@iiitn.ac.in
Assistant Professor
IIIT nagpur
Machine learning
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Nidhi Lal and Shishupal Kumar
Springer Science and Business Media LLC
Nidhi Lal, Shishupal Kumar, and Garima Kaidan
Springer International Publishing
Sonal Ganvir and Nidhi Lal
IEEE
Speaker Recognition has been one of the most interesting yet challenging problems in the field of machine learning and artificial intelligence. It is used in the areas of human voice authentication for security purpose and identifying a person from a group of speakers. It has been a arduous task to teach a machine the differences in human voices, especially when people belong to different background like gender, language, accent, etc. This paper has used the deep learning approach to build and train two models, Artificial Neural Network (“ANN”) and Convolutional Neural Network (“CNN”), and compared their results. In former, the neural networks are fed on diverse extracted features from audio collection, whereas the latter is trained on spectrograms. Finally, transfer learning approach is deployed on both to get a viable output using limited data.
Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya
Springer Science and Business Media LLC
Nowadays, Internet-of-things (IoT) provides various services to the users by equipped with the smart devices. In this regard, the next generation of vehicles collaborates with the features of IoT to provide the safety and security on the roads. To achieve this, it equipped with short-range communication advances and establishes Vehicle-to-Vehicle (V2V) connectivity. The standardized V2V connectivity and communication are termed as IEEE 802.11p. Later, an alternative named as (LTE-V2V) has been introduced. However, both the technologies are only concerned with the continuous broadcast of information and cooperative awareness. It only takes information from one vehicle in the format of text message and sends to another. In this regard, an efficient and satisfactory safety is not provided by these technologies for analysis of real-time road traffic monitoring. A clear observation of road conditions and awareness of event triggering is a necessary task rather than broadcasting of information provided by the vehicles. Therefore in this paper, we proposed a solution by providing the real-time information about road conditions and traffic scenarios to the users. We utilized the capturing images of road conditions by the positioned cameras and Global Positioning System in order to extract the information regarding vehicle and camera position. The proposed work provides a better security rather than message passing system in V2V communication. The users in our anticipated scenarios can extract and see a clear view of road conditions by use of captured videos/images. We offered an approach named as Smart Road Monitoring for IoT based smart cities to provide an effective solution for the real-time analysis of traffic road conditions. The proposed approach gives a clear view of conditions of the road to the users such that they can make a decision according to their suitability Our proposed solution well copes with the moderate traffic conditions and provides high satisfaction score. The performance analysis is done in a comparison of V2V and LTE-V2V in terms of various metrics. The simulation results show that our proposed work can achieve high performance in the provision of providing safety compared to other scheme introduced in this field.
Akash Kumar, Aniket Verma, Gandhali Shinde, Yash Sukhdeve, and Nidhi Lal
IEEE
For a developing country like India, it is not new that people hear of crimes happening quite often. With the rapid urbanization of cities, we have to constantly be aware of our surroundings. In order to avoid the unfortunate, we will try to observe crime rates by the KNN prediction method. It will predict, tentatively, the type of crime, when, where and at what time it may take place. This data will give the behaviors in crime over an area which might be helpful for criminal investigations. It will also provide us with the most committed crime in a particular region. In this paper, we will use the k-nearest neighbor algorithm of machine learning.
Montu Saw, Tarun Saxena, Sanjana Kaithwas, Rahul Yadav, and Nidhi Lal
IEEE
In the current era deaths due to heart disease have become a major issue. Approximately one person dies per minute due to heart disease. Data is generated and has to be stored daily because of fast growth in Information Technology. The data which is collected is converted into knowledge by data analysis by using various combinations of algorithms. Healthcare professionals working in the area of cardiac disease have their own limits and can not forecast the probability of high accuracy in cardiac disease .This paper aims to improve Heart Disease predict accuracy using the Logistic Regression model of machine learning considering the health care dataset which classifies the patients whether they are having heart diseases or not according to the information in the record.
Varun Shirbhayye, Deepesh Kurmi, Siddharth Dyavanapalli, Agraharam Sai Hari Prasad, and Nidhi Lal
IEEE
Considering the growth of the automobile industry coming across since the past two centuries, we are witnessing theincreasing fuel prices and customers being more particularabout the features, the automobile makers are constantlyoptimising their processes to increase fuel efficiency. But what if you could have a reliable estimator for a car’s MPG given some known specifications about the vehicle? Then, you could beat a competitor in the market by both having a more desirable vehicle that is also more efficient, improve the fuel economy and bring more demand and supply to the consumers. We are implementing Machine Learning to design the prediction models and minimise the RMSE(Root Mean Square Error) value in between 1 and 2 of the automobiles made (in MPG) in the past years.
Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya
Springer Science and Business Media LLC
Information-centric networking (ICN) is gradually becoming an alternative approach to the conventional Internet architecture through the distribution of enlightening information (named as content) on the Internet. Given the growing Internet traffic, the adapted information-centric architecture is expected to more favourably serve the user’s need of accessing data. In this paper, we proposed a novel framework for cache management in ICN that jointly considers the caching strategy and network coding. For the proposed cache management framework, we first evaluated a new Centrality-measures to assess the variation in the behaviour of each node in the network and to identify such behaviour. Subsequently, we developed an efficient random network coding-based cache management algorithm to obtain a support for caching and multicasting in the ICN paradigm. Extensive simulations were made, and related results showed that our proposed scheme has better performance in terms of cache hit ratio, average download time, server hit reduction ratio, and traffic overhead compared with other schemes in our simulated scenarios.
Nidhi Lal and Shishupal Kumar
Informa UK Limited
ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.
Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya
Springer Science and Business Media LLC
Content-centric networking (CCN) is gradually becoming the alternative approach to the traditional Internet architecture through enlightening information (content) distribution on the Internet with content names. The growing rate of Internet traffic has adapted a content-centric architecture to better serve the user requirement of accessing a content. For enhancing content delivery, ubiquitous in-network caching is utilized to store a content in each and every router by the side of the content delivery path. From the study, it is evaluated that a better performance can be achieved when caching is done by a subset of CRs instead of all CRs in a content delivery path. Motivated by this, we proposed an adaptive neuro-fuzzy inference system-based caching (ANFIS-BC) scheme for CCN to improve the cache performance. The proposed ANFIS-BC scheme utilizes the feature of centrality-measures for selection of a router for caching in a network. Our results demonstrated that the ANFIS-BC scheme consistently achieves better caching gain across the multiple network topologies.
Shishupal Kumar, Nidhi Lal, and Vijay Kumar Chaurasiya
Elsevier BV
Kumari Nidhi Lal and Anoj Kumar
Springer Science and Business Media LLC
In distinction to today’s IP-based, host-bound, Internet architecture, content-centric networking (CCN) emphasizes content by making it instantly addressable and routable. CCN has attracted attention in the research community as a means to cope with the increasing rate of Internet traffic. The host-to-host architecture is demonstrated to be inefficient in content distribution with a lot of bandwidth waste, and it is intricate to set up the network service because of the TCP/IPs location-dependence. CCN is a future Internet architecture which is directed to disentangle the above problems by location-independent content naming and world-wide content caching in a content router. An efficient caching is essential to reduce the delay and to enhance the performance of the network. In addition, a good cache replacement scheme is also necessary to decide which content should reside in the cache and which one should be evicted. The traditional caching replacement strategies schemes such as FIFO, LRU and MRU etc. are not updated as adaption of CCN from host-to-host Internet architecture. Before making replacement, a replacement strategy must performs the calculation of popularity of a content, local popularity of a content (intra-domain network), expected probability respective of demand for a content and instantaneous hit ratio. The traditional and existing popularity based cache replacement strategies do not consider mentioned key points. Therefore in this paper, we present a novel popularity based content eviction scheme for CCN with evaluation of local popularity of a content using the betweenness-centrality concept. The simulation results recommend that our proposed scheme can reliably accomplish the better performance across the other approaches proposed in this field.
Nidhi Lal, Shishupal Kumar, Garima Kadian, and Vijay Kumar Chaurasiya
Elsevier BV
Shishupal Kumar, Nidhi Lal, and Vijay Kumar Chaurasiya
Springer International Publishing
Software-defined network is one of the best methodologies of computer network that countenances to an administrator to succeed the computer network amenities through the perception of subordinate side by side functionality. Software-defined network (SDN) is alienated into two fragments: one is Control plane and former is Data plane. In control plane are the actually deployed devices. This control plane is located at a fundamental controller. The controller is responsible for building the forwarding base and figuring out how a packet should be forwarded through a network. The SDN controller takes the information of packages and places it in a forwarding table or flow table of devices, the controller verifies the protocol made by the administrator and forward the packet to the router. In this paper, the performance analysis of SDN is done with the help of one, two and three controllers and will see how much the transfer time is affected with increasing number of controllers.
Kumari Nidhi Lal and Anoj Kumar
Springer Science and Business Media LLC
Information-centric networking (ICN) is gradually becoming the alternative approach to the traditional Internet architecture through enlightening information (content) distribution on the Internet with content names. The growing rate of Internet traffic has adapted the content-centric architectures to better serve the user requirement of accessing data. Routing disseminates preliminary topology and strategy information as well as long-term changes in them and computes the routing table to coordinate the forwarding procedure. A good routing scheme is essential to reduce delay and to enhance the performance of the network with an efficient searching of the desired content item. In this paper, we present a novel scheme for ICN which evaluates the path for searching the desired content item with an efficient lookup process and we call as Intelligent Routing (IR). Our implement IR scheme utilizes the concept of ternary digital search for making an efficient lookup and evaluates the satisfaction score for making a forwarding decision. The simulation results recommend that IR scheme can reliably accomplish the better performance across other hashing and routing approaches proposed in this field.
