- IPv6, Mobility, Handover, Networks, Security
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Mobile Agent-Based Network Management
- Distributed and Parallel Computing Systems
- Network Packet Processing and Optimization
- Interconnection Networks and Systems
- Advanced Optical Network Technologies
- Advanced Data Storage Technologies
- Wireless Networks and Protocols
- Service-Oriented Architecture and Web Services
- Algorithms and Data Compression
- Network Security and Intrusion Detection
- Cloud Computing and Resource Management
- Mobile Ad Hoc Networks
- Power Systems and Technologies
- Adaptive Control of Nonlinear Systems
- Smart Grid Security and Resilience
- Caching and Content Delivery
- VLSI and Analog Circuit Testing
- Advanced Authentication Protocols Security
- Distributed systems and fault tolerance
- Advanced Malware Detection Techniques
- Wireless Communication Networks Research
- Software System Performance and Reliability
Institute of Electrical and Electronics Engineers
2024
Nexteer Automotive (United States)
2016-2024
Nirma University
2014-2023
Raksha Shakti University
2023
Georgia Southern University
2019
Marwadi University
2019
Institute of Infrastructure Technology Research and Management
2017-2018
Cisco Systems (United States)
2004-2015
Cognizant (India)
2015
With the advancements in machine and deep learning algorithms, envision of various critical real-life applications computer vision becomes possible. One is facial sentiment analysis. Deep has made expression recognition most trending research fields area. Recently, learning-based FER models have suffered from technological issues like under-fitting or over-fitting. It due to either insufficient training data. Motivated above facts, this paper presents a systematic comprehensive survey on...
In the present era, social media platforms such as Facebook, WhatsApp, Twitter, and Telegram are significant sources of information distribution, people believe it without knowing their origin genuineness. Social has fascinated worldwide in spreading fake news due to its easy availability, cost-effectiveness, ease sharing. Fake can be generated mislead community for personal or commercial gains. It also used other benefits defaming eminent personalities, amendment government policies, etc....
Objectives: Masking and re-keying are two major countermeasures against the Power Side Channel Analysis attacks. Re-keying has either secret sharing overhead or needs to be used in synchronization. The Advanced Encryption System (AES) been modified proposed scheme uses without need for random synchronized communication. research a AES validated its effectiveness with AES. Methods: This study proposes modifying then implementing it as software encryption using Python. As modified, should also...
As the technology is growing rapidly, development of systems and software are becoming more complex. For this reason, security web applications become vulnerable. In last two decades, use internet application hacking activities on top glance. The organizations having biggest challenge that how to secure their from rapidly increasing cyber threats because organization can't compromise sensitive information. Vulnerability Assessment Penetration Testing techniques may help find loopholes....
In the recent years UAV (Unmanned Aerial Vehicles) having quad-copter helicopter i.e. configuration have been receiving increasing attention amongst global researchers due to its wide-range of applications such as surveillance in military, civilian and disaster management applications. This paper presents our investigations on modeling, simulation, altitude model validation comparison some popular control schemes. Quad-copter consists two pairs counter rotating rotors situated at ends a...
An organization’s success depends on its employees, and an employee’s performance decides whether the organization is successful. Employee enhances productivity output of organizations, i.e., employee paves way for success. Hence, analyzing giving ratings to employees essential companies nowadays. It evident that different people have skill sets behavior, so data should be gathered from all parts life. This paper aims provide rating based various factors. First, we compare AI-based...
The Internet of Things (IoT) has revolutionized the way how pervasive computing devices communicate and disseminate information over global network. A plethora user data is collected logged daily into cloud-based servers. Such can be analyzed by IoT infrastructure to capture users' behaviors (e.g. location, tagging smart home occupancy). This brings a new set security challenges, specifically anonymity. Existing access control authentication technologies failed support They relied on...
This paper presents a scalable mechanism, fast routing table recovery (FRTR), for detecting and correcting route inconsistencies between neighboring BGP routers. The large size of today's global makes the conventional periodic update approach, used by most protocols, infeasible. FRTR lets routers periodically exchange Bloom filter digests their state. digest exchanges not only enable detection potential during normal operations, but also speed up after session reset. achieves low bandwidth...