN/ISBN No978-145035784-5

Indexed INScopus

Eye Gaze Feature Classification for Predicting Levels of Learning

Conference

Title of PaperEye Gaze Feature Classification for Predicting Levels of Learning

Proceeding NameCEUR Workshop Proceedings, 8th International Workshop on Personalization Approaches in Learning Environments, PALE 2018

PublisherInternational Conference on Artificial intelligence in Education - PALE 2018, London, UK

OrganizationAIED- PALE

Year , VenueJune 2018 , London, USA

Page Number6

ISSN/ISBN No16130073

Indexed INScopus

High Bit-Depth Medical Image Compression with HEVC

Journal

Journal NameIEEE Journal of Biomedical and Health Informatics

Title of PaperHigh Bit-Depth Medical Image Compression with HEVC

PublisherIEEE Journal of Biomedical and Health Informatics

Volume Number22

Page Number9

Published YearMarch 2018

ISSN/ISBN No2168-2208

Indexed INScopus, PubMed, Web of Science

Predicting Information Context Processing from Eye Movements

Conference

Title of PaperPredicting Information Context Processing from Eye Movements

Proceeding Nameproceeding of the 19th European Conference on Eye Movements 2017

PublisherJournal of Eye Movement Research

OrganizationECEM

Year , VenueAugust 2017 , Germany, Europe

ISSN/ISBN No1995-8692

Indexed INOthers

Real-Time Learning Level Assessment using Eye Tracking

Conference

Title of PaperReal-Time Learning Level Assessment using Eye Tracking

Proceeding NameWorkshop proceeding on Computational and Mathematical models in Vision (MODVIS, a Satellite event of VSS 2017)

PublisherWorkshop proceeding on Computational and Mathematical models in Vision (MODVIS, a Satellite event of VSS 2017)

OrganizationMODVIS, a satellite event of VSS

Year , VenueMay 2017 , Tampa, Florida, USA

Indexed INOthers

Content Dependent Intra Mode Selection for Medical Image Compression using HEVC

Conference

Title of PaperContent Dependent Intra Mode Selection for Medical Image Compression using HEVC

Proceeding NameICCE

PublisherIEEE

OrganizationCES

Year , VenueJanuary 2016 , Las Vegas, USA

Page Number4

ISSN/ISBN No978-1-4673-8364-6

Indexed INScopus

Evaluation of HEVC compression for high bit depth medical images

Conference

Title of PaperEvaluation of HEVC compression for high bit depth medical images

Proceeding Name2016 IEEE International Conference on Consumer Electronics (ICCE)

PublisherIEEE

OrganizationICCE

Year , VenueJanuary 2016 , Las Vegas, USA

Page Number4

ISSN/ISBN No978-1-4673-8364-6

Indexed INScopus

Efficient algorithm for Auto Correction using n-gram indexing

Journal

Journal NameInternational Journal of Computer & Communication Technology

Title of PaperEfficient algorithm for Auto Correction using n-gram indexing

PublisherInternational Journal of Computer & Communication Technology

Volume Number3

Page Number5

Published YearJanuary 2014

ISSN/ISBN No 0975 - 7449

Indexed INOthers

A Geo-Location based Mobile Service that Dynamically Locates and Notifies the Nearest Blood Donors for Blood Donation during Medical Emergencies

Journal

Journal NameInternational Journal of Computer Applications (IJCA)

Title of PaperA Geo-Location based Mobile Service that Dynamically Locates and Notifies the Nearest Blood Donors for Blood Donation during Medical Emergencies

PublisherInternational Journal of Computer Applications (IJCA)

Volume Number88

Page Number6

Published YearJanuary 2014

ISSN/ISBN No0975-8887

Indexed INOthers

Analysis of Network Performance by Configuring Static ARP Based Network

Conference

Title of PaperAnalysis of Network Performance by Configuring Static ARP Based Network

Proceeding NameNational Seminar on Recent Advances on Information Technology (RAIT-2009)

PublisherNational Seminar on Recent Advances on Information Technology (RAIT-2009)

OrganizationNational Seminar on Recent Advances on Information Technology (RAIT-2009)

Year , VenueJanuary 2009 , Indian School of Mines,

Indexed INOthers

Survey on Security Provisions in Named Data Networking

Journal

Journal NameInternational Journal of Applied Research on Information Technology and Computing

Title of PaperSurvey on Security Provisions in Named Data Networking

PublisherIndian Journals

Volume Number10

Page Number1-7

Published YearApril 2019

ISSN/ISBN No0975-8089

Indexed INIndian citation Index

Abstract

Named Data Networking (NDN) is considered to be a new proposed Internet architecture which is fundamentally different from host-centric communications in Internet. Here, instead of sending data packet to specific locations, NDN retrieves data by name. This methodology addresses the IP’s (Internet Protocol) communication issues as well as the digital distribution and management issues. This content has to be authenticated and signed by the originator of the content. This security model is core to NDN from functioning perspective. Internet raises multiple-challenge issues related to end to end communication. On the other hand, a NDN differs fundamentally in the host-to-host communication design of today’s internet. Hence, NDN gives rise to several research challenges. In NDN, focus is on digital signature and authentication. So, the public key using which the data is signed is to be made available to the intended stake holders. Hence, public key management issue is critical to NDN. The certificate format and related systems and protocols for supporting certificate distribution and revocation are intrinsic to the NDN architecture. In this paper, exhaustive survey of various security aspects that deal with provisioning of digital signature mechanisms for NDN are presented.

Multi-Objective Optimization Based Clustering in Wireless Sensor Networks Using Harmony Search Algorithm

Journal

Journal NameJournal on Communication Engineering and Systems

Title of PaperMulti-Objective Optimization Based Clustering in Wireless Sensor Networks Using Harmony Search Algorithm

Publisheri-Manager Publication

Volume Number7

Page Number1-12

Published YearOctober 2018

ISSN/ISBN No 2277-5242

Indexed INPubMed, Indian citation Index, EBSCO

Abstract

While planning and designing the operation of the wireless sensor network, major focus is always on balancing the energy consumption, lifetime of the node, and data aggregation. This may be achieved through suitable clustering technique, which helps in minimizing the distance between cluster head nodes and associated cluster members. Some of the algorithms like, LEACH, GCA (Genetic Clustering Algorithm), ERP (Evolutionary Routing Protocol), EAERP (Energy Aware Evolutionary Routing Protocol), HSA (Harmony Search Algorithm) work on similar lines. Due to variety of constraints inherently present in WSN, the objective function of clustering technique is of multi-objective nature. One of the objectives may be of minimization type whereas other may be of maximization type. Due to conflicting goals of objective functions it might be difficult to find a unique and optimal solution. This paper examines multiple solutions and compares performance of these candidate solutions for their applicability in the clustering process of WSN. Pareto optimality concept has been incorporated in the proposed work for multi-objective problem of clustering in WSN. Multiple objectives based approach with customized stopping criteria in the proposed work results into near optimal solutions with reduced simulation time requirements and improved network performance in terms of energy usage, data delivery from the sensor nodes to the base station.

Open Issues in Named Data Networking–A Survey

Conference

Title of PaperOpen Issues in Named Data Networking–A Survey

Proceeding NameInternational Conference on Information and Communication Technology for Intelligent Systems

PublisherSpringer

Year , VenueJuly 2018 , Ahmedabad

Indexed INScopus

Natural Language Interface for Multilingual Database

Conference

Title of PaperNatural Language Interface for Multilingual Database

Proceeding NameInternational Conference on Information and Communication Technology for Intelligent Systems

PublisherSpringer

Year , VenueJuly 2017 , Ahmedabad

Indexed INScopus

Optimization of clustering process in WSN with meta-heuristic techniques-A survey

Conference

Title of PaperOptimization of clustering process in WSN with meta-heuristic techniques-A survey

Proceeding NameRecent Advances in Information Technology (RAIT)

PublisherIEEE

Published YearJuly 2016

Indexed INScopus

Optimization of clustering process for WSN with hybrid harmony search and K-means algorithm

Conference

Title of PaperOptimization of clustering process for WSN with hybrid harmony search and K-means algorithm

Proceeding NameRecent Trends in Information Technology (ICRTIT)

PublisherIEEE

Published YearApril 2016

Indexed INScopus

Parallel generation of RSA keys—A review

Conference

Title of PaperParallel generation of RSA keys—A review

Proceeding NameCloud Computing, Data Science & Engineering-Confluence, 2017

PublisherIEEE

Year , VenueMarch 2016 , Delhi

Indexed INScopus

Analyzing The Performance of Bandwidth Starvation Attack in Lan

Journal

Journal NameInternational Journal of Advanced Research in Engineering & Technology (IJARET)

Title of PaperAnalyzing The Performance of Bandwidth Starvation Attack in Lan

Page Number145-153

Published YearFebruary 2014

Performance Evaluation Of Byzantine Flood Rushing Attack In Ad Hoc Network

Journal

Journal NameInternational Journal of Electronics and Communication Engineering & Technology (IJECET)

Title of PaperPerformance Evaluation Of Byzantine Flood Rushing Attack In Ad Hoc Network

Published YearFebruary 2014

ISSN/ISBN No0976-6464

Routing in Ad Hoc Network Using Ant Colony Optimization

Book Chapter

Book NameInternational Conference on Future Generation Communication and Networking FGCN 2010

PublisherCommunications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg

Page Number393-404

Chapter TitleRouting in Ad Hoc Network Using Ant Colony Optimization

Published YearDecember 2010

ISSN/ISBN No978-3-642-17604-3

Indexed INScopus

Trust Based Routing in Ad Hoc Network

Book Chapter

Book NameInternational Conference on Future Generation Communication and Networking FGCN 2010

PublisherCommunications in Computer and Information Science, vol 120. Springer, Berlin, Heidelberg

Page Number381-392

Chapter TitleTrust Based Routing in Ad Hoc Network

Published YearDecember 2010

ISSN/ISBN No978-3-642-17604-3

Indexed INScopus

Non-Repudiation in Ad Hoc Networks

Book Chapter

Book NameInternational Conference on Future Generation Communication and Networking

Publisher Communications in Computer and Information Science, Springer

Page Number405-415

Chapter TitleNon-Repudiation in Ad Hoc Networks

Published YearDecember 2010

ISSN/ISBN No978-3-642-17604-3

Indexed INScopus

Comparative Study of Distributed Intrusion Detection in ad hoc networks

Journal

Journal NameInternational Journal of Computer Applications

Title of PaperComparative Study of Distributed Intrusion Detection in ad hoc networks

PublisherInternational Journal of Computer Applications

Volume Number8

Page Number11-16

Published YearOctober 2010

ISSN/ISBN No0975 - 8887

Indexed INEBSCO

Abstract

In recent years ad hoc networks are widely used because of mobility and open architecture nature. But new technology always comes with its own set of problems. Security of ad hoc network is an area of widespread research in recent years. Some unique characteristics of ad hoc network itself are an immense dilemma in the way of security.

The Fog Computing Paradigm: A Rising Need of IoT World

Conference

Title of PaperThe Fog Computing Paradigm: A Rising Need of IoT World

Proceeding NameProceedings of the 2nd International Conference on Data Engineering and Communication Technology

PublisherSpringer

OrganizationICDECT 2017

Page Number387-393

Published YearOctober 2018

ISSN/ISBN No978-981-13-1609-8

Indexed INScopus

Traffic Signal Synchronization Using Computer Vision and Wireless Sensor Networks

Conference

Title of PaperTraffic Signal Synchronization Using Computer Vision and Wireless Sensor Networks

Proceeding NameArtificial Intelligence and Evolutionary Computations in Engineering Systems

PublisherSpringer

OrganizationICAIECES 2015

Page Number 743-751

Published YearFebruary 2016

ISSN/ISBN No978-81-322-2654-3

Indexed INScopus

Predictive maintenance and monitoring of industrial machine using machine learning

Journal

Journal NameScalable Computing

Title of PaperPredictive maintenance and monitoring of industrial machine using machine learning

PublisherWest University of Timisoara

Volume Number20(4)

Page Number663-668

Published YearDecember 2019

ISSN/ISBN No18951767

Indexed INScopus, Web of Science, EBSCO

Abstract

Machine learning is one of the break-through technologies of the modern digital world. It's applications are found in various research domain such as medicine, image processing, production and manufacturing, aviation and autonomics and many more. To efficiently run a machine, it's maintenance and its monitoring automation system play key role. The major problem we are targetting is to overcome the lack of an automation system which can give accuracy rate of the production machine at a given instance of time. Also the important energy meter parameters required to make power report in automation system for addressing the production issues, at given interval of time, were also not recorded. Thus in this paper, we describe how machine learning techniques is used for prediction of accuracy of running production machine. To address this issues, we have used supervised machine learning technique of Binary decision tree using CART method and for power report, while the data is fetched using RS232 to RS485 convertor via Modbus communication protocol. Using CART we have predicted the machine accuracy at a given time with specific energy meter readings as its input features. This paper discusses the problem definition identified, data analysis of energy meter data and it's fetching and at the end ML techniques applied to predict accuracy of running production machine. In the end we prepare various power reports of the different machines from the fetched parameters as well as produce a graphical warning of deteriorate performance of the machine at a given instance of the time. © 2019 SCPE.

