Dilip Kumar Shaw

Dilip Kumar Shaw
National Institute of Technology, Jamshedpur | NIT Jamshedpur · Department of Computer Applications

Doctor of Philosophy

About

12
Publications
2,119
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22
Citations

Publications

Publications (12)
Chapter
Traffic delay caused by traffic congestion is a major problem in developing countries as well as in developed countries. Delays occur due to technical factors (traffic volume, green light time, cycle time) and non-technical factors (weather conditions, road conditions, visibility). Plenty of research work has been presented for traffic delay estima...
Article
In the contemporary era, traffic congestion is a major problem for the world that results in an enormous delay in traffic. The traffic delays are influenced by several factors like traffic volume, green time, weather conditions, road conditions, visibility. These factors must be considered while estimating the delay. This paper proposes a composite...
Article
Full-text available
Authentication is a major challenge for accessing different web- based applications, information exchange, communicating people, conducting e-business and performing financial operations, access to system like ATM, Wi-Fi etc. Biometrics based authentication could be used to prevent unauthorized access to these systems. Multi-modal biometric aut...
Article
Authentication is a major challenge for accessing different web- based applications, information exchange, communicating people, conducting e-business and performing financial operations, access to system like ATM, Wi-Fi etc. Biometrics based authentication could be used to prevent unauthorized access to these systems. Multi-modal biometric aut...
Article
Full-text available
Web applications store trustworthy information and can be accessed online through wired or wireless network. Authentication is one of the major challenges to access these web applications. With varying level of sensitive data stored in web application, the concept of level of authentication can be introduced using biometric traits. This paper pr...
Article
Full-text available
Shift from a wired network to a wireless network is rampant day by day due to the rapid development in information and wireless communications technology. But the wireless networks are insecure and more vulnerable to security threats and attacks. Biometric can play an important role in authentication and identification in WLAN. The image of iris va...
Article
Full-text available
Authentication and Identification is one of the key features of Biometric Application. In such applications before generating the templates, a feature is extracted from the input image captured by a sensor after pre-processing. In pre-processing steps, the goal is to enhance the visual appearance of the image by noise removal, dilation, erosion, se...
Conference Paper
This article discusses the shortest path problem in transportation systems and presents a hybrid approach for routing optimization in ATIS (Advanced Traveller Information System). Due to advancement of technology, routing optimization encounter new challenges day by day. Therefore, a new variant of routing, which combines the decremental approach w...
Article
Intelligent transportation systems (ITS) received great attention in research field as advanced control technology in automation of traffic network. In the present era, it is difficult to control the urban traffic flow efficiently by using traditional methods because of complexity and uncertainties. Hence, the requirement of expert system is needed...
Article
Full-text available
Safe and secure wireless networks are always a major challenge for researchers and practitioners. Unauthorized access and illegal entry are two security threats, which worsen the functioning of the Wireless Local Area Networks (WLAN). This work describes a novel Chaos based Bio-cryptic Security aware Packet Scheduling algorithm (CBSPS) to strengthe...

Network

Cited By