Vikash Yadav | Indian Institute of Technology (BHU), Varanasi (original) (raw)
Papers by Vikash Yadav
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier ... more INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier state-of-the-art machine learning techniques in many areas, with one of the most notable cases being computer vision. Deep learning is also employed to train the neural networks with the images and to perform the various tasks such as classification and segmentation using several different models. The size and depth of current deep learning models have increased to solve certain tasks as these models provide better accuracy. As pre-trained weights may be used for further training and prevent costly computing, transfer learning is therefore of vital importance. A brief account is given of their history, structure, benefits, and drawbacks, followed by a description of their applications in the different tasks of computer vision, such as object detection, face recognition etc. OBJECTIVE:. The purpose of this paper is to train a deep neural network to properly classify the images that it has never seen before, define techniques to enhance the efficiency of deep learning and deploy deep neural networks in various applications. METHOD: The proposed approach represents that after the reading of images, 256x256 pixel image's random parts are extracted and noise, distortion, flip, or rotation transforms are applied. Multiple convolution and pooling steps are applied by controlling the stride lengths. RESULT: Data analysis and research findings showed that DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. The proposed work outperforms the previous techniques in predicting the dependent variables, learning rate, image count, image mean, performance analysis of loss rate and learning rate during training, performance Analysis of Loss with respect to Epoch for Training, Validation and Accuracy. CONCLUSION: This research encompasses a large variety of computer applications, from image recognition and machine translation to enhanced learning. DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. Extensive research has been conducted using the various deep architectures such as AlexNet, InceptionNet, etc. To the best of authors' knowledge, this is the first work that presents a quantitative analysis of the deep architectures mentioned above.
Journal of Scientific and Industrial Research (JSIR), Aug 31, 2021
Various features come from relational data often used to enhance the prediction of statistical mo... more Various features come from relational data often used to enhance the prediction of statistical models. The features increases as the feature space increases. We proposed a framework, which generates the features for feature selection using support vector machine with (1) augmentation of relational concepts using classification-type approach (2) various strategy to generate features. Classification are used to increase the productivity of feature space by adding new techniques used to create new features and lead to enhance the accuracy of the model. The feature generation in run-time lead to the building of models with higher accuracy despite generating features in advance. Our results in different applications of data mining in different relations are far better from existing results.
Journal of Scientific & Industrial Research, Nov 3, 2021
The production and distribution of COVID-19 testing kits is an urgent and increasingly worldwide ... more The production and distribution of COVID-19 testing kits is an urgent and increasingly worldwide requirement, due to the ongoing pandemic. The accuracy of the kit is critically important and to save the world from the faulty kit becomes an issue. The kit before use has to be approved by an authorized medical research agency like US-FDA, ICMR, etc. In this paper, we proposed a framework that ensures that the testing kit is validated by various measures and gives the history of the supply chain of the testing kit. The parties that are used in the supply chain are Notary, Manufacturer, and Validating Party. A Consumer also plays an important role and can punch the batch number to check whether the kit is approved or not. The framework is developed using R3 Corda, a permissioned distributed ledger technology. A permissioned blockchain is used for data privacy and security so that only trusted parties can leave or join the system.
AUTO FARMER is one of the mean machine project. In the world of increasing population the demand ... more AUTO FARMER is one of the mean machine project. In the world of increasing population the demand for increase in growth of the food increases, this demands greater productivity with greater quality. The aim of AUTO FARMER USING RENEWABLE ENERGY is to provide automation and create a imprint in the field of agriculture. Today the farming underwent many difficulties like depending on rain, the restless manual work and the efforts .
Abstract- This paper builds about the analysis of electricity board efforts to providing electric... more Abstract- This paper builds about the analysis of electricity board efforts to providing electricity each required places and to maintaining all the complications. To reduce a complication about meter reading, implement a transmitter into that meter which can be able to provide instant reading of that meter to a specified location/substation.
