Amit Singh

Amit Singh
University of Essex · School of Computer Science and Electronic Engineering

About

312
Publications
30,373
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,500
Citations
Introduction
Amit Singh currently works at the School of Computer Science and Electronic Engineering, University of Essex.

Publications

Publications (312)
Article
Full-text available
Digital images are a popular source of information and play an important role in several applications. However, the large amount of available data in the form of images causes serious security concerns. Although digital images are widely available, the storage of these images requires a large amount of data. Compression is an efficient way to reduc...
Article
Full-text available
Wheat leaf rust caused by Puccinia triticina Eriks is an important disease that causes yield losses of up to 40% in susceptible varieties. Tetraploid emmer wheat (T. turgidum ssp. Dicoccum), commonly called Khapli wheat in India, is known to have evolved from wild emmer (Triticum turgidum var. dicoccoides), and harbors a good number of leaf rust re...
Article
Full-text available
Electromagnetic (EM) lens antenna designs using cascaded metasurfaces for gain enhancement and beam steering applications are proposed. Two different lens aperture designs are proposed and populated with aperiodic unit cells of size 0.2λo × 0.2λo. In lens Design 1, the unit cells of different phases are distributed in concentric circular zones, whe...
Article
Full-text available
With the proliferation of the use of the Internet and social media, the digital media industry has grown enormously in recent years. However, this has brought some challenges, including issues of content security and copyright violation. In this paper, we propose a fusion-based secure watermarking algorithm that we have named “FuSIW”. This uses a h...
Article
The study investigates the effect of psychological biases on investment decision-making in the financial market with particular reference to the initial public offerings (IPO) market in India. The research is conducted by administering a self-completion questionnaire to measure selected psychological biases. Using the structural equation modelling...
Article
Full-text available
In this paper, a substrate integrated waveguide (SIW)‐based circularly polarized (CP) self‐diplexing antenna is proposed and discussed. The proposed antenna makes use of an elliptical slot in the metallic ground plane which is excited with the help of two separate microstrip feed lines, placed face‐to‐face with each other. This arrangement produces...
Article
Full-text available
Recently, medical image encryption has attracted many researchers because of security issues in the communication process. The recent COVID-19 has highlighted the fact that medical images are consistently created and disseminated online, leading to a need for protection from unauthorised utilisation. This paper intends to review the various medical...
Article
Strata control problems needs special attention during coal extraction by different underground mining methods. It becomes a key issue when we plan for high production, productivity and safety of miners and machineries. Fall of roof and sides continued to remain the sole reason of fatal accidents in underground mines. There is a need to check the d...
Chapter
Full-text available
To protect the copyright of the digital media, a robust watermarking algorithm based on image fusion, integer wavelet transform (IWT)-singular value decomposition (SVD) and hybrid of optimization scheme is developed. The algorithm considers IWT to decompose the carrier image into non-overlapping sub-bands, and then SVD is performed on lower frequen...
Article
Full-text available
With increasing interest in multi-core systems, such as any communication systems, infra-structures can become targets for information leakages via covert channel communication. Covert channel attacks lead to leaking secret information and data. To design countermeasures against these threats, we need to have good knowledge about classes of covert...
Article
Regulations are put in place in the capital markets to protect the interests of investors while promoting companies to actively participate in the capital markets. This multidisciplinary study concentrates on analysing the impact of one such regulation, based on entry norms, on the initial returns of book-built IPOs in the presence of firm-related...
Article
Full-text available
A dual-band 2×1 multiple-input-multiple-output (MIMO) antenna based on substrate integrated waveguide (SIW) cavity for both satellite (in K-band) and 5G applications is proposed. Initially, the SIW cavity consisting of metallic vias on all four sides is implemented. For MIMO configuration, this cavity is divided into two smaller SIW cavities using...
Article
Full-text available
Evolution of microgrids and distributed generation mainly with solar Photo-Voltaics has shifted the centralised electrical power generation paradigm in to load based local generation. The distributed generation is supporting the utility grids and industries with cogeneration power system during peak load hours and also operates either in island mod...