IoT-based home automation with smart fan and AC using NodeMCU

Book Chapter

Book NameLecture Notes in Electrical Engineering

PublisherSpringer

Page Number197-207

Chapter Title IoT-based home automation with smart fan and AC using NodeMCU

Published YearNovember 2019

ISSN/ISBN NoISSN: 18761100 ISBN: 978-303029406-9

Indexed INScopus, PubMed, EBSCO

Clustering Algorithm for Community Detection in Complex Network: a Comprehensive Review

Journal

Journal NameRecent Patents on Computer Science

Title of PaperClustering Algorithm for Community Detection in Complex Network: a Comprehensive Review

PublisherBentham Science

Volume Number19

Published YearJune 2019

ISSN/ISBN NoISSN (Print): 2666-2558 ISSN (Online): 2666-2566

Indexed INScopus, EBSCO, Others

CSG cluster: A collaborative similarity based graph clustering for community detection in complex networks

Journal

Journal NameInternational Journal of Engineering and Advanced Technology

Title of PaperCSG cluster: A collaborative similarity based graph clustering for community detection in complex networks

PublisherBlue Eyes Intelligence Engineering and Sciences Publication

Volume Number8(5)

Page Number1682-1687

Published YearJune 2019

ISSN/ISBN No22498958

Indexed INScopus, Indian citation Index

Abstract

Many real-world social networks exist in the form of the complex network, which includes very large scale structured or unstructured data. The large scale networks like brain graph, protein structure, food web, transportation system, WorldWide Web, online social network are sparsely connected globally and densely connected locally. For detecting densely connected clusters from complex networks, graph clustering methods are useful. Graph clustering performs through partition a graph based on edge cut, vertex cut, edge betweeness, vertex similarities, topological structure of graph. Most of the graph clustering methods predominantly emphasis on topological structure of graph and not bearing in mind the vertex properties/attributes or similarity based on indirectly connected vertices. In this paper, we propose a CSGCluster, a novel collaborative similarity based graph clustering methodfor community detection ina complex network. In this, we introduce concepts, Approachable Unitto find similarities for directly connected vertices and introduced shortest path strategy for indirectly connected vertices and based on that a graph clustering method, CSG-Cluster is presented. For this, a new collaborative similarity approach is adopted to compute vertex similarities. In the CSG-Cluster method, weform a group of vertices based on distance measures based on calculated similarity with the help of K-Medoids framework. Performs experiment on two real datasets with other relevant methods in whichresults shows the effectiveness of CSG-Cluster. This idea is suitable for graph database to apply collaborative similarity during query processing.

Homomorphic Cryptography and Its Applications in Various Domains

Journal

Journal NameLecture Notes in Networks and Systems

Title of PaperHomomorphic Cryptography and Its Applications in Various Domains

PublisherSpringer Nature Singapore Pte Ltd.

Volume Number55

Page Number269-278

Published YearNovember 2018

ISSN/ISBN No2367-3370

Indexed INScopus

Abstract

Homomorphic encryption (HE) is an encryption technique where operations are performed on ciphertext. This encryption method can be used in varieties of applications by using public key algorithms. For transferring data from one place to another, there are various encryption algorithms for storage of data and securing the operations, but they do not preserve privacy. HE is useful in various applications in which HE performs the different operations on encrypted data and provides results after calculations performed directly on the plaintext. Nowadays, security of information and calculations to deal with the data of big business has expanded massively. In any case, a basic issue emerges when there is a necessity of registering on such encrypted information where protection is built up. This paper represents homomorphic cryptosystems for preserving security, properties, and categories of homomorphic encryption. In addition to this, privacy-preserving applications of homomorphic cryptosystems in the field of cloud computing, private information retrieval, and data aggregation in wireless sensor network are also presented. © 2019, Springer Nature Singapore Pte Ltd.

SUTRON: IoT-based Industrial/Home Security and Automation System to Compete the Smarter World

Journal

Journal NameInternational Journal of Applied Research on Information Technology and Computing

Title of PaperSUTRON: IoT-based Industrial/Home Security and Automation System to Compete the Smarter World

PublisherIndian Journals

Volume Number8

Page Number193-198

Published YearAugust 2017

ISSN/ISBN NoPrint ISSN : 0975-8070. Online ISSN : 0975-8089

Indexed INIndian citation Index, EBSCO, UGC List

Abstract

Print ISSN : 0975-8070. Online ISSN : 0975-8089.

Web Crawler: Review of Different Types of Web Crawler, Its Issues, Applications and Research Opportunities

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of PaperWeb Crawler: Review of Different Types of Web Crawler, Its Issues, Applications and Research Opportunities

PublisherInternational Journal of Advanced Research in Computer Science

Volume Number8 , issue-3

Page Number1199-1202

Published YearMarch 2017

ISSN/ISBN No0976-5697

Indexed INEBSCO, Others

Abstract

Today's search engines are equipped with dedicated agents known as “web crawlers” keen to crawling large web contents online which are analyzed and indexed and make the content available to users. Crawlers act together with thousands of web servers over periods expanding from weeks to several years. These crawlers visits several thousands of pages every second, includes a high-performance fault manager, are platform independent or dependent and are able to get used to a wide range of configurations without including additional hardware. This paper is focused on prerequisites of crawler, process of crawling and different types of crawlers. This paper give review about some potential issues related to crawler, applications and research area of web crawler.

A STUDY ON GRAPH STORAGE DATABASE OF NOSQL

Journal

Journal NameInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Title of PaperA STUDY ON GRAPH STORAGE DATABASE OF NOSQL

PublisherInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Volume Number5

Page Number33-39

Published YearFebruary 2016

ISSN/ISBN No2019-1015

Indexed INOthers

Abstract

Big Data is used to store huge volume of both structured and unstructured data which is so large and is hard to process using current / traditional database tools and software technologies. The goal of Big Data Storage Management is to ensure a high level of data quality and availability for business intellect and big data analytics applications. Graph database which is not most popular NoSQL database compare to relational database yet but it is a most powerful NoSQL database which can handle large volume of data in very efficient way. It is very difficult to manage large volume of data using traditional technology. Data retrieval time may be more as per database size gets increase. As solution of that NoSQL databases are available. This paper describe what is big data storage management, dimensions of big data, types of data, what is structured and unstructured data, what is NoSQL database, types of NoSQL database, basic structure of graph database, advantages, disadvantages and application area and comparison of various graph database

BIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND SOCIAL MEDIA DATA

Journal

Journal NameInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Title of PaperBIG DATA ANALYTICS: CHALLENGES AND APPLICATIONS FOR TEXT, AUDIO, VIDEO, AND SOCIAL MEDIA DATA

PublisherInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Volume Number5

Page Number41-51

Published YearFebruary 2016

ISSN/ISBN No2019-1015

Indexed INEBSCO, Others

Abstract

All types of machine automated systems are generating large amount of data in different forms like statistical, text, audio, video, sensor, and bio-metric data that emerges the term Big Data. In this paper we are discussing issues, challenges, and application of these types of Big Data with the consideration of big data dimensions. Here we are discussing social media data analytics, content based analytics, text data analytics, audio, and video data analytics their issues and expected application areas. It will motivate researchers to address these issues of storage, management, and retrieval of data known as Big Data. As well as the usages of Big Data analytics in India is also highlighted.

SURVEY ON MONGODB: AN OPEN-SOURCE DOCUMENT DATABASE

Journal

Journal NameInternational Journal of Advanced Research in Engineering and Technology

Title of PaperSURVEY ON MONGODB: AN OPEN-SOURCE DOCUMENT DATABASE

PublisherIAEME Publication

Volume Number6

Page Number1-11

Published YearDecember 2015

ISSN/ISBN NoPrint: 0976-6480 and Inline: 0976-6499

Indexed INOthers

Abstract

MongoDB is open source cross platform database. It is classified as NoSQL (Not Only SQL). It is written in C++ and it follows document oriented data model. It is database model which provides dynamic schema. It uses features like Map/Reduce, Auto-sharding and MongoDump etc. Using these features MongoDB provides high performance, where Map/Reduce is efficient data arrangement, Auto-sharding is storing data on across the different machines, Backup facilities and many more. It has collections as table and each collection can store different kinds of data. It stores data in JSON like structure. Unlike the RDBMS databases it can store unstructured data as well. It can process and handle large amount of data more efficiently than RDBMS. It is ACID system like RDBMS databases. MongoDB mainly used in such application which produces and uses vast amount of data. Like blogs or sites which produces or stores unstructured data. It can be used to in applications which stores structured and semi-structured data as well

Clustering Methods Analysis on Low and High Dimensional Data

Journal

Journal NameInternational Journal of Computer Sciences and Engineering

Title of PaperClustering Methods Analysis on Low and High Dimensional Data

Volume Number7

Page Number658-661

Published YearApril 2019

ISSN/ISBN No2347-2693

Indexed INIndian citation Index

Correlation Based Feature Subset Selection with Clustering for High Dimensional Data

Journal

Journal NameJournal of Electrical System and Information Technology

Title of PaperCorrelation Based Feature Subset Selection with Clustering for High Dimensional Data

PublisherElsevier

Volume Number5

Page Number542-549

Published YearDecember 2018

ISSN/ISBN No2314-7172

Indexed INOthers

Clustering Based Feature Subset Selection Framework for Microarray Data

Journal

Journal NameInternational Journal of Performability Engineering

Title of PaperClustering Based Feature Subset Selection Framework for Microarray Data

PublisherTotem

Volume Number13

Page Number383-389

Published YearJuly 2017

ISSN/ISBN No09731318

Indexed INScopus

Efficient Feature Subset Selection using Clustering and Correlation Measure

Journal

Journal NameInternational Journal of Control Theory and Applications

Title of PaperEfficient Feature Subset Selection using Clustering and Correlation Measure

PublisherSerials Publication

Volume Number10

Page Number153-159

Published YearJanuary 2017

ISSN/ISBN No09745572

Indexed INScopus, EBSCO

Performance Evaluation of Feature Selection Measures

Journal

Journal NameInternational Journal of Knowledge Based Computer Systems

Title of PaperPerformance Evaluation of Feature Selection Measures

PublisherPublishing India Group

Volume Number4

Page Number29-31

Published YearDecember 2016

ISSN/ISBN No2321-5623

Indexed INEBSCO

Efficient Feature Subset Selection Algorithm for High Dimensional Data

Journal

Journal NameInternational Journal of Electrical and Computer Engineering

Title of PaperEfficient Feature Subset Selection Algorithm for High Dimensional Data

PublisherIAES Indonesia

Volume Number6

Page Number1880-1888

Published YearAugust 2016

ISSN/ISBN No2088-8708

Indexed INScopus, EBSCO

Feature Selection Framework Based on Filter Measures for High Dimensional Data

Journal

Journal NameInternational Journal of Research in Engineering and Technology

Title of PaperFeature Selection Framework Based on Filter Measures for High Dimensional Data

PublishereSAT

Volume Number5

Page Number109-113

Published YearMay 2016

ISSN/ISBN No2321-7308

Indexed INOthers

Efficiency and Effectiveness of Clustering Algorithms for High Dimensional Data

Journal

Journal NameInternational Journal of Computer Application

Title of PaperEfficiency and Effectiveness of Clustering Algorithms for High Dimensional Data

PublisherFoundation of Computer Science USA

Volume Number125

Page Number35-40

Published YearSeptember 2015

ISSN/ISBN No0975 - 8887

Indexed INEBSCO

Metric based Performance Analysis of Clustering Algorithms for High Dimensional Data

Conference

Title of PaperMetric based Performance Analysis of Clustering Algorithms for High Dimensional Data

Proceeding NameFifth International Conference on Communication Systems and Network Technologies

PublisherIEEE

Author NameSmita Chormunge

OrganizationMachine Intelligence Research Labs Gwalior

Page Number1060-1064

Published YearApril 2015

ISSN/ISBN No9781479917969

Indexed INScopus

Evaluation of Clustering Algorithms for High Dimensional Data based on Distance Functions

Conference

Title of PaperEvaluation of Clustering Algorithms for High Dimensional Data based on Distance Functions

Proceeding NameInternational conference on Information and Communication Technology for competitive Strategies

PublisherACM

Author NameSmita Chormunge, Sudarson Jena

OrganizationSunrise Group of Institutions Udaipur

Year , VenueNovember 2014 , SGI Udaipur

Page Number1-4

ISSN/ISBN No978-1-4503-3216-3

Indexed INScopus

Performance Evaluation of Clustering Method for Low and High Dimensional Data

Journal

Journal NameInternational Journal of Advanced Research of Computer Science

Title of PaperPerformance Evaluation of Clustering Method for Low and High Dimensional Data

PublisherIJARCS

Volume Number5

Page Number91-95

Published YearApril 2014

ISSN/ISBN No0976-5697

Indexed INEBSCO

DSS for Academic Resource and Capacity Mangement

Journal

Journal NameInternational Journal of Engineering Research and Technology

Title of PaperDSS for Academic Resource and Capacity Mangement

PublisherIJERT

Volume Number2

Page Number881-886

Published YearJuly 2013

ISSN/ISBN No2278-0181

Indexed INPubMed

Unsupervised learning models of invariant features in images: Recent developments in multistage architecture approach for object detection

Journal

Journal NameInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Title of PaperUnsupervised learning models of invariant features in images: Recent developments in multistage architecture approach for object detection

PublisherInternational Journal on Soft Computing, Artificial Intelligence and Applications (IJSCAI)

Volume Number5

Page Number63-70

Published YearFebruary 2016

ISSN/ISBN No2319-1015

Indexed INEBSCO, Others

Face Detection And Tracking: A Comparative Study Of Two Algorithms

Journal

Journal NameInternational Journal Of Computer Science And Communication

Title of PaperFace Detection And Tracking: A Comparative Study Of Two Algorithms

PublisherIJCSE

Volume Number7

Page Number76-82

Published YearSeptember 2015

ISSN/ISBN No0973-7391

Indexed INUGC List

An Optimized and Efficient Multi Parametric Scheduling Approach for Multi-Core Systems

Journal

Journal NameInternational Journal of Computer Theory and Engineering

Title of PaperAn Optimized and Efficient Multi Parametric Scheduling Approach for Multi-Core Systems

PublisherInternational Journal of Computer Theory and Engineering (IJCTE)

Volume Number5

Page Number391-395

Published YearJune 2013

ISSN/ISBN No1793-820

Indexed INEBSCO, Others

Security and Privacy of Electronics Healthcare Records, In Preparation,

Book

PublisherIET Publications (450 Pages)

Published YearJune 2019

ISSN/ISBN No978-1-78561-898-7

Indexed INScopus

Abstract

Gathering international contributions, this book is the first “how-to” guide addressing privacy and security for Electronics Health Records (EHRs): Who can access EHR information? How can users and healthcare staff view EHR information and make sure it is correct? How is the information protected from loss, theft and hacking? What should users and healthcare staff do if they think the information has been compromised? The team of authors present a detailed framework for security and privacy in EHRs, as well as comparative case studies for privacy preservation, scalability, and healthcare legislation.

