Nanhay Singh
Ambedkar Institute of Advanced Communication Technologies and Research
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nanhay Singh.
International Journal of Vehicular Technology | 2014
Ram Shringar Rao; Sanjay Soni; Nanhay Singh; Omprakash Kaiwartya
In recent years, various routing metrics such as throughput, end-to-end delay, packet delivery ratio, path duration, and so forth have been used to evaluate the performance of routing protocols in VANETs. Among these routing metrics, path duration is one of the most influential metrics. Highly mobile vehicles cause frequent topology change in vehicular network environment that ultimately affects the path duration. In this paper, we have derived a mathematical model to estimate path duration using border node-based most forward progress within radius (B-MFR), a position based routing protocol. The mathematical model for estimation of path duration consists of probability of finding next-hop node in forwarding region, estimation of expected number of hops, probability distribution of velocity of nodes, and link duration between each intermediate pair of nodes. The analytical results for the path duration estimation model have been obtained using MATLAB. The model for path duration estimation has been simulated in NS2. Each of the analytical results has been verified through respective simulation results. The result analysis clearly reveals that path duration increases with the increase in transmission range and node density and decreases with the increase in the number of hops in the path and velocity of the nodes.
ICACNI | 2014
Nanhay Singh; Achin Jain; Ram Shringar Raw; Rahul Raman
In today’s scenario, Web traffic is increasing everyday in the world and has overtaken P2P traffic. The Websites are getting hacked on daily basis. These rises in hacking activity pose a greater threat than the network attacks as they threaten to steal crucial and important information from Website. This information can be related to the users, employee, and other important data stored in applications and database linked to the Website. Increase in Web network traffic has opened new and more efficient attack vectors for the hackers and attackers to work with. Attackers take advantage of the vulnerability in traditional firewalls deployed on Website. These firewalls are not designed to protect Web applications; lots of Websites are getting attacked by malicious scripts and users. In this paper, many Web attacks are carried out on Web applications hosted on local server to analyze the log file created after the attacks. A Web application log file allows a detailed analysis of a user action. We have simulated some Web attacks using MATLAB. Results extracted from this process helps in the recognition of majority of the attacks and helps in prevention from further exploitation.
advances in computing and communications | 2013
Nanhay Singh; Arvind Panwar; Ram Shringar Raw
Web caching is used to reduce the network traffic by caching web pages at the proxy server level. Nowadays caching alone is not sufficient because of World Wide Web has evolved rapidly from a simple information-sharing mechanism. This mechanism offer only static text and images to a rich assortment of dynamic and interactive services, such as video/audio conferencing, e-commerce and distance learning. Web is demanding to improve the cache performance. If we use the prefetching technique with caching then the performance of cache is improved. Prefetching fetches objects that are likely to be accessed in the near future and store them in advance thus the response time of the user request is reduced. In this paper, our main objective is to give a new framework to improve performance of web proxy server using web usage mining and prefetching scheme. Further, we cluster the user according to their access pattern and usage behavior with the help of K-Means algorithm and then Apriori algorithm is applied to generate rules for prefetching pages. This cluster based approach is applied on proxy server web log data to test the results using LRU and LFU prefetching schemes.
International Journal of Computer Applications | 2012
Nanhay Singh; Bhoopesh Singh Bhati; Ram Shringar Raw
In the electronic world, one of the most appropriate “hosts” for steganography are digital images. Digital photographs are a commonly shared, sent, and exchanged throughout the Internet in the form of email attachments or web postings. However, current steganographic software available on the market has poor support for high-capacity image steganography. Even worse, some steganographic software actually distorts or degrades the appearance of cover images and therefore exposes the steganographic transformation the image has undergone. In this paper, we propose an algorithm for investigate digital image by steganalysis which is extended version of Modified Kekre Algorithm.
international conference on computing, communication and automation | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Angel Panesar
Web applications are a fundamental pillar of todays world. Society depends on them for business and day to day tasks. Because of their extensive use, Web applications are under constant attack by hackers that exploit their vulnerabilities to disrupt business and access confidential information. SQL Injection and Remote File Inclusion are the two most frequently used exploits and hackers prefer easier rather than complicated attack techniques. Every day as number of Internet users are increasing, the vulnerabilities of a system being attacked is becoming easier. SQL Injection is one of the most common attack method that is being used these days. Havij is one of the tools used to implement SQL Injection which will be discussed in this paper. Our research objective is to analyse the use of Havij in penetration testing in IT industry and to compare various SQL Injection tools available in the market.
