Parminder Singh

Parminder Singh
Lovely Professional University | LPU · Discipline of Computer Science & Engineering

Ph.D. (Computer Science and Engineering)
Post Doctoral Researcher (Applied Cryptography and Information Security)

About

64
Publications
21,998
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
446
Citations
Additional affiliations
January 2012 - October 2019
Lovely Professional University
Position
  • Professor (Assistant)

Publications

Publications (64)
Article
The coronavirus pandemic has overburdened medical institutions, forcing physicians to diagnose and treat their patients remotely. Moreover, COVID-19 has made humans more conscious about their health, resulting in the extensive purchase of IoT-enabled medical devices. The rapid boom in the market worth of the internet of medical things (IoMT) captur...
Article
Full-text available
Cloud computing is a cost-effective method of delivering numerous services in Industry 4.0. The demand for dynamic cloud services is rising day by day and, because of this, data transit across the network is extensive. Virtualization is a significant component and the cloud servers might be physical or virtual. Containerized services are essential...
Article
Full-text available
Health care is one of the least funded sectors in Bangladesh and many other similar developing countries. People living in rural and remote areas do not have access to proper health care, and when they do, it is too expensive. This research aimed to develop a real-time health monitoring system that is cheap, easy to use, and accessible by doctors a...
Article
The smart power grid is a critical energy infrastructure where real-time electricity usage data is collected to predict future energy requirements. The existing prediction models focus on the centralized frameworks, where the collected data from various Home Area Networks (HANs) are forwarded to a central server. This process leads to cybersecurity...
Article
The compute-intensive and latency-sensitive Internet of Things (IoT) applications need to use the services from various computing paradigms, but they are facing many challenges such as large values of latency, energy and network bandwidth. To analyse and understand these challenges, we designed a performance evaluation benchmark that integrates clo...
Article
Full-text available
Healthcare organizations and Health Monitoring Systems generate large volumes of complex data, which offer the opportunity for innovative investigations in medical decision making. In this paper, we propose a beetle swarm optimization and adaptive neuro-fuzzy inference system (BSO-ANFIS) model for heart disease and multi-disease diagnosis. The main...
Article
Introduction The emergence of the concepts like Big Data, Data Science, Machine Learning (ML), and the Internet of Things (IoT) has added the potential of research in today's world. The continuous use of IoT devices, sensors, etc. that collect data continuously puts tremendous pressure on the existing IoT network. Materials and Methods This resour...
Chapter
Educational studies usually correspond to routine teaching methods and textbook literature. Although as an essential process of making learning effective and exciting for students, it is considered that the classroom courses must involve interactive activities. Implementation of such interactive methods can be achieved by fusing playful classroom g...
Article
Full-text available
Alzheimer’s disease has been one of the major concerns recently. Around 45 million people are suffering from this disease. Alzheimer’s is a degenerative brain disease with an unspecified cause and pathogenesis which primarily affects older people. The main cause of Alzheimer’s disease is Dementia, which progressively damages the brain cells. People...
Article
Full-text available
In a country, air defense systems are designed to reduce threats efficiently. An air defense system is a fundamental part of any country because it provides national security. This study presents an autonomous air defense system (AADS) development that will automatically detect aerial threats (e.g., drones) and target them without any human interve...
Article
Edge Artificial Intelligence (AI) is the latest trend for next-generation computing for data analytics, particularly in predictive edge analytics for high-risk diseases like Parkinson’s Disease (PD). Deep learning learning techniques facilitate edge AI applications for enhanced, real-time handling of data. Dopamine is the cause of Parkinson’s that...
Article
Full-text available
The elasticity characteristic of cloud services attracts application providers to deploy applications in a cloud environment. The scalability feature of cloud computing gives the facility to application providers to dynamically provision the computing power and storage capacity from cloud data centers. The consolidation of services to few active se...
Article
With the advent of the Internet-of-Things (IoT), it is considered to be one of the latest innovations that offer interesting opportunities for different vertical industries. One of the most relevant IoT technology areas is smart construction. IoT operates in several sectors on a daily basis; implementation includes smart building, smart grids, smar...
