Mayank Namdev - Academia.edu (original) (raw)

Papers by Mayank Namdev

Research paper thumbnail of Review of: "Optimized Low-Powered Wide Area Network within Internet of Things

Research paper thumbnail of IHBO_CA: an improved honey-badger optimization-based communication approach for energy-efficient deployment of secure flying ad-hoc network (FANET)

Soft Computing, Dec 27, 2023

Research paper thumbnail of Enhancing Security in Cloud Computing with Anomaly Detection Using Machine Learning

Tuijin Jishu/Journal of Propulsion Technology

Cloud computing has become an integral part of modern business operations, offering unprecedented... more Cloud computing has become an integral part of modern business operations, offering unprecedented scalability, cost-effectiveness, and agility. However, the widespread adoption of cloud services has also raised significant security concerns. This paper addresses the imperative need for enhancing security in cloud computing environments through the application of anomaly detection techniques powered by machine learning. The ubiquity of cloud computing has ushered in a new era of digital transformation, enabling organizations to streamline operations and achieve unprecedented efficiency. Nevertheless, the dynamic nature of the cloud, coupled with the evolving threat landscape, has exposed organizations to a spectrum of security challenges. These challenges encompass data breaches, insider threats, and vulnerabilities inherent to the shared responsibility model, which necessitates a collaborative approach between cloud service providers (CSPs) and customers. Anomaly detection, a key fa...

Research paper thumbnail of A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique

Lecture notes in electrical engineering, 2022

Research paper thumbnail of LSTM Based Mental Stress Level Detection using Wearable Sensor Devices

Nowadays, mental stress is a severe problem, particularly among teenagers. The age group that was... more Nowadays, mental stress is a severe problem, particularly among teenagers. The age group that was previously thought to be the most carefree is now under much strain. Nowadays, increased stress causes many new issues, including depression, suicide, heart attack, and stroke. Many physical health issues related to stress can be avoided if mental stress is detected beforehand. When a person is stressed, there are noticeable changes in several bio-signals such as thermal, electrical, impedance, acoustic, optical, and others, and stress levels may be determined using these bio-signals. The paper proposes various machine learning and deep learning algorithms for stress detection on persons using wearable sensing devices, which can help people avoid various stress-related health problems. The data are taken from the WESAD dataset. The paper uses classification algorithms, SVM, DT, kNN and deep learning models; Long Short-Term Memory (LSTM) is applied, and confusion metrics parameters are u...

Research paper thumbnail of Correlation Enhanced Machine Learning Approach based Online News Popularity Prediction

Smart Moves Journal Ijoscience, Mar 12, 2018

The prediction of wave height is one of the major problems of coastal engineering and coastal str... more The prediction of wave height is one of the major problems of coastal engineering and coastal structures. In recent years, advances in the prediction of significant wave height have been considerably developed using flexible calculation techniques. In addition to the traditional prediction of significant wave height, soft computing has explored a new way of predicting significant wave heights. This research was conducted in the direction of forecasting a significant wave height using machine learning approaches. In this paper, a problem of significant wave height prediction problem has been tackled by using wave parameters such as wave spectral density. This prediction of significant wave height helps in wave energy converters as well as in ship navigation system. This research will optimize wave parameters for a fast and efficient wave height prediction. For this Pearson's, Kendall's and Spearman's Correlation Coefficients and Particle Swarm Optimization feature reduction techniques are used. So reduced features are taken into consideration for prediction of wave height using neural network. In this work, performance evaluation metrics such as MSE and RMSE values are decreased and gives better performance of classification that is compared with existing research's implemented methodology. From the experimental results, it is observed that proposed algorithm gives the better prediction as compared to PSO feature reduction technique. So, it is also concluded that Co-relation enhanced neural network is better as compared to PSO based neural network with increased number of features.

Research paper thumbnail of A BSA based Communication Strategy for Energy Efficient Flying Ad-hoc Network (FANET)

Design Engineering, Aug 7, 2021

Research paper thumbnail of IHBO_CA - an Improved Honey Badger Optimization based Communication Approach for Energy Efficient Deployment of Secure Flying Ad-hoc Network (FANET)

Research Square (Research Square), Dec 7, 2022

The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.

