Gaurav Singal

Gaurav Singal
Netaji Subhas Institute of Technology | NSITONLINE · Computer Science and Engineering

B.Tech., M.Tech., Ph.D.
Assistant Professor in Netaji Subhas University of Technology, Delhi, India

About

64
Publications
8,962
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
345
Citations
Introduction
I am working as an assistant professor in Computer Science and Engineering Department at Netaji Subhas University of Technology, Delhi, India. I have completed my Master and Ph.D. from the Department of Computer Science in MNIT Jaipur. My current research areas are Internet of things, Deep Learning, Mobile adhoc networks, Deep reinforcement leaning, internet of drones.
Additional affiliations
June 2021 - August 2021
Netaji Subhas University of Technology
Position
  • Professor (Assistant)
Description
  • Teching and Research.
May 2017 - June 2021
Bennett University
Position
  • Professor (Assistant)
Description
  • Teaching, Research and Academics
January 2017 - May 2017
Indian Institute of Information Technology Kota
Position
  • Guest Faculty
Description
  • Teaching and research
Education
January 2013 - July 2017
July 2010 - June 2012
July 2006 - June 2010
Rajasthan Technical University
Field of study
  • Computer Science

Publications

Publications (64)
Article
The growing popularity of multimedia applications and services needs to support several quality of service metrics such as high throughput, low energy, and jitter, which is a challenging task in mobile ad hoc networks. Because of limited bandwidth, energy constraints, dynamic topology, transmission errors, and fluctuating link stability, the links...
Article
Full-text available
In recent research, link stability is getting tremendous attention in mobile adhoc networks (MANETs), because of several impediments that occur in a reliable and robust network. Link stability metric is used to improve network performance in terms of end-to-end delay, data success delivery ratio (DSDR) and available route time (ART). Energy consump...
Conference Paper
In MANETs, real-time multimedia applications make Quality of Service (QoS) support, a crucial issue regarding terms of increased throughput, reduced jitter and available bandwidth. The highly dynamic topology of the network, large variation of received signal strength at nodes and frequently varying link characteristics make QoS provisioning, a cha...
Article
Medical Internet of Things (MIoT) is an emerging area of IoT comprising of wearable sensor nodes having low-powered processors. Wearable nodes gather the physiological data of a patient and transmit this real-time information to the user over an insecure channel. There is a possibility that an attacker might gather the personal or medical informati...
Article
Physiological measurements are an important parameter of a person’s health. Therefore, we must take the information about our body’s physiological measurements to remain updated with our health status. There are a huge number of patients and few physicians in this world. This is creating an imbalance in the health industry. To cope with the imbalan...
Article
The multi-core architecture has revolutionized the parallel computing. Despite this, the modern age compilers have a long way to achieve auto-parallelization. Through this paper, we introduce a language that encouraging the auto-parallelization. We are also introducing Front-End for our auto-parallelizing compiler. Later, we examined our compiler e...
Article
Full-text available
In developing countries, stray animals can be frequently encountered on the roads, pathways, campuses, and other places. Due to this, the visually impaired (VI) are at more risk than the sighted ones. To gain more security and safety, they need a solution to deal with their problem. This experimentation aims to develop a hardware–software integrate...
Article
Full-text available
Detection and recognition of military vehicle from a given image or a video frame with the help of unmanned aircraft system is the major issue which we are concerned about. Vehicle identification and classification from a resource constraint device embedded on an aerial vehicle integrated with an intelligent object detection algorithm, is a big sup...
Article
Software-Defined Networking (SDN) is a programmable network architecture that allows network devices to be controlled remotely, but it is still highly susceptible to traditional attacks such as Address Resolution Protocol (ARP) Poisoning, ARP Flooding, and others. The classification of benign network traffic from ARP Poison and ARP Flooding attacks...
Article
Scene text detection is a complicated and one of the most challenging tasks due to different environmental restrictions, such as illuminations, lighting conditions, tiny and curved texts, and many more. Most of the works on scene text detection have overlooked the primary goal of increasing model accuracy and efficiency, resulting in heavy-weight m...
Article
Full-text available
Locomotion is basic to all human needs. Modern-day transport has come a long way but still far away from perfection and all-around safety. Lane Detection is a concept of demarcating lanes on the roads while the vehicle is moving. Lane detection algorithm is crucial aspect in making intelligent driving systems that can be used in autonomous self-dri...
Article
Full-text available
The main purpose of this paper is to develop an efficient machine learning model to estimate the electric power load. The developed machine learning model can be used by electric power utilities for proper operation and maintenance of grid and also to trade electricity effectively in energy market. This paper proposes a machine learning model using...
Article
Full-text available
