Ajay Prasad

Ajay Prasad
  • Ph.D M.Tech
  • Professor at University of Petroleum and Energy Studies

About

63
Publications
128,181
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
395
Citations
Introduction
Academician in the line of Engineering and research.... Dr. Ajay Prasad's Interest areas are research in the areas of Cyber Security, Cyber Forensics and IoT Security and IoT Standards. Currently Dr. Prasad is working in the area of IoT Security and Projects Pertaining IoT and Cyber Security.
Current institution
University of Petroleum and Energy Studies
Current position
  • Professor
Additional affiliations
August 2013 - present
University of Petroleum and Energy Studies
Position
  • Professor (Associate)
June 2012 - July 2013
Sharda University
Position
  • Professor (Assistant)
April 2004 - September 2009
Mody University of Science and Technology
Position
  • Lecturer

Publications

Publications (63)
Chapter
Full-text available
This chapter explores the potential of artificial intelligence (AI) to revolutionize safety assessment in the cosmetics industry, with a specific focus on hair care products. By drawing parallels to its success in predicting the dangers of novel substances in medicine, the chapter argues for AI’s ability to ensure more comprehensive and efficient s...
Article
Full-text available
p class="ICST-abstracttext"> In an era dominated by digital technology, the imperative of securing patient data cannot be overstated. The deployment of advanced protective measures, including encryption, firewalls, and robust authentication protocols, is an absolute necessity when it comes to preserving the confidentiality and integrity of sensitiv...
Chapter
IoT is making our day-to-day life easy by connecting us to the web which in fact enhance the standard of living. IOT plays a crucial part in our daily life ranging from small devices to massive devices. However, IoT is also quite susceptible to several threats. Due to the increased likelihood and ease with which malicious individuals can target IoT...
Chapter
The IoT is a rapidly growing field that enables communication with various devices and objects. It allows for the exchange of information within physical objects and virtual applications, regardless of location or time. The fundamental idea behind IoT is to establish autonomous connections between real objects and applications, enabling the transfe...
Chapter
Full-text available
The Internet of Things (IoT) has become integral to our daily lives. IoT is tightly governed by the principles of communication and the technologies around it. Thus an in-depth discussion on Communication Technologies and Security Challenges in IoT is required for a professional to design and develop IoT applications. The core aspects that need ela...
Chapter
Service Set Identifiers (SSID) in WLANs have been invariably present since the adoption of IEEE 802.11 WLANs. Mostly, SSIDs meant to be just a name that end nodes connect to as Wi-Fi. However, if we bring in some smart mechanism into the SSIDs and their semantics, more useful adoptions can be made. If an urban zone is scanned for the available WLAN...
Chapter
Unmanned aerial vehicles (UAVs) are considered to be recent developing technology having ability of making various basic public and private processes better. UAVs help in speeding up the recovery and rescue activities and also helpful in delivery systems. Development of UAV systems by traditional techniques needs large amount of effort, time, and c...
Article
For enterprises of all sizes and types in the IT sector, data security is essential. Data security is the process of giving databases and websites secure data privacy protections and preventing unauthorized data access. By encrypting digital data, software/hardware, and hard drives, unauthorized individuals or hackers can only access unreadable mat...
Article
Full-text available
Rapid technological advancements are altering people’s communication styles. With the growth of the Internet, social networks (Twitter, Facebook, Telegram, and Instagram) have become popular forums for people to share their thoughts, psychological behavior, and emotions. Psychological analysis analyzes text and extracts facts, features, and importa...
Chapter
Covid Pandemic had devastating effects on the human population, resulting in fatalities and social and economic losses. The exponential behaviour of the spread of the virus in recent times has led to assertive impacts on the financial markets all over the world; India is no exception. With the agglomeration of more cases throughout the country; on...
Article
This paper has classified the X-rays images into COVID-19 and normal by using multi-model classification process. This multi-model classification incorporates Support Vector Machine (SVM) in the last layer of VGG16 Convolution network. For synchronization among VGG16 and SVM we have added one more layer of convolution, pool, and dense between VGG16...
Article
Full-text available
Monitor mode packet capturing of WLAN is used to derive Access points and devices in the range for localization or occupancy purposes. The general modality of capturing and analysis in almost all available studies is to capture packets by being static (STT) at a location and indoors. In STT mode, the beacon and probe packets extract insights about...
Article
The Coronavirus Disease 2019 (COVID-19) outbreak has a devastating impact on health and the economy globally, that’s why it is critical to diagnose positive cases rapidly. Currently, the most effective test to detect COVID-19 is Reverse Transcription-polymerase chain reaction (RT-PCR) which is time-consuming, expensive and sometimes not accurate. I...
Article
The human emotions are very dynamic in nature, and get transformed from one mood to another rapidly. Emotion detector systems are available to identify the real-time emotions based on various external parameters like face expressions, lip movements, choice of words in speech and so on. Many applications were developed over and over again that are c...
Chapter
Cloud computing can be understood as an environment given to user from any application residing online stored in cloud server and executed using browser. Hence, it is important to maintain user data proficiently. This paper discusses data mining techniques and algorithms for cloud computing. This paper also discusses the necessity of data mining an...
Article
Complementary and Alternative Medicine (CAM) researchers' committee stated a term called Biofield in 1994. The previous study shows the substantial evidence of its existence and its impact on the health and thought process of an individual. Due to the lack of its scientific documentation and examination, usage and belief of biofield in various doma...
Article
Full-text available
Energy is associated with anything and everything around us and can be transferred, transformed but cannot be destroyed. Many existing theories in physics like quantum physics, metaphysics, and electromagnetism give rise to the thought for the existence of an invisible field of bio-energy, in living things. Every living being, at its atomic level,...
