Parvinder Singh

ORCID: 0000-0001-6741-9859
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Chaos-based Image/Signal Encryption
  • Spam and Phishing Detection
  • Brain Tumor Detection and Classification
  • Mobile Ad Hoc Networks
  • Text and Document Classification Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Blockchain Technology Applications and Security
  • Sentiment Analysis and Opinion Mining
  • Vehicular Ad Hoc Networks (VANETs)
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Security in Wireless Sensor Networks
  • User Authentication and Security Systems
  • Advanced Malware Detection Techniques
  • Privacy-Preserving Technologies in Data
  • Biometric Identification and Security
  • Advanced Image and Video Retrieval Techniques
  • Medical Image Segmentation Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Image and Signal Denoising Methods
  • Image Processing Techniques and Applications
  • Neural Networks and Applications
  • Wireless Networks and Protocols

Deenbandhu Chhotu Ram University of Science and Technology
2014-2024

Cancer Institute (WIA)
2024

Desh Bhagat University
2023

Universidad de Deusto
2019

Maharaja Ranjit Singh Punjab Technical University
2019

NIMS University
2019

Rayat Institute of Engineering & Information Technology
2015

Punjab Agricultural University
1987-2014

University of South Carolina
2012

Central University of Rajasthan
2012

Brain tumor is a life-threatening problem and hampers the normal functioning of human body. For proper diagnosis efficient treatment planning, it necessary to detect brain in early stages. Digital image processing plays vital role analysis medical images. Segmentation involves separation abnormal tissues from brain. In past, various researchers have proposed semi fully automatic methods for detection segmentation tumor. this article, different techniques available been presented. This...

10.1016/j.procs.2020.03.189 article EN Procedia Computer Science 2020-01-01

After the acceptance of blockchain technology, there have been applications which aim to use in their fields. Various approaches proposed past build a secure Identity Management (IdM) System. This is novel systematic literature mapping IdM blockchain. paper provides an extensive review on with emphasis how emergence has addressed challenges faced over years. A thorough study done existing literature. The primary and secondary "search string" were identified search was conducted five...

10.1016/j.jksuci.2021.03.005 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2021-03-26

Abstract Mobile Ad-hoc Network one of the prominent area for researchers and practitioners in assorted domains including security, routing, addressing many others. A (MANET) refers to an autonomous group or cluster mobile users that communicate over relatively bandwidth constrained wireless links. ad hoc network moving node rather than any fixed infrastructure, act as a router. These routers are responsible mobility. The history begin after invention 802.11 WiFi they mostly used connecting...

10.1186/s13673-014-0007-9 article EN cc-by Human-centric Computing and Information Sciences 2014-06-18

With the enhancement in technology e-banking like credit Card, Debit Mobile Banking and Internet is popular medium to transfer money from one account another.E-Banking gaining popularity day by day, which increases online transaction with increase shopping, bill payment electricity, Insurance Premium other charges, recharges reservation of railways, bus etc., so fraud cases related this are also increasing it puts a great burden on economy, affecting both customers financial bodies.It not...

10.5120/19584-1340 article EN International Journal of Computer Applications 2015-02-18

10.1007/s12083-021-01212-4 article EN Peer-to-Peer Networking and Applications 2021-07-28

Summary A behavior over the internet, which results into false utilization of resources is termed as phishing and techniques to identify them are anti‐phishing frames algorithms. This research work introduces a new relative similarity approach utilizing index co‐relation by applying Cosine similarity. In order incorporate co‐relation, term frequency inverse document (TF‐IDF) also calculated. AdaBoost employed improve classification accuracy proposed means enhancing performance weak learner...

10.1002/cpe.7287 article EN Concurrency and Computation Practice and Experience 2022-09-02

We are proposing enhancements in one of the most popular data compression algorithm named LZW to increase overall performance algorithm. have achieved this by applying three modification schemes First two enhancement eliminate frequent flushing dictionary, thus lowering processing time and third improves ratio reducing number bits transferred over communication channel

10.1109/indcon.2006.302770 article EN 2006-09-01

A desiccant honey dehydrator has been designed, developed and tested. It heats dehumidifies air to dehydrate honey. Re-circulation employed prolong use-period of the bed. The dehydration was done with dehumidified or ambient at 35°C 45°C. also dehydrated in open for reference purposes. maximum moisture evaporation rates case a using air, dehydrating 45°C were 132, 78.7 52 g/h m2, respectively.

10.1080/01430750.2011.584450 article EN International Journal of Ambient Energy 2011-06-01

Data Hiding is one of the challenging issues in field Network Security.Unlike cryptography, Steganography used to hide existence secret message by embedding behind any cover object like image, text, audio, video files.Various authors proposed, various methods for hiding information gray scale images such as least significant method, level modification, pixel value differencing, mapping method and with BPCS, but all these are not up marks that means increasing capacity Stego-Image provide an...

10.5120/12922-9927 article EN International Journal of Computer Applications 2013-07-26

Drug discoverers need to predict the functions of proteins which are responsible for various diseases in human body. The proposed method is use priority based packages SDFs (Sequence Derived Features) so that decision tree may be created by their depth exploration rather than exclusion. This research work develops a new induction technique uncertainty measure used best attribute selection. model creates better terms existing C4.5 technique. with greater ensures more number tests before...

10.1109/adcom.2006.4289955 article EN 2006-12-01

Heterogeneous wireless networks (HWNs) integrate diverse and complementary technologies to ensure seamless uninterrupted service continuity for mobile users moving between different networks. Selecting the most optimal promising network is main concern overall stability user satisfaction. This paper presents UIVH (User Specific Intelligent Vertical Handoff): a multi-criteria algorithm HWN which uses ANFIS (adaptive neuro-fuzzy inference system) select best vertical handoff (VHO). Sugeno...

10.1145/2381716.2381756 article EN 2012-09-03

Encryption is the widely used technique to offer security for video communication and considerable numbers of encryption algorithms have been proposed.The paper explores literature already proposed with focus on working principle schemes.This study aimed give readers a quick overview about various so far.

10.5120/9512-3902 article EN International Journal of Computer Applications 2012-12-18
Coming Soon ...