Ninni Singh

@cmritonline.ac.in

Associate Professor
CMR Institute of Technology



                 

https://researchid.co/ninnisingh1991

EDUCATION

PhD (Computer Science and Engineering)

RESEARCH INTERESTS

Expert System
Artificial Intelligence
Cryptography and Network Security

37

Scopus Publications

1022

Scholar Citations

21

Scholar h-index

28

Scholar i10-index

Scopus Publications

  • Embedding learning models with pedagogy recommendation in adaptive intelligent tutoring system
    Amit Kumar, Devesh Pratap Singh, Ninni Singh, and Neeraj Kumar Pandey

    CRC Press

  • Sentiment Analysis Unleashed: Leveraging VADER for Evaluation of Public Opinion
    Suhawni Arora, Ashmit Malhotra, Amit Kumar, and Ninni Singh

    IEEE
    Digital reviews provide real-world feedback on products and services in an era of online commerce and access to information. Providing feedback fosters trust and credibility among potential customers, enabling them to make informed purchasing decisions. In review classification, sentiment analysis is a key component that assesses the emotional tone of the reviews. Businesses can prioritize responses, manage their reputation, and extract actionable insights by categorizing reviews as positive, negative, or neutral. The study also includes neutral feedback, which includes suggestions for incremental improvement, which assists in continuous product refinement. In the proposed work, more than 5,68,455 reviews are divided into positive negative, and neutral sentiments by sentiment analysis. The results demonstrate VADER's robustness and versatility, showing its capacity to accurately gauge public sentiment across different contexts and types of language, including slang, emojis, and colloquial expressions. We also compare VADER's performance with other sentiment analysis algorithms, underscoring its advantages in handling informal online communication.

  • Exploring Transfer Learning in Brain Tumor Classification with Deep Neural Networks
    Vikas Singh Rawat, Sakshi Johar, Amit Kumar, and Ninni Singh

    IEEE
    In today's era, medical advancements have reached their peak but still, some bugs led to the emergence and involvement of advanced techniques like Machine learning, Artificial Intelligence, and Deep Learning. These three are interconnected and have strong relationships that work as such, to increase the growth of work in any domain with rapid accuracy and without any error. This paper deals with the identification and categorization of tumors. Brain tumors are a result of abnormal behavior of cell division which leads to uncontrolled growth of cells and results in the formation of masses and lumps in the brain. The detection of tumors is done using radiology with the help of MRI techniques or MRI scans. Traditional scans sometimes lead to errors causing misdiagnoses. This process is also timeconsuming and as such requires high expertise. To elevate this process, in this paper, we used a multi-layered CNN model which takes the MRI images as input and classifies it into one of the four major categories i.e., ‘Glioma’, ‘Meningioma’, ‘Pituitary’ or ‘No Tumor’. The publicly available dataset used to train this model contains over 7000 images which have been segregated into testing and training where both classes contain 4 different segmentations depicting the different brain tumors. The training folder contains nearly 5200 images, and the testing folder has over 1500 images. The accuracy of the model has been tested to over 96 percent. Then we converted the above model to the VGG16 model by using the study of Transfer Learning and the model gave up to 98.04% accuracy and validation accuracy was approximately 94.73%.

  • Detection of Cardio Vascular abnormalities using gradient descent optimization and CNN
    Ninni Singh, Vinit Kumar Gunjan, Fahimuddin Shaik, and Sudipta Roy

    Springer Science and Business Media LLC

  • Multi-Controller Model for Improving the Performance of IoT Networks
    Ganesh Davanam, Suresh Kallam, Ninni Singh, Vinit Kumar Gunjan, Sudipta Roy, Javad Rahebi, Ali Farzamnia, and Ismail Saad

    MDPI AG
    Internet of Things (IoT), a strong integration of radio frequency identifier (RFID), wireless devices, and sensors, has provided a difficult yet strong chance to shape existing systems into intelligent ones. Many new applications have been created in the last few years. As many as a million objects are anticipated to be linked together to form a network that can infer meaningful conclusions based on raw data. This means any IoT system is heterogeneous when it comes to the types of devices that are used in the system and how they communicate with each other. In most cases, an IoT network can be described as a layered network, with multiple tiers stacked on top of each other. IoT network performance improvement typically focuses on a single layer. As a result, effectiveness in one layer may rise while that of another may fall. Ultimately, the achievement issue must be addressed by considering improvements in all layers of an IoT network, or at the very least, by considering contiguous hierarchical levels. Using a parallel and clustered architecture in the device layer, this paper examines how to improve the performance of an IoT network’s controller layer. A particular clustered architecture at the device level has been shown to increase the performance of an IoT network by 16% percent. Using a clustered architecture at the device layer in conjunction with a parallel architecture at the controller layer boosts performance by 24% overall.

