@hmritm.ac.in
ASSISTANT PROFESSOR AND COMPUTER SCIENCE AND ENGINEERING DEPARTMENT
HMR ITM DELHI
Ambedkar Institute of Advanced Communication Technologies and Research: Geeta Colony, Delhi, INDIA
WIRELESS SENSOR NETWORKS, IoT, BLOCKCHAIN
Scopus Publications
Scholar Citations
Scholar h-index
Scholar i10-index
Prashant Giridhar Shambharkar and Nikhil Sharma
Springer Science and Business Media LLC
Lovanya Bajaj, Nikhil Sharma, and Prashant Giridhar Shambharkar
Wiley
Aradhya Singh Bisht, Anshul Joshi, and Nikhil Sharma
IEEE
In a social network graph, individuals are represented by nodes, while edges, or linkages between nodes, represent social relationships amongst them, like friendship or teamwork on a project. There are two types of these graphs: directed and undirected. For the majority of nodes in social networks exhibiting power-law degree distributions, the friends of those nodes typically have more friends than the node itself. Because nodes will prefer to associate with other nodes who possess a high degree, the Friendship Paradox is reached. Additionally, we’ll be showcasing DTUBOOK, a component of our android-based UI and UX that allows users to login and register for our social network. This dynamic social network for students was developed in Android Studio utilizing Java and the specialized programming language Kotlin. Each user who logs into our Firebase-based server will behave like a node in a graph, holding important user data like name, age, etc. Users will have the choice to look up and friend other nodes (i.e. persons) (basically every friendship will lead to a new edge between nodes).
Aradhya Singh Bisht, Amit Kumar Jha, Abhinav Sachdeva, and Nikhil Sharma
IEEE
The domain of object detection has advanced significantly during the past 20 years. Within its 20 -year history, this overview of the literature not only looks at some iconic detectors (like the VJ detection device, the HOG detector, the DPM, Faster-RCNN, YOLO, SSD, and others as well), significant innovations, speed-up strategies, identification uses, records, and statistics, but it also talks about the 28 obstacles the research community faces at present and how these detectors may be enhanced in the coming years. We have custom-made attributes and shallow trainable structures, which are the cornerstones of historical object identification systems. Deep learning technology has evolved on its own, making more efficient tools capable of picking up deeper, higher-level, and semantic traits. In this paper, a deep learning-based object-detecting system has been investigated. Additionally, we practise a few specialized tasks including pedestrian detection, face identification, and noteworthy item detection.
Ruchi Pandey, Priyansha Bhasin, Saahil Popli, Mayank Sharma, and Nikhil Sharma
Springer Nature Singapore
Aradhya Singh Bisht, Amit Kumar Jha, Abhinav Sachdeva, and Nikhil Sharma
IEEE
Over the last 20 years, the field of object detection has seen a remarkable progress been made. In its 20-year history, this literature review not only goes through some landmark detectors (e.g., VJ detector, HOG detector, DPM, Faster-RCNN, YOLO, SSD, and others), key technologies, speed up methods, detection applications, datasets, and metrics, but also the 28 difficulties currently faced by the community are being discussed and further enhancement and continuation of these detectors are also discussed. We had shallow trainable structures and Handcrafted features which are the fundamentals of conventional object identification systems. With the spontaneous advancement of deep learning technology, additional effective tools are now competent of learning semantic, high-level, and deeper characteristics. In this study, deep learning-based object detection system has been reviewed. We also go through a few specific tasks, such as prominent item detection, face identification, and pedestrian detection.
Aeshita Mathur, Ameesha Dabas, and Nikhil Sharma
IEEE
The industrial revolution is characterized by a shift in methods from agricultural, pastoral, and handicraft economies to the one that is dominated by production industries. The Industrial Revolution brought a significant transformation from economies that were initially based on agriculture to the one that is now dominated by large-scale industries. The Industrial Revolution was first used for Britain’s economic development in 1760 by Arnold Toynbee. It broadly applies to economic transformation rather than a period of time. The primary characteristics of an industrial revolution are technological, cultural, and socioeconomic. During the first industrial revolution, a transition to manufacturing processes using steam and water took place. Electrical technology was primarily used in the second industrial revolution to increase production. The third industrial revolution came with IT and electronics, wherein the main focus was on automation in production. The fourth industrial revolution was to provide customization using AI. The fifth industrial revolution focuses on providing personalization and a human touch to manufacturing methods. Industry 5.0 is sometimes seen as anti-industrial because of its personalization involving the human touch. This paper has done a systematic analysis of the five industrial revolutions.