Shishupal Kumar, Nidhi Lal, and Vijay Kumar Chaurasiya
Springer Science and Business Media LLC
To give the complete description of an environment or to take a robust decision, a number of observations are collected and combined from the multiple sensor nodes. The process of combining and analyzing the observations is called multisensor data fusion. The fusion is used to produce more consistent, accurate, and useful information than that provided by any individual sensor node. For efficiency, data fusion is performed on the sensed sample collected by sensor nodes. However, fusion on the network path parameters is also essential to select an appropriate forwarding route for sending the data. In addition, to increase the lifetime of a network, an efficient strategy is needed in order to select a cluster head node. Therefore, in this paper, we propose a multisensor data fusion (MDF) strategy which performs fusion on collected network parameters for the selection of an appropriate path with collaboration of Fuzzy-based cluster head selection (FBCHS). Jointly, we named the strategy as the MDF-FBCHS strategy for IoT-oriented WSN. Extensive simulations were made, and related results showed that our proposed scheme has better performance compared with other schemes in our simulated scenarios.
Kumari Nidhi Lal and Anoj Kumar
Springer Science and Business Media LLC
Content-centric networking (CCN) is gradually becoming an alternative approach to the conventional Internet architecture through the distribution of enlightening information (named as content) on the Internet. It is evaluated that the better performance can be achieved by caching is done on a subset of content routers instead of all the routers in the content delivery path. The subset of a content router must be selected in a manner such that maximum cache performance can be achieved. Motivated by this, we propose a Centrality-measures based algorithm (CMBA) for selection of an appropriate content router for caching of the contents. The Centrality-measures are based on the question: ”Who are the most important or central content router in the network for the caching of contents?”. We found that our novel CMBA could improve content cache performance along the content delivery path by using only a subset of available content routers. Our results recommend that our proposed work consistently achieves better caching gain across the multiple network topologies.
Kumari Nidhi Lal and Anoj Kumar
IEEE
Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework in overcoming generation network. This paper proposes Information-centric networking based framework over WBAN as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Information-centric network (ICN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. ICN router has the caching capability to cache the contents. In this way, users of ICN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol for ICN-WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and devices.
Kumari Nidhi Lal and Anoj Kumar
Elsevier BV
Kumari Nidhi Lal and Anoj Kumar
IEEE
Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework over a fifth generation network. The introduction of the Internet of things (IoT) and latest developments or improvements in E-health, pointed towards the fifth generation (5G) paradigm of health care application and services. This paper proposes Content-Centric networking based framework over 5G as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Content-Centric network (CCN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. CCN router has the caching capability to cache the contents. In this way, users of CCN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol stack for 5G-CCN WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and IoT devices.
Kumari Nidhi Lal and Anoj Kumar
Elsevier BV
Nidhi Lal, Shishupal Kumar, Aditya Saxena, and Vijay Km. Chaurasiya
Elsevier BV
Nidhi Lal, Anurag Prakash Singh, and Shishupal Kumar
IEEE
The security of RSA algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has been implemented in the past years. The offered KNJ-Factorization algorithm contributes a deterministic way to factorize RSA N=p*q. The algorithm limits the search by only considering the prime values. Subsequently prime numbers are odd numbers (apart from 2) accordingly it also requires smaller number steps to factorize RSA. In this paper, the anticipated algorithm is very simple besides it is very easy to understand and implement. The main concept of this KNJ-factorization algorithm is, to check only those factors which are odd and prime. The proposed KNJ-Factorization algorithm works very efficiently on those factors; which are adjoining and close to √N. The proposed factorization method can speed up if we can reduce the time for primality testing. It fundamentally decreases the time complexity.
Kumari Nidhi Lal and Ashutosh Kumar Singh
IEEE
In this paper, a new design for U-shaped microstrip patch antenna is proposed, which can be used in WiMAX communication systems. The aim of this paper is to optimize the performance of microstrip patch antenna. Nowadays, WiMAX communication applications are widely using U-shaped microstrip patch antenna and it has become very popular. Our proposed antenna design uses 4-4.5 GHZ frequency band and it is working at narrowband within this band. RT/DUROID 5880 material is used for creating the substrate of the microstrip antenna. This modified design of the microstrip patch antenna gives high performance in terms of gain and return loss.