  • Detection of lung cancer in CT scans using grey wolf optimization algorithm and recurrent neural network
    Vinit Kumar Gunjan, Ninni Singh, Fahimudin Shaik, and Sudipta Roy

    Springer Science and Business Media LLC

  • IoT enabled HELMET to safeguard the health of mine workers
    Ninni Singh, Vinit Kumar Gunjan, Gopal Chaudhary, Rajesh Kaluri, Nancy Victor, and Kuruva Lakshmanna

    Elsevier BV

  • SeisTutor: A Custom-Tailored Intelligent Tutoring System and Sustainable Education
    Ninni Singh, Vinit Kumar Gunjan, Amit Kumar Mishra, Ram Krishn Mishra, and Nishad Nawaz

    MDPI AG
    Education is the cornerstone of improving people’s lives and achieving global sustainability. Intelligent systems assist sustainable education with various benefits, including recommending a personalized learning environment to learners. The classroom learning environment facilitates human tutors to interact with every learner and obtain the opportunity to understand the learner’s psychology and then provide learning material (access learner previous knowledge and well-align the learning material as per learner requirement) to them accordingly. Implementing this cognitive intelligence in Intelligent Tutoring System is quite tricky. This research focused on mimicking human tutor cognitive intelligence in the computer-aided system of offering an exclusive curriculum or quality education for sustainable learners. The prime focus of this research article was to evaluate the proposed SeisTutor using Kirkpatrick four-phase evaluation model. The experimental results depict the enhanced learning gained through intelligence incorporated SeisTutor against the intelligence absence, as demonstrated.

  • Futuristic Opportunities and Challenges for Cognitive Tutoring Systems
    Ninni Singh, Vinit Kumar Gunjan, and Mousmi Ajay Chaurasia

    IEEE
    Across a systematic review of literature, ITS have shown a great potential emerging as systems offering learning to the learner, in a manner that best suits the learner. But the growth rate is affected by specific challenges that are proving to be limiting factors. There are reasonable number of possible mechanisms unexplored as of now, that can be implemented listing opportunities for future directions of research in this field. This paper emphasizes on these limiting factors, opportunities, and describes the existing intelligent feature incorporated in the Intelligent Tutoring System.

  • Security in IoT Mesh Networks based on Trust Similarity
    Athota Kavitha, Vijender Busi Reddy, Ninni Singh, Vinit Kumar Gunjan, Kuruva Lakshmanna, Arfat Ahmad Khan, and Chitapong Wechtaisong

    Institute of Electrical and Electronics Engineers (IEEE)

  • Rating-Based Recommender System Based on Textual Reviews Using IoT Smart Devices
    Muqeem Ahmed, Mohd Dilshad Ansari, Ninni Singh, Vinit Kumar Gunjan, Santhosh Krishna B. V., and Mudassir Khan

    Hindawi Limited
    Recommender system (RS) is a unique type of information clarification system that anticipates the user's evaluation of items from a large pool based on the expectations of a single stakeholder. The proposed system is highly useful for getting expected meaning suggestions and guidance for choosing the proper product using artificial intelligence and IoT (Internet of Things) such as chatbot. The current proposed technique makes it easier for stakeholders to make context-based decisions that are optimal rather than reactive, such as which product to buy, news classification based on high filtering views, highly recommended wanted music to choose, and desired product to choose. Recommendation systems are a critical tool for obtaining verified information and making accurate decisions. As a result, operational efficiency would skyrocket, and the risk to the company that uses a recommender system would plummet. This proposed solution can be used in a variety of applications such as commercial hotels OYO and other hotels, hospitals (GYAN), public administrative applications banks HDFC, and ICICI to address potential questions on the spot using intelligence computing as a recommendation system. The existing RS is considering a few factors such as buying records, classification or clustering items, and user's geographic location. Collaborative filtering algorithms (CFAs) are much more common approaches for cooperating to mesh the respective documents they retrieved from the historical data. CFAs are distinguished in plenty of features that are uncommon from other algorithms. In this existing system classification, precision and efficiency and error rate are statistical measurements that need to be enhanced according to the current need to fit for global requirements. The proposed work deals with enhancing accuracy levels of text reviews with the recommender system while interacting by the numerous users for their domains. The authors implemented the recommender system using a user-based CF method and presented the significance of collaborative filtering on the movie domain with a recommender system. This whole experiment has been implanted using the RapidMiner Java-based tool. Results have been compared with existing algorithms to differentiate the efficiency of the current proposed approach.

  • Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images
    Puja Sahay Prasad, G N Beena Bethel, Ninni Singh, Vinit Kumar Gunjan, Samar Basir, and Shahajan Miah

    Hindawi Limited
    Medical image analysis technology based on deep learning has played an important role in computer-aided disease diagnosis and treatment. Classification accuracy has always been the primary goal pursued by researchers. However, the image transmission process also faces the problems of limited wireless ad-hoc network (WAN) bandwidth and increased security risks. Moreover, when user data are exposed to unauthorized users, platforms can easily leak personal privacy. Aiming at the abovementioned problems, a system model and an access control scheme for the collaborative analysis of the diagnosis of diabetic retinopathy (DR) are constructed in this paper. The system model includes two stages of data cleaning and lesion classification. In the data cleaning phase, the private cloud writes the model obtained after training into the blockchain, and other private clouds use the best-performing model on the chain to identify the image quality when cleaning data and pass the high-quality image to the lesion classification model for use. In the lesion classification stage, each private cloud trains the classification model separately; uploads its own model parameters to the public cloud for aggregation to obtain a global model; and then sends the global model to each private cloud to achieve collaborative learning, reduce the amount of data transmission, and protect personal privacy. Access control schemes include improved role-based access control (RAC) used within the private cloud and blockchain-based access control used during the interaction between the private cloud and the public cloud program (BAC). RAC grants both functional rights and data access rights to roles and takes into account object attributes for fine-grained level control. Based on certificateless public-key encryption technology and blockchain technology, BAC can realize the identity authentication and authority identification of the private cloud while requesting the transmission of model parameters from the private cloud to the public cloud and protect the security of the identity, authority, and model parameters of the private cloud to achieve the effect of lightweight access control. In the experimental part, two retinal datasets are used for DR classification analysis. The results show that data cleaning can effectively remove low-quality images and improve the accuracy of early lesion classification for doctors, with an accuracy rate of 90.2%.

  • Deep Learning and Transfer Learning for Malaria Detection
    Tayyaba Jameela, Kavitha Athotha, Ninni Singh, Vinit Kumar Gunjan, and Sayan Kahali

    Hindawi Limited
    Infectious disease malaria is a devastating infectious disease that claims the lives of more than 500,000 people worldwide every year. Most of these deaths occur as a result of a delayed or incorrect diagnosis. At the moment, the manual microscope is considered to be the most effective equipment for diagnosing malaria. It is, on the other hand, time-consuming and prone to human error. Because it is such a serious global health issue, it is important that the evaluation process be automated. The objective of this article is to advocate for the automation of the diagnosis process in order to eliminate the need for human intervention in the process. Convolutional neural networks (CNNs) and other deep-learning technologies, such as image processing, are being utilized to evaluate parasitemia in microscopic blood slides in order to enhance diagnostic accuracy. The approach is based on the intensity characteristics of Plasmodium parasites and erythrocytes, which are both known to be variable. Images of infected and noninfected erythrocytes are gathered and fed into the CNN models ResNet50, ResNet34, VGG-16, and VGG-19, which are all trained on the same dataset. The techniques of transfer learning and fine-tuning are employed, and the outcomes are contrasted. The VGG-19 model obtained the best overall performance given the parameters and dataset that were evaluated.

  • Dynamic Wavelength Scheduling by Multiobjectives in OBS Networks
    V. Kishen Ajay Kumar, M. Rudra Kumar, N. Shribala, Ninni Singh, Vinit Kumar Gunjan, Kazy Noor-e-alam Siddiquee, and Muhammad Arif

    Hindawi Limited
    The burst dropping ratio is witnessed in the contemporary literature as a considerable constraint of optical burst switching (OBS) networks that attained many researchers’ efforts in the recent past. Among the multiple practices endeavoring to reduce the burst drop ratio, the optimal burst scheduling is one dimension in this regard. The transmission channel scheduling and appropriate wavelength allocation are critical objectives to achieve optimal burst scheduling in regard to minimal burst drop ratio. Many of the scheduling models depicted in the contemporary literature aimed to achieve the optimum scheduling by electing the channels, which depend on optimum utilization of idle time. Some of the studies tried to select channels by any metrics of quality, and significantly minimal amount of studies focused on wavelength allocation for lowering BDR. Moreover, in regard to this, this study tried to achieve optimum wavelength allocation beneath manifold objective QoS metrics, which is identified as “multiobjective dynamic wavelength scheduling (DyWaS).” The experimental study carried through the simulations evinced that the proposed model DyWaS escalated the optimality of burst scheduling through wavelength allocation compared with other existing methods represented in the contemporary literature.

