Vishal Sharma

ORCID: 0000-0001-7470-6506
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • UAV Applications and Optimization
  • IoT and Edge/Fog Computing
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Mobile Ad Hoc Networks
  • Advanced Wireless Communication Technologies
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • Advanced MIMO Systems Optimization
  • Software-Defined Networks and 5G
  • Distributed Control Multi-Agent Systems
  • Energy Harvesting in Wireless Networks
  • Advanced Authentication Protocols Security
  • Wireless Communication Networks Research
  • Energy Efficient Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Caching and Content Delivery
  • Digital Transformation in Industry
  • Privacy-Preserving Technologies in Data
  • Advanced Wireless Communication Techniques
  • PAPR reduction in OFDM
  • Cooperative Communication and Network Coding
  • IoT Networks and Protocols
  • IPv6, Mobility, Handover, Networks, Security

Queen's University Belfast
2019-2025

Vivekananda Global University
2023-2025

Lovely Professional University
2025

Chitkara University
2024

Institute of Engineering
2011-2024

Guru Angad Dev Veterinary and Animal Sciences University
2024

Shobhit University
2023-2024

Sant Longowal Institute of Engineering and Technology
2024

Sharda University
2024

Birla Institute of Technology, Mesra
2024

Modern day wireless networks have tremendously evolved driven by a sharp increase in user demands, continuously requesting more data and services. This puts significant strain on infrastructure based macro cellular due to the inefficiency handling these traffic cost effectively. A viable solution is use of unmanned aerial vehicles (UAVs) as intermediate nodes between small cell tiers for improving coverage boosting capacity. letter investigates problem demand UAV assignment over geographical...

10.1109/lcomm.2016.2553103 article EN IEEE Communications Letters 2016-04-12

Data have always been a major priority for businesses of all sizes. Businesses tend to enhance their ability in contextualizing data and draw new insights from it as the itself proliferates with advancement technologies. Federated learning acts special form privacy-preserving machine technique can contextualize data. It is decentralized training approach privately collecting provided by mobile devices, which are located at different geographical locations. Furthermore, users benefit...

10.1109/mce.2019.2959108 article EN IEEE Consumer Electronics Magazine 2020-04-02

Wind turbines are one of the primary sources renewable energy, which leads to a sustainable and efficient energy solution. It does not release any carbon emissions pollute our planet. The wind farms monitoring power generation prediction is complex problem due unpredictability speed. Consequently, it limits decision management team plan consumption in an effective way. Our proposed model solves this challenge by utilizing 5G-Next Generation-Radio Access Network (5G-NG-RAN) assisted...

10.1109/access.2022.3147602 article EN cc-by IEEE Access 2022-01-01

Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT is considerable importance. In this context, we propose a simultaneous wireless power transfer information transmission scheme with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial vehicle (UAV) communications. particular, first phase, harvest UAV through transfer; then second collects data transmission. To...

10.1109/jstsp.2022.3172587 article EN IEEE Journal of Selected Topics in Signal Processing 2022-05-05

The Dynamic Source Routing (DSR) algorithm computes a new route when packet loss occurs. DSR does not have an in‐built mechanism to determine whether the was result of congestion or node failure causing compute route. This leads inefficient energy utilization is used in wireless sensor networks. In this work, we exploit cross‐layer optimization techniques that extend improve its routing efficiency by minimizing frequency recomputed routes. Our proposed approach enables initiate discovery...

10.1155/2009/134165 article EN cc-by Journal of Sensors 2009-01-01

The blockchain is a safe, reliable and innovative mechanism for managing numerous vehicles seeking connectivity.However, following the principles of blockchain, number transactions required to update ledgers pose serious issues as these may consume maximum available energy.To resolve this, an efficient model presented in this letter which capable handling energy demands blockchainenabled Internet Vehicles (IoV) by optimally controlling through distributed clustering.Numerical results suggest...

10.1109/lcomm.2018.2883629 article EN IEEE Communications Letters 2018-11-27

Non-orthogonal multiple access (NOMA) is a rapidly emerging paradigm with the capability to improve spectral efficiency of data-driven, intelligence inspired, and highly digitized sixth-generation (6G) wireless networks. In backdrop ever-evolving NOMA techniques, this article presents novel resource optimization framework for maximizing (SE) Internet-of-things (IoT) networks using power domain NOMA. The proposed considers limited number frequency blocks in IoT network provides an optimal...

10.1109/tvt.2020.3038387 article EN publisher-specific-oa IEEE Transactions on Vehicular Technology 2020-11-16

Mobile edge computing (MEC) reduces the computational distance between source and servers by fortifying near-user site evaluations of data for expedited communications, using caching. Caching provides ephemeral storage on designated low-latency transmissions. However, with network following a hierarchical layout, even can be impacted overheads associated maintaining perpetual connection other factors (e.g., those relating to reliability underpinning network). Prior solutions study as factor...

10.1109/tii.2019.2922039 article EN IEEE Transactions on Industrial Informatics 2019-06-11

With an enormous range of applications, the Internet Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing access to all devices with computing capabilities. evolution wireless infrastructure, focus simple been shifted smart, connected mobile (M-IoT) platforms, which can enable low-complexity, low-cost efficient sensors, machines, even crowdsourcing. All these be grouped under a common term M-IoT. Even...

10.1109/access.2020.3022661 article EN cc-by IEEE Access 2020-01-01

Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS). ITS focuses on information acquisition, sensing, contrivance control, data processing forwarding to ground devices via user-specific application-interfaces. The utility of is further improved Internet Things (IoT), which supports “Connectivity All”. One key applications IoT-ITS urban surveillance. Current surveillance in performed fixed...