Nikhil Sharma and Prashant Giridhar Shambharkar
IEEE
In today's world, as population is at high peak and due to changing life style of people, individuals are suffering from various chronic disease. With shift towards modern methodology, involvement of human efforts has decreased, as know a day's people need to finish particular amount of task within few hours and with less effort. No doubt technology has made less intervention of human but it has certain limitations too. Due to less physical involvement, humans are more prone to diseases. Internet of things (IoT) plays a very crucial role in health care sector. Using various sensors, it become possible to trace the medical health condition of the human, and a message can be forwarded to nearby hospitals which helps the patients with ease. In this paper, three different diseases like heart disease, diabetes and novel COVID-19 are discussed where different machine learning algorithms are reviewed with involvement of IoT sensors.
Vikash Kumar Aggarwal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Himanshu
IOP Publishing
Himanshu, Rishu Rana, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
CRC Press
Abhishek Goel, Siddharth Gautam, Nitin Tyagi, Nikhil Sharma, and Martin Sagayam
Wiley
Bharti Verma, Nikhil Sharma, Ila Kaushik, and Bharat Bhushan
Springer International Publishing
Nikhil Sharma, Ila Kaushik, Vikash Kumar Agarwal, Bharat Bhushan, and Aditya Khamparia
Wiley
Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Narayan C. Debnath
Springer International Publishing
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Nitin Kumar
Springer Singapore
Sukriti Goyal, Nikhil Sharma, Bharat Bhushan, Achyut Shankar, and Martin Sagayam
Springer International Publishing
Apeksha Rustagi, Chinkit Manchanda, Nikhil Sharma, and Ila Kaushik
Springer Singapore
Depression is a temperament syndrome that causes a tenacious emotion of wretchedness and loss of interest in any activity. It is a supreme root of mental illness, which has established the growth in the risk of early death and economic burden to a country. Traditional clinical analysis procedures are subjective, complex and need considerable contribution of professionals. The turn of the century saw incredible progress in using deep learning for medical diagnosis. Though, prediction and implementation of mental state can be remarkably hard. In this paper, we present Combinational Deep Neural Network (CDNN) for automated depression detection with facial images and text data using amalgamation of Convolutional Neural Network (CNN) and Recurrent Neural Network (RNN). Thereafter, combining the prediction scores of both CNN and RNN model and level of depression is decided on the basis of the range of the predefined depression-level scores. Simulation outcomes based on real-field channel measurements show that the proposed model can significantly predict depression with superior performance.
Bharat Bhushan and Nikhil Sharma
Springer Singapore
Blockchain is defined as a technology comprising of logic unit of work done in form of transactions where any read or write operation can be carried out and stored in form of blocks where any financial accounts can be accessed by different servers. This is widely used technology due to its tremendous applicability such as independent verification without the involvement of any third party, no alteration or deletion of data, use of cryptography for secure financial accounts, sequential recording of transactions, pure transparent process of transaction. Blockchain follows both private and public type of architecture. In public model, anyone can read and write while in private only authorized users have the access. Security plays a vital role where secure transactions are to be carried out. Main principles of security such as confidentiality which implies the secrecy of send message, integrity which implies the consistency of send and received message and availability which implies information required must be available for reference, which must be preserved in any security-based model. In order to reduce the impact of attacks, various security algorithms such as cryptography, ring signature, Non-interactive Zero- Knowledge Proof, CryptoNote and Monero, Homomorphic Cryptosystem system are introduced in the paper.
