Niharika Kumar | Bnmit - Academia.edu (original) (raw)

Papers by Niharika Kumar

Research paper thumbnail of Application of Blockchain in Healthcare - A Systematic Review

Australian Journal of Wireless Technologies, Mobility and Security, 2019

Research paper thumbnail of Modeling the Impact of Covid-19 on the Farm Produce Availability and Pricing in India

Interdisciplinary Journal of Information, Knowledge, and Management, 2022

Aim/Purpose: This paper aims to analyze the availability and pricing of perishable farm produce b... more Aim/Purpose: This paper aims to analyze the availability and pricing of perishable farm produce before and during the lockdown restrictions imposed due to Covid-19. This paper also proposes machine learning and deep learning models to help the farmers decide on an appropriate market to sell their farm produce and get a fair price for their product. Background: Developing countries like India have regulated agricultural markets governed by country-specific protective laws like the Essential Commodities Act and the Agricultural Produce Market Committee (APMC) Act. These regulations restrict the sale of agricultural produce to a predefined set of local markets. Covid-19 pandemic led to a lockdown during the first half of 2020 which resulted in supply disruption and demand-supply mismatch of agricultural commodities at these local markets. These demand-supply dynamics led to disruptions in the pricing of the farm produce leading to a lower price realization for farmers. Hence it is esse...

Research paper thumbnail of A Blockchain-Based Secure and Sustainable Electronic Healthcare Record System

In today’s world, Data is the new gold. Data holds an exorbitant value in a plethora of areas. Th... more In today’s world, Data is the new gold. Data holds an exorbitant value in a plethora of areas. The increase in demand for data is directly proportional to Data Privacy. Blockchain is one of those technologies which helps in data privacy and facilitates data integrity and confidentiality. The healthcare sector is in constant need of data security, privacy, confidentiality and decentralization in electronic medical records. The objective of this paper is primarily to implement blockchain technology for electronic medical records and secondarily to provide secure storage of these records and define access rules for the users of the proposed system.

Research paper thumbnail of Unification of Kyc Process Usingblockchain

Know Your Customer (KYC) process is a mandatory verification step for availing any service from a... more Know Your Customer (KYC) process is a mandatory verification step for availing any service from any service provider. The KYC process is done before getting a job, a broadband connection, a new sim card, applying for a license, a PAN card, opening an account in a bank, and many other such services. The customer submits a certain set of documents to the service provider which contains information that is required to complete the KYC process. This becomes a redundant process when the customer wishes to avail the same services from a different service provider because the same set of documents are used to verify the customer. This burden of the service providers can be minimized by unifying the process of KYC using the Distributed Ledger Technology (DLT). In this method, the KYC process is performed only once, and when the same user wishes to approach a different service provider, then the second service provider can obtain the customer's details without performing the whole proces...

Research paper thumbnail of Sketch to Image Generation Using Generative Adversarial Network

A Generative Adversarial Network is primarily based on the competition between the two neural net... more A Generative Adversarial Network is primarily based on the competition between the two neural networks, namely the generator and the discriminator. This technique is utilized to develop a system that produces realistic images based on the black and white sketch that is provided by the user. Sketches made by novice artists can be converted to colorful images with this system. Each time the user uploads the same sketch, slight changes in the color perspective can be achieved. The model has been trained and tested for the generation of shoes and handbags with an epoch range of 100 for training the model. Since it is a versatile network, given any dataset it can generate images accordingly. The model takes 50 seconds on an average to generate an image from a sketch. The quality of the images has been tested based on Peak Signal to Noise Ratio and Structural Similarity Index. This paper proposes an idea of including Super Resolution Convolutional Neural Network (SRCNN) to the deployed mo...