  • An Effective Bootstrapping Framework for Web Services Discovery Using Trigram Approach
    G. Senthil Kumar, Kadiyala Ramana, Rasineni Madana Mohana, Rajanikanth Aluvalu, Vinit Kumar Gunjan, and Ninni Singh

    Hindawi Limited
    Web services are progressively being used to comprehend service-oriented architectures. Web services facilitate the integration of applications and simplify interoperability. Additionally, it assists in wrapping accessible applications in order for developers to access them using standard languages and protocols. The user faces a difficult challenge in selecting the appropriate service in accordance with the user request as the behavior of the participating service affects the overall performance in discovery, selection, and composition. As a result, it is critical to select a high-quality service provider for these activities. Existing approaches rely on nonfunctional qualities for discovery and selection, but the user cannot always rely on these features, and these QoS values cannot be used to determine the user’s or quality perspective. Additionally, the user indicates an interest in a high-quality service based on quality attributes or service with a good reputation throughout the selection process rather than a newly registered service. As a result, a proper bootstrapping mechanism is required to evaluate newly registered services prior to their use by service requestors. This paper proposes a novel bootstrapping mechanism. The contribution of this paper involves (a) a method for evaluating the quality of service (QoS) by focusing on performance-related indicators such as response time, execution time, throughput, latency, and dependability; (b) a methodology for evaluating the QoE attributes based on user reviews that take into account both attributes and opinions; (c) bootstrap the newly registered service based on quality of service and quality of experience; and (d) building a recommender system that suggests the top-rated service for composition. The evaluation results are used to augment currently available online services by providing up-to-date quality of service and quality of experience attributes for discovery, selection, and composition.

  • Cooperative Scheme ToA-RSSI and Variable Anchor Positions for Sensors Localization in 2D Environments
    Monji Zaidi, Imen Bouazzi, Mohammed Usman, Mohammed Zubair Mohammed Shamim, Ninni Singh, and Vinit Kumar Gunjan

    Hindawi Limited
    To rich good accuracy in the 2D area for wireless sensor network (WSN) nodes, a localization method has to be selected. The objective of this paper is first to select which localization technique is required (Received Signal Strength Indicator (RSSI)) or (Time of Arrival (ToA)) against anchors placement in a 2D area. Depending on whether the anchor nodes are spaced or not and inspired by the idea of using the RSSI method for small distances and the ToA method for greater distances, we will show which method should be used for the positioning process which mainly guarantees a minimal localization error. Second, a two-dimensional localization scheme for WSN which is called Combined Advantages of ToA-RSSI (CA ToA-RSSI), hereafter, ranging methods, is designed in this work, to make the accuracy better during the positioning process. Results provided through MATLAB simulations show that our new technique improves considerably the positioning accuracy compared with the traditional RSSI and ToA ranging method. The proposed scheme can be run under Line of Sight and (LOS) and Nonline of Sight (NLOS) conditions taking into account a difference in the measurement error.

  • Development of Algorithms for an IoT-Based Smart Agriculture Monitoring System
    Kazy Noor-e-Alam Siddiquee, Md. Shabiul Islam, Ninni Singh, Vinit Kumar Gunjan, Wong Hin Yong, Mohammad Nurul Huda, and D. S. Bhupal Naik

    Hindawi Limited
    Sensor-based agriculture monitoring systems have limited outcomes on the detection or counting of vegetables from agriculture fields due to the utilization of either conventional color transformations or machine learning-based methods. To overcome these limitations, this research is aimed at proposing an IoT-based smart agriculture monitoring system with multiple algorithms such as detection, quantification, ripeness checking, and detection of infected vegetables. This paper presents smart agriculture monitoring systems for Internet of Things (IoT) applications. The CHT has been applied to detect and quantify vegetables from the agriculture field. Using color thresholding and color segmentation techniques, defected vegetables have also been detected. A machine learning method-convolutional neural network (CNN) has been used for the development and implementation of all algorithms. A comparison between traditional methods and CNN has been simulated in MATLAB to find out the optimal method for its implementation in this agricultural monitoring system. Compared to the traditional methods, the CNN is the optimal method in this research work which performed better over the previously developed algorithms with an accuracy of more than 90%. As an example (case study), a tomato field in Chittagong, Bangladesh, was chosen where a camera-mounted mobile robot captured images from the agriculture field for which the proposed IoT-based smart monitoring system was developed. This system will benefit farmers through the digitally monitored output at an agriculture field in Bangladesh as well as in Malaysia. Since this proposed smart IoT-based system is still driven by bulky, costly, and limited powered sensors, in a future work, for the required power of sensors, this research work is aimed at the design and development of an energy harvester (hybrid) (HEH) based on ultralow power electronics circuits to generate the required power of sensors. Implementation of multiple algorithms using CNN, circular Hough transformation (CHT), color thresholding, and color segmentation methods for the detection, quantification, ripeness checking, and detection of infected crops.