Article
Full-text available
This article investigates the designing of tunable laterally and orthogonally placed MIMO antennas with enhanced isolation for THz applications. The tunability is achieved by varying the chemical potential of trapezoidal graphene-based patches loaded over the metallic patch antennas. Mutual coupling between the laterally placed MIMO antennas is mit...
Article
In the Internet age, medical image security is very important in the field of e-healthcare. Several encryption algorithms have been developed, but they either do not achieve high security or they are computationally overhead for medical images, and thus may not be suitable for e-healthcare applications. In this paper, we develop a medical image enc...
Article
Full-text available
With the widespread adoption of smart devices and high-speed networks, investigators are focusing on securing digital image applications, such as those on social media, in healthcare, education, business and defence, from unauthorised use. The aim of this paper is to outline various encryption techniques, especially for digital images, and their me...
Article
Full-text available
Most modern mobile cyber-physical systems such as smartphones come equipped with multi-processor systems-on-chip (MPSoCs) with variant computing capacity both to cater to performance requirements and reduce power consumption when executing an application. In this paper, we propose a novel approach to dynamic voltage and frequency scaling (DVFS) on...
Article
The present work expects to explore the application effect of biologically inspired Plasticity Neural Network in the industrial intelligent dispatching energy storage system, and highlight the intelligence and fault detection performance of the control system. To address the faults in intelligent dispatching energy storage system, the present work...
Chapter
Full-text available
The demand for renewable energy resources (RER) is increasing globally due to rapid industrialisation and faster exhaustion of natural resources. RERs like solar photovoltaics are greatly contributing their share and expected to go up further in coming days. In this chapter, a large‐size grid‐connected solar‐PV power plant is selected for a case st...
Article
Recently, machine/deep learning has become a promising solution for some intelligent tasks. It can be actively used for watermarking but less so for conventional tasks such as prediction, classification and regression. This article presents a comprehensive study on watermarking using trending technologies, such as artificial intelligence, machine l...
Article
Full-text available
Food waste is an important social and environmental issue that the current society faces, where one third of the total food produced is wasted or lost every year while more than 820 million people around the world do not have access to adequate food. However, as we move towards a decentralized Web 3.0 enabled smart city, we can utilize cutting edge...
Article
Four-chamber (FC) views are the primary ultrasound (US) images that cardiologists diagnose whether the fetus has congenital heart disease (CHD) in prenatal diagnosis and screening. FC views intuitively depict the developmental morphology of the fetal heart. Early diagnosis of fetal CHD has always been the focus and difficulty of prenatal screening....
Article
Cyber-Physical Systems (CPS) can significantly transform our daily lives as it is an emerging area for future innovative services. CPS has the inherent features and benefits of using available networks such as wireless sensor networks, following generation networks, and the internet. However, network disconnection is a concern in traditional networ...
Article
Full-text available
Memory management of the hyperspectral image sensor is a challenging issue. The existing hyperspectral image compression schemes play a dominant role in minimizing the cost of storage equipment and bandwidth for data transmission for resource constraints onboard hyperspectral image sensors. Traditionally many transform-based set partition hyperspec...
Article
Full-text available
In this paper, a substrate integrated waveguide (SIW) based self-triplexing antenna (STA) with non-linear replicated hybrid slot (NLR-HS) is presented. To the author’s best knowledge, the concept of NLR is the first of its kind in the literature used for obtaining self-triplexed operation. Initially, the SIW cavity is loaded by a hexagonal slot mer...
Conference Paper
Full-text available
In this paper, a compact substrate integrated waveguide (SIW) based self-diplexing slot antenna for 25/28 GHz fifth generation (5G) applications is presented. The SIW cavity is loaded with a 7r-shaped asymmetric slot that produce two distinct frequency bands and hence, self-diplexing antenna (SDA) characteristics with low frequency-ratio. The place...
