Vinay Kumar

Vinay Kumar
  • Ph.D.
  • Professor (Assistant) at National Institute of Technology Jamshedpur

About

36
Publications
6,916
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
553
Citations
Current institution
National Institute of Technology Jamshedpur
Current position
  • Professor (Assistant)

Publications

Publications (36)
Article
In the real world, most of the collections of data are dynamic in nature, i.e. their size may grow with time. This dynamic nature of the data not only reduces the performance of the classifiers but also demands more optimized models for retaining the performance. Due to this, machine learning models developed in a static environment cannot be deplo...
Article
Full-text available
Hyper-parameter optimization is a crucial task for designing kernel-based machine learning models. Their values can be set by using various optimization algorithms. But a data-dependent objective function makes hyper-parameter’s configuration changes over time in a dynamic environment. A dynamic environment is an environment where training data kee...
Article
Building an Intrusion Detection System (IDS) in non-stationary environment is challenging because, in such an environment, intrusion-related data grow every day. A machine learning model trained in a stationary environment where training data does not change, often fails to retain its performance in real world environment IDS is deployed. This is b...
Article
The multicore systems are designed to give excellent performance by parallelly executing the various tasks on different cores. The execution of tasks requires lots of energy which can be saved if the tasks are scheduled efficiently on cores. In this work, we present an approach for scheduling of memory-intensive tasks in mutli-core systems. The giv...
Article
Full-text available
At present, underwater wireless ad hoc networks (UWAN) are widely used in enormous applications. At the same time, UWAN faced many security issues, like energy leaks. The energy hole will make the network lifetime end soon. However, most existing underwater research has not taken security as serious threat. This article aims to provide a new secure...
Article
Full-text available
Online signature verification is most popular in the field of biometrics and forensics. Due to its popularity and recent demand, the major challenges are to improve its performance and complexity. This paper presents a novel approach for online signature validation based on local weight learning. The different features like, x coordinate, y coordin...
Article
Full-text available
In today’s scenario, data transmission is established through the single or multi-hop relay nodes in Wireless Ad-Hoc Networks (WANET). Traditional relay node selection techniques undergo collusion attacks, increased energy consumption, delay, and reduced network lifetime. To cope with these problems, we propose a Quantum Atom Search Optimization co...
Article
Full-text available
Breast cancer is one of the common reasons for deaths of women over the globe. It has been found that a Computer-Aided Diagnosis (CAD) system can be designed using X-ray mammograms for early-stage detection of breast cancer, which can decrease the death rate to a large extent. This paper work proposes a novel 2-way threshold-based intelligent water...
Article
Full-text available
Breast cancer is as one of the common reasons of deaths in women. To detect this cancer in early stage, a computer-aided diagnosis (CAD) system can be designed using X-ray mammograms, which further can assist the doctors and radiologists in their clinical decisions. This paper work proposes a CAD system which is designed by extracting the local bin...
Article
Non-functional requirements (NFR) play a crucial role in designing safety–critical and control systems. The failure of such systems leads to substantial financial loss, threats to human life, and adverse impact on the environment. Therefore, we develop a framework using a state-space model to quantify reliability in the design phase of the developm...
Article
Business critical systems (BCS) are those systems whose failure may lead to loss of business or damage to reputation in the market. This is often due to the interruption of service caused by the system being unusable. Therefore, non functional requirements (NFRs) such as availability and security play a crucial role during the development of BCS to...
Book
Full-text available
Instrumentation and control system (I&Cs) plays a key role in nuclear power plants (NPP) whose failure may cause the major issue in a form of accidents, hazardous radiations, and environmental loss. That is why importantly ensure the reliability of such system in NPP. In this proposed method, we effectively analyze the reliability of the instrument...
Article
Social media has become a vital platform for individuals, organizations, and governments worldwide to communicate and express their views. During the coronavirus disease 2019 (COVID-19) pandemic, social media sites play a crucial role in people communicating, sharing, and expressing their perceptions on various topics. Analyzing such textual data c...
Article
Full-text available