  • Future Trends for Healthcare Monitoring System in Smart Cities Using LoRaWAN-Based WBAN
    Imen Bouazzi, Monji Zaidi, Mohammed Usman, Mohammed Zubair Mohammed Shamim, Vinit Kumar Gunjan, and Ninni Singh

    Hindawi Limited
    LoRa technology is extensively utilized in the Internet of Things world. It allows a transmission of a low volume of data through small wireless devices. The principle of LoRa networks is to transmit data over the air from sensors with low transmission range, for about tens of kilometers. Those sensors are not expected to be powered by electricity, and they are powered by batteries. We understand that visits to hospitals cannot be eliminated and that visits for full examinations were necessary, but technological progress nowadays could reduce the burden on hospitals thanks to remote controls and treatments in homes using those wireless sensors. So, the use of LoRaWAN protocol could greatly make diagnostic of patients more easily by transmitting data between doctors and patients in a real time manner. The aim of this work is to evaluate the performance of a network that contains numerous mobile sensors. Those sensors connect the doctors, nurse, and patient through a reliable and secure wireless network. Here, we want to evaluate various factors of LoRaWAN protocol that have a big effect on power consumption and data transmission delay.. Moreover, our LoRa-based networking implementation, based on software simulations, appears to be an option that allows for a robust, reliable, and lower overall cost IoT deployment and low bandwidth requirements. With LoRa, we can achieve similar or better link quality to IEEE 802.15.4, with higher data rate and lower costs.

  • Perimeter Degree Technique for the Reduction of Routing Congestion during Placement in Physical Design of VLSI Circuits
    Kuruva Lakshmanna, Fahimuddin Shaik, Vinit Kumar Gunjan, Ninni Singh, Gautam Kumar, and R. Mahammad Shafi

    Hindawi Limited
    When used in conjunction with the current floorplan and the optimization technique in circuit design engineering, this research allows for the evaluation of design parameters that can be used to reduce congestion during integrated circuit fabrication. Testing the multiple alternative consequences of IC design will be extremely beneficial in this situation, as will be demonstrated further below. If the importance of placement and routing congestion concerns is underappreciated, the IC implementation may experience significant nonlinear problems throughout the process as a result of the underappreciation of placement and routing congestion concerns. The use of standard optimization techniques in integrated circuit design is not the most effective strategy when it comes to precisely estimating nonlinear aspects in the design of integrated circuits. To this end, advanced tools such as Xilinx VIVADO and the ICC2 have been developed, in addition to the ICC1 and VIRTUOSO, to explore for computations and recover the actual parameters that are required to design optimal placement and routing for well-organized and ordered physical design. Furthermore, this work employs the perimeter degree technique (PDT) to measure routing congestion in both horizontal and vertical directions for a silicon chip region and then applies the technique to lower the density of superfluous routing (DSR) (PDT). Recently, a metaheuristic approach to computation has increased in favor, particularly in the last two decades. It is a classic graph theory problem, and it is also a common topic in the field of optimization. However, it does not provide correct information about where and how nodes should be put, despite its popularity. Consequently, in conjunction with the optimized floorplan data, the optimized model created by the Improved Harmonic Search Optimization algorithm undergoes testing and investigation in order to estimate the amount of congestion that occurs during the routing process in VLSI circuit design and to minimize the amount of congestion that occurs.

  • Multipath Transmission Control Protocol for Live Virtual Machine Migration in the Cloud Environment
    Kadiyala Ramana, Rajanikanth Aluvalu, Vinit Kumar Gunjan, Ninni Singh, and M. Nageswara Prasadhu

    Hindawi Limited
    For mobile cloud computing (MCC), a local virtual machine- (VM-) based cloudlet is proposed to improve the performance of real-time resource-intensive mobile applications. When a mobile device (MD) discovers a cloudlet nearby, it takes some time to build up a virtual machine (VM) inside the cloudlet before data offloading from the MD to the VM can begin. Live virtual machine migration refers to the process of transferring a running Virtual Machine (VM) from one host to another without interrupting its state. Theoretically, live migration process must not render the instance being migrated unavailable during its execution. However, in practice, there is always a service downtime associated with the process. This paper focuses on addressing the need to reduce the service downtime in case of live VM migration in cloud and providing a solution by implementing and optimizing the multipath transmission control protocol (MPTCP) ability within an Infrastructure as a service (IaaS) cloud to increase the efficiency of live migration. We have also introduced an algorithm, the α-best fit algorithm, to optimize the usage of bandwidth and to effectively streamline the MPTCP performance.

