
Praneet SaurabhManipal University Jaipur · Department of Computer Science & Engineering
Praneet Saurabh
PhD (CSE)
About
57
Publications
5,204
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
634
Citations
Introduction
Dr. Praneet Saurabh currently works as Associate Professor at Department of Computer Science Engineering at Manipal University, Jaipur, Rajasthan, India. His research area includes Computer Communications (Networks), Computer Security, Computational Intelligence and Information Science.
Publications
Publications (57)
Genome sequence matching is vital for health analytics and treatment in healthcare 4.0. It focuses on finding whether a given sequence resembles other sequences that can help identify disease outbreaks faster. The healthcare 4.0 primarily require more efficient systems that can easily connect and interact with big data. The Internet of things (IoT)...
In mobile edge computing (MEC), it is difficult to recognise an optimum solution that can perform in limited energy by selecting the best communication path and components. This research proposed a hybrid model for energy-efficient cluster formation and a head selection (E-CFSA) algorithm based on convolutional neural networks (CNNs) and a modified...
High-speed wireless network technologies play a vital role in autonomous vehicle communication systems (AVS), i.e., IoV (Internet of Vehicles), and enhance the effectiveness and reliability of the communication network. Since the size of IoV communication is rapidly growing, it is now an essential part of our regular routines. Due to its dynamic na...
The COVID-19 pandemic has caused a worldwide catastrophe and widespread devastation that reeled almost all countries. The pandemic has mounted pressure on the existing healthcare system and caused panic and desperation. The gold testing standard for COVID-19 detection, reverse transcription-polymerase chain reaction (RT-PCR), has shown its limitati...
COVID-19 is an infectious and contagious disease caused by the new coronavirus. The total number of cases is over 19 million and continues to grow. A common symptom noticed among COVID-19 patients is lung infection that results in breathlessness, and the lack of essential resources such as testing, oxygen, and ventilators enhances its severity. Che...
Mobile ad-hoc network is a dynamic and self configuring network composed of mobile nodes that are cooperative and intelligent in nature, which forms a temporary network without any base station. Due to dynamic nature, route among source and destination is not fixed and it can change with time, this results in routing overhead, congestion and higher...
Cloud Computing is the decentralized type of architecture which is vulnerable to various type of security attacks. Homomorphic encryption is the encryption scheme to encrypt objects which are used to access data from the cloud server. Homomorphic encryption scheme has major disadvantage of key management and key sharing which reduce its efficiency....
A wireless sensor network (WSN) is a network of devices that can communicate after gathering information by monitoring any region through wireless links. Due to this delicate arrangement several numbers of attacks directly affects the WSN functions especially denial of service (DoS). DoS is the most popular and frequent among all to affect WSN. Rec...
Medical diagnosis and extracting patterns that can be converted into useful knowledge is a challenging work for researchers. Medical records are based on real-time data that have high dimensionality which makes task of extracting patterns even more complex. Prediction of various diseases often suffers due to large dimensionality that includes thyro...
Skyline operators are fascinating concepts that let the users extend and evolve a database system. SKY-MR+ algorithm is an efficient framework implemented for skyline operators and queries which uses quad-tree-based histogram, but faces serious limitations and provides inconsistent execution time especially for High datasets. In such cases, it also...
Role of gene expression in cancer and cellular process is a complex problem that continues to haunt and challenge researchers. Sheer number of genes and inter related biological processes make the process of identifying more complex. Gene classification and analysis is a very difficult task for data scientists, as it requires various data, informat...
Usenet is a popular distributed messaging and files sharing service. Usenet flood articles over an overlay network to fully replicate articles across all servers. However, replication of Usenet's full content requires that each server pay the cost of receiving (and storing) over 1 Tbyte/day. This paper shows the design and implementation of Usenet...
Ad-hoc networks play an important role in situations where fixed wired pre-defined backbone cannot be created. In mobile adhoc network (MANET), discovery of routing path with minimum routing and control overhead are important challenges. In this paper, Distributed multi criteria based clustering approach (DMBCA) is introduced for overcoming routing...
Security is an important need for any organization to establish trust and consequently prevents misuse. Intrusion detection system (IDS) is a defense mechanism that strives to differentiate between legitimate and malicious activities with intent to secure the resource and henceforth establish trust. Due to this importance significant amount of rese...
Delay-tolerant network (DTN) allows nodes to follow, store, and forward packets through different delivery mechanisms. These data bundles are created by sender to send data to multiple destinations. DTN supports multicast approach for communication. DTN enables the capability of transmission that involves long interruption, wait, and interoperable...
Cloud computing is one of the most important and remarkable innovations of recent times. Since all the data is stored in servers located at different locations operating on different hardware so data consistency, availability, and security while accessing becomes a challenging task. Cloud introduces different data access management techniques that...
Image enhancement is one of the key concerns pertaining to better quality image photography captured through modern digital cameras. Probability of digital images getting compromised through lightning and weather conditions remains high. Due to these environmental limitations, many a time loss of information from images is reported. Major role of i...
Data in the network is not secure and can be accessed by unauthenticated and unauthorized users. So to make data secure in the network, various encryption algorithms are used. Security along with confidentiality of the data is to be maintained in the network. Encryption is the technique by which data is encoded and sent to the receiver, where it ge...
Artificial Immune System (AIS) has evolved substantially from its inception and is utilized to solve complex problems in different domains out of which computer security is one of them. Computer Security has emerged as a key research area because of the ever-growing attacks and its methodology. Various security concepts and products were developed...