Article
Full-text available
Human body structure is very complex, which contains various sub-components and makes it a complicated system. There are various activities performed by humans which involves both mental and physiological activities. Additionally, to monitor human health conditions various waves are examined like brainwaves, heart waves and others, which are highly...
Chapter
Discusses various Recent Developments and Methods of making Digital Signatures
Article
The human body has enclosed with various mysteries. The research on human life brings out various interesting factors and characteristics, which has attracted various researches. One of the characteristics is human Bio-Field, which helps in identifying ones' health, mental condition, thought process and other status. Hence, interpretation of human...
Article
Improve Basic Background Subtraction Methods for Object Detection in Video Surveillance System
Article
Cellular Logic Array Processing and Background Subtraction Methods are in combination can be used to improve object detection in videos
Article
This paper evaluates different “Object Motion” detection techniques using edge based background subtraction of frames in video streams, with existing edge-based methods, such as Sobel and Canny. It also implements edge-based framework for “Motion Labeling” of edges by using Cellular Logic Array. The main limitations of the existing methods are that...
Article
Assuring QoS guarantees for WLANs has been a major issue for a long time. Generalized approaches such as Queuing, buffering, connection admission control, etc., as used in networking theory are not fully satisfactory solutions in WLANs. The concept of a scheduler is not specified by the IEEE standard unlike mobile communication networks such as LTE...
Article
Full-text available
Every living and non-living object emits electromagnetic, ultraviolet and visible radiations from the body. Human Aura/Biofield is an energy field that exists around the human body, which helps to connect not only with another human being but also with the surrounding environment. There are various proposed hardware equipment’s that claims to captu...
Article
The Block cipher AES is a symmetric key cryptographic standard used for transferring block of data in secure manner for server based communication networks, SCADA systems for Oil refinery, Oil and Gas Pipe Lines, and Smart Grids based applications. High level security of data transfer needs long key size i.e. 256 bits, analysis of certain ideas of...
Conference Paper
This paper proposes a novel data mining framework for object detection in video surveillance system using cellular logic array for replacing contemporary, slow and unreliable techniques of video processing with faster and robust techniques, making surveillance system effective for real time video analytic.
Conference Paper
Cyber-attacks from terrorist, national enemies, disgruntled employees are on the rise now on an Oil Refineries, on shore petroleum fields, off-shore Platforms, Oil and Gas Pipe Lines which will have a catastrophic impact on oil production and in turn on economy of the country, it can also cause serious damage to the environment living being, and ev...
Conference Paper
Emotion expression is an essential function for daily life that can be severely affected some psychological disorders. In this paper we have identified nine motions. We have extracted more than 20 features from natural speech. In this work database used are SAVEE(Surrey audio visual expressed emotion) and BERLIN. The overall experimental results re...
Article
Full-text available
Objectives: In this paper, the performance parameters in the WLANs are discussed and we evaluate the superior performance of the new IEEE 802.11ac standard with respect to 802.11n. Methods/Analysis: NS3 is an open source network simulator, the latest version of which (ns-3.24.1) has been appended with features to support 802.11ac. Simulations are p...
Article
Full-text available
Considering the most often talked about security risks in cloud computing, like, security and compliance, viability, lack of transparency, reliability and performance issues. Bringing strong auditability in cloud services can reduce these risks to a great extent. Also, auditing, both internally and externally is generally required and sometimes una...
Conference Paper
So far, monitoring in cloud computing mostly tends to focus only on QoS and Service Level Agreements. However, if we tend to monitor user activities on clouds we have to look at a centralized approach. Having a centralized monitoring system in cloud computing is becoming more and more necessary, it is worthwhile to address this kind of monitoring i...
Article
Full-text available
A Centralized Monitoring as a Service (CMaaS) is a desired and necessary feature to be included in cloud computing. One of the concerns in having CMaaS from both user and provider’s perspectives would be that of performance implications. Carrying out a performance analysis thus, becomes an important task before suggesting a MaaS solution. A straigh...
Article
Full-text available
The aspect of virtualization and large scale distribution has brought forward the cloud computing phenomenon. Despite its popularity, most of the enterprises are still circumspect in getting into clouds completely. The major part of this circumspection owes to the factors of identity and access management, monitoring, auditing and reporting. The tr...
Conference Paper
Full-text available
Recently, research interest has increased in the design, development, and deployment of mobile agent systems in a wireless sensor network (WSN). Mobile agent systems employ migrating codes to facilitate flexible application re-tasking, local processing, and collaborative signal and information processing. This provides extra flexibility, as well as...
Article
Full-text available
Most of the services viewed in context to grid and cloud computing are mostly confined to services that are available for intellectual purposes. The grid or cloud computing are large scale distributed systems. The essence of large scale distribution can only be realized if the services are rendered to common man. The only organization which has exp...
Article
Full-text available
To date publish of a giant social network jointly from different parties is an easier collaborative approach. Agencies and researchers who collect such social network data often have a compelling interest in allowing others to analyze the data. In many cases the data describes relationships that are private and sharing the data in full can result i...
Article
Full-text available
Services oriented grids will be more prominent among other kinds of grids in thepresent distributed environments. With the advent of online government servicesthe governmental grids will come up in huge numbers. Apart from commonsecurity issues as in other grids, the authorization in service oriented grids facescertain shortcomings and needs to be...

