Gajanand Sharma

Gajanand Sharma
JECRC University · Computer Science & Engineering

Ph.D. (CSE). Master of Technology (CSE), B.E. (CSE)

About

59
Publications
3,872
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
190
Citations
Introduction
Dr. Gajanand Sharma currently working as an Associate Professor at the Department of Computer Science & Engineering, JECRC University, Jaipur (JU), Rajasthan, India. His area of interest includes information Security, Image Processing, Network Security, Cyber Security, AI and IoT.
Education
August 2009 - May 2014
Sri Balaji College of Engineering & Technology
Field of study
  • Computer Science & Engineering
July 2001 - June 2005
JECRC Foundation
Field of study
  • Computer Engineering

Publications

Publications (59)
Article
Full-text available
Breast cancer is a serious disease, and therefore early detection is crucial for successful treatment and patient management. Unfortunately, globally, the number of breast cancer cases is increasing due to various multifaceted factors. It is currently one of the leading causes of cancer deaths in women, worldwide. Cancerous cells in the breast can...
Article
Full-text available
The advent of the metaverse has revolutionized virtual interactions and navigation, introducing intricate access control challenges. This paper addresses the need for effective access control models in the cloud-based metaverse. It explores its distinct characteristics, including its dynamic nature, diverse user base, and shared spaces, highlightin...
Article
Our world has gone fully mobile, and with advanced technologies, communication in this dynamic era has been possible with MANET and VANET. Along with the facilities extended to our pockets, the security of our data has also been a big concern. The VANET network has numerous obstacles to maintaining information security. One aspect of the suggested...
Article
The digital era has underscored the necessity for resilient and fortified communication protocols. While traditional encryption methodologies remain indispensable, they confront escalating hurdles posed by evolving cyber threats and burgeoning data intricacies. This special issue endeavours to probe into the strides made in intelligent encryption s...
Article
The digital era has underscored the necessity for resilient and fortified communication protocols. While traditional encryption methodologies remain indispensable, they confront escalating hurdles posed by evolving cyber threats and burgeoning data intricacies. This special issue endeavours to probe into the strides made in intelligent encryption s...
Article
Full-text available
Kidney stones are the common problem in the healthcare system. It is rapidly increasing day by day and becomes a global health crisis in worldwide. Various deep learning algorithms are used for classificationof stone in kidney area. The computer aided design approach can be used for assist doctor for finding out the stone in kidney area. For kidney...
Chapter
Blockchain could be a decentralized, shared and open progressed record that’s utilized to record trades over various PCs so that any expound record can’t be balanced retroactively without the alter of each following square. It gives us a modern framework to record a open history of exchanges without depending on any centralized trusted party. The p...
Chapter
Recently, deep learning has proven to be extremely effective in solving challenges connected to the identification of plant diseases. Nevertheless, when a model trained on a specific dataset is assessed in new greenhouse settings, poor performance is seen. Because of this, we provide a way to increase model accuracy by utilizing strategies that can...
Article
Full-text available
This paper gives a depth overview about the technology mobile computing. It has been discussed here how these days cloud computing has reached into mobile and has helped us to reduce the battery and storage related issues in mobiles. Apart from smart phones mobile computing has affected other areas such as homes, offices, supermarts etc. Mobile clo...
Article
Face recognition requirements are well described, as many industrial applications rely on them to achieve one or more goals. The local binary pattern is used for feature extraction, and the support vector machine (SVM) classifier is used for classification. To recognise faces or objects, we first offer the system with a testing database for trainin...
Article
Face recognition requirements are well described, as many industrial applications rely on them to achieve one or more goals. The local binary pattern is used for feature extraction, and the support vector machine (SVM) classifier is used for classification. To recognise faces or objects, we first offer the system with a testing database for trainin...
Article
Full-text available
Scheduling large-scale and resource-intensive workflows in cloud infrastructure is one of the main challenges for cloud service providers (CSPs). Cloud infrastructure is more efficient when virtual machines and other resources work up to their full potential. The main factor that influences the quality of cloud services is the distribution of workf...
Article
Full-text available
The emergence of the metaverse, a virtual reality space, has ushered in a new era of digital experiences and interactions in global information systems. With its unique social norms and behaviors, this new world presents exciting opportunities for users to connect, socialize, and explore. However, as people spend more time in the metaverse, it has...
Article
Full-text available
The enterprise level data security and privacy are one of the focal key challenges to the pr enterprise and security companies to prevent private data from outside and inside attacks. The insider threats and attacks can pretense a real defense risk to the various internal multi-tenants of various enterprises and companies. The data thievery by insi...
Article
Modern computer vision technologies have served to bridge the gap between contemporary scientific analysis and machine learning assisted digital processing. Within the field of biomechanics, applied strategies incorporating both conventional and machine assisted means have shown great success in augmenting the observations of electromyogram graphic...
Article
In the field of highway management, intelligent vehicle detection and counting are becoming increasingly significant. City planners have been fighting the issue of traffic analysis for years. To analyze traffic and streamline the process, intelligent methods are being created. The type of vehicles and the number of vehicles in an area over some arb...
Article
In this COVID-19 pandemic era, where people are losing their lives, there are several species and plants available on our Mother Earth that are beneficial to boosting the human immune system and sustaining their life. These plant leaves and trunks can also be used to effectively treat a variety of diseases in humans. The images of plants, as well a...
Article
Full-text available
obile Ad-Hoc Networks (MANETs) are one of the most commonly used network services these days. They play a great role in tactical situations such as disaster relief or battle fields, making it an important area for research. But, unfortunately, the very factors that make MANETs (elective resilience, and decentralization) pose tremendous challenges f...
Article
Full-text available
