Divya Upadhyay

ORCID: 0000-0003-3664-7415
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Time Synchronization Technologies
  • Energy Efficient Wireless Sensor Networks
  • Blockchain Technology Applications and Security
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Advanced Malware Detection Techniques
  • Real-Time Systems Scheduling
  • Security and Verification in Computing
  • Mobile Ad Hoc Networks
  • Cloud Data Security Solutions
  • EEG and Brain-Computer Interfaces
  • Wireless Body Area Networks
  • Petri Nets in System Modeling
  • IoT-based Smart Home Systems
  • Microbial Community Ecology and Physiology
  • Cryptography and Data Security
  • Context-Aware Activity Recognition Systems
  • Network Security and Intrusion Detection
  • Smart Agriculture and AI
  • Machine Learning in Healthcare
  • Artificial Intelligence in Healthcare
  • Energy Harvesting in Wireless Networks
  • Opportunistic and Delay-Tolerant Networks
  • Spreadsheets and End-User Computing
  • Internet of Things and AI

ABES Engineering College
2022-2025

Institute of Management Technology
2022-2025

Amity University
2014-2023

Amity University
2018-2021

Delhi Technological University
2020-2021

Guru Gobind Singh Indraprastha University
2014-2017

India Meteorological Department
1973-1994

Met Office
1994

In recent days, the IoT along with wireless sensor networks (WSNs), have been widely deployed for various healthcare applications. Nowadays, industries use electronic sensors to reduce human errors while analysing illness more accurately and effectively. This paper proposes an IoT-based health monitoring system investigate body weight, temperature, blood pressure, respiration heart rate, room humidity, ambient light synchronised clock model. The is divided into two phases. first phase,...

10.3390/electronics12020309 article EN Electronics 2023-01-06

In the present paper, an attempt has been made to examine Mentha production in different categories of farmers entitled Profitability Analysis Growers Ambedkar Nagar District Uttar Pradesh. Hundred sample (marginal 48, Small 31, & medium 21) where interviewed form 5 villages Baskhari block district. Data was analysis and found that Average holding Size is 1.17 ha. Cropping intensity farms 201.64 percent which highest on marginal 226.09 followed by 214.17 190.99 respectively. On cost...

10.9734/jeai/2025/v47i43358 article EN Journal of Experimental Agriculture International 2025-04-10

Efficient and low power utilizing clock synchronization is a challenging task for wireless-sensor network (WSN). Therefore, it crucial to design light weight protocols these networks. An adaptive offset prediction model WSN proposed in this paper that exchanges fewer messages improve the accuracy efficiency. Timing information required collected by setting small set up investigate soil condition control irrigation agriculture. The networks soils moisture, temperature, humidity, pressure...

10.1109/jsen.2018.2818302 article EN IEEE Sensors Journal 2018-03-22

Abstract This paper introduces a novel integrated hybrid malware attack detection algorithm, focusing on enhancing cybersecurity within blockchain systems by addressing the prevalent challenges of Byzantine fault tolerance, Reentrancy, and DDOS attacks. The significance this research lies in its contribution to safeguarding technology, cornerstone for secure, decentralized digital transactions, against sophisticated threats. Current solutions frequently fall short offering complete defense...

10.1088/2631-8695/ad4ba7 article EN Engineering Research Express 2024-05-14

Nature inspired algorithms are gaining popularity for optimizing complex problems. These have been classified into 2 general categories, namely Evolutionary and Swarm Intelligence, which further divided a couple of algorithms. This paper presents comparative study between Bat Algorithm, Genetic algorithm, Artificial Bee Colony Algorithm Ant Optimization Algorithm. compared on the basis various factors such as Efficiency, Accuracy, Performance, Reliability Computation Time. At end, table has...

10.1109/iceca.2017.8212781 article EN 2017 International conference of Electronics, Communication and Aerospace Technology (ICECA) 2017-04-01

10.1007/s13198-018-0698-9 article EN International Journal of Systems Assurance Engineering and Management 2018-01-18

Energy efficient routing is a crucial area of research for wireless sensor network(WSN). The communication between the nodes handled by protocols. nature link, low power and limited recourse makes it difficult task to design an energy performance protocol WSN. This paper proposes energy-efficient route selection multi-hop network with static link deployment in field agriculture. An model also given this evaluate consumption network. proposed multi-hop(ESM) evaluated based on parameters...

10.1109/icmete.2018.00067 article EN 2018-09-01

Android OS protects user data and system resources with the help of permission based model which requires android application developers to declare be used by their well in advance. The user's would not accessible developer unless grants acceptance permissions being asked developer. In order install on mobile, has allow access all requested permissions. There is no method granting some denying rest others. Such a case leads accepting like reading messages or accessing contacts etc. puts...

10.1109/confluence.2014.6949282 article EN 2014-09-01

Nowadays, heart-related diseases are common to people of all ages. Early detection anomalies can help save a life. This generates demand for an efficient heart disease prediction system. An individual use this system track his irregularities and be deployed in the medical health field hospitals. paper proposes learning algorithm based The proposed work is implemented on two algorithms, logistic regression random forest overall classification performance. In paper, evaluation tool model...

10.1109/cictn57981.2023.10140436 article EN 2023-04-20

Data uncertainty in face recognition due to various environmental factors and spoofing with 3D- masks are two major threats gain illegitimate access. A single image of has got high representing the since varies illumination, facial expression pose. Thus a can only be considered as an observation but not absolute accurate representation face. The accuracy improved by obtaining more images from same person. However real-world we have limited number available thus there is uncertainty. In this...

10.1109/confluence.2014.6949341 article EN 2014-09-01

Cloud computing is an enticing field nowadays due to its cost effective nature, easy accessibility, the pay per use service and shared resources. These resources, accessibility storage of resources are responsible for putting confidential information under a great deal risk. Although cloud becoming gigantic day by but efficiency being hampered considerably threats in environment. The environment not only account external attacks which launched with intention hampering work flow provider...

10.1109/cicn.2014.160 article EN International Conference on Computational Intelligence and Communication Networks 2014-11-01

Hadoop is based upon framework and the files that are stored in Distributed File System which better known as HDFS. The data these databases huge there can be multiple user, who would want to access file from This paper discusses about way contents of not distorted when users accessing same file.

10.1109/confluence.2014.6949251 article EN 2014-09-01

Modern advancement in efficient and affordable electronic devices has developed a huge range of applications the domain wireless networks. An essential problem addressed this Wireless sensor network is that nodes communicate with each other or base station without any infrastructure central administration. They can using channels exchange data multiple hops. For timely delivery messages, reliable routing protocols are required by these networks for communication. Through paper, critical...

10.1109/confluence.2014.6949348 article EN 2014-09-01
Coming Soon ...