Nagender Aneja | Universiti Brunei Darussalam (original) (raw)
Papers by Nagender Aneja
NoSQL: Database for Storage and Retrieval of Data in Cloud, 2017
This document represents the considered judgement and personal views of the participating individ... more This document represents the considered judgement and personal views of the participating individuals listed on the following page with expertise in the subject field. It shall not be considered the official position of IEEE or any of its committees, and shall not be relied upon as a formal position of IEEE. It is published by the IEEE Internet Initiative to enhance knowledge and promote discussion of the issues addressed.
arXiv (Cornell University), Dec 31, 2021
Wireless Communications and Mobile Computing, Feb 6, 2023
IAES International Journal of Artificial Intelligence, Dec 1, 2022
Research Journal of Applied Sciences, Engineering and Technology, Sep 15, 2014
In this study, the performance of a high resolution numerical weather prediction (NWP) model is i... more In this study, the performance of a high resolution numerical weather prediction (NWP) model is investigated in a particular weather situation, namely, in winter anticyclonic cases over land with low level clouds and fog. Most NWP models tend to underestimate low level cloudiness during these events which causes the overestimation of daytime temperature. Several sensitivity tests are performed to trace the cause of the erroneous model performance, and it is shown that model microphysics and, in particular, the autoconversion of cloud ice to snow is responsible for the underestimation of cloud cover. A modification is proposed which significantly reduces ice autoconversion and consequently keeps the low level clouds for situations with temperatures below freezing level. The modification is tested on several case studies and also on longer time intervals and proves to be applicable for operational model runs.
International Conference on Computing for Sustainable Global Development, Mar 16, 2016
Recent communication technology have made ad-hoc networking possible in latest mobile phones usin... more Recent communication technology have made ad-hoc networking possible in latest mobile phones using peer-to-peer networking. This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android. The implementation phase is divided into different phases like registration, login, profile management, social connection management, and communication management. Android Development Tool (ADT) was used to implement the software framework. The software framework can be used to chat, share text, image, or files among users in a mobile ad-hoc network. The implementation has been done for Android but it can easily be used for iOS, Windows, and other mobile operating system.
International journal of intelligent networks, 2023
arXiv (Cornell University), Mar 21, 2023
Wireless Communications and Mobile Computing
WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devic... more WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devices the ability to communicate at fast speeds, with low latency and with a high capacity. Will they coexist and share the burden of delivering a connection to devices at home, on the road, in the workplace, and at a park or a stadium? Or will one replace the other to manage the increase in endpoints and traffic in the enterprise, campus, and manufacturing environments? In this research, we describe IoT device testbeds to collect network traffic in a local area network and cyberspace including beyond 5G/6G network traffic traces at different layers. We also describe research problems and challenges, such as traffic classification and traffic prediction by the traffic traces of devices. An AI-enabled hierarchical learning architecture for the problems above using sources like network packets, frames, and signals from the traffic traces with machine learning models is also presented.
Applied Artificial Intelligence
According to the National Nanotechnology Initiative, NNI, nanotechnology is the science and under... more According to the National Nanotechnology Initiative, NNI, nanotechnology is the science and understanding of materials or matters where the diameters range from 1 to 100 nm, generally [1]. This definition continues to be used by numerous federal offices, which include the United States Food and Drug Administration (FDA), as well as the Patent and Trademark Office (PTO) [2]. However, this particular definition restricted to the size limitation may not be accurate since nanomaterials having sized up to a few hundred nanometers can still have their unique properties. Accordingly, the National Institute of Health introduced an alternative definition that does not depend on sizes, since nanotechnology has a wider range of uses and is being used in various fields [2].