Article
The analysis of molecular cavities, where ligands interact with protein structures, plays a critical role in protein structure-based drug design. However, it is a challenge because of the ambiguous definition of the cavity boundaries in most cavity detection methods. The cavities are mostly calculated by input parameters, which are difficult for us...
Article
Nowadays, there is an increasing tendency to fuse multi-modal medical image due to the high diagnostic accuracy and assessment. However, the distribution of these images and more generally, health records may bring serious copy-violation issues in healthcare applications. Further, a massive amount of electronic health records is uploaded on the clo...
Conference Paper
Full-text available
In this paper, a compact substrate integrated waveg- uide (SIW) based self-diplexing slot antenna for 28/38 GHz fifth generation (5G) applications is presented. The SIW cavity is loaded with three U-shaped slots that produce two distinct frequency bands and hence, self-diplexing antenna (SDA) char- acteristics. The placement of three different slot...
Preprint
Full-text available
Colour images have been widely used in many aspects of life; however, copyright violation issues related to these images motivate research efforts. This paper aims to develop an enhanced watermarking algorithm for producing a watermarked image using hybrid optimisation with high imperceptibility and robustness. The algorithm is based on spatial and...
Article
Full-text available
Industries with co-generation plants face unprecedented problems due to penetration of renewable energy systems such as solar power on their existing distribution networks. These problems are caused by intermittent solar power. To this end, this paper provides a detailed investigation of the effects due to sudden changes in solar power on an existi...
Article
Full-text available
The academia and industry have been pursuing network-on-chip (NoC) related research since two decades ago when there was an urgency to respond to the scaling and technological challenges imposed on intra-chip communication in SoC designs. Like any other research topic, NoC inevitably goes through its life cycle: A. it started up (2000-2007) and qui...
Article
The purposes are to investigate the personalized situation adaptive Human-Computer Interaction (HCI) in the COVID-19 context, achieve accurate predictions for HCI in different urban transportation situations, and solve the urban intelligent transportation problems. Problems of Human-Vehicles-Interaction (HVI) in context awareness are analyzed. Hist...
Article
The World Energy Council, in its 2019 World Energy Scenarios Report, advised policymakers to identify innovative opportunities for the integration of renewable energy resources into existing electrical power systems to achieve a fast and affordable solution. However, large-scale industries with cogeneration units are facing problems in handling the...
Article
Full-text available
Vehicular delay-tolerant networks follow a store–carry–forward mechanism to overcome the state of broken links between source and destination, which is crucial for autonomous vehicle networks. These networks depend upon the mobility of vehicular-relay nodes, which can adopt the store–carry–forward arrangement and provide consent to utilize their re...
Article
Full-text available
With the widespread growth of medical images and improved communication and computer technologies in recent years, authenticity of the images has been a serious issue for E-health applications. In order to this, various notable watermarking techniques are developed by potential researchers. However, those techniques are unable to solve many issues...
Conference Paper
Modern embedded systems need to cater for several needs depending upon the application domain in which they are deployed. For example, mixed-critically needs to be considered for real-time and safety-critical systems and energy for battery-operated systems. At the same time, many of these systems demand for their reliability and security as well. W...
Conference Paper
Full-text available
In the present era of Industrial Revulsion 4.0, the productivity and human life on earth, cannot be imagined without electricity. Today’s electrical power system is facing numerous challenges which includes age-old equipment, continuous growing demand for electricity even from remote areas and conservation of natural resources. Microgrid with Distr...
Article
Full-text available
In this paper, we propose DRLTrack, a framework for target tracking with a collaborative deep reinforcement learning (C-DRL) in Edge-IoT with the aim to obtain high quality of tracking (QoT) and resource-efficient performance. In DRLTrack, a huge number of IoT devices are employed to collect data about a mobile target. One or two edge devices coord...
Article
With the construction and improvement of 5G infrastructure, more devices choose to access the Internet to achieve some functions. People are paying more attention to information security in the use of network devices. This makes lightweight block ciphers become a hotspot. A lightweight block cipher with superior performance can ensure the security...
