Sudeep Tanwar

Sudeep Tanwar
Nirma University | NU · Institute of Technology

B.Tech (CSE) , M.Tech (IT) Hons , Ph.D(CSE)
SUDEEP TANWAR'S RESEARCH GROUP (ST Lab) http://sudeeptanwar.in/

About

432
Publications
147,085
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
9,048
Citations
Introduction
Sudeep Tanwar (M’15, SM’21) is currently working as a Professor of the Computer Science and Engineering Department at Institute of Technology, Nirma University, India. Dr Tanwar is a visiting Professor in Jan Wyzykowski University in Polkowice, Poland and University of Pitestiin Pitesti, Romania. Dr Tanwar’s research interests include Blockchain Technology, Wireless Sensor Networks, Fog Computing, Smart Grid, and IoT. He has authored 02 books and edited 13 books, more than 200 technical papers
Additional affiliations
April 2021 - present
Nirma University
Position
  • Professor
July 2016 - April 2021
Nirma University
Position
  • Professor (Associate)
April 2010 - July 2016
Bharat Institute of Technology
Position
  • Ass Professor

Publications

Publications (432)
Chapter
The emergence and confluence of progressive technologies like artificial intelligence, Internet of things, and automation in Industry 4.0 have also driven parallel domains like the education sector. Today’s digital education aligns with the progressive dynamics of Industry 4.0, and with the increasing mix of information and communication technology...
Chapter
Recommender systems (RS) are information filtering algorithms that suggest users items that they might be interested in. In this paper, the authors have proposed a content-based approach that maintains fresh recommendations in a music recommendation ecosystem that improves by suggesting new recommendations. A collaborative filtering system has been...
Poster
Full-text available
A two days International Conference on “Artificial Intelligence and Sustainable Computing for Smart Cities (AIS2C2)” is proposed to be held on 21-22 December 2022 in the University School of Information and Communication Technology. AIS2C2 is to endeavour the participants with the recent research being carried out across the AI Technologies and Sus...
Article
Error-correcting codes with limited errors and higher spectral efficiency are the main con-21 cern for wireless communications. In the current situation, users are growing daily to satisfy the 22 growing demand for users with improved QoS. Adaptive Antenna Grouping (AAG) with a multi-23 level space-time trellis coding scheme in the Multiuser massiv...
Article
The rapid development of computing devices and automation in various fields drastically increased the growth of data, which promotes the usage of Machine Learning (ML) techniques to get insights from the generated data. However, data processed by ML algorithms lead to several privacy issues, including leakage of users' biometric data while sharing...
Article
The emerging demand for electric vehicles in urban cities raises the need to install a huge number of charging stations. With this increase, electric vehicle coordination and scheduling at the charging station become tedious in real-time. Thus, there is a need for an efficient scheduling mechanism for electric vehicle charging at the charging stati...
Article
Device-to-device (D2D) communication has captured the researchers attention working in data-intensive applications. It has various benefits, such as low communication latency, load balancing, high spectral efficiency, and many more. However, despite these benefits, it has significant issues like efficient resource allocation, device discovery, and...
Article
Full-text available
Device-to-device (D2D) is a fifth-generation (5G) network's key technology, which allows devices in proximity to communicate one-to-one without a base station (BS). Moreover, it ameliorates channel gain, communication latency, energy efficiency, and spectral efficiency. However, mitigating interference (D2D and cellular mobile users (CMUs)) and eav...
Conference Paper
The Global Novel Coronavirus Disease-2019 (COVID-19) pandemic has forced social distancing norms that have been followed worldwide. Thus, traditional biometric-based attendance marking systems are replaced with contactless attendance marking schemes. However, there are limitations of manufacturing cost, spoofing attacks, and security vulnerabilitie...
Article
Full-text available
Internet of things (IoT) has massively adopted the market due to the current era demanding fully intelligent and autonomous services. However, efficient network management and message exchange are challenging in a dynamic and energy-constrained IoT environment. Hence, for efficient message passing in IoT applications, softwarization of the IoT netw...
Article
In recent years, the Internet of Things (IoT) has become very popular as it has numerous applications in the industrial and research domain. Moreover, the features of IoT systems play a crucial role for the development of smart cities. It enables smart cities and their subsystems to monitor, control, and manage heterogeneous devices remotely by ext...
Article
Full-text available
Detecting malicious activity in advance has become increasingly important for public safety, economic stability, and national security. However, the disparity in living standards incites the minds of certain undesirable members of society to commit crimes, which may disrupt society’s stability and mental calm. Breakthroughs in deep learning (DL) ma...
