Ranbir Singh Batth

ORCID: 0000-0002-8655-7613
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Vehicular Ad Hoc Networks (VANETs)
  • UAV Applications and Optimization
  • Blockchain Technology Applications and Security
  • Caching and Content Delivery
  • Traffic Prediction and Management Techniques
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Data Security Solutions
  • Software-Defined Networks and 5G
  • Robotic Path Planning Algorithms
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Distributed and Parallel Computing Systems
  • Robotics and Sensor-Based Localization
  • IoT Networks and Protocols
  • Software Engineering Research
  • Transportation and Mobility Innovations
  • Software System Performance and Reliability
  • Traffic control and management
  • Energy Efficient Wireless Sensor Networks
  • Distributed Control Multi-Agent Systems
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Steganography and Watermarking Techniques

Menzies School of Health Research
2023-2024

Western Sydney University
2024

Lovely Professional University
2018-2023

Chinese University of Hong Kong, Shenzhen
2021

Internet of Things (IoT) provides a strong platform to connect objects the for facilitating Machine (M2M) communication and transferring data using standard network protocols like TCP/IP. IoT is gaining rapidly day by till date, billions devices are already connected in coming few years, number can even touch trillions. With consistent advancements, lots areas Military, Agriculture, Industry, Healthcare, Robotics, Nanotechnology adapting advanced solutions. The research paper proposes...

10.1109/iccs.2018.00033 article EN 2018-08-01

Edge of Things (EoT) enables the seamless transfer services, storage, and data processing from cloud layer to edge devices in a large-scale distributed Internet (IoT) ecosystems (e.g., Industrial systems). This transition raises privacy security concerns EoT paradigm at different layers. Intrusion detection systems (IDSs) are implemented protect underlying resources attackers. However, current IDSs not intelligent enough control false alarms, which significantly lower reliability add...

10.1109/jiot.2020.3029248 article EN IEEE Internet of Things Journal 2020-10-07

Abstract The term Cleaner Production (CP) for Companies is contemplated as influential to get sustainable production. CP mainly deals with three R's that is, reuse, reduce, and recycle. For software enterprise, the reuse plays a pivotal role. Software process of producing new products or from existing by updating it. To extract useful information data mining comes into light. algorithms used face issues related maintenance cost, accuracy, performance. Also, currently algorithm does not give...

10.1002/spe.2921 article EN Software Practice and Experience 2020-10-27

Summary The complex and large‐scale scientific workflow applications are effectively executes on the cloud. performance of cloud computing highly depends task scheduling. Optimal scheduling is still a challenge that needs to be addressed due conflicting objectives increasing demand for quality service. Task an NP‐hard problem its complexity. newly introduced methods resolving facing challenges take benefits all aspects computing. In this article, we study joint optimization cost makespan...

10.1002/spe.2802 article EN Software Practice and Experience 2020-02-14

Abstract Healthcare organizations and Health Monitoring Systems generate large volumes of complex data, which offer the opportunity for innovative investigations in medical decision making. In this paper, we propose a beetle swarm optimization adaptive neuro-fuzzy inference system (BSO-ANFIS) model heart disease multi-disease diagnosis. The main components our analytics pipeline are modified crow search algorithm, used feature extraction, an ANFIS classification whose parameters optimized by...

10.1007/s00521-021-05798-x article EN cc-by Neural Computing and Applications 2021-02-22

Financial Technology have revolutionized the delivery and usage of autonomous operations processes to improve financial services. However, massive amount data (often called as big data) generated seamlessly across different geographic locations can end up a bottleneck for underlying network infrastructure. To mitigate this challenge, software-defined (SDN) has been leveraged in proposed approach provide scalability resilience multicontroller environment. case if one these controllers fail or...

10.1109/jiot.2021.3064468 article EN IEEE Internet of Things Journal 2021-03-08

With the increasing number of Internet Things (IoT) devices being deployed and used in daily life, load on computational has grown exponentially. This situation is more prevalent smart cities where such are for autonomous control monitoring. Smart have different kinds applications that aided through IoT collect data, send it to processing storage devices, get back decisions or actuate actions based input data. There been a stringent requirement reduce end-to-end delay this process owing...

10.1109/jiot.2023.3247640 article EN IEEE Internet of Things Journal 2023-02-22

Edge computing is a relatively recent phenomenon in the world, which takes cloud services closer to end user and distinguished by fast processing application response time, leads many advantages such as faster more efficient data processing; Safety; reduced leakage on existing networks. Moreover, delay-sensitive applications may benefit from paradigm's low latency, agility, location awareness. Significant research has been conducted field of computing, reviewed terms technologies Mobile...

