Anil Kumar Yadav

ORCID: 0000-0003-4027-8229
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Reinforcement Learning in Robotics
  • Cloud Data Security Solutions
  • Security and Verification in Computing
  • Neural Networks and Applications
  • Advanced X-ray and CT Imaging
  • Fault Detection and Control Systems
  • Medical Imaging Techniques and Applications
  • Cryptographic Implementations and Security
  • Infection Control and Ventilation
  • Air Traffic Management and Optimization
  • QR Code Applications and Technologies
  • Mathematical and Theoretical Epidemiology and Ecology Models
  • Advanced Malware Detection Techniques
  • Complexity and Algorithms in Graphs
  • Data Stream Mining Techniques
  • Solar Radiation and Photovoltaics
  • Elevator Systems and Control
  • Retinal Imaging and Analysis
  • Adaptive Control of Nonlinear Systems
  • Advanced Authentication Protocols Security
  • Wind and Air Flow Studies
  • Software Engineering Research
  • Law, AI, and Intellectual Property
  • Brain Tumor Detection and Classification
  • Smart Agriculture and AI

Barkatullah University
2025

University of California, Los Angeles
2023-2024

Dr. B. R. Ambedkar National Institute of Technology Jalandhar
2024

Panjab University
2024

Amity University
2019

Indian Institute of Information Technology Allahabad
2019

IFTM University
2011-2015

Rajiv Gandhi Technical University
2015

University of North Texas
2013

Indian Institute of Technology Kanpur
1995

The growing use of VPNs, proxy servers, and Tor browsers has significantly enhanced online privacy anonymity. However, these technologies are also exploited by cybercriminals to obscure their identities, posing serious cybersecurity threats. Existing detection methods face challenges in accurately tracing the real IP addresses hidden behind anonymization tools. This study presents a novel approach unmasking true identities leveraging honeypots Canarytokens track concealed connections. By...

10.3390/info16020126 article EN cc-by Information 2025-02-09

Abstract A novel and simple approach to plot fringe contours from finite element results that simulates the thickness variation as observed in experiments is presented. The procedure does not require solution of any non‐linear equation. Shape functions are used interpolation nodal values orders. various one usually comes across stress analysis also reviewed. program code Turbo‐Pascal employing new algorithm given. Stress displacement at tip a crack an SEN (single‐edge‐notched) specimen...

10.1002/cnm.1640111008 article EN Communications in Numerical Methods in Engineering 1995-10-01

The problem of creating efficient mappings dataflow graphs onto specific architectures (i.e., solving the place and route problem) is incredibly challenging. difficulty especially acute in area Coarse-Grained Reconfigurable Architectures (CGRAs) to extent that mapping may remove a significant bottleneck adoption. We believe next generation algorithms will exhibit pattern recognition, ability learn from experience, identification creative solutions, all which are human characteristics. This...

10.1145/2517325 article EN ACM Transactions on Reconfigurable Technology and Systems 2013-10-01

Reinforcement learning is became one of the most important approaches to machine intelligence. Now RL widely use by different research field as intelligent control, robotics and neuroscience. It provides us possible solution within unknown environment, but at same time we have take care its decision because can independently learn without prior knowledge or training it experience through trial-and-error interaction with environment. In recent many works was done for researchers has also...

10.1145/1963564.1963578 article EN 2010-12-27

Purpose: To rule out hemorrhage, non-contrast CT (NCCT) scans are used for early evaluation of patients with suspected stroke. Recently, artificial intelligence tools have been developed to assist determining eligibility reperfusion therapies by automating measurement the Alberta Stroke Program Early Score (ASPECTS), a 10-point scale > 7 or ≤ being threshold change in functional outcome prediction and higher chance symptomatic hypodense volume. The purpose this work was investigate effects...

10.1117/12.3006582 article EN Medical Imaging 2018: Computer-Aided Diagnosis 2024-04-02

Challenges presented by ever increasing volumes of smart objects are huge in terms security and privacy data generated out these objects. These challenges range from the usage scenario with other dedicated servers which act as a middleman among various networks such internet wireless sensor network. In this paper, attempt has been made to highlight simple use case composite server XEN-based virtualised system. Security threats like sniffing spoofing isolated analysed respect novel key...

10.1504/ijics.2020.104000 article EN International Journal of Information and Computer Security 2019-12-06

Abstract Global issue corona pandemic and lock down has stopped the human life or disturbed. But this situation will not continue for longer period. Normality take place smoothen, but people fear at workplace due to unknown factors of pandemic, they be in a dwell mind whether touch things not. In research mitigate avoid such think develop IOT devices along with programmable-Ultra-Violet (UV) based system sanitization package surfaces. paper, we proposed an emphasized artificial intelligence...

10.1088/1742-6596/1714/1/012010 article EN Journal of Physics Conference Series 2021-01-01

This paper focuses on highlighting the vulnerabilities of DTLS handshake process and then optimising protocol to prevent software-based attacks in smart sensor client sensors (resource servers). We discussed scenarios where is prone software proposed trusted execution environment-based design enhance communication security by eliminating risk intermediate keying materials being exposed a non-secure environment. Our also considers resource constrained nature nodes thus split such that memory...

10.1504/ijsn.2019.101416 article EN International Journal of Security and Networks 2019-01-01

This paper focuses on highlighting the vulnerabilities of DTLS handshake process and then optimising protocol to prevent software-based attacks in smart sensor client sensors (resource servers). We discussed scenarios where is prone software proposed trusted execution environment-based design enhance communication security by eliminating risk intermediate keying materials being exposed a non-secure environment. Our also considers resource constrained nature nodes thus split such that memory...

10.1504/ijsn.2019.10022895 article EN International Journal of Security and Networks 2019-01-01

We introduce an application-oriented reinforcement learning searching algorithm designed for problem with fast and capturing goal in less amount of time especially robotics games.The importance game playing machine is exhaustive application autonomous agent real-world domain.In our previous published article represent that how learned through selftraining successful trained ready execution [11].In this paper, we design proposed a new grid world problem.In which first all agents train state...

10.14257/ijunesst.2015.8.6.33 article EN International Journal of u- and e- Service Science and Technology 2015-06-30

This article provides an overview of a comprehensive study on Optical Coherence Tomography (OCT) and its advanced variant, OCT Angiography (OCT-A), in the context diabetic retinopathy. is non-invasive imaging technique that utilizes low-coherence interferometry for depth-resolved ocular structures. Since introduction 1991, has been pivotal tool ophthalmology, allowing detailed visualization anatomic structures within eye. OCT-A, newer iteration, enhances this by using motion red blood cells...

10.33545/26638266.2023.v5.i1a.186 article EN other-oa International Journal of Medical Ophthalmology 2023-01-01

Challenges presented by ever increasing volumes of smart objects are huge in terms security and privacy data generated out these objects. These challenges range from the usage scenario with other dedicated servers which act as a middleman among various networks such internet wireless sensor network. In this paper, attempt has been made to highlight simple use case composite server XEN-based virtualised system. Security threats like sniffing spoofing isolated analysed respect novel key...

10.1504/ijics.2019.10020102 article EN International Journal of Information and Computer Security 2019-01-01
Coming Soon ...