
Dilip Kumar ShawNational Institute of Technology, Jamshedpur | NIT Jamshedpur · Department of Computer Applications
Dilip Kumar Shaw
Doctor of Philosophy
About
12
Publications
2,119
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22
Citations
Introduction
Publications
Publications (12)
Traffic delay caused by traffic congestion is a major problem in developing countries as well as in developed countries. Delays occur due to technical factors (traffic volume, green light time, cycle time) and non-technical factors (weather conditions, road conditions, visibility). Plenty of research work has been presented for traffic delay estima...
In the contemporary era, traffic congestion is a major problem for the world that results in
an enormous delay in traffic. The traffic delays are influenced by several factors like traffic volume, green time, weather conditions, road conditions, visibility. These factors must be considered while estimating the delay. This paper proposes a composite...
Authentication is a major challenge for accessing different web-
based applications, information exchange, communicating people,
conducting e-business and performing financial operations, access to system
like ATM, Wi-Fi etc. Biometrics based authentication could be used to
prevent unauthorized access to these systems. Multi-modal biometric
aut...
Authentication is a major challenge for accessing different web-
based applications, information exchange, communicating people,
conducting e-business and performing financial operations, access to system
like ATM, Wi-Fi etc. Biometrics based authentication could be used to
prevent unauthorized access to these systems. Multi-modal biometric
aut...
Web applications store trustworthy information and can be
accessed online through wired or wireless network. Authentication is one of
the major challenges to access these web applications. With varying level
of sensitive data stored in web application, the concept of level of
authentication can be introduced using biometric traits. This paper pr...
Shift from a wired network to a wireless network is rampant day by day due to the rapid development in information and wireless communications technology. But the wireless networks are insecure and more vulnerable to security threats and attacks. Biometric can play an important role in authentication and identification in WLAN. The image of iris va...
Authentication and Identification is one of the key features of Biometric Application. In such applications before generating the templates, a feature is extracted from the input image captured by a sensor after pre-processing. In pre-processing steps, the goal is to enhance the visual appearance of the image by noise removal, dilation, erosion, se...
This article discusses the shortest path problem in transportation systems and presents a hybrid approach
for routing optimization in ATIS (Advanced Traveller Information System). Due to advancement of technology, routing optimization encounter new challenges day by day. Therefore, a new variant of routing, which combines the decremental approach w...
Intelligent transportation systems (ITS) received great attention in research field as advanced control technology in automation of traffic network. In the present era, it is difficult to control the urban traffic flow efficiently by using traditional methods because of complexity and uncertainties. Hence, the requirement of expert system is needed...
Safe and secure wireless networks are always a major challenge for researchers and practitioners. Unauthorized access and illegal entry are two security threats, which worsen the functioning of the Wireless Local Area Networks (WLAN). This work describes a novel Chaos based Bio-cryptic Security aware Packet Scheduling algorithm (CBSPS) to strengthe...