10.1109/iciem51511.2021.9445331 article EN 2021 2nd International Conference on Intelligent Engineering and Management (ICIEM) 2021-04-28

Abstract Edge computing technology has drawn the keystone of future intelligent transportation systems, especially in smart cities, because processing data that are near to user location present at edge cloud server. Generally, cities where distributed things have access computational resources, transfer becomes inevitable high latency, thereby resulting crucial situations. Even though numerous technologies emerged for improving communication among geo‐distributed devices received from...

10.1002/ett.4110 article EN Transactions on Emerging Telecommunications Technologies 2020-09-16

The design of efficient routing strategies for Unmanned Aerial Vehicle (UAV) Networks is a multidomain task that involves analysis node-level & network-level parameters, and mapping them with communication contextual conditions.Existing path planning optimization models either showcase higher complexity or cannot be scaled larger network scenarios.Moreover, the efficiency these also reduces w.r.t. number requests, which limits their scalability levels.To get better result over challenges,...

10.22247/ijcna/2023/220740 article EN International Journal of Computer Networks And Applications 2023-04-29

Edge of Things (EoT) technology enables end-users participation with smart sensors and mobile devices (such as smartphones wearable devices) to the across city. Trust management is main challenge in EoT infrastructure consider trusted participants. The Quality Service (QoS) highly affected by malicious users fake or altered data. In this article, a robust trust (RTM) scheme designed based on Bayesian learning collaboration filtering. proposed RTM model regularly updated after specific...

10.1109/jiot.2021.3082272 article EN IEEE Internet of Things Journal 2021-05-20

This Path Planning is one of the major problems in UAV which yet to be explored get an optimal path among two nodes (UAV). Though a huge amount research proposals already endured related planning, still planning persist keeping high mobility UAVs. The usage and applications evolving rapidly many areas. To solve issues certain decision has taken for various task done by UAV. All requires Navigation info. motive behind not just selection but also rid collision during target operation. very...

10.1109/iciem48762.2020.9160197 article EN 2020-06-01

Traffic flow on roads has increased manifolds from past few decades due to increase in number of vehicles and rise population. With fixed road infrastructure more traffic routes lead congestion conditions especially urban areas developing nations. jams are normal major cities which ultimately cause delay travel time, fuel consumption pollution. This manuscript propose a Multi-metric guidance mechanism(MRGM) considers multiple metrics analyze the based effective optimal suggested vehicles....

10.17762/ijcnis.v12i2.4684 article EN International Journal of Communication Networks and Information Security (IJCNIS) 2022-04-17

The world lives in an epoch where people have incredible variety of digital multimedia technologies. Although historically it was established that the computerized information is authentic information, but technology today has begun to erode this assuredness because opponent uses several distortions edit original video for trademark infringement. Many investigators introduced forgery detection systems, due advent omnipresent videos on internet and overcome difficulties. This paper depicts a...

10.1109/iccike47802.2019.9004331 article EN 2019-12-01

In the 5G era, problem of data islands in various industries restricts development artificial intelligence technology, so sharing is proposed. High-quality directly affects effectiveness machine learning models, but leakage and abuse will inevitably occur process. As a consequence, order to solve this problem, federated This method uses personalized multiple edge devices train model. The central server collects training results updates global model, then iteratively tests model through...

10.1109/jiot.2021.3088577 article EN IEEE Internet of Things Journal 2021-06-11

Traffic flow on roads has increased manifolds from past few decades due to increase in number of vehicles and rise population. With fixed road infrastructure more traffic routes lead congestion conditions especially urban areas developing nations. jams are normal major cities which ultimately cause delay travel time, fuel consumption pollution. This manuscript propose a Multi-metric guidance mechanism(MRGM) considers multiple metrics analyze the based effective optimal suggested vehicles....

10.54039/ijcnis.v12i2.4684 article EN International Journal of Communication Networks and Information Security (IJCNIS) 2020-08-23

Abstract With increase in the use of contactless deliveries during times such as COVID-19 pandemic, emphasis was to minimize human presence reduce spread virus. In this regard, drones are one promising alternative be used delivery agents. However, security and Quality Service (QoS) major concerns while making for deliveries. order secure drone communication system, we propose, CovaDel: a blockchain-based scheme data transactions case that works phased manner. The proposed make decoupled...

10.1007/s00607-022-01064-7 article EN cc-by Computing 2022-03-14

Denial of Service (DoS) attacks is one the most common prevailing cyber-attack because its ease to initiate. But shielding against these burdensome due evolving techniques used by attackers carry out attacks. DoS can be any attack which incapacitate network resources from rendering services users. The aim incapacitating achieved through directing ginormous amount inadequate data requests hoax source IP addresses. Then various attacking involved in each category are broadly discussed. This...

10.1109/iccike47802.2019.9004388 article EN 2019-12-01
Coming Soon ...