Research paper thumbnail of Sentiment Analysis of Twitter Messages: Demonetization a Use Case

2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), 2017

Over the years Social Networks have become an important medium for users to express their ideas a... more Over the years Social Networks have become an important medium for users to express their ideas and opinions. Analyzing the social media content helps in understanding the views of a large cross-section of society. This paper enunciates the impact of social networks like twitter on diverse fields like politics, natural disasters, sports and entertainment. The paper proposes sentiment analysis of twitter messages on the topic of demonetization six months post the event. Analysis of the twitter messages reveals that opinion of public is correlated to the news flows like GDP numbers etc. Analysis also reveals that the opinions are polarized and the topic is predominantly being pursued by a smaller set of users.

Research paper thumbnail of IoT architecture and system design for healthcare systems

2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2017

We are entering a new area of information science that we calling the Internet of Things (IoT). I... more We are entering a new area of information science that we calling the Internet of Things (IoT). It connects machine with machine, machine with infrastructure and machine with environment, the Internet of everything. More generally, we see IoT as massive amounts of connected concepts that encompass every aspect of our lives. Meanwhile, architects often explore novel design ideas of their knowledge and skills for innovation, even though such ideas rely on their own experience, expertise or intuition, so that it brings the negative effects on creative architecture design. Numerous studies have investigated that concept-synthesizing processes is a key to creative design. However, there is little work specifically on understanding the use of IoT systems as architecture design stimuli. In this paper, we present a model of using IoT systems as design stimuli for architecture concept generation, in this model we abstract IoT systems into 'input part', 'process part' and 'output part'. Through a controlled experiment and extended protocol analysis, this research showed that IoT systems stimulate creative architecture design both in design process and design result, in addition, participants often choose the 'input part' as design stimuli while 'input part' and 'output part' both have the promoter action to creativity. Moreover, 'process part' prefers to enhance the extension of idea space in concept generation process.

Research paper thumbnail of Machine Learning Techniques in Healthcare—A Survey

Journal of Computational and Theoretical Nanoscience, 2020

The development of science and technology has led to a very busy lifestyle among urban people acr... more The development of science and technology has led to a very busy lifestyle among urban people across the globe. Due to the advent of cutting-edge technologies, connectivity and networking is a boon to the people living in urban areas. Thus, a vast amount of patient data from admission, treatment and discharge is collected across the clinical community. These rich data being available online has been under-utilized and the question arises on how best the data can be utilized. With the centralized data and powerful data analytical algorithms are running in powerful machines, until recent past, the machine learning is yet to be used for improving the diagnosis, prediction and secure data access process in healthcare. In this proposal, machine learning algorithms are used for enhanced medical diagnosis, personalized healthcare, predicting disease outbreaks in certain regions and measures for securing healthcare data from malicious attacks. The work focuses on 3 major chronic diseases su...

Research paper thumbnail of Gene Therapy: Selective Gene Replacement and its Application in Image Processing

Research paper thumbnail of DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX

Communications in Computer and Information Science, 2011

VV Das, J. Stephen, and Y. Chaba (Eds.): CNC 2011, CCIS 142, pp. 229–236, 2011. © Springer-Verlag... more VV Das, J. Stephen, and Y. Chaba (Eds.): CNC 2011, CCIS 142, pp. 229–236, 2011. © Springer-Verlag Berlin Heidelberg 2011 DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX Niharika Kumar1, KN Balasubramanya Murthy1, and Amitkeerti M. Lagare2 ...

Research paper thumbnail of Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

International Journal of Advanced Computer Science and Applications, 2013

IEEE 802.16 provides quality of service by providing five different service classes. When a packe... more IEEE 802.16 provides quality of service by providing five different service classes. When a packet reaches the MAC layer, the packet classifier has to classify the packet such that the packet is associated with appropriate QoS. In this paper a packet classification algorithm is proposed that exploits the HTTP header of the application layer to determine the type of data and classify the data. The extension and MIME type (content type) headers are used to classify the packets. Further the algorithm is enhanced by considering the type of user as an additional parameter during packet classification. Simulations are done on variable bit rate video data. Based on the type of video the packets are classified as RTPS or nRTPS thereby providing differentiated QoS. Simulation results reveal that high priority video classified as RTPS traffic receive higher throughput compared to video of lower priority. The delay faced by high priority videos is correspondingly less compared to low priority video.

