About
88
Publications
6,707
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
530
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
December 2020 - September 2021
July 2014 - December 2020
July 2012 - July 2014
Education
July 2013 - April 2021
September 2010 - July 2012
August 2006 - May 2010
Publications
Publications (88)
The present invention generally relates to a virtual reality (VR) navigation system using artificial intelligence (AI), thus enabling providing of individualized and context-aware navigation experience in VR environments. It consists of an AI-inclusive central processing unit (CPU) that receives and processes real-time data from multiple hardware s...
The evolution of blockchain technology presents transformative potential for event management, particularly in enhancing security, transparency, and efficiency across the industry. This paper introduces a blockchain-based event management system that leverages Sui blockchain technology to address critical challenges such as ticket fraud, data secur...
The evolution of blockchain technology offers transformative ability for event control, specially in enhancing safety, transparency,and efficiency across the industry. This paper introduces a blockchain-based event management machine that leveragesSui blockchain era to cope with vital challenges together with ticket fraud, facts security, and exces...
In the ever-evolving landscape of assistive technologies, the visually impaired community encounters unique challenges in pursuing heightened mobility and environmental awareness. The endeavor to navigate through perpetually shifting and often unpredictable surroundings necessitates innovative solutions that empower individuals with visual impairme...
Natural catastrophes including hurricanes, floods, wildfires, and earthquakes can seriously harm people and property. Floods that destroy houses, businesses, government buildings, and other properties cause enormous economic losses in addition to human casualties. This loss cannot be recovered; however, flood damage can frequently be reduced by sup...
Online proctoring tools and techniques have gained significant attention in recent years due to the increasing popularity of online learning platforms and online assessments. This chapter provides an in-depth analysis of different online proctoring techniques and tools that are commonly used to maintain the integrity of online exams. The chapter be...
The increasing demand for online education has opened up new avenues for academic institutions and students alike. However, the issue of maintaining academic integrity during online exams has emerged as a significant challenge. To address this concern, artificial intelligence (AI) has been harnessed to create sophisticated online proctoring systems...
Cloud robotics is currently regarded as one of the cutting-edge research areas within the mainstream automation and artificial intelligence fields. The new machine-to-cloud communication will increase the productivity and efficiency of industrial robots. For decades, automated devices have been developing and affecting practically every element of...
With its exponential growth, the Internet of Things (IoT) has produced unprecedented levels of connectivity and data. Anomaly detection is a security feature that identifies instances in which system behavior deviates from the expected norm, facilitating the prompt identification and resolution of anomalies. When AI and the IoT are combined, anomal...
Web authentication methods are subject to several attacks due to the rapid expansion of information technology. It is apparent that the evolution of authentication-bypassing strategies, from brute force to dictionary attacks, will advance. Simple word lists, for instance, are employed in traditional dictionary attacks to crack commonly used usernam...
This state-of-the-art review comprehensively examines the landscape of Distributed Denial of Service (DDoS) anomaly detection in Software Defined Networks (SDNs) through the lens of advanced Machine Learning (ML) and Deep Learning (DL) techniques. The application domain of this work is focused on addressing the inherent security vulnerabilities of...
Nowadays, Online Education has been an inevitable choice of practice in the teaching-learning process. Learner engagement is one of the ineluctable challenges faced by the course teachers. For sustaining the learner's engagement throughout the course, teachers have to plan teaching-learning activities such as learning environment, content delivery,...
In the rapidly evolving landscape of computing and networking, the concepts of cloud networks have gained significant prominence. Although the cloud network offers on-demand access to shared resources, anomalies pose potential risks to the integrity and security of cloud networks. However, protecting the cloud network against anomalies remains a ch...
In the above article
[1]
, reference 40 was retracted. As the work in this reference is no longer reliable, we are replacing it with
[2]
. As a result, the fourth paragraph of Section VI.A. DDoS ANOMALY BASED ON ML—EXISTING RESEARCH WORKS on page 56755 is changed to the following:
Traditional testimony and electronic endorsements are extremely challenging to uphold and defend, and there is a problem with challenging authentication. The identity of the student is typically not recognized when it comes to requirements for access to a student’s academic credentials that are scattered over numerous sites. This is an issue with c...
Cyber-physical systems (CPS) are the next generation of intelligent systems that combine the inherent and comprehensive embedding of communication and control technologies to integrate computational resources with hardware facilities. The CPS modules are more vulnerable to an attacker, raising the possibility of physical attacks that might compromi...