Article
Full-text available
There has been rapid development in the number of Internet of Things (IoT) connected nodes and devices in our daily life in recent times. With this increase in the number of devices, fog computing has become a well-established paradigm to optimize various key Quality of Service (QoS) requirements such as latency, bandwidth limitation, response time...
Article
The Industrial Internet of Things (IIoT) enhances smart manufacturing process that escalates productivity through revolutionary techniques. The manufacturing process is sophisticated and complex because of various IoT domains (e.g. industries). A final product is an outcome of the efforts of several departments from different industries. However, t...
Article
In recent years, rapid advancements in smart grid technology and smart metering systems have raised serious privacy concerns about the collection of customers' real-time energy usage behaviors. Due to cybersecurity attacks and threats, data aggregation operations in a smart grid are challenging. The majority of existing techniques have high computa...
Article
Edge of Things (EoT) technology enables end-users participation with smart-sensors and mobile devices (such as smartphones, wearable devices) to the smart devices across the smart city. Trust management is the main challenge in EoT infrastructure to consider the trusted participants. The Quality of Service (QoS) is highly affected by malicious user...
Article
Full-text available
Technology has enhanced the scope and span of the teaching and learning process but somehow it could not enhance the self-motivation and engagement among the students to the same scale. The lack of self-motivation and intermittent engagement is one of the prime challenges faced by educators today. Perplexing tasks for the faculty are to embroil stu...
Chapter
The virtualization of containers is a technique to run multiple processes in an isolated manner. Container gained popularity in improved application management and deployment because of its lightweight environment, flexible deployment, and fine-grained sharing of resources. Organizations are using containers extensively to deploy their increasingly...
Chapter
Fog Computing has emerged as an area that provides an efficient platform for computing to support sustainable development. This latest computing paradigm could be an expansion of cloud computing. The main focus of fog computing is to decrease the load on the cloud due to an extreme number of IoT devices increased in the last few years. Sustainable...
Chapter
Covid-19 has brought a challenging situation for the present education system. Online teaching adopted at various schools and colleges as a means to impart education to pupils has received a lot of confrontations not only by the students and parents who are at receiving end but also by the faculty who have utilized this method to continue the educa...
Article
Full-text available
Technological advances in recent years have significantly changed the way an operating room works. This work aims to create a platform to solve the problems of operating room occupancy and prepare the rooms with an environment that is favorable for all operations. Using this system, a doctor can control all operation rooms, especially before an ope...
Article
Full-text available
Peer-to-peer (P2P) applications have been popular among users for more than a decade. They consume a lot of network bandwidth, due to the fact that network administrators face several issues such as congestion, security, managing resources, etc. Hence, its accurate classification will allow them to maintain a Quality of Service for various applicat...
Article
The smart cities constitute sensing devices that collect a large amount of data. The sensor-based devices are widely using software-defined technology. The adaptation of software-defined devices to the new applications and environment requires a regular update in the programs. However, it is challenging to update the code of a large number of smart...
Patent
The present invention is a method for identification of ripened fruits for manual harvesting. The device is designed with a helmet with a strap to be worn around the head. The device established communication to the stakeholder with the assistance of microphone and speaker through a wireless communication based edge device. The device comes with a...
Article
Edge-of-Things (EoT) enables the seamless transfer of services, storage and data processing from the Cloud layer to Edge devices in a large-scale distributed Internet of Things (IoT) ecosystems (e.g., Industrial systems). This transition raises the privacy and security concerns in the EoT paradigm distributed at different layers. Intrusion detectio...
Conference Paper
Fog Computing has emerged as an area that provides an efficient platform for computing to support sustainable development. This latest computing paradigm could be an expansion of cloud computing. The main focus of fog computing is to decrease the load on the cloud due to an extreme number of IoT devices increased in the last few years. Sustainable...
Chapter
Full-text available
