Dr. Amit SinhalJK Lakshmipat University | JKLU · Department of Computer Science & Engineering
Dr. Amit Sinhal
Ph.D.(CSE), M.Tech(CSE), B.E.(CSE) NIT Surat
About
135
Publications
89,367
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
485
Citations
Introduction
As a Professor of Computer Science and Engineering (CSE) at JK Lakshmipat University (JKLU) and a Visiting Professor at Sardar Vallabhbhai National Institute of Technology (SVNIT), I have over 27 years of experience in software development, project management, research and academia. I hold a PhD and an M.Tech in CSE from Rajiv Gandhi Prodyogiki Vishwavidyalaya and a PostDoc from the University of Louisiana at Lafayette.
Additional affiliations
March 2010 - July 2019
September 2009 - November 2009
February 2003 - May 2006
Education
March 2009 - March 2014
July 2002 - June 2004
July 1992 - June 1996
Publications
Publications (135)
The Preformulation study of Luliconazole elucidated its properties and optimization for a self-Nanoemulsifying drug delivery system (SNEDDS). Luliconazole, a tasteless, odorless white powder, exhibited diverse crystalline forms with a melting point of 153.6°C. Notably, it demonstrated high solubility in Oleic Acid and Isopropyl Myristate, corrobora...
Deep learning (DL) approaches provide predictive analysis capabilities for heart-related diseases (HRD), enabling early pattern detection and identification of associated risk factors. Additionally, nature-inspired algorithms have demonstrated their efficacy in optimizing complex problems, including risk prediction, treatment planning, and resource...
Sign language is the way of communication between mute individuals and hearing-impaired persons. Developing a successful sign language recognition system needs expertise in machine learning, deep learning, natural language processing, artificial intelligence, human-computer interaction, and many more. This paper aims to describe all the procedures...
Cloud technology is a business strategy that aims to provide the necessary material to customers depending on their needs. Individuals and cloud businesses alike have embraced the cloud storage service, which has become the most widely used service. The industries outsource their data to cloud storage space to relieve themselves of the load of deal...
Cardiovascular or heart diseases consist a global major health concern. Cardiovascular diseases have the highest mortality rate worldwide, and the death rate increases with age, but an accurate prognosis at an early stage may increase the chances of surviving. In this paper, a combined approach, based on Machine Learning (ML) with an optimization m...
ECG is the most common and basic test to run on patients to check any kind of anomalies in the heart. In the ECG result 10 to 20 minutes long continuous data of a patient's heart is down sampled and printed as a 1D graph. We have develop a program which will take the continuous dataset from the ECG machine and analyses the data and extracts various...
Picture preparing holds a fundamental position in every segment of human ways of life. The virtual age is among humankind, and the development of virtual pictures is the characteristic marvels for photography specialists and the ordinary photographic artist alike. With the development in taking pictures and putting away depictions in the virtual ar...
In this paper, an efficient technique for the classification of Hyper-Spectral Images taken form satellite is actualized. The Proposed Methodology is based on the concept of optimizing Support Vector Machine(SVM) using Self Organizing Maps (SOM) and then classification of Interior and Exterior Pixels can bed one by the comparing the Posterior Proba...
Mobile Ad Hoc Network (MANET) is a collection of wireless mobile nodes that dynamically form a temporary network without the reliance on any infrastructure or central administration. Energy consumption is considered as one of the major limitations in MANET, as the mobile nodes do not possess permanent power supply and have to rely on batteries, thu...
In the Modern phase, due to dissimilar circumstances such as ease of use, quintessential attribute, the ordinance of WhatsApp has increased. In 2009, WhatsApp was founded by Brian Action and Jon Koum [1].As per the records available , a big acceleration has been absorbed in whastup user , it is about 210 users in Feb 2013,due to the potential of us...
Data Deduplication is one of important data mining techniques for eliminating duplicate copies of repeating data by it compares the data in cloud storage to reduce the amount of storage space and save bandwidth. Data de-duplication is used in cloud storage to save bandwidth and reduce the storage space by keeping only one copy of same data. But it...
