Shaurya Gupta | Jagan Nath University (original) (raw)
Papers by Shaurya Gupta
<jats:p>In today's world, the concept of smart health is attaining acceptance in the fi... more <jats:p>In today's world, the concept of smart health is attaining acceptance in the field of medical sciences which is based completely on the concept of IoT. IoT devices are responsible for collecting and analyzing voluminous data, which involves monitoring the health status of various patients, which would enhance the clinical support system and provisions of monitoring and controlling patients with the help of sensors and medical devices equipped with IoT unit. With the aid of various architectural constituents, interactive communication between the medical spaces and remote users, health or wellness systems are being developed in such a manner that they collect data from varied monitoring devices. Then the data being collected is processed, and then a personalized scheme for an individual or patient is suggested for his wellness goal, like walking ten thousand steps would help him lower his blood pressure. This chapter provides an understanding and discusses various environmental considerations like humidity, air temperature, and the forecast provided by the organisation's system. </jats:p>
2019 Amity International Conference on Artificial Intelligence (AICAI), 2019
As days are passing online payments is getting popular and for this people uses various modes of ... more As days are passing online payments is getting popular and for this people uses various modes of payment like Debit card, Credit Card, electronic wallet, e-banking etc. People purchase products over the internet and also pay the bill online, which is easy to implement and also saves the time. But the only question that comes in the mind of every person is about the security of data which has been shared by the person while on-line payments. In this paper we tried to answer certain queries related to security of online payments and also discussed various ways to overcome security threats related to online payments.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Internet of Things (IoT) is the association wherein machines like sensors, appliances are able to... more Internet of Things (IoT) is the association wherein machines like sensors, appliances are able to talk to each other with no human involvement. These wireless sensor networks are the set of connections which are vulnerable to many security concerns. Hence, the security of IoT becomes vital. Machine learning motivates numerous resolutions to secure the IoT. Here, we review diverse intimidation that have a higher probability of attacking IoT and various machine learning procedure designed to counteract them.
Social Science Research Network, 2018
Handbook of Research on Cloud Computing and Big Data Applications in IoT, 2019
The need for data outsourcing or database as a service (DaaS) is extremely important for any orga... more The need for data outsourcing or database as a service (DaaS) is extremely important for any organization. In addition, data storage or data retrieval cost high especially for small companies. This chapter aims to study the various challenges in cloud computing communication issue. The chapter on multi-tiering a cloud emphasizes security enhancement due to the application of tiers in the cloud such that services availability is also improved. Cloud computing is a recent network trend for advanced communication systems. A lot of research led to the advancements in the areas of newer modes but multi-tiering a cloud is still an embarking issue for the researchers.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Map Matching is an important concept for navigation and tracking application of the computer scie... more Map Matching is an important concept for navigation and tracking application of the computer science domain. This research work investigates, how curve geometry influences the vehicle drivers in curves based on tracking data?. Map Matching algorithms for real-time location tracking system, putting special emphasis on path analysis, tracking points monitoring with GPS and IRNSS signals structure and quality analysis on L2, L5 frequency band. The objective od this research work is to proosed a novel map matching algorithm for real time location tracking, real path analysis, vehicles trajectory computation and satellites signals analysis on road networks. This work also introduces mathematical analyses process for current navigation signals process on the signal waveforms.
Sustainable progress is an ideal which leads to sustainability, which can only be achieved throug... more Sustainable progress is an ideal which leads to sustainability, which can only be achieved through green engineering. Green engineering is defined as an engineering which is developed for the environment. In terms of industry scenario, green engineering involves design for reduction of emissions, design to eradicate predominantly dangerous chemicals, design to minimalise the usage of natural resources and design to minimise energy usage. Internet of Things (IoT) defines the association of physical electronic devices and vehicles and at times covers entire structures over IP networks enabling them to interconnect amongst themselves. All these devices are embedded with software, sensors and actuators for collecting and exchanging data amongst themselves. This chapter discusses the concept of IOT in green engineering transformation for smart cities and the role of IOT in establishing communication amongst devices to implement smart living and smart environment. It further discusses the...