Soft Computing Applications, 2020
Soft Computing Applications, 2020
Image classification is the elementary and widely addressed task in computer vision. Classificati... more Image classification is the elementary and widely addressed task in computer vision. Classification of monument architecture is a real challenge due to its structural complexity. Analyzing architecture using the machine learning or data mining techniques can be useful. Various feature descriptors are used for large scale image classification. In this context, optimal feature descriptors as filters are used in Convolutional Neural Network. When analyzing architecture using the machine learning or data mining techniques, it can be useful to infer whether it is Cathedral or Indian Mughal Monuments in architecture involved. This paper focuses on architecture recognition, which has been studied extensively in the history literature, using Convolutional Neural Network (CNN) based on highly effective Tensorflow, an open source software library. The important task is to generalize the model to perform well on the new database. Ontology performs a significance role in learning to categorize given picture into metaphysical classes. A deep learning based approach is used to train the convolutional neural network. In the proposed work, images are classified into Cathedrals and Indian Mughal Monuments. Experimental results demonstrate that the method can successfully classify if the given image is Cathedral or Indian Mughal Monument which mainly includes the Taj Mahal and Char Minar. Proposed method substantially outperform state-of art approaches which is demonstrated by satisfactory result obtained on the dataset.
Recommendation systems are refining mechanism to envisage the ratings for items and users, to rec... more Recommendation systems are refining mechanism to envisage the ratings for items and users, to recommend likes mainly from the big data. Our proposed recommendation system gives a mechanism to users to classify with the same interest. This recommender system becomes core to recommend the e-commerce and various websites applications based on similar likes. This central idea of our work is to develop movie recommender system with the help of clustering using K-means clustering technique and data pre-processing using Principal Component Analysis (PCA). In this proposed work, new recommendation technique has been presented using K-means clustering, PCA and sampling with the help of MovieLens dataset. Our proposed method and its subsequent results have been discussed and collation with other existing methods using evaluation metrics like Dunn Index, average similarity and computational time has been also explained and prove that our technique is best among other techniques. The results ac...
As demand for higher data rates is continuously rising, there is always a need to develop more ef... more As demand for higher data rates is continuously rising, there is always a need to develop more efficient wireless communication systems. Efficient use of the spectrum is an essential problem in creating any multi-user cellular mobile system. The bandwidth requirements of the future 4G systems far exceed what the existing traditional setup can provide. A more creative utilization of the available bandwidth is more important now than ever before. The work described in this paper is my effort in this direction. I evaluated interference and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find out the effect of fading in MC DS-CDMA system. Performance analysis of a multi carrier direct sequence CDMA system will be carried out including the effect of fading. In this Paper, our main objective is to evaluate the effect of fading and Inter Carrier Interference (ICI) in a MC DS CDMA wireless system, to find out the expr...
Multi-relational classification is highly challengeable task in data mining, because so much data... more Multi-relational classification is highly challengeable task in data mining, because so much data in our world is organised in multiple relations. The challenge comes from the huge collection of search spaces and high calculation cost arises in the selection of feature due to excessive complexity in the various relations. The state-of-the-art approach is based on clusters and inductive logical programming to retrieve important features and derived hypothesis. However, those techniques are very slow and unable to create enough data and information to produce efficient classifiers. In the given paper, we proposed a fast and effective method for the feature selection using multi-relational classification. Moreover we introduced the natural join and SVM based feature selection in multi-relation statistical learning. The performance of our model on various datasets indicates that our model is efficient, reliable and highly accurate.
The experiment was pursued in Tissue Culture Laboratory of Department of Horticulture in Sardar V... more The experiment was pursued in Tissue Culture Laboratory of Department of Horticulture in Sardar Vallabhbhai Patel University of Agriculture & Technology Meerut during 2016-17 on Udhayam variety of Banana. MS media were prepared. The minimum time of callus induction (24.41 days) was observed in treatment 2,4-D 4.00 mgl; while maximum (39.42 days) was noted under control. With the combination of BAP and Kinetin, the earliest shoot initiation (9.87 days) was noted under BAP 4.00 mgl 1 + Kinetin 2.00 mgl. The minimum days taken for shoot develop (11.47 days) was noted under BAP 4.00 mgl + Kinetin 2.00 mgl. After, 40 and 60 days maximum number of shoots obtained (5.40) and (71.10) were noted under the same treatment of BAP 4.00 mgl + Kinetin 2.00 mgl. Maximum percentage of developed shoots obtained (80.95%) was noted under the same treatment of BAP and Kinetin. Maximum shoot length obtained (4.26cm), (5.03cm) and (6.10cm) after 28, 35 and 42 days under the treatment of BAP 4.00 mgl + Kin...