The challenges involved in the traditional cloud computing paradigms have prompted the development of architectures for the next generation cloud computing. The new cloud computing architectures can generate and handle huge amount of data, which was not possible to handle with the help of traditional architectures. Deep learning algorithms have the...
Article
Recently introduced deep reinforcement learning (DRL) techniques in discrete-time have resulted in significant advances in online games, robotics, and so on. Inspired from recent developments, we have proposed an approach referred to as Quantile Critic with Spiking Actor and Normalized Ensemble (QC_SANE) for continuous control problems, which uses...
Chapter
Social media like Twitter, Facebook, Instagram, and LinkedIn are an integral part of our lives. People all over the world are actively engaged in these social media platforms. But at the same time, it faces the problem of fake profiles. Fake profiles are generally human-generated or bot-generated or cyborgs, created for spreading rumors, phishing,...
Chapter
Image classification is a combination of technologies: Image Processing (IP), Machine Learning (ML), and Computer Vision (CV). The classification of animals has been done in this work that are commonly found in the Indian scenario using two approaches: transfer learning and a custom‐built classification network, i.e., AnimNet. For transfer learning...
Chapter
In the presented study, the authors have compared the performances of various machine learning and deep learning algorithms on two separate datasets: the Wisconsin Diagnostic Breast Cancer dataset and the Wisconsin Breast Cancer Dataset. We evaluated the extent of their ability to correctly classify the samples as “malignant” or “benign”. The respe...
Article
Full-text available
Electric power load forecasting is an essential task in the power system restructured environment for successful trading of power in energy exchange and economic operation. In this paper, various regression models have been used to predict the active power load. Model optimization with dimensionality reduction has been done by observing correlation...
Article
The proliferation of smartphones equipped with various sensors created a large user base, which includes robots (smartphone controlled) as well. The high processor enabled smartphones are used as software robots to track hour-to-hour activities of users using on-board motion sensors. The magnetometer, accelerometer, and gyroscope are non-permission...
Article
Full-text available
Software-Defined Networking (SDN) is a networking paradigm that has redefined the term network by making the network devices programmable. SDN helps network engineers to monitor the network expeditely, control the network from a central point, identify malicious traffic and link failure in easy and efficient manner. Besides such flexibility provide...
Chapter
Nowadays Unmanned Aerial Vehicles (UAVs) have tremendous applications to make human life easier or to automate the process, similar to other technologies. In this paper we are developing a vision-based navigation system for UAVs, so that a UAV can follow a human athlete autonomously. This work involves two sub tasks 1) To detect and mark the leadin...
Chapter
In the light of recent events, an epidemic - COVID-19 which took the world by surprise and continues to grow day by day. This paper describes an idea to control the spread of disease by monitoring Social Distancing. As of now from where we stand, the only way to avoid further spreading is to maintain proper social distance. Combining the advanced d...
Chapter
The COVID-19 pandemic has rendered social distancing and use of face masks as an absolute necessity today. Coming out of the epidemic, we're going to see this as the new normal and therefore most workplaces will require an identification system to permit employees based on the compliance of protocols. To ensure minimal contact and security, automat...
Article
There have been tremendous improvements in deep learning and reinforcement learning techniques. Automating learning and intelligence to the full extent remains a challenge. The amalgamation of Reinforcement Learning and Deep Learning has brought breakthroughs in games and robotics in the past decade. Deep Reinforcement Learning (DRL) involves train...
Conference Paper
Full-text available
Borders play an integral part in a country's security, but Borders are extremely vulnerable and prone to terrorist assaults, illegal smuggling of drugs, and unauthorized immigration. To achieve improved situation analysis, it is essential to fuse sensor-based detection with drone surveillance system to aid the present surveillance system. A wide ra...
Article
Full-text available
Biometrics is the study of unique characteristics present in the human body such as fingerprint, palm-print, retina, iris, footprint, etc. While other traits have been explored widely, only a few people have been considered the foot-palm region, despite having unique properties. Prior work has explored the foot shape features using length, width, m...
Conference Paper
Full-text available
Software defined networking is going to be an essential part of networking domain which moves the traditional networking domain to automation network. Data security is going to be an important factor in this new networking architecture. Paper aim to classify the traffic into normal and malicious classes based on features given in dataset by using v...
Chapter
Visually impaired face various difficulties in their daily routine tasks. Though there are several modern assistive devices available in the market, they are not meeting the consumer requirements in terms of the level of assistance. We are providing an assistive solution for visually impaired that reduces the fraud cases (such as expired medicine)...
Article