Astonishing similarity exists between the requirements of anomaly detection in computer security and Artificial Immune System (AIS). Inspired by Biological Immune System (BIS), AIS offers a lot of interesting features and intelligence. Most significant ones is its ability to distinguish self and non self, along with capabilities of self-learning, s...
During past few years the wireless network has grown in leaps and bounds as it offered the end users more flexibility which enabled a huge array of services. All these services are achieved due to the network which is the backbone. The concept of the wireless network and the wireless devices also brings a lot of challenges such as energy consumptio...
An Organization need to understand their customers' behavior, preferences and future needs which depend upon past behavior. Web Usage Mining is an active research topic in which customers session clustering is done to understand the customers activities. This paper investigates the problem of mining frequent pattern and especially focuses on reduci...
Cloud computing is one of the growing technology in computer science and an established way for sharing and accessing resources via internet. Load balancing is a method of reassigning the total load to the entity nodes of the collective system to create
resource utilization useful and to improve the response time of the job, concurrently eliminatin...
In this era many fake ranking websites show on first page with irrelevant to keyword as well as user mistrusted websites. In this project we using a neural network method to filter query on website group or set of group and predict relevant website after that search on that website for query. As well as this proposed system work without crawler.
Immune System (AIS) is a convoluted and complex arrangement derived from biological immune system (BIS). It possesses the abilities of self-adapting, self-learning and self- configuration. It has the basic function to distinguish self and non-self. Negative Selection Algorithm (NSA) over the years has shown to be competent for anomaly detection pro...
Artificial Immune System (AIS) over the years has caught attention of researchers of various domains for complex problem solving. AIS model the procedure and methodologies of Biological Immune System (BIS) which protects the body from diverse attacks and different challenges. Scientists over the years are amazed with the appealing features of BIS t...
Intrusion detection, a topic that has evolved heavily due to the rising concern for information technology security, has endured numerous architecture abstractions. All of these architecture abstractions have strengths and weaknesses with regard to various factors like efficiency, security, integrity, durability, and cost-effectiveness, to name a f...
Data hiding is a method of hiding secret messages into a cover media such that an unintended observer will not be aware of the existence of the hidden messages. Various embedding mechanisms are provided with different robustness capacity. This mechanism has two major categories of embedding data. In addition, it is observed that the unevenly distri...
Danger Theory is presented with particular predominance on analogies in the Artificial Immune Systems world. Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). The idea is that the artificial cells release signals describing their status, e.g....
Exponential growth of internet acted as a centrifugal force in the development of a whole new array of applications and services which drives the e- business/ commerce globally. Now days businesses and the vital services are increasingly dependent on computer networks and the Internet which is vulnerable to the evolving and ever growing threats, du...
During past few years the wireless network has grown in leaps and bounds as it offered the end users more flexibility which enabled a huge array of services. All these services are achieved due to the network which is the backbone. The concept of the wireless network and the wireless devices also brings a lot of challenges such as energy consumptio...
The world is more interconnected now due to the exponential growth of internet and its viability to the number of users through its various applications. This has also introduced many naïve and attack prone users to the network. The biggest challenge for today is to protect these users from any incident that can lead their mistrust towards the whol...
Future generation 4G wireless network is designed for flawless and continues connections between devices of several independent wireless networks like WLAN, GPRS and so on. Heterogeneous wireless networks will be dominant in the next-generation wireless networks with the integration of various wireless access networks. One of the most challenging p...
— An Ad hoc network is the network with no fixed infrastructure. There is no central administrator so any node can come and move in and outside of the network in a dynamic manner. This makes it more dynamic and complex which makes it more prone to attacks. They can attack either active or passive. Some effects of malicious nodes are Denial of servi...
Usenet is a popular distributed messaging and files sharing service. Usenet flood articles over an overlay network to fully replicate articles across all servers. However, replication of Usenet’s full content requires that each server pay the cost of receiving (and storing) over 1 Tbyte/day. This paper shows the design and implementation of Usenet...
Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. There is no fixed topology in this network due to the random mobility of nodes, interference, multipath propagation and path loss. Many Routing protocols have been proposed and developed for accomplishing this task. The intent of this paper is to analy...
Usenet is a distributed bulletin board system, built as a logical network on top of other networks and connections.
Wireless mobile ad-hoc networks are those networks which has no physical links between the nodes. Due to the mobility of nodes, interference, multipath propagation and path loss there is no fixed topology in this network. Hence some routing protocol is needed to function properly for these networks. Many Routing protocols have been proposed and dev...
The paper proposes a Parallel SVM for predicting the diabetes chances in human based on a survey dataset which relates the different body parameters with diabetic and non diabetic persons. The aim of the paper is to correctly predict the future possibility of diabetes for any person. Since the survey dataset size could be very large with large numb...
Questions
Questions (5)
Please give specific time bound information
Various academicians (reviewers) oftenly comment that any (X), (Y) or (Z) dataset is obsolete, its old, then what is most relevant dataset ?
Is KDD Cup dataset still relevant and can be used in research works ?
Dear Dharmendra,
I was reading one of your papers named Negative Selection with Antigen Feedback in Intrusion Detection that discusses Arisytis, and found it quite interesting, but was unable to find the kit at the link. Can you please share the kit or some alternate link where i can get the kit.
Thanks.
Praneet