A proposed Buffer based Load balanced Optical Switch with AO-NACK scheme in modern Optical DataCentres

Book Chapter

Book NameSpringer International Conference on Emerging Trends in Information Technology (ICETIT-2019)

PublisherSpringer International Conference on Emerging Trends in Information Technology (ICETIT-2019)

Chapter TitleA proposed Buffer based Load balanced Optical Switch with AO-NACK scheme in modern Optical DataCentres

Published YearJune 2019

Indexed INScopus

SWIPT-NOMA Based Framework for Heterogeneous Network with Imperfect Channel State Information

Conference

Title of PaperSWIPT-NOMA Based Framework for Heterogeneous Network with Imperfect Channel State Information

Proceeding Name15th International Wireless Communications Mobile Computing Conference (IEEE IWCMC-2019), Tangier, Morocco,

Year , VenueJune 2019 , (IEEE IWCMC-2019), Tangier, Morocco,

Page Number1-6

Indexed INScopus

Standardising the use of Duplex Channels in 5G-WiFi Networking for Ambient Assisted Living

Conference

Title of PaperStandardising the use of Duplex Channels in 5G-WiFi Networking for Ambient Assisted Living

Proceeding NameIEEE Conference on Communications (IEEE ICC- 2019), Shanghai, China

PublisherIEEE

OrganizationIEEE Conference on Communications (IEEE ICC- 2019), Shanghai, China

Year , VenueMay 2019 , IEEE Conference on Communications (IEEE ICC- 2019), Shanghai, China

Page Number1-6

Indexed INScopus

Probabilistic Markov Model-based Health Routine Recommender System for Sleep Apnea Patients

Conference

Title of PaperProbabilistic Markov Model-based Health Routine Recommender System for Sleep Apnea Patients

Proceeding NameIEEE Conference on Communications (IEEE ICC-2019), Shanghai, China

OrganizationIEEE Conference on Communications (IEEE ICC-2019), Shanghai, China

Year , VenueMay 2019 , Shanghai, China

Page Number1-6

Indexed INScopus

Can Tactile Internet be a Solution for Low Latency Heart Disorientation Measure: An Analysis

Conference

Title of PaperCan Tactile Internet be a Solution for Low Latency Heart Disorientation Measure: An Analysis

Proceeding NameIEEE Conference on Communications (IEEE ICC-2019), Shanghai, China,

PublisherIEEE

Organization (IEEE ICC-2019), Shanghai, China,

Year , VenueMay 2019 , IEEE Conference on Communications (IEEE ICC-2019), Shanghai, China,

Page Number1-6

Indexed INScopus

Multimedia Big Data Computing for IoT Applications: Concepts, Paradigms and Solutions

Book

PublisherSpringer Nature Singapore Pte Ltd., Singapore

Published YearMay 2019

ISSN/ISBN No978-981-13-8759-3

Indexed INScopus

Abstract

This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (QoS) requirements, presenting case studies to demonstrate its application. Further, the book examines the layered architecture of MMBD computing and compares the life cycle of both big data and MMBD. Written by leading experts, it also includes numerous solved examples, technical descriptions, scenarios, procedures, and algorithms.

Securing Electronics Healthcare Records in Healthcare 4.0: A Biometric-based Approach

Journal

Journal NameComputers & Electrical Engineering,

Title of PaperSecuring Electronics Healthcare Records in Healthcare 4.0: A Biometric-based Approach

Published YearApril 2019

Indexed INScopus, Web of Science

DIYA: Tactile Internet Driven Delay Assessment NOMA-based Scheme for D2D Communication

Journal

Journal NameIEEE Transaction on Industrial Informatics

Title of PaperDIYA: Tactile Internet Driven Delay Assessment NOMA-based Scheme for D2D Communication

Page Number1-12

Published YearApril 2019

Indexed INScopus, Web of Science

Chapter 9 Specific Cloud Service Models

Book Chapter

Book NameInstant Guide to Cloud Computing, A. Nayyar (ed.), BPB Publications

Publisher BPB Publications

Page Number299-342

Chapter TitleChapter 9 Specific Cloud Service Models

Published YearApril 2019

ISSN/ISBN No978-93-88176-66-8

Indexed INScopus

Chapter 9: Specific Cloud Service Models

Book Chapter

Book NameInstant Guide to Cloud Computing, BPB Publications, 2018

Publisher BPB Publications, 2018

Chapter TitleChapter 9: Specific Cloud Service Models

Published YearApril 2019

ISSN/ISBN No978-93-88176-66-8

Indexed INScopus

Tactile Internet for Autonomous Vehicles: Latency and Reliability Analysis

Journal

Journal NameIEEE Wireless Communication Magazine

Title of PaperTactile Internet for Autonomous Vehicles: Latency and Reliability Analysis

Published YearApril 2019

Indexed INScopus, Web of Science

Chapter 3: Software Errors

Book Chapter

Book NameA. Nayyar (ed.) Software Testing, BPB Publications,

PublisherA. Nayyar (ed.) Software Testing, BPB Publications,

Chapter TitleChapter 3: Software Errors

Published YearApril 2019

Indexed INScopus

“Software Defined Vehicular Networks: A Comprehensive Review

Journal

Journal NameInternational Journal of Communication System

Title of Paper“Software Defined Vehicular Networks: A Comprehensive Review

Page Number1-26

Published YearMarch 2019

Indexed INScopus, Web of Science

Sensor’s Energy and Performance Enhancement using LIBP in Contiki with Cooja

Book Chapter

Book NameSpringer 2nd International Conference on Innovative Computing and Communication (ICICC-2019), 21st − 22nd March, 2019 at VSB - Technical University Of Ostrava, Czech Republic

PublisherSpringer

Author Namesudeep tanwar

Chapter TitleSensor’s Energy and Performance Enhancement using LIBP in Contiki with Cooja

Published YearMarch 2019

Indexed INScopus

Dynamic Distance based Lifetime Enhancement Scheme for HWSN

Book Chapter

Book NameSpringer 2nd International Conference on Recent Innovations in Computing (ICRIC-2019),

PublisherSpringer 2nd International Conference on Recent Innovations in Computing (ICRIC-2019),

Page Number1-16

Chapter TitleDynamic Distance based Lifetime Enhancement Scheme for HWSN

Published YearMarch 2019

Indexed INScopus

Mobile Edge Computing enabled Blockchain FrameworkA survey

Book Chapter

Book NameSpringer 2nd International Conference on Recent Innovations in Computing (ICRIC-2019)

PublisherSpringer 2nd International Conference on Recent Innovations in Computing (ICRIC-2019)

Page Number1-14

Chapter TitleMobile Edge Computing enabled Blockchain FrameworkA survey

Published YearMarch 2019

Indexed INScopus

Tactile Internet for Industry 4.0 in 5G Era: A Comprehensive Review

Journal

Journal NameInternational Journal of Communication System

Title of PaperTactile Internet for Industry 4.0 in 5G Era: A Comprehensive Review

Published YearMarch 2019

Indexed INScopus, Web of Science

Energy Conservation for IoT Devices: Concepts, Paradigms and Solutions

Book

PublisherSpringer Nature Singapore Pte Ltd., Singapore

Published YearMarch 2019

ISSN/ISBN No978-981-13-7399-2

Indexed INScopus

Cross Layer NOMA Interference Mitigation for Femtocell users in 5G

Journal

Journal NameIEEE Transaction Vehicular Technology,

Title of PaperCross Layer NOMA Interference Mitigation for Femtocell users in 5G

Page Number1-12

Published YearFebruary 2019

Indexed INScopus, Web of Science

BHEEM: A Blockchain-based Framework for Securing Electronic Health Records

Conference

Title of PaperBHEEM: A Blockchain-based Framework for Securing Electronic Health Records

Proceeding NameIEEE GLOBECOM Conference, Abu Dhabi, UAE

PublisherIEEE GLOBECOM Conference, Abu Dhabi, UAE

Year , VenueFebruary 2019 , Abu Dhabi, UAE

Indexed INScopus

Abstract

BHEEM: A Blockchain-based Framework for Securing Electronic Health Records

Human Arthritis Analysis in Fog Computing Environment using Bayesian Network Classifier and Thread Protocol

Journal

Journal NameIEEE Consumer Electronics Magazine (In press; Impact Factor: 1.434 (SCI))

Title of PaperHuman Arthritis Analysis in Fog Computing Environment using Bayesian Network Classifier and Thread Protocol

Published YearJanuary

ISSN/ISBN No2162-2248

Indexed INScopus, Web of Science

Abstract

he scope covers the following areas that are related to “consumer electronics” and other topics considered of interest to consumer electronics: video technology, audio technology, white goods, home care products, mobile communications, gaming, air care products, home medical devices, fitness devices, home automation and networking devices, consumer solar technology, home theater, digital imaging,

Evaluation of Pattern based Customized Approach for Stock Market Trend Prediction with Big Data and Machine Learning Techniques

Journal

Journal NameInternational Journal of Business Analytics, IGI Global

Title of PaperEvaluation of Pattern based Customized Approach for Stock Market Trend Prediction with Big Data and Machine Learning Techniques

Page Number1-13

Published YearJanuary 2019

Indexed INScopus

Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems

Conference

Title of PaperData Consumption-Aware Load Forecasting Scheme for Smart Grid Systems

Proceeding NameIEEE GLOBECOM Conference, Abu Dhabi, UAE

PublisherIEEE GLOBECOM Conference, Abu Dhabi, UAE

Year , VenueJanuary 2019 , Abu Dhabi, UAE

Indexed INScopus

Tensor Decomposition of Biometric Data using Singular Value Decomposition

Conference

Title of PaperTensor Decomposition of Biometric Data using Singular Value Decomposition

Proceeding Name5th IEEE-PDGC-2018 (Indexing in SCOPUS)

Publisher5th IEEE-PDGC-2018

Published YearJanuary 2019

Indexed INScopus

Abstract

Tensor Decomposition of Biometric Data using Singular Value Decomposition.

Boosted Neural Network Ensemble Classification for Lung Cancer Disease Diagnosis”

Journal

Journal NameApplied Soft Computing

Title of PaperBoosted Neural Network Ensemble Classification for Lung Cancer Disease Diagnosis”

Published YearJanuary 2019

Indexed INScopus, Web of Science

Hybrid Energy System for Upgrading the Rural Environment

Conference

Title of PaperHybrid Energy System for Upgrading the Rural Environment

Proceeding NameIEEE GLOBECOM Conference, Abu Dhabi, UAE

PublisherIEEE GLOBECOM Conference, Abu Dhabi, UAE

Year , VenueJanuary 2019 , Abu Dhabi, UAE

Indexed INScopus

Fog Data Analytics: A Taxonomy and Process Model

Journal

Journal NameJournal of Network and Computer Applications

Title of PaperFog Data Analytics: A Taxonomy and Process Model

Volume Number128

Page Number90-104, 2019

Published YearJanuary 2019

Indexed INScopus, Web of Science

Fog Computing for Smart Grid Systems in 5G Environment: Challenges and Solutions

Journal

Journal NameIEEE Wireless Communication Magazine

Title of PaperFog Computing for Smart Grid Systems in 5G Environment: Challenges and Solutions

PublisherIEEE

Page Number1-7

Published YearJanuary 2019

Indexed INScopus, Web of Science

Base Station Oriented Multi-Route Diversity Protocol for Wireless Sensor Networks

Conference

Title of PaperBase Station Oriented Multi-Route Diversity Protocol for Wireless Sensor Networks

Proceeding NameIEEE GLOBECOM Conference, Abu Dhabi, UAE

PublisherIEEE GLOBECOM Conference, Abu Dhabi, UAE

Year , VenueJanuary 2019 , Abu Dhabi, UAE

Indexed INScopus

Online Signature-based Biometrics Recognition

Book Chapter

Book NameBiometric-Based Physical and Cybersecurity Systems,, Springer Nature Switzerland AG 2019

PublisherBiometric-Based Physical and Cybersecurity Systems,, Springer Nature Switzerland AG 2019

Page Number255-285

Chapter Title Online Signature-based Biometrics Recognition

Published YearJanuary 2019

Indexed INScopus

TILAA: Tactile Internet-based Ambient Assistant Living In Fog Environment

Journal

Journal NameFuture Generation Computer Systems

Title of PaperTILAA: Tactile Internet-based Ambient Assistant Living In Fog Environment

Volume Number98

Page Number635-649

Published YearJanuary 2019

Indexed INScopus, Web of Science

Chapter 10: Resource Allocation in Cloud Computing

Book Chapter

Book NameInstant Guide to Cloud Computing, A. Nayyar (ed.), BPB Publications

PublisherBPB Publications

Page Number343-376

Chapter TitleChapter 10: Resource Allocation in Cloud Computing

Published YearJanuary 2019

ISSN/ISBN No978-93-88176-66-8

Indexed INScopus

Resolving Conflicts in Requirement Engineering Through Agile Software Development: A Comparative Case Study”

Book Chapter

Book NameInternational Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems

PublisherSpringer, Singapore

Page Number349-357

Chapter TitleResolving Conflicts in Requirement Engineering Through Agile Software Development: A Comparative Case Study”

Published YearJanuary 2019

Indexed INScopus

Fog Data Analytics: A Taxonomy and Process Model

Journal

Journal NameJournal of Network and Computer Applications

Title of PaperFog Data Analytics: A Taxonomy and Process Model

Published YearJanuary 2019

ISSN/ISBN No1084-8045

Indexed INScopus, Web of Science

Multimedia Big Data Computing and Internet of Things Applications: A Taxonomy and Process Model

Journal

Journal NameJournal of Network and Computer Applications

Title of PaperMultimedia Big Data Computing and Internet of Things Applications: A Taxonomy and Process Model

Volume Number124

Page Number 169-195

Published YearDecember 2018

ISSN/ISBN No1084-8045

Indexed INScopus, Web of Science

Abstract

With an exponential increase in the provisioning of multimedia devices over the Internet of Things (IoT), a significant amount of multimedia data (also referred to as multimedia big data – MMBD) is being generated. Current research and development activities focus on scalar sensor data based IoT or general MMBD and overlook the complexity of facilitating MMBD over IoT.