The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. ... more The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. WAP uses WTLS, a wireless variant of the SSL/TLS protocol, to secure the communication between the mobile phone and other parts of the WAP architecture. Originally, WAP was designed with a gateway in the middle, acting as the interpreter between the Internet protocol stack and the Wireless Application Protocol stack. The WAP gateway forwards web content to the mobile phone in a way intended to accommodate the limited bandwidth of the mobile network and the mobile phones limited processing capability. However, the gateway introduces a security hole, which renders WAP unsuitable for any security-sensitive services like Banking.
The 5G networks are very important to support complex application by connecting different types o... more The 5G networks are very important to support complex application by connecting different types of machines and devices, which provide the platform for different spoofing attacks. Traditional physical layer and cryptography authentication methods are facing problems in dynamic complex environment, including less reliability, security overhead also problem in predefined authentication system, giving protection and learn about time-varying attributes. In this paper, intrusion detection framework has been designed using various machine learning methods with the help of physical layer attributes and to provide more efficient system to increase the security. Machine learning methods for the intelligent intrusion detection are introduced, especially for supervised and non-supervised methods. Our machine learning based intelligent intrusion detection technique for the 5G and beyond networks is evaluated in terms of recall, precision, accuracy and f-value are validated for unpredictable dyn...
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2018
INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted peo... more INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted people to mobile learning in real time wireless classroom from the physical face-to-face classroom. OBJECTIVE: Mobile learning has been present for years but the use of mobile learning is more in the current scenario due to COVID-19. However, people's acceptance of mobile learning education at institutions is still low. Thus, this research seeks to understand the student's perspective by analysing constructs hypothesized in the proposed hybrid model. METHOD: Data is collected using a survey from an Indian institute of the Meerut region with a total of 1022 students. RESULT: Data analysis and research findings showed that Random Forest and K-Nearest Neighbour Algorithms outperforms than other classifiers in predicting the dependent variables with better accuracy rate, precision, and recall value in this study. CONCLUSION: The research findings will help the designers and software development to design learning applications considering the perspective of students with respect to 5G technology.
International Journal of Current Microbiology and Applied Sciences, 2020
International Journal for Research in Applied Science and Engineering Technology, 2018
Test case generation is the most effort consuming part of software testing. Once the test cases w... more Test case generation is the most effort consuming part of software testing. Once the test cases were generated these were used to test the software for quality. These inputs were fed as inputs to the software to compare the observed and expected results. This comparison need to be done automatically. In this paper, a model is proposed to improve the process of software testing to improve the overall quality of software.
International Journal of Advanced Intelligence Paradigms, 2019
International Journal of Advanced Intelligence Paradigms, 2019
Genome Biology, 2019
Following publication of the original article [1], the authors reported that Additional file 4, "... more Following publication of the original article [1], the authors reported that Additional file 4, "Table S5. Parentof-origin RNAseq dataset of 4 DAP INTACT-purified endosperm of Col × Ler reciprocal crosses" had the following error: Column 6, labeled as "Reads_Mat_Ler", should say "Reads_pat_Col". Column 7, labeled as "Reads_pat_Ler", should say "Reads_mat_Ler". The updated Additional file 4 is published in this correction. Additional file Additional file 4: Table S5. Parent-of-origin RNAseq dataset of 4 DAP INTACT-purified endosperm of Col × Ler reciprocal crosses.