Research paper thumbnail of Novel bandwidth allocation and packet scheduling strategy for WiMAX

International Journal of Wireless and Mobile Computing, 2014

IEEE 802.16 and its variants provide Quality of Service (QoS) by dividing the data traffic into f... more IEEE 802.16 and its variants provide Quality of Service (QoS) by dividing the data traffic into five service classes governed by QoS parameters. Efficient bandwidth allocation algorithm and packet scheduling algorithms ensure that the desired QoS requirements are met. In this paper, a novel bandwidth allocation algorithm and a packet scheduling algorithm are proposed that regulate bandwidth intensive connections by applying three-strike technique. The proposed algorithms ensure that the bandwidth is distributed effectively among the conforming connections thereby improving the overall QoS of the network. Simulation results of the proposed algorithm, when compared with standard algorithms like Earliest Deadline First (EDF), reveal that the proposed algorithm significantly increases the throughput and decreases the data drop for the conforming connection as compared to the EDF algorithm. Throughput improvements and data drop reduction are seen for intra-class inter-MS connections as well as inter-class intra-MS connections.

Research paper thumbnail of User Oriented Quality of Service Framework for WiMAX

Wireless Communications and Networks - Recent Advances, 2012

Research paper thumbnail of Mutually shared bandwidth allocation mechanism in IEEE 802.16e

2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), 2013

ABSTRACT IEEE 802.16e network implements a centralized resource management system where the Base ... more ABSTRACT IEEE 802.16e network implements a centralized resource management system where the Base Station is responsible for allocating bandwidth to all the mobile stations. A fair bandwidth allocation algorithm ensures better quality of service and efficient utilization of precious wireless resource. In this paper a novel bandwidth allocation algorithm is proposed that aims to improve the throughput of the network by efficiently sharing the bandwidth among the users. A unique bandwidth allocation mechanism is proposed that tries to reduce the overhead in a frame to improve the overall throughput of the mobile station. Simulation results shows a 2-5% improvement in throughput of the MS. A reduction in the frame overhead is also observed in the simulation.

Research paper thumbnail of Novel, graded, priority-oriented admission control in mobile networks

TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, 2016

Call admission control plays a crucial role in providing quality of service to the different serv... more Call admission control plays a crucial role in providing quality of service to the different services in mobile broadband networks (WiMAX, LTE). A new connection is admitted only when the network can support the QoS needs of the connection without degrading the QoS for existing connections. An efficient call admission control algorithm ensures higher throughput and fewer delays for the admitted connections. In this paper a graded priority-based call admission control algorithm is proposed for LTE and WiMAX networks. The number of permissible connections shall be segregated into two classes. The new connection shall be graded, prioritized, and admitted based on the device requesting the connection. Simulation results show that graded priority-based admission control algorithm improves the connection admission rate from 3% to as high as 30% for select users. This results in higher throughput for priority users.

Research paper thumbnail of Novel user centric, game theory based bandwidth allocation mechanism in WiMAX

Human-centric Computing and Information Sciences, 2013

Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX ... more Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX supports non-contention based bandwidth allocation mechanism, where the responsibility of bandwidth allocation lies with the base station. In this paper, a novel user- centric, Game Theory-based bandwidth allocation algorithm is proposed. The Users/Mobile Station shall be grouped in pairs and bandwidth allocation is performed alternately between the two users of a group. In any given frame only one user from a pair is allocated bandwidth. The bandwidth thus allocated shall satisfy the requirements of the user/mobile station for two consecutive frames. Since, in any given frame, only one user/MS is allocated the bandwidth, the proposed algorithm reduces the frame overhead, thereby saving precious bandwidth that can be utilized to improve throughput. Simulation results show a 50% decrease in the uplink frame overhead and about 8% improvement in the uplink throughput per user/mobile station.