Comparison and Evaluation of Real Time Reservation Technologies in the Intelligent Public Transport System

Conference

Title of PaperComparison and Evaluation of Real Time Reservation Technologies in the Intelligent Public Transport System

Proceeding NameFifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (PDGC-2018), Jaypee University of Information Technology, Waknaghat, Solan, Himachal Pradesh, India

Page Number1-6

Published YearDecember 2018

Indexed INScopus

“Comparison and Evaluation of Real Time Reservation Technologies in the Intelligent Public Transport System

Book Chapter

Book NameFifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (PDGC-2018),

Page Number1-6

Chapter Title“Comparison and Evaluation of Real Time Reservation Technologies in the Intelligent Public Transport System

Published YearDecember 2018

Indexed INScopus

Tensor Decomposition of Biometric Data using Singular Value Decomposition

Book Chapter

Book NameFifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (PDGC-2018)

Page Number1-6

Chapter TitleTensor Decomposition of Biometric Data using Singular Value Decomposition

Published YearDecember 2018

Indexed INScopus

A Systematic Review on Scheduling Public Transport Using IoT as Tool

Book Chapter

Book NameSmart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and Computing

Publisher Springer, Singapore

Page Number 39-48

Chapter TitleA Systematic Review on Scheduling Public Transport Using IoT as Tool

Published YearDecember 2018

Indexed INScopus

Energy Harvesting-Based Two-Hop Clustering for Wireless Mesh Network

Book Chapter

Book NameAdvances in Intelligent Systems and Computing

PublisherSpringer, Singapore

Page Number463-476

Chapter TitleEnergy Harvesting-Based Two-Hop Clustering for Wireless Mesh Network

Published YearDecember 2018

Indexed INScopus

CR-NOMA based Interference Mitigation Scheme for 5G Femtocells users

Conference

Title of PaperCR-NOMA based Interference Mitigation Scheme for 5G Femtocells users

Proceeding NameIEEE Global Communications Conference (IEEE GLOBECOM- 2018), Abu Dhabi, UAE,

Year , VenueDecember 2018 , (IEEE GLOBECOM- 2018), Abu Dhabi, UAE,

Page Number1-6

Indexed INScopus

MRD: Sink-based Multi Route Diversity for Wireless Sensor Networks

Conference

Title of PaperMRD: Sink-based Multi Route Diversity for Wireless Sensor Networks

Proceeding NameIEEE Global Communications Conference (IEEE GLOBECOM-2018) Abu Dhabi, UAE

Page Number1-6

Published YearDecember 2018

Indexed INScopus

Combining User-based and Item-based Collaborative Filtering using Machine Learning

Book Chapter

Book NameIn: Satapathy S., Joshi A. (eds)3rd International Conference on Information and Communication Technology for Intelligent Systems (ICTIS-2018), April 06-07, 2018, Ahmedabad, vol 107. Springer, Singapore,

PublisherSpringer, Singapore

Page Number173-180

Chapter TitleCombining User-based and Item-based Collaborative Filtering using Machine Learning

Published YearDecember 2018

Indexed INScopus

Hybrid Energy System for Upgrading the Rural Environment

Conference

Title of PaperHybrid Energy System for Upgrading the Rural Environment

Proceeding NameIEEE Global Communications Conference (IEEE GLOBECOM-2018), Abu Dhabi, UAE

PublisherIEEE Global Communications Conference (IEEE GLOBECOM-2018), Abu Dhabi, UAE

Page Number1-6

Published YearDecember 2018

Indexed INScopus

Resolving Conflicts in Requirement Engineering through Agile Software Development: A Comparative Case Study

Book Chapter

Book NameIn: Bhattacharyya S., Hassanien A., Gupta D., Khanna A., Pan I. (eds) International Conference on Innovative Computing and Communications. Lecture Notes in Networks and Systems, vol 55. Springer, Singapore

PublisherLecture Notes in Networks and Systems, Springer

Author Name Bhattacharyya, S., Hassanien

Page Number349-357

Chapter TitleResolving Conflicts in Requirement Engineering through Agile Software Development: A Comparative Case Study

Published YearNovember 2018

ISSN/ISBN No978-981-13-2324-9

Indexed INScopus

Verification and Validation Techniques for Streaming Big Data Analytics in Internet of Things Environment

Journal

Journal NameIET Networks, 2019,

Title of PaperVerification and Validation Techniques for Streaming Big Data Analytics in Internet of Things Environment

Page Number1-8, DOI: 10.1049/ietnet.2018.518, 2019

Published YearNovember 2018

Indexed INScopus

Fog Computing for Healthcare 4.0 Environment: Opportunities and Challenges

Journal

Journal NameComputers & Electrical Engineering, Elsevier (SCI, IF: 1.747)

Title of PaperFog Computing for Healthcare 4.0 Environment: Opportunities and Challenges

PublisherElsevier

Volume Number72

Page Number1-13

Published YearNovember 2018

ISSN/ISBN No0045-7906

Indexed INScopus, Web of Science

Abstract

Internet of things provides interaction with billions of objects across the world using the Internet. In Internet of thing era, Healthcare Industry has grown-up from 1.0 to 4.0 generation. Healthcare 3.0 was hospital centric, where patients of long-lasting sickness suffered a lot due to multiple hospital visits for their routine checkups. This in turn, prolonged the treatment of such patients.

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for Mobile Data Offloading in Heterogeneous Networks

Journal

Journal NameInternational Journal of Communication System

Title of PaperADYTIA: Adaptive and Dynamic TCP Interface Architecture for Mobile Data Offloading in Heterogeneous Networks

Volume Number32:2

Page Number1-20

Published YearNovember 2018

Indexed INScopus, Web of Science

“A Systematic Review on Security Issues in VANET”, Security and P

Journal

Journal NameSecurity and Privacy Journal, Wiley

Title of Paper“A Systematic Review on Security Issues in VANET”, Security and P

PublisherWiley

Volume Number1:5

Page Number1-27

Published YearAugust 2018

Indexed INScopus, Web of Science

A Systematic Review on Scheduling Public Transport using IoT as Tool

Conference

Title of PaperA Systematic Review on Scheduling Public Transport using IoT as Tool

Proceeding NameSmart Innovations in Communication and Computational Sciences. Advances in Intelligent Systems and C

PublisherSpringer, Singapore,

Year , VenueJuly 2018 , Singapore,

Page Number39-48

ISSN/ISBN No978-981-10-8970-1

Indexed INScopus

Design of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks

Journal

Journal NameIEEE Access (SCI, Impact Factor: 3.557)

Title of PaperDesign of an Anonymity-Preserving Group Formation Based Authentication Protocol in Global Mobility Networks

PublisherIEEE Access

Volume Number6(1)

Page Number20673-20693

Published YearMay 2018

ISSN/ISBN No2169-3536

Indexed INScopus, Web of Science

Abstract

Global mobility networks (GLOMONETs) provide the ubiquitous services for mobile users while enabling global roaming. Each user belongs to a specific home network (HA) where he/she is registered. When a user is in the domain of a foreign agent (FA), the FA needs to provide service only after authenticating the user (with HA’s help). A remote user authentication scheme for GLOMONETs needs to validat

LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN

Journal

Journal NameIEEE Access (SCI, Impact Factor: 3.557)

Title of PaperLA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN

Publisher IEEE Systems Journal

Volume Number6

Page Number1-11

Published YearApril 2018

ISSN/ISBN No2169-3536

Indexed INScopus, Web of Science

Abstract

n wireless sensor networks (WSNs), optimal energy utilization is one of the most crucial issues which needs special attention. It has been observed from the existing literature that communication among sensor nodes (SNs) consumes more energy than computation. Therefore, an efficient mechanism needs to be designed for energy conservation during communication among different SNs. To address these ga

Chapter 10: Resource Allocation in Cloud Computing

Book Chapter

Book NameInstant Guide to Cloud Computing, BPB Publications, 2018

PublisherBPB Publications, 2018

Chapter TitleChapter 10: Resource Allocation in Cloud Computing

Published YearApril 2018

ISSN/ISBN No978-93-88176-66-8

Indexed INScopus

M-Tesla-Based Security Assessment in Wireless Sensor Network

Journal

Journal NameProcedia Computer Science, Elsevier. (Indexed in SCOPUS)

Title of PaperM-Tesla-Based Security Assessment in Wireless Sensor Network

PublisherElsevier

Volume Number132

Page Number1154-1162.

Published YearApril 2018

ISSN/ISBN No1877-0509

Indexed INScopus, Web of Science

Software Defined Network-Based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Book Chapter

Book NameCommunications in Computer and Information Science

PublisherSpringer singapure

Page Number325-337

Chapter TitleSoftware Defined Network-Based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Published YearFebruary 2018

Indexed INScopus

LA-MHR: Learning Automata Based Multi-level Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN

Journal

Journal NameIEEE Systems Journal, (SCI, Impact Factor: 4.337)

Title of PaperLA-MHR: Learning Automata Based Multi-level Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN

PublisherIEEE

Page Number2169-3536

Published YearJanuary 2018

ISSN/ISBN No1932-8184

Indexed INScopus, Web of Science

Abstract

Wireless Sensor Networks (WSNs) consist of many Sensor Nodes (SNs) which may be deployed at different geographical locations to perform multiple tasks such as monitoring, data aggregation, and data processing. During all these operations, energy of the SNs continuously depleted which results the creation of energy holes in some regions.

APD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET

Journal

Journal NameIEEE Access- Accepted for Publication in next issue (SCI, Impact Factor: 3.557)

Title of PaperAPD-JFAD: Accurate Prevention and Detection of Jelly Fish Attack in MANET

PublisherIEEE Access

Published YearJanuary 2018

ISSN/ISBN No2169-3536

Indexed INScopus, Web of Science

Dimensionality Reduction using PCA and SVD in Big Data: A Comparative Case Study

Journal

Journal NameSpringer LN of the Institute for Computer Sciences, Social Informatics and Telecommunications Engine

Title of PaperDimensionality Reduction using PCA and SVD in Big Data: A Comparative Case Study

PublisherSpringer

Volume Number220

Page Number116-125

Published YearJanuary 2018

ISSN/ISBN No1867-8211

Indexed INScopus, Web of Science

Abstract

With the advancement in technology, data produced from different sources such as Internet, health care, financial companies, social media, etc. are increases continuously at a rapid rate. Potential growth of this data in terms of volume, variety and velocity coined a new emerging area of research, Big Data (BD). Continuous storage, processing, monitoring (if required), real time analysis are few

Tree-based Ant Colony Optimization Algorithm for Effective Multicast Routing in Mobile Adhoc Network

Journal

Journal NameRecent Patents on Computer Science, accepted for publication (SCOPUS)

Title of PaperTree-based Ant Colony Optimization Algorithm for Effective Multicast Routing in Mobile Adhoc Network

Volume Number12

Published YearJanuary 2018

ISSN/ISBN No1874-4796

Indexed INScopus, Web of Science

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for Heterogeneous Networks

Journal

Journal NameInternational Journal of Communication Systems, Wiley (SCI, Impact factor 1.717)

Title of PaperADYTIA: Adaptive and Dynamic TCP Interface Architecture for Heterogeneous Networks

PublisherJohn Wiley

Published YearJanuary 2018

ISSN/ISBN No1099-1131

Indexed INScopus, Web of Science

Dimensionality Reduction using PCA and SVD in Big Data: A Comparative Case Study”

Book Chapter

Book NameSocial Informatics and Telecommunications Engineering, Springer International Publishing, presented at SVNIT, Surat, Gujarat

Page Number116-125

Chapter TitleDimensionality Reduction using PCA and SVD in Big Data: A Comparative Case Study”

Published YearJanuary 2018

ISSN/ISBN No978-3-319-73711-9

Indexed INScopus

Ethical, Legal, and Social Implications of Biometrics Technologies

Book Chapter

Book NameM. S. Obaidat et al. (eds.), Biometric-Based Physical and Cybersecurity Systems

PublisherSpringer Nature, 2018

Chapter TitleEthical, Legal, and Social Implications of Biometrics Technologies

Published YearJanuary 2018

ISSN/ISBN No978-3-319-98734-7

Indexed INScopus

Abstract

his book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security.