International Journal of Advanced Intelligence Paradigms, 2019
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2021
INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier ... more INTRODUCTION: In recent years, deep learning techniques have been made to outperform the earlier state-of-the-art machine learning techniques in many areas, with one of the most notable cases being computer vision. Deep learning is also employed to train the neural networks with the images and to perform the various tasks such as classification and segmentation using several different models. The size and depth of current deep learning models have increased to solve certain tasks as these models provide better accuracy. As pre-trained weights may be used for further training and prevent costly computing, transfer learning is therefore of vital importance. A brief account is given of their history, structure, benefits, and drawbacks, followed by a description of their applications in the different tasks of computer vision, such as object detection, face recognition etc. OBJECTIVE:. The purpose of this paper is to train a deep neural network to properly classify the images that it has never seen before, define techniques to enhance the efficiency of deep learning and deploy deep neural networks in various applications. METHOD: The proposed approach represents that after the reading of images, 256x256 pixel image's random parts are extracted and noise, distortion, flip, or rotation transforms are applied. Multiple convolution and pooling steps are applied by controlling the stride lengths. RESULT: Data analysis and research findings showed that DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. The proposed work outperforms the previous techniques in predicting the dependent variables, learning rate, image count, image mean, performance analysis of loss rate and learning rate during training, performance Analysis of Loss with respect to Epoch for Training, Validation and Accuracy. CONCLUSION: This research encompasses a large variety of computer applications, from image recognition and machine translation to enhanced learning. DNN models have been implemented in three main configurations of deep learning: CNTK, MXNet and TensorFlow. Extensive research has been conducted using the various deep architectures such as AlexNet, InceptionNet, etc. To the best of authors' knowledge, this is the first work that presents a quantitative analysis of the deep architectures mentioned above.
Journal of Scientific and Industrial Research (JSIR), Aug 31, 2021
Various features come from relational data often used to enhance the prediction of statistical mo... more Various features come from relational data often used to enhance the prediction of statistical models. The features increases as the feature space increases. We proposed a framework, which generates the features for feature selection using support vector machine with (1) augmentation of relational concepts using classification-type approach (2) various strategy to generate features. Classification are used to increase the productivity of feature space by adding new techniques used to create new features and lead to enhance the accuracy of the model. The feature generation in run-time lead to the building of models with higher accuracy despite generating features in advance. Our results in different applications of data mining in different relations are far better from existing results.
Journal of Scientific & Industrial Research, Nov 3, 2021
The production and distribution of COVID-19 testing kits is an urgent and increasingly worldwide ... more The production and distribution of COVID-19 testing kits is an urgent and increasingly worldwide requirement, due to the ongoing pandemic. The accuracy of the kit is critically important and to save the world from the faulty kit becomes an issue. The kit before use has to be approved by an authorized medical research agency like US-FDA, ICMR, etc. In this paper, we proposed a framework that ensures that the testing kit is validated by various measures and gives the history of the supply chain of the testing kit. The parties that are used in the supply chain are Notary, Manufacturer, and Validating Party. A Consumer also plays an important role and can punch the batch number to check whether the kit is approved or not. The framework is developed using R3 Corda, a permissioned distributed ledger technology. A permissioned blockchain is used for data privacy and security so that only trusted parties can leave or join the system.
AUTO FARMER is one of the mean machine project. In the world of increasing population the demand ... more AUTO FARMER is one of the mean machine project. In the world of increasing population the demand for increase in growth of the food increases, this demands greater productivity with greater quality. The aim of AUTO FARMER USING RENEWABLE ENERGY is to provide automation and create a imprint in the field of agriculture. Today the farming underwent many difficulties like depending on rain, the restless manual work and the efforts .
Abstract- This paper builds about the analysis of electricity board efforts to providing electric... more Abstract- This paper builds about the analysis of electricity board efforts to providing electricity each required places and to maintaining all the complications. To reduce a complication about meter reading, implement a transmitter into that meter which can be able to provide instant reading of that meter to a specified location/substation.
