Nidhi Chandra

ORCID: 0000-0001-9312-5854
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Mechanisms of cancer metastasis
  • Advanced Malware Detection Techniques
  • Cancer, Lipids, and Metabolism
  • Advanced Text Analysis Techniques
  • IoT-based Smart Home Systems
  • Hate Speech and Cyberbullying Detection
  • Security in Wireless Sensor Networks
  • Topic Modeling
  • Energy Efficient Wireless Sensor Networks
  • Semantic Web and Ontologies
  • Chaos-based Image/Signal Encryption
  • Water Quality Monitoring Technologies
  • Advanced Steganography and Watermarking Techniques
  • Text and Document Classification Technologies
  • Engineering and Technology Innovations
  • Spam and Phishing Detection
  • Information and Cyber Security
  • Liver Disease Diagnosis and Treatment
  • Advanced Proteomics Techniques and Applications
  • Sentiment Analysis and Opinion Mining
  • Protein Kinase Regulation and GTPase Signaling
  • Artificial Immune Systems Applications
  • Cryptographic Implementations and Security
  • GDF15 and Related Biomarkers

Amity University
2012-2018

Noida International University
2013

Amity University
2012

Centre for Development of Advanced Computing
2012

Guru Gobind Singh Indraprastha University
2012

Institute for Magnetospheric Physics
2012

Encryption is used to prevent data from unauthorized access and with the appalling headway in network technology seen past decade; it has become need of time encrypt images before sending over open network. Though researchers proposed contrastive methods but correlation between pixels RGB value play a imperative part guess for original image. So, here we introduce new image encryption method which first rearranges within on basis values then forward intervening encryption. Experimentally...

10.5815/ijigsp.2012.02.03 article EN International Journal of Image Graphics and Signal Processing 2012-03-09

In this paper we have shown how to monitor the water level of systems such as tanks, rivers, ground table, and bore wells remotely. We also that control working pump automatically It can be used remotely flood areas wirelessly information sent mobile wirelessly. This project is designed with help sensors, Zigbee 802.15.4, 74HC14 inverter GSM technology. Furthermore, it quality sensors turbidity sensor dissolved oxygen sensor. monitoring system, level, oxygen, turbidity, temperature pH at...

10.1109/cicn.2013.42 article EN 2013-09-01

Billions of contributions are made every day across multiple online communities and social media websites in the form messages, blogs discussion. The aim this paper is to identify such comments posts which racist malicious nature so that they could be effetely banned removed order counter them. This article uses set documents with as text corpus on appropriate machine learning algorithm applied detect or meaning. To anti-social content there a need find extent similarity between pair...

10.1109/icrito.2017.8342450 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2017-09-01

With the advancement in technology, various types of sensors are easily available market to detect air pollution with precise reading different gases environment but main problem arises efficient use sensor network so that it can sustain for a longer time and effective communication strategy these node base station collected data process efficiently. For this purpose methods be used install polluted area our propose method mainly focus on period network, processing information less overhead...

10.1109/acct.2012.18 article EN 2012-01-01

Machine learning algorithms have the potential to improve patient outcomes in digital pathology. However, generalization of these tools is currently limited by sensitivity variations tissue preparation, staining procedures and scanning equipment that lead domain shift digitized slides. To overcome this limitation model generalization, we studied effectiveness two Synthetic DOmain-Targeted Augmentation (S-DOTA) methods, namely CycleGAN-enabled Scanner Transform (ST) targeted Stain Vector...

10.48550/arxiv.2305.02401 preprint EN cc-by-nc-nd arXiv (Cornell University) 2023-01-01

Image Encryption has gain popularity because of need secure transmission images over open networks and increased attacks on data flowing network. Different type have different features, that is why for techniques were evolved to protect confidential from unauthorized access. used encrypting textual does not work with images, so separate encryption are required images. So, we proposed here a new scheme image which helpful end digital information network using explosive block displacement...

10.1109/csnt.2012.190 article EN International Conference on Communication Systems and Network Technologies 2012-05-01

In recent years there has been a massive growth in textual information especially the internet.People now tend to read more e-books than hard copies of books.While searching for some topic new internet it will be easier if someone knows prerequisites and post-requisites that topic.It topic.Often topics are found without any proper title becomes difficult later on find which document was topic.A text categorization method can provide solution this problem.In paper domain based ontology is...

10.5815/ijmecs.2012.04.04 article EN International Journal of Modern Education and Computer Science 2012-05-15

The objective of this paper is to predict the user behaviour based on his posts social networking sites specifically Twitter. data sets are captured through secured API's exposed by these network and stored in lakes or NoSQL databases. Tensorflow have been used do predictive analysis recursive networks. This demonstrate identification specific text from which available various forms - structured unstructured coming online sources real time, posted users worldwide. referred sites, twitter...

10.1109/icrito.2018.8748570 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2018-08-01

The classification of text is one the key areas research for natural language processing.Most organizations get customer reviews and feedbacks their products which they want quick to action on them.Manual would take a lot time effort may impact product sales, so make it these have asked IT leverage machine learning algorithms process such real-time basis.Gated recurrent units (GRUs) an extension Recurrent Neural Network referred as gating mechanism in network helps provides...