Research paper thumbnail of Application of Blockchain in Healthcare - A Systematic Review

Australian Journal of Wireless Technologies, Mobility and Security, 2019

Research paper thumbnail of Modeling the Impact of Covid-19 on the Farm Produce Availability and Pricing in India

Interdisciplinary Journal of Information, Knowledge, and Management, 2022

Aim/Purpose: This paper aims to analyze the availability and pricing of perishable farm produce b... more Aim/Purpose: This paper aims to analyze the availability and pricing of perishable farm produce before and during the lockdown restrictions imposed due to Covid-19. This paper also proposes machine learning and deep learning models to help the farmers decide on an appropriate market to sell their farm produce and get a fair price for their product. Background: Developing countries like India have regulated agricultural markets governed by country-specific protective laws like the Essential Commodities Act and the Agricultural Produce Market Committee (APMC) Act. These regulations restrict the sale of agricultural produce to a predefined set of local markets. Covid-19 pandemic led to a lockdown during the first half of 2020 which resulted in supply disruption and demand-supply mismatch of agricultural commodities at these local markets. These demand-supply dynamics led to disruptions in the pricing of the farm produce leading to a lower price realization for farmers. Hence it is esse...

Research paper thumbnail of A Blockchain-Based Secure and Sustainable Electronic Healthcare Record System

In today’s world, Data is the new gold. Data holds an exorbitant value in a plethora of areas. Th... more In today’s world, Data is the new gold. Data holds an exorbitant value in a plethora of areas. The increase in demand for data is directly proportional to Data Privacy. Blockchain is one of those technologies which helps in data privacy and facilitates data integrity and confidentiality. The healthcare sector is in constant need of data security, privacy, confidentiality and decentralization in electronic medical records. The objective of this paper is primarily to implement blockchain technology for electronic medical records and secondarily to provide secure storage of these records and define access rules for the users of the proposed system.

Research paper thumbnail of Unification of Kyc Process Usingblockchain

Know Your Customer (KYC) process is a mandatory verification step for availing any service from a... more Know Your Customer (KYC) process is a mandatory verification step for availing any service from any service provider. The KYC process is done before getting a job, a broadband connection, a new sim card, applying for a license, a PAN card, opening an account in a bank, and many other such services. The customer submits a certain set of documents to the service provider which contains information that is required to complete the KYC process. This becomes a redundant process when the customer wishes to avail the same services from a different service provider because the same set of documents are used to verify the customer. This burden of the service providers can be minimized by unifying the process of KYC using the Distributed Ledger Technology (DLT). In this method, the KYC process is performed only once, and when the same user wishes to approach a different service provider, then the second service provider can obtain the customer's details without performing the whole proces...

Research paper thumbnail of Sketch to Image Generation Using Generative Adversarial Network

A Generative Adversarial Network is primarily based on the competition between the two neural net... more A Generative Adversarial Network is primarily based on the competition between the two neural networks, namely the generator and the discriminator. This technique is utilized to develop a system that produces realistic images based on the black and white sketch that is provided by the user. Sketches made by novice artists can be converted to colorful images with this system. Each time the user uploads the same sketch, slight changes in the color perspective can be achieved. The model has been trained and tested for the generation of shoes and handbags with an epoch range of 100 for training the model. Since it is a versatile network, given any dataset it can generate images accordingly. The model takes 50 seconds on an average to generate an image from a sketch. The quality of the images has been tested based on Peak Signal to Noise Ratio and Structural Similarity Index. This paper proposes an idea of including Super Resolution Convolutional Neural Network (SRCNN) to the deployed mo...

Research paper thumbnail of Sentiment Analysis of Twitter Messages: Demonetization a Use Case

2017 2nd International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), 2017

Over the years Social Networks have become an important medium for users to express their ideas a... more Over the years Social Networks have become an important medium for users to express their ideas and opinions. Analyzing the social media content helps in understanding the views of a large cross-section of society. This paper enunciates the impact of social networks like twitter on diverse fields like politics, natural disasters, sports and entertainment. The paper proposes sentiment analysis of twitter messages on the topic of demonetization six months post the event. Analysis of the twitter messages reveals that opinion of public is correlated to the news flows like GDP numbers etc. Analysis also reveals that the opinions are polarized and the topic is predominantly being pursued by a smaller set of users.