Security has been an issue from the inception of computer systems. Secured systems must be usable to maintain proposed security. Password Authentication Systems have either been usable and insecure and not usable. Increasing either tends to complicate the other. Today, authentication is the principal method to guarantee information security and the...
Handwritten character recognition (HCR) is a border area of research in field of character recognition and image processing and has been investigated under the frame work of a character recognition (OCR) and pattern recognition. In this study we propose a solution for performing character recognition in Sugali language, an Indo-Aryan language spoke...
Cloud computing could be a revolutionary mechanism that ever-changing way to enterprise hardware and software system style and procurements. Cloud informations are keeping and accessed during a remote server with the help of services provided by cloud service suppliers. Providing security could be a major concern because the information is transmit...
The infringement of remote correspondence inside the most recent
couple of decades has brought about the advancement of various
transmit and get (MIMO) frameworks empowering effective constant
picture and video correspondence. These preferences of numerous
recieving wire frameworks nearby productive transmission
furthermore coding plans might be in...
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
Wireless ad-hoc networks are power constrained since nodes operate with limited battery energy. If some nodes are die early due to loss of energy, they cannot communicate with each other. Energy efficient routing scheme deals with efficient utilization of energy resources. By regulating the early reduction of battery, adapt the power to set the app...
The term mobile ad hoc network is used for the moving nodes in the network to communicate with each others. MANET is a system of mobile nodes interacting without the support of central communications or access points. The best approach for communication in MANET till now is clustering. And there are so many routing protocols are proposed to make tr...
There are several different encryption standards along with different mechanism are used for text data security. In this paper an efficient text data encryption technique has been proposed based on RC4. In this approach the text is divided into different blocksaccording to the block division mechanism. The block division is based on the number of b...
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
There are several intrusion detection models that are presented till now as per my study. There are several approaches including data mining, neural network, naïve basis, etc., that are applied for finding the intrusions. But there is still a need for betterment in this direction. Our paper focuses on the limitation faced in the traditional approac...
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
In mobile ad hoc network (MANET), congestion is one of the most important constraint that deteriorate the performance of the whole network and routing capability of AOMDV protocol. Multipath routing allows the establishment of multiple paths between a single source and single destination node. The multipath route establishment uses the method that...
Now days, finding the association rule from large number of item-set become very popular issue in the field of data mining. To determine the association rule researchers implemented a lot of algorithms and techniques. FP-Growth is a very fast algorithm for finding frequent item-set. This paper, give us a new idea in this field. It replaces the role...
Now days, finding the association rule from large number of item-set become very popular issue in the field of data mining. To determine the association rule researchers implemented a lot of algorithms and techniques. FPGrowth is a very fast algorithm for finding frequent item-set. This paper, give us a new idea in this field. It replaces the role...
Many information systems use relational database systems for efficient sharing, storage, and retrieval of large quantities of data. Nowadays, object-oriented databases has been gaining wide acceptance for storage & retrieval data for complex applications that can easily extend and maintain. In this paper, we present the novel techniques to transfor...
String Matching is the classical and existing problem, despite the fact that the real world aspects belonging to the research field of computer science. In this domain one or several strings called " Pattern " is to be searched within a well-built string or " Text ". String matching strategies or algorithms provide key role in various real world pr...
Web 2.0 has become principle tool for accessing information. With Photo sharing
websites like Flickr, Picassa, Zoomr images uploaded by user and their tags are available.
But Missing tags and Noise problems among image and tag make it difficult to retrieve
relevant image based on user’s preference. This requires tags refinement. We propose a
model...
In this paper, we are reviewing several research papers regarding study and analysis towards improvement of image contrast in case of poor light. In this paper we most focus on many algorithms that has been designed for enhancement of image, At the end, a study has been made by comparing all the proposed parameters that with certain advantages and...
Web 2.0 has become principle tool for accessing information. With Photo sharing websites like Flickr, Picassa, Zoomr images uploaded by user and their tags are available. But Missing tags and Noise problems among image and tag make it difficult to retrieve relevant image based on user’s preference. This requires tags refinement. We propose a model...