Article
Full-text available
The smart healthcare system has improved the patients quality of life (QoL), where the records are being analyzed remotely by distributed stakeholders. It requires a voluminous exchange of data for disease prediction via the open communication channel, i.e., the Internet to train artificial intelligence (AI) models efficiently and effectively. The...
Article
Machine-to-Machine (M2M) communication in the Long Term Evolution (LTE) network has recently grown exponentially as the volume of connected devices has increased rapidly in the last decade. M2M traffic can be understood via certain parameters in terms of packet length, packet generation frequency, delay, and data rate requirements, and it typically...
Article
The proliferating outbreak of COVID-19 raises global health concerns and has brought many countries to a standstill. Several restrain strategies are imposed to suppress and flatten the mortality curve, such as lockdowns, quarantines, etc. Artificial Intelligence (AI) techniques could be a promising solution to leverage these restraint strategies. H...
Article
This paper proposes a blockchain and non-cooperative game theoretic-based secure and optimized data pricing scheme, i.e., Block-CPS. It aims to secure the data transactions between vehicle owners and customers for rides. It uses fifth-generation (5G) communication network that offers ultra-reliable low-latency communications between vehicle owners...
Article
Full-text available
Artificial intelligence has extensively been utilized in the healthcare sector for the last few decades to simplify medical procedures, such as diagnosis, prognosis, drug discovery, and many more. With the spread of the covid-19 pandemic, more of its methods for detecting and treating covid-19 infections have been added. Several research projects i...
Article
Full-text available
The existing grid infrastructure has already begun transforming into the next-generation cyber-physical smart grid (SG) system. This transformation has improved the grid’s reliability and efficiency but has exposed severe vulnerabilities due to growing cyberattacks and threats. For example, malicious actors may be able to tamper with system reading...
Article
Full-text available
In the healthcare domain, a transformative shift is envisioned towards Healthcare 5.0. It expands the operational boundaries of Healthcare 4.0 and leverages patient-centric digital wellness. Healthcare 5.0 focuses on real-time patient monitoring, ambient control and wellness, and privacy compliance through assisted technologies like artificial inte...
Article
Full-text available
Electric vehicles (EVs) have gained prominence in smart transportation due to their unparalleled benefits of reduced carbon footprints, improved performance, and intelligent energy trading mechanisms. These potential benefits have increased EV adoption at massive scales, but energy management in EVs is a critical study problem. The problem is furth...
Article
Full-text available
The COVID-19 pandemic is rapidly spreading across the globe and infected millions of people that take hundreds of thousands of lives. Over the years, the role of Artificial intelligence (AI) has been on the rise as its algorithms are getting more and more accurate and it is thought that its role in strengthening the existing healthcare system will...
Article
An annular ring microstrip antenna (ARMSA) with metallic drilled holes and a defected ground structure is proposed for ultra-wideband applications. The annular ring microstrip patch antenna is excited by the microstrip line feed. The outer radius of the annular ring was optimized in this paper to choose the resonant frequency corresponding to the h...
Article
Full-text available
Nowadays, health insurance has become an essential part of people's lives as the number of health issues increases. Healthcare emergencies can be troublesome for people who can't afford huge expenses. Health insurance helps people cover healthcare services expenses in case of a medical emergency and provides financial backup against indebtedness ri...
Article
Full-text available
Parkinson’s disease (PSD) is a neurological disorder of the brain where nigrostriatal integrity functions lead to motor and non-motor-based symptoms. In this disease, doctors can assess the patient based on the patient’s history and symptoms. However, these symptoms are similar in various neurodegenerative diseases, such as progressive supranuclear...
Article
Full-text available
Supply chain management (SCM) is a core corporate activity responsible for moving commodities and services from one point to another through various stakeholders. The traditional SCM is based on a centralized approach managed at the central headquarter, and all other sub-offices get instructions from the main office. Some major issues with present...
Article
Full-text available
In this paper, we used the single-photon emission computerized tomography (SPECT) imaging technique to visualize the deficiency of dopamine-generated patterns inside the brain. These patterns are used to establish a patient’s disease progression, which helps distinguish the patients into different categories. Furthermore, we used a convolutional ne...
Article
Full-text available
The fake news "infodemic", facilitated by social media and mobile message sharing platforms, has progressed from causing a nuisance to seriously impacting law and order through deliberate and large-scale manipulation of public sentiments. There are social, religious, political, and economic dimensions to the fake news phenomenon, providing enough m...