Internet of Things (IoT) refers to a wide variety of embedded devices connected to the Internet, enabling them to transmit and share information in smart environments with each other. The regular monitoring of IoT network traffic generated from IoT devices is important for their proper functioning and detection of malicious activities. One such cru...
Article
Full-text available
In recent years, the Indian economy has shown rapid growth among all other major economies. India has been tragically reviled with issues like corruption and black currency, fake money notes is additionally major issues to it, in spite of a strong security feature are endorsed by RBI to print original currency. The advancement of color printing tec...
Article
Full-text available
In India, nearly 12 million visually impaired people had difficulty in identifying the currency notes. There is a need to develop an application that can recognize the currency note and provide a vocal message. In this paper, a novel lightweight Convolutional Neural Network (CNN) model is developed for efficient web and mobile applications to recog...
Article
Corridor segmentation is an essential component of the Indoor Navigation System (INS) for robotic activity. It is required for navigation from one place to another in the indoor environment for different applications such as autonomous corridor cleaning, robot-based customer service in hotels, malls, and hospitals. Global Positioning System (GPS) d...
Article
One-Sixth of the world population is suffering from vision impairment, as per WHO’s report. In the past decades, many efforts have been done in developing several devices to provide support to visually blind and enhance the quality of their lives by making them capable. Many of those devices are either heavy or costly for general purposes. In this...
Chapter
An Electronic Travel Aid (ETA) has become a necessity for visually impaired to provide them proper guidance and assistance in their daily routine. As the number of blind persons are gradually increasing, there is a dire need of an effective and low-cost solution for assisting them in their daily tasks. This paper presents a cane called R-Cane which...
Conference Paper
Detecting a specific person from the crowd using drone along with some resource constraint device is a major concern which we are discussing in the paper. Combining the advanced algorithms and some smart hardware material, we will be finding a way to search for a missing individual in a crowd or at some location. We can also search for a person at...
Conference Paper
Fruits are common items bought by every household. They are delicious to eat and rich in nourishment. However they may also adversely affect health if the fruits are from a diseased tree/plant. Moreover, Farmers may also loose lot of amount of profit if their plants get affected by some disease. In this article, the main objective/goal is to develo...
Chapter
Automatic parallelization is necessary for all system. Every person wants the program to execute as soon as possible. Now Days, programmer want to get run faster the sequential program. Automatic parallelization is the greatest challenge in now days. Parallelization implies converting the sequential code to parallel code to getting better utilizati...
Chapter
A vehicular ad hoc network (VANET) is the network of mobile devices as well as stationary objects that can communicate with each other. This technology comprises of both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) data transmission links. At present, vehicular mobility framework has a lot of limitations, which includes lack of real...
Chapter
A vehicular ad hoc network (VANET) is the network of mobile devices as well as stationary objects that can communicate with each other. This technology comprises of both vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) data transmission links. At present, vehicular mobility framework has a lot of limitations, which includes lack of real...
Conference Paper
Full-text available
In this article we propose a novel biometric identification method using Footprint. A paper scanner was used to obtain images to uniquely identify the person. 312 footprint images from 78 persons(2 samples each foot) were analyzed, leading to the conclusion that footprints could also be used to identify human. Physiological and behavioral biometric...
Article
Full-text available
Multicast communication plays a crucial role in Mobile Adhoc Networks (MANETs). MANETs provide low cost, self configuring devices for multimedia data communication in military battlefield scenarios, disaster and public safety networks (PSN). Multicast communication improves the network performance in terms of bandwidth consumption, battery power an...
Article
In MANETs, real-time multimedia applications make Quality of Service (QoS) support, a crucial issue regarding terms of increased throughput, reduced jitter, and available bandwidth. Most of the existing routing protocols focus on straight forward hop-count metric and are less adaptable to densely distributed and highly mobile networks. Therefore, M...
Conference Paper
MANETs hold the potential to replace the existing wireless technology mainly because of the features it provides like ease of deployment, no need of infrastructure, support of dynamic topology, etc. Therefore, addressing the issues of MANETs is very important. Security of MANETs has always been an important issue affecting their reliability and eve...
Conference Paper
In MANETs, there are many critical issues such as energy consumption, QoS, exposure to attacks, link stability etc. that need to be addressed for improved communication. `Link Stability' is important because radio links are likely to be unreliable due to node mobility. This instability leads to increased rerouting which further escalates routing ov...

Questions

Question (1)
Question
Anyone know about UAV network simulator.
I have to work on multicast network on UAV devices to communicate multimedia data.
Thanks

Network

Cited By