Research paper thumbnail of IoT architecture and system design for healthcare systems

2017 International Conference On Smart Technologies For Smart Nation (SmartTechCon), 2017

We are entering a new area of information science that we calling the Internet of Things (IoT). I... more We are entering a new area of information science that we calling the Internet of Things (IoT). It connects machine with machine, machine with infrastructure and machine with environment, the Internet of everything. More generally, we see IoT as massive amounts of connected concepts that encompass every aspect of our lives. Meanwhile, architects often explore novel design ideas of their knowledge and skills for innovation, even though such ideas rely on their own experience, expertise or intuition, so that it brings the negative effects on creative architecture design. Numerous studies have investigated that concept-synthesizing processes is a key to creative design. However, there is little work specifically on understanding the use of IoT systems as architecture design stimuli. In this paper, we present a model of using IoT systems as design stimuli for architecture concept generation, in this model we abstract IoT systems into 'input part', 'process part' and 'output part'. Through a controlled experiment and extended protocol analysis, this research showed that IoT systems stimulate creative architecture design both in design process and design result, in addition, participants often choose the 'input part' as design stimuli while 'input part' and 'output part' both have the promoter action to creativity. Moreover, 'process part' prefers to enhance the extension of idea space in concept generation process.

Research paper thumbnail of Machine Learning Techniques in Healthcare—A Survey

Journal of Computational and Theoretical Nanoscience, 2020

The development of science and technology has led to a very busy lifestyle among urban people acr... more The development of science and technology has led to a very busy lifestyle among urban people across the globe. Due to the advent of cutting-edge technologies, connectivity and networking is a boon to the people living in urban areas. Thus, a vast amount of patient data from admission, treatment and discharge is collected across the clinical community. These rich data being available online has been under-utilized and the question arises on how best the data can be utilized. With the centralized data and powerful data analytical algorithms are running in powerful machines, until recent past, the machine learning is yet to be used for improving the diagnosis, prediction and secure data access process in healthcare. In this proposal, machine learning algorithms are used for enhanced medical diagnosis, personalized healthcare, predicting disease outbreaks in certain regions and measures for securing healthcare data from malicious attacks. The work focuses on 3 major chronic diseases su...

Research paper thumbnail of Gene Therapy: Selective Gene Replacement and its Application in Image Processing

Research paper thumbnail of DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX

Communications in Computer and Information Science, 2011

VV Das, J. Stephen, and Y. Chaba (Eds.): CNC 2011, CCIS 142, pp. 229–236, 2011. © Springer-Verlag... more VV Das, J. Stephen, and Y. Chaba (Eds.): CNC 2011, CCIS 142, pp. 229–236, 2011. © Springer-Verlag Berlin Heidelberg 2011 DBAM: Novel User Based Bandwidth Allocation Mechanism in WiMAX Niharika Kumar1, KN Balasubramanya Murthy1, and Amitkeerti M. Lagare2 ...

Research paper thumbnail of Novel MIME Type and Extension Based Packet Classification Algorithm in WiMAX

International Journal of Advanced Computer Science and Applications, 2013

IEEE 802.16 provides quality of service by providing five different service classes. When a packe... more IEEE 802.16 provides quality of service by providing five different service classes. When a packet reaches the MAC layer, the packet classifier has to classify the packet such that the packet is associated with appropriate QoS. In this paper a packet classification algorithm is proposed that exploits the HTTP header of the application layer to determine the type of data and classify the data. The extension and MIME type (content type) headers are used to classify the packets. Further the algorithm is enhanced by considering the type of user as an additional parameter during packet classification. Simulations are done on variable bit rate video data. Based on the type of video the packets are classified as RTPS or nRTPS thereby providing differentiated QoS. Simulation results reveal that high priority video classified as RTPS traffic receive higher throughput compared to video of lower priority. The delay faced by high priority videos is correspondingly less compared to low priority video.

