Anup Ingle

ORCID: 0000-0003-1159-9453
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Internet Traffic Analysis and Secure E-voting
  • Blockchain Technology Applications and Security
  • Information and Cyber Security
  • Security in Wireless Sensor Networks
  • IoT and Edge/Fog Computing
  • Innovative Approaches in Technology and Social Development
  • Image and Signal Denoising Methods
  • Parallel Computing and Optimization Techniques
  • Internet of Things and AI
  • Real-Time Systems Scheduling
  • Video Surveillance and Tracking Methods
  • Smart Cities and Technologies
  • Bluetooth and Wireless Communication Technologies
  • Child Development and Digital Technology
  • Advanced Memory and Neural Computing
  • Embedded Systems Design Techniques
  • Family and Disability Support Research
  • Opportunistic and Delay-Tolerant Networks
  • Cloud Data Security Solutions
  • Brain Tumor Detection and Classification
  • Big Data and Business Intelligence

International Institute of Information Technology
2014-2025

Institute of Management Technology
2023

The emerging trend of ubiquitous and pervasive computing aims at embedding everyday devices such as wrist-watches, smart phones, home video systems, autofocus cameras, intelligent vehicles, musical instruments, kitchen appliances etc. with microprocessors imparts them wireless communication capability. This advanced paradigm, also known the Internet Things or cyber-physical computing, leads internet to appear everywhere anywhere using any device location. With maximum appreciation due...

10.1109/iccic.2013.6724156 preprint EN 2013-12-01

With the state of art advancements in internet technology and wireless communication consistent miniaturization electronics hardware, recent trend engineering research has been to embed everyday objects with computers communication. This computing power capability is imparted by adding compact small silicon chips equipped micro-processors sensors these objects. Such ubiquitous availability coupled protocols makes information processing a process permeating almost every type object. These are...

10.1109/icicict.2014.6781254 article EN 2014-02-01

Cloud computing is a technology that offers dynamic resources to the users with enhanced scalability and flexibility. The major concerns in cloud environment has direct impact on throughput of system contentment problem task scheduling resource allocation. time taken execute tasks cost incurred for computation are significant objectives affect performance system. This work proposes multi-objective allocation technique using meta-heuristic optimization algorithm. Enhanced Honey Badger...

10.1109/icosec58147.2023.10275908 article EN 2023-09-20

The escalating complexity of computer networks on a daily basis has increased the probability malicious exploitation. Even rare vulnerability in single might compromise network security an entire organisation. Intrusion Detection Systems form integral component mechanisms designed to prevent internet and data communication systems from such attacks. attacks comprise information gathering modification through unauthorized access resources denial service legitimate users. IDS play key role...

10.1109/icesc.2014.82 article EN 2014-01-01

The number of vehicles is increasing every day, and hence traffic congestion, especially in intersections, becoming a major issue. This paper presents novel approach for analysis signal prediction using combination deep learning techniques.3000 images were utilized to train on CNN (Convolutional Neural Network) spatial feature extraction the Yolov5 algorithm. Then those features given GCN (Graph Convolutional as input by creating DGL graph. findings from this research provide valuable...

10.1109/asiancon58793.2023.10269944 article EN 2023-08-25

The Internet of Things (IoT) system makes it possible for different gadgets to connect each other and send receive data without any problems. But it’s not easy make sure that the being sent received within this structure is safe correct. A Lightweight Authenticated Key Management Mechanism (LAKMM) suggested as a way solve problem. goal LAKMM improve security transfer in IoT settings while reducing processing waste resource use, which are important factors devices don’t have lot resources....

10.47974/jdmsc-1960 article EN Journal of Discrete Mathematical Sciences and Cryptography 2024-01-01

10.1109/icccnt61001.2024.10724731 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2024-06-24

Damage from DDoS attack in increasing day by and an efficient detection algorithm is urgently needed. Many current algorithms are based on anomaly detections which ineffective real environment. Detection can be tackled effectively with pattern classification flow of packet machine learning algorithms. In this paper three such classificationsbased for discussed. Implementation these gives better accuracy limited time memory space; hence it’s one the highly scalable effective attack.

10.51201/jusst12593 article EN Journal of University of Shanghai for Science and Technology 2021-02-06

In computer music, instrument recognition is a critical part of sound modeling. Pitch, timbre, loudness, duration, and spatialization are all components musical sounds. All these play significant in determining the quality tonal sound. It possible to alter first four parameters, but timbre always poses challenge [6]. was inevitable that would take center stage. Musical instruments distinguished from one other by their distinct quality, independent pitch or volume. To distinguish between...

10.47974/jios-1345 article EN Journal of Information and Optimization Sciences 2023-01-01

The abundant availability of medical data from healthcare organizations increases the application Machine learning (ML) techniques in field. Reliable and trustworthy ML models needs to be developed order maintain efficacy providers. are used extensively make reliable disease predictions while also safeguarding collected through Internet Medical Things (IoMT) devices. Federated Learning (FL) suitable for preserving IoMT since it retains only trained progresses with information dispersed...

10.1109/icssas57918.2023.10331771 article EN 2023-10-18

The paper provides a comprehensive exploration of brain-computer interfaces (BCIs) and their application in addressing communication control challenges neurological disorders like Amyotrophic Lateral Sclerosis (ALS), locked-in syndrome, Parkinson’s disease, Spinal Cord Injury. It traces BCI advancements from foundational information theory principles to current state. Neurological severely impact abilities, with ALS causing muscle weakness paralysis, syndrome confining individuals within...

10.58414/scientifictemper.2023.14.4.07 article EN cc-by-nc-sa THE SCIENTIFIC TEMPER 2023-12-31

This study examines silicone polymer with aniline's ability to transmit liquids. The mass of the ingested liquid is found in flexible rubber's filling and contact classic., as shown by muscle shift after being immersed water., saltwater workaround., or hydrogen peroxide., well cleaning air another exposure assess. Filler earth's crust change can stop material from penetrating vulcan latex. low solubility rubber structure allows for a simpler coolant easily penetrate within it rather than...

10.1109/peeic59336.2023.10451429 article EN 2023-12-19

This literature study and experimentation aim to the current best performing architectures in domain of image classification. In particular, we investigate approaches for characterising Convolutional Neural Network (CNN) extracting features from frames our task video regression. Weather Forecasting wind speed are important factors many economic, business management sectors. Generalizability was successfully demonstrated by network accurately predicting based on recorded speeds other flags...

10.1109/iccubea58933.2023.10392012 article EN 2022 6th International Conference On Computing, Communication, Control And Automation (ICCUBEA 2023-08-18
Coming Soon ...