Soft Computing Applications, 2020
Soft Computing Applications, 2020
Image classification is the elementary and widely addressed task in computer vision. Classificati... more Image classification is the elementary and widely addressed task in computer vision. Classification of monument architecture is a real challenge due to its structural complexity. Analyzing architecture using the machine learning or data mining techniques can be useful. Various feature descriptors are used for large scale image classification. In this context, optimal feature descriptors as filters are used in Convolutional Neural Network. When analyzing architecture using the machine learning or data mining techniques, it can be useful to infer whether it is Cathedral or Indian Mughal Monuments in architecture involved. This paper focuses on architecture recognition, which has been studied extensively in the history literature, using Convolutional Neural Network (CNN) based on highly effective Tensorflow, an open source software library. The important task is to generalize the model to perform well on the new database. Ontology performs a significance role in learning to categorize given picture into metaphysical classes. A deep learning based approach is used to train the convolutional neural network. In the proposed work, images are classified into Cathedrals and Indian Mughal Monuments. Experimental results demonstrate that the method can successfully classify if the given image is Cathedral or Indian Mughal Monument which mainly includes the Taj Mahal and Char Minar. Proposed method substantially outperform state-of art approaches which is demonstrated by satisfactory result obtained on the dataset.
Recommendation systems are refining mechanism to envisage the ratings for items and users, to rec... more Recommendation systems are refining mechanism to envisage the ratings for items and users, to recommend likes mainly from the big data. Our proposed recommendation system gives a mechanism to users to classify with the same interest. This recommender system becomes core to recommend the e-commerce and various websites applications based on similar likes. This central idea of our work is to develop movie recommender system with the help of clustering using K-means clustering technique and data pre-processing using Principal Component Analysis (PCA). In this proposed work, new recommendation technique has been presented using K-means clustering, PCA and sampling with the help of MovieLens dataset. Our proposed method and its subsequent results have been discussed and collation with other existing methods using evaluation metrics like Dunn Index, average similarity and computational time has been also explained and prove that our technique is best among other techniques. The results ac...
As demand for higher data rates is continuously rising, there is always a need to develop more ef... more As demand for higher data rates is continuously rising, there is always a need to develop more efficient wireless communication systems. Efficient use of the spectrum is an essential problem in creating any multi-user cellular mobile system. The bandwidth requirements of the future 4G systems far exceed what the existing traditional setup can provide. A more creative utilization of the available bandwidth is more important now than ever before. The work described in this paper is my effort in this direction. I evaluated interference and bit error rate for multicarrier code division multiple access wireless communication system. In this thesis my concern is find out the effect of fading in MC DS-CDMA system. Performance analysis of a multi carrier direct sequence CDMA system will be carried out including the effect of fading. In this Paper, our main objective is to evaluate the effect of fading and Inter Carrier Interference (ICI) in a MC DS CDMA wireless system, to find out the expr...
Multi-relational classification is highly challengeable task in data mining, because so much data... more Multi-relational classification is highly challengeable task in data mining, because so much data in our world is organised in multiple relations. The challenge comes from the huge collection of search spaces and high calculation cost arises in the selection of feature due to excessive complexity in the various relations. The state-of-the-art approach is based on clusters and inductive logical programming to retrieve important features and derived hypothesis. However, those techniques are very slow and unable to create enough data and information to produce efficient classifiers. In the given paper, we proposed a fast and effective method for the feature selection using multi-relational classification. Moreover we introduced the natural join and SVM based feature selection in multi-relation statistical learning. The performance of our model on various datasets indicates that our model is efficient, reliable and highly accurate.
The experiment was pursued in Tissue Culture Laboratory of Department of Horticulture in Sardar V... more The experiment was pursued in Tissue Culture Laboratory of Department of Horticulture in Sardar Vallabhbhai Patel University of Agriculture & Technology Meerut during 2016-17 on Udhayam variety of Banana. MS media were prepared. The minimum time of callus induction (24.41 days) was observed in treatment 2,4-D 4.00 mgl; while maximum (39.42 days) was noted under control. With the combination of BAP and Kinetin, the earliest shoot initiation (9.87 days) was noted under BAP 4.00 mgl 1 + Kinetin 2.00 mgl. The minimum days taken for shoot develop (11.47 days) was noted under BAP 4.00 mgl + Kinetin 2.00 mgl. After, 40 and 60 days maximum number of shoots obtained (5.40) and (71.10) were noted under the same treatment of BAP 4.00 mgl + Kinetin 2.00 mgl. Maximum percentage of developed shoots obtained (80.95%) was noted under the same treatment of BAP and Kinetin. Maximum shoot length obtained (4.26cm), (5.03cm) and (6.10cm) after 28, 35 and 42 days under the treatment of BAP 4.00 mgl + Kin...