The name Industry 4.0 describes a synthesis of modern manufacturing techniques that help producers to hit targets more quickly. The manufacturing sector's trend is changing significantly because of digitalization and technological improvements. Technology that aids in comprehensive integration, such as IoT, cybersecurity, blockchain, big data, etc....
The competencies of engineering students are measured through personal, interpersonal and communication skills. This work aims to improve these skills of engineering students through a Design Thinking course. The course involves a series of individual and team activities in the process of conceptual design modeling or prototype development, which i...
Present generation of students give less attention in class. This is a serious issue among college or university-level students. The faculty members have to use active learning strategies to have better student engagement in their classes. The faculty has to carefully design these pedagogical practices in such a way that more than one student gets...
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures have centralized authority to provide authentication, authorization, and access control services. In this case, there is a possibility of data mishandling activities from the...
In today's world, everyone is generating a large amount of data on their own. With this amount of data generation, there is a change of security compromise of our data. This leads us to extend the security needs beyond the traditional approach which emerges the field of cyber security. Cyber security's core functionality is to protect all types of...
In recent years, the rise in the demand for quality products and services along with systems that could integrate the control mechanisms with high computational capabilities led to the evolution of cyber-physical systems (CPS). Due to the ongoing COVID-19 pandemic, several industries have remained closed, causing several monetary losses. Automation...
Cloud has become the primary means of mass data storage, with millions of users transacting data every second. Several companies and organizations have set up businesses to provide users around the world with efficient cloud storage systems. With the rise in demand for cloud storage, several Cloud Service Providers (CSPs) face an uphill task to mee...
With the surge of breast cancer, researchers have proposed many predicting methods and techniques. Currently, mammograms and analyzing the biopsy images are the two traditional methods used to detect the breast cancer. In this paper, the objective is to create a model that can classify or predict whether breast cancer is benign or malignant. Typica...
Electronic voting is essential in the digital world for voters, who will make their choice of vote through smartphones or computers. Ballot composition, ballot casting, ballot recording, and tabulation are the four steps in the election process. Electronic voting technology aims to speed up ballot counting, minimize the expense of hiring employees...
In response to the coronavirus (COVID-19) pandemic, Government and public health authorities around the world are developing contact tracing apps as a way to trace and slow the unfold of the virus. There is major divergence among nations, however, between a “privacy-first” approach that protects citizens’ information at the price of very restricted...
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As t...
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high...
Smart devices like mobile phones, tablets, and laptops have become necessities in our lives due to the services they provide. However, in recent days, mobile applications have become a major threat for an attack. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. Howev...
On facing this fast-moving world every bit of the world is leading by technology. Mobile phones are the major part of our day to day life. Mobile platforms are said to be the hardware and software environment for laptops, tablets, smartphones and also for other portable devices. Mobile operating systems and browsers lack secure application identity...
In the internet era, data is considered to be the primary asset, and the host or applications in a network are vulnerable to various attacks. Traditional network architectures have centralized authority to provide authentication, authorization, and access control services. In this case, there is a possibility of data mishandling activities from the...
Learners of countryside background, face different types of problems and challenges when they do their higher education in urban areas. Their culture, custom, and the way they had been taught in their schools are entirely different. These differences are the major concern for some students and they usually perform low in their higher education. It...
In today's world, everyone is generating a large amount of data on their own. With this amount of data generation, there is a change of security compromise of our data. This leads us to extend the security needs beyond the traditional approach which emerges the field of cyber security. Cyber security's core functionality is to protect all types of...
In the present scenario, the innovation in teaching is necessary to engage the students for the course of 36 to 40 hours. At the end of the course, the average student's strength will excel in performance and attains the course outcome with in-depth knowledge. To overcome the difficulties of slow and inactive learners for attaining the course outco...
Cloud Computing enables the remote users to access data, services and applications in on-demand from the shared pool of configurable computing resources. On the other hand, it is not easy for the cloud users to identify whether Cloud Service Provider's (CSP) tag along with the data security legal expectations. So, cloud users could not rely on CSP'...
Network scanning commonly implies the use of the computer network to collect information about the target systems. This type of scanning is performed by hackers for attacking the target and also by the system administrators for assessment of security and maintaining the system. Network scanning mainly analyzes the UDP and TCP network services that...
Cloud computing has given a bloom to the technical world by providing various services. Data storage is the essential factor for the users who are having or working with lots and lots of data. Cloud data storage becomes the only way to store and maintain the large data, which can be accessed from anywhere and anytime. The open nature of cloud compu...
Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing resources and pay-for-peruse basis. Generally, a session is said to be the collective information of an ongoing transaction. This package is typically stored on the server as...
