Nidhi lal

@iiitn.ac.in

Assistant Professor
IIIT nagpur



              

https://researchid.co/nidhi.2592

RESEARCH INTERESTS

Machine learning

25

Scopus Publications

437

Scholar Citations

13

Scholar h-index

14

Scholar i10-index

Scopus Publications

  • An emergency event detection approach in real-time for efficient vehicle safety in Smart City
    Nidhi Lal and Shishupal Kumar

    Springer Science and Business Media LLC

  • A Deep Learning Approach for Anomalous User-Intrusion Detection in Social Media Network System
    Nidhi Lal, Shishupal Kumar, and Garima Kaidan

    Springer International Publishing

  • Automatic Speaker Recognition using Transfer Learning Approach of Deep Learning Models
    Sonal Ganvir and Nidhi Lal

    IEEE
    Speaker Recognition has been one of the most interesting yet challenging problems in the field of machine learning and artificial intelligence. It is used in the areas of human voice authentication for security purpose and identifying a person from a group of speakers. It has been a arduous task to teach a machine the differences in human voices, especially when people belong to different background like gender, language, accent, etc. This paper has used the deep learning approach to build and train two models, Artificial Neural Network (“ANN”) and Convolutional Neural Network (“CNN”), and compared their results. In former, the neural networks are fed on diverse extracted features from audio collection, whereas the latter is trained on spectrograms. Finally, transfer learning approach is deployed on both to get a viable output using limited data.

  • A Road Monitoring Approach with Real-Time Capturing of Events for Efficient Vehicles Safety in Smart City
    Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya

    Springer Science and Business Media LLC
    Nowadays, Internet-of-things (IoT) provides various services to the users by equipped with the smart devices. In this regard, the next generation of vehicles collaborates with the features of IoT to provide the safety and security on the roads. To achieve this, it equipped with short-range communication advances and establishes Vehicle-to-Vehicle (V2V) connectivity. The standardized V2V connectivity and communication are termed as IEEE 802.11p. Later, an alternative named as (LTE-V2V) has been introduced. However, both the technologies are only concerned with the continuous broadcast of information and cooperative awareness. It only takes information from one vehicle in the format of text message and sends to another. In this regard, an efficient and satisfactory safety is not provided by these technologies for analysis of real-time road traffic monitoring. A clear observation of road conditions and awareness of event triggering is a necessary task rather than broadcasting of information provided by the vehicles. Therefore in this paper, we proposed a solution by providing the real-time information about road conditions and traffic scenarios to the users. We utilized the capturing images of road conditions by the positioned cameras and Global Positioning System in order to extract the information regarding vehicle and camera position. The proposed work provides a better security rather than message passing system in V2V communication. The users in our anticipated scenarios can extract and see a clear view of road conditions by use of captured videos/images. We offered an approach named as Smart Road Monitoring for IoT based smart cities to provide an effective solution for the real-time analysis of traffic road conditions. The proposed approach gives a clear view of conditions of the road to the users such that they can make a decision according to their suitability Our proposed solution well copes with the moderate traffic conditions and provides high satisfaction score. The performance analysis is done in a comparison of V2V and LTE-V2V in terms of various metrics. The simulation results show that our proposed work can achieve high performance in the provision of providing safety compared to other scheme introduced in this field.

  • Crime Prediction Using K-Nearest Neighboring Algorithm
    Akash Kumar, Aniket Verma, Gandhali Shinde, Yash Sukhdeve, and Nidhi Lal

    IEEE
    For a developing country like India, it is not new that people hear of crimes happening quite often. With the rapid urbanization of cities, we have to constantly be aware of our surroundings. In order to avoid the unfortunate, we will try to observe crime rates by the KNN prediction method. It will predict, tentatively, the type of crime, when, where and at what time it may take place. This data will give the behaviors in crime over an area which might be helpful for criminal investigations. It will also provide us with the most committed crime in a particular region. In this paper, we will use the k-nearest neighbor algorithm of machine learning.

  • Estimation of prediction for getting heart disease using logistic regression model of machine learning
    Montu Saw, Tarun Saxena, Sanjana Kaithwas, Rahul Yadav, and Nidhi Lal

    IEEE
    In the current era deaths due to heart disease have become a major issue. Approximately one person dies per minute due to heart disease. Data is generated and has to be stored daily because of fast growth in Information Technology. The data which is collected is converted into knowledge by data analysis by using various combinations of algorithms. Healthcare professionals working in the area of cardiac disease have their own limits and can not forecast the probability of high accuracy in cardiac disease .This paper aims to improve Heart Disease predict accuracy using the Logistic Regression model of machine learning considering the health care dataset which classifies the patients whether they are having heart diseases or not according to the information in the record.