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
After the introduction of fifth generation network, there are several prospects and encounters fo... more After the introduction of fifth generation network, there are several prospects and encounters for the evolving technologies like Virtual Reality (VR) and Augmented Reality (AR). This paper emphases on the possibilities of 5G network and how 5G will integrate with Virtual Reality and Augmented Reality and Tactile Internet. Tactile Internet in AR/VR is intended to generate a model alteration from the content-oriented interactions (through internet) towards remote based connections by empowering synchronized broadcast of tactile data like vibration, touch, gestures, surface texture over wireless network with the regular audio and visual data traffics which are also transferred over wireless network. Finally, this research paper intends to provide an overall opinion on the use of Tactile Internet in AR/VR, and to recognize and examine the involved drawbacks and technical problems, and to provide the possible resolutions and to suggest upcoming research guidelines. Initially, opening with the future of Tactile Internet in AR/VR and recent developments in this field, this paper presents a comprehensive outline for Tactile Internet in AR/VR in the past the 5G Era including a Tactile Internet planning, the VR/AR planning, the core technical problems, the important application studies, how it can be possibly enable ground-breaking ways to use Augmented Reality and Virtual Reality. Later, we can see a complete evaluation of the present Tactile Internet progress by generally classifying them into two main instances; specifically, haptic feedback and portable AR/VR device using 5G network. Finally, learning about both Tactile Internet and Augmented Reality/Virtual Reality, we will learn how 5G can change the way Tactile Internet integrates and works with AR/VR that can make an impact in the ever-growing IoT world.
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
Cloud computing has become a vital part of our everyday life. A decade ago, proposing an idea on ... more Cloud computing has become a vital part of our everyday life. A decade ago, proposing an idea on the improvement of cloud seemed like a reach. Just like with any other technology, cloud has its own drawbacks too. The way our life is moving at a fast pace, we can’t begin to think of checking our backups every other day. It exhausts most people to even give it a thought. Ransom ware attacks have become so much common which eventually gave rise to the creation of multiple software. Retrieving lost files and data will become much easier if it were to be stored elsewhere prior to an attack. The subject cloud in itself has been overlooked and the fact that the same is the base for further alleviation hasn’t been paid enough attention too. Improving an already existing technology almost always starts with going through its previous version’s capabilities. This paper will mainly focus on how certain techniques are favoured over the other due to it meeting the standards for both personal and official usage. In simpler words, how those said techniques help small businesses develop themselves with the help of dependable backup with low cloud cost. The combination of machine learning and artificial intelligence in automation of disaster recovery testing is the future of cloud computing. When all of this checks the box, security would still be an issue. In this paper, I propose a combined approach to the access of cloud with two major algorithms: Seed block and Rivest Shamir Adleman.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Providing safety to the data stored in the cloud should be prioritized and henceforth remains a c... more Providing safety to the data stored in the cloud should be prioritized and henceforth remains a crucial part of the cloud ecosystem. Security of the end users data from both insiders as well as outsiders is an important factor of a cloud server. Dynamic provisioning of services is a problem. To fulfil the criteria of multilayered applications, virtualization based services are used at SLA (Service-Level-Agreement). To meet the stringent and highly secure facilities of the web apps it is extremely necessary to move cloud computing from solo to many domains.
Journal of Statistics and Management Systems, 2017
Abstract Networks which are lacking in uninterrupted back-to-back links amongst their nodes due t... more Abstract Networks which are lacking in uninterrupted back-to-back links amongst their nodes due to node movement, controlled power sources or restricted data storage space are called DTNs. To rise above this irregular connectivity, DTN nodes stock up and hold the data packets they accept until they come into communication range of each other. In addition, they extend many copies of the same packet on the network to increase the deliverance prospect. In recent time, several routing protocols have been developed specifically for DTNs. These protocols differ in the number of copies they extend and the information they use to guide the packets to their destinations. This paper studies four recognized DTN routing protocols i.e. EPIDEMIC, Spray-and-Wait, PROPHET and MAXPROP. In this paper, DTN is studied along with its protocols and measured in environment of packet deliverance, delivery cost and average packet delay and finally finding out the best protocol under certain networking parameters.
International Journal of System Assurance Engineering and Management, 2021
<jats:p>In today's world, the concept of smart health is attaining acceptance in the fi... more <jats:p>In today's world, the concept of smart health is attaining acceptance in the field of medical sciences which is based completely on the concept of IoT. IoT devices are responsible for collecting and analyzing voluminous data, which involves monitoring the health status of various patients, which would enhance the clinical support system and provisions of monitoring and controlling patients with the help of sensors and medical devices equipped with IoT unit. With the aid of various architectural constituents, interactive communication between the medical spaces and remote users, health or wellness systems are being developed in such a manner that they collect data from varied monitoring devices. Then the data being collected is processed, and then a personalized scheme for an individual or patient is suggested for his wellness goal, like walking ten thousand steps would help him lower his blood pressure. This chapter provides an understanding and discusses various environmental considerations like humidity, air temperature, and the forecast provided by the organisation's system. </jats:p>
2019 Amity International Conference on Artificial Intelligence (AICAI), 2019
As days are passing online payments is getting popular and for this people uses various modes of ... more As days are passing online payments is getting popular and for this people uses various modes of payment like Debit card, Credit Card, electronic wallet, e-banking etc. People purchase products over the internet and also pay the bill online, which is easy to implement and also saves the time. But the only question that comes in the mind of every person is about the security of data which has been shared by the person while on-line payments. In this paper we tried to answer certain queries related to security of online payments and also discussed various ways to overcome security threats related to online payments.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Internet of Things (IoT) is the association wherein machines like sensors, appliances are able to... more Internet of Things (IoT) is the association wherein machines like sensors, appliances are able to talk to each other with no human involvement. These wireless sensor networks are the set of connections which are vulnerable to many security concerns. Hence, the security of IoT becomes vital. Machine learning motivates numerous resolutions to secure the IoT. Here, we review diverse intimidation that have a higher probability of attacking IoT and various machine learning procedure designed to counteract them.
Social Science Research Network, 2018
Handbook of Research on Cloud Computing and Big Data Applications in IoT, 2019
The need for data outsourcing or database as a service (DaaS) is extremely important for any orga... more The need for data outsourcing or database as a service (DaaS) is extremely important for any organization. In addition, data storage or data retrieval cost high especially for small companies. This chapter aims to study the various challenges in cloud computing communication issue. The chapter on multi-tiering a cloud emphasizes security enhancement due to the application of tiers in the cloud such that services availability is also improved. Cloud computing is a recent network trend for advanced communication systems. A lot of research led to the advancements in the areas of newer modes but multi-tiering a cloud is still an embarking issue for the researchers.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Map Matching is an important concept for navigation and tracking application of the computer scie... more Map Matching is an important concept for navigation and tracking application of the computer science domain. This research work investigates, how curve geometry influences the vehicle drivers in curves based on tracking data?. Map Matching algorithms for real-time location tracking system, putting special emphasis on path analysis, tracking points monitoring with GPS and IRNSS signals structure and quality analysis on L2, L5 frequency band. The objective od this research work is to proosed a novel map matching algorithm for real time location tracking, real path analysis, vehicles trajectory computation and satellites signals analysis on road networks. This work also introduces mathematical analyses process for current navigation signals process on the signal waveforms.
Sustainable progress is an ideal which leads to sustainability, which can only be achieved throug... more Sustainable progress is an ideal which leads to sustainability, which can only be achieved through green engineering. Green engineering is defined as an engineering which is developed for the environment. In terms of industry scenario, green engineering involves design for reduction of emissions, design to eradicate predominantly dangerous chemicals, design to minimalise the usage of natural resources and design to minimise energy usage. Internet of Things (IoT) defines the association of physical electronic devices and vehicles and at times covers entire structures over IP networks enabling them to interconnect amongst themselves. All these devices are embedded with software, sensors and actuators for collecting and exchanging data amongst themselves. This chapter discusses the concept of IOT in green engineering transformation for smart cities and the role of IOT in establishing communication amongst devices to implement smart living and smart environment. It further discusses the...
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
After the introduction of fifth generation network, there are several prospects and encounters fo... more After the introduction of fifth generation network, there are several prospects and encounters for the evolving technologies like Virtual Reality (VR) and Augmented Reality (AR). This paper emphases on the possibilities of 5G network and how 5G will integrate with Virtual Reality and Augmented Reality and Tactile Internet. Tactile Internet in AR/VR is intended to generate a model alteration from the content-oriented interactions (through internet) towards remote based connections by empowering synchronized broadcast of tactile data like vibration, touch, gestures, surface texture over wireless network with the regular audio and visual data traffics which are also transferred over wireless network. Finally, this research paper intends to provide an overall opinion on the use of Tactile Internet in AR/VR, and to recognize and examine the involved drawbacks and technical problems, and to provide the possible resolutions and to suggest upcoming research guidelines. Initially, opening with the future of Tactile Internet in AR/VR and recent developments in this field, this paper presents a comprehensive outline for Tactile Internet in AR/VR in the past the 5G Era including a Tactile Internet planning, the VR/AR planning, the core technical problems, the important application studies, how it can be possibly enable ground-breaking ways to use Augmented Reality and Virtual Reality. Later, we can see a complete evaluation of the present Tactile Internet progress by generally classifying them into two main instances; specifically, haptic feedback and portable AR/VR device using 5G network. Finally, learning about both Tactile Internet and Augmented Reality/Virtual Reality, we will learn how 5G can change the way Tactile Internet integrates and works with AR/VR that can make an impact in the ever-growing IoT world.
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
Cloud computing has become a vital part of our everyday life. A decade ago, proposing an idea on ... more Cloud computing has become a vital part of our everyday life. A decade ago, proposing an idea on the improvement of cloud seemed like a reach. Just like with any other technology, cloud has its own drawbacks too. The way our life is moving at a fast pace, we can’t begin to think of checking our backups every other day. It exhausts most people to even give it a thought. Ransom ware attacks have become so much common which eventually gave rise to the creation of multiple software. Retrieving lost files and data will become much easier if it were to be stored elsewhere prior to an attack. The subject cloud in itself has been overlooked and the fact that the same is the base for further alleviation hasn’t been paid enough attention too. Improving an already existing technology almost always starts with going through its previous version’s capabilities. This paper will mainly focus on how certain techniques are favoured over the other due to it meeting the standards for both personal and official usage. In simpler words, how those said techniques help small businesses develop themselves with the help of dependable backup with low cloud cost. The combination of machine learning and artificial intelligence in automation of disaster recovery testing is the future of cloud computing. When all of this checks the box, security would still be an issue. In this paper, I propose a combined approach to the access of cloud with two major algorithms: Seed block and Rivest Shamir Adleman.
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
Providing safety to the data stored in the cloud should be prioritized and henceforth remains a c... more Providing safety to the data stored in the cloud should be prioritized and henceforth remains a crucial part of the cloud ecosystem. Security of the end users data from both insiders as well as outsiders is an important factor of a cloud server. Dynamic provisioning of services is a problem. To fulfil the criteria of multilayered applications, virtualization based services are used at SLA (Service-Level-Agreement). To meet the stringent and highly secure facilities of the web apps it is extremely necessary to move cloud computing from solo to many domains.
Journal of Statistics and Management Systems, 2017
Abstract Networks which are lacking in uninterrupted back-to-back links amongst their nodes due t... more Abstract Networks which are lacking in uninterrupted back-to-back links amongst their nodes due to node movement, controlled power sources or restricted data storage space are called DTNs. To rise above this irregular connectivity, DTN nodes stock up and hold the data packets they accept until they come into communication range of each other. In addition, they extend many copies of the same packet on the network to increase the deliverance prospect. In recent time, several routing protocols have been developed specifically for DTNs. These protocols differ in the number of copies they extend and the information they use to guide the packets to their destinations. This paper studies four recognized DTN routing protocols i.e. EPIDEMIC, Spray-and-Wait, PROPHET and MAXPROP. In this paper, DTN is studied along with its protocols and measured in environment of packet deliverance, delivery cost and average packet delay and finally finding out the best protocol under certain networking parameters.
International Journal of System Assurance Engineering and Management, 2021