S. Vikram Singh

ORCID: 0000-0002-7280-0109
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Artificial Intelligence in Healthcare
  • Smart Grid Energy Management
  • Big Data and Business Intelligence
  • Microgrid Control and Optimization
  • Digital Transformation in Industry
  • IoT and Edge/Fog Computing
  • Privacy-Preserving Technologies in Data
  • AI in cancer detection
  • Advanced Steganography and Watermarking Techniques
  • Advanced Manufacturing and Logistics Optimization
  • Energy Load and Power Forecasting
  • Power Line Communications and Noise
  • Flexible and Reconfigurable Manufacturing Systems
  • Network Time Synchronization Technologies
  • Cybersecurity and Cyber Warfare Studies
  • Frequency Control in Power Systems
  • Currency Recognition and Detection
  • Industrial Vision Systems and Defect Detection
  • Millimeter-Wave Propagation and Modeling
  • Privacy, Security, and Data Protection
  • Global Security and Public Health
  • Internet Traffic Analysis and Secure E-voting
  • Video Surveillance and Tracking Methods
  • Modular Robots and Swarm Intelligence
  • Chaos-based Image/Signal Encryption

Amity University
2019-2024

Amity University
2020-2022

The phenomenon of AI has been widely studied in several areas. This paper is based on the use artificial intelligence and its impact HRM due to technological advancement IT landscape. At present almost all companies are implementing their functional areas increase efficiency employees organization. role HR domain starts with recruitment till performance appraisal employees. aim research examine relationship between Human resource functions industry Delhi/NCR location weather this moderated...

10.1109/iccakm46823.2020.9051544 article EN 2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM) 2020-01-01

The main objective of this paper is the development an Algorithm for Boolean Breast Cancer Classification based on 116 patients with results by testing blood along physical information (life, BMI, Gluco-level, diabetes, etc.). following machine learning models were compared performance in study: choice tree, arbitrary forest, K-closest neighbors, ANN, AVM, and replace analysis. With methodologies, was gathered: Data separated among 80 percent training 20 using k-fold cross-validation (k 10)....

10.1109/iciem54221.2022.9853047 article EN 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) 2022-04-27

In recent times we can observe technological growth in respect of new expansions, innovations, and improvements every industry. This brings a great movement this era the field military, healthcare, industries, education, or daily households. Technology 4.0 has boomed into current market with name Industry which deals information change automation manufacturing technologies. It includes concept IoT, cloud computing, artificial intelligence for generating smart factories industries. knots...

10.1109/iciptm54933.2022.9753944 article EN 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM) 2022-02-23

Parameters have great impact on the performance of an optimization algorithm. This paper concerns parameter tuning for metaheuristics which are stochastic algorithms. A novel, fast, and very simple population-based metaheuristic namely Human Habitation Behavior-Based (HHBO) is proposed in order to tune parameters used weight bias problem feed-forward neural networks. The algorithm compared with other state-of-art algorithms, results analysis presented. show merits HHBO comparison

10.1109/ic3i56241.2022.10072699 article EN 2022-12-14

Copy-Move forgery practices are defamatory tampering processes, affecting digital images. Such have become much more common nowadays because of the advent significantly effective image processing tools being readily available. In copy-move technique, an area from original is copied and pasted over another area. This technique provides a way to conceal important details information in without leaving traces behind observe or manipulation image. question authenticity forensic. this paper,...

10.1109/iciem54221.2022.9853192 article EN 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) 2022-04-27

Stock market forecasting involves predicting fluctuations and trends in the value of financial assets, utilizing statistical machine learning models to analyze historical data for insights into future behavior. This practice aids investors, traders, institutions, governments making informed decisions, managing risks, assessing economic conditions. Forecasting markets is difficult due intricate interplay global economics, politics, investor sentiment, it inherently unpredictable. study...

10.1109/access.2024.3434528 article EN cc-by-nc-nd IEEE Access 2024-01-01

The application and development of communications information technology has created a new battleground. cyber threat is growing rapidly with high pace variation in the world. It will significantly affect international relations 21st century. These threats can be both planned unplanned it come from different sources, like warfare, hackers, criminals, virus writers, contractors or disgruntled employees working within an organization. This paper brings out comparative assessment G4 Nations...

10.1109/iciem51511.2021.9445307 article EN 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) 2021-04-28

In current circumstances, congestion in traffic is a major issue. Due to congestion, many people didn't reach their destination place pre-defined time. This may lead loss of job opportunity, miss journey, etc. Many algorithms had been developed for reducing the problem traffic. They are working well day times but those give precise results at night times. So new algorithm by using image processing this paper that will also. done isolating RGB into its individual channels and converting each...