Research paper thumbnail of Novel bandwidth allocation and packet scheduling strategy for WiMAX

International Journal of Wireless and Mobile Computing, 2014

IEEE 802.16 and its variants provide Quality of Service (QoS) by dividing the data traffic into f... more IEEE 802.16 and its variants provide Quality of Service (QoS) by dividing the data traffic into five service classes governed by QoS parameters. Efficient bandwidth allocation algorithm and packet scheduling algorithms ensure that the desired QoS requirements are met. In this paper, a novel bandwidth allocation algorithm and a packet scheduling algorithm are proposed that regulate bandwidth intensive connections by applying three-strike technique. The proposed algorithms ensure that the bandwidth is distributed effectively among the conforming connections thereby improving the overall QoS of the network. Simulation results of the proposed algorithm, when compared with standard algorithms like Earliest Deadline First (EDF), reveal that the proposed algorithm significantly increases the throughput and decreases the data drop for the conforming connection as compared to the EDF algorithm. Throughput improvements and data drop reduction are seen for intra-class inter-MS connections as well as inter-class intra-MS connections.

Research paper thumbnail of User Oriented Quality of Service Framework for WiMAX

Wireless Communications and Networks - Recent Advances, 2012

Research paper thumbnail of Mutually shared bandwidth allocation mechanism in IEEE 802.16e

2013 IEEE Symposium on Wireless Technology & Applications (ISWTA), 2013

ABSTRACT IEEE 802.16e network implements a centralized resource management system where the Base ... more ABSTRACT IEEE 802.16e network implements a centralized resource management system where the Base Station is responsible for allocating bandwidth to all the mobile stations. A fair bandwidth allocation algorithm ensures better quality of service and efficient utilization of precious wireless resource. In this paper a novel bandwidth allocation algorithm is proposed that aims to improve the throughput of the network by efficiently sharing the bandwidth among the users. A unique bandwidth allocation mechanism is proposed that tries to reduce the overhead in a frame to improve the overall throughput of the mobile station. Simulation results shows a 2-5% improvement in throughput of the MS. A reduction in the frame overhead is also observed in the simulation.

Research paper thumbnail of Novel, graded, priority-oriented admission control in mobile networks

TURKISH JOURNAL OF ELECTRICAL ENGINEERING & COMPUTER SCIENCES, 2016

Call admission control plays a crucial role in providing quality of service to the different serv... more Call admission control plays a crucial role in providing quality of service to the different services in mobile broadband networks (WiMAX, LTE). A new connection is admitted only when the network can support the QoS needs of the connection without degrading the QoS for existing connections. An efficient call admission control algorithm ensures higher throughput and fewer delays for the admitted connections. In this paper a graded priority-based call admission control algorithm is proposed for LTE and WiMAX networks. The number of permissible connections shall be segregated into two classes. The new connection shall be graded, prioritized, and admitted based on the device requesting the connection. Simulation results show that graded priority-based admission control algorithm improves the connection admission rate from 3% to as high as 30% for select users. This results in higher throughput for priority users.

Research paper thumbnail of Novel user centric, game theory based bandwidth allocation mechanism in WiMAX

Human-centric Computing and Information Sciences, 2013

Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX ... more Bandwidth allocation plays a crucial role in ensuring overall quality of service in WiMAX. WiMAX supports non-contention based bandwidth allocation mechanism, where the responsibility of bandwidth allocation lies with the base station. In this paper, a novel user- centric, Game Theory-based bandwidth allocation algorithm is proposed. The Users/Mobile Station shall be grouped in pairs and bandwidth allocation is performed alternately between the two users of a group. In any given frame only one user from a pair is allocated bandwidth. The bandwidth thus allocated shall satisfy the requirements of the user/mobile station for two consecutive frames. Since, in any given frame, only one user/MS is allocated the bandwidth, the proposed algorithm reduces the frame overhead, thereby saving precious bandwidth that can be utilized to improve throughput. Simulation results show a 50% decrease in the uplink frame overhead and about 8% improvement in the uplink throughput per user/mobile station.