geetika dhand - Academia.edu (original) (raw)

Papers by geetika dhand

Research paper thumbnail of Deep enriched salp swarm optimization based bidirectional -long short term memory model for healthcare monitoring system in big data

Informatics in Medicine Unlocked

Research paper thumbnail of Battle Royale: First-Person Shooter Game

SSRN Electronic Journal, 2021

First-person shooter games are the most playing games nowadays. But various areas in the world st... more First-person shooter games are the most playing games nowadays. But various areas in the world still have internet connectivity issues which reduce the impact of gaming, during research it was also observed that continuous playing for long hours can cause brain and health issues. In this paper, a Battle Royale game is built which provides an offline FPS gaming experience when the internet is not available and also provides the time constraint of playing the game to reduce the negative effects of the game on the health of the gamers.

Research paper thumbnail of Survey on Data-Centric protocols of WSN

Wireless sensor network led to many new protocols where energy awareness is vital consideration. ... more Wireless sensor network led to many new protocols where energy awareness is vital consideration. This paper surveys on data

Research paper thumbnail of Secure and Manage Passwords with Encryption and Cloud Storage

SSRN Electronic Journal, 2021

Tech users often face a challenge to create and remember a secure and sophisticated password for ... more Tech users often face a challenge to create and remember a secure and sophisticated password for various software services or tools they use for entertainment, work, or utility such as streaming platforms, shopping sites, email account, etc. One thing common in all these services is a password and it’s difficult for the user to memorize and maintain all these passwords and end up setting up common or simple passwords and due to this accounts of various users across various services are compromised to brute force attacks or even social engineered out of them and even worse if the same password is used over various accounts. In this paper, we present a solution that uses encryption and cloud storage to efficiently secure and manage user passwords and add an extra layer of protection, ensuring integrity, availability and security without making users remember multiple passwords.

Research paper thumbnail of A System for Providing Insights on a Tourist Spot based on Text Mining

Social Science Research Network, 2021

In this paper, we introduce a framework that simplifies the process of finding information about ... more In this paper, we introduce a framework that simplifies the process of finding information about a city. This is helpful when people are looking for information on various cities before planning a trip. As visiting various online portals and collecting information is a time consuming and tedious task , we design a service that automates this task. We also provide reviews and analyze them using sentiment analysis. This will provide better insights to the user. The text database is generated dynamically using web scraping hence the quality of final results depends on the quality of content available online.

Research paper thumbnail of Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing)

Materials Today: Proceedings, 2020

Analysis of two protocols ''Secure Elliptic curve based Chaotic key Galois cryptography on Opport... more Analysis of two protocols ''Secure Elliptic curve based Chaotic key Galois cryptography on Opportunistic Routing (SCOR)" and Secure Multitier Energy Efficient Routing Protocol (SMEER) are analysed. The simulation is done on the NS-2 simulation platform and finally performances are evaluated on various simulation parameters. Wireless sensor networks (WSNs), energy efficiency is thought to be an important issue, because of the constrained sensor nodes battery limit. In WSNs, routing protocols are application subordinate and outline objectives change between various applications. Secure Multi-Tier Energy Efficient Routing Protocol uses Ant Lion optimizer technique for selecting cluster head & K-means for doing clustering while this information is transmitted using Spherical grid based multi-curve Elliptical curve cryptographic routing.

Research paper thumbnail of Data Aggregation Techniques in WSN:Survey

Procedia Computer Science, 2016

Different data aggregation techniques require varying amounts of energy to process raw data. The ... more Different data aggregation techniques require varying amounts of energy to process raw data. The choice of data aggregation method depends on the application requirements as well as the relative energy savings obtained by using this method. As various sensor nodes often detect common phenomena, there will be some redundancy in the data. Meanwhile many applications deploy more sensors than the exact requirement so as to accurately sense the target phenomena. In this paper, importance of data gathering is explained; various Hierarchical clustering approaches are compared.

Research paper thumbnail of SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks

Wireless Personal Communications, 2018

Energy consumption and the secure transmission are the increasing fields of research challenge in... more Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.

Research paper thumbnail of Music Recommendation Using Sentiment Analysis from Facial Recognition

SSRN Electronic Journal, 2022

Research paper thumbnail of Deep enriched salp swarm optimization based bidirectional -long short term memory model for healthcare monitoring system in big data

Informatics in Medicine Unlocked

Research paper thumbnail of Battle Royale: First-Person Shooter Game

SSRN Electronic Journal, 2021

First-person shooter games are the most playing games nowadays. But various areas in the world st... more First-person shooter games are the most playing games nowadays. But various areas in the world still have internet connectivity issues which reduce the impact of gaming, during research it was also observed that continuous playing for long hours can cause brain and health issues. In this paper, a Battle Royale game is built which provides an offline FPS gaming experience when the internet is not available and also provides the time constraint of playing the game to reduce the negative effects of the game on the health of the gamers.