  • Performance Evaluation of Seis Tutor Using Cognitive Intelligence-Based "kirkpatrick Model"
    Ninni Singh, Vinit Kumar Gunjan, Ramana Kadiyala, Qin Xin, and Thippa Reddy Gadekallu

    Hindawi Limited
    The classroom learning environment facilitates human tutors to interact with every learner and get the opportunity to understand the learner’s psychology and then provide learning material (access learner prior knowledge and well align the learning material as per learner requirement) to them accordingly. Implementing this cognitive intelligence in intelligent tutoring system is quite tricky. This research has focused on mimicking human tutor cognitive intelligence in the computer-aided system of offering an exclusive curriculum to the learners. The prime focus of this research article is to evaluate the proposed SeisTutor using Kirkpatrick’s four-phase evaluation model. Experimental results depicting the enhanced learning gain through intelligence incorporated SeisTutor as against the intelligence absence are demonstrated.

  • A Parametrized Comparative Analysis of Performance Between Proposed Adaptive and Personalized Tutoring System 'Seis Tutor' With Existing Online Tutoring System
    Ninni Singh, Vinit Kumar Gunjan, and Moustafa M. Nasralla

    Institute of Electrical and Electronics Engineers (IEEE)
    Face-to-face tutoring offers a learning environment that best suits the learner’s preferences (learning styles) and grasping levels (learning levels). This cognitive intelligence has been blended in our proposed intelligent tutoring system christened as “Seis Tutor”. In this paper, we have detailed the architecture of Seis Tutor system and compared it with other existing traditional tutoring systems. Further, the performance of Seis Tutor has been evaluated in terms of personalization and adaptation through a comparison with some existing tutoring systems, i.e., My Moodle, Course-Builder, and Teachable.

  • Comparison of various dos algorithm
    Mainul Hasan, Amogh Venkatanarayan, Inder Mohan, Ninni Singh, and Gunjan Chhabra

    IGI Global
    Denial of service attack is one of the most devastating and ruinous attacks on the internet. The attack can be performed by flooding the victim's machine with any kind of packets. Throughout all these years many methods have been proposed to reduce the impact, but with machines of higher capabilities coming in, the attack has also become more potent, and these proposals are either less effective or less efficient. A DoS attack exhausts the victim's resources affecting the availability of the resource. This paper will be comparing a few methods that have been proposed and published in various papers along with a newly proposed method. The comparison of the methods is done on a number of parameters including resource utilization, reaction time, worst case scenarios, etc. This paper also checks the viability of these methods over various layers of the network. Concluding with the best aspects of all the papers and the best among these for the current real conditions.

  • Bug model based intelligent recommender system with exclusive curriculum sequencing for learner-centric tutoring
    Ninni Singh and Neelu Jyothi Ahuja

    IGI Global
    Face to face human tutoring in classroom environments amply facilitates human tutor-learner interactions wherein the tutor gets opportunity to exercise his cognitive intelligence to understand learner's pre-knowledge level, learning pattern, specific learning difficulties, and be able to offer course content well-aligned to the learner's requirements and tutor in a manner that best suits the learner. Reaching this level in an intelligent tutoring system is a challenge even today given the advanced developments in the field. This article focuses on ITS, mimicking a human tutor in terms of providing a curriculum sequence exclusive for the learner. Unsuitable courseware disorients the learner and thus degrades the overall performance. A bug model approach has been used for curriculum design and its re-alignment as per requirements and is demonstrated through a prototype tutoring recommender system, SeisTutor, developed for this purpose. The experimental results indicate an enhanced learning gain through a curriculum recommender approach of SeisTutor as opposed to its absence.