Article
Full-text available
The next whooping revolution after the Internet is its scion, the Internet of Things (IoT), which has facilitated every entity the power to connect to the web. However, this magnifying depth of the digital pool oil the wheels for the attackers to penetrate. Thus, these threats and attacks have become a prime concern among researchers. With promisin...
Conference Paper
Metaverse allows users a seamless and immersive integration of real-world three-dimensional (3D) objects with virtual worlds. Smart healthcare has transitioned towards health-care 5.0, which allows ambient tracking of patients, emotive telemedicine, telesurgery, wellness monitoring, virtual clinics, and personalized care. Thus, the metaverse is a p...
Conference Paper
In modern smart communities, decentralized ride-sharing (RS) via cab aggregator (CA) services allow users to share trips at reduced expenses, and also help in mitigating congestion. The cab user (CU), and cab driver (CD) share sensitive information (credentials, account linkages, and location information) via open channels over CAs distributed serv...
Article
M2M communication in the industrial Internet of things (IIoT) is still in its infancy as the information exchange between machines is hindered by various modern security challenges and threats. An attacker can leverage the M2M communication by exploiting it with resource exhaustion, data integrity, and injection attacks. In this article, to address...
Article
Full-text available
One of the primary challenges that wireless technology in the present generation is facing is always best connected (ABC) service. This is possible only when the wireless overlay networks follow a cooperative and coordinated process. Vertical handoff is one such process. Concerning this process, the main challenge is to develop algorithms that take...
Article
Full-text available
Recently, healthcare stakeholders have orchestrated steps to strengthen and curb the COVID-19 wave. There has been a surge in vaccinations to curb the virus wave, but it is crucial to strengthen our healthcare resources to fight COVID-19 and like pandemics. Recent researchers have suggested effective forecasting models for COVID-19 transmission rat...
Article
The rise of automation with machine-type communication (MTC) holds great potential in developing industrial internet of things (IIoT)-based applications such as smart cities, intelligent transportation systems (ITS), supply chains, and smart industries without any human intervention. However, MTC communication has to cope with significant security...
Article
Full-text available
With the tremendous growth in mobile phones, mobile application development is an important emerging arena. Moreover, various applications fail to serve the purpose of getting the attention of the intended users, which is determined by their User Interface (UI) and User Experience (UX). As a result, developers often find it challenging to meet the...
Conference Paper
Autonomous vehicles (AVs) are a potential technology for improving safety and driving efficiency in intelligent transportation systems (ITSs). However, AVs are subject to various cyber-attacks, comprising denial-of-service, spoofing, sniffing, and cross-site scripting. To overcome the security issues in AV, this paper proposed an intelligent framew...
Conference Paper
Internet of Things (IoT) has massively adopted the market due to the current era demanding fully intelligent and autonomous services. The IoT industry is flourishing in terms of Internet of healthcare things, Internet of vehicles and autonomous driving, unmanned aerial vehicles, satellite and industrial Inter-net of things smart homes, etc. IoT can...
Article
Full-text available
There is a massive transformation in the traditional healthcare system from the specialist-centric approach to the patient-centric approach by adopting modern and intelligent healthcare solutions to build a smart healthcare system. It permits patients to directly share their medical data with the specialist for remote diagnosis without any human in...
Article
Recently, unmanned aerial vehicles (UAVs) are deployed in Novel Coronavirus Disease-2019 (COVID-19) vaccine distribution process. To address issues of fake vaccine distribution, real-time massive UAV monitoring and control at nodal centers (NCs), the authors propose SanJeeVni, a blockchain (BC)-assisted UAV vaccine distribution at the backdrop of s...
Article
In this paper, we propose a dynamic spectrum allocation (DSA) scheme DeepBlocks at the backdrop of sixth-generation (6G) communication networks that address the challenges of fixed spectrum allocations (FSA). The scheme exploits the advantages of deep-Q-network (DQN) and minimizes the search state explosion through a reward-penalty framework. A dyn...
Article
Full-text available
In Smart Grid (SG), Transactive EnergyManagement (TEM) is one of the most promising approaches to boost consumer participation in energy generation, energy management, and establishing decentralized energy market models using Peer-to-Peer (P2P). In P2P, a prosumer produces electric energy at their place using Renewable Energy Resources (RES) like s...
Article
Full-text available
Industry 4.0 have witnessed a paradigm shift from cyber-physical systems (CPS) that aims at massive automation, towards a more customer-driven approach. The shift has been attributed to the design of hyper-cognitive systems, integration of virtual and extended reality, digital machinery prototyping and twin designs, trusted machine boundaries, coll...
