NEERENDRA KUMAR

@cujammu.ac.in

Associate Professor, Department of Computer Science and IT
CENTRAL UNIVERSITY OF JAMMU



                 

https://researchid.co/neerendra

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering

35

Scopus Publications

589

Scholar Citations

14

Scholar h-index

17

Scholar i10-index

Scopus Publications

  • Cybersecurity Issues and Artificial Intelligence-Based Solutions in Cyber-Physical Systems
    Narinder Verma, Neerendra Kumar, Zakir Ahmad Sheikh, Neha Koul, and Ankit Ashish

    Chapman and Hall/CRC

  • Correction to: Super Resolution for Noisy Images Using Convolutional Neural Networks (Mathematics, (2022), 10, 5, (777), 10.3390/math10050777)
    Zaid Bin Mushtaq, Shoaib Mohd Nasti, Chaman Verma, Maria Simona Raboaca, Neerendra Kumar, and Samiah Jan Nasti

    MDPI AG
    In the original publication [...]

  • Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review
    Sumiya Mushtaq, Neerendra Kumar, Yashwant Singh, and Pradeep Kumar Singh

    World Scientific Pub Co Pte Ltd
    Personality is a psychological construct that embodies the unique characteristics of an individual. Automatic personality computing enables the assessment of personality elements with the help of machines. Over the last few decades, a lot of researchers have focussed on computing aspects of personality, emotions, and behavior with the help of machine learning. Efficient personality recognition using machine learning can provide inroads to almost every field of human advancement. However, we found out there are not enough good surveys to consolidate the progress of the growing field. In our effort, we have taken a sub-field of personality computation known as apparent personality perception or First Impressions. In addition to providing an exhaustive compilation of available First Impression research, we have classified the existing literature according to the data modalities and machine learning techniques they have utilized. Our work also lists various limitations and gaps within the existing literary works with possible measures to address them. The paper concludes with our comments on the future work in the field of first impressions.

  • Navigation and Cognitive Techniques for Humanoid Robots
    Aqsa Sayeed, Zoltán Vámossy, Neerendra Kumar, Yash Paul, Yatish Bathla, and Neha Koul

    Springer Nature Singapore

  • An Approach for Integrating a Prominent Conversational Chatbot with a Contact Center
    Yatish Bathla and Neerendra Kumar

    Springer Nature Singapore

  • Hybrid Approach for Resource Allocation and Task Scheduling on Cloud Computing: A Review
    Saraswati Narayan, Neerendra Kumar, Neha Koul, Chaman Verma, Florentina Magda Enescu, and Maria Simona Raboaca

    Springer Nature Singapore

  • Intelligent Communication for Internet of Things (IoRT)
    Kaleem Ullah Bhat, Neerendra Kumar, Neha Koul, Chaman Verma, Florentina Magda Enescu, and Maria Simona Raboaca

    Springer Nature Singapore

  • Machine Learning Techniques for Result Prediction of One Day International (ODI) Cricket Match
    Inam ul Haq, Neerendra Kumar, Neha Koul, Chaman Verma, Florentina Magda Eneacu, and Maria Simona Raboaca

    Springer Nature Singapore

  • Neoteric Trends of Unmanned Aerial Vehicle (UAV) Research: A Scientometric Analysis
    Ajay Kumar, Mayank Chopra, Yashwant Singh, and Neerendra Kumar

    EManuscript Technologies
    Artificial intelligence is becoming more prevalent across diverse disciplines, and aerial vehicles are increasingly becoming "Unmanned”. It is beneficial when residents might otherwise be in danger, such as during COVID-19 medicine delivery, gathering information about the enemy, or using it in agriculture. This study aims to provide a scientometric assessment of the latest research centres, patterns, and global reach of UAVs from 2007 to 2022. The study uses bibliographic information downloaded in CSV format from Scopus to examine the in-depth visualization of the index item's properties. In addition to examining article expansion, field classifications, global dispersion, citation analysis, and the impact of the institutions and writers, the study examines UAV applications distributed throughout the world. To analyse term co-occurrence, we use a Java-based program called VOSviewer, which lists hubs and the latest innovations in UAV research. © Author (s) 2023.

  • Image Geo-Site Estimation Using Convolutional Auto-Encoder and Multi-Label Support Vector Machine
    Arpit Jain, Chaman Verma, Neerendra Kumar, Maria Simona Raboaca, Jyoti Narayan Baliya, and George Suciu

    MDPI AG
    The estimation of an image geo-site solely based on its contents is a promising task. Compelling image labelling relies heavily on contextual information, which is not as simple as recognizing a single object in an image. An Auto-Encode-based support vector machine approach is proposed in this work to estimate the image geo-site to address the issue of misclassifying the estimations. The proposed method for geo-site estimation is conducted using a dataset consisting of 125 classes of various images captured within 125 countries. The proposed work uses a convolutional Auto-Encode for training and dimensionality reduction. After that, the acquired preprocessed input dataset is further processed by a multi-label support vector machine. The performance assessment of the proposed approach has been accomplished using accuracy, sensitivity, specificity, and F1-score as evaluation parameters. Eventually, the proposed approach for image geo-site estimation presented in this article outperforms Auto-Encode-based K-Nearest Neighbor and Auto-Encode-Random Forest methods.

  • Text-Based Automatic Personality Recognition: Recent Developments
    Sumiya Mushtaq and Neerendra Kumar

    Springer Nature Singapore

  • Resiliency and Nonlinearity Profiles of Some Cryptographic Functions
    Deep Singh, Amit Paul, Neerendra Kumar, Veronika Stoffová, and Chaman Verma

    MDPI AG
    Boolean functions are important in terms of their cryptographic and combinatorial properties for different kinds of cryptosystems. The nonlinearity and resiliency of cryptographic functions are crucial criteria with respect to protection of ciphers from affine approximation and correlation attacks. In this article, some constructions of disjoint spectra Boolean that function by concatenating the functions on a lesser number of variables are provided. The nonlinearity and resiliency profiles of the constructed functions are obtained. From the profiles of the constructed functions, it is observed that the nonlinearity of these functions is greater than or equal to the nonlinearity of some existing functions. Furthermore, in the security analysis of cryptosystems, 4th order nonlinearity of Boolean functions play a crucial role. It provides protection against various higher order approximation attacks. The lower bounds on 4th order nonlinearity of some classes of Boolean functions having degree 5 are provided. The lower bounds of two classes of functions have form Tr1n(λxd) for all x∈F2n,λ∈F2n*, where (i) d=2i+2j+2k+2ℓ+1, where i,j,k,ℓ are integers such that i>j>k>ℓ≥1 and n>2i, and (ii) d=24ℓ+23ℓ+22ℓ+2ℓ+1, where ℓ>0 is an integer with property gcd(ℓ,n)=1, n>8 are provided. The obtained lower bounds are compared with some existing results available in the literature.

  • Cryptanalysis and Improved Image Encryption Scheme Using Elliptic Curve and Affine Hill Cipher
    Parveiz Nazir Lone, Deep Singh, Veronika Stoffová, Deep Chandra Mishra, Umar Hussain Mir, and Neerendra Kumar

    MDPI AG
    In the present era of digital communication, secure data transfer is a challenging task in the case of open networks. Low-key-strength encryption techniques incur enormous security threats. Therefore, efficient cryptosystems are highly necessary for the fast and secure transmission of multimedia data. In this article, cryptanalysis is performed on an existing encryption scheme designed using elliptic curve cryptography (ECC) and a Hill cipher. The work shows that the scheme is vulnerable to brute force attacks and lacks both Shannon’s primitive operations of cryptography and Kerckchoff’s principle. To circumvent these limitations, an efficient modification to the existing scheme is proposed using an affine Hill cipher in combination with ECC and a 3D chaotic map. The efficiency of the modified scheme is demonstrated through experimental results and numerical simulations.

  • Approaches and Challenges in Internet of Robotic Things
    Aqsa Sayeed, Chaman Verma, Neerendra Kumar, Neha Koul, and Zoltán Illés

    MDPI AG
    The Internet of robotic things (IoRT) is the combination of different technologies including cloud computing, robots, Internet of things (IoT), artificial intelligence (AI), and machine learning (ML). IoRT plays a major role in manufacturing, healthcare, security, and transport. IoRT can speed up human development by a very significant percentage. IoRT allows robots to transmit and receive data to and from other devices and users. In this paper, IoRT is reviewed in terms of the related techniques, architectures, and abilities. Consequently, the related research challenges are presented. IoRT architectures are vital in the design of robotic systems and robotic things. The existing 3–7-tier IoRT architectures are studied. Subsequently, a detailed IoRT architecture is proposed. Robotic technologies provide the means to increase the performance and capabilities of the user, product, or process. However, robotic technologies are vulnerable to attacks on data security. Trust-based and encryption-based mechanisms can be used for secure communication among robotic things. A security method is recommended to provide a secure and trustworthy data-sharing mechanism in IoRT. Significant security challenges are also discussed. Several known attacks on ad hoc networks are illustrated. Threat models ensure integrity confidentiality and availability of the data. In a network, trust models are used to boost a system’s security. Trust models and IoRT networks play a key role in obtaining a steady and nonvulnerable configuration in the network. In IoRT, remote server access results in remote software updates of robotic things. To study navigation strategies, navigation using fuzzy logic, probabilistic roadmap algorithms, laser scan matching algorithms, heuristic functions, bumper events, and vision-based navigation techniques are considered. Using the given research challenges, future researchers can get contemporary ideas of IoRT implementation in the real world.

  • Super Resolution for Noisy Images Using Convolutional Neural Networks
    Zaid Mushtaq, Shoaib Nasti, Chaman Verma, Maria Raboaca, Neerendra Kumar, and Samiah Nasti

    MDPI AG
    The images in high resolution contain more useful information than the images in low resolution. Thus, high-resolution digital images are preferred over low-resolution images. Image super-resolution is one of the principal techniques for generating high-resolution images. The major advantages of super-resolution methods are that they are economical, independent of the image capture devices, and can be statically used. In this paper, a single-image super-resolution network model based on convolutional neural networks is proposed by combining conventional autoencoder and residual neural network approaches. A convolutional neural network-based dictionary method is used to train low-resolution input images for high-resolution images. In addition, a linear refined unit thresholds the convolutional neural network output to provide a better low-resolution image dictionary. Autoencoders aid in the removal of noise from images and the enhancement of their quality. Secondly, the residual neural network model processes it further to create a high-resolution image. The experimental results demonstrate the outstanding performance of our proposed method compared to other traditional methods. The proposed method produces clearer and more detailed high-resolution images, as they are important in real-life applications. Moreover, it has the advantage of combining convolutional neural network-based dictionary learning, autoencoder image enhancement, and noise removal. Furthermore, residual neural network training with improved preprocessing creates an efficient and versatile single-image super-resolution network.

  • Data Exchange Techniques for Internet of Robotic Things: Recent Developments
    Neha Koul, Neerendra Kumar, Aqsa Sayeed, Chaman Verma, and Maria Simona Raboaca

    Institute of Electrical and Electronics Engineers (IEEE)
    The world we live in is where a human-machine connection is a barometer, and this tendency is only growing to provide richer and universal human reminiscences. New technologies, as well as the fusion of different classes of current technologies, are used to create such unique solutions. The Internet of Robotic Things (IoRT) is the product of collaboration between robotics and the Internet of Things (IoT), which has opened up incredible potential for localized self-sufficient solutions. Robots can collect accurate data from the environment and provide a comprehensive service instantaneously. Being an amalgamation of two different concepts i.e. IoT and Robotics, the IoRT system is anticipated to benefit both by expanding their potential to innovative heights. This paper gives a concise introduction to the communication architecture of the IoRT system. The taxonomy of various data exchange protocols used in an IoRT system is proposed. The necessary improvements in protocols that are required to enhance communication in an IoRT system are presented. A Review of some data exchange methodologies based on Artificial Intelligence (AI) for secure and reliable communication is also given in this paper. The key motive of this paper is to understand the data exchange within an IoRT system using common communication protocols.

  • Secure Unmanned Aerial Vehicle (UAV) Communication using Blockchain Technology
    Ajay Kumar, Yashwant Singh, and Neerendra Kumar

    Springer Singapore

  • Fake Profile Detection from the Social Dataset for Movie Promotion
    Parul Parihar, Devanand, and Neerendra Kumar

    IEEE
    Product promotion for increasing the sale of the product is critical in today’s competitive environment. Online medium of promotion is vital in this regard. Product promotion especially in the field of movies goes through fake promotion issues. Movies are promoted by the entities through fake rating. This work primary focuses on the detection of fake profiles. To accomplish this collaborative filtering with the pre-processing mechanism is used. Demonstration of work will be done through movie lense dataset. The nature of proposed approach is modular; this means entire work will be divided into phase. Data acquisition is performed in the first phase. After collecting the dataset, pre-processing mechanism is applied by using nominal conversion. Collaborative filtering is applied along with clustering to determine the fake promotion of within movie lense dataset. Nominal conversion is also required since recommender system may not able to handle string values. By the classification accuracy we can show the result of the proposed work.

  • Analysis of Modern Communication Protocols for IoT applications
    Neerendra Kumar and Pragti Jamwal

    University of Kerbala - KIJOMS

  • Mobile Robot Path Planning Approaches: Recent Developments
    Raashid Manzoor and Neerendra Kumar

    Springer International Publishing

  • Path Planning for Autonomous Robot Navigation: Present Approaches
    Shagun Verma and Neerendra Kumar

    Springer Singapore

  • Autonomous Navigation of Mobile Robot with Obstacle Avoidance: A Review
    Mahvish Bijli and Neerendra Kumar

    Springer Singapore


  • A comparative study of famous classification techniques and data mining tools
    Yash Paul and Neerendra Kumar

    Springer International Publishing

  • Smart approach for real-time gender prediction of European school’s principal using machine learning
    Yatish Bathla, Chaman Verma, and Neerendra Kumar

    Springer International Publishing

RECENT SCHOLAR PUBLICATIONS

  • Animal wastes-derived capped and bactericidal silver nanoparticles induce immuno-physiological responses in fish for multiple stress resilience in the One-Health Approach
    L So, KK Krishnani, N Kumar, M Pathak, A Upadhyay, B Sarkar, A Verma, ...
    2024

  • ANN prediction approach analysis for performance and emission of antioxidant-treated waste cooking oil biodiesel
    N Kumar, K Yadav, R Chaudhary
    International Journal of Environmental Science and Technology 20 (11), 12581 2023

  • Correction: Mushtaq et al. Super Resolution for Noisy Images Using Convolutional Neural Networks. Mathematics 2022, 10, 777
    ZB Mushtaq, SM Nasti, C Verma, MS Raboaca, N Kumar, SJ Nasti
    Mathematics 11 (13), 2968 2023

  • Intelligent Communication for Internet of Things (IoRT) Check for updates
    KU Bhat, N Kumar, N Koul, C Verma, FM Enescu, MS Raboaca
    Proceedings of International Conference on Recent Innovations in Computing 2023

  • Hybrid Approach for Resource Allocation and Task Scheduling on Cloud Computing: A Review
    S Narayan, N Kumar, N Koul, C Verma, FM Enescu, MS Raboaca
    Proceedings of International Conference on Recent Innovations in Computing 2023

  • Navigation and Cognitive Techniques for Humanoid Robots
    A Sayeed, Z Vmossy, N Kumar, Y Paul, Y Bathla, N Koul
    Proceedings of International Conference on Recent Innovations in Computing 2023

  • An Approach for Integrating a Prominent Conversational Chatbot with a Contact Center
    Y Bathla, N Kumar
    Proceedings of International Conference on Recent Innovations in Computing 2023

  • Synthesis of Sn-doped ZnO catalysts by solution combustion method for photocatalytic activity: a parametric study
    PR Potti, VC Srivastava, P Kumar, S Das, N Kumar, UL Štangar
    International Journal of Environmental Science and Technology 20 (5), 5043-5050 2023

  • Livestock wastes-derived capped and bactericidal silver nanoparticles induce immuno-physiological responses in fish for multiple stress resilience–The One Health Approach
    L So, KK Krishnani, N Kumar, M Pathak, A Upadhyay, B Sarkar, A Verma, ...
    2023

  • Vision and Audio-based Methods for First Impression Recognition Using Machine Learning Algorithms: A Review
    S Mushtaq, N Kumar, Y Singh, PK Singh
    INTERNATIONAL JOURNAL ON ARTIFICIAL INTELLIGENCE TOOLS 32 (02), 2340010 2023

  • Image Geo-Site Estimation Using Convolutional Auto-Encoder and Multi-Label Support Vector Machine
    A Jain, C Verma, N Kumar, MS Raboaca, JN Baliya, G Suciu
    Information 14 (1), 29 2023

  • Neoteric trends of unmanned aerial vehicle (uav) research: a scientometric analysis
    A Kumar, M Chopra, Y Singh, N Kumar
    J Scientometr Res 12 (1), 98-113 2023

  • Resiliency and Nonlinearity Profiles of Some Cryptographic Functions
    D Singh, A Paul, N Kumar, V Stoffov, C Verma
    Mathematics 10 (23), 4473 2022

  • Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher
    PN Lone, D Singh, V Stoffov, DC Mishra, UH Mir, N Kumar
    Mathematics 10 (20), 3878 2022

  • Data exchange techniques for internet of robotic things: Recent developments
    N Koul, N Kumar, A Sayeed, C Verma, MS Raboaca
    IEEE Access 10, 102087-102106 2022

  • Approaches and challenges in Internet of robotic things
    A Sayeed, C Verma, N Kumar, N Koul, Z Ills
    Future Internet 14 (9), 265 2022

  • Pig waste derived capped and non-agglomerated silver nanoparticles and its effect on pathogenic bacteria and physiological responses of fish under multiple abiotic stresses
    L So, KK Krishnani, N Kumar, M Pathak, A Upadhyay, B Sarkar, ...
    2022

  • Text-based automatic personality recognition: Recent developments
    S Mushtaq, N Kumar
    Proceedings of Third International Conference on Computing, Communications 2022

  • AN OVERVIEW OF BLUE OCEAN STRATEGY FOR BUSINESS SUSTAINABILITY.
    NP Kumar
    XIBA Business Review 5 (2) 2022

  • Evaluation of properties of glow discharge plasma nitrided C-300 maraging steel
    S Sharma, B Roy, B Ganguli, S Dixit, N Kumar
    2022

MOST CITED SCHOLAR PUBLICATIONS

  • System and methods for in-meeting group assistance using a virtual assistant
    N Kumar
    US Patent 10,540,971 2020
    Citations: 102

  • Robot navigation in unknown environment using fuzzy logic
    N Kumar, M Takcs, Z Vmossy
    2017 IEEE 15th International Symposium on Applied Machine Intelligence and 2017
    Citations: 33

  • Hepatoprotective effect of Curcuma longa against lead induced toxicity in Wistar rats.
    SL Baxla, RH Gora, P Kerketta, N Kumar, BK Roy, PH Patra
    2013
    Citations: 29

  • Robot path pursuit using probabilistic roadmap
    N Kumar, Z Vmossy, ZM Szab-Resch
    2016 IEEE 17th International Symposium on Computational Intelligence and 2016
    Citations: 24

  • Smart approach for real-time gender prediction of European school’s principal using machine learning
    Y Bathla, C Verma, N Kumar
    Proceedings of ICRIC 2019: Recent Innovations in Computing, 159-175 2020
    Citations: 22

  • Using sub-sequence information with kNN for classification of sequential data
    NP Kumar, MV Rao, PR Krishna, RS Bapi
    Distributed Computing and Internet Technology: Second International 2005
    Citations: 21

  • Systems and methods for decomposing a video stream into face streams
    N Kumar, A Nagpal, SM Ramakrishna
    US Patent App. 15/902,854 2019
    Citations: 20

  • Post operative infection in clean cases with the use of implant and their management
    IA Tago, K Asfhaq, P Gill, K Memon, N Kumar, G Mahboob
    J pak orthop assoc 19 (2), 46-56 2007
    Citations: 18

  • Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher
    PN Lone, D Singh, V Stoffov, DC Mishra, UH Mir, N Kumar
    Mathematics 10 (20), 3878 2022
    Citations: 17

  • Robot obstacle avoidance using bumper event
    N Kumar, Z Vmossy, ZM Szab-Resch
    2016 IEEE 11th International Symposium on Applied Computational Intelligence 2016
    Citations: 17

  • A cognitive knowledged energy-efficient path selection using centroid and ant-colony optimized hybrid protocol for WSN-assisted IoT
    NP Raj Kumar, GJ Bala
    Wireless Personal Communications 124 (3), 1993-2028 2022
    Citations: 16

  • System and methods for physical whiteboard collaboration in a video conference
    A Nagpal, A Periyannan, N Kumar
    US Patent 10,284,815 2019
    Citations: 16

  • Unintended pregnancy and abortion: a community-based study in Rajasthan—summary report
    B Elul, S Barge, S Verma, N Kumar, H Sadhwani, H Bracken, S Narvekar, ...
    New Delhi: Population Council 2003
    Citations: 16

  • Data clustering using artificial neural networks
    N Kumar, RS Joshi
    Proceedings of national conference on challenges & opportunities in 2007
    Citations: 14

  • Approaches and challenges in Internet of robotic things
    A Sayeed, C Verma, N Kumar, N Koul, Z Ills
    Future Internet 14 (9), 265 2022
    Citations: 12

  • System and methods for testing a video conference call using a virtual assistant
    N Kumar
    US Patent 10,264,214 2019
    Citations: 11

  • Heuristic approaches in robot navigation
    N Kumar, Z Vmossy, ZM Szab-Resch
    2016 IEEE 20th Jubilee International Conference on Intelligent Engineering 2016
    Citations: 11

  • Data exchange techniques for internet of robotic things: Recent developments
    N Koul, N Kumar, A Sayeed, C Verma, MS Raboaca
    IEEE Access 10, 102087-102106 2022
    Citations: 9

  • A comparative study of famous classification techniques and data mining tools
    Y Paul, N Kumar
    Proceedings of ICRIC 2019: Recent Innovations in Computing, 627-644 2020
    Citations: 9

  • Generic XML schema definition (XSD) to GUI translator
    V Radha, S Ramakrishna, NP Kumar
    International Conference on Distributed Computing and Internet Technology 2005
    Citations: 9