Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where M. P. Singh is active.

Publication


Featured researches published by M. P. Singh.


Clinical and Experimental Immunology | 2004

Cellular and humoral immune responses to mycobacterial heat shock protein-65 and its human homologue in Takayasu's arteritis

S. Kumar Chauhan; N. Kumar Tripathy; Nakul Sinha; M. P. Singh; Soniya Nityanand

Expression of heat shock protein (HSP)‐65 as well as infiltration of T‐cells in arterial lesions and raised levels of circulating antibodies against mycobacterial HSP65 (mHSP65) led us to the concept that mHSP65 or its human homologue (hHSP60) might be involved in the etiopathogenesis of Takayasus arteritis (TA). Therefore, we investigated mHSP65 and hHSP60 reactive peripheral blood T‐cell subsets by BrdU incorporation assay and flow cytometry as well as investigating the different isotypes of anti‐mHSP65 and hHSP60 antibodies by ELISA. Eighty‐four percent (22/26) of the TA patients were observed to show T‐cell proliferation to mHSP65 and hHSP60 whereas only 16% (3/18) healthy controls showed such proliferation (P < 0·001). Both HSPs induced proliferation of exclusively CD4+ T‐cells and not CD8+ T‐cells. We also observed a significantly higher prevalence of only the IgG isotype reactive to mHSP65 and hHSP60 in TA as compared to HC (mHSP65: 92% TA versus 11% HC, P < 0·0001 and hHSP60: 84% versus 22%, P < 0·001). Our data show a significant correlation between mHSP65 and hHSP60 reactive T‐cells (CD3+: r = 0·901; CD4+: r = 0·968) as well as anti‐mHSP65 and anti‐hHSP60 IgG antibodies (r = 0·814) suggesting an infection induced autoimmunity in TA, possibly induced by molecular mimicry between mHSP65 and hHSP60 or other tissue specific antigens.


international conference on energy efficient technologies for sustainability | 2013

Survey of clustering algorithms using fuzzy logic in wireless sensor network

Priti Kumari; M. P. Singh; Prabhat Kumar

This paper illustrates the successful application of fuzzy logic in wireless sensor networks. There are different disciplines which make use of fuzzy logic such as event forecasting, redundancy reduction, querying to sensor network database, deployment, clustering, MAC protocol etc. In this survey paper, clustering techniques with fuzzy logic are discussed which associates advantages of localized control, scalability and energy conservation. Finally, other factors which affect clustering along with efficient cluster head selection are considered.


ieee region 10 conference | 2015

Source location privacy using multiple-phantom nodes in WSN

Prabhat Kumar; Jyoti Prakash Singh; Prateek Vishnoi; M. P. Singh

The ever increasing integration of sensor-driven application into our lives has led to sensor privacy becoming an important issue. The locational information of sensor nodes has to be hidden from adversary for the sake of privacy. An adversary may trace traffic and try to figure out the location of the source node. This work attempts to improve the Source Location Privacy by using two phantom nodes, selection of neighbors based on random based approach and random walk upto phantom nodes. Two phantom nodes are selected for each source node in such a way that no two phantom nodes of the same triplet are co-linear with the sink. The proposed protocol can keep the adversary confused within the sensor networks as it generates different paths for different packets for the same source. Here, we are distracting the adversary by creating alternate paths. This results in minimizing the hit-ratio, thereby maximizing the privacy. Analysis of the present work shows that this protocol tends to achieve more privacy and greater safety period as compared to single phantom routing protocol. Flooding techniques and dummy packets have not been used in working phase for the sake of energy efficiency and network congestion.


international conference on smart technologies and management for computing communication controls energy and materials | 2015

Crop Selection Method to maximize crop yield rate using machine learning technique

Rakesh Kumar; M. P. Singh; Prabhat Kumar; Jyoti Prakash Singh

Agriculture planning plays a significant role in economic growth and food security of agro-based country. Se- lection of crop(s) is an important issue for agriculture planning. It depends on various parameters such as production rate, market price and government policies. Many researchers studied prediction of yield rate of crop, prediction of weather, soil classification and crop classification for agriculture planning using statistics methods or machine learning techniques. If there is more than one option to plant a crop at a time using limited land resource, then selection of crop is a puzzle. This paper proposed a method named Crop Selection Method (CSM) to solve crop selection problem, and maximize net yield rate of crop over season and subsequently achieves maximum economic growth of the country. The proposed method may improve net yield rate of crops.


International Journal of Computer Applications | 2014

A Survey on Lightweight Block Ciphers

Prabhat Kumar Kushwaha; M. P. Singh; Prabhat Kumar

Ubiquitous and pervasive computing are new era of computing and it needs lightweight cryptographic algorithms for security. Lightweight cryptography is used for resource constrained devices (which have limited memory, limited power and less processing capability) such as radio frequency identification (RFID) tags, contactless smart cards, wireless sensor network, health care devices and internet of things (IoT). The design of lightweight block cipher has been active research topic over the years. The comparative evaluations of these block ciphers (which actually reach low cost goal) on any platform is hard. In this paper comparative evaluation of selected symmetric key lightweight block ciphers such as PRINT, PRESENT, EPCBC, DESL, TWINE, Puffin, KLEIN, KATAN, LED, LBLOCK and RECTANGLE is presented.