Image Processing Based Analysis of Cracks on Vertical Walls

Conference

Title of PaperImage Processing Based Analysis of Cracks on Vertical Walls

Proceeding NameEEE 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU 2018)

PublisherEEE 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU 2018)

Published YearJanuary 2018

ISSN/ISBN No978-1-5090-6785-5

Indexed INScopus

Performance Evaluation of SDN based Virtualization for Data Center Networks

Conference

Title of PaperPerformance Evaluation of SDN based Virtualization for Data Center Networks

Proceeding NameIEEE 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU 2018)

PublisherIEEE 3rd International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU 2018)

Published YearJanuary 2018

ISSN/ISBN No978-1-5090-6785-5

Indexed INScopus

Software Defined Network-based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Conference

Title of PaperSoftware Defined Network-based Vehicular Adhoc Networks for Intelligent Transportation System: Recent Advances and Future Challenges

Proceeding NameSpringer International Conference FTNCT-2018. (CCIS Series, Indexing in SCOPUS

PublisherSpringer International Conference FTNCT-2018. (CCIS Series, Indexing in SCOPUS

Published YearJanuary 2018

Indexed INScopus

A Range-based approach for Long-Term Forecast of Weather Using Probabilistic Markov Model

Conference

Title of PaperA Range-based approach for Long-Term Forecast of Weather Using Probabilistic Markov Model

PublisherIEEE ICC-2018, Kansas City, USA (Indexed in IEEE-Xplore, SCOPUS)

Year , VenueJanuary 2018 , IEEE ICC-2018, Kansas City, USA

ISSN/ISBN No2474-9133

Indexed INScopus

TCP-EXPO: Empirical Approach to Transport Layer Protocol for High-Speed Networks

Conference

Title of PaperTCP-EXPO: Empirical Approach to Transport Layer Protocol for High-Speed Networks

Proceeding NameIEEE ICC-2018, Kansas City, USA (Indexed in IEEE-Xplore, SCOPUS)

PublisherIEEE ICC-2018, Kansas City, USA (Indexed in IEEE-Xplore, SCOPUS)

Year , VenueJanuary 2018 , IEEE ICC-2018, Kansas City, USA

ISSN/ISBN No2474-9133

Indexed INScopus

Blind Signatures Based Secured E-Healthcare System

Conference

Title of PaperBlind Signatures Based Secured E-Healthcare System

PublisherIEEE CITS-2018, Colmar, France

Year , VenueJanuary 2018 , IEEE CITS-2018, Colmar, France

ISSN/ISBN No978-1-5386-4599-4

Indexed INScopus

Ensuring Privacy and Security in E-Health Records

Conference

Title of PaperEnsuring Privacy and Security in E-Health Records

PublisherIEEE CITS-2018, Colmar, France

Year , VenueJanuary 2018 , IEEE CITS-2018, Colmar, France

ISSN/ISBN No978-1-5386-4599-4

Indexed INScopus

Mobile Computing

Book

PublisherBhavya Publication, Delhi

Published YearMarch 2017

ISSN/ISBN No978-93-83992-25-6

FAAL: Fog Computing based Patient Monitoring System for Ambient Assisted Living

Conference

Title of PaperFAAL: Fog Computing based Patient Monitoring System for Ambient Assisted Living

Proceeding NameIEEE 19th International Conference on e-Health Networking, Applications and Services, Healthcom-2017

PublisherIEEE 19th International Conference on e-Health Networking, Applications and Services, Healthcom-2017

Published YearJanuary 2017

ISSN/ISBN No978-1-5090-6704-6

Indexed INScopus

Home-based Exercise System for Patients Using IoT Enabled Smart Speaker

Conference

Title of PaperHome-based Exercise System for Patients Using IoT Enabled Smart Speaker

Proceeding NameIEEE 19th International Conference on e-Health Networking, Applications and Services, Healthcom-2017

Published YearJanuary 2017

ISSN/ISBN No978-1-5090-6704-6

Indexed INScopus

Big Data Analytics

Book

PublisherBhavya Publication, Delhi

Published YearJanuary 2017

ISSN/ISBN No978-93-83992-25-8

Energy Optimization in Smart Grid using Tensor Decomposition

Journal

Journal NameInternational Journal of Computer Sciences and Engineering (Indexed in ICI, Google Scholar,UGC listed

Title of PaperEnergy Optimization in Smart Grid using Tensor Decomposition

Volume Number5:11

Page Number192-196

Published YearJanuary 2017

ISSN/ISBN No0974-5572

Indexed INScopus, Web of Science

Public Transport Tracking and its Issues

Journal

Journal NameInternational Journal of Computer Sciences and Engineering (Indexed in ICI, Google Scholar as well a

Title of PaperPublic Transport Tracking and its Issues

Volume Number5:11

Published YearJanuary 2017

ISSN/ISBN No2347-2693

Indexed INScopus, Web of Science

HDNcfm: Handwritten Digit Recognition System Using No Combination of Feature Maps

Journal

Journal NameInternational Journal of Advanced Research in Computer Science

Title of Paper HDNcfm: Handwritten Digit Recognition System Using No Combination of Feature Maps

Volume Number8

Published YearJanuary 2017

ISSN/ISBN No0976-5697

Indexed INScopus, Web of Science

PI-Cloud: A Sensor-Cloud oriented Measurement to Management System for Precise Irrigation based Agriculture

Conference

Title of PaperPI-Cloud: A Sensor-Cloud oriented Measurement to Management System for Precise Irrigation based Agriculture

Proceeding NameIEEE International Conference on Global Communication, GLOBECOM- 2017, Singapore

Year , VenueJanuary 2017 , GLOBECOM- 2017, Singapore

ISSN/ISBN No978-1-5090-5019-2

Indexed INScopus

Suitability of Big Data Analytics in Indian Banking Sector to Increase Revenue and Profitability

Conference

Title of PaperSuitability of Big Data Analytics in Indian Banking Sector to Increase Revenue and Profitability

Proceeding NameIEEE, ICACCA-2017, Tula Institute, Dehradhun, UA

Year , VenueJanuary 2017 , IEEE, ICACCA-2017, Tula Institute, Dehradhun, UA

ISSN/ISBN No978-1-5090-6403-8

Indexed INScopus

An Advanced Internet of Thing based Security Alert System for Smart Home

Conference

Title of PaperAn Advanced Internet of Thing based Security Alert System for Smart Home

PublisherInternational Conference on Computer, Information and Telecommunication Systems IEEE-CITS-2017, Dali

Year , VenueJanuary 2017 , IEEE-CITS-2017, Dali

ISSN/ISBN No978-1-5090-5957-7

Indexed INScopus

GATA: GPS-Arduino Based Tracking and Alarm System for Protection of Wildlife Animals

Conference

Title of PaperGATA: GPS-Arduino Based Tracking and Alarm System for Protection of Wildlife Animals

Proceeding Namenternational Conference on Computer, Information and Telecommunication Systems IEEE-CITS-2017, Dali

Publishernternational Conference on Computer, Information and Telecommunication Systems IEEE-CITS-2017, Dali

Year , VenueJanuary 2017 , IEEE-CITS-2017, Dali

ISSN/ISBN No978-1-5090-5957-7

Indexed INScopus

Fog based Enhanced Safety Management System for Miners

Conference

Title of PaperFog based Enhanced Safety Management System for Miners

Proceeding NameIEEE, ICACCA-2017, Tula Institute, Dehradhun, UA

Year , VenueJanuary 2017 , IEEE, ICACCA-2017, Tula Institute, Dehradhun, UA

ISSN/ISBN No978-1-5090-6403-8

Indexed INScopus

Routing in Heterogeneous Wireless Sensor Networks

Book

PublisherLap Lambert Academic Publishing, Germany

Published YearDecember 2016

ISSN/ISBN No978-3-330-02892-0

Abstract

Although many proposals exist in market addressing the Routing in HWSN issue, but node heterogeneity of SNs has not been exploited to its full potential. So there is a requirement of categorization of SNs based upon different performance evaluation metrics. Motivated by the above facts, in this book, we provide a complete categorization of various heterogeneous routing protocols for WSNs.

Analysis of Software Testing Techniques: Theory to Practical Approach

Journal

Journal NameIndian Journal of Science and Technology

Title of PaperAnalysis of Software Testing Techniques: Theory to Practical Approach

Volume Number9(32)

Page Number1-6

Published YearAugust 2016

ISSN/ISBN No0974-6846

Indexed INScopus, Web of Science, EBSCO

Abstract

n today’s scenario software testing is crucial aspect for any software company because the cost of maintenance is much more than development in software companies. We all make mistakes, some of them are not important, but some of them are harmful for software life cycle. So we should start testing the code/software that we are going to generate from initial stage because at later stage recovery

Min-Parent: An Effective Approach to Enhance Resource Utilization in Cloud Environment,

Conference

Title of PaperMin-Parent: An Effective Approach to Enhance Resource Utilization in Cloud Environment,

PublisherIEEE-ICACCA- 2016, Dehradhun, UA

Published YearJanuary 2016

ISSN/ISBN No978-1-5090-0673-1

Indexed INScopus

Cognitive Radio-based Clustering for Opportunistic Shared Spectrum Access to Enhance Lifetime of Wireless Sensor Network

Journal

Journal NamePervasive and Mobile Computing, Elsevier (SCI, Impact Factor: 2.974)

Title of PaperCognitive Radio-based Clustering for Opportunistic Shared Spectrum Access to Enhance Lifetime of Wireless Sensor Network

PublisherElsevier

Volume Number22

Page Number90-112

Published YearSeptember 2015

ISSN/ISBN No1574-1192

Indexed INScopus, Web of Science

Abstract

In recent times, Cognitive radio (CR)-based wireless sensor networks (WSNs) have been widely used for opportunistic access of the shared spectrum. In WSNs, deployment of sensor nodes (SN) may be random, or it may follow an optimized approach-based upon the application in which it is to be used. Energy efficient route selection for transferring data from a SN to the base station (BS) is the key iss

A Systematic Review of Heterogeneous Routing Protocols for Wireless Sensor Network

Journal

Journal NameJournal of Network and Computer Application, Elsevier, (SCI, Impact Factor: 3.99)

Title of PaperA Systematic Review of Heterogeneous Routing Protocols for Wireless Sensor Network

PublisherElsevier

Volume Number53

Page Number 39-56

Published YearJuly 2015

ISSN/ISBN No1084-8045

Indexed INScopus, Web of Science

Abstract

The latest developments in wireless communication are more focused on delivering sensitive information to its final destination under several constraints such as energy, latency, reliability, stability, and security. Through the latest developments in digital technology, wireless transceiver, and Micro-Electro-Mechanical Systems (MEMS), it is possible to integrate sensing and computing units along

Extended Multi-level Heterogeneous routing protocol for Wireless Sensor Networks

Journal

Journal NameTelecommunication System, Springer (SCI, Impact Factor: 1.527)

Title of PaperExtended Multi-level Heterogeneous routing protocol for Wireless Sensor Networks

PublisherSpringer

Volume Number59

Page Number43-62

Published YearMay 2015

ISSN/ISBN No1018-4864 (Print) 1572-9451 (Online)

Indexed INScopus, Web of Science

Abstract

IoT, Smart Grid and M2M are paradigms that are expected to dominate in 5G networks and, hence, the role of WSNs is of great importance. In WSNs, horizontal and vertical levels of node heterogeneity has been studied in the past for various operation such as data capturing, processing and communication at different levels of nodes in wireless sensor networks (WSNs). For saving energy consumption of

Learning Automata-Based Coverage Oriented Clustering in HWSNs

Conference

Title of PaperLearning Automata-Based Coverage Oriented Clustering in HWSNs

Proceeding NameIEEE-ICACCE-2015, Dehradhun, UA

Year , VenueJanuary 2015 , Dehradhun, UA

ISSN/ISBN No978-1-4799-1734-1

Indexed INScopus

Bayesian Coalition Game-Based Optimized Clustering in Wireless Sensor Networks

Conference

Title of PaperBayesian Coalition Game-Based Optimized Clustering in Wireless Sensor Networks

Proceeding NameIEEE International Conference on Communications (IEEE-ICC-2015), London, UK

Published YearJanuary 2015

ISSN/ISBN No978-1-4673-6432-4

Indexed INScopus

EEMHR: Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks

Journal

Journal NameInternational Journal of Communication System, Wiley (SCI, Impact Factor: 1.717)

Title of PaperEEMHR: Energy-efficient multilevel heterogeneous routing protocol for wireless sensor networks

PublisherWiley

Volume Number27(9)

Published YearMarch 2014

ISSN/ISBN No1099-1131

Indexed INScopus, Web of Science

Abstract

Wireless Sensor Networks (WSNs) are being used in wide areas of applications for data collection and processing. Energy management is one of the crucial issues that need special attention in WSNs. But most of the existing solutions for energy management are restricted in defining the number of levels for node heterogeneity for efficient energy management. Due to this restriction, a performance deg

Selective Cluster Based Energy Efficient routing protocol for homogeneous wireless sensor network

Journal

Journal NameWireless BANs for Pervasive Healthcare & Smart Environments, ZTE Communication

Title of PaperSelective Cluster Based Energy Efficient routing protocol for homogeneous wireless sensor network

Volume Number12(3)

Published YearJanuary 2014

Indexed INScopus, Web of Science

EHE-LEACH: Enhanced Heterogeneous LEACH Protocol for Lifetime Enhancement of WSNs,

Conference

Title of PaperEHE-LEACH: Enhanced Heterogeneous LEACH Protocol for Lifetime Enhancement of WSNs,

Proceeding NameIEEE-ICACCI-3013 Cited by 14 (IEEE Digital Library), 24 (Google Scholar)

Published YearJanuary 2013

ISSN/ISBN No978-1-4673-6217-7

Indexed INScopus

Software Testability Analysis using Cyclomatic Complexity

Conference

Title of PaperSoftware Testability Analysis using Cyclomatic Complexity

Proceeding NameNational conference on RTACM, Tiagrajar School of Management, Madurai (Tamilnadu)

Year , VenueJanuary 2009 , National conference on RTACM, Tiagrajar School of Management, Madurai (Tamilnadu)

Indexed INScopus

MPI Messaging Structure for Mobile Adhoc Network

Journal

Journal NameInternational Journal of Hybrid Computational Intelligence

Title of PaperMPI Messaging Structure for Mobile Adhoc Network

Volume Number1(2)

Page Number215-224

Published YearJanuary 2008

ISSN/ISBN No0975-3680

Indexed INScopus, Web of Science

Deep Neural Network based classification of tumorous and non-tumorous Medical Images

Book Chapter

Book NameSpringer Smart Innovation, Systems and Technologies

Chapter TitleDeep Neural Network based classification of tumorous and non-tumorous Medical Images

Published YearJanuary

Indexed INScopus

Deep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection

Journal

Journal NameAlgorithms and Architectures for Parallel Processing

Title of PaperDeep Q-Learning for Navigation of Robotic Arm for Tokamak Inspection

PublisherSpringer

Volume Number11337

Page Number10

Published YearDecember 2018

ISSN/ISBN No978-3-030-05063-4

Indexed INOthers

Abstract

Computerized human-machine interfaces are used to control the manipulators and robots for inspection and maintenance activities in Tokamak. The activities embrace routine and critical activities such as tile inspection, dust cleaning, equipment handling and replacement tasks. Camera(s) is deployed on the robotic arm which moves inside the chamber to accomplish the inspection task. For navigating t

A Proposed Method for Disruption Classification in Tokamak Using Convolutional Neural Network

Book Chapter

Book NameTowards Extensible and Adaptable Methods in Computing

Chapter TitleA Proposed Method for Disruption Classification in Tokamak Using Convolutional Neural Network

Published YearJanuary 2018

Abstract

Thermonuclear fusion is one of the alternative sources of energy. Fusion reactors use a device called tokamak. Classification of favorable and non-favorable discharges in a tokamak is very important for plasma operation point of view. Non-favorable discharges are mainly disruptive in nature which causes certain losses of confinement that take place abruptly and affect the integrity of tokamak. Dur

Weighted Fusion of LBP and CCH Features for Effective Content Based Image Retrieval

Conference

Title of PaperWeighted Fusion of LBP and CCH Features for Effective Content Based Image Retrieval