There is a great impact on our day-to-day life by integrating platforms of cloud computing and Internet-of-things (IoT). Also, some of the limitations exist in today’s era. Although various services of cloud are freely available and are also comparatively cheaper. But it consumes a large amount of network bandwidth. The main disadvantage of cloud c...
Article
Full-text available
A reliable and autonomic seed classification technique can overcome the issues of manual seed classification. It is a highly practical and economically vital need of the agriculture industry. The current techniques of machine learning and artificial intelligence allows the researchers to design a new data mining mechanism with higher accuracy. In t...
Article
Full-text available
The use of keystroke dynamics for user authentication has evolved over the years and has found its application in mobile phones. But the primary challenge with mobile phones is that they can be used in any position. Thus, it becomes critical to analyze the use of keystroke dynamics using the data collected in various typing positions. This research...
Chapter
Full-text available
Blockchain, which was invented by Satoshi Nakamoto to serve as the public transaction ledger of Bitcoin, has received a great amount of attention. Blockchain allows transactions to be performed in a decentralized manner. It is currently being applied in various fields such as reputation systems, internet of things (IoT) and financial services. Ther...
Article
Full-text available
Fog computing (FC) is used to reduce the energy consumption and latency for the heterogeneous communication approaches in the smart cities' applications of the Internet of Everything (IoE). Fog computing nodes are connected through wired or wireless medium. The goal of smart city applications is to develop the transaction relationship of real-time...
Chapter
Full-text available
The data transmission on network channel is of tremendous increases from the past few decades. Watermarking is a process to add watermark as a digital signal, label or tag into a cover media. The primary requirements of multimedia watermarking are robustness and embedding capability. The robustness is defined as the strength of an algorithm to repe...
Article
The complex and large‐scale scientific workflow applications are effectively executes on the cloud. The performance of cloud computing highly depends on the task scheduling. Optimal workflow scheduling is still a challenge that needs to be addressed due to the conflicting objectives and increasing demand for quality of service. Task scheduling is a...
Article
Full-text available
A false alarm rate of online anomaly-based intrusion detection system is a crucial concern. It is challenging to implement in the real-world scenarios when these anomalies occur sporadically. The existing intrusion detection system has been developed to limit or decrease the false alarm rate. However, the state-of-the-art approaches are attack or a...
Article
Background A large number of communities and enterprises deploy numerous scientific workflow applications on cloud service. Aims The main aim of the cloud service provider is to execute the workflows with a minimal budget and makespan. Most of the existing techniques for budget and makespan are employed for the traditional platform of computing an...
Article
Full-text available
Workload patterns of cloud applications are changing regularly. The workload prediction model is key for auto-scaling of resources in a cloud environment. It is helping with cost reduction and efficient resource utilization. The workload for the web applications is usually mixed for different application at different time span. The single predictio...
Article
Full-text available
The elasticity feature of cloud attracts the application providers to host the application in a cloud environment. The dynamic resource provisioning arranges the resources on-demand according to the application workload. The over-utilization and under-utilization of resources can be prevented with autonomic resource provisioning. In literature, the...
Article
Full-text available
Cloud computing emerging environment attracts many applications providers to deploy web applications on cloud data centers. The primary area of attraction is elasticity, which allows to auto-scale the resources on-demand. However, web applications usually have dynamic workload and hard to predict. Cloud service providers and researchers are working...
Conference Paper
Agriculture is the department which has shown a rapid growth. Due to this growth today we have a lot of variety of seeds which belongs to the same breed, which may be a result of breed crossover. Now, this has become a challenge to classify the seeds from each other. In another contrast, we have some healthy seeds and some of the seeds becomes defe...
Article
Full-text available
Objectives: To design a new framework to efficiently parallelize the steps of VLASPD algorithm using a hybridized apriori and fp-growth on GPU; to implement the existing and proposed framework in CUDA;to improve the performance factors like computational time, memory and CPU utilization.Methods/Statistical Analysis: This paper proposes the accelera...