IAES International Journal of Artificial Intelligence (IJ-AI)
Media news are making a large part of public opinion and, therefore, must not be fake. News on we... more Media news are making a large part of public opinion and, therefore, must not be fake. News on web sites, blogs, and social media must be analyzed before being published. In this paper, we present linguistic characteristics of media news items to differentiate between fake news and real news using machine learning algorithms. Neural fake news generation, headlines created by machines, semantic incongruities in text and image captions generated by machine are other types of fake news problems. These problems use neural networks which mainly control distributional features rather than evidence. We propose applying correlation between features set and class, and correlation among the features to compute correlation attribute evaluation metric and covariance metric to compute variance of attributes over the news items. Features unique, negative, positive, and cardinal numbers with high values on the metrics are observed to provide a high area under the curve (AUC) and F1-score.
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON)
Device Fingerprinting for Access Control over a Campus and Isolated NetworkDevice Fingerprinting ... more Device Fingerprinting for Access Control over a Campus and Isolated NetworkDevice Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset.First Experiment: Raspberry PiWe developed a packet sniffer application to capture IAT of packets. Packet sniffer application was installed on Raspberry pi that was configured to work as router. We connceted two devices iPad4 and iPhone 7 Plus to the router and created IAT graphs for these two devices. Our scheme based on Convolution Neural Network (CNN) was able to identify the devices with accuracy of 86.7%.DFP on Raspberry PiSecond Experiment: Crawdad DatasetIn the second experiment, we tested the ...
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
Recent communication technology have made ad-hoc networking possible in latest mobile phones usin... more Recent communication technology have made ad-hoc networking possible in latest mobile phones using peer-to-peer networking. This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android. The implementation phase is divided into different phases like registration, login, profile management, social connection management, and communication management. Android Development Tool (ADT) was used to implement the software framework. The software framework can be used to chat, share text, image, or files among users in a mobile ad-hoc network. The implementation has been done for Android but it can easily be used for iOS, Windows, and other mobile operating system.
Wireless Personal Communications, 2017
Research Journal of Applied Sciences, Engineering and Technology, 2016
Research Journal of Applied Sciences, Engineering and Technology, 2014
NoSQL: Database for Storage and Retrieval of Data in Cloud, 2017
This document represents the considered judgement and personal views of the participating individ... more This document represents the considered judgement and personal views of the participating individuals listed on the following page with expertise in the subject field. It shall not be considered the official position of IEEE or any of its committees, and shall not be relied upon as a formal position of IEEE. It is published by the IEEE Internet Initiative to enhance knowledge and promote discussion of the issues addressed.
arXiv (Cornell University), Dec 31, 2021
Wireless Communications and Mobile Computing, Feb 6, 2023
IAES International Journal of Artificial Intelligence, Dec 1, 2022
Research Journal of Applied Sciences, Engineering and Technology, Sep 15, 2014
In this study, the performance of a high resolution numerical weather prediction (NWP) model is i... more In this study, the performance of a high resolution numerical weather prediction (NWP) model is investigated in a particular weather situation, namely, in winter anticyclonic cases over land with low level clouds and fog. Most NWP models tend to underestimate low level cloudiness during these events which causes the overestimation of daytime temperature. Several sensitivity tests are performed to trace the cause of the erroneous model performance, and it is shown that model microphysics and, in particular, the autoconversion of cloud ice to snow is responsible for the underestimation of cloud cover. A modification is proposed which significantly reduces ice autoconversion and consequently keeps the low level clouds for situations with temperatures below freezing level. The modification is tested on several case studies and also on longer time intervals and proves to be applicable for operational model runs.
International Conference on Computing for Sustainable Global Development, Mar 16, 2016
Recent communication technology have made ad-hoc networking possible in latest mobile phones usin... more Recent communication technology have made ad-hoc networking possible in latest mobile phones using peer-to-peer networking. This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android. The implementation phase is divided into different phases like registration, login, profile management, social connection management, and communication management. Android Development Tool (ADT) was used to implement the software framework. The software framework can be used to chat, share text, image, or files among users in a mobile ad-hoc network. The implementation has been done for Android but it can easily be used for iOS, Windows, and other mobile operating system.