10.52547/jist.9.34.89 article EN cc-by Journal of Information Systems and Telecommunication (JIST) 2021-05-22

Medical domain has witness a tremendous change in technology with advancement medical science instruments and other side usage of images increased this to detect various diseases. On one hand where experience doctors are putting their into detail pictorial representation parts body further diagnose the patient records on safety those big concern. So, here we proposed new model for storage using inter-pixel image encryption technique accessing from database secure mode reading zooming technique.

10.1109/csnt.2012.217 article EN International Conference on Communication Systems and Network Technologies 2012-05-01

Smart wireless home security technique is one of the emerging technologies for intelligent building surveillance. Many like Bluetooth and Wi-Fi have been used in this regard. In paper we proposed a Contemporary Home system using low cost, power Zigbee (802.15.4) standard. The uses multi-hop communication data transfer. architecture consists many modules that configured as end devices, routers coordinator respectively. devices communicate with each other intermediate nodes (routers). This...

10.1109/cicn.2013.83 article EN 2013-09-01

Computer Security has been discussed and improvised in many forms using different techniques as well technologies. The enhancements keep on adding the security remains fastest updating unit a computer system. In this paper we propose model for securing system along with network enhance it more by applying machine learning SVM (support vector machine) ANN (Artificial Neural Network). Both are used together to generate results which appropriate analysis purpose thus, prove be milestone security.

10.1109/csnt.2014.221 article EN 2014-04-01

Large numbers of input devices are available for human interaction with modern computer systems which operated by hands and a few them through gestures made using fingers body movements.The advancements in assistive technology have proposed many concepts controlling the mouse movements detecting basic eye user help tracking systems.We place our focus on implementation is designed to detect relative position cornea respect initially calibrated centre calculate attributes like angle speed at...

10.5120/5039-7360 article EN International Journal of Computer Applications 2012-02-29

This paper tries to explain the application of IOT in different aspects our day life and Industry. It also discusses frameworks enterprise grade hardware available implement solutions. ventures into neural networks, machine learning big data gain predictions with solutions take real-time decisions or offline help by storing relevant filtered platform.

10.1109/aicai.2019.8701287 article EN 2019-02-01

Ground water detection is a very important problem in environmental science. Apart from manually locating the sites pertaining ground water, there need for automated calculation of probability occurrence particular area. In this paper novel approach based on robotic perception amalgamated with autonomic computing proposed. The attributes comprises litho logy, geomorphology, soil type, land slope and lineament. information collected stored History table (Case Base). Case base reasoning...

10.1109/cicn.2014.252 article EN International Conference on Computational Intelligence and Communication Networks 2014-11-01

The continuous mobilization of vehicles has led to a surge in the number road accidents across world. To get better this, government is trying focus on safest and preventive measures traffic. So, our main idea introduce helmet detection mechanism as most deaths caused are due absence helmet. practice direct observation found be time taking lot human effort needed. This project attempts implement process through few machine learning algorithms by using pre-defined libraries. system notices...

10.1109/icces51350.2021.9489096 article EN 2022 7th International Conference on Communication and Electronics Systems (ICCES) 2021-07-08

Energy efficiency is one critical issue for sensor networks because many sensors are equipped with batteries that have limited life time. This paper focused on Opportunistic routing which a recent technique achieves high throughput in the face of lossy wireless links. The existing opportunistic protocol, ExOR (ties MAC routing) and MORE (MAC-independent) did not explore benefit selecting appropriate forwarding list to minimize energy cost. In this we intend propose new protocol called OFETR...

10.1109/cicn.2013.82 article EN 2013-09-01

Today's business rely completely on IT network and their connections with the global Internet as backbone of sales, sourcing, operating financial systems. In a similar way many aspects our lives internet computers including communications (email, cell phones, texting), transportation (traffic control signals, car engine systems, airplane navigation), government (birth/death records, Social Security, licensing, tax records), finance (bank accounts, loans, electronic paychecks), medicine...

10.1109/cicn.2013.79 article EN 2013-09-01

In this paper we have shown how to use conductive sensor, Zigbee and 74HC14 Inverter monitor the water level control working of pump.This project is designed automatically fill over head tank when it gets empty in it.The motor switched ON overhead drops below a pre fixed low (on point) puts off rises up high (off point).The also during following conditions: sump exhausted before filling tank, pump running dry, mains voltage fluctuations.We introduce an energy efficient routing protocol for...

10.5815/ijmecs.2013.06.05 article EN International Journal of Modern Education and Computer Science 2013-07-30

Owing to the increasing popularity of wireless sensor networks, they have become attractive targets for malicious attacks. Due adhoc nature and openness are susceptible identity based attacks like spoofing. The traditional approach address spoofing is apply cryptographic authentication, spatial signatures etc. This suffers from disadvantages overhead, limited power, bandwidth other resources available along with high costs implementation. In this paper, we proposed a method named Attack...

10.1109/cicn.2013.81 article EN 2013-09-01
Coming Soon ...