The Emergency Diesel Generator (EDG) is a critical and essential part of the Nuclear Power Plant (NPP). Due to past catastrophic disasters, critical systems of NPP like EDG are designed to meet high dependability requirements. Therefore, we propose a framework for the dynamic reliability assessment using the Fault Tree and the Dynamic Bayesian Netw...
Preprint
Full-text available
Breast cancer is one of the common reasons for deaths of women over the globe. It has been found that a Computer- Aided Diagnosis (CAD) system can be designed using X-ray mammograms for early-stage detection of breast cancer, which can decrease the death rate to a large extend. This paper work proposes a novel 2-way threshold based Intelligent wate...
Article
Since any risk in the safety‐critical systems (SCSs) might lead to a terrible disaster, the utmost quality attribute of these systems is safety. Researchers are putting their efforts to ensure the safety of such systems. This paper summarizes the state‐of‐the‐art in the area of the safety attribute of such critical systems. The in depth literature...
Article
With the rapid increase in the use of the Internet, sentiment analysis has become one of the most popular fields of natural language processing (NLP). Using sentiment analysis, the implied emotion in the text can be mined effectively for different occasions. People are using social media to receive and communicate different types of information on...
Article
Today, numerous reliability prediction methods exist for electronic systems. A detailed literature survey is conducted to investigate the various techniques/models to ensure electronic components/system's reliability. Based on such a method's merits and limitations, we recommend using the hybrid model to predict an electronic system's reliability p...
Article
Non-functional requirement analysis is the most critical factor for safety-critical system construction as it reduces the risk of catastrophic loss of assets by taking measurable actions in the design phase. Reliability and performance analysis are the two main components of non-functional requirement analysis. In this paper, a reliability analysis...
Article
Full-text available
Reducing energy consumption in processors has become a critical issue in cluster systems. The dynamic voltage and frequency scaling (DVFS) is one of the effective techniques to minimize energy consumption in processors when executing parallel applications. These applications may consist of many interrelated tasks that may be computed when their pre...
Article
Full-text available
Internet of things (IoT) is one of the emerging paradigms in the current era that has attracted many researchers due to its widespread applications. Due to the open nature of the device accessibility and heterogeneity, a rapid increase in connected devices leads to several vulnerabilities and threats in the IoT devices. Hence, security is one of th...
Article
Unified Modeling Language (UML) has been frequently used as one of the most powerful object-oriented graphical modeling tool for designing and modeling a safety-critical and control system since past decades. UML can capture all the system requirements, and the developed model is well understood by all the stakeholders. However, UML model has some...
Article
Full-text available
Probabilistic Safety Assessment approach has been successfully applied in engineering, economics, computer science, and statistics to resolve a wide range of safety-related problems. However, using the Probabilistic Safety Assessment for quantifying the safety of a safety-critical system is a challenging task in the Safety Engineering community. Th...
Article
Full-text available
Using Probabilistic Reliability analysis for Quantifying Reliability of a system is already a common practice in the Reliability Engineering community. This method plays an essential role in analyzing the Reliability of nuclear plants and their various components. In Nuclear Power Plants Reactor Core Cooling System is a component of prime importanc...
Article
In the past several decades, significant attention has been devoted to the quality assessment of safety-critical (SC) and control systems from many perspectives such as its reliability, safety, and performance. Researchers are continuing to put their efforts to ensure these dependability attributes. This study summarises the state of the art in the...
Article
The state space models has been successfully applied in engineering, statistics, computer science and economics to solve a broad range of dynamical systems problems; like safety analysis, reliability analysis, performability analysis, etc. However, embedding the complete and accurate system requirements in such models is quite challenging. Analyzin...
Article
Any risk in safety-critical or control applications may lead to catastrophic disaster; hence, safety is a primary concern for such applications. The impact of risk varies from minor inconvenience and cost to personal injury, significant economic loss, and death. Therefore, a safety assessment process should be an inherent part of the system develop...
Article
State-space modeling is useful for prognostics of safety-critical systems. However, building such a model that embeds all the system requirements is a challenge. Furthermore, it requires expertise and hence isn't easily understood by all the stakeholders. UML can handle these challenges. A proposed approach converts a UML model into a state-space m...

Network

Cited By