Proceeding NameInternational Conference on Signal Processing and Communications (SPCOM'16), IISC, Bangalore

OrganizationIISC, Bangalore

Published YearJanuary 2018

Deep learning feature map for content based image retrieval system for remote sensing application

Journal

Journal NameInternational Journal of Image Mining

Title of PaperDeep learning feature map for content based image retrieval system for remote sensing application

PublisherInderscience

Volume Number2

Page Number11

Published YearSeptember 2016

Abstract

This paper proposes a model for content based image retrieval system (CBIR), in which handcrafted feature set is replaced with feature set learnt from deep learning, convolutional neural network (CNN) for image retrieval. Feature map obtained from CNN is of high dimension, which makes the matching process expensive in terms of time and computation. Hence to recapitulate information in smaller dime

Parallel Approach To Expedite Morphological Feature Extraction Of Remote Sensing Images for CBIR System

Conference

Title of PaperParallel Approach To Expedite Morphological Feature Extraction Of Remote Sensing Images for CBIR System

Proceeding Name35th IEEE International Geoscience and Remote Sensing Symposium, Quebec Canada

PublisherIEEE

OrganizationQuebec City, QC, Canada

Year , VenueNovember 2014 , Quebec City, QC, Canada

Page Number4

ISSN/ISBN No14716409

Abstract

In this paper, we have proposed a parallel approach to the morphological feature extraction process and demonstrated a good computational speedup. Remote sensing images have a typical property of incrementing constantly and each image being very large. Since the images are acquired constantly and hence added into the database regularly in good numbers, hence there is a need to make the feature ext

Computation Performance Gain in Key Feature Extraction for CBIR system for Remote Sensing Images

Conference

Title of PaperComputation Performance Gain in Key Feature Extraction for CBIR system for Remote Sensing Images

Proceeding NameEighth International Conference on Image and Signal Processing (ICISP 2014), Elsevier

Published YearJanuary 2014

ISSN/ISBN No9789351072522

Exploring a new direction in colour and texture based satellite image search and retrieval system

Conference

Title of PaperExploring a new direction in colour and texture based satellite image search and retrieval system

Proceeding Name2011 Nirma University International Conference on Engineering

PublisherIEEE

OrganizationNirma University

Year , VenueDecember 2012 , Nirma University, Ahmedabad, Gujarat, India

Page Number5

ISSN/ISBN No2375-1282

Abstract

Content based Image Retrieval systems (CBIR) have become a reliable tool for many image database applications. Today, the need for reliable, automated satellite image classification and browsing systems is more than ever before. Everyday there is a massive amount of remotely sensed data being collected and sent by terrestrial satellites for analysis. The use of automated tools for this analysis ha

Detection of Moving Object using Continuous Background Estimation Based on Probability of Pixel Intensity Occurrences

Journal

Journal NameInternational Journal of Computer Science and Telecommunications

Title of PaperDetection of Moving Object using Continuous Background Estimation Based on Probability of Pixel Intensity Occurrences

PublisherIJCST

Volume Number3

Page Number5

Published YearMay 2012

Abstract

Video object segmentation is an important part of real time surveillance system. For any video segmentation algorithm to be suitable in real time, must require less computational load. This paper addresses the problem of maintaining the background with the changes in the scene. The algorithm proposed in this paper enables to update the background image timely without compromising the time taken fo

Performance Measure of Image Processing Algorithms on DSP Processor & FPGA Based Coprocessor

Conference

Title of PaperPerformance Measure of Image Processing Algorithms on DSP Processor & FPGA Based Coprocessor

Proceeding Name2010 International Conference on Advances in Communication, Network, and Computing

Published YearOctober 2010

Abstract

As the processing capability of processor increases the computation requirements of application two folds, especially Digital Image Processing algorithms applied on satellite images require tremendous amount of calculations because high resolution images are common in aerial and satellite surveillance. Fourier Transform, Convolution and Correlation are fundamental algorithms required in many image

A survey and evaluation of supervised machine learning techniques for spam e-mail filtering

Conference

Title of PaperA survey and evaluation of supervised machine learning techniques for spam e-mail filtering

Proceeding Name IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT)

PublisherIEEE

Author NameCoimbatore, India

Published YearJanuary

ISSN/ISBN No978-1-4799-6084-2

Indexed INScopus

Google AdWords: A Window into the Google Display Network

Book Chapter

Book Name Lecture Notes in Networks and Systems

PublisherSpringer

Chapter TitleGoogle AdWords: A Window into the Google Display Network

Published YearNovember 2017

ISSN/ISBN No978-981-10-3931-7

Indexed INScopus

MobiCloud: Performance Improvement, Application Models and Security Issues

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer

Chapter TitleMobiCloud: Performance Improvement, Application Models and Security Issues

Published YearAugust 2017

ISSN/ISBN No978-3-319-63672-6

Indexed INScopus

Towards the Next Generation of Web of Things: A Survey on Semantic Web of Things’ Framework

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer

Page Number31-39

Chapter TitleTowards the Next Generation of Web of Things: A Survey on Semantic Web of Things’ Framework

Published YearJuly 2016

ISSN/ISBN No978-3-319-30932-3

Indexed INScopus

A Study of Working of Ad Auctioning by Google AdWords

Book Chapter

Book Name Advances in Intelligent Systems and Computing

PublisherSpringer

Page Number471-480

Chapter TitleA Study of Working of Ad Auctioning by Google AdWords

Published YearFebruary 2016

ISSN/ISBN No978-981-10-0133-8

Indexed INScopus

Heart Disease Prediction Using Machine Learning and Data Mining Techniques

Journal

Journal NameComputer Science and Electronics Journals

Title of PaperHeart Disease Prediction Using Machine Learning and Data Mining Techniques

PublisherCS - Journals

Volume Number7

Page Number129-137

Published YearSeptember 2015

ISSN/ISBN No0973-7391

Indexed INUGC List

Abstract

—Heart disease is the main reason for death in the world over the last decade. Almost one person dies of Heart disease about every minute in the United States alone. Researchers have been using several data mining techniques to help health care professionals in the diagnosis of heart disease. However using data mining technique can reduce the number of test that are required. In order to reduce number of deaths from heart diseases there have to be a quick and efficient detection technique. Decision Tree is one of the effective data mining methods used. This research compares different algorithms of Decision Tree classification seeking better performance in heart disease diagnosis using WEKA. The algorithms which are tested is J48 algorithm, Logistic model tree algorithm and Random Forest algorithm. The existing datasets of heart disease patients from Cleveland database of UCI repository is used to test and justify the performance of decision tree algorithms. This datasets consists of 303 instances and 76 attributes. Subsequently, the classification algorithm that has optimal potential will be suggested for use in sizeable data. The goal of this study is to extract hidden patterns by applying data mining techniques, which are noteworthy to heart diseases and to predict the presence of heart disease in patients where this presence is valued from no presence to likely presence

Blockchain for industry 4.0: a comprehensive review

Journal

Journal NameIEEE Access

Title of PaperBlockchain for industry 4.0: a comprehensive review

PublisherIEEE

Volume Number8

Page Number79764-79800

Published YearApril 2020

ISSN/ISBN NoIEEE Access 2169-3536

Indexed INScopus, Web of Science, Others

Abstract

Due to the proliferation of ICT during the last few decades, there is an exponential increase in the usage of various smart applications such as smart farming, smart healthcare, supply-chain & logistics, business, tourism and hospitality, energy management etc. However, for all the aforementioned applications, security and privacy are major concerns keeping in view of the usage of the open channel, i.e., Internet for data transfer. Although many security solutions and standards have been proposed over the years to enhance the security levels of aforementioned smart applications, but the existing solutions are either based upon the centralized architecture (having single point of failure) or having high computation and communication costs. Moreover, most of the existing security solutions have focussed only on few aspects and fail to address scalability, robustness, data storage, network latency, auditability, immutability, and traceability. To handle the aforementioned issues, blockchain technology can be one of the solutions. Motivated from these facts, in this paper, we present a systematic review of various blockchain-based solutions and their applicability in various Industry 4.0-based applications. Our contributions in this paper are in four fold. Firstly, we explored the current state-of-the-art solutions in the blockchain technology for the smart applications. Then, we illustrated the reference architecture used for the blockchain applicability in various Industry 4.0 applications. Then, merits and demerits of the traditional security solutions are also discussed in comparison to their countermeasures. Finally, we provided a comparison of existing blockchain-based security solutions using various parameters to provide deep insights to the readers about its applicability in various applications

A Survey on Decentralized Consensus Mechanisms for Cyber Physical Systems

Journal

Journal NameIEEE ACCESS

Title of PaperA Survey on Decentralized Consensus Mechanisms for Cyber Physical Systems

PublisherIEEE

Volume Number8

Page Number54371 - 54401

Published YearMarch 2020

ISSN/ISBN No2169-3536

Indexed INScopus, Web of Science, Others

Abstract

Modern industry 4.0 applications are shifting towards decentralized automation of computing and cyber-physical systems (CPS), which necessitates building a robust, secure, and efficient system that performs complex interactions with other physical processes. To handle complex interactions in CPS, trust and consensus among various stakeholders is a prime concern. In a similar direction, consensus algorithms in blockchain have evolved over the years that focus on building smart, robust, and secure CPS. Thus, it is imperative to understand the key components, functional characteristics, and architecture of different consensus algorithms used in CPS. Many consensus algorithms exist in the literature with a specified set of functionalities, performance, and computing services. Motivated from these facts, in this survey, we present a comprehensive analysis of existing state-of-the-art consensus mechanisms and highlight their strength and weaknesses in decentralized CPS applications. In the first part, we present the scope of the proposed survey and identify gaps in the existing surveys. Secondly, we present the review method and objectives of the proposed survey based on research questions that address the gaps in existing studies. Then, we present a solution taxonomy of decentralized consensus mechanisms for various CPS applications. Then, open issues and challenges are also discussed in deploying various consensus mechanisms in the CPS with their merits and demerits. The proposed survey will act as a road-map for blockchain developers and researchers to evaluate and design future consensus mechanisms, which helps to build an efficient CPS for industry 4.0 stakeholders

“Managing Cooperative Behaviour in Social Communication” ICASCCT 2014, Hyderabad

Conference

Title of Paper“Managing Cooperative Behaviour in Social Communication” ICASCCT 2014, Hyderabad

Proceeding NameAdvances in Soft Computing and Communication Technologies (ICASCCT) 2014, Hyderabad

Year , VenueAugust 2014 , Hyderabad

ISSN/ISBN No 2229-3515

Indexed INUGC List

Hardware Implementation of Public Key Cryptography for Small-Scale Devices

Book Chapter

Book NameLecture Notes in Networks and Systems book series

PublisherSpringer

Page Number9-15

Chapter TitleHardware Implementation of Public Key Cryptography for Small-Scale Devices

Published YearNovember 2018

ISSN/ISBN No978-981-13-2323-2

Indexed INScopus

Abstract

A Range-Based Adaptive and Collaborative Localization for Wireless Sensor Networks

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer

Page Number293-302

Chapter TitleA Range-Based Adaptive and Collaborative Localization for Wireless Sensor Networks

Published YearDecember 2018

ISSN/ISBN No978-981-13-1747-7

Indexed INScopus, UGC List

Routing Protocols for Wireless Multimedia Sensor Networks: Challenges and Research Issues

Book Chapter

Book Name Smart Innovation, Systems and Technologies

PublisherSpringer

Page Number157-164

Chapter TitleRouting Protocols for Wireless Multimedia Sensor Networks: Challenges and Research Issues

Published YearAugust 2017

ISSN/ISBN No978-3-319-63645-0

Indexed INScopus, UGC List

Efficient Vehicle Detection and Classification for Traffic Surveillance System

Book Chapter

Book NameCommunications in Computer and Information Science

PublisherSpringer, Singapore

Page Number495-503

Chapter TitleEfficient Vehicle Detection and Classification for Traffic Surveillance System

Published YearJuly 2017

ISSN/ISBN No978-981-10-5426-6

Indexed INScopus, UGC List, Others

Open Issues in Named Data Networking - A Survey

Book Chapter

Book NameSmart Innovation, Systems and Technologies

PublisherSpringer, Cham

Page Number285-292

Chapter TitleOpen Issues in Named Data Networking - A Survey

Published YearMarch 2017

ISSN/ISBN No978-3-319-63672-6

Indexed INScopus, UGC List

Abstract

Internet is now being used as content distribution network also. Internet users are interested in specific contents rather than host machines where the content is located. Named Data Networking (NDN) is a step towards future Internet architecture that would be based on named data rather than numerically identified hosts.

QoS Aware Geographic Routing Protocol for Multimedia Transmission in Wireless Sensor Network

Conference

Title of PaperQoS Aware Geographic Routing Protocol for Multimedia Transmission in Wireless Sensor Network

Proceeding Name2015 5th Nirma University International Conference on Engineering (NUiCONE)

PublisherIEEEXplore

OrganizationNirma University

Year , VenueDecember 2015 , Nirma University

Indexed INOthers

Computation of Coverage Backup Set for Wireless Video Sensor Networks

Conference

Title of PaperComputation of Coverage Backup Set for Wireless Video Sensor Networks

Proceeding NameTENSYMP 2015 - An International Conference of IEEE region 10

PublisherIEEEXplore

OrganizationIEEE Region 10

Year , VenueMay 2015 , GIFT City, Gandhinagar

Page Number37-40

Indexed INOthers

An Energy Efficient Routing Protocol for Wireless Multimedia Sensor Networks

Conference

Title of PaperAn Energy Efficient Routing Protocol for Wireless Multimedia Sensor Networks

Proceeding NameDevices, Circuits and Communications (ICDCCom), 2014 International Conference on

PublisherIEEEXplore

OrganizationKrishna Engineering College

Year , VenueSeptember 2014 , Gaziabad

Page Number1-6

Indexed INOthers

Aggregation in Wireless Multimedia Sensor Networks

Conference

Title of PaperAggregation in Wireless Multimedia Sensor Networks

Proceeding NameEngineering (NUiCONE), 2013 Nirma University International Conference on

PublisherIEEEXplore

OrganizationNirma University

Year , VenueNovember 2013 , Nirma University

Page Number1-6

Indexed INOthers

An Empirical Analysis of Multiclass Classification Techniques in Data Mining

Conference

Title of PaperAn Empirical Analysis of Multiclass Classification Techniques in Data Mining

Proceeding NameEngineering (NUiCONE), 2011 Nirma University International Conference on

PublisherIEEEXplore

OrganizationNirma University

Year , VenueDecember 2011 , Nirma University

Page Number1-5

Indexed INOthers

Energy Aware Computing Resource Allocation Using PSO in Cloud

Book Chapter

Book NameInformation and Communication Technology for Intelligent Systems

PublisherSpringer, Singapore

Page Number511-519

Chapter TitleEnergy Aware Computing Resource Allocation Using PSO in Cloud

Published YearDecember 2018

ISSN/ISBN No978-981-13-1746-0

Indexed INScopus, UGC List

Abstract

In cloud computing, a large number of resources are used like data Centres, servers, computing resources (VMs), and IoT devices. One of the key challenges in cloud computing is to provide energy-efficient resource management. In this resource management, energy is one of the key parameters which is to be resolved.