Questions

Questions (8)
Question
Say, I have a data in form of:
Estimated Test Results
Time Population
-------- ---------
1 x1
2 x2
3 x3
...
actual proportional values
Time Rated density(between 0-5)
-------- ---------
1 2
2 3
3 1
4 5
...
how to compare the accuracy of the results?
one way can be a heat map. However, it would be not giving a measurement of variance and confidence intervals or mean relative errors etc.
Thanks in advance for your comments.....!
Question
Authentication in IoT systems are vastly insecure. Mostly the problems lies on its open ended and probable untrustworthy nodes. Also, the need for a lighter authentication mechanism will always be welcomed. The fact that IPSec limitations can also be overcome and Implementing authentication using block chain technique may give it more freedom. Please suggest your insights and ideas. Please give your insights. We can work together for a project.
Question
Mostly IoT in smart cities are perceived as for commercial goodness. Why? are we making cities smart businesses or are we intend to take these city into being a dweller friendly? Please give your ideas. We can take it further.
Question
These days many attackers are using mechanisms of making fraudulent phone calls (vishing) to collect vital information of people and then use them to trace their credentials and finally hack their credit and debit cards for money thefts. Another very prevalent ways of web application hacking is through phishing. There prevalent ways to tackle these are mostly precautionary, however, these precautions are mostly non-waranted from a lay man or a non-commoner or a less versed cyber user. We need more automated ways of handling them.
Question
IoT is a new trend in Computing. In IoT, deliverance will be involving devices which will be either as a end node or an intermediary node, they might be as a sensor node or a sync node or even a monitor. The wide involvement of ubiquitous computing over internet will certainly also involve points of evidence useful in forensics. Let us discuss what are those areas which will become forensically important in all cyber cases hereforth.
Question
As we all know a major challenge in adoption of cloud as an organization (user) is that of auditing usage of cloud services. This is important because mostly cloud usage is identified by pay as you go. So far , what I know is that the auditing support is given by the provider. but then, it will be appropriate that the logs or audit information provided by the service providers can be verified for legitimacy and correctness at the organization. Please suggest if this kind of facility is available somewhere? Can we implement the verifiable auditing in cloud services?

Network

Cited By