Umang Garg

ORCID: 0000-0002-1815-5794
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • IoT and Edge/Fog Computing
  • Anomaly Detection Techniques and Applications
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • Internet of Things and AI
  • Smart Agriculture and AI
  • Internet Traffic Analysis and Secure E-voting
  • Online Learning and Analytics
  • Software Engineering Research
  • Neural dynamics and brain function
  • Artificial Intelligence in Healthcare
  • Advanced Memory and Neural Computing
  • Neuroscience and Neural Engineering
  • Embedded Systems Design Techniques
  • Smart Systems and Machine Learning
  • Cloud Computing and Resource Management
  • Satellite Communication Systems
  • Sentiment Analysis and Opinion Mining
  • Software Testing and Debugging Techniques
  • IoT Networks and Protocols
  • Spectroscopy and Chemometric Analyses
  • Software Reliability and Analysis Research
  • Advanced Data Compression Techniques

MIT Art, Design and Technology University
2024-2025

MIT World Peace University
2024

Graphic Era University
2018-2023

Noida International University
2023

Galgotias University
2023

Birla Institute of Technology and Science, Pilani
2019-2021

Pennsylvania State University
2020-2021

Amity University
2016-2017

The foundational tenet of any nation's prosperity, character, and progress is education.Thus, a lot emphasis laid on quality education delivery system in India with current financial year (2022-23) budget outlay Rs. 1,04,277.72crores.This research contributes analyzing how students perform academics depending upon the time spent their extracurricular activities help three Machine Learning prediction algorithms namely Decision Tree, Random Forest KNN.Additionally, order to comprehend...

10.5815/ijmecs.2023.01.04 article EN International Journal of Modern Education and Computer Science 2023-02-08

The Internet of Things (IoT) has become an integral requirement to equip common life. According IDC, the number IoT devices may increase exponentially up a trillion in near future. Thus, their cyberspace having inherent vulnerabilities leads various possible serious cyber-attacks. So, security systems becomes prime concern for its consumers and businesses. Therefore, enhance reliability systems, better real-time approach is required. For this purpose, creation dataset essential traffic...

10.1149/2754-2726/ac7abc article EN cc-by ECS Sensors Plus 2022-06-01

Abstract The production, distribution of the counterfeit drugs are major issue in today's world. These create a big economic crunch concern now days drug is increasing day by day. Counterfeit refers to fake medicine which increasing. In 2020 where all countries suffering from medicine. article discusses about how secure transaction can be made suppliers. Blockchain distributed technology transparent. All blockchain will stored with network that relate network. contain concept hash function....

10.1049/blc2.70003 article EN cc-by IET Blockchain 2025-01-01

Smart technological instruments and Internet of Things (IoT) systems are now targeted by network attacks because their widespread rising use. Attackers can take over IoT devices via botnets, pre-configured attack vectors, use them to do harmful actions. Thus, effective machine learning is required solve these security issues. Additionally, deep with the necessary elements advised defend from threats. In order achieve proper detection hacks in future, relevant datasets must be used. The...

10.33889/ijmems.2025.10.2.027 article EN International Journal of Mathematical Engineering and Management Sciences 2025-02-07

Recent advances in imaging and sequencing technologies have led to significant advancements clinical research on lung cancer. However, the amount of information that human brain can properly digest utilize is limited. Lung cancer has been extensively detailed by integrating analyzing this vast complex data from a variety perspectives. Machine learning-based are essential process. This study tests multiple Boosting algorithm models dataset determine particular disease prediction. The aim work...

10.52783/jns.v14.2043 article EN Journal of Neonatal Surgery 2025-03-11

There is a demand from the next generation of technology in modern age communication, which can help reform and include world seamless connectivity through trigonous smart devices. Modern wireless standards such as 5G have been popularized for their faster transmission speed or high-speed access, low latency, omnipresent coverage. The exponential growth networks will boost with recent innovations like IoT that improve cellular operations, network problems, drive internet's future to brink....

10.1109/icaccm50413.2020.9213047 article EN 2020-08-21

The conventional healthcare system needs more human intervention with devices, equipment, and patient monitoring. Healthcare is therefore going through an expeditious shift from a hospital expert-centered way to dispersed patient-centered way. issues are regularly filled by the advancement in technologies like artificial intelligence, 5G, machine learning, Internet of Things (IoT), etc. IoT current originating technology used service providers facilitate patients using smart gadgets advanced...

10.1109/iciccs51141.2021.9432082 article EN 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) 2021-05-06

The tremendous growth of the Internet Things (IoT) has gained a lot attention in global market. massive deployment IoT is also inherent various security vulnerabilities, which become easy targets for hackers. botnets are one type critical malware that degrades performance network and difficult to detect by end-users. Although there several traditional botnet mitigation techniques such as access control, data encryption, secured device configuration, these apply due normal traffic behavior,...

10.3390/fi16060212 article EN cc-by Future Internet 2024-06-17

In recent, Internet of Things (IoT) networks are more common because they can keep track constantly changing environmental or network field conditions. It incorporates a significant level internet access, smart device use, and data exchange. Since there connected devices in the IoT network, it is crucial to protect network's security. Message Queuing Telemetry Transport (MQTT) one most popular communication protocols. this study, hybrid approach applied integrates two machine learning...

10.1109/icscds56580.2023.10104820 article EN 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) 2023-03-23

Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair an innovation that has intention to create difference for activities people who are restricted by movement. This paper proposed idea ease those patients, cannot perform hand movements in way can move wheelchair. peculiarly represents working model smart using Internet things (IoT). Three different modes which assist patient free movement information transmission...