Archive | 2018
Mohit Dayal; Nanhay Singh
Big data, an easily catching phrase is given to huge and complex amount of data where data size exceeds by terabytes and zetabytes and more. Twitter, Facebook, and other sites are generating enormous amount of data on regular basis and performing analysis on it using various tools and technologies. There is a surge in development of analyzing tools as this much amount of data cannot be processed by the traditional tools. Big data analytics refer to the techniques that can be used for converting raw data into meaningful information which helps in business analysis and forms a decision support system for the executives in the organization. In this paper, we analyzed and evaluated the market of 14 countries through optimized MapReduce program to find out the total percentage of products produced by different market of different countries. Based on the probability, the products are categorized on the basis of high, medium, and low and then for each country we found out the total count of the market that is producing widely. The objective of this analysis was to evaluate the market of each country on the basis of various goods produced by different market. Production of some goods is highly concentrated while others are widely produced. Market experts have to come up with new and innovative idea and technologies in order to increase the production of the concentrated products. So that even distribution of production can be seen in the country.
international conference on advances in computer engineering and applications | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Radhika Murari
Routers can also function as firewalls and perform various operations on the incoming and outgoing packets. In case when all the packets share common header characteristics, it is termed as a packet flow. In order to classify a packet, routers perform a lookup on a classifier table using one or more fields from the packet header to classify the packet into its corresponding flow. A classifier is a set of rules which identify each flow and the appropriate actions to be taken for any packet belonging to that flow. The paper examines the problem of packet classification and various proposed techniques for the same.
international conference on advances in computer engineering and applications | 2015
Bharti Nagpal; Nanhay Singh; Naresh Chauhan; Pratima Sharma
Honeypots act as security resources that are used to catch malign activities, so they may be anatomized and watched. During the past few years, they are called as a safeguard of assets of an organization. They are used to acquire information on interrupters in a network. This paper gives an introduction to the honeypots, their classification, detailed study of commercial as well as open source honeypots tools and comparison between them. This paper may be helpful for readers to secure their resources from intruders by using the freely available honeypots tools.
International Journal of Computer Applications | 2010
Nanhay Singh; R. K. Chauhan; Raghuraj Singh
XML is becoming a prevalent format and defacto standard for data exchange in many applications. While traditionally, lots of data are stored and managed in relational databases. There is an urgent need to research some efficient methods to convert these data stored in relational databases to XML format when integrating and exchanging these data in XML format. The semantics of XML schemas are crucial to design, query, and store XML documents and functional dependencies are very important representations of semantic information of XML schemas. As DTDs are one of the most frequently used schemas for XML documents in these days, we will use DTDs as schemas of XML documents here. This paper studies the problem of schema conversion from relational schemas to XML DTDs. As functional dependencies play an important role in the schema conversion process, the concept of functional dependency for XML DTDs is used to preserve the semantics implied by functional dependencies and keys of relational schemas. A conversion method is proposed to convert relational schemas to XML DTDs in the presence of functional dependencies, keys and foreign keys. The methods presented here can preserve the semantics implied by functional dependencies, keys and foreign keys of relational schemas and can convert multiple relational tables to XML DTDs at the same time.
Physical Review C | 2009
P. K. Rath; Nanhay Singh; S. Mukherjee; S. Appannababu; S. Santra; V. V. Parkar; B. K. Nayak; K. Mahata; R. K. Choudhury; R. M. Tripathi; R. Palit; Suresh Kumar
Complete fusion excitation function for the {sup 6}Li+{sup 144}Sm reaction has been measured at near barrier energies by the activation technique. Coupled-channel calculations show an enhancement in fusion cross section at energies below the barrier compared to the one-dimensional barrier penetration model calculation, but they overpredict it in the entire energy range compared to the experimental data. Reduced fusion cross sections for the present system at energies normalized to the Coulomb barrier were also found to be systematically lower than those with strongly bound projectiles forming a similar compound nucleus. These two observations conclusively show that the complete fusion cross section, at above barrier energies, is suppressed by {approx}32% in the {sup 6}Li+{sup 144}Sm reaction. Reanalyses of existing fusion data for {sup 7}Li+{sup 165}Ho and {sup 7}Li+{sup 159}Tb also show a suppression compared to those with strongly bound projectiles, which contradicts earlier conclusions. The fusion suppression factor seems to exhibit a systematic behavior with respect to the breakup threshold of the projectile and the atomic number of the target nucleus.
Collaboration
Dive into the Nanhay Singh's collaboration.
Ambedkar Institute of Advanced Communication Technologies and Research
View shared research outputsAmbedkar Institute of Advanced Communication Technologies and Research
View shared research outputsAmbedkar Institute of Advanced Communication Technologies and Research
View shared research outputs