The internet has taken its place beside the telephone and the television as on important part of people’s lives. Consumers rely on the internet to shop, bank and invest online shoppers use credit card to their purchases. In electronic commerce, credit card has become the most important means of payment due to fast development in information technol...
Now a day’s various information systems uses
relational database management systems for effective dealing,
storage, processing, integrating and retrieving of large amount
of data. In spite of it, object-oriented programming has attain
as much as possible acceptance in the programming
community as a abridgement for developing typical
applications th...
“One way hash functions” plays an important role
in data integrity, message authentication, and digital signature
in modern information security. This paper proposed a fast
one-way hash function to optimize the time delay with strong
collision resistance, assures a good compression and one-way
resistance. It is based on the standard secure hash fun...
In this paper, we are reviewing several research papers regarding study and analysis towards improvement of image contrast in case of poor light. In this paper we most focus on many algorithms that has been designed for enhancement of image, At the end, a study has been made by comparing all the proposed parameters that with certain advantages and...
Nature of Web information is dynamic and irregular that's why it is difficult to search and integrate information from the Web. The biggest task in making WWW data accessible to users/agents is extracting the data from Web pages. We take advantage of information in existing Web pages to creating structured data semi-automatically. Extraction of inf...
License Plate detection and recognition is a key technique in most of the traffic related applications such as searching of stolen vehicles, road traffic monitoring, airport gate monitoring, speed monitoring and Automatic parking access control. It is simply the ability to automatically extract and recognition of the vehicle license number plate's...
In this paper, modified ad-hoc on-demand multipath distance vector (AOMDV) for multipath routing using ant colony for mobile ad hoc networks (MANETs) is presented. For this purpose, Ant-AODV is used for comparison with Ant-AOMDV. The idea behind the working of Ant-AODV and Ant-AOMDV is that the RREQ message packets are sent to single path in case o...
Identifying intrusions is the process called intrusion detection. In simple manner the act of comprising a system is called intrusion. An intrusion detection system (IDS) inspects all inbound and outbound activity and identifies suspicious patterns that may indicate a system attack from someone attempting to compromise a system. If we think of the...
Accurate and credible software effort estimation is always a challenge for academic research and software industry. In the beginning, estimation was carried out using only human expertise or algorithmic models, but more recently, interest has turned to a range of Soft Computing techniques. New paradigms such as Fuzzy Logic enable a choice for softw...
Software metric is a measure of some property of a piece
of software or its specifications. The goal is to obtain reproducible
and quantifiable measurements, which may have several valuable
applications in schedule and budget planning, effort and cost
evaluation, quality assurance testing, software debugging, software
performance optimization, and...
The encroachment of wireless communication in the last few decades has led to the development of multiple transmit and receive (MIMO) systems enabling efficient communication. These advantages of multiple antenna systems along with efficient transmission and coding schemes can be explored to achieve very high data rates along with improved data rel...
One of the big advantages of using Linux is that its security tends to be so much better than that of the competing alternatives. Linux has gained its popularity as an open source operating system and has been used for workstations and servers. Due to the growth of its usage in application and production line, its vulnerabilities have increased fro...
Cloud computing delivers platform, software application and hardware infrastructure as a service over Internet. It allows the users to utilize the service on-demand and pay-per-use model as given by Amazon EC2. There are two types of cost involved, fixed and variable. Cost will rise as the demand increases. In this paper the web service request com...
Social sharing websites like Flickr and Youtube allow users to create, share, tag, annotate, and comment medias. The large amount of user-generated metadata facilitate users during sharing and organizing multimedia content and provide useful information to improve media retrieval and management. The web search experience is improved by generating t...
Today's web generates enormous data. Keyword based search is most popular medium to search content among web users. Metadata generated by web can be utilized to improve the search experience among the searchers. Social sharing websites like Flickr and Youtube allow users to create, share, tag, annotate, and comment Medias. The large amount of user-...
There are unavoidably a few outliers in the software measurement data. When software effort estimation models are made using the data samples with outliers, these models reduce the effort estimation precision for future planning. Therefore, this work investigated the influence of outlier upon the accuracy of prediction and proposed a distribution b...
