Aniket Singh

ORCID: 0000-0002-0410-5438
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Superconducting Materials and Applications
  • Particle accelerators and beam dynamics
  • Network Security and Intrusion Detection
  • Particle Accelerators and Free-Electron Lasers
  • Internet Traffic Analysis and Secure E-voting
  • biodegradable polymer synthesis and properties
  • Currency Recognition and Detection
  • Multimodal Machine Learning Applications
  • Anomaly Detection Techniques and Applications
  • Hand Gesture Recognition Systems
  • COVID-19 epidemiological studies
  • Blockchain Technology Applications and Security
  • Advanced Image and Video Retrieval Techniques
  • Image Retrieval and Classification Techniques
  • IPv6, Mobility, Handover, Networks, Security
  • Metal and Thin Film Mechanics
  • Prosthetics and Rehabilitation Robotics
  • ECG Monitoring and Analysis
  • Innovations in Education and Learning Technologies
  • Advanced Steganography and Watermarking Techniques
  • Privacy-Preserving Technologies in Data
  • Scientific Innovation and Industrial Efficiency
  • Software-Defined Networks and 5G
  • Supply Chain Resilience and Risk Management
  • UAV Applications and Optimization

Uttarakhand Technical University
2025

Indian Institute of Technology Kanpur
2024

Symbiosis International University
2023-2024

Sharda University
2024

National Institute of Technology Rourkela
2022

Tata Steel (India)
2022

Lovely Professional University
2022

Gujarat Technological University
2021

GLA University
2021

Sandip Foundation
2020

In an era dominated by mobile communication, Short Message Service (SMS) plays a pivotal role in interpersonal interactions.However, the surge unsolicited spam messages necessitates effective differentiation mechanisms.This exploratory data analysis (EDA) utilizes dataset from renowned UCI Machine Learning Repository to discern key characteristics distinguishing legitimate messages.Employing Natural Language Processing (NLP) technique vectorization (BOW and TF-IDF), including use of Naï ve...

10.18280/ijsse.140128 article EN cc-by International Journal of Safety and Security Engineering 2024-02-29

5G network slicing has emerged as a transformative technology, enabling the creation of customized virtual networks tailored to diverse service requirements. This paper delves into theoretical underpinnings slicing, exploring cutting-edge solutions, recent innovations, and future trajectories. The highlights significance efficient resource management orchestration. Addressing challenges posed by multi-tenant environment, study proposes advanced encryption techniques, access controls,...

10.1109/icaect60202.2024.10469006 article EN 2024-01-11

The supply chain sector operates in a complex environment and faces various challenges, including fluctuations demand, disruptions, the requirement of adhering to regulations. emergence groundbreaking technologies such as blockchain, AI, IoT is driving significant changes industry, resulting improved efficiency, transparency, security measures. This research paper has used case-study method develop present dynamic risk management framework that integrates blockchain technology artificial...

10.1109/icaiss58487.2023.10250525 article EN 2023-08-23

One of humanity's greatest handicaps is visual impairment, particularly in this day and age where text communications (electronic paper-based) dominate communication over voice. 9.3 million Visually impaired people 2,70,000 blind children live India, more than 75% those problems can be avoided or treated. India- the second most crowded nation home to a whopping one-third world's blind. But, In visually literacy rate barely 1%, significantly lower 77.7% standard rate. A country that...

10.1109/icnwc60771.2024.10537459 article EN 2024-04-02

"Magnet Technology Development Group" is engaged in focused research and development of indigenous fusion relevant superconducting magnet at Institute for Plasma Research association with various R&D organizations. The under using a cable conduit conductor (CICC) operating current 30 kA 12 T 4.22 K. CICC has been designed square cross-section (30 mm × mm) consisting twisted Nb3Sn strands copper as cable, SS316LN tubes jacket material SS304L foil wrapping around the cabled strands. It on...

10.1088/1757-899x/171/1/012109 article EN IOP Conference Series Materials Science and Engineering 2017-02-01

Secure E-Voting System is a python-based project. It an efficient and financially savvy way of leading democratic method, which has the characteristics being large-scale data real- time, as well requiring high level security. Nonetheless, they are concerns about security systems administration protection correspondence for e-casting ballot have been developed. Here, client establishes connection with server, this implies that TCP protocol used. For each new arriving Client, Server should...

10.55041/ijsrem12320 article EN INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 2022-04-25

Abstract: Realtime multi-individuals 2-D posture assessment is a central question in grant machines to have an information on people pix and recordings. In this work, we gift realtime strategy find the of more than one image. The proposed approach utilizes nonparametric portrayal, which check with as Part Affinity Fields (PAFs), figure out how accessory components individuals withinside image makes speciality subject product gadget acquiring b-ball sports exercises, utilization studies...

10.22214/ijraset.2022.43259 article EN International Journal for Research in Applied Science and Engineering Technology 2022-05-31

—Federated Learning is a relatively newer approach, and it tries to solve problems such as reluctance of clients share data. Instead, model sent from server client(s) where training happens on various edge who later update the central model. This redesign traditional approach learning data all had be uploaded server. In contrast, federated promotes idea bringing code which can help overcome latency in timecritical operations. Privacy gives every individual right prevent release data, several...

10.33564/ijeast.2022.v07i02.028 article EN International Journal of Engineering Applied Sciences and Technology 2022-06-01

The TCP protocol's notion is that if a packet lost due to network congestion, it isn't of much use in wireless networks, because very good at terminating its role these types networks. We've detailed and listed the main causes this performance decline article. Although numerous procedures protocols have yet be released, throughout time identifying reviews, only few them are considered. End-to-end techniques, fragmented connection approaches, proxy-based approaches some solutions clarify...

10.36647/ijercse/09.09.art004 article EN cc-by-nc-nd International Journal of Engineering Research in Computer Science and Engineering 2022-09-21

Pulse oximeters are widely used for measuring the oxygen level and heart-rate because of their noninvasive, low power, fast accurate measurements. Here, we have developed a transimpedance amplifier based pulse oximeter which determines SpO <inf xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</inf> heart rate person. The is being to convert generated photocurrent photodetector into its respective voltage with gain 32 dB having bandwidth 125 Hz form...

10.1109/indicon56171.2022.10039890 article EN 2021 IEEE 18th India Council International Conference (INDICON) 2022-11-24

In This paper presents an application for drone named VIRODRONE- A designed Fighting Viral Diseases. Time and safety are two main factors in such viral diseases to address this both is designed. It has the facility of crowd screening, control sanitization. If no people at any place that instant more than 5 it will give warning maintain social distancing if 0 go sanitize place. useful fighting pandemic situation.

10.36909/jer.icetet.14981 article EN cc-by-nc-nd Journal of Engineering Research 2021-10-19

The main goal of image captioning is to produce moat appropriate caption for any image. It required find out objects in a picture, their connection and also some hidden features which might be not present picture. When the recognition done, our succeeding step most suitable, accurate short description picture must grammatically correct. Computer vision concept used generated by methods natural processing. Sometimes it easy machine emulate exactly like human brain or thinking that. However,...

10.1109/sasm51857.2021.9841146 article EN 2021-08-20
Coming Soon ...