10.3390/en11030573 article EN cc-by Energies 2018-03-06

Modern fog network architectures, empowered by IoT applications and 5G communications technologies, are characterized the presence of a huge number mobile nodes, which undergo frequent handovers, introducing significant load on involved entities. Considering distributed flat nature these DMM can be only viable option for efficiently managing handovers in scenarios. The existing solutions capable providing smooth but lack robustness from security point view. Indeed, depends external...

10.1109/mcom.2018.1700863 article EN IEEE Communications Magazine 2018-05-01

In this letter, an optimal placement and distribution of cooperative unmanned aerial vehicles (UAVs) in the next generation heterogeneous networks is presented order to optimize overall network delays. The positioning issue formulated as a minimax facility problem, which then resolved using entropy nets by formation algorithm. effectiveness proposed approach demonstrated terms significant gains including increased UAV accuracy reduced delays allocation.

10.1109/lcomm.2016.2609900 article EN IEEE Communications Letters 2016-09-19

Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving and/or missions. The significantly increased attention on UAV also has led security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived deal with vulnerabilities attacks. In this paper, we briefly survey state-of-the-art IDS mechanisms...

10.1109/iwcmc.2018.8450305 preprint EN 2018-06-01

Abstract Remote patient monitoring and data management have gained much popularity in recent years because of their enhanced access to low‐cost healthcare services. A cloud‐based system provides numerous solutions for collecting offers on‐demand well‐managed reports patients providers. However, it equally suffers from single‐point failure, security, privacy, non‐transparency issues with the data, impacting continuity system. To resolve such concerns, this article proposes an artificial...

10.1002/ett.4245 article EN cc-by Transactions on Emerging Telecommunications Technologies 2021-03-02

Nowadays, many people are facing the problem of arthritis. Regular monitoring and consultation joint health from a specialist can help patients with this chronicle disease. The ratio orthopedic doctors to arthritis is low, worldwide. Use smart devices support healthcare industry lot. Motivated by these facts, here we propose an architecture track hand movements patient. For regular arthritis, fog cloud gateways for real-time response generation used. Thread protocol Bayesian network...

10.1109/mce.2019.2941456 article EN IEEE Consumer Electronics Magazine 2019-12-04

This paper addresses the problem of minimising latency in computation offloading with digital twin (DT) wireless edge networks for industrial Internet-of-Things (IoT) environment via ultra-reliable and low communications (URLLC) links. The considered DT-aided provide a powerful computing framework to enable computation-intensive services, where DT is used model capacity servers optimise resource allocation entire system. objective function comprised local processing latency, URLLC-based...

10.1109/tcomm.2022.3205692 article EN IEEE Transactions on Communications 2022-09-12

The concept of digital twin (DT) is constantly revealing as a key enabling technology for the deployment mobile communication services envisaged sixth-generation (6G) Internet-of-Things (IoT). This paper aims at providing comprehensive review current state-of-the-art DT-enabled 6G oriented network services. main characteristics this new and its critical aspects are highlighted. An overview requirements innovative envisioned firstly provided, emphasizing how DT represents complementary them....

10.1109/ojcoms.2022.3219015 article EN cc-by IEEE Open Journal of the Communications Society 2022-01-01

The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with ability improve quality life by broadening user experience while enabling crucial solutions such near real-time remote diagnostics. However, privacy and security problems remain largely unresolved safety area. Various rule-based methods have been considered recognize aberrant behaviors IoMT demonstrated high accuracy misbehavior detection appropriate for lightweight IoT devices....

10.1109/jbhi.2022.3187037 article EN IEEE Journal of Biomedical and Health Informatics 2022-06-28

Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search. Recently, there has been proliferation growth of the size multi-dimensional datasets, input-output space dimensionality, data structures. Hence, conventional machine learning approaches in training processing face huge limited capabilities to support sixth-generation (6G) networks highly dynamic applications services. Under...

10.1109/ojvt.2022.3202876 article EN cc-by IEEE Open Journal of Vehicular Technology 2022-01-01

With the advanced development of digital twin (DT), mobile virtual reality, augmented and tactile internet, metaverse has re-emerged as a new form internet. However, it is still long way off from fully achieving immersive pervasive experience. First foremost, wireless communications, networking, computing for DT are in their infancy, especially, to achieve stringent quality-of-service (QoS) requirements terms very high data rate, ultra-high success reception minimal latency. Recently,...

10.1109/mwc.014.2200371 article EN IEEE Wireless Communications 2023-06-01

Clerodendrum glandulosum extract reduced silver nanoparticles were prepared by in situ technique within chitosan-PEG hydrogel matrix and characterized for its vitro vivo diabetic wound healing activities.

10.1039/d4bm00349g article EN Biomaterials Science 2024-01-01

10.1007/s10846-014-0091-0 article EN Journal of Intelligent & Robotic Systems 2014-08-22

The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive crucial. In addition, key requirements SH-IoT include channel security, handover support, mobility management, consistent data rates. Proxy mobile IPv6 (PMIPv6) considered as one core solutions to handle extreme mobility; however, default PMIPv6 cannot ensure performance enhancement scenarios, i.e., Route Optimization (RO). existing security protocols for...

10.1109/access.2017.2710379 article EN cc-by-nc-nd IEEE Access 2017-01-01
Coming Soon ...