Article
Full-text available
A fall detection system is vital for the safety of older people, as it contacts emergency services when it detects a person has fallen. There have been various approaches to detect falls, such as using a single tri-axial accelerometer to detect falls or fixing sensors on the walls of a room to detect falls in a particular area. These approaches hav...
Article
Non-profit organizations raise charity donations through different sources, and raised funds often require clean traceability. Recently, fake charity fundraisers schemes have raised a social concern, and thus a trusted and auditable approach is necessary to manage charity organizations' reputations. Blockchain-based charity (BBC) schemes are propos...
Article
Full-text available
With the growth in food products’ usage, ensuring their quality and safety has become progressively difficult. Specifically, food traceability turns out to be a very critical task for retailers, sellers, consumers, surveillance authorities, and other stakeholders in the food supply chain system. There are requirements for food authenticity verifica...
Article
The emergence of on-demand service provisioning by Federated Cloud Providers (FCPs) to Cloud Users (CU) has fuelled significant innovations in cloud provisioning models. Owing to the massive traffic, massive CU resource requests are sent to FCPs, and appropriate service recommendations are sent by FCPs Currently, the fourth-generation (4G)-Long Ter...
Article
Full-text available
There is a drastic increase in urbanization over the past few years, which requires energy-efficient and optimized solutions for transportation, governance, quality of life in a smart city among all the citizens. The Internet-of-Energy (IoE) ecosystem offers many sophisticated and ubiquitous applications for smart cities. The energy demand of IoE a...
Article
Full-text available
Artificial Intelligence (AI) has given significant solutions to the healthcare domain for analyzing various chronic diseases. With the advent of high-end systems, i.e., Graphics Processing Units (GPUs), AI widespread the healthcare domain, where human experts are dominating. AI techniques make the early identification and diagnosis of diseases, whi...
Article
Full-text available
The next wave in smart transportation is directed towards the design of renewable energy sources that can fuel automobile sector to shift towards the autonomous electric vehicles (AEVs). AEVs are sensor‐driven and driverless that uses artificial intelligence (AI)‐based interactions in Internet‐of‐vehicles (IoV) ecosystems. AEVs can reduce carbon fo...
Article
Full-text available
In this era of modern digital technologies, the Internet of Vehicles (IoVs) is omnipresent and can be used for varied purposes. However , these devices have scalability, security, and connection issues. To address the IoV security issues, BC technology is a viable solution. BC offers decentralization, transparency, immutability, and privacy, which...
Article
Full-text available
The emerging need for high data rate, low latency, and high network capacity encourages wireless networks (WNs) to build intelligent and dynamic services, such as intelligent transportation systems, smart homes, smart cities, industrial automation, etc. However, the WN is impeded by several security threats, such as data manipulation, denial-of-ser...
Article
Full-text available
Device-to-Device (D2D) communication is an emanating and robust technology for next-generation wireless networks. It aims to minimize load from the centralized Base Station (BS) and lets the device communicate directly in the presence or absence of it. Further, to increase the spectral efficiency, it operates in an underlay mode, where D2D devices/...
Article
Full-text available
Integrating information and communication technology (ICT) and energy grid infrastructures introduces smart grids (SG) to simplify energy generation, transmission, and distribution. The ICT is embedded in selected parts of the grid network, which partially deploys SG and raises various issues such as energy losses, either technical or non-technical...
Article
In this paper, we propose a mobile blockchain (MB) based mining-as-a-service (MaaS) scheme, MB-MaaS for resource-constrained industrial internet-of-things (IIoT) environments. The scheme addresses the research gaps of fixed static allocation for miners to perform computationally intensive mining tasks through a multi-hop computational offloading (C...
Article
The adaptation of intelligent transportation system has evolved the quality of life of people with the huge demand for electric vehicles. Moreover, it becomes essential to schedule an electric vehicle for charging optimally. Therefore, this paper proposes a blockchain-based electric vehicle charging reservation scheme for optimum pricing. It primar...
Article
Full-text available
In recent years, artificial intelligence (AI) has become one of the most prominent fields, especially in autonomous vehicles (AVs). With the help of AI, the stress level of drivers has been reduced as most of the work is being executed by the AV itself. With the increasing complexity of models, eXplainable Artificial Intelligence (XAI) techniques w...
Article
Full-text available
Robotic Process Automation (RPA) has emerged as a new sub‐domain in software‐based automation. RPA‐based software bots promise to alleviate the tedium in labour‐intensive tasks involving manual and repetitive operations. Therefore, RPA finds wide adoption across industries and domains. In this paper, RPA use cases for academia and document early im...