Devesh Pratap Singh

ORCID: 0000-0003-0034-6266
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • User Authentication and Security Systems
  • Internet of Things and AI
  • Advanced Authentication Protocols Security
  • IoT-based Smart Home Systems
  • COVID-19 diagnosis using AI
  • Security in Wireless Sensor Networks
  • Smart Systems and Machine Learning
  • Anomaly Detection Techniques and Applications
  • AI in cancer detection
  • Advanced Steganography and Watermarking Techniques
  • Indoor and Outdoor Localization Technologies
  • Artificial Intelligence in Healthcare
  • Energy Harvesting in Wireless Networks
  • Brain Tumor Detection and Classification
  • Internet Traffic Analysis and Secure E-voting
  • Cloud Computing and Resource Management
  • Mobile Ad Hoc Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Cryptography and Data Security
  • Smart Agriculture and AI

Graphic Era University
2016-2025

Sam Higginbottom Institute of Agriculture
2024

All India Institute of Medical Sciences
2022-2024

Jai Prakash Vishwavidyalaya
2023

Delhi Technological University
2023

All India Institute of Medical Sciences Raipur
2023

Universiti Sains Malaysia
2023

Motilal Nehru National Institute of Technology
2023

Employees' State Insurance Model Hospital
2022

Institute of Medical Sciences
2018-2022

The Internet of Medical Things (IoMT) is a kind connected infrastructure smart medical devices along with software applications, health systems and services. These applications are to healthcare through the Internet. Wi-Fi enabled facilitate machine-to-machine communication link cloud platforms for data storage. IoMT has ability make accurate diagnoses, fewer mistakes lower costs care. smartphone permits patients exchange their related confidential private information experts (i.e., doctors)...

10.1109/access.2020.2995917 article EN cc-by IEEE Access 2020-01-01

As we all know that the technology is projected to be next humans very soon because of its holistic growth. Now-a-days, see a lot applications are making our lives comfortable such as smart cars, homes, traffic management, offices, medical consultation, cities, etc. All facilities in reach common man advancement Information and Communications Technology (ICT). Because this advancement, new computing communication environment Internet Things (IoT) came into picture. Lot research work progress...

10.1109/access.2019.2962829 article EN cc-by IEEE Access 2019-12-31

Arrhythmias are defined as irregularities in the heartbeat rhythm, which may infrequently occur a human's life. These arrhythmias cause potentially fatal complications, lead to an immediate risk of Thus, detection and classification is pertinent issue for cardiac diagnosis. (1) Background: To capture these sporadic events, electrocardiogram (ECG), register containing heart's electrical function, considered gold standard. However, since ECG carries vast amount information, it becomes very...

10.3390/bioengineering9040152 article EN cc-by Bioengineering 2022-04-02

The satellite communication is embellished constantly by providing information, ensuring security, and enables the among huge at a particular time efficiently. navigation helps in determining people's location. Global development, natural disasters, change climatic conditions, agriculture crop growth, etc., are monitored using observation. Hence, includes detailed information data, it must be protected confidentially. field of enhanced an astonishing pace. Satellite data play important role...

10.1155/2022/4340897 article EN Computational Intelligence and Neuroscience 2022-10-07

Wireless Sensor Networks (WSNs) are prone to various attacks in which Blackhole a kind of Denial Service (DoS) attack is very difficult detect and defend. In blackhole attack, an intruder captures re-programs set nodes the network block packets they receive instead forwarding them towards base station. As result any information that enters region captured not able reach destination causing high end-to-end delay low throughput. Previously little amount work done for detection prevention WSN...

10.1109/iccsp.2013.6577120 article EN International Conference on Communication and Signal Processing 2013-04-01

The sinkhole attack in an edge-based Internet of Things (IoT) environment (EIoT) can devastate and ruin the whole functioning communication. attacker nodes ( S H A s) have some properties (for example, they first attract other normal for shortest path to destination when initiate process sending their packets through that (i.e., via ), start disrupting traffic flow network). In presence s, sink node i.e., gateway/base station) does not receive required information or it may partial modified...

10.3390/s20051300 article EN cc-by Sensors 2020-02-27

MANET is a mobile ad hoc network with many nodes communicating without centralized module. Infrastructure-less networks make it desirable for researchers to publish and bind multimedia services. Each node in this infrastructure-less acts as self-organizing re-configurable. It allows services deploy attain from another over the network. The service composition aims provide user’s requirement by combining different atomic based on non-functional QoS parameters such reliability, availability,...

10.3390/electronics11172637 article EN Electronics 2022-08-23

One of the most significant recent advances in technology is advent unmanned aerial vehicles (UAVs), i.e., drones. They have widened scope possible applications and provided a platform for wide range creative responses to variety challenges. The Internet Drones (IoD) relatively new concept that has arisen as consequence combination drones Internet. fifth-generation (5G) beyond cellular networks (i.e., 5G) are promising solutions achieving safe drone operations applications. may many...

