Nikhil Kumar Singh
Maulana Azad National Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nikhil Kumar Singh.
International Journal of Computer Applications | 2010
Nikhil Kumar Singh; Deepak Singh Tomar; Bhola Nath Roy
the end user in the web environment is a mind- numbing task. Huge amount of operational data is generated when end user interacts in web environment. This generated operational data is stored in various logs and may be useful source of capturing the end user activates. Pointing out the suspicious user in a web environment is a challenging task. To conduct efficient investigation in cyber space the available logs should be correlated. In this paper a prototype system is developed and implemented which is based on relational algebra to build the chain of evidence. The prototype system is used to preprocess the real generated data from logs and classify the suspicious user based on decision tree. At last various challenges in the logs managements are presented. Keywordsforensic; log file; correlation; decision tree,chain of evidence ,cyber crime;.
international conference on computational intelligence and communication networks | 2015
Khushboo Singh; Anubhav Sharma; Nikhil Kumar Singh
Performance of routing over Mobile Ad Hoc Network (MANET) varies with network density and mobility of node. Any routing protocol is ideal when it search route with minimal utilization of network resource like bandwidth, time, and energy. But route hunting in mobile ad-hoc network is carried by blind flooding of route request packets. Blind flooding of route request packets lead to increase traffic, conjunction and redundancy over the networks. In this paper power aware location aided routing protocol is proposed. Propose energy efficient Location aided routing protocol use Linear Regression and curve intersection point area to minimize requested zone and node categorization on the basis of battery power.
Archive | 2018
Nikhil Kumar Singh; Niraj Sharma; Zakir Ali; Vinod Kumar Singh; Akash Kumar Bhoi
In this paper, a novel design of defected ground circular patch antenna using glass epoxy materials has been presented. The substrate of the intended antenna was prepared of glass epoxy, whereas patch and ground plane are made out of copper. Enhancement in the geometry is done by increasing the electrical length and volume without growing the size of the patch antenna. The simulations were accomplished using Computer Simulation Technology software and the association of measured and simulated results of anticipated antenna has been studied. Experimental and simulated outcome are in outstanding conformity.
Archive | 2018
Rachana Kushwaha; Vinod Kumar Singh; Nikhil Kumar Singh; Anurag Saxena; Deepak Sharma
In this article, a compact-slotted pentagonal-shaped patch antenna for multiband applications with improved bandwidth is presented. The presented antenna is designed on a textile substrate with dielectric constant of 4.4. The compact size of antenna is 50 × 50 × 1 mm. This presented antenna has been simulated using CST tool. The presented antenna resonates at frequency 4 GHz with the reflection coefficient of −31.84. It covers a bandwidth of 6.45 GHz extending from 2.85 to 9.30 GHz. It has maximum directivity of 2.932 dBi.
Archive | 2018
Nikhil Kumar Singh; Vinod Kumar Singh; Anurag Saxena; Akash Kumar Bhoi; Amik Garg; Karma Sonam Sherpa
In this article a compact slotted textile patch antenna for Ultra-Wideband applications with enhanced bandwidth is presented. The optimized antenna is intended on textile substrate with dielectric constant of 1.7. The compact size of antenna is 50 × 50 × 1 mm. This presented rectangular-shaped antenna that has been simulated using CST tool. The presented antenna resonates at frequency 3.98 GHz with the reflection coefficient of −34.12. It covers a bandwidth of 6.27 GHz extending from 2.86 to 9.13 GHz. It has maximum directivity of 2.969 dBi.
2017 ISEA Asia Security and Privacy (ISEASP) | 2017
Alpendra Kumar Diwakar; Nikhil Kumar Singh; Deepak Singh Tomar
Neighborhood attack over social networking sites breach the privacy of end users having an identical scenario. Recently numbers of anonymization techniques are developed to preserve privacy against neighborhood attack by adding dummy vertices and edges. Anonymization through dummy data increases the noise level in social networks data that lead to alter the originality and increase the information loss. This paper proposed one-neighborhood adjacency matrix (ONAM) base anonymization process in which optimum numbers of dummy edges are added into the unique sub-graph. The unique subgraph is suggested by 1-neighborhood adjacency matrix of their neighbors subgraph. In proposed anonymization process, the number of vertices remains same as that before anonymization. The addition of dummy edges increases isomorphic sub-networks and reduces the information loss. An analytic experiment is being conducted on Zacharys karate club, modified karate club, Les Miserables, and PolBooks four different datasets. After adding the dummy edges suggested by ONAM on these datasets, the noise level has measured as 6% to 8% with 0.0189 attack probability.
international conference on computational intelligence and communication networks | 2015
Parveen Kumar; Khushboo Singh; Nikhil Kumar Singh; Deepak Singh Tomar
Network attack is a form of intelligent and sophisticated crimes in the web environment. Network based attacks are increasing at fast speed to hamper the smooth working of web resources. New style of Network attacks is a growing amount of indirect attacks that exploit network traffic, instead of directly manipulating a network resource. In recent time, damages from indirect attack are estimated to be more severe. In addition, the bandwidth utilization by these attacks manipulates the whole network performance. In proposed work, a novel Email bombing signature is generated and furthers the generated signature is used for detecting mass mailing attack in the network traffic. The proposed approach deployed Rule Based Filtering and DBSCAN Clustering technique for filtering out enormous unwanted network traffic and group the similar data instances respectively. The proposed approach may restrain and prevent circulation of mass-mailing attacks in the network.
International Journal of Computer Applications | 2016
Nikhil Kumar Singh; Ankit Kasana; Vibhav Kumar Sachan
Journal of Telecommunication, Switching Systems and Networks | 2018
Deeksha Kashyap; Amreen Sheikh; Neha Varma; Nikhil Kumar Singh; Vinod Kumar Singh
Journal of Ambient Intelligence and Humanized Computing | 2018
Nikhil Kumar Singh; Deepak Singh Tomar; Arun Kumar Sangaiah