10.1109/icsccc.2018.8703354 article EN 2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC) 2018-12-01

The NEP- 2020 of India has reemphasized the need delivering quality education in order to decrease drop out rate students by HEI. In post-cover era, retention specially Engineering and Management disciplines was more prominent. This paper is an attempt empower HEI predict students' performance/ potential using ML algorithms based on six factors namely; Family size, Study time, Time-spent extra-curricular activities, Absenteeism, Time spent Internet, Health.Three namely, KNN, Random Forest...

10.1109/aisc56616.2023.10085214 article EN 2023-01-27

Requirements can be characterized as needs or demands. In software, requirements are a portrayal of what system is ought to do. Software describe must produced and delivered [1]. System may have few many requirements. case shortage time budget prioritizing become necessity. It not only helps the developer comprehend, which essential, important urgent but also proves useful in decision making every phase software development lifecycle. A lot techniques emerged over prioritize requirements,...

10.1109/confluence.2017.7943258 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2017-01-01

The Internet of Things (IoT) gains a lot popularity day-by-day due to their everlasting availability and ease. As the IoT increases, it also attracts hackers which try take advantage vulnerability devices. An Intrusion Detection System (IDS) is an intelligence-based system that can investigate or detect intrusion in botnet check state software hardware executing network. Once detected, may generate alarm alert administrator send some message owner. In last decade, there are several IDSs...

10.1109/incet51464.2021.9456246 article EN 2021 2nd International Conference for Emerging Technology (INCET) 2021-05-21

Maritime transportation is one of the most common and growing schemes in ocean. Autonomous ships have grown popularity since introduction self-driving autos, particularly submarines as well weapon equipped that uses by military persons. Ship recognition categorization remote sensing photos important for security marine-areas, also some more activities like peoples who use to catch fishes illegally control or view pollution sea. The detection pictures vital maritime safety other applications...

10.1109/cisct55310.2022.10046587 article EN 2022-12-23

Malware that exploits the Web on a regular basis becomes real menace. The transmission of malwareis very rapid during last two decades which needs to bedetected. One efficient approaches for detection malware is manual heuristics analysis. To recognize and identification behavior -based detection, machine learning techniques are in consideration may provide optimum solution. Every malware's activity mimicked scenario would be continuously assessed, as well evaluations generated. Therefore,...

10.1109/aisc56616.2023.10085168 article EN 2023-01-27

Forest fire is one of critical challenge for the survival human, animal, and environment. Turkey a particularly dangerous location forest fires. Over past two decades, there have been over 2,000 fires annually, each which has caused at least fatality.48 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">%</sup> them are due to actions people. When rates with unknown causes factored in, this number jumps up 71%. Based on satellite data,...

10.1109/icidca56705.2023.10099565 article EN 2023-03-14

Hepatitis B and Non-Alcoholic Fatty Liver Disease (NAFLD) are the most frequent well-known liver disorders worldwide. Over time, these cause cirrhosis, which finally leads to failure major consequences, can be fatal. More than a third of world's population has NAFLD. Blood tests utilized identify hepatitis B, while biopsy is gold standard in diagnosing NAFLD, ultrasound scan pictures employed this work. The proposed method efficiently identifies or predicts NAFLD using findings study, namely...

10.1109/icscds56580.2023.10104875 article EN 2022 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS) 2023-03-23

&lt;p&gt;The transformation of traditional hospitals to a smart healthcare system is patient-centric, reliable, and smarter way enhance facilities for individuals. These devices are based on the Internet Things (IoT) conventional network structures such as 3rd generation (3G) or 4th (4G). That did not provide patient health data in real-time scenario. Therefore, integrated 5G-IoT offers distinct benefits remote monitoring, surgery, analysis that operated with slice dedicated network. It...

10.32629/jai.v7i1.694 article EN Journal of Autonomous Intelligence 2023-10-09

This study introduces a novel hybrid approach for accurate skin disease recognition by combining Convolutional Neural Networks (CNN) and Random Forest algorithms. We assemble comprehensive dataset of diverse condition images preprocess them meticulously. Leveraging CNN's feature extraction capabilities, pre-trained networks capture intricate visual patterns, which are subsequently employed as input features the classifier. Through extensive experimentation, our method demonstrates enhanced...

10.1109/gcat59970.2023.10353466 article EN 2023-10-06

Traffic congestion is one of the serious concern in smart cities. The immense increase traffic on roads due to rapid rise population and consequently increased number vehicles roads. Therefore, posing society various detrimental environmental threats, mainly air pollution congestion. To cope up with these issues, some suitable measures needs be taken, reduce their effect. measures, techniques, solutions such problems have been discussed analyzed this work. This paper also suggest approaches...

10.1109/compe53109.2021.9752045 article EN 2021 International Conference on Computational Performance Evaluation (ComPE) 2021-12-01

Distributed denial of service or DDoS attack is a kind network that used to destroy the normal operations server and its responses. There are several approaches through which we can detect abnormal behaviour traffic. However, machine learning techniques best for detection identification attack. This regarded as one most serious threats internet. Supervised algorithms rely on availability labelled traffic datasets. Attacks, other hand, identified in unsupervised by analysing incoming These...

10.1109/iccmst54943.2021.00033 article EN 2021-12-01

Astrocytes play a central role in inducing concerted phase synchronized neural-wave patterns inside the brain. In this article, we demonstrate that injected radio-frequency signal underlying heavy metal layer of spin-orbit torque oscillator neurons mimic neuron synchronization effect realized by glial cells. Potential application such coupling effects is illustrated context temporal “binding problem.” We also present design coupled neuron-synapse-astrocyte network enabled compact...

10.3389/fnins.2021.699632 article EN cc-by Frontiers in Neuroscience 2021-10-12
Coming Soon ...