  • Empirical analysis of explicating the tacit knowledge background, challenges and experimental findings
    Blue Eyes Intelligence Engineering and Sciences Engineering and Sciences Publication - BEIESP
    Tacit knowledge is undocumented knowledge, gained by an individual by virtue of his/her experience on an activity. It rests with the individual, is hard to discover, express and articulate. It is a valuable body of knowledge, hence is essential to solicit, gather and explicate, so as to facilitate its percolation to the younger generation. In this paper, characteristics of tacit knowledge, the issues and mechanisms of explicating have been presented. Seismic data interpretation, as a tacit knowledge domain has been identified, issues faced in its explication and process followed in development of explicit knowledge capsule is detailed. In order to infer the tacit knowledge sharing behavior of an individual a large approximate 5000 survey responses from participant base of individuals from IT firms, Educational Institutions, Government Organizations, Research Organization and Students Community were obtained. The validity and reliability of the measure were verified. Exploratory factor analysis and confirmatory factor analysis was conducted on received valid responses. Based on the analysis, the concrete inference was deliberated.

RECENT SCHOLAR PUBLICATIONS

  • Sentiment Analysis Unleashed: Leveraging VADER for Evaluation of Public Opinion
    S Arora, A Malhotra, A Kumar, N Singh
    2024 11th International Conference on Reliability, Infocom Technologies and 2024

  • Detection of Cardio Vascular abnormalities using gradient descent optimization and CNN
    N Singh, VK Gunjan, F Shaik, S Roy
    Health and Technology 14 (1), 155-168 2024

  • Futuristic Opportunities and Challenges for Cognitive Tutoring Systems
    N Singh, VK Gunjan, MA Chaurasia
    2022 5th International Conference on Computational Intelligence and Networks 2022

  • Multi-Controller Model for Improving the Performance of IoT Networks
    G Davanam, S Kallam, N Singh, VK Gunjan, S Roy, J Rahebi, ...
    Energies 15 (22), 8738 2022

  • Security in IoT Mesh Networks based on Trust Similarity
    A Kavitha, VB Reddy, N Singh, VK Gunjan, K Lakshmanna, AA Khan, ...
    IEEE Access 10, 121712-121724 2022

  • Detection of lung cancer in CT scans using grey wolf optimization algorithm and recurrent neural network
    VK Gunjan, N Singh, F Shaik, S Roy
    Health and Technology 12 (6), 1197-1210 2022

  • Analysis of Performance Metrics
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 139-172 2022

  • Building SeisTutor Intelligent Tutoring System for Experimental Learning Domain
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 61-78 2022

  • Pedagogy Modeling
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 51-60 2022

  • Performance Metrics: Intelligent Tutoring System
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 117-137 2022

  • Pedagogy Modeling for Building SeisTutor Intelligent Tutoring System
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 79-101 2022

  • Domain Modeling
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 31-50 2022

  • Execution of Developed Intelligent Tutoring System
    N Singh, VK Gunjan, JM Zurada
    Cognitive Tutor: Custom-Tailored Pedagogical Approach, 103-116 2022

  • Cognitive Tutor: Custom-Tailored Pedagogical Approach
    N Singh, VK Gunjan, JM Zurada
    Springer Nature 2022

  • IoT enabled HELMET to safeguard the health of mine workers
    N Singh, VK Gunjan, G Chaudhary, R Kaluri, N Victor, K Lakshmanna
    Computer Communications 193, 1-9 2022

  • Rating-Based Recommender System Based on Textual Reviews Using IoT Smart Devices
    M Ahmed, MD Ansari, N Singh, VK Gunjan, SK BV, M Khan
    Mobile Information Systems 2022 2022

  • An effective bootstrapping framework for web services discovery using trigram approach
    G Senthil Kumar, K Ramana, R Madana Mohana, R Aluvalu, VK Gunjan, ...
    Mobile Information Systems 2022, 1-12 2022

  • Blockchain-Based Privacy Access Control Mechanism and Collaborative Analysis for Medical Images
    SM Puja Sahay Prasad , G N Beena Bethel , Ninni Singh , Vinit Kumar Gunjan ...
    Security and Communication Networks 2 2022, 1-7 2022

  • Deep Learning and Transfer Learning for Malaria Detection
    SK Tayyaba Jameela, Kavitha Athotha,Ninni Singh ,Vinit Kumar Gunjan
    Computational Intelligence and Neuroscience 2022, 1-14 2022

  • Cooperative Scheme ToA-RSSI and Variable Anchor Positions for Sensors Localization in 2D Environments
    M Zaidi, I Bouazzi, M Usman, MZ Mohammed Shamim, N Singh, ...
    Complexity 2022 2022

MOST CITED SCHOLAR PUBLICATIONS

  • IoT enabled HELMET to safeguard the health of mine workers
    N Singh, VK Gunjan, G Chaudhary, R Kaluri, N Victor, K Lakshmanna
    Computer Communications 193, 1-9 2022
    Citations: 76