Today, Software measurement are based on various techniques such that neural network, Genetic
algorithm, Fuzzy Logic etc. This study involves the efficiency of applying support vector machine using
Gaussian Radial Basis kernel function to software measurement problem to increase the performance and
accuracy. Support vector machines (SVM) are innova...
In today's era it is common to handle any type of file with the personal computer. The introduction of mobile device makes a huge revolution in the field of computer. Unfortunately the storage capacity of these devices is limited; it may hence be useful to have the possibility to store the files on the web and retrieve them at anytime and anywhere....
The encroachment of wireless communication in the last few decades has led to the development of multiple transmit and receive (MIMO) systems enabling efficient real-time image and video communication. These advantages of multiple antenna systems along with efficient transmission and coding schemes can be explored to achieve very high data rates al...
Software development effort estimation is the process of calculating the effort required to develop or maintain software based on the input, which is partial, tentative and/or strident. Efficient project estimation is one of the most difficult and significant activities in project development. “Effort Estimation” is supposed to be fateful because o...
Accurately estimating the code size, cost, effort and schedule is the most important challenge facing by the software companies and researchers these days. Their key implications for the management of code development as a result of each the overestimates and underestimates have a direct effect to impose destruction on software companies. Heap of m...
Software assessment of a project is a key aspect for the prediction of the cost, duration and the expertise required for the project. An efficient optimization algorithm is urgently needed. In this paper, we analyze the genetic algorithm (GA) technique for the development of a software assessment model for the NASA software project dataset. The sim...
Mobile communication plays a vital role in disaster recovery management during emergency situations. It is helpful in situations where the system has less robust and less flexible infrastructure. However, the rapid growth in number and multiplicity of real-time network applications has made it imperative to consider the impact of end-to-end delay r...
In recent years Smartphone user are increasing rapidly. As Smartphone are always connected with internet is playing a vital role in day-to-day life. All personal valuable data includes in Smartphone than PC or Laptop. All this valuable data we need to protect from loss, failure and theft so backup and restore data is important. This paper includes...
The Mining Database archives and provides efficient access to all data necessary for the conduct of Survey Operations. Operational Database is the database-of-record, consisting of system-specific reference data and event data belonging to a transaction-update system. It may also contain system control data such as indicators, flags, and counters....
Roof Leakage is the major problem faced in almost all buildings irrespective of the age of the building. Basically, roof leak is caused because of the different conditions and material used in construction. But most of the time these leakages are so small that we cannot see with bare eyes. That's why infrared cameras are used for detecting roof lea...
With the arrival of cloud computing technology utilization of resources is increases multifold, and also increases security issues in different cloud environment. This paper presents a new scheme for secure cloud creation using RC6 encryption algorithm for securing the cloud environment. The results show the performance of proposed technique in pub...
Automatic annotation of digital pictures is a key technology for managing and retrieving images from large image collection. Traditional image semantics extraction and representation schemes were commonly divided into two categories, namely visual features and text annotations. However, visual feature scheme are difficult to extract and are often s...
Model based combinatorial testing is the most effective and efficient method of systematic interaction testing. In this multiple variables can interact with test model in the form of combination and each set is considered as a test pairs. It is used mainly for reducing the test pairs size, complexity and time of test generation. Accomplishment of t...
In image processing, computer vision and pattern recognition, the Image retrieval is a most popular research area. Our paper presented a novel approach in content-based image retrieval (CBIR) by combining the low level feature i.e. color, texture and shape features. At first, we are transforming the color space from RGB model to HSV model, and then...
This research paper contains a performance-based comparative study of a new Hybrid security protocol architecture for online transaction. This protocol is designed using combination of both symmetric and asymmetric cryptographic techniques known as Hybrid cryptography. This protocol serves three very important cryptographic primitives—integrity, co...
Software Metrics present the key role of Software Development. Cost, Productivity and Quality are specific area of measurement in software field. The uncertainties which a bugs of effort estimation, researchers used the optimization to reduce it. Software cost estimation optimize, on basis of existing data set, in this paper we emphasize on COCOMO...