Sandeep Singh Sengar

ORCID: 0000-0003-2171-9332
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Video Surveillance and Tracking Methods
  • Image Enhancement Techniques
  • Advanced Vision and Imaging
  • Remote-Sensing Image Classification
  • Remote Sensing and Land Use
  • Remote Sensing in Agriculture
  • Autism Spectrum Disorder Research
  • Advanced Image and Video Retrieval Techniques
  • Human Pose and Action Recognition
  • Advanced Malware Detection Techniques
  • Functional Brain Connectivity Studies
  • Anomaly Detection Techniques and Applications
  • Osteoarthritis Treatment and Mechanisms
  • Advanced Image Processing Techniques
  • Spam and Phishing Detection
  • Wireless Communication Networks Research
  • Network Security and Intrusion Detection
  • Chaos-based Image/Signal Encryption
  • Advanced Neural Network Applications
  • Gait Recognition and Analysis
  • Artificial Intelligence in Healthcare and Education
  • Advanced Steganography and Watermarking Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Wireless Network Optimization
  • Emotion and Mood Recognition

Cardiff Metropolitan University
2022-2025

University of Copenhagen
2022

SRM University
2019-2020

JK Lakshmipat University
2016-2018

Indian Institute of Technology Dhanbad
2015-2017

Indian Institute of Technology Roorkee
2012-2013

Motilal Nehru National Institute of Technology
2011

10.1007/s11760-017-1093-8 article EN Signal Image and Video Processing 2017-04-17

For specific identification process, Identity Management details an ailment of supplying authorized owners with secure and easy admittance to information solutions. choosing the individual's identity, primary goal is actually executing secured feature. PINs, keys, gain access cards, passwords, tokens are private determining elements which utilized within standard methods may have a tendency drawbacks such as cracking, stealing, copying posting. Biometrics grounded needed having perspective...

10.1109/esci48226.2020.9167512 article EN 2021 International Conference on Emerging Smart Computing and Informatics (ESCI) 2020-03-01

Abstract Software security vulnerabilities are significant for the software development industry. Exploration is conducted industry landscape, eco-system and system customer landscape. The focus to explore data sources that can provide team with insights act upon proactively. Across these modules of leveraged using artificial intelligence approaches identify insights. also on building a smart knowledge management integrates information processed across into central system. This be further...

10.1007/s42979-023-01785-2 article EN cc-by SN Computer Science 2023-04-15

Moving-object detection is one of the basic and most active research domains in field computer vision. This paper proposes a novel efficient approach for moving object under static background. Proposed first performs pre-processing tasks to remove noise from video frames. Secondly, it finds difference between current frame previous consecutive as well next separately. The algorithm then selects maximum pixel intensity value both frames, which we consider an improvement over approaches. Next...

10.1109/rait.2016.7507946 article EN 2016-03-01

10.1016/j.jvcir.2017.08.007 article EN Journal of Visual Communication and Image Representation 2017-08-18

Although IoT technology is advanced, wireless systems are prone to faults and attacks. The replaying information about routing in the case of multi-hop has led problem identity deception among nodes. devastating attacks against protocols as well harsh network conditions make situation even worse. most research literature aim at making system more trustworthy ensuring faultlessness, it still a challenging task. Motivated by this, present proposal introduces trust-aware mechanism (TARM), which...

10.3390/s22207820 article EN cc-by Sensors 2022-10-14

Abstract Margin, in typography, is described as the space between text content and document edges often essential information for consumer of document, digital or physical. In present age disruption, it customary to store retrieve documents digitally automatically from when necessary. Margin one such non-textual that becomes important some business processes, demand computing margins algorithmically mounts facilitate RPA. We propose a computer vision-based localization model, utilizing...

10.1007/s42979-023-01693-5 article EN cc-by SN Computer Science 2023-03-07

Abstract The proliferation of spam emails, a predominant form online harassment, has elevated the significance email in daily life. As consequence, substantial portion individuals remain vulnerable to fraudulent activities. Despite Gmail’s “spam mail filtration system,” its effectiveness is not absolute. It occasionally misclassifies legitimate messages, leading their confinement folder, or overlooks potentially harmful emails. This results occurrence false positives. research scrutinizes...

10.1007/s42979-023-02330-x article EN cc-by SN Computer Science 2023-11-08

A strong earthquake with magnitude 7.7 that shook the Indian Province of Gujarat on morning January 26, 2001 caused wide spread destruction and casualties. Earthquakeinduced ground failures, including liquefaction lateral spreading, were observed in many areas. Optical remote sensing offers an excellent opportunity to understand post-earthquake effects both qualitatively quantitatively. The impact using conventional indices from Landsat-7 temporal images for is empirically investigated...

10.1117/1.jrs.6.063531 article EN Journal of Applied Remote Sensing 2012-05-21

Moving-object tracking is one of the basic and hot research domains in computer vision area. This work presents a novel effective method to track moving objects under static background. Proposed first executes pre-processing tasks remove noise from video frames. Then, with help rectangular window, we select target object region frame (reference frame). Next, it applies Laplacian operator on selected for sharpening edge detection. The algorithm then DCT selects few high energy coefficients....

10.1109/wispnet.2016.7566561 article EN 2016-03-01

The majority of people in the modern biosphere struggle with depression as a result coronavirus pandemic's impact, which has adversely impacted mental health without warning. Even though individuals are still protected, it is crucial to check for post-corona virus symptoms if someone feeling little lethargic. In order identify post-coronavirus and attacks that present human body, recommended approach included. When harmful spreads inside post-diagnosis considerably more dangerous, they not...

10.3390/diagnostics12112844 article EN cc-by Diagnostics 2022-11-17

IEEE 802.16 WiMAX provides high data rate but limited coverage area and 3G is well established network with low as comparison to network. So if we will combine both then it ubiquitous speed access attract wider user base. In this paper have taken component which used in interworking architecture, security consideration, authentication procedure, fast handoff between heterogeneous (WiMAX-3G) networks. At last talk about effect of architecture on IMS (IP multimedia subsystem) signal delay.

10.1109/iccsn.2011.6013947 article EN 2011-05-01
Coming Soon ...