Depender Kumar Soni, Harbhajan Sharma, Bharat Bhushan, Nikhil Sharma, and Ila Kaushik
IEEE
In the dawn of crypto-currencies the most talked currency is Bitcoin. Bitcoin is widely flourished digital currency and an exchange trading commodity implementing peer-to-peer payment network. No central athourity exists in Bitcoin. The users in network or pool of bitcoin need not to use real names, rather they use pseudo names for managing and verifying transactions. Due to the use of pseudo names bitcoin is apprehended to provide anonymity. However, the most transparent payment network is what bitcoin is. Here all the transactions are publicly open. To furnish wholeness and put a stop to double-spending, Blockchain is used, which actually works as a ledger for management of Bitcoins. Blockchain can be misused to monitor flow of bitcoins among multiple transactions. When data from external sources is amalgamated with insinuation acquired from the Blockchain, it may result to reveal user’s identity and profile. In this way the activity of user may be traced to an extent to fraud that user. Along with the popularity of Bitcoins the number of adversarial attacks has also gain pace. All these activities are meant to exploit anonymity and privacy in Bitcoin. These acivities result in loss of bitcoins and unlawful profit to attackers. Here in this paper we tried to present analysis of major attacks such as malicious attack, greater than 52% attacks and block withholding attack. Also this paper aims to present analysis and improvements in Bitcoin’s anonymity and privacy.
Anas Ahmad, Bharat Bhushan, Nikhil Sharma, Ila Kaushik, and Saurabh Arora
IEEE
This With the ever-growing demand of high internet connectivity and ease of life Internet of Things in 5G has become the need of the hour as it has been the most sort out topic for researchers. The 4G industry has brought a revolution with it in the field of internet connectivity but is quite not enough for advanced IoT device demands and challenges. The upgrade in wireless communication is much needed for a much brighter and advanced future. The 5G will bring better Quality of Service, reliability and scalability to the IoT industry. In this paper we have discussed about the security issues and attacks that can affect working of Internet of Things. We have also explained in detail about the architecture of the 5G IoT system. That is why we have highlighted some of the major application and security aspects of 5G IoT.
Saurabh Arora, Nikhil Sharma, Bharat Bhushan, Ila Kaushik, and Anas Ahmad
IEEE
The fundamental feature of internet of things (IoT) is to integrate the sensing technology along with the technology of radio frequency identification and port these technology on the devices produced now-a-days. As of now the IoT has been facing many issues like poor security measures, high maintenance cost and least reliable. So, there is a need of new emerging technology like 5G which could resolve all these issues. 5G has the capability to introduce features like ultra-dense network support, high reliability with world class security measure. Which make the production of new devices with advance technology highly cost effective. So, in this paper we are going to discuss about what were the IoT based devices were facing before the introduction of emerging technology like 5G and how will be able to resolve out all those issues. Lastly, we will discuss how 5G along with IoT could bring a revolution in the existing technology.
Apeksha Rustagi, Chinkit Manchanda, and Nikhil Sharma
IEEE
Internet of Everything (IoE), the unified conjugate and autonomous coordination of enormous numeral of computing fundamentals and sensors, lifeless and alive beings, progressions and information through the Internet infrastructure. This turns data into actions that generate new abilities, richer skills, and extraordinary economic opportunity for industries, people and nations. Adopting these new technologies gives relaxation in daily life but comes with some issues like protecting the privacy and securing the information of users. This paper is written for the motive to understand and explain the fact that every element comes with two faces: positive as well as negative. The latest ongoing technology of IoE is likewise. The paper consists of the explanation of IoE and IoT technologies and the major differences among them along with the luxuries and comforts provided by the IoE despite of all the threats and challenges it has faced and is facing till now. The future scope and expectations from the IoE based devices are mentioned while concluding this paper.