  • Learning styles based adaptive intelligent tutoring systems: Document analysis of articles published between 2001. and 2016.
    A Kumar, N Singh, NJ Ahuja
    International Journal of Cognitive Research in Science, Engineering and 2017
    Citations: 67

  • Perimeter degree technique for the reduction of routing congestion during placement in physical design of VLSI circuits
    K Lakshmanna, F Shaik, VK Gunjan, N Singh, G Kumar, RM Shafi
    Complexity 2022, 1-11 2022
    Citations: 54

  • Development of Algorithms for an IoT-Based Smart Agriculture Monitoring System
    KNEA Siddiquee, MS Islam, N Singh, VK Gunjan, WH Yong, MN Huda, ...
    Wireless Communications and Mobile Computing 2022, 1-16 2022
    Citations: 53

  • A parametrized comparative analysis of performance between proposed adaptive and personalized tutoring system “seis tutor” with existing online tutoring system
    N Singh, VK Gunjan, MM Nasralla
    IEEE Access 10, 39376-39386 2022
    Citations: 46

  • Detection of lung cancer in CT scans using grey wolf optimization algorithm and recurrent neural network
    VK Gunjan, N Singh, F Shaik, S Roy
    Health and Technology 12 (6), 1197-1210 2022
    Citations: 45

  • Rating-Based Recommender System Based on Textual Reviews Using IoT Smart Devices
    M Ahmed, MD Ansari, N Singh, VK Gunjan, SK BV, M Khan
    Mobile Information Systems 2022 2022
    Citations: 44

  • Information and decision sciences
    SC Satapathy, J Tavares, V Bhateja, JR Mohanty
    Proceedings of the 6th International Conference on FICTA 2017
    Citations: 42

  • Deep Learning and Transfer Learning for Malaria Detection
    SK Tayyaba Jameela, Kavitha Athotha,Ninni Singh ,Vinit Kumar Gunjan
    Computational Intelligence and Neuroscience 2022, 1-14 2022
    Citations: 41

  • A Novel Architecture for Learner-Centric Curriculum Sequencing in Adaptive Intelligent Tutoring System
    N Singh, NJ Ahuja, A Kumar
    Journal of Cases on Information Technology (JCIT) 20 (3), 1-20 2018
    Citations: 39

  • Bug Model Based Intelligent Recommender System with Exclusive Curriculum Sequencing for Learner-Centric Tutoring
    N Singh, NJ Ahuja
    International Journal of Web-Based Learning and Teaching Technologies 2019
    Citations: 38

  • Implementation and evaluation of personalized intelligent tutoring system
    N Singh, A Kumar, NJ Ahuja
    Int. J. Innov. Technol. Explor. Eng.(IJITEE) 8, 46-55 2019
    Citations: 36

  • Empirical analysis of explicating the tacit knowledge background, challenges and experimental findings
    N Singh, NJ Ahuja
    International Journal of Innovative Technology and Exploring Engineering 8 2019
    Citations: 35

  • Image data-deduplication using the block truncation coding technique
    AJ Zargar, N Singh, G Rathee, AK Singh
    2015 International Conference on Futuristic Trends on Computational Analysis 2015
    Citations: 35

  • Master-slave group based model for co-ordinator selection, an improvement of bully algorithm
    B Mishra, N Singh, R Singh
    2014 International Conference on Parallel, Distributed and Grid Computing 2014
    Citations: 35

  • Modern Approaches in Machine Learning & Cognitive Science: A Walkthrough
    VK Gunjan, JM Zurada, N Singh
    Springer 2022
    Citations: 32

  • SeisTutor: A Custom-Tailored Intelligent Tutoring System and Sustainable Education
    N Singh, VK Gunjan, AK Mishra, RK Mishra, N Nawaz
    Sustainability 14 (7), 4167 2022
    Citations: 32

  • Missing value imputation with unsupervised kohonen self organizing map
    N Singh, A Javeed, S Chhabra, P Kumar
    Emerging Research in Computing, Information, Communication and Applications 2015
    Citations: 31

  • Security in IoT Mesh Networks based on Trust Similarity
    A Kavitha, VB Reddy, N Singh, VK Gunjan, K Lakshmanna, AA Khan, ...
    IEEE Access 10, 121712-121724 2022
    Citations: 27

  • Future Trends for Healthcare Monitoring System in Smart Cities Using LoRaWAN-Based WBAN
    I Bouazzi, M Zaidi, M Usman, MZM Shamim, VK Gunjan, N Singh
    Mobile Information Systems 2022 2022
    Citations: 27