@hmritm.ac.in
ASSISTANT PROFESSOR AND COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
HMR ITM DELHI
Ambedkar Institute of Advanced Communication Technologies and Research: Geeta Colony, Delhi, INDIA
WIRELESS SENSOR NETWORKS, IoT, BLOCKCHAIN
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Dipti Pawade, Darshan Satra, Vishal Salgond, Param Shendekar, Nikhil Sharma, and Avani Sakhapara
Springer Nature Singapore
Nikhil Sharma, Shakti Singh, Shivansh Tyagi, Siddhant Manchanda, and Achal Kaushik
Springer International Publishing
Ruchi Pandey, Priyansha Bhasin, Saahil Popli, Mayank Sharma, and Nikhil Sharma
Springer Nature Singapore
Aradhya Singh Bisht, Amit Kumar Jha, Abhinav Sachdeva, and Nikhil Sharma
IEEE
Over the last 20 years, the field of object detection has seen a remarkable progress been made. In its 20-year history, this literature review not only goes through some landmark detectors (e.g., VJ detector, HOG detector, DPM, Faster-RCNN, YOLO, SSD, and others), key technologies, speed up methods, detection applications, datasets, and metrics, but also the 28 difficulties currently faced by the community are being discussed and further enhancement and continuation of these detectors are also discussed. We had shallow trainable structures and Handcrafted features which are the fundamentals of conventional object identification systems. With the spontaneous advancement of deep learning technology, additional effective tools are now competent of learning semantic, high-level, and deeper characteristics. In this study, deep learning-based object detection system has been reviewed. We also go through a few specific tasks, such as prominent item detection, face identification, and pedestrian detection.
Aeshita Mathur, Ameesha Dabas, and Nikhil Sharma
IEEE
The industrial revolution is characterized by a shift in methods from agricultural, pastoral, and handicraft economies to the one that is dominated by production industries. The Industrial Revolution brought a significant transformation from economies that were initially based on agriculture to the one that is now dominated by large-scale industries. The Industrial Revolution was first used for Britain’s economic development in 1760 by Arnold Toynbee. It broadly applies to economic transformation rather than a period of time. The primary characteristics of an industrial revolution are technological, cultural, and socioeconomic. During the first industrial revolution, a transition to manufacturing processes using steam and water took place. Electrical technology was primarily used in the second industrial revolution to increase production. The third industrial revolution came with IT and electronics, wherein the main focus was on automation in production. The fourth industrial revolution was to provide customization using AI. The fifth industrial revolution focuses on providing personalization and a human touch to manufacturing methods. Industry 5.0 is sometimes seen as anti-industrial because of its personalization involving the human touch. This paper has done a systematic analysis of the five industrial revolutions.
Sadhana Tiwari and Neha Sharma
The Electrochemical Society
The health sector is one of the important sectors of the Indian economy. The average expenditure on smart healthcare can be saved using the smart healthcare systems. Using Smart Healthcare System, death rate can be reduced and life span can be increased. Smart healthcare includes eHealth, mHealth services, smart home services, electronic database, and intelligent medical devices. Use of IoT based smart healthcare systems is increasing rapidly for disease diagnosis, patient’s treatment, and better quality of life. However, it produces a massive amount of data from different applications. It is the need of an hour to process and monitor real time data remotely with accuracy. As there are some limitations of IoT in healthcare like the massive amount of data generated, data security/privacy concerns, and more. This issue can be resolved by 5G technology. It has the capability to tackle the large amount of data with minimum delay and fulfills the requirement, such as high bandwidth, ultra-low latency, and ultra-high energy efficiency. Both 5G and IoT have great utility in the health sector. This research paper presents components, architecture, and applications of 5G enabled Internet of Medical Things (IoMT). This paper also covers how the 5G enabled IoMT supports the smart healthcare system and comparison of available wireless communication technologies for 5G enabled IoT. Requirements and technologies involved in 5G enabled IoMT Systems are presented along with their impact.