Research paper thumbnail of A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)

SQL Injection Attack (SQLIA) is a technique that helps the attackers to direct enters into the da... more SQL Injection Attack (SQLIA) is a technique that helps the attackers to direct enters into the database in an unauthorized way and reach the highest or most decisive point in extracting or updating sensitive information from any organizations database. In this paper, we studied the scenario of the different types of attacks with descriptions and examples of how attacks of that type could be performed and their detection & prevention schemes. It also contains strengths and weaknesses of various SQL injection attacks. It is known to all that SQL injection attacks easily prevented by applying more secure schemes in login phase and after login phase. Therefore, we implement our proposed scheme called SQLENCP, the SQL injection prevention by encryption & hashing techniques, to handle the SQLIA and prevent them. Although, the proposed implemented system is unable to handle all the SQL injection attacks, but it can prevent tautology attacks, union based query attacks & illegal structured q...

Research paper thumbnail of Routing and Optimization Schemes in Flying Ad Hoc Network (FANET)

2nd International Conference on Data, Engineering and Applications (IDEA), 2020

Various routing convention for FANETs have been made in the consistent past years which are subje... more Various routing convention for FANETs have been made in the consistent past years which are subject for data exchanging, way engenderment and crash avoiding in organize. In the event that the centers are extraordinary and with a rushed and randomized transportability, by then a probabilistic heuristic technique might be gotten a handle on. These issues ought to be confined by using suitable organizing between UAV through update approach, so a novel optimization approach for competent dynamic routing in FANET may be adopted by using the properties of UAV like interest, hugeness, cost and keys obligation of UAV communicating with one another.

Research paper thumbnail of Secure Elgamal Based Authentication Scheme for Cloud Assisted IOT Based Wireless Body Area Network

Now-a-days ireless Body Area Network (WBAN) is considered to be new era technique in which patien... more Now-a-days ireless Body Area Network (WBAN) is considered to be new era technique in which patient’s health record are monitored remotely by using wearable sensors from anywhere in the world. In such high-level communication, there is need of security services are required to protect the data being used by healthcare professionals and patients from intruders or attackers. Therefore, many researchers are showing their keen interest for security enhancement of WBAN architecture for secure communication. In this dissertation work, different security and privacy techniques are reviewed and analysed WBAN/IoT challenges as well their limitations based on the latest standards and publications. This research also covers the state-of-art security measures and research in WBAN. This research presents an ElGamal cryptosystem and biometric information authentication scheme for WBAN/IOT applications. This work observed that most of the authentication protocols using hash function and ElGamal cry...

Research paper thumbnail of An Optimized Communication Scheme for Energy Efficient and Secure Flying Ad-hoc Network (FANET)

Wireless Personal Communications

Research paper thumbnail of A Review on Security and Privacy Issues in Wireless Body Area Networks for Healthcare Applications

SMART MOVES JOURNAL IJOSCIENCE

Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism... more Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.

Research paper thumbnail of Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud

INTERNATIONAL JOURNAL ONLINE OF SCIENCE

Cloud computing is an enormous area which shares huge amount of data over cloud services and it h... more Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Data integrity, one of the most burning challenges in secure cloud storage. Data auditing protocols enable a verifier to efficiently check the integrity of the files without downloading the entire file from the cloud. In this paper cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users ca...

Research paper thumbnail of A Study on Particle Swarm based Load Balancing Algorithms in Cloud Computing

IJOSTHE

Cloud computing is a new and innovative perspective for large scale parallel and distributed comp... more Cloud computing is a new and innovative perspective for large scale parallel and distributed computing. The dependence of user or load on the cloud is growing enormously with the enlargement of new applications. Load balancing is a significant area of cloud computing environment which ensures that all connected devices or processors carry out same amount of work in equal time. With an aim to make cloud resources and services accessible to the cloud user easily and conveniently, different algorithms and models for load balancing in cloud computing is being developed. There are so many algorithms are available for proper load balancing but in this paper particle swarm based algorithm is focused that can balance the load in cloud computing so that resources are easily available for users. This paper aims to develop an efficient load balancing algorithm using particle swarm based to minimize performance parameters like make span, latency, total execution time.