In Biometric System, writer identification is a very common and consistent, but most of the writer identification system supposes the text to be fixed like signature based writer identification. But in signature based writer identification sometime arise problems because signature of a person not always available such as in case of crime investigat...
Article
Full-text available
Hospital inspection supervision or healthcare industries are the region with reference to leadership, management and administration of hospitals, hospital networks and healthcare system. In these days healthcare business generate very large amount of complicated data they are basically found unstructured, incomplete and lot of human mistake for dif...
Article
Full-text available
Due to the recent developments in the hand-held devices and communication enhancements in wireless networks like mobile ad-hoc network (MANETs), these networks are targeted for providing real time services like video streaming, video conferencing, VOIP etc. Although, the basic design of MANETs is not fully capable to provide multimedia services, th...
Article
There has never been a time when the volume and complexity of data travelling through modern networks have increased rapidly, but the Internet of Things has played a significant role in this rise. This will result in a significant increase in traffic directed to data centres for processing. This increase in traffic directly impacts the response tim...
Article
Full-text available
To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured...
Chapter
People and urban economies have benefited greatly from smart cities' better quality of life and services. They have complete power over physical objects in real-time and can provide intelligent information to people in areas such as transportation, healthcare, building automation, public safety, smart parking, and traffic systems, as well as smart...
Article
Full-text available
Due to the growth of the internet and internet-based software applications, cloud data center demand has increased. Cloud data centers have thousands of servers that are 24×7 working for users; it is the strong witness of enormous energy consumption for the operation of the cloud data center. However, server utilization is not remaining the same al...
Article
Full-text available
Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain techniq...
Article
Full-text available
Software defined networking is an emerging network architecture that separates the control plane from the data plane of network devices and places the control plane on one or more control servers capable of managing the rules traffic forwarding of all communication devices under your domain. This article describes the architecture, different module...
Article
Before selecting any algorithm to be used for encryption in multimedia application systems, a thorough analysis of the application must be performed to determine what level of security is required for it to work securely. As a result, after determining the necessary security levels, a careful algorithm selection must be made. The algorithm chosen w...
Article
Past decade, IT (Information Technology) experienced exponential growth across the world. Initially Information Technology was used for manufacturing automation and other highly specialized tasks. But as per requirement it changed its features and now it has started to enter into new regimes such as social media, marketing, distribution and after t...
Article
Full-text available
Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can...
Article
Full-text available
One of the major concerns of software industries is to develop invulnerable and secure software. A project is successful if it is delivered within provided time constraints with the required quality. The aim of this research is to enhance the project planning phase by risk assessment at the start of software development life cycle. The proposed mod...
Article
Frequent availability of low-speed internet connections together with easy availability of video capturing in the form of low-cost cameras and digital camcorders, and free video editing software running on low-cost machines, creates the possibility of real vulnerability in the video. To make improvements to images and videos, it is becoming easier...
Article
Full-text available
Big data is a term for vast data sets containing large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. Research for Big Data will focus on analysing the challenges and contingencies associated with the immense, unstructured, enormous and dynamic nature of Big Data. The...
Article
Peer-to-peer (P2P) systems are becoming increasingly popular due to their ability to deliver large amounts of data at a reduced deployment cost. While P2P systems faster the development of novel media applications, they also represent an interesting alternative paradigm for media streaming applications that can benefit from the inherent self organi...
Article
Full-text available
P2P networks are characterized by a potentially large and highly dynamic population of hosts that join and leave the network frequently. Lots of Research has been done at design and evaluation of a quality adaptation streaming mechanism in a multi-source streaming to a single receiver. Multimedia streaming is a real time application so, the main ch...
Article
Full-text available
In this paper, we propose E-STAR for establishing stable and reliable routes in heterogeneous multi-hop wireless networks. E-STAR combines payment and trust systems with a trust-based and energy-aware routing protocol. The payment system rewards the nodes that relay others' packets and charges those that send packets. The trust system evaluates the...
Article
Full-text available
Watermarking is a promising solution to protect the copyright of multimedia data through Transcending, because the embedded message is always included in the data. Because of the fidelity constraint, watermarks can only be embedded in a limited space in the multimedia data. As a side effect of these different requirements, a watermarking system wil...
Article
Full-text available
Peer-to-peer (P2P) systems are becoming increasingly popular due to their ability to deliver large amounts of data at a reduced deployment cost. While P2P systems faster the development of novel media applications, they also represent an interesting alternative paradigm for media streaming applications that can benefit from the inherent self organi...
Article
Full-text available
In Wireless Network , Mobile Adhoc Network is a special kind of Network. It is a group of many mobile nodes in which we does not require any big infrastructure. In a wireless Network, any attack can be apply easily as compare to the wire based communication because in wireless sensor network we have limited security. In this paper , our main aim is...
Article
Full-text available
The key problem that arises due Video editing is widely used not only in professional movie making, but also in many other areas such as home videos, educational videos, and marketing videos. With the popularization of video cameras, even more potential applications are developing. Even relatively straightforward applications may wish to edit the v...
Article
Full-text available
Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of time , at the same time attacks on them have also increased as the data is in nuclear form (even though encoded), in these techniques. In last decade Visual Cr y ptography has evolved as an entity which divides the data into different shares and then e...

Network

Cited By