Nikhil Sharma and Prashant Giridhar Shambharkar
IEEE
In today's world, as population is at high peak and due to changing life style of people, individuals are suffering from various chronic disease. With shift towards modern methodology, involvement of human efforts has decreased, as know a day's people need to finish particular amount of task within few hours and with less effort. No doubt technology has made less intervention of human but it has certain limitations too. Due to less physical involvement, humans are more prone to diseases. Internet of things (IoT) plays a very crucial role in health care sector. Using various sensors, it become possible to trace the medical health condition of the human, and a message can be forwarded to nearby hospitals which helps the patients with ease. In this paper, three different diseases like heart disease, diabetes and novel COVID-19 are discussed where different machine learning algorithms are reviewed with involvement of IoT sensors.
N. Sharma, A. Anand, and A. K. Singh
Springer Science and Business Media LLC
Due to smart healthcare systems highly connected information and communications technologies, sensitive medical information and records are easily transmitted over the networks. However, stealing of healthcare data is increasing crime every day to greatly impact on financial loss. In order to this, researchers are developing various cost-effective bio-signal based data hiding techniques for smart healthcare applications. In this paper, we first introduce various aspects of data hiding along with major properties, generic embedding and extraction process, and recent applications. This survey provides a comprehensive survey on data hiding techniques, and their new trends for solving new challenges in real-world applications. Then, we survey the various notable bio-signal based data hiding techniques. The summary of some notable techniques in terms of their objective, type of data hiding, methodology and database used, performance metrics, important features, and limitations are also presented in tabular form. At the end, we discuss the major issues and research directions to explore the promising areas for future research.
Vikash Kumar Aggarwal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Himanshu
IOP Publishing
Himanshu, Rishu Rana, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
CRC Press
Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, and Martin Sagayam
Wiley
Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia
Wiley
Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Narayan C. Debnath
Springer International Publishing
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Nitin Kumar
Springer Singapore
Sukriti Goyal, Nikhil Sharma, Bharat Bhushan, Achyut Shankar, and Martin Sagayam
Springer International Publishing
Apeksha Rustagi, Chinkit Manchanda, Nikhil Sharma, and Ila Kaushik
Springer Singapore
Depression is a temperament syndrome that causes a tenacious emotion of wretchedness and loss of interest in any activity. It is a supreme root of mental illness, which has established the growth in the risk of early death and economic burden to a country. Traditional clinical analysis procedures are subjective, complex and need considerable contribution of professionals. The turn of the century saw incredible progress in using deep learning for medical diagnosis. Though, prediction and implementation of mental state can be remarkably hard. In this paper, we present Combinational Deep Neural Network (CDNN) for automated depression detection with facial images and text data using amalgamation of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). Thereafter, combining the prediction scores of both CNN and RNN model and level of depression is decided on the basis of the range of the predefined depression-level scores. Simulation outcomes based on real-field channel measurements show that the proposed model can significantly predict depression with superior performance.
Bharat Bhushan and Nikhil Sharma
Springer Singapore
Blockchain is defined as a technology comprising of logic unit of work done in form of transactions where any read or write operation can be carried out and stored in form of blocks where any financial accounts can be accessed by different servers. This is widely used technology due to its tremendous applicability such as independent verification without the involvement of any third party, no alteration or deletion of data, use of cryptography for secure financial accounts, sequential recording of transactions, pure transparent process of transaction. Blockchain follows both private and public type of architecture. In public model, anyone can read and write while in private only authorized users have the access. Security plays a vital role where secure transactions are to be carried out. Main principles of security such as confidentiality which implies the secrecy of send message, integrity which implies the consistency of send and received message and availability which implies information required must be available for reference, which must be preserved in any security-based model. In order to reduce the impact of attacks, various security algorithms such as cryptography, ring signature, Non-interactive Zero- Knowledge Proof, CryptoNote and Monero, Homomorphic Cryptosystem system are introduced in the paper.
Depender Kumar Soni, Harbhajan Sharma, Bharat Bhushan, Nikhil Sharma, and Ila Kaushik
IEEE
In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.
Anas Ahmad, Bharat Bhushan, Nikhil Sharma, Ila Kaushik, and Saurabh Arora
IEEE
This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.