Research paper thumbnail of Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment

Research paper thumbnail of Review of: "Optimized Low-Powered Wide Area Network within Internet of Things

Research paper thumbnail of IHBO_CA: an improved honey-badger optimization-based communication approach for energy-efficient deployment of secure flying ad-hoc network (FANET)

Soft Computing, Dec 27, 2023

Research paper thumbnail of Enhancing Security in Cloud Computing with Anomaly Detection Using Machine Learning

Tuijin Jishu/Journal of Propulsion Technology

Cloud computing has become an integral part of modern business operations, offering unprecedented... more Cloud computing has become an integral part of modern business operations, offering unprecedented scalability, cost-effectiveness, and agility. However, the widespread adoption of cloud services has also raised significant security concerns. This paper addresses the imperative need for enhancing security in cloud computing environments through the application of anomaly detection techniques powered by machine learning. The ubiquity of cloud computing has ushered in a new era of digital transformation, enabling organizations to streamline operations and achieve unprecedented efficiency. Nevertheless, the dynamic nature of the cloud, coupled with the evolving threat landscape, has exposed organizations to a spectrum of security challenges. These challenges encompass data breaches, insider threats, and vulnerabilities inherent to the shared responsibility model, which necessitates a collaborative approach between cloud service providers (CSPs) and customers. Anomaly detection, a key fa...

Research paper thumbnail of A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique

Lecture notes in electrical engineering, 2022

Research paper thumbnail of LSTM Based Mental Stress Level Detection using Wearable Sensor Devices

Nowadays, mental stress is a severe problem, particularly among teenagers. The age group that was... more Nowadays, mental stress is a severe problem, particularly among teenagers. The age group that was previously thought to be the most carefree is now under much strain. Nowadays, increased stress causes many new issues, including depression, suicide, heart attack, and stroke. Many physical health issues related to stress can be avoided if mental stress is detected beforehand. When a person is stressed, there are noticeable changes in several bio-signals such as thermal, electrical, impedance, acoustic, optical, and others, and stress levels may be determined using these bio-signals. The paper proposes various machine learning and deep learning algorithms for stress detection on persons using wearable sensing devices, which can help people avoid various stress-related health problems. The data are taken from the WESAD dataset. The paper uses classification algorithms, SVM, DT, kNN and deep learning models; Long Short-Term Memory (LSTM) is applied, and confusion metrics parameters are u...

Research paper thumbnail of Correlation Enhanced Machine Learning Approach based Online News Popularity Prediction

Smart Moves Journal Ijoscience, Mar 12, 2018

The prediction of wave height is one of the major problems of coastal engineering and coastal str... more The prediction of wave height is one of the major problems of coastal engineering and coastal structures. In recent years, advances in the prediction of significant wave height have been considerably developed using flexible calculation techniques. In addition to the traditional prediction of significant wave height, soft computing has explored a new way of predicting significant wave heights. This research was conducted in the direction of forecasting a significant wave height using machine learning approaches. In this paper, a problem of significant wave height prediction problem has been tackled by using wave parameters such as wave spectral density. This prediction of significant wave height helps in wave energy converters as well as in ship navigation system. This research will optimize wave parameters for a fast and efficient wave height prediction. For this Pearson's, Kendall's and Spearman's Correlation Coefficients and Particle Swarm Optimization feature reduction techniques are used. So reduced features are taken into consideration for prediction of wave height using neural network. In this work, performance evaluation metrics such as MSE and RMSE values are decreased and gives better performance of classification that is compared with existing research's implemented methodology. From the experimental results, it is observed that proposed algorithm gives the better prediction as compared to PSO feature reduction technique. So, it is also concluded that Co-relation enhanced neural network is better as compared to PSO based neural network with increased number of features.

Research paper thumbnail of A BSA based Communication Strategy for Energy Efficient Flying Ad-hoc Network (FANET)

Design Engineering, Aug 7, 2021

Research paper thumbnail of IHBO_CA - an Improved Honey Badger Optimization based Communication Approach for Energy Efficient Deployment of Secure Flying Ad-hoc Network (FANET)

Research Square (Research Square), Dec 7, 2022

The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.

Research paper thumbnail of A Novel Approach for SQL Injection Prevention Using Hashing & Encryption (SQL-ENCP)

SQL Injection Attack (SQLIA) is a technique that helps the attackers to direct enters into the da... more SQL Injection Attack (SQLIA) is a technique that helps the attackers to direct enters into the database in an unauthorized way and reach the highest or most decisive point in extracting or updating sensitive information from any organizations database. In this paper, we studied the scenario of the different types of attacks with descriptions and examples of how attacks of that type could be performed and their detection & prevention schemes. It also contains strengths and weaknesses of various SQL injection attacks. It is known to all that SQL injection attacks easily prevented by applying more secure schemes in login phase and after login phase. Therefore, we implement our proposed scheme called SQLENCP, the SQL injection prevention by encryption & hashing techniques, to handle the SQLIA and prevent them. Although, the proposed implemented system is unable to handle all the SQL injection attacks, but it can prevent tautology attacks, union based query attacks & illegal structured q...

Research paper thumbnail of Routing and Optimization Schemes in Flying Ad Hoc Network (FANET)

2nd International Conference on Data, Engineering and Applications (IDEA), 2020

Various routing convention for FANETs have been made in the consistent past years which are subje... more Various routing convention for FANETs have been made in the consistent past years which are subject for data exchanging, way engenderment and crash avoiding in organize. In the event that the centers are extraordinary and with a rushed and randomized transportability, by then a probabilistic heuristic technique might be gotten a handle on. These issues ought to be confined by using suitable organizing between UAV through update approach, so a novel optimization approach for competent dynamic routing in FANET may be adopted by using the properties of UAV like interest, hugeness, cost and keys obligation of UAV communicating with one another.

Research paper thumbnail of Secure Elgamal Based Authentication Scheme for Cloud Assisted IOT Based Wireless Body Area Network

Now-a-days ireless Body Area Network (WBAN) is considered to be new era technique in which patien... more Now-a-days ireless Body Area Network (WBAN) is considered to be new era technique in which patient’s health record are monitored remotely by using wearable sensors from anywhere in the world. In such high-level communication, there is need of security services are required to protect the data being used by healthcare professionals and patients from intruders or attackers. Therefore, many researchers are showing their keen interest for security enhancement of WBAN architecture for secure communication. In this dissertation work, different security and privacy techniques are reviewed and analysed WBAN/IoT challenges as well their limitations based on the latest standards and publications. This research also covers the state-of-art security measures and research in WBAN. This research presents an ElGamal cryptosystem and biometric information authentication scheme for WBAN/IOT applications. This work observed that most of the authentication protocols using hash function and ElGamal cry...

Research paper thumbnail of An Optimized Communication Scheme for Energy Efficient and Secure Flying Ad-hoc Network (FANET)

Wireless Personal Communications

Research paper thumbnail of A Review on Security and Privacy Issues in Wireless Body Area Networks for Healthcare Applications

SMART MOVES JOURNAL IJOSCIENCE

Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism... more Wireless Body Area Network (WBAN) is a new trend in the technology that provides remote mechanism to monitor and collect patient’s health record data using wearable sensors. It is widely recognized that a high level of system security and privacy play a key role in protecting these data when being used by the healthcare professionals and during storage to ensure that patient’s records are kept safe from intruder’s danger. It is therefore of great interest to discuss security and privacy issues in WBANs. In this paper, we reviewed WBAN communication architecture, security and privacy requirements and security threats and the primary challenges in WBANs to these systems based on the latest standards and publications. This paper also covers the state-of-art security measures and research in WBAN.

Research paper thumbnail of Attribute-Based Homomorphic Encryption based Integrity Auditing for Secure Outsourced Storage in Cloud

INTERNATIONAL JOURNAL ONLINE OF SCIENCE

Cloud computing is an enormous area which shares huge amount of data over cloud services and it h... more Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Data integrity, one of the most burning challenges in secure cloud storage. Data auditing protocols enable a verifier to efficiently check the integrity of the files without downloading the entire file from the cloud. In this paper cloud data integrity checking is performed by introducing attribute-based cloud data auditing where users ca...

Research paper thumbnail of A Study on Particle Swarm based Load Balancing Algorithms in Cloud Computing

IJOSTHE

Cloud computing is a new and innovative perspective for large scale parallel and distributed comp... more Cloud computing is a new and innovative perspective for large scale parallel and distributed computing. The dependence of user or load on the cloud is growing enormously with the enlargement of new applications. Load balancing is a significant area of cloud computing environment which ensures that all connected devices or processors carry out same amount of work in equal time. With an aim to make cloud resources and services accessible to the cloud user easily and conveniently, different algorithms and models for load balancing in cloud computing is being developed. There are so many algorithms are available for proper load balancing but in this paper particle swarm based algorithm is focused that can balance the load in cloud computing so that resources are easily available for users. This paper aims to develop an efficient load balancing algorithm using particle swarm based to minimize performance parameters like make span, latency, total execution time.

Research paper thumbnail of Cloud-User Security Based on RSA and MD5 Algorithm for Resource Attestation and Sharing in Java Environment