10.1109/iciem54221.2022.9853071 article EN 2022 3rd International Conference on Intelligent Engineering and Management (ICIEM) 2022-04-27

Diabetes affects a large number of people in modern culture. Individuals must keep track food calories and total consumed daily to maintain balanced diet. Type 2 diabetes is devastating metabolic illness that may manifest many symptoms complications throughout the body. In day, diabetics be found all age groups society. The increased reported patients attributed different causes, including but not limited harmful or chemical components blended into food, obesity, working culture improper...

10.1109/ic3i56241.2022.10072763 article EN 2022-12-14

Supply chain (SC) management is an integral part of the technological advancement industries nowadays. This study designed and presents optimization model for inventory-location technical problems in SC network. The considers carbon emission perishable products formulated a novel based on mixed-integer linear programming concept. proposed aimed at minimizing total costs solution obtained using GAMS package. results show that optimal reachable within reasonable time with presented mathematical model.

10.1109/iciem51511.2021.9445392 article EN 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) 2021-04-28

People are concerned about the security of their data over internet. The can be protected in many ways to keep unauthorized individuals from accessing it. To secure data, steganography used conjunction with cryptography. It is common for hiding or secret messages, whereas cryptography encrypts messages so that they cannot read. As a result, proposed system combines both and steganography. A steganographic message concealed prying eyes by using an image as carrier data. In steganography,...

10.1109/ictacs56270.2022.9988094 article EN 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2022-10-10

Industry4.0, a new buzz word in the modern industry system. This is revolution 21 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">st</sup> century which provides digitization and intelligence as need of today's Indian industry. The technological advancement helps not only improving productivity but also quality output. Industrial 4.0 considered fourth generation manufacturing process gives total control. Industry possessing vast vision with...

10.1109/ictai53825.2021.9673154 article EN 2021 International Conference on Technological Advancements and Innovations (ICTAI) 2021-11-10

Data collection from sensitive places must be done remotely due to laborious communication protocols. In this paper, the deployment of wireless sensor networks is investigated on battlefield in terms specific parameters such as node power, latency, and network survival. It investigates simulated environment at three different levels while using a simulator. Continuous data gathering significant power consumption are necessary during early phase networks. The wiring stage then where usage...

10.1109/ictacs56270.2022.9987887 article EN 2022 2nd International Conference on Technological Advancements in Computational Sciences (ICTACS) 2022-10-10

In this paper I talk about converge networks and its types, moving on the technological elements of converged network. give a detailed view benefits various challenges faced in implementation while giving an informative characteristics needed by network to converge. provide solution for using JMX.

10.1109/iciem48762.2020.9160337 article EN 2020-06-01

The purpose of this research is to investigate the viability wired technologies for home-building automation and put up a simpler transfer attribute prototype low voltage power line effective information exchange based on two-wire transmission hypothesis. Software simulation done check effect length parameters. In investigation viability, bottom-up approach used parameters scattering matrix applied in frequency-domain channel prototyping.

10.1109/icactm.2019.8776816 article EN 2019 International Conference on Automation, Computational and Technology Management (ICACTM) 2019-04-01

Drug repurposing is an attractive chemotherapeutic strategy that serves to make up for the inadequacy of current antifungal drugs. The present study aims repurpose theophylline (THP) against Candida albicans. THP a methylxanthine derived from cocoa beans and tea extracts, generally used as first‐line drug asthma other respiratory disorders. We investigated activity C. albicans non‐albicans species. Mechanistic insights revealed induces membrane damage. Enhanced ionic disturbances depleted...

10.1111/jam.14669 article EN Journal of Applied Microbiology 2020-04-22

The provision of uncontaminated water, sufficient sanitation facilities, and appropriate hygiene behaviours is an essential entitlement every individual plays a crucial role in promoting worldwide health overall welfare. interconnection between sanitation, (WASH) exerts significant influence on the outcomes global societies. This study examines complex relationship within framework health. It specifically highlights difficulties, prospects, capacity for change that this presents. In context...

10.1051/e3sconf/202345301041 article EN cc-by E3S Web of Conferences 2023-01-01

Many database operational and analytical systems are adopting Big Data analytics tools techniques to meet the upcoming business challenges. Migration Hadoop Distributed File System has a specialized migration process that maps current schema models batch processing schemes. The schemas hold many data semantics designed according usage, affordances, access rights, efficiency demands. Thus, towards big must preserve base of domain, structures, formats, sources. Most time, these dimensions...

10.1109/upcon59197.2023.10434722 article EN 2018 5th IEEE Uttar Pradesh Section International Conference on Electrical, Electronics and Computer Engineering (UPCON) 2023-12-01

The proliferation of Vehicular Ad-hoc Networks (VANETs) highlights the crucial need for secure, privacy-protecting inter-vehicle communication. By integrating blockchain technology with a safe certificate-less aggregate signature process, this research presents novel approach to enhancing VANET security. Traditional systems that rely on PKI and certificates have their limitations solved by suggested approach. Using paradigm eliminates requirement certificate authority when creating keys,...

10.1109/icrito61523.2024.10522324 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2024-03-14
Coming Soon ...