A Trust Rating Model Using Fuzzy Logic in Cloud

Book Chapter

Book NameInternational Conference on Innovative Computing and Communications

PublisherSpringer, Singapore

Page Number339-348

Chapter TitleA Trust Rating Model Using Fuzzy Logic in Cloud

Published YearNovember 2018

ISSN/ISBN No978-981-13-2353-9

Indexed INScopus

Abstract

Cloud computing provides services from the available pool of resources. Even with the available condition, cloud computing can reach the peak of success amongst cloud user. The issue they face is the barrier of trust between the end users for using the given services. Conventional security and protection controls keeps on being executed on cloud; however, because of its liquid and dynamic nature, a testable trust estimate of the cloud is required. This research paper exhibits an analysis of the present trust administration strategies for cloud operations. In this research paper, we proposed a model for trust administration using Fuzzy Logic, which can be beneficial for cloud service providers to select trusted datacenter for consumers.

SLA Management in Cloud Federation

Journal

Journal NameInternational Conference on Information and Communication Technology for Intelligent Systems

Title of PaperSLA Management in Cloud Federation

PublisherSpringer, Singapore

Volume Number84

Page Number397-404

Published YearNovember 2017

ISSN/ISBN No978319636443

Indexed INScopus

Abstract

Now a days cloud computing is the major area of research Because cloud computing has own many benefits. Cloud computing also provides cost effective Resources so that it can become more and more helpful to IT trends. Distributed computing is an extensive arrangement that conveys IT as an administration. It is an Internet-based registering arrangement where shared assets are given like power disseminated on the electrical grid. Cloud suggest to a particular IT environment that is expected with the end goal of remotely provisioning versatile and measured IT resources. Whereas the Internet gives open access to many Web-based IT assets, a cloud is commonly exclusive and offers access to IT assets that is metered following SLAs implementation depends on guidelines that are redesigned in runtime so as to proactively recognize conceivable SLA Violations and handle them in a proper manner. Our proposed framework allows the creation and implementation of effective SLA for provisioning of service. SLA management are one kind of common comprehension between CSP (Cloud Service Provider) and customer.

Weight Based Workflow Scheduling in Cloud Federation

Journal

Journal NameInternational Conference on Information and Communication Technology for Intelligent Systems

Title of PaperWeight Based Workflow Scheduling in Cloud Federation

PublisherSpringer, Singapore

Volume Number84

Page Number405-411

Published YearAugust 2017

ISSN/ISBN No978319636443

Indexed INScopus

Abstract

To cater the need of a user as the requirement of infrastructure, application building environment or contemporary software private and public clouds are exiting for provisioning of such services. But cloud providers are facing the problem of how to deploy their applications over different clouds keeping in mind their different requirements in terms of QoS (Cost, resource utilization, execution time). Different clouds have different advantages such as one cloud will be more reliable and efficient whereas, private cloud will be more secure or less expensive. In order to get the benefits of both clouds, we can use the concept of cloud federation. When using cloud federation it becomes important how to schedule large workflows over federated clouds. Proposed work addresses the issue of scheduling large workflow over federated clouds. SMARTFED is used for the cloud federation and our algorithm is used to schedule different workflows according to the QoS parameters over the federation.

Optimal Camera Placement for Multimodal Video Summarization

Book Chapter

Book NameCommunications in Computer and Information Science

PublisherSpringer

Author NameVishal Parikh, Priyanka Sharma, Vijay Ukani

Page Number123-134

Chapter TitleOptimal Camera Placement for Multimodal Video Summarization

Published YearDecember 2018

ISSN/ISBN No978-981-13-3804-5

Indexed INScopus, UGC List

Improving Security in P2P File Sharing Based on Network Coding for DTN

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperImproving Security in P2P File Sharing Based on Network Coding for DTN

PublisherIJCSC

Volume Number7

Page Number167-172

Published YearMarch 2016

ISSN/ISBN No0973-7391

Indexed INOthers

E-commerce Recommendation System usingAssociation Rule Mining and Clustering

Journal

Journal NameInternational Journal of Innovations & Advancement in Computer Science

Title of PaperE-commerce Recommendation System usingAssociation Rule Mining and Clustering

PublisherAcademic Science

Volume Number4

Page Number148-155

Published YearMay 2015

ISSN/ISBN No2347-8616

Stock Prediction and Automated Trading System

Journal

Journal NameInternational Journal of Computer Science & Communication

Title of PaperStock Prediction and Automated Trading System

PublisherIJCSC

Volume Number6

Page Number104-111

Published YearMarch 2015

ISSN/ISBN No0973-7391

Influence of Montoring: Fog and Edge Computing

Journal

Journal NameScalable Computing: Practice and Experience:Influence of Motoring: Fog and Edge Computing

Title of PaperInfluence of Montoring: Fog and Edge Computing

PublisherSCPE

Volume Number20

Page Number365–376

Published YearMay 2019

ISSN/ISBN No1895-1767

Indexed INScopus, Web of Science, UGC List

Abstract

The evolution of the Internet of Things (IoT) has augmented the necessity for Cloud, edge and fog platforms. The chief benefit of cloud-based schemes is they allow data to be collected from numerous services and sites, which is reachable from any place of the world. The organizations will be benefited by merging the cloud platform with the on-site fog networks and edge devices and as result, this will increase the utilization of the IoT devices and end users too. The network traffic will reduce as data will be distributed and this will also improve the operational efficiency. The impact of monitoring in edge and fog computing can play an important role to efficiently utilize the resources available at these layers. This paper discusses various techniques involved for monitoring for edge and fog computing and its advantages. The paper ends with a case study to demonstarte the need of monitoring in fog and edge in the healthcare system.

Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Journal

Journal NameProcedia Computer Science: Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Title of PaperInspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

PublisherElsevier

Volume Number132

Page Number1280-1289

Published YearMay 2018

ISSN/ISBN No1877-0509

Indexed INScopus, UGC List

Abstract

Cloud Computing is an example of the distributed system where the end user has to connect to the services given by the cloudwhich is maintained by the cloud service provider (CSP). The user has to have certain trust upon the cloud as finally, the end userhas to migrate the jobs into the cloud of some third party, as the on-premises data or sources are to be kept across the globe,theCSP have to mai

Reducing the Operative Resource Monitoring Mechanism Overhead in Cloud: An IaaS Perspective

Conference

Title of PaperReducing the Operative Resource Monitoring Mechanism Overhead in Cloud: An IaaS Perspective

PublisherElsevier

Page Number-

Published YearApril 2018

ISSN/ISBN No1556-5068

Indexed INUGC List

Abstract

Today we are in the era of distributed system and cloud computing is the best example for the same. Resource management is an important issue in cloud computing, we need to keep track of the available resources in cloud, so that we can give services to user to fulfil their requirement. Which leads in helping to generate maximum revenue, lower power consumption, carbon emission and ultimately leads to green computing. So with the help of resource monitoring we can get the data about how, when, in what amount of resources for a particular cloud and the user. With effective resource monitoring, by minimizing some monitoring units we can reduce the cost of monitoring in terms of computation and power consumption. Our main objective is to reduce the monitoring technique, so that the amount of computation and power consumption can be saved which will lead to smart and green computing. In this research paper we are discussing about the algorithm that will reduce the activation period of the monitoring and also we had discussed the Hidden Markov Model (HMM) for the decision making in monitoring aspect.

Chronicles of Assaults at Cloud Computing and Its Influence at an IaaS

Conference

Title of PaperChronicles of Assaults at Cloud Computing and Its Influence at an IaaS

Proceeding NameProceedings of 3rd International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2018 held at Malaviya National Institute of Technology, Jaipur (India) on March 26-27, 2018

PublisherElsevier SSRN

Author NameElsevier SSRN

OrganizationMalaviya National Institute of Technology, Jaipur (India)

Published YearMarch 2018

ISSN/ISBN No1556-5068

Indexed INUGC List

Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Journal

Journal NameElsevier Procedia:Inspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

Title of PaperInspection of Trust Based Cloud Using Security and Capacity Management at an IaaS Level

PublisherElsevier

Volume Number132

Page Number1280-1289

Published YearFebruary 2018

ISSN/ISBN No1877-0509

Indexed INScopus, UGC List

Abstract

Cloud Computing is an example of the distributed system where the end user has to connect to the services given by the cloud which is maintained by the cloud service provider (CSP). The user has to have certain trust upon the cloud as finally, the end user has to migrate the jobs into the cloud of some third party, as the on-premises data or sources are to be kept across the globe, the CSP have to maintain the trust level so that the end user can opt for the services given by the certain trusted Cloud. Ultimately there will be various elements of levels happening at the CSP side to maintain the trust level, like the safety features for security has to be identified, federation related or Virtual Machine migration techniques status has to be always monitored to maintain and avoid certain uncertainty which will affect the trust level of the cloud, which can lead to the compromised situation in between the end user and CSP, as a result the trust value will decrease, In this paper we are proposing a techniques where the security features and conditions for load balancing monitoring technique with proactive actions will be analyzed to maintain the specified trust level.

Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

Book Chapter

Book NameFuture Internet Technologies and Trends:Efficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

PublisherSringer

Author NameSringer

Page Number47-55

Chapter TitleEfficient Resource Monitoring and Prediction Techniques in an IaaS Level of Cloud Computing: Survey

Published YearJanuary 2018

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

In this paper, we have discussed about the various techniques through which the cloud computing monitoring and prediction can be achieved, This paper provides the survey of the techniques related to monitoring and prediction for the efficient usages of the resources available at the IaaS level of cloud. As cloud provides the services, which are elastic, scalable or highly dynamic in nature, which binds us to make the correct usages of the resources, but in real situations the (Cloud Service Provider)CSP’s has to face the situation of under provisioning and over provisioning, where the resources are not fully utilized and being wasted, though this is the survey paper, it ends up with the proposed model where both the concepts of the Monitoring and Prediction will be combined together to give a better vision of the future resource demand in IaaS layer of Cloud Computing.

Capacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

Book Chapter

Book NameFuture Internet Technologies and Trends:Capacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

PublisherSringer

Author NameSringer

Page Number66-74

Chapter TitleCapacity Planning Through Monitoring of Context Aware Tasks at IaaS Level of Cloud Computing

Published YearJanuary 2018

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

Cloud Computing is the exercise of using a network of remote servers held on the Internet to store, manage, and process data which have the characteristics as an elasticity, scalability or scalable resource sharing managed by the resource management. Even the growing demand of cloud computing has radically increased the energy consumption of the data centres, which is a critical scenario in the er

Exhausting Autonomic Techniques for Meticulous Consumption of Resource at an IaaS Layer of Cloud Computing

Book Chapter

Book NameFuture Internet Technologies and Trends:Exhausting Autonomic Techniques for Meticulous Consumption of Resource at an IaaS Layer of Cloud Computing

PublisherSpringer,LNICST, volume 220

Author NameSpringer

Page Number37-46

Chapter TitleExhausting Autonomic Techniques for Meticulous Consumption of Resource at an IaaS Layer of Cloud Computing

Published YearJanuary 2018

ISSN/ISBN No1867-8211

Indexed INScopus, UGC List

Abstract

Internet-based computing has provided lots of flexibility with respect to the usages of resources, as per the current demand of the users, and granting them the said resources has its own benefits if given in proper manner i.e. exactly what the user has asked. In this paper, the autonomic computing concepts have been discussed which will be very useful for the better utilization of the resources a

A systematic review on scheduling public transport using IoT as tool

Journal

Journal NameAdvances in Intelligent Systems and Computing

Title of PaperA systematic review on scheduling public transport using IoT as tool

PublisherSpringer

Volume Number670

Page Number39-48

Published YearJuly 2018

ISSN/ISBN No21945357

Indexed INScopus, UGC List

Abstract

Public transport can play an important role in reducing usage of private vehicles by individuals which can, in turn, reduce traffic congestion, pollution, and usage of fossil fuel. But, for that public transport needs to be reliable. People should not have to wait for the bus for a long time without having any idea when the bus will come. Further, people should get a seat in the bus. To ensure this, efficiently and accurately scheduling and provisioning of buses is of paramount importance. In fact, nowadays buses are scheduled as per the need. But these scheduling is being done manually in India. Our survey shows that there are many algorithms proposed in the literature for scheduling and provisioning of buses. There is a need to tailor these algorithms for Indian scenario. We present a brief overview of these algorithms in this paper. We also identify open issues which need to be addressed.