Saurabh Arora, Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Anas Ahmad
IEEE
The fundamental feature of internet of things (IoT) is to integrate the sensing technology along with the technology of radio frequency identification and port these technology on the devices produced now-a-days. As of now the IoT has been facing many issues like poor security measures, high maintenance cost and least reliable. So, there is a need of new emerging technology like 5G which could resolve all these issues. 5G has the capability to introduce features like ultra-dense network support, high reliability with world class security measure. Which make the production of new devices with advance technology highly cost effective. So, in this paper we are going to discuss about what were the IoT based devices were facing before the introduction of emerging technology like 5G and how will be able to resolve out all those issues. Lastly, we will discuss how 5G along with IoT could bring a revolution in the existing technology.
Apeksha Rustagi, Chinkit Manchanda, and Nikhil Sharma
IEEE
Internet of Everything (IoE), the unified conjugate and autonomous coordination of enormous numeral of computing fundamentals and sensors, lifeless and alive beings, progressions and information through the Internet infrastructure. This turns data into actions that generate new abilities, richer skills, and extraordinary economic opportunity for industries, people and nations. Adopting these new technologies gives relaxation in daily life but comes with some issues like protecting the privacy and securing the information of users. This paper is written for the motive to understand and explain the fact that every element comes with two faces: positive as well as negative. The latest ongoing technology of IoE is likewise. The paper consists of the explanation of IoE and IoT technologies and the major differences among them along with the luxuries and comforts provided by the IoE despite of all the threats and challenges it has faced and is facing till now. The future scope and expectations from the IoE based devices are mentioned while concluding this paper.
Rajat Rathi, Nikhil Sharma, Chinkit Manchanda, Bharat Bhushan, and Moksh Grover
IEEE
With the exponential growth of technology within few decades the possibility of smart cities has also increased with an advanced production of fresh services for health, transport, business, education, energy distribution, social activity. As a result, Cyber Physical System (CPS) can prove itself very helpful in the adaptation of projects and applications of smart cities. But with this new security issues have been generated. In this Paper we study the CPS from three perspectives I.e. from security perspective, component perspective and CPS perspective for smart grids and smart cars. The paper then outlines the CPS, CPS models and communication in the CPS. With the increasing number of fresh services, the data is increasing at a very fast pace and this data may lead to the security issues like security attacks and protection from those attacks. The paper may also provide a research agenda for the future.
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Abhijeet Kumar
IEEE
In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.
Depender Kumar Soni, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
IEEE
We all are familiar with the problems a blind person faces while performing several daily life activities. These problems are generally related to walking on roads, walking on ramps, movement in staircases, looking for path in crowded streets and market places and many other situations. Of course, many of us come ahead to help them by guiding their way, but sometimes it becomes a matter of self-respect, or say, the person is not willing to take help from others or even it is possible that nobody may be available to help. Think of a situation when a blind person is alone and an Electronic Travel Aid Stick suddenly stops working due to a completely discharged battery system. This paper aims to build a device that can generate that much amount of energy that is required to run the electronic systems efficiently so that it can prevent visually impaired people from suffering in difficult situations.
1. Prediction Analysis Techniques of Data Mining: A Review. SSRN Electronic Journal. doi: 10.2139/
2. Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
3. Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
4. Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
5. Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
6.Traffic Density Investigation & Road Accident Analysis in India using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
7. Traffic control using V-2-V Based Method using Reinforcement Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
8. Network Layers Threats & its Countermeasures in WSNs. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
9. Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
10. Intrusion Detection and Security System for Blackhole Attack. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
11. Performance Measurement Using Different Shortest Path Techniques in Wireless Sensor Network. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
12. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. Advances in Intelligent Systems and Computing Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenarios, 401–416. doi: 10.1007/978-3-030-40305-8_20
13. Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
14. Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
15. Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/
16. Evaluation of Accidental Death Records Using Hybrid Genetic Algorithm. SSRN Electronic Journal. doi: 10.2139/
17. Evolution of IoT to IIoT: Applications & Challenges. SSRN Electronic Journal. doi:10.2139/
18. Producing Energy Using Blind Man Stick. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
19. Importunity & Evolution of IoT for 5G. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
20. Neoteric Security and Privacy Sanctuary Technologies in Smart Cities. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
21. IoE: A Boon & Threat to the Mankind. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
22. Evolution of 5G Wireless Network in IoT. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
23. Precedence & Issues of IoT based on Edge Computing. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
24. Security Challenges & Controls in Cyber Physical System. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/