Article
Full-text available
Multilabel scene classification has emerged as a critical research area in the domain of remote sensing. Contemporary classification models primarily emphasis on a single object or multiobject scene classification of satellite remote sensed images. These classification models rely on feature engineering from images, deep learning, or transfer learn...
Article
Full-text available
Landslide, one of the most critical natural hazards, is caused due to specific compositional slope movement. In the past decades, due to inflation of urbanized area and climate change, a compelling expansion in landslide prevalence took place which is also termed as mass/slope movement and mass wasting, causing extensive collapse around the world....
Article
Neural encoder–decoder architectures have been used extensively for image captioning. Convolutional Neural Networks (CNN) and Recurrent Neural Networks (RNN) are popularly used in encoder and decoder models. Recurrent Neural Networks are popular architectures in natural language processing used for language modeling, but they are sequential in natu...
Article
Full-text available
Side-channel attacks remain a challenge to information flow control and security in mobile edge devices till this date. One such important security flaw could be exploited through temperature side-channel attacks, where heat dissipation and propagation from the processing cores are observed over time in order to deduce security flaws. In this paper...
Conference Paper
Full-text available
Distribution generation is greatly supporting the utility grids in balancing the power demand and maintaining the power quality. The main contributors of distributed generation are renewable energy resources such as wind and photovoltaics. However the increased penetration levels of these renewable energy resource, which are intermittent, causing c...
Chapter
In this intelligent era, vehicles are exploited for a different mobile sensor activity. Vehicular delay tolerant network is the application of delay tolerant network. Nowadays, when conventional network does not work or fails in the emergency situation, vehicular delay tolerant networks provide solutions. Vehicular delay tolerant networks is very u...
Article
Full-text available
Food safety is an important issue in today’s world. The traditional agri-food production system does not offer easy traceability of the produce at any point of the supply chain, and hence, during a food-borne outbreak, it is very difficult to sift through food production data to track produce and the origin of the outbreak. In recent years, the blo...
Article
Full-text available
Due to the remarkable development of Internet technologies, a great deal of valuable digital data is now transmitted over public networks. To guarantee the security of this data during the transfer process, the authentication of its integrity is extremely important. This paper introduces a robust and secure dual‐watermarking‐based fusion of waterma...
Article
Full-text available
Eliminating stray and suppressing unwanted radiation in a high frequency circuit is difficult. It becomes a challenge to achieve an ultra-wide absorption band in a thin-single-layer microwave absorber. In this article, a novel polarization-independent, ultra-wideband, light-weight, thin microwave absorber has been investigated numerically and exper...
Article
Despite of a controversial practice, having the key components of a product undergo accelerated aging has been a very effective approach for planned obsolescence. All previous studies on planned obsolescence merely focused on the aging process itself; however, if a malfunctioned product due to aging is still under its warranty, the manufacturer suf...
Article
In this study, the transmissibility estimation of novel coronavirus (COVID-19) has been presented using the generalized fractional-order calculus (FOC) based extended Kalman filter (EKF) and wavelet transform (WT) methods. Initially, the state-space representation for the bats-hosts-reservoir-people (BHRP) model is obtained using a set of fractiona...
Article
The thermal covert channels (TCC's) in many-core systems can cause detrimental data breaches. In this paper, we present a three-step scheme to detect and fight against such TCC attacks. Specifically, in the detection step, each core calculates the spectrum of its own CPU workload traces that are collected over a few fixed time intervals, and then i...
Preprint
Full-text available
div> Food safety is an important issue in today’s world. Traditional agri-food production system doesn’t offer easy traceability of the produce at any point of the supply chain, and hence, during a food-borne outbreak, it is very difficult to sift through food production data to track produce and origin of the outbreak. In recent years, blockchain...
Article
In this communication, the design of a dual-band and low-profile SIW cavity-backed slot antenna operating at K-band and Ka-band has been proposed to expand the Impedance bandwidth (IBW) of the antenna. The dual-band antenna consists of the SIW cavity with two parallel slots etched on the conductor’s ground plane. To obtain a dual-band, higher-order...