Proximity and community aware heterogeneous human mobility (P-CAHM) model for mobile social networks (MSN)

Journal

Journal NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST

Title of PaperProximity and community aware heterogeneous human mobility (P-CAHM) model for mobile social networks (MSN)

PublisherSpringer

Volume Number220

Page Number137-146

Published YearJanuary 2018

ISSN/ISBN No18678211

Indexed INScopus, UGC List

Abstract

Peer-to-peer opportunistic communication between mobile devices carried by humans without using any infrastructure is largely unexploited. The encounter pattern of the devices depends on human mobility pattern which is governed by human social behaviour. Individuals belong to multiple communities. These social ties significantly affect humans’ movement pattern. Traditional mobility models, such as

A comparative study of various community detection algorithms in the mobile social network

Conference

Title of PaperA comparative study of various community detection algorithms in the mobile social network

Proceeding NameNUiCONE 2015 - 5th Nirma University International Conference on Engineering

PublisherIEEE

Author NameAnkit Didwania

OrganizationNirma University

Year , VenueNovember 2015 , Nirma University

Page Number1-6

ISSN/ISBN No978-1-4799-9991-0

Indexed INScopus

Abstract

Mobile social network is a type of delay tolerant network of mobile devices in which there is no end-to-end path available in advance for communication. It works on the principle of a store-carry-forward mechanism. The community is a very useful property of the mobile social network as humans are social animals and they like to live in a community. Such community structure enables efficient communication between devices carried by humans without any infrastructure. We have analyzed various community detection methods and identified those suitable for mobile social network. We have also analyzed various existing distributed community detection algorithms in mobile social networks based on important parameters like complexity and type of community detected. Such analysis will help in discovering strengths and shortcomings of various existing algorithms. As the mobile social network is self-organizing real network working on highly resource constraint mobile devices, it is necessary to enable each mobile device to detect its own community with minimal information, computation and space requirements. This is a very challenging task and very little work is done in it. So there is an immense opportunity available for research in this area.

Community Aware Heterogeneous Human Mobility (CAHM): Model and analysis

Journal

Journal NamePervasive and Mobile Computing

Title of PaperCommunity Aware Heterogeneous Human Mobility (CAHM): Model and analysis

PublisherElsevier

Volume Number21

Page Number119-132

Published YearAugust 2015

ISSN/ISBN No1574-1192

Indexed INScopus, Web of Science, UGC List

Abstract

Community Aware Heterogeneous Human Mobility Model (CAHM) is based on Heterogeneous Human Walk (HHW) Yang et al. (2010) mobility model. CAHM achieves heterogeneous local popularity as observed in real mobility traces which HHW fails to achieve. It also incorporates following additional properties of human mobility: preference of nearby locations, speed as a function of distance to be traveled and

Scalable micro-blogging in mobile social communities

Conference

Title of PaperScalable micro-blogging in mobile social communities

Proceeding Name2015 IEEE Region 10 Symposium, TENSYMP 2015

PublisherIEEE

OrganizationIEEE

Year , VenueMay 2015 , GIFT City, Gandhinagar

Page Number66-69

ISSN/ISBN No978-1-4799-1782-2

Indexed INScopus

Abstract

Micro-blogging in Mobile Social Network can be very successful because of spatiotemporal properties of user interests and generated messages. Users can follow their interests and receive messages of their interests without getting overwhelmed instead of having to identify and follow users having similar interests. We propose a distributed and scalable micro-blogging protocol...

Viral spread in mobile social network using network coding

Conference

Title of PaperViral spread in mobile social network using network coding

Proceeding Name11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014

PublisherIEEE

OrganizationIEEE Pune Section

Year , VenueDecember 2014 , Pune

ISSN/ISBN No2325-9418

Indexed INScopus

Abstract

Delay tolerant ad hoc network between mobile devices is a promising paradigm which can avoid significant cost of cellular data transfer. Many interesting applications such as peer-to-peer file transfer, micro-blogging etc. are possible on this network. We propose viral spread (Many-to-all broadcast) for such networks. Viral spread can be useful to variety of such applications as well as...

Improved heterogeneous human walk mobility model with hub and gateway identification

Journal

Journal NameLecture Notes in Computer Science

Title of PaperImproved heterogeneous human walk mobility model with hub and gateway identification

PublisherSpringer

Volume Number8314

Page Number469-483

Published YearJanuary 2014

ISSN/ISBN No03029743

Indexed INScopus, UGC List

Abstract

Heterogeneous Human Walk (HHW) model [1] mimics human mobility and is based on two important properties of social network: overlapping community structure and heterogeneous popularity. But, it does not produce heterogeneous local popularities of nodes in a community as observed in real mobility traces. Further, it does not consider Levy walk nature of human mobility which has significant impact on performance of protocols. We propose Improved Heterogeneous Human Walk (IHHW) model that correctly produces heterogeneous local popularities and also incorporates Levy walk nature of human mobility within overlapping community structure. As popular nodes are very useful for data dissemination, we also propose theoretical methods to identify popular nodes within community (hubs) and in entire network (gateways) from overlapping community structure itself. These nodes can act as hubs/gateways till overlapping community structure does not change. Our methods eliminate the need to identify and change these nodes dynamically when network is operational.

A survey on MPEG-4 streaming using network coding in wireless networks

Conference

Title of PaperA survey on MPEG-4 streaming using network coding in wireless networks

Proceeding Name3rd Nirma University International Conference on Engineering, NUiCONE 2012

PublisherIEEE

Author NameRahul Shrimali

OrganizationNirma University

Year , VenueDecember 2012 , Nirma University

ISSN/ISBN No2375-1282

Indexed INScopus

Abstract

he streaming of real-time audio/video data is very challenging because of the time-varying and unreliable wireless channels, video content characteristics, limited bandwidth, dynamic topology, heterogeneous and distributed environment and high packet loss rate because of wireless interference and channel fading. Because of such open issues present in wireless networks, it is very difficult to satisfy the requirements of audio/video streaming applications such as low delay, low packet loss, jitter control etc. In such scenarios of opportunistic networks where real time data is being streamed from server node to client node, Network Coding and its variants can be used by such nodes to meet different requirements. Network coding changes the role of such multimedia nodes from store and forward to encode data packets. Encoding process includes mathematical operations on data packets. This survey paper has considered number of speculative and practical approaches and cases where network coding or its variant applied either fully or partially on multimedia traffic with the aim to improve performance and to provide protection against packet losses. This review has mainly focused on the opportunity of performance enhancement of MPEG-4 traffic over Wireless Network using Random Linear Network Coding (RLNC) with Multi Generation Mixing (MGM). Using Multi Generation Mixing, packets of greater importance has got more protection, less loss, more reconstruction and recovery of real time data.

Performance enhancement of multimedia traffic over wireless ad hoc networks using network coding

Conference

Title of PaperPerformance enhancement of multimedia traffic over wireless ad hoc networks using network coding

Proceeding Name3rd Nirma University International Conference on Engineering, NUiCONE 2012

PublisherIEEE

Author NameTwisa Mehta

OrganizationNirma University

Year , VenueDecember 2012 , Nirma University

Page Number1-6

ISSN/ISBN No2375-1282

Indexed INScopus

Abstract

Network coding is a new area of networking, in which data is processed inside the network to increase throughput, to balance traffic load and to save bandwidth of a network. Network Coding performs well in lossy wireless networks in both multicast and broadcast scenarios. Even in wireless networks with low density of nodes network coding performs well using its multi-copy packet transmission scheme. Because of Wireless Ad hoc Network's ease in configuration and quick deployment, such networks are widely preferred for instant data transmission for many applications including multimedia. But the available bandwidth for Wireless Ad hoc Networks fails to meet the requirements of multimedia video data transmission and results in packets loss, delay as well as decreases the quality of transmitted multimedia data. So, to overcome Wireless Ad hoc Networks limitations for multimedia video (video considered in MPEG 4 format) transmission, a variant of Network Coding that is Random Linear Network Coding with Multi Generation Mixing is employed by network nodes. So, in this work, each sender node encodes packet using RLNC with Multi Generation Mixing (MGM) with the aim to provide more protection to I (Intra frame of MPEG 4 video traffic) frames in order to minimize multiplicative loss by incurring slight delay in transmission. In this work, simulations are carried out by changing protocol parameters and its effects on network parameters and performance parameters are analyzed. Simulation results confirm with intuition that the performance get enhanced using Random Linear Network Coding with MGM.

Review on variants of network coding in wireless ad-hoc networks`

Conference

Title of PaperReview on variants of network coding in wireless ad-hoc networks`

Proceeding NameNirma University International Conference on Engineering: Current Trends in Technology, NUiCONE 2011

PublisherIEEE

Author NameJitendra Bhatia

OrganizationNirma University

Year , VenueDecember 2011 , Nirma University

ISSN/ISBN No2375-1282

Indexed INScopus

Abstract

Network coding is a technique in which node is allowed to combine and encode one or more input packets into encoded packets instead of directly forwarding them. It increases throughput and delivery ratio. In this paper, we review basic linear network coding variants with their performance benefits and theoretical results. In practical setting, linear network coding requires central authority to control generation of meaningful encoding coefficients and for coordination between the nodes of network. In wireless network, due to dynamic nature of nodes and heterogeneity of network, centralized approach is not suitable. So, distributed approach should be used. We reviewed distributed linear network coding technique named as Random Linear Network Coding (RLNC). We also reviewed RLNC variants called Generation-by-Generation RLNC and RLNC with Multi Generation Mixing (MGM). We also reviewed the options to recover the lost encoded packets in networks where losses prevent efficient propagation of sender packets. MGM increases the decodable rate of encoded packets. We compared the performance of Generation-by-Generation Network Coding and Network coding with MGM.

Survey on multimedia transmission using network coding over wireless networks

Conference

Title of PaperSurvey on multimedia transmission using network coding over wireless networks

Proceeding NameSurvey on multimedia transmission using network coding over wireless networks

PublisherIEEE

Author NameTwisa Mehta

OrganizationNirma University

Year , VenueDecember 2011 , Nirma University

Page Number1-6

ISSN/ISBN No2375-1282

Indexed INScopus

Abstract

These days the growth of multimedia applications (e.g. VOIP, teleconferencing etc) over Wireless Networks is on its peak and will further increase with the time. The available bandwidth for Wireless Networks fails to meet the requirements which result in high packet loss of multimedia data, delay in transmission and decreases the quality of multimedia applications. So many approaches are proposed for multimedia streams over Wireless Networks to deal with packet loss and delay over time varying bandwidth. Network Coding is one of the many proposed approaches. This approach works well for transmission of multimedia traffic in a distributed lossy environment where only partial or uncertain information is available for decision making. Network Coding technique allows an intermediate node to combine the data (packets) from different input links and sends encoded data on its output links. So, by employing appropriate variant of Network Coding scheme at each intermediate node (linear combination of input data with the concept of generation) can achieve the network capacity. This paper presents the survey of various papers in which a Network Coding technique is applied on multimedia transmission over Wireless Networks.

MIDTONE: Multicast in delay tolerant networks

Conference

Title of PaperMIDTONE: Multicast in delay tolerant networks

Proceeding Name4th International Conference on Communications and Networking in China, CHINACOM 2009

PublisherIEEE

Author NameZunnun Narmawala

OrganizationXidian University and Xi'an Jiaotong University.

Year , VenueAugust 2009 , Xian, China

Page Number1-8

ISSN/ISBN No978-1-4244-4337-6

Indexed INScopus

Abstract

Delay Tolerant Networks (DTN) are sparse ad hoc networks in which no contemporaneous path exists between any two nodes in the network most of the time. Due to non-availability of end-to-end paths, multicast protocols of traditional networks fail in DTN because they try to find connected multicast graph between source and destination nodes before forwarding data packets. Routing protocols proposed for DTN follow `store-carry-forward' paradigm in which two nodes exchange messages with each other only when they come into contact. In the process, `single-copy' schemes maintain only one copy of the message in the network at any time and the forwarding node waits for the pre-determined next node to transfer the message. `Multi-copy' schemes spread more than one copy of the message opportunistically when nodes come into contact rather than waiting for pre-determined next node. While multi-copy schemes improve chances of delivery and work well even without any knowledge of the network, communication overhead and buffer occupancy are quite high for these schemes. We propose multi-copy routing protocol for multicasting in DTN called ldquoMulticast in Delay Tolerant Networks (MIDTONE)rdquo which uses `network coding' to reduce this overhead without compromising performance. Network coding is a mechanism in which nodes encode two or more incoming packets and forward encoded packets instead of forwarding them as it is. We also propose three novel packet purging schemes to drain packets out of the network which takes advantage of features of network coding to increase buffer efficiency. As simulation results suggest, our protocol achieves significantly less delay to deliver all the packets in infinite buffer case and higher delivery ratio in finite buffer case compared to non-network coding based multi-copy scheme. We also provide empirical relation to estimate optimal generation size for given network and performance parameters.

Effect of network coding on buffer management in wireless sensor network

Conference

Title of PaperEffect of network coding on buffer management in wireless sensor network

Proceeding NameISSNIP 2008 - Proceedings of the 2008 International Conference on Intelligent Sensors, Sensor Networks and Information Processing

PublisherIEEE

Author NameSunil Jardosh

OrganizationThe University of Melbourne

Year , VenueDecember 2008 , Sydney, Australia

ISSN/ISBN No978-1-4244-3822-8

Indexed INScopus

Abstract

In resource constrained wireless sensor networks (WSN), it is highly desirable to make efficient use of available buffer. Hence for the WSN designed for the monitoring applications, buffer management is a key requirement at sensor nodes. We have proposed an efficient buffer management scheme based on random linear network coding as the in-network processing on data packets. With buffer allocation from source to sink path, our scheme distributes the buffer requirement among the nodes on the path. Further in the case of a packet loss, the proposed scheme recovers packet from available information distributed on the path from source to sink. We have compared our scheme with conventional buffer management scheme. Results show that network coding based buffer management scheme has better buffer availability with less redundancy and reduced loss recovery cost.

Survey of applications of network coding in wired and wireless networks

Conference

Title of PaperSurvey of applications of network coding in wired and wireless networks

Proceeding NameProceedings of the 14th National Conference on Communications

Author NameZunnun Narmawala

OrganizationIIT Bombay

Year , VenueFebruary 2008 , IIT Bombay

Abstract

We review the basic works in the area of network coding and present a detailed survey of applications of network coding in network problems. It is shown that both in wired and wireless networks, multicast and broadcast protocols perform better with network coding. Even in unicast applications, network coding based protocols perform as well as the protocols without network coding. We also survey the applications of network coding in the domains of Peer-to-Peer Networks, Delay Tolerant Networks and Wireless Sensor Networks. It is apparent from the results that innovative use of network coding can improve the performance of a variety of applications in these domains. Finally, we also suggest a number of interesting open problems in these domains where network coding can be used.