Rajat Rathi, Nikhil Sharma, Chinkit Manchanda, Bharat Bhushan, and Moksh Grover
IEEE
With the exponential growth of technology within few decades the possibility of smart cities has also increased with an advanced production of fresh services for health, transport, business, education, energy distribution, social activity. As a result, Cyber Physical System (CPS) can prove itself very helpful in the adaptation of projects and applications of smart cities. But with this new security issues have been generated. In this Paper we study the CPS from three perspectives I.e. from security perspective, component perspective and CPS perspective for smart grids and smart cars. The paper then outlines the CPS, CPS models and communication in the CPS. With the increasing number of fresh services, the data is increasing at a very fast pace and this data may lead to the security issues like security attacks and protection from those attacks. The paper may also provide a research agenda for the future.
Sukriti Goyal, Nikhil Sharma, Ila Kaushik, Bharat Bhushan, and Abhijeet Kumar
IEEE
In the network of IoT, a huge amount of data is frequently generated, major messages through complicated networks serving device-to-device communications are swapped and also, sensitive smart world frameworks are controlled and monitored by thousands of gadgets and sensors. To extenuate the acceleration of overcrowding of resources in the network, as an approach edge computing, has risen as a modern approach to resolve requirements of confined computing as well as IoT. In this paper, a brief introduction of Internet of Things and edge computing is discussed which consists of general concepts of IoT and its components, basic introduction of edge computing, and structure of edge computing. After that, fundamental concepts of cloud computing, edge computing and IoT are introduced by comparing their features with each other and a structure of IoT based on edge computing is also illustrated with a slight introduction of the architecture of both the edge computing and IoT. Moreover, the advantages of using the technology of edge computing to assist the technology of IoT are provided as well as the efficiency of integrating these two technologies together is demonstrated. Then, the issues like security and privacy, advanced communication etc. related to combination of IoT and edge computing system are discussed and finally, the conclusion of the paper is presented. So, basically, in this paper, an extensive survey is conducted to analyze how the usage of edge computing progresses the performance of systems of IoT. The performance of edge computing is studied by comparing delay of network, occupation of bandwidth, power utilization, and many other characteristics.
1. Prediction Analysis Techniques of Data Mining: A Review. SSRN Electronic Journal. doi: 10.2139/
2. Privacy Issues & Security Techniques in Big Data. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
3. Evolution of IoT & Data Analytics using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
4. Authentication & Encryption Based Security Services in Blockchain Technology. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
5. Architectural Model of Security Threats & their Countermeasures in IoT. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
6.Traffic Density Investigation & Road Accident Analysis in India using Deep Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
7. Traffic control using V-2-V Based Method using Reinforcement Learning. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
8. Network Layers Threats & its Countermeasures in WSNs. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
9. Analysis of Various Machine Learning Algorithm for Cardiac Pulse Prediction. 2019 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS). doi: 10.1109/
10. Intrusion Detection and Security System for Blackhole Attack. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
11. Performance Measurement Using Different Shortest Path Techniques in Wireless Sensor Network. 2019 2nd International Conference on Signal Processing and Communication (ICSPC). doi: 10.1109/
12. Black Hole Attack and Its Security Measure in Wireless Sensors Networks. Advances in Intelligent Systems and Computing Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenarios, 401–416. doi: 10.1007/978-3-030-40305-8_20
13. Security Countermeasures in Web Based Application. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
14. Taxonomy of Attacks on Web Based Applications. 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT). doi: 10.1109/
15. Comfy Smart Home using IoT. SSRN Electronic Journal. doi: 10.2139/
16. Evaluation of Accidental Death Records Using Hybrid Genetic Algorithm. SSRN Electronic Journal. doi: 10.2139/
17. Evolution of IoT to IIoT: Applications & Challenges. SSRN Electronic Journal. doi:10.2139/
18. Producing Energy Using Blind Man Stick. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
19. Importunity & Evolution of IoT for 5G. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
20. Neoteric Security and Privacy Sanctuary Technologies in Smart Cities. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
21. IoE: A Boon & Threat to the Mankind. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
22. Evolution of 5G Wireless Network in IoT. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
23. Precedence & Issues of IoT based on Edge Computing. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/
24. Security Challenges & Controls in Cyber Physical System. 2020 IEEE 9th International Conference on Communication Systems and Network Technologies (CSNT). doi:10.1109/