international conference on information technology: new generations | 2014

Supervised Semantic Analysis of Product Reviews Using Weighted k-NN Classifier

Ankita Srivastava; M. P. Singh; Prabhat Kumar

On line shopping, today, has become the call of the day. People are showing more inclination towards on line shops, due to large variety of options at fingertips, ease of access, access to global products. Further the buyer also benefits from information regarding user review of products, comparison of similar products etc. Therefore the importance of product review is also escalating exponentially. Most of the existing sentiment analysis systems require large training datasets and complex tools for implementation. This paper presents a Two-Parse algorithm with a training dataset of approximately 7,000 keywords, for automatic product review analysis. The proposed algorithm is more efficient as compared to some of the popular review analysis systems with enormous datasets. This algorithm is a solution to a very common problem of high polarity of datasets. This paper proposes a Weighted k-Nearest Neighbor (Weighted k-NN) Classifier which achieves a better efficiency than the classical k-Nearest Neighbor Classifier. The proposed Classifier is capable of successfully classifying weakly and mildly polar reviews along with the highly polar ones. The Classifier provides an option of modifying the parameters according to need of the system and thus overcomes the problem of static parameters in classical machine learning algorithms.


international conference on advances in computing and communication engineering | 2015

Survey of MAC Protocol for Wireless Sensor Networks

Akansha Verma; M. P. Singh; Jyoti Prakash Singh; Prabhat Kumar

Energy being a key constraint in wireless sensor networks (WSN) became a significant area of interest for various researches in WSN. A lot of work on energy conservation at different layers of protocol stack is present till date, of which energy conservation at Medium access control (MAC) layer is catching a lot of attention. Researchers have proposed several protocols for energy conservation in WSN at MAC layer. This paper presents a survey on some of the popular MAC layer protocols. It also provides a brief analysis of these protocols which could be helpful in future work in this direction. This paper also provides a reference for further research in this area giving an insight on energy conservation at MAC layer.


Archive | 2016

Privacy Preservation of Source Location Using Phantom Nodes

Shruti Gupta; Prabhat Kumar; Jyoti Prakash Singh; M. P. Singh

Sensor networks are widely used for subject monitoring and tracking. In this modern era of wireless technology, privacy has become one of the essential concerns of wireless sensor networks. The location information of sensor nodes has to be hidden from an adversary for the sake of privacy. An adversary may trace the traffic and try to figure out the location of the source node. This can expose a significant amount of information about the subject being monitored which may be further misused by the adversary. This paper proposes 2-Phantom Angle-based Routing Scheme (2PARS) designed to improve the Source Location Privacy. The proposed scheme considers a triplet for selecting the phantom nodes. A triplet is a group of three nodes formed on the basis of their distance from the sink, their location information and the inclination angle between them. For every single packet transmission, phantom selection is performed thereby creating alternative paths. As the path changes dynamically, the safety period increases without any significant increase in the packet latency. The analysis shows that this scheme performs better in terms of safety period as compared to single phantom routing and multi-phantom routing schemes.


ieee region 10 conference | 2015

Energy efficient multi-hop routing based on improved LEACH-CE for wireless sensor network

Prabhat Kumar; Jyoti Prakash Singh; Deepak Kumar; M. P. Singh

Hundreds and thousands of small, limited battery operated sensor nodes constitutes wireless sensor network. These type of network is used for monitoring a variety of applications. The main goal of wireless sensor network is to send the sensed information to the base station as efficiently as possible through wireless links, to maximize the network life time. Among various energy efficient routing schemes, cluster based hierarchical routing is quite efficient one. This paper improves the LEACH-CE protocol which is not suitable for multi-hop communication. This paper explores a new approach for multi-hop routing where cluster head selection and cluster formation is accomplished by LEACH-CE protocol. In the proposed approach complete network is divided into two zones i.e., near zone and far zone based on threshold distance. Far zone is further divided into different zones based on threshold distance. The cluster head belonging to near zone transmits data directly to the base station while the cluster head belonging to far zone transmits data via relay cluster head. Theoretically, proposed solution gives better results as compared to the other existing protocol such as LEACH, LEACH-C in terms of network lifetime.


international conference on computational intelligence and communication networks | 2014

Virtual Coordinates Routing Using VCP-M in Wireless Sensor Network

Raj Anwit; Prabhat Kumar; M. P. Singh

In a short time virtual position based routing has established itself as a potent research area in wireless sensor networks (WSN). Although GPS based routing solution are available but they have the disadvantages of being costly, have limited indoor operation and network unreliability in sensor networks creates significant overhead on geographical routing. Virtual routing protocols provide some remedial measures with desirable trade offs between performances and overhead that occur in the case of geographical routing. In this paper an improved localization method called VCP-M is proposed followed by a greedy routing method. A good localization method in wireless sensor network reduces overhead on nodes in terms of receiving and sending packets. A node in WSN has limited amount of energy, so proper utilization of energy is of utmost importance. The proposed localization method in the protocol reduces the number of packets generated in the network significantly. This results in less overhead on the nodes to process the packet. So energy of the nodes are utilized without much wastage.

Collaboration


Dive into the M. P. Singh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rakesh Kumar

Maulana Azad Medical College

View shared research outputs
Top Co-Authors

Avatar

Jagdish Prasad

Vardhman Mahavir Medical College

View shared research outputs
Top Co-Authors

Avatar

Pramod Kumar Agrawal

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

R. Joshi

National Environmental Engineering Research Institute

View shared research outputs
Top Co-Authors

Avatar

Atul Kumar

The Energy and Resources Institute

View shared research outputs
Top Co-Authors

Avatar

B. Kumar

National Geophysical Research Institute

View shared research outputs
Top Co-Authors

Avatar

Gargi Srivastava

Birbal Sahni Institute of Palaeobotany

View shared research outputs
Top Co-Authors

Avatar

Harshit Ranjan

Sikkim Manipal University

View shared research outputs
Top Co-Authors

Avatar

Nakul Sinha

Sanjay Gandhi Post Graduate Institute of Medical Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge