Dr. Amit Sinhal

Dr. Amit Sinhal
JK Lakshmipat University | JKLU · Department of Computer Science & Engineering

Ph.D.(CSE), M.Tech(CSE), B.E.(CSE) NIT Surat

About

135
Publications
89,367
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
485
Citations
Introduction
As a Professor of Computer Science and Engineering (CSE) at JK Lakshmipat University (JKLU) and a Visiting Professor at Sardar Vallabhbhai National Institute of Technology (SVNIT), I have over 27 years of experience in software development, project management, research and academia. I hold a PhD and an M.Tech in CSE from Rajiv Gandhi Prodyogiki Vishwavidyalaya and a PostDoc from the University of Louisiana at Lafayette.
Additional affiliations
March 2010 - July 2019
Technocrats Institute of Technology
Position
  • Head of Faculty
September 2009 - November 2009
Georgia Institute of Technology
Position
  • Research Associate
February 2003 - May 2006
Barkatullah University
Position
  • Professor (Assistant)
Education
March 2009 - March 2014
Rajiv Gandhi Technical University
Field of study
  • Computer Sc. & Engg.
July 2002 - June 2004
Samrat Ashok Technological Institute
Field of study
  • Computer Sc. & Engineering
July 1992 - June 1996

Publications

Publications (135)
Preprint
Full-text available
The Preformulation study of Luliconazole elucidated its properties and optimization for a self-Nanoemulsifying drug delivery system (SNEDDS). Luliconazole, a tasteless, odorless white powder, exhibited diverse crystalline forms with a melting point of 153.6°C. Notably, it demonstrated high solubility in Oleic Acid and Isopropyl Myristate, corrobora...
Article
Deep learning (DL) approaches provide predictive analysis capabilities for heart-related diseases (HRD), enabling early pattern detection and identification of associated risk factors. Additionally, nature-inspired algorithms have demonstrated their efficacy in optimizing complex problems, including risk prediction, treatment planning, and resource...
Chapter
Sign language is the way of communication between mute individuals and hearing-impaired persons. Developing a successful sign language recognition system needs expertise in machine learning, deep learning, natural language processing, artificial intelligence, human-computer interaction, and many more. This paper aims to describe all the procedures...
Article
Full-text available
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of the load of deal...
Article
Full-text available
Cardiovascular or heart diseases consist a global major health concern. Cardiovascular diseases have the highest mortality rate worldwide, and the death rate increases with age, but an accurate prognosis at an early stage may increase the chances of surviving. In this paper, a combined approach, based on Machine Learning (ML) with an optimization m...
Article
Full-text available
ECG is the most common and basic test to run on patients to check any kind of anomalies in the heart. In the ECG result 10 to 20 minutes long continuous data of a patient's heart is down sampled and printed as a 1D graph. We have develop a program which will take the continuous dataset from the ECG machine and analyses the data and extracts various...
Preprint
Full-text available
Article
Full-text available
Picture preparing holds a fundamental position in every segment of human ways of life. The virtual age is among humankind, and the development of virtual pictures is the characteristic marvels for photography specialists and the ordinary photographic artist alike. With the development in taking pictures and putting away depictions in the virtual ar...
Article
Full-text available
In this paper, an efficient technique for the classification of Hyper-Spectral Images taken form satellite is actualized. The Proposed Methodology is based on the concept of optimizing Support Vector Machine(SVM) using Self Organizing Maps (SOM) and then classification of Interior and Exterior Pixels can bed one by the comparing the Posterior Proba...
Article
Full-text available
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically form a temporary network without the reliance on any infrastructure or central administration. Energy consumption is considered as one of the major limitations in MANET, as the mobile nodes do not possess permanent power supply and have to rely on batteries, thu...
Article
Full-text available
In the Modern phase, due to dissimilar circumstances such as ease of use, quintessential attribute, the ordinance of WhatsApp has increased. In 2009, WhatsApp was founded by Brian Action and Jon Koum [1].As per the records available , a big acceleration has been absorbed in whastup user , it is about 210 users in Feb 2013,due to the potential of us...
Article
Full-text available
Data Deduplication is one of important data mining techniques for eliminating duplicate copies of repeating data by it compares the data in cloud storage to reduce the amount of storage space and save bandwidth. Data de-duplication is used in cloud storage to save bandwidth and reduce the storage space by keeping only one copy of same data. But it...
Article
Full-text available
Security has been an issue from the inception of computer systems. Secured systems must be usable to maintain proposed security. Password Authentication Systems have either been usable and insecure and not usable. Increasing either tends to complicate the other. Today, authentication is the principal method to guarantee information security and the...
Article
Full-text available
Handwritten character recognition (HCR) is a border area of research in field of character recognition and image processing and has been investigated under the frame work of a character recognition (OCR) and pattern recognition. In this study we propose a solution for performing character recognition in Sugali language, an Indo-Aryan language spoke...
Article
Full-text available
Cloud computing could be a revolutionary mechanism that ever-changing way to enterprise hardware and software system style and procurements. Cloud informations are keeping and accessed during a remote server with the help of services provided by cloud service suppliers. Providing security could be a major concern because the information is transmit...
Article
Full-text available
The infringement of remote correspondence inside the most recent couple of decades has brought about the advancement of various transmit and get (MIMO) frameworks empowering effective constant picture and video correspondence. These preferences of numerous recieving wire frameworks nearby productive transmission furthermore coding plans might be in...
Article
Full-text available
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
Article
Full-text available
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
Article
Full-text available
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
Article
Full-text available
Wireless ad-hoc networks are power constrained since nodes operate with limited battery energy. If some nodes are die early due to loss of energy, they cannot communicate with each other. Energy efficient routing scheme deals with efficient utilization of energy resources. By regulating the early reduction of battery, adapt the power to set the app...
Article
Full-text available
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
Article
Full-text available
There are several different encryption standards along with different mechanism are used for text data security. In this paper an efficient text data encryption technique has been proposed based on RC4. In this approach the text is divided into different blocksaccording to the block division mechanism. The block division is based on the number of b...
Article
Full-text available
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
Article
Full-text available
There are several intrusion detection models that are presented till now as per my study. There are several approaches including data mining, neural network, naïve basis, etc., that are applied for finding the intrusions. But there is still a need for betterment in this direction. Our paper focuses on the limitation faced in the traditional approac...
Article
Full-text available
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
Article
Full-text available
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
Article
Full-text available
Now days, finding the association rule from large number of item-set become very popular issue in the field of data mining. To determine the association rule researchers implemented a lot of algorithms and techniques. FP-Growth is a very fast algorithm for finding frequent item-set. This paper, give us a new idea in this field. It replaces the role...
Article
Full-text available
Now days, finding the association rule from large number of item-set become very popular issue in the field of data mining. To determine the association rule researchers implemented a lot of algorithms and techniques. FPGrowth is a very fast algorithm for finding frequent item-set. This paper, give us a new idea in this field. It replaces the role...
Article
Full-text available
Many information systems use relational database systems for efficient sharing, storage, and retrieval of large quantities of data. Nowadays, object-oriented databases has been gaining wide acceptance for storage & retrieval data for complex applications that can easily extend and maintain. In this paper, we present the novel techniques to transfor...
Article
Full-text available
String Matching is the classical and existing problem, despite the fact that the real world aspects belonging to the research field of computer science. In this domain one or several strings called " Pattern " is to be searched within a well-built string or " Text ". String matching strategies or algorithms provide key role in various real world pr...
Article
Full-text available
Web 2.0 has become principle tool for accessing information. With Photo sharing websites like Flickr, Picassa, Zoomr images uploaded by user and their tags are available. But Missing tags and Noise problems among image and tag make it difficult to retrieve relevant image based on user’s preference. This requires tags refinement. We propose a model...
Article
Full-text available
In this paper, we are reviewing several research papers regarding study and analysis towards improvement of image contrast in case of poor light. In this paper we most focus on many algorithms that has been designed for enhancement of image, At the end, a study has been made by comparing all the proposed parameters that with certain advantages and...
Conference Paper
Full-text available
Web 2.0 has become principle tool for accessing information. With Photo sharing websites like Flickr, Picassa, Zoomr images uploaded by user and their tags are available. But Missing tags and Noise problems among image and tag make it difficult to retrieve relevant image based on user’s preference. This requires tags refinement. We propose a model...
Chapter
Full-text available
The internet has taken its place beside the telephone and the television as on important part of people’s lives. Consumers rely on the internet to shop, bank and invest online shoppers use credit card to their purchases. In electronic commerce, credit card has become the most important means of payment due to fast development in information technol...
Article
Full-text available
Now a day’s various information systems uses relational database management systems for effective dealing, storage, processing, integrating and retrieving of large amount of data. In spite of it, object-oriented programming has attain as much as possible acceptance in the programming community as a abridgement for developing typical applications th...
Article
Full-text available
“One way hash functions” plays an important role in data integrity, message authentication, and digital signature in modern information security. This paper proposed a fast one-way hash function to optimize the time delay with strong collision resistance, assures a good compression and one-way resistance. It is based on the standard secure hash fun...
Article
Full-text available
In this paper, we are reviewing several research papers regarding study and analysis towards improvement of image contrast in case of poor light. In this paper we most focus on many algorithms that has been designed for enhancement of image, At the end, a study has been made by comparing all the proposed parameters that with certain advantages and...
Article
Full-text available
Nature of Web information is dynamic and irregular that's why it is difficult to search and integrate information from the Web. The biggest task in making WWW data accessible to users/agents is extracting the data from Web pages. We take advantage of information in existing Web pages to creating structured data semi-automatically. Extraction of inf...
Article
Full-text available
License Plate detection and recognition is a key technique in most of the traffic related applications such as searching of stolen vehicles, road traffic monitoring, airport gate monitoring, speed monitoring and Automatic parking access control. It is simply the ability to automatically extract and recognition of the vehicle license number plate's...
Article
Full-text available
In this paper, modified ad-hoc on-demand multipath distance vector (AOMDV) for multipath routing using ant colony for mobile ad hoc networks (MANETs) is presented. For this purpose, Ant-AODV is used for comparison with Ant-AOMDV. The idea behind the working of Ant-AODV and Ant-AOMDV is that the RREQ message packets are sent to single path in case o...
Article
Full-text available
Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion. An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system. If we think of the...
Article
Full-text available
Accurate and credible software effort estimation is always a challenge for academic research and software industry. In the beginning, estimation was carried out using only human expertise or algorithmic models, but more recently, interest has turned to a range of Soft Computing techniques. New paradigms such as Fuzzy Logic enable a choice for softw...
Article
Full-text available
Software metric is a measure of some property of a piece of software or its specifications. The goal is to obtain reproducible and quantifiable measurements, which may have several valuable applications in schedule and budget planning, effort and cost evaluation, quality assurance testing, software debugging, software performance optimization, and...
Article
Full-text available
The encroachment of wireless communication in the last few decades has led to the development of multiple transmit and receive (MIMO) systems enabling efficient communication. These advantages of multiple antenna systems along with efficient transmission and coding schemes can be explored to achieve very high data rates along with improved data rel...
Article
Full-text available
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives. Linux has gained its popularity as an open source operating system and has been used for workstations and servers. Due to the growth of its usage in application and production line, its vulnerabilities have increased fro...
Conference Paper
Full-text available
Cloud computing delivers platform, software application and hardware infrastructure as a service over Internet. It allows the users to utilize the service on-demand and pay-per-use model as given by Amazon EC2. There are two types of cost involved, fixed and variable. Cost will rise as the demand increases. In this paper the web service request com...
Article
Full-text available
Social sharing websites like Flickr and Youtube allow users to create, share, tag, annotate, and comment medias. The large amount of user-generated metadata facilitate users during sharing and organizing multimedia content and provide useful information to improve media retrieval and management. The web search experience is improved by generating t...
Article
Full-text available
Today's web generates enormous data. Keyword based search is most popular medium to search content among web users. Metadata generated by web can be utilized to improve the search experience among the searchers. Social sharing websites like Flickr and Youtube allow users to create, share, tag, annotate, and comment Medias. The large amount of user-...
Article
Full-text available
There are unavoidably a few outliers in the software measurement data. When software effort estimation models are made using the data samples with outliers, these models reduce the effort estimation precision for future planning. Therefore, this work investigated the influence of outlier upon the accuracy of prediction and proposed a distribution b...
Article
Full-text available
Today, Software measurement are based on various techniques such that neural network, Genetic algorithm, Fuzzy Logic etc. This study involves the efficiency of applying support vector machine using Gaussian Radial Basis kernel function to software measurement problem to increase the performance and accuracy. Support vector machines (SVM) are innova...
Conference Paper
Full-text available
In today's era it is common to handle any type of file with the personal computer. The introduction of mobile device makes a huge revolution in the field of computer. Unfortunately the storage capacity of these devices is limited; it may hence be useful to have the possibility to store the files on the web and retrieve them at anytime and anywhere....
Article
Full-text available
The encroachment of wireless communication in the last few decades has led to the development of multiple transmit and receive (MIMO) systems enabling efficient real-time image and video communication. These advantages of multiple antenna systems along with efficient transmission and coding schemes can be explored to achieve very high data rates al...
Article
Full-text available
Software development effort estimation is the process of calculating the effort required to develop or maintain software based on the input, which is partial, tentative and/or strident. Efficient project estimation is one of the most difficult and significant activities in project development. “Effort Estimation” is supposed to be fateful because o...
Article
Full-text available
Accurately estimating the code size, cost, effort and schedule is the most important challenge facing by the software companies and researchers these days. Their key implications for the management of code development as a result of each the overestimates and underestimates have a direct effect to impose destruction on software companies. Heap of m...
Article
Full-text available
Software assessment of a project is a key aspect for the prediction of the cost, duration and the expertise required for the project. An efficient optimization algorithm is urgently needed. In this paper, we analyze the genetic algorithm (GA) technique for the development of a software assessment model for the NASA software project dataset. The sim...
Article
Full-text available
Mobile communication plays a vital role in disaster recovery management during emergency situations. It is helpful in situations where the system has less robust and less flexible infrastructure. However, the rapid growth in number and multiplicity of real-time network applications has made it imperative to consider the impact of end-to-end delay r...
Conference Paper
Full-text available
In recent years Smartphone user are increasing rapidly. As Smartphone are always connected with internet is playing a vital role in day-to-day life. All personal valuable data includes in Smartphone than PC or Laptop. All this valuable data we need to protect from loss, failure and theft so backup and restore data is important. This paper includes...
Article
Full-text available
The Mining Database archives and provides efficient access to all data necessary for the conduct of Survey Operations. Operational Database is the database-of-record, consisting of system-specific reference data and event data belonging to a transaction-update system. It may also contain system control data such as indicators, flags, and counters....
Conference Paper
Full-text available
Roof Leakage is the major problem faced in almost all buildings irrespective of the age of the building. Basically, roof leak is caused because of the different conditions and material used in construction. But most of the time these leakages are so small that we cannot see with bare eyes. That's why infrared cameras are used for detecting roof lea...
Conference Paper
Full-text available
With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in pub...
Article
Full-text available
Automatic annotation of digital pictures is a key technology for managing and retrieving images from large image collection. Traditional image semantics extraction and representation schemes were commonly divided into two categories, namely visual features and text annotations. However, visual feature scheme are difficult to extract and are often s...
Article
Full-text available
Model based combinatorial testing is the most effective and efficient method of systematic interaction testing. In this multiple variables can interact with test model in the form of combination and each set is considered as a test pairs. It is used mainly for reducing the test pairs size, complexity and time of test generation. Accomplishment of t...
Conference Paper
Full-text available
In image processing, computer vision and pattern recognition, the Image retrieval is a most popular research area. Our paper presented a novel approach in content-based image retrieval (CBIR) by combining the low level feature i.e. color, texture and shape features. At first, we are transforming the color space from RGB model to HSV model, and then...
Chapter
Full-text available
This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, co...
Article
Full-text available
Software Metrics present the key role of Software Development. Cost, Productivity and Quality are specific area of measurement in software field. The uncertainties which a bugs of effort estimation, researchers used the optimization to reduce it. Software cost estimation optimize, on basis of existing data set, in this paper we emphasize on COCOMO...