Research paper thumbnail of Survey on Data-Centric protocols of WSN

Wireless sensor network led to many new protocols where energy awareness is vital consideration. ... more Wireless sensor network led to many new protocols where energy awareness is vital consideration. This paper surveys on data

Research paper thumbnail of Secure and Manage Passwords with Encryption and Cloud Storage

SSRN Electronic Journal, 2021

Tech users often face a challenge to create and remember a secure and sophisticated password for ... more Tech users often face a challenge to create and remember a secure and sophisticated password for various software services or tools they use for entertainment, work, or utility such as streaming platforms, shopping sites, email account, etc. One thing common in all these services is a password and it’s difficult for the user to memorize and maintain all these passwords and end up setting up common or simple passwords and due to this accounts of various users across various services are compromised to brute force attacks or even social engineered out of them and even worse if the same password is used over various accounts. In this paper, we present a solution that uses encryption and cloud storage to efficiently secure and manage user passwords and add an extra layer of protection, ensuring integrity, availability and security without making users remember multiple passwords.

Research paper thumbnail of A System for Providing Insights on a Tourist Spot based on Text Mining

Social Science Research Network, 2021

In this paper, we introduce a framework that simplifies the process of finding information about ... more In this paper, we introduce a framework that simplifies the process of finding information about a city. This is helpful when people are looking for information on various cities before planning a trip. As visiting various online portals and collecting information is a time consuming and tedious task , we design a service that automates this task. We also provide reviews and analyze them using sentiment analysis. This will provide better insights to the user. The text database is generated dynamically using web scraping hence the quality of final results depends on the quality of content available online.

Research paper thumbnail of Protocols SMEER (Secure Multitier Energy Efficient Routing Protocol) and SCOR (Secure Elliptic curve based Chaotic key Galois Cryptography on Opportunistic Routing)

Materials Today: Proceedings, 2020

Analysis of two protocols ''Secure Elliptic curve based Chaotic key Galois cryptography on Opport... more Analysis of two protocols ''Secure Elliptic curve based Chaotic key Galois cryptography on Opportunistic Routing (SCOR)" and Secure Multitier Energy Efficient Routing Protocol (SMEER) are analysed. The simulation is done on the NS-2 simulation platform and finally performances are evaluated on various simulation parameters. Wireless sensor networks (WSNs), energy efficiency is thought to be an important issue, because of the constrained sensor nodes battery limit. In WSNs, routing protocols are application subordinate and outline objectives change between various applications. Secure Multi-Tier Energy Efficient Routing Protocol uses Ant Lion optimizer technique for selecting cluster head & K-means for doing clustering while this information is transmitted using Spherical grid based multi-curve Elliptical curve cryptographic routing.

Research paper thumbnail of Data Aggregation Techniques in WSN:Survey

Procedia Computer Science, 2016

Different data aggregation techniques require varying amounts of energy to process raw data. The ... more Different data aggregation techniques require varying amounts of energy to process raw data. The choice of data aggregation method depends on the application requirements as well as the relative energy savings obtained by using this method. As various sensor nodes often detect common phenomena, there will be some redundancy in the data. Meanwhile many applications deploy more sensors than the exact requirement so as to accurately sense the target phenomena. In this paper, importance of data gathering is explained; various Hierarchical clustering approaches are compared.

Research paper thumbnail of SMEER: Secure Multi-tier Energy Efficient Routing Protocol for Hierarchical Wireless Sensor Networks

Wireless Personal Communications, 2018

Energy consumption and the secure transmission are the increasing fields of research challenge in... more Energy consumption and the secure transmission are the increasing fields of research challenge in wireless sensor network (WSN) applications. Heterogeneous WSN is an efficient network strategy that has sensor nodes with different processing, memory power, and transmission capacity. In order to provide effective transmission for this type of network, clustering associated with secure routing is enabled to transfer the data packets safely to the endpoint. Data gathering and clustering help to group the network and control transmission overhead during data transmission. Hybridization of K-means clustering algorithm with Ant Lion Optimizer for grouping of nodes and optimal CH selection is utilized for better energy efficiency. Thus, a Miscegenation of Ant Lion optimizer within K-means for clustering and Spherical grid based multi-curve Elliptic curve cryptographic routing (MALOKSER) is determined for effective clustering and secure routing of data packets within time to the base station. The main aim of our work is to enhance network security and energy savage in the wireless network communication system. Elliptic curve cryptography with spherical grid multi-tier routing ensure secure transmission by encrypting the messages with two different keys and forward the packets in a spherical format. The performance is evaluated under metrics such as packet deliver ratio, minimum energy consumptions, communication overheads, throughput and end to end delay with the existing standards shows better results. This proves the proposed technique can actively reduce the energy utilization with an efficient and safe routing of data over the network.

Research paper thumbnail of Music Recommendation Using Sentiment Analysis from Facial Recognition

SSRN Electronic Journal, 2022