10.3390/drones7080508 article EN cc-by Drones 2023-08-02

The healthcare sector is a very crucial and important of any society, with the evolution various deployed technologies, like Internet Things (IoT), machine learning blockchain it has numerous advantages. However, in this section, data much more vulnerable than others, because strictly private confidential, requires highly secured framework for transmission between entities. In article, we aim to design blockchain-envisioned authentication key management mechanism IoMT-based smart...

10.1109/access.2023.3310264 article EN cc-by-nc-nd IEEE Access 2023-01-01

The increasing need for additive manufacturing technologies generally Fused Deposition Modeling (FDM) demands parameter optimization strategies producing better mechanical components. study evaluated the tensile strength between ASTM standard specimens constructed utilizing black PLA and carbon filament materials. authors used regression methods to establish mathematical models that optimized FDM process parameters maximizing levels. Testing confirmed exhibits superior than PLA....

10.1051/itmconf/20257403010 article EN cc-by ITM Web of Conferences 2025-01-01

ABSTRACT As the world becomes more digital, cyber security is crucial for individuals, groups, and businesses. Secure communication must also be provided in Web of Things (WoT) environment. Protecting its data against fraud loss essential. Phishing attacks, which deceive users to steal sensitive data, continue threaten security. This paper introduces SPADS‐WoT, a machine learning‐based phishing detection method using Synthetic Minority Over‐sampling Technique (SMOTE) analysis. The SPADS‐WoT...

10.1002/spy2.70023 article EN Security and Privacy 2025-03-01

Background: The woodworking industry represents an important cause of occupational noise-induced hearing loss (NIHL), a significant yet underappreciated problem in many developing countries.Objectives: To describe the prevalence NIHL among woodworkers Nepal and measure noise levels at workplaces.Methods: We conducted cross-sectional study with 124 (88 carpenters, 36 sawyers), recruited through convenience sampling from 26 workplaces. Pure-tone audiometry between frequencies 0·5 8 kHz...

10.1179/2049396714y.0000000084 article EN International Journal of Occupational and Environmental Health 2014-10-21

Smart healthcare technologies transform the traditional system in all possible ways. has enormous number of benefits over system. However, at same time, it also suffers from some data security and privacy related issues as potential Internet attackers may get access to sensitive through deployment various kinds attacks. To mitigate these issues, this paper, a new lightweight remote user authentication key establishment scheme (in short, UAKM-SH) been proposed by making use cryptographic...

10.1109/tnse.2022.3163201 article EN IEEE Transactions on Network Science and Engineering 2022-03-29

Face recognition in the industry now is playing an important role each sector. Each person has different type of features and face; therefore, identity unidentical. In this COVID outbreak, a major crisis occurred due to which preventions are be made. One such prevention use face mask very much important. Nowadays, various firms organizations using facial systems for their own general purpose. We all know that it been crucial task wear every time, when we go somewhere. But as not possible...

10.1109/icict55121.2022.10064500 article EN 2022-11-11

The Internet of Medical Things (IoMT) is a collection smart healthcare devices, hardware infrastructure, and related software applications, facilitating to connect information technology system via the Internet. It also called IoT in healthcare, secure communication remote devices over for quick flexible analysis data. In other words, IoMT an amalgam medical which improves overall outcomes. However, this prone security- privacy-related attacks on Therefore, providing robust security...

10.1016/j.dcan.2022.04.009 article EN cc-by-nc-nd Digital Communications and Networks 2022-04-21

This study proposes an IoT gadget information trade system that is haze based and utilizes a block chain approach. A typical worldview for distributed computing calculation, which spots handling storage spaces between the customers cloud climate. Here, solid method utilized by gadgets to information. The Internet of Things (IoT) frameworks, instance in climate, are one significant sources. multifaceted design interconnectedness such conditions, nonetheless, can prompt security shortcomings...

10.1109/ic3i59117.2023.10397622 article EN 2023-09-14

This article's goals include providing a framework for interpersonal and communication to safeguard welfare services assess how well the innovation ecosystem is now understood. An essay starts with an overview or description of "urban area" viewpoint includes neighborhood services, modern amenities, smart infrastructure. Information technology, digital operations use, monitoring, interconnection, amongst other things. The section that follows examines various urban planning concerns, either...

10.1109/icacite57410.2023.10182730 article EN 2023-05-12

Cyber world is susceptible to various attacks, out of which malware attack the malignant one. It very difficult detect and defend. A keylogger spyware contains both scripts in a single program. The functionality this program that it can capture all key strokes are pressed by system user stores them log file, email file designer's specified address. harmful for those systems used daily transaction process i.e. online banking system. prevention these attacks necessary. In paper we have...

10.1109/isco.2013.6481194 article EN 2013-01-01
Coming Soon ...