Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nikhil Kumar Singh is active.

Publication


Featured researches published by Nikhil Kumar Singh.


International Journal of Computer Applications | 2010

An Approach to Understand the End User Behavior through Log Analysis

Nikhil Kumar Singh; Deepak Singh Tomar; Bhola Nath Roy

the end user in the web environment is a mind- numbing task. Huge amount of operational data is generated when end user interacts in web environment. This generated operational data is stored in various logs and may be useful source of capturing the end user activates. Pointing out the suspicious user in a web environment is a challenging task. To conduct efficient investigation in cyber space the available logs should be correlated. In this paper a prototype system is developed and implemented which is based on relational algebra to build the chain of evidence. The prototype system is used to preprocess the real generated data from logs and classify the suspicious user based on decision tree. At last various challenges in the logs managements are presented. Keywordsforensic; log file; correlation; decision tree,chain of evidence ,cyber crime;.


international conference on computational intelligence and communication networks | 2015

Linear Regression Based Energy Aware Location-Aided Routing Protocol for Mobile Ad-Hoc Networks

Khushboo Singh; Anubhav Sharma; Nikhil Kumar Singh

Performance of routing over Mobile Ad Hoc Network (MANET) varies with network density and mobility of node. Any routing protocol is ideal when it search route with minimal utilization of network resource like bandwidth, time, and energy. But route hunting in mobile ad-hoc network is carried by blind flooding of route request packets. Blind flooding of route request packets lead to increase traffic, conjunction and redundancy over the networks. In this paper power aware location aided routing protocol is proposed. Propose energy efficient Location aided routing protocol use Linear Regression and curve intersection point area to minimize requested zone and node categorization on the basis of battery power.


Archive | 2018

Inset Fed Circular Microstrip Antenna with Defected Ground

Nikhil Kumar Singh; Niraj Sharