@smvdu.ac.in
Associate Professor,School of Electronics & Communication Engineering
Shri Mata Vaishno Devi University
Ph.D. in Electronics & Communication Engineering
Scopus Publications
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
Springer Nature Singapore
Arijit Roy, V. S. Surendra, R. Ramachandran, J. K. Meka, S. Gupta, P. Janardhan, B. N. Rajasekhar, H. Hill, Anil Bhardwaj, N. J. Mason,et al.
Springer Science and Business Media LLC
Sathish Malathi, Ugra mohan Roy, Sana Kadambot S, Utkarsh Tiwari, Shreyansh Mishra, Sumeet Gupta, and Shantanu Gupta
SPIE
Integrated Optic Micro ring Resonator-based sensors are suitable for lab-on-chip applications due to their smaller footprint. Optical sensors are sensitive to detecting small changes in external parameters. Simultaneous detection of multiple gases present in the atmosphere is crucial for several civilian and military applications. Integrated optic micro ring resonators are promising sensing devices. In this paper, machine learning techniques are used in the classification and detection of gases for a sensor of a Micro Ring Resonator (MRR) array . In this paper machine learning techniques are used to reduce the data to be used for the analysis and improve accuracy of the sensor. Three target gases in the proposed model are Ammonia, Methane and Carbon on each ring simulated in this work. The features and influences on wavelength, transmittance, concentration of gases, and ring radius have also been analyzed. Principal Component Analysis (PCA) and K-Clustering algorithm has been used for the classification and detection of different gases. The Davies Boulden Index is calculated as 0.57 which shows the distance between the clusters. The sensor has a sensitivity of 0.35 nm/ppm.
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
Wiley
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
Walter de Gruyter GmbH
Abstract This article presents a practical method for the 3D placement of a group of HetNet of unmanned aerial vehicles (UAV)-mounted base station (mBS) to offer maximum wireless connectivity and coverage for terrestrial users in a particular region. There are two ways to solve this issue. First, the ideal flying height for each UAV is determined based on the transmit power of the UAV, which offers the maximum ground coverage radius. Depending on their ideal flying altitudes and transmitting power, UAVs are divided into several categories. Given a collection of UAVs, the proposed approach identifies an optimum subset of the available UAVs and places them optimally in 3D to offer maximum coverage of the network for a particular area on the terrestrial ground while using the least amount of power. The results of the simulations show that the suggested approach is effective, and they also give important visions about the behavior of the HetNet supported UAVmBS cell subnetworks.
Vaibhavi Vaibhavi, , Samridhi Khanna, Sachin Kr Gupta, Zeeshan Vakil, Mohd Najim, Ravi Prakash Dwivedi, , , ,et al.
Sumy State University
Stolen vehicle tracking systems are becoming essential nowadays, mainly in the case of stolen automo- biles. Vehicle burglary is a significant issue these days, and retrieving those stolen vehicles is another issue in addition. It has become increasingly difficult to solve this problem over a long period of time due to differences in car license plates, the destruction and confusion of some parts stolen. In light of these com-plexities, it is difficult to stop every vehicle and determine what method of managing work is required to reduce the effort and find the stolen vehicle. We propose to develop a framework that will upload the number of a stolen vehicle and be able to detect fraudulent vehicles with the assistance of the digital signature based ECU and will also be ready to send the coordinates of a fraudulent vehicle to the local department. To fight against theft, this technique can be a powerful tool. This will drastically reduce the danger of auto theft, saving car owners hundreds of dollars in insurance and other damages and will also help law en-forcement. The interface is complemented with the help of other microcontrollers and a few modules. The key goal was to make this technology as simple as feasible, while keeping the cost as low as possible without compromising its reliability.
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
IEEE
In the aftermath of natural disasters, the Disaster Management Team (DMT) plays a crucial role in catastrophe recovery and can dramatically mitigate damage and destruction. Aerial tracking and monitoring will be a grateful enabler for rapid response to catastrophe. Initial risk evaluation may be done by aerial surveillance, which helps prioritize DMTs to different locations depending on the number of individuals who have sustained an injury or the degree of infrastructure loss. Thus, shortly following a catastrophe, a total disaster map leads to an exact estimate of the costs, financial expenses, and loss that will increase the performance of a disaster recovery operation incredibly. In this case, it can be a practical approach to incorporate a multi-agent scheme composed of multiple cooperative UAVs. On the other hand, a very adverse atmosphere is one of the most common causes of UAV loss and maybe so destructive in disasters related to the climate. This article aims to survey cooperative control and the formation of multi-agent and multi-agent UAVs' applications. It proposes a Fault-Tolerant Maximum Coverage (FTMC) framework for a heterogeneous Multi-Agent System (MAS) to support the DMT Moreover, it provides solutions and gives future directions for disaster management.
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
Wiley
Diwankshi Sharma, Sachin Kumar Gupta, Aabid Rashid, Sumeet Gupta, Mamoon Rashid, and Ashutosh Srivastava
Wiley
Sanna Lone, Anil Bhardwaj, Amit Kant Pandit, Sumeet Gupta, and Shubham Mahajan
Springer Science and Business Media LLC
The ascending trend of Moore’s law has stretched to the horizon, where the prospects of carbon-based materials show the potential of replacing the silicon-based complementary metal-oxide semiconductor technology. These alternatives include nanowire transistors, carbon nanotube field-effect transistors, quantum-dot cellular automata, and graphene nanoribbon field-effect transistors (GNRFETs). This paper presents a review of the evolution of graphene, its fabrication process, and graphene-based field-effect transistor device structures. The diverse features of graphene as a material are derived from its structural, electronic, and thermal properties. A brief review of the techniques utilized for the fabrication of GNRFETs is mentioned in this paper. GNRFETs are based on excellent electrical properties that include strong ballistic transport, high current ratio, better compatibility with high K dielectrics, high electron mobility, reliability, scalability, and transconductance. GNRFET structures are reviewed for several aspects which include the Ion/Ioff ratio, subthreshold swing, oxide thickness, high K dielectrics, etc. that help to monitor the improvement in the performance of GNRFET devices. A comparison of the structures is presented to help researchers have a fair idea of the impact of modifications on device performance. The compact model used to simulate GNRFET-based devices is also included in this paper. GNRFET-based devices have several applications to offer in the current scenario. This paper also reports several applications of present GNRFET-based devices.
Tufail A. Lone, Aabid Rashid, Sumeet Gupta, Sachin Kumar Gupta, Duggirala Srinivasa Rao, Mohd Najim, Ashutosh Srivastava, Abhishek Kumar, Lokendra Singh Umrao, and Achintya Singhal
Springer Science and Business Media LLC
One of the major applications of the Heterogeneous Network (HetNet) is in the healthcare system. Deploying HetNet in healthcare systems enables patients, physicians, and other stakeholders to communicate easily with each other. Due to the large growth in the network’s subscribers, the security of the stored health data became one of the major concerns because unauthorized access to this data may lead to very serious complications, and unreliable transmission of data may lead to fatal risks to the patient’s life. Therefore, taking data integrity into consideration, user authentication has become one of the main factors. However, significant research work has been performed at HetNet’s physical layer to secure communication, but the result of this leads to an increase in hardware components. The increasing hardware components not only costs money but also power consumption. Therefore, this paper presents an alternate way of securing communication in HetNet at the network layer. However, resolving security problems at the network layer increases computational complexity. Nevertheless, earlier, some encryption techniques like identity-based encryption (IBE), symmetric key encryption (SKE), and public-key encryption (PKE) have been utilized for securing data. Due to their own disadvantages, this paper utilizes an attribute-based encryption (ABE) authentication scheme for securing health data in medical applications. With the help of this method, access to the intruders is denied which results in reduced communication overhead. This authentication scheme helps protect the essential information against attacks by the intruders. It includes a third party server that helps to authenticate and store patient’s information. The whole security technique has been written in the form of HLPSL (high-level protocol specification language) codes, and the results are then validated with the help of AVISPA (automated validation of Internet security protocols and applications) tool.
Amina Khan, Sumeet Gupta, and Sachin Kumar Gupta
Elsevier BV
Abstract Every year man-made and natural disasters impact the lives of millions of people. The frequency of occurrence of such disasters is steadily increasing since the last 50 years, and this has resulted in considerable loss of life, destruction of infrastructure, and social and economic disruption. A focussed and comprehensive solution is needed encompassing all aspects, including early detection of disaster scenarios, prevention, recovery, and management to minimize the losses. This survey paper presents a critical analysis of the existing methods and technologies that are relevant to a disaster scenario, such as WSN, remote sensing technique, artificial intelligence, IoT, UAV, and satellite imagery, to encounter the issues associated with disaster monitoring, detection, and management. In case of emergency conditions arising out of a typical disaster scenario, there is a strong likelihood that the communication networks will be partially disrupted; thus the alternate networks can play a vital role in disaster detection and management. It focuses on the role of the alternate networks and the associated technologies in maintaining connectivity in various disaster scenarios. It presents a comprehensive study on multiple disasters such as landslide, forest fire, and an earthquake based on the latest technologies to monitor, detect, and manage the various disasters. It focuses on several parameters that are necessary for disaster detection and monitoring and offers appropriate solutions. It also touches upon big data analytics for disaster management. Several techniques are explored, along with their merits and demerits. Open challenges are highlighted, and possible future directions are given.
Anil Bhardwaj, Gaurav Sharma, and Sumeet Gupta
Springer International Publishing
Nanotech and nanoscience have no doubt become a cliche in today’s world. There are many research groups in the world that are currently working to understand the strange and unique properties of materials at nanoscale regime. The motivation for this chapter is to inculcate a feeling of interest and to illustrate the recent developments in the field of nanotechnology for electronics. This chapter focuses on the number of applications of nanotechnology which is extensively implemented in day-to-day lifestyle of humans. The chief areas of applications are in the field of electronics, aeronautics, robotics, biomedical, chemical, pharmaceuticals, and cosmetics. The emergence of this fascinating field has created a scientific revolution that will impact several technological areas. The interest in the field is due to the unique behavior and phenomenon exhibited by the engineered materials at nanolength scale. More than a decade of focused research in this field has already resulted into commercializing several products using engineered nanomaterials. This chapter primarily focuses on nanostructures, application of nanotechnology, graphene as nanomaterial and also includes their properties, synthesis, and applications. The primary focus of this chapter is on nanomaterial into electronics applications. The properties of these applications are studied, and their behavior is observed that is why they are being acknowledged as the wonder materials.
Aabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, and Sachin Kr. Gupta
IEEE
In this modern technological world, the Unmanned Ariel Vehicle (UAV) assisted Heterogeneous Networks (HetNets) is almost being used by every developing/developed country for its serving civilian, military missions and natural disasters, etc. The military using UAV aided HetNets in their battlefields and nuclear war conditions and gathering reconnaissance information from hostile areas and neighboring military zones. However, the untypical nature of UAV assisted network requests security inspection at the time of establishing the network. So the UAV assisted HetNets is in need of trusted and secure communication among military users using the same network. The term trusted is being widely used for authorized users within the network. This research work confers the word trusted on the standardization of the cryptographic scheme known Identity-Based Encryption (IBE). Hence, the IBE helps the users to use the UAV aided HetNets securely in getting the reconnaissance information from enemy areas. Also, the IBE prevents the same network from the intrusion attacks of intruders. The security protocols have been formulated with the AVISPA supported language HLPSL and then validated with the same AVISPA TOOL.
Sagun Sharma, Sumeet Gupta, Swastik Gupta, and Shashi Bhushan Kotwal
IEEE
IoT provides a machine to machine link capability thus ensuring continuous acquisition of data from sensor, machines, objects connected at any point on the Internet. Normally, used for acquisition of data on the cloud, IoT is gradually moving on to the next phase of evolution wherein control of actuators for automating applications is a point of focus. Control action requires a robust yet flexible mechanism, to ensure that no breakdown in the control action occurs at any point of time despite failure of communication link between the cloud and the objects. This paper provides information about the solution for ensuring continuity of control action despite link failure by implementing a dual level of control mechanism. The simulation results and a limited hardware implementation have been implemented to demonstrate the proof of concept.
Aabid Rashid, Diwankshi Sharma, Tufail A. Lone, Sumeet Gupta, and Sachin Kumar Gupta
Springer International Publishing
In the current scientific and technological world, every emerging/advanced country employs Heterogeneous Networks (HetNets) assisted by Unmanned Ariel Vehicle (UAV) to serve its civilian, military and natural catastrophes, etc. The area of focusing in this work will be military zones for getting securely the reconnaissance information from enemy/hostile areas in their battlefields and nuclear war conditions. Though, once the network is created for such scenarios, the untypical nature of UAV assisted network demands protection evaluation. The UAV facilitated HetNets, therefore, demands trust worthy and secure communication among military users using the network. Authentication is one characteristic which enables to mitigate security issues. The prevalent identity and authentication scheme is thus intended to tackle the security threats in HetNets assisted by UAV. In this paper, a security model is proposed based on Identity Based (IB) authentication scheme for UAV-integrated HetNets. The absolutism of such a suggested scheme is screened using the AVISPA tool and some of its outcomes has shown that our scheme is resistant to the vulnerabilities of intruders like replay, impersonation etc.
Anil Kumar Bhardwaj, Sumeet Gupta, Balwinder Raj, and Amandeep Singh
American Scientific Publishers
Sumeet Gupta, Shekhar Verma, and Raj K. Abrol
NADIA
Rohit Khajuria and Sumeet Gupta
IEEE
Developments in last decade in the field of electronics & communication, computer science and information technology field have resulted in the new technology paradigm, Wireless Sensor Networks. WSN is becoming increasingly popular due to their wide range of applications. For successful adaption of WSN in real field applications, there are certain issues which need to be addressed particularly the issue of energy consumption associated with sensor nodes. This limitation combined with node deployment has added many challenges to design and management of wireless sensor networks. The WSNs are involved in applications such as remote environment monitoring, event tracking in areas where providing electrical energy is very difficult. Moreover, the battery fed sensor nodes have very small energy associated with them, so preserving that energy and maximizing the usage of that energy is most critical issue in WSNs. Here, we present a survey of various energy optimization and lifetime enhancement techniques in wireless sensor networks and makes the reader aware about various energy saving techniques in WSN. They are analyzed from various points of view: Device hardware, Transmission, MAC protocols and Routing protocols.
Sumeet Gupta, Shekhar Verma, G.S. Tomar, and Raj Kumar Abrol
IGI Global
Most of the application-oriented research in the field of Wireless Sensor Networks has been in remote monitoring, including environmental, building automation, and security. However, this paper presents the methodology followed for implementation of a Wireless Sensor Network based solution in a process plant for energy management and leak detection. The sensor network acquires data pertaining to detection of leakage in a plant. The network further serves effectively as a maintenance and diagnostic system that is used to manage the plant and conserve energy in a process plant. The critical design issues, testing methodologies and implementation problems pertaining to the system are also presented. Additionally, special focus has been placed on the calculations pertaining to the network life time.
Sumeet Gupta, Shekhar Varma, G.S. Tomar, and R.K. Abrol
IEEE
Wireless sensor network is need of present era or advanced technology. In this paper we have presented the details of methodology followed for implementation of a Wireless Sensor Network in a process plant for based solution for data acquisition in a process plant. Due to its specific approach the solution not only acquires the data but also serves very effectively as a maintenance and diagnostic system, which is used to manage the plant and conserve energy in a process plant. The critical design issues, testing methodologies and implementation problems pertaining to the system are also presented. This paper will help in bringing the process at par with the theoretical results and performance will increase many folds. the simulated results are encouraging and has provided boost to our design and implementation in future.