The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. ... more The Wireless Application Protocol (WAP) is a protocol stack for wireless communication networks. WAP uses WTLS, a wireless variant of the SSL/TLS protocol, to secure the communication between the mobile phone and other parts of the WAP architecture. Originally, WAP was designed with a gateway in the middle, acting as the interpreter between the Internet protocol stack and the Wireless Application Protocol stack. The WAP gateway forwards web content to the mobile phone in a way intended to accommodate the limited bandwidth of the mobile network and the mobile phones limited processing capability. However, the gateway introduces a security hole, which renders WAP unsuitable for any security-sensitive services like Banking.
The 5G networks are very important to support complex application by connecting different types o... more The 5G networks are very important to support complex application by connecting different types of machines and devices, which provide the platform for different spoofing attacks. Traditional physical layer and cryptography authentication methods are facing problems in dynamic complex environment, including less reliability, security overhead also problem in predefined authentication system, giving protection and learn about time-varying attributes. In this paper, intrusion detection framework has been designed using various machine learning methods with the help of physical layer attributes and to provide more efficient system to increase the security. Machine learning methods for the intelligent intrusion detection are introduced, especially for supervised and non-supervised methods. Our machine learning based intelligent intrusion detection technique for the 5G and beyond networks is evaluated in terms of recall, precision, accuracy and f-value are validated for unpredictable dyn...
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2018
INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted peo... more INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted people to mobile learning in real time wireless classroom from the physical face-to-face classroom. OBJECTIVE: Mobile learning has been present for years but the use of mobile learning is more in the current scenario due to COVID-19. However, people's acceptance of mobile learning education at institutions is still low. Thus, this research seeks to understand the student's perspective by analysing constructs hypothesized in the proposed hybrid model. METHOD: Data is collected using a survey from an Indian institute of the Meerut region with a total of 1022 students. RESULT: Data analysis and research findings showed that Random Forest and K-Nearest Neighbour Algorithms outperforms than other classifiers in predicting the dependent variables with better accuracy rate, precision, and recall value in this study. CONCLUSION: The research findings will help the designers and software development to design learning applications considering the perspective of students with respect to 5G technology.
International Journal of Current Microbiology and Applied Sciences, 2020
International Journal for Research in Applied Science and Engineering Technology, 2018
Test case generation is the most effort consuming part of software testing. Once the test cases w... more Test case generation is the most effort consuming part of software testing. Once the test cases were generated these were used to test the software for quality. These inputs were fed as inputs to the software to compare the observed and expected results. This comparison need to be done automatically. In this paper, a model is proposed to improve the process of software testing to improve the overall quality of software.
International Journal of Advanced Intelligence Paradigms, 2019
International Journal of Advanced Intelligence Paradigms, 2019
Genome Biology, 2019
Following publication of the original article [1], the authors reported that Additional file 4, "... more Following publication of the original article [1], the authors reported that Additional file 4, "Table S5. Parentof-origin RNAseq dataset of 4 DAP INTACT-purified endosperm of Col × Ler reciprocal crosses" had the following error: Column 6, labeled as "Reads_Mat_Ler", should say "Reads_pat_Col". Column 7, labeled as "Reads_pat_Ler", should say "Reads_mat_Ler". The updated Additional file 4 is published in this correction. Additional file Additional file 4: Table S5. Parent-of-origin RNAseq dataset of 4 DAP INTACT-purified endosperm of Col × Ler reciprocal crosses.
International Journal of Advanced Intelligence Paradigms, 2019