  • An accurate prediction of MPG (Miles per Gallon) using linear regression model of machine learning
    Varun Shirbhayye, Deepesh Kurmi, Siddharth Dyavanapalli, Agraharam Sai Hari Prasad, and Nidhi Lal

    IEEE
    Considering the growth of the automobile industry coming across since the past two centuries, we are witnessing theincreasing fuel prices and customers being more particularabout the features, the automobile makers are constantlyoptimising their processes to increase fuel efficiency. But what if you could have a reliable estimator for a car’s MPG given some known specifications about the vehicle? Then, you could beat a competitor in the market by both having a more desirable vehicle that is also more efficient, improve the fuel economy and bring more demand and supply to the consumers. We are implementing Machine Learning to design the prediction models and minimise the RMSE(Root Mean Square Error) value in between 1 and 2 of the automobiles made (in MPG) in the past years.

  • A Network-Coded Caching-Based Multicasting Scheme for Information-Centric Networking (ICN)
    Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya

    Springer Science and Business Media LLC
    Information-centric networking (ICN) is gradually becoming an alternative approach to the conventional Internet architecture through the distribution of enlightening information (named as content) on the Internet. Given the growing Internet traffic, the adapted information-centric architecture is expected to more favourably serve the user’s need of accessing data. In this paper, we proposed a novel framework for cache management in ICN that jointly considers the caching strategy and network coding. For the proposed cache management framework, we first evaluated a new Centrality-measures to assess the variation in the behaviour of each node in the network and to identify such behaviour. Subsequently, we developed an efficient random network coding-based cache management algorithm to obtain a support for caching and multicasting in the ICN paradigm. Extensive simulations were made, and related results showed that our proposed scheme has better performance in terms of cache hit ratio, average download time, server hit reduction ratio, and traffic overhead compared with other schemes in our simulated scenarios.

  • An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks
    Nidhi Lal and Shishupal Kumar

    Informa UK Limited
    ABSTRACT To provide broadband access services to customers, which resides residential and enterprise field, Worldwide Interoperability for Microwave Access (WiMAX) is one of the famous wireless technologies. WiMAX can provide high-speed data rate with large-scale coverage such that it contains a high transmission range as well as it supports high mobility with a large number of nodes. It requires scheduling algorithm in the MAC layer of its protocol stack because the number of users that want service is high in number. One of the most used scheduling algorithms is the Earliest Deadline First (EDF) but it contains certain performance limitations. As well as there is a need for security before allocation of bandwidth to the users because WiMAX is a wireless technology and may be vulnerable to lots of security attacks and if once the bandwidth is allocated to any malicious user, then the system of WiMAX communication will be under dangerous attacks. In this paper, we proposed a secure heuristic earliest deadline first uplink scheduler in the MAC layer of the WiMAX with some authorization procedures. The proposed scheme protects the allocation of bandwidth to any malicious node such that the system will be prevented from security attacks like Denial of Service (DoS), flooding attack, etc., as well as it will use heuristic approach for scheduling. Therefore, it can efficiently schedule user’s request and provide fairness to the WiMAX system and we called as Secure Heuristic EDF Uplink Scheduler (SH-EDF). The performance of SH-EDF uplink scheduler will be evaluated in the provisions of various performance metrics.

  • An adaptive neuro-fuzzy inference system-based caching scheme for content-centric networking
    Nidhi Lal, Shishupal Kumar, and Vijay Kumar Chaurasiya

    Springer Science and Business Media LLC
    Content-centric networking (CCN) is gradually becoming the alternative approach to the traditional Internet architecture through enlightening information (content) distribution on the Internet with content names. The growing rate of Internet traffic has adapted a content-centric architecture to better serve the user requirement of accessing a content. For enhancing content delivery, ubiquitous in-network caching is utilized to store a content in each and every router by the side of the content delivery path. From the study, it is evaluated that a better performance can be achieved when caching is done by a subset of CRs instead of all CRs in a content delivery path. Motivated by this, we proposed an adaptive neuro-fuzzy inference system-based caching (ANFIS-BC) scheme for CCN to improve the cache performance. The proposed ANFIS-BC scheme utilizes the feature of centrality-measures for selection of a router for caching in a network. Our results demonstrated that the ANFIS-BC scheme consistently achieves better caching gain across the multiple network topologies.


  • A popularity based content eviction scheme via betweenness-centrality caching approach for content-centric networking (CCN)
    Kumari Nidhi Lal and Anoj Kumar

    Springer Science and Business Media LLC
    In distinction to today’s IP-based, host-bound, Internet architecture, content-centric networking (CCN) emphasizes content by making it instantly addressable and routable. CCN has attracted attention in the research community as a means to cope with the increasing rate of Internet traffic. The host-to-host architecture is demonstrated to be inefficient in content distribution with a lot of bandwidth waste, and it is intricate to set up the network service because of the TCP/IPs location-dependence. CCN is a future Internet architecture which is directed to disentangle the above problems by location-independent content naming and world-wide content caching in a content router. An efficient caching is essential to reduce the delay and to enhance the performance of the network. In addition, a good cache replacement scheme is also necessary to decide which content should reside in the cache and which one should be evicted. The traditional caching replacement strategies schemes such as FIFO, LRU and MRU etc. are not updated as adaption of CCN from host-to-host Internet architecture. Before making replacement, a replacement strategy must performs the calculation of popularity of a content, local popularity of a content (intra-domain network), expected probability respective of demand for a content and instantaneous hit ratio. The traditional and existing popularity based cache replacement strategies do not consider mentioned key points. Therefore in this paper, we present a novel popularity based content eviction scheme for CCN with evaluation of local popularity of a content using the betweenness-centrality concept. The simulation results recommend that our proposed scheme can reliably accomplish the better performance across the other approaches proposed in this field.

  • Caching methodologies in Content centric networking (CCN): A survey
    Nidhi Lal, Shishupal Kumar, Garima Kadian, and Vijay Kumar Chaurasiya

    Elsevier BV

  • An efficient update strategy for content synchronization in Content-Centric Networking (CCN)


  • Performance analysis of software defined network with three controllers
    Shishupal Kumar, Nidhi Lal, and Vijay Kumar Chaurasiya

    Springer International Publishing
    Software-defined network is one of the best methodologies of computer network that countenances to an administrator to succeed the computer network amenities through the perception of subordinate side by side functionality. Software-defined network (SDN) is alienated into two fragments: one is Control plane and former is Data plane. In control plane are the actually deployed devices. This control plane is located at a fundamental controller. The controller is responsible for building the forwarding base and figuring out how a packet should be forwarded through a network. The SDN controller takes the information of packages and places it in a forwarding table or flow table of devices, the controller verifies the protocol made by the administrator and forward the packet to the router. In this paper, the performance analysis of SDN is done with the help of one, two and three controllers and will see how much the transfer time is affected with increasing number of controllers.

  • An Efficient Lookup Search and Forwarding Mechanism for Information-Centric Networking (ICN)
    Kumari Nidhi Lal and Anoj Kumar

    Springer Science and Business Media LLC
    Information-centric networking (ICN) is gradually becoming the alternative approach to the traditional Internet architecture through enlightening information (content) distribution on the Internet with content names. The growing rate of Internet traffic has adapted the content-centric architectures to better serve the user requirement of accessing data. Routing disseminates preliminary topology and strategy information as well as long-term changes in them and computes the routing table to coordinate the forwarding procedure. A good routing scheme is essential to reduce delay and to enhance the performance of the network with an efficient searching of the desired content item. In this paper, we present a novel scheme for ICN which evaluates the path for searching the desired content item with an efficient lookup process and we call as Intelligent Routing (IR). Our implement IR scheme utilizes the concept of ternary digital search for making an efficient lookup and evaluates the satisfaction score for making a forwarding decision. The simulation results recommend that IR scheme can reliably accomplish the better performance across other hashing and routing approaches proposed in this field.

  • A forwarding strategy based on ANFIS in internet-of-things-oriented wireless sensor network (WSN) using a novel fuzzy-based cluster head protocol
    Shishupal Kumar, Nidhi Lal, and Vijay Kumar Chaurasiya

    Springer Science and Business Media LLC
    To give the complete description of an environment or to take a robust decision, a number of observations are collected and combined from the multiple sensor nodes. The process of combining and analyzing the observations is called multisensor data fusion. The fusion is used to produce more consistent, accurate, and useful information than that provided by any individual sensor node. For efficiency, data fusion is performed on the sensed sample collected by sensor nodes. However, fusion on the network path parameters is also essential to select an appropriate forwarding route for sending the data. In addition, to increase the lifetime of a network, an efficient strategy is needed in order to select a cluster head node. Therefore, in this paper, we propose a multisensor data fusion (MDF) strategy which performs fusion on collected network parameters for the selection of an appropriate path with collaboration of Fuzzy-based cluster head selection (FBCHS). Jointly, we named the strategy as the MDF-FBCHS strategy for IoT-oriented WSN. Extensive simulations were made, and related results showed that our proposed scheme has better performance compared with other schemes in our simulated scenarios.

  • A Centrality-measures based Caching Scheme for Content-centric Networking (CCN)
    Kumari Nidhi Lal and Anoj Kumar

    Springer Science and Business Media LLC
    Content-centric networking (CCN) is gradually becoming an alternative approach to the conventional Internet architecture through the distribution of enlightening information (named as content) on the Internet. It is evaluated that the better performance can be achieved by caching is done on a subset of content routers instead of all the routers in the content delivery path. The subset of a content router must be selected in a manner such that maximum cache performance can be achieved. Motivated by this, we propose a Centrality-measures based algorithm (CMBA) for selection of an appropriate content router for caching of the contents. The Centrality-measures are based on the question: ”Who are the most important or central content router in the network for the caching of contents?”. We found that our novel CMBA could improve content cache performance along the content delivery path by using only a subset of available content routers. Our results recommend that our proposed work consistently achieves better caching gain across the multiple network topologies.

  • E-health application using network coding based caching for Information-centric networking (ICN)
    Kumari Nidhi Lal and Anoj Kumar

    IEEE
    Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework in overcoming generation network. This paper proposes Information-centric networking based framework over WBAN as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Information-centric network (ICN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. ICN router has the caching capability to cache the contents. In this way, users of ICN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol for ICN-WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and devices.


  • E-health application over 5G using Content-Centric networking (CCN)
    Kumari Nidhi Lal and Anoj Kumar

    IEEE
    Beginning with the recent availability of wireless medical sensor prototype and growing, the need for E-health care application record databases, we analyze the requirement of a unified communication framework over a fifth generation network. The introduction of the Internet of things (IoT) and latest developments or improvements in E-health, pointed towards the fifth generation (5G) paradigm of health care application and services. This paper proposes Content-Centric networking based framework over 5G as the primary enabler for E-health applications. If users of wireless body area network (WBAN) use IP network, they face many issues such as packet loss, security etc. So, Content-Centric network (CCN) is proposed to solve such problems with exploitation many advantages like efficient resource management, scalability, reduction of traffic and security. CCN router has the caching capability to cache the contents. In this way, users of CCN-based WBAN do not need to directly connect with the hospital server to access patient data. Further, we propose a protocol stack for 5G-CCN WBAN to provide a secure, efficient and reliable E-health application services to meet the required needs of the current IP protocol stack and IoT devices.


  • Detection of malicious node behaviour via I-Watchdog protocol in mobile Ad hoc network with DSDV routing scheme
    Nidhi Lal, Shishupal Kumar, Aditya Saxena, and Vijay Km. Chaurasiya

    Elsevier BV

  • Modified trial division algorithm using KNJ-factorization method to factorize RSA public key encryption
    Nidhi Lal, Anurag Prakash Singh, and Shishupal Kumar

    IEEE
    The security of RSA algorithm depends upon the positive integer N, which is the multiple of two precise large prime numbers. Factorization of such great numbers is a problematic process. There are many algorithms has been implemented in the past years. The offered KNJ-Factorization algorithm contributes a deterministic way to factorize RSA N=p*q. The algorithm limits the search by only considering the prime values. Subsequently prime numbers are odd numbers (apart from 2) accordingly it also requires smaller number steps to factorize RSA. In this paper, the anticipated algorithm is very simple besides it is very easy to understand and implement. The main concept of this KNJ-factorization algorithm is, to check only those factors which are odd and prime. The proposed KNJ-Factorization algorithm works very efficiently on those factors; which are adjoining and close to √N. The proposed factorization method can speed up if we can reduce the time for primality testing. It fundamentally decreases the time complexity.

  • Modified design of microstrip patch antenna for WiMAX communication system
    Kumari Nidhi Lal and Ashutosh Kumar Singh

    IEEE
    In this paper, a new design for U-shaped microstrip patch antenna is proposed, which can be used in WiMAX communication systems. The aim of this paper is to optimize the performance of microstrip patch antenna. Nowadays, WiMAX communication applications are widely using U-shaped microstrip patch antenna and it has become very popular. Our proposed antenna design uses 4-4.5 GHZ frequency band and it is working at narrowband within this band. RT/DUROID 5880 material is used for creating the substrate of the microstrip antenna. This modified design of the microstrip patch antenna gives high performance in terms of gain and return loss.

RECENT SCHOLAR PUBLICATIONS

  • Vision-based outlier detection techniques in automated surveillance: a survey and future ideas
    A Umale, N Lal, C Goel
    Multimedia Tools and Applications 83 (5), 14565-14607 2024

  • A lung sound recognition model to diagnoses the respiratory diseases by using transfer learning
    KN Lal
    Multimedia Tools and Applications 82 (23), 36615-36631 2023

  • A prediction approach of coronavirus disease 2019 cases in India using regression analysis modeling of machine learning
    S Kumar, KN Lal
    Computer Intelligence Against Pandemics: Tools and Methods to Face New 2023

  • A recent study based on prediction approach over Coronavirus disease-2019 cases in India using regression modeling of artificial intelligence
    S Kumar, KN Lal, A Singh
    Innovations in Healthcare Informatics: From Interoperability to Data 2023

  • A Deep Learning Approach for Anomalous User-Intrusion Detection in Social Media Network System
    N Lal, S Kumar, G Kaidan
    Deep Learning for Social Media Data Analytics, 255-275 2022

  • An emergency event detection approach in real-time for efficient vehicle safety in Smart City
    N Lal, S Kumar
    Multimedia Tools and Applications 81 (5), 6373-6388 2022

  • Automatic speaker recognition using transfer learning approach of deep learning models
    S Ganvir, N Lal
    2021 6th International Conference on Inventive Computation Technologies 2021

  • A Road Monitoring Approach with Real-Time Capturing of Events for Efficient Vehicles Safety in Smart City
    N Lal, S Kumar, VK Chaurasiya
    Wireless Personal Communications 114 (1), 657-674 2020

  • A Prediction Model of Detecting Liver Diseases in Patients using Logistic Regression of Machine Learning
    PSM Keerthana, N Phalinkar, R Mehere, K Bhanu Prakash Reddy, N Lal
    Proceedings of the International Conference on Innovative Computing 2020

  • A classification approach to identify the species of flower using KNN model of Machine Learning
    P Dongre, N Lal
    AIJR Preprints 2020

  • Crime prediction using K-nearest neighboring algorithm
    A Kumar, A Verma, G Shinde, Y Sukhdeve, N Lal
    2020 International Conference on Emerging Trends in Information Technology 2020

  • An accurate prediction of MPG (Miles per Gallon) using linear regression model of machine learning
    V Shirbhayye, D Kurmi, S Dyavanapalli, ASH Prasad, N Lal
    2020 International Conference on Computer Communication and Informatics 2020

  • Estimation of prediction for getting heart disease using logistic regression model of machine learning
    M Saw, T Saxena, S Kaithwas, R Yadav, N Lal
    2020 international conference on computer communication and informatics 2020

  • An Efficient Uplink Scheduler for WiMAX Communication System with Prevention from Security Attacks
    N Lal, S Kumar
    New Review of Information Networking 24 (2), 133-152 2019

  • An adaptive neuro-fuzzy inference system-based caching scheme for content-centric networking
    N Lal, S Kumar, VK Chaurasiya
    Soft Computing 23, 4459-4470 2019

  • An energy efficient IPv6 packet delivery scheme for industrial IoT over G. 9959 protocol based wireless sensor network (WSN)
    S Kumar, N Lal, VK Chaurasiya
    Computer Networks 154, 79-87 2019

  • A popularity based content eviction scheme via betweenness-centrality caching approach for content-centric networking (CCN)
    KN Lal, A Kumar
    Wireless Networks 25, 585-596 2019

  • Caching methodologies in Content centric networking (CCN): A survey
    N Lal, S Kumar, G Kadian, VK Chaurasiya
    Computer Science Review 31, 39-50 2019

  • Performance Analysis of Software Defined Network with Three Controllers
    S Kumar, N Lal, VK Chaurasiya
    Proceedings of the Future Technologies Conference (FTC) 2018: Volume 2, 718-732 2019

  • An efficient update strategy for content synchronization in Content-Centric Networking (CCN)
    N Lal, S Kumar, VK Chaurasiya
    IEEE China Communications 2019

MOST CITED SCHOLAR PUBLICATIONS

  • Estimation of prediction for getting heart disease using logistic regression model of machine learning
    M Saw, T Saxena, S Kaithwas, R Yadav, N Lal
    2020 international conference on computer communication and informatics 2020
    Citations: 61

  • Crime prediction using K-nearest neighboring algorithm
    A Kumar, A Verma, G Shinde, Y Sukhdeve, N Lal
    2020 International Conference on Emerging Trends in Information Technology 2020
    Citations: 46

  • Modified design of microstrip patch antenna for WiMAX communication system
    KN Lal, AK Singh
    Proceedings of the 2014 IEEE Students' Technology Symposium, 386-389 2014
    Citations: 33

  • Modified trial division algorithm using KNJ-factorization method to factorize RSA public key encryption
    N Lal, AP Singh, S Kumar
    2014 International Conference on Contemporary Computing and Informatics 2014
    Citations: 28

  • Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme
    N Lal, S Kumar, A Saxena, VK Chaurasiya
    Procedia Computer Science 49, 264-273 2015
    Citations: node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme

  • Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme
    N Lal, S Kumar, A Saxena, VK Chaurasiya
    Procedia Computer Science 49, 264-273 2015
    Citations: 27

  • A forwarding strategy based on ANFIS in internet-of-things-oriented wireless sensor network (WSN) using a novel fuzzy-based cluster head protocol
    S Kumar, N Lal, VK Chaurasiya
    Annals of Telecommunications 73 (9), 627-638 2018
    Citations: 24

  • A centrality-measures based caching scheme for content-centric networking (CCN)
    KN Lal, A Kumar
    Multimedia Tools and Applications 77, 17625-17642 2018
    Citations: 24

  • An effective approach for mobile ad hoc network via I-Watchdog protocol
    N Lal
    arXiv preprint arXiv:1412.8013 2014
    Citations: 24

  • An energy efficient IPv6 packet delivery scheme for industrial IoT over G. 9959 protocol based wireless sensor network (WSN)
    S Kumar, N Lal, VK Chaurasiya
    Computer Networks 154, 79-87 2019
    Citations: 22

  • A cache content replacement scheme for information centric network
    KN Lal, A Kumar
    Procedia Computer Science 89, 73-81 2016
    Citations: 20

  • Caching methodologies in Content centric networking (CCN): A survey
    N Lal, S Kumar, G Kadian, VK Chaurasiya
    Computer Science Review 31, 39-50 2019
    Citations: 19

  • E-health application over 5G using Content-Centric networking (CCN)
    KN Lal, A Kumar
    2017 International conference on IOT and application (ICIOT), 1-5 2017
    Citations: 19

  • A popularity based content eviction scheme via betweenness-centrality caching approach for content-centric networking (CCN)
    KN Lal, A Kumar
    Wireless Networks 25, 585-596 2019
    Citations: 13

  • A heuristic edf uplink scheduler for real time application in wimax communication
    N Lal, AP Singh, S Kumar, S Mittal, M Singh
    arXiv preprint arXiv:1501.04553 2015
    Citations: 11

  • E-health application using network coding based caching for Information-centric networking (ICN)
    KN Lal, A Kumar
    2017 6th International Conference on Reliability, Infocom Technologies and 2017
    Citations: 8

  • A Prediction Model of Detecting Liver Diseases in Patients using Logistic Regression of Machine Learning
    PSM Keerthana, N Phalinkar, R Mehere, K Bhanu Prakash Reddy, N Lal
    Proceedings of the International Conference on Innovative Computing 2020
    Citations: 7

  • An efficient update strategy for content synchronization in Content-Centric Networking (CCN)
    N Lal, S Kumar, VK Chaurasiya
    IEEE China Communications 2019
    Citations: 7

  • A Road Monitoring Approach with Real-Time Capturing of Events for Efficient Vehicles Safety in Smart City
    N Lal, S Kumar, VK Chaurasiya
    Wireless Personal Communications 114 (1), 657-674 2020
    Citations: 6

  • ICN-WiMAX: An Application of Network coding based Centrality-measures caching over IEEE 802.16
    KN Lal, A Kumar
    Procedia Computer Science 125, 241-247 2018
    Citations: 6