Cloud computing enables the access of the resources such as network hardware’s, storage, applications and services that are configurable based on the demand in a network especially specific to the operations on the data. The need for data security in the cloud is progressively higher as the abundant sensitive data in the cloud are transferred among...
Information security plays a vital role in almost every application that we handle in our day-to-day life since the communication needs to be protected in terms of the messages that we send and receive. Thus, cryptography the science of encoding the secret information provides security from being known by the unintended receivers. It ensured confid...
Cryptography is an art of secret writing. To ensure data security in both data transfer and data storage cryptographic techniques are used for the data we handle in our day to day activities. The need for cryptographic techniques exists from the period of 150 B.C. till date. Though there are too many cryptographic algorithms, an algorithm with redu...
Cloud computing is a highly scalable and cost-effective infrastructure for running HPC, enterprise and Web applications. However, the growing demand of Cloud infrastructure has drastically increased the energy consumption of data centers, which has become a critical issue. High energy consumption not only translates to high operational cost, which...
Cloud computing is a technology for complex computing, it eliminates the need to have computing hardware, storage space and software. Multi tenancy is considered as important element in which same resources will be shared by multiple users. The users are named as tenants in the cloud environment. The tenants may run their applications in their own...
In recent years, computer worms are the remarkable difficulties found in the distributed computing. The location of worms turns out to be more unpredictable since they are changing quickly and much more refined. The difficulties in gathering worm's payload were recognized for identifying and gathering worm's payloads and the honey pot which is high...
Cloud computing is the fastest growing technology in today's world. Cloud services provide pay as go models on capacity or usage. For providing better cloud services, capacity planning is very important. Proper capacity planning will maximize efficiency and on the other side proper control over the resources will help to overcome from attacks. As t...
Cloud computing has given a bloom to the technical world by providing various services. Data storage is the essential factor for the users who are having or working with lots and lots of data. Cloud data storage becomes the only way to store and maintain the large data, which can be accessed from anywhere and anytime. The open nature of cloud compu...
Cloud computing is a technology that offers an enterprise model to provide resources made available to the client and network access to a shared pool of configurable computing resources and pay-for-peruse basis. Generally, a session is said to be the collective information of an ongoing transaction. This package is typically stored on the server as...
Information security plays a vital role in almost every application that we handle in our day-to-day lifesince the communication needs to be protected in terms of the messages that we send and receive. Thus,cryptography the science of encoding the secret information provides security from being known by theunintended receivers. It ensured confident...
Technologies like cloud computing provide a generous storage service to outsource the business and personal data. The major research challenge of data outsourcing is ensuring data confidentiality. Public key cryptography (PKC) is used in an open networking environment like the internet, for secure communication without depending on a secure channel...
Nowadays, Cloud storage helps the users to remotely store and access the data. Any modification or corruption in data by unauthorized users will lead to insecure cloud framework. Protecting the users data from unauthorized access or malicious attacks in cloud is one of the major research direction to address the issues of data privacy and integrity...
Cloud computing provides IT services like computation, storage, networking, and software to the users. Cloud storage services allows users to access the data anywhere and at anytime, under the supervision of cloud service provider (CSP). Protecting the data against data breaches in the cloud is still a challenging issue for CSP. Public key cryptogr...
Digital Sphere is a global network which consists of all the resources that are required for the users, who connected with the digital network. It connects the entire world through the digital technologies. The digital network includes services, applications, and web page files. By connecting, to this network, people from one end in the world can a...
Security in cloud storage is an important aspect of cloud computing. In this paper, a novel multi-level encryption scheme which ensures security in cloud is introduced. In this scheme, a modified RSA (MRSA) key generation algorithm is used to generate the phase keys. The file is first subjected to encryption using MRSA with phase public keys. For s...
Public-key cryptography can be claimed as the greatest and an excellent revolution in the field of cryptography. A public-key cryptosystem is used for both confidentiality and authentication. One such public-key cryptosystem is the RSA cryptosystem. In this paper, a modified and an enhanced scheme based on RSA public-key cryptosystem is developed....
In cloud computing, remote based massive and scalable data storage services are provided to the users. Data storage and retrieval services need to be modernized for secure communication in the cloud. So, in this paper, user centric personalization and prediction based searching techniques have been proposed to improve the data storage and retrieval...
To improve the network security by a cryptographic primitive called proxy re-encryption in which a proxy can transform a ciphertext encrypted under one key without seeing the actual plaintext into an encryption of the same plaintext under another key. This cryptographic concept has recently drawn renewed interest. Some researchers also showed how t...