International journal of intelligent networks, 2023
arXiv (Cornell University), Mar 21, 2023
Wireless Communications and Mobile Computing
WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devic... more WiFi and private 5G networks, commonly referred to as P5G, provide Internet of Things (IoT) devices the ability to communicate at fast speeds, with low latency and with a high capacity. Will they coexist and share the burden of delivering a connection to devices at home, on the road, in the workplace, and at a park or a stadium? Or will one replace the other to manage the increase in endpoints and traffic in the enterprise, campus, and manufacturing environments? In this research, we describe IoT device testbeds to collect network traffic in a local area network and cyberspace including beyond 5G/6G network traffic traces at different layers. We also describe research problems and challenges, such as traffic classification and traffic prediction by the traffic traces of devices. An AI-enabled hierarchical learning architecture for the problems above using sources like network packets, frames, and signals from the traffic traces with machine learning models is also presented.
Applied Artificial Intelligence
According to the National Nanotechnology Initiative, NNI, nanotechnology is the science and under... more According to the National Nanotechnology Initiative, NNI, nanotechnology is the science and understanding of materials or matters where the diameters range from 1 to 100 nm, generally [1]. This definition continues to be used by numerous federal offices, which include the United States Food and Drug Administration (FDA), as well as the Patent and Trademark Office (PTO) [2]. However, this particular definition restricted to the size limitation may not be accurate since nanomaterials having sized up to a few hundred nanometers can still have their unique properties. Accordingly, the National Institute of Health introduced an alternative definition that does not depend on sizes, since nanotechnology has a wider range of uses and is being used in various fields [2].
IAES International Journal of Artificial Intelligence (IJ-AI)
Media news are making a large part of public opinion and, therefore, must not be fake. News on we... more Media news are making a large part of public opinion and, therefore, must not be fake. News on web sites, blogs, and social media must be analyzed before being published. In this paper, we present linguistic characteristics of media news items to differentiate between fake news and real news using machine learning algorithms. Neural fake news generation, headlines created by machines, semantic incongruities in text and image captions generated by machine are other types of fake news problems. These problems use neural networks which mainly control distributional features rather than evidence. We propose applying correlation between features set and class, and correlation among the features to compute correlation attribute evaluation metric and covariance metric to compute variance of attributes over the news items. Features unique, negative, positive, and cardinal numbers with high values on the metrics are observed to provide a high area under the curve (AUC) and F1-score.
2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON)
Device Fingerprinting for Access Control over a Campus and Isolated NetworkDevice Fingerprinting ... more Device Fingerprinting for Access Control over a Campus and Isolated NetworkDevice Fingerprinting (DFP) is a technique to identify devices using Inter-Arrival Time (IAT) of packets and without using any other unique identifier. Our experiments include generating graphs of IATs of 100 packets and using Convolutional Neural Network on the generated graphs to identify a device. We did two experiments where the first experiment was on Raspberri Pi and other experiment was on crawdad dataset.First Experiment: Raspberry PiWe developed a packet sniffer application to capture IAT of packets. Packet sniffer application was installed on Raspberry pi that was configured to work as router. We connceted two devices iPad4 and iPhone 7 Plus to the router and created IAT graphs for these two devices. Our scheme based on Convolution Neural Network (CNN) was able to identify the devices with accuracy of 86.7%.DFP on Raspberry PiSecond Experiment: Crawdad DatasetIn the second experiment, we tested the ...
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
Recent communication technology have made ad-hoc networking possible in latest mobile phones usin... more Recent communication technology have made ad-hoc networking possible in latest mobile phones using peer-to-peer networking. This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android. The implementation phase is divided into different phases like registration, login, profile management, social connection management, and communication management. Android Development Tool (ADT) was used to implement the software framework. The software framework can be used to chat, share text, image, or files among users in a mobile ad-hoc network. The implementation has been done for Android but it can easily be used for iOS, Windows, and other mobile operating system.
Wireless Personal Communications, 2017
Research Journal of Applied Sciences, Engineering and Technology, 2016
Research Journal of Applied Sciences, Engineering and Technology, 2014