Chapter
Hadoop is a disseminated framework that gives an appropriated file system and MapReduce group employment handling on vast bunches utilizing merchandise servers. Despite the fact that Hadoop is utilized on private groups behind an association’s firewalls, Hadoop is regularly given as an issue multi-inhabitant administration and is utilized to store...
Article
Workflow approaches are rising as the most important way to coordinate with distributed service. Analysts are unconscious by the scope of technology that as of now exists and concentrate on executing yet another restrictive workflow system. As a remedy to this normal issue, this paper shows a brief overview of existing workflow technology from the...
Article
Full-text available
Cloud computing is one of the biggest thing in computing in recent time. Cloud computing uses the internet and the central remote servers to support different data and applications. Cloud computing is that emerging technology which is used for providing various computing and storage services over the Internet. In the cloud computing, the internet i...
Conference Paper
Full-text available
Web applications these days are mostly multi-tier for the sake of software reusability and flexibility. However it is very difficult to estimate the behaviour of workloads in these tiers due to the fact that resource demand at each tier is distinct. So it becomes very confronting to allocate resources at each tier. In order to fulfil SLA (Service L...
Article
Cloud computing is a revolutionary model that offers storage, servers and networks as a service. It enables users to outsource their data and trust the service provider that provides them with all the services and storage. If the services are provided in a such a way that it meets the consumer requirement yet supports the green computing. Cloud inf...
Article
Hadoop Map-Reduce is a framework for parallel processing of large datasets in a clustered datacenter. The increase in the demand of sharing Hadoop clusters among various users leads to an increase in the system heterogeneity. In this paper, we propose to modify the pre-existing COSHH Scheduler. The ACOSHH algorithm discussed in this paper improves...
Article
The main problem associated with the widespread uptake of cloud computing environment is the lack of security measures due to which the potential customers have a lack of trust with the cloud computing. Many preventive controls for providing better security and privacy measures are actively researched and applied with the cloud environment; there i...
Article
Full-text available
Cloud computing is builds by the virtualization and distributed computing. On the bases of these factor cloud computing support cost-efficient usage of computing resources emphasizing an resource scalability and also on demand services. Now we are moving towards the advance communication and computational services that fulfill the all requirements...
Article
Full-text available
Cloud computing is an emerging trend in today's era. So with the advancement in technology there has been advancement in the aspects of cloud and its utilization. In this research we are going to discuss about live migration in clouds and how the single memory channel has been a bottleneck to the performance of CPU, communication and memory subsyst...
Article
Full-text available
Today, the web users surf many different websites regularly in the course of their daily lives. The usability and conversion rate of a website reflect the kind of experience the web users have on the website. The success of a website rides on the usability and conversion rate of the website. The higher the usability and conversion rate of the websi...
Article
Full-text available
engines available in the current scenario provides the content in number of fields whether it is related to science, technology, research or education but there is a scope of improvement which can lead to a search engine for a specific filed such as search engine specifically for Education purpose. A search engine hardly provides essential educatio...
Article
Full-text available
The motivation for this research work includes the provision of protection of intellectual property rights, an indication of content manipulation, and a means of protecting digital media from tampering and all this without affecting the quality of data. A new scheme is proposed for wave files which reduce the noise by applying Fast Fourier Transfor...
Article
Full-text available
Audio watermarking is used to hide information in audio signal. This data should not be hearable to human ear and it should robust, so that it could be used for the purpose of Intellectual Property Rights. In this research work a new scheme is proposed for wave files which reduce the noise by applying Fast Fourier Transformation (FFT) and taking ra...

Questions

Question (1)
Question
Following type of data near about 2GB text data.
SHRSYS.HSLC.ORG - - [28/Aug/1995:00:11:52 -0400] "GET /pub/journalism/info.wav HTTP/1.0" 200 38572
slip8.nb1.usu.edu - - [28/Aug/1995:00:11:52 -0400] "GET /pub/job/vk/view13.jpg HTTP/1.0" 200 6219

Network

Cited By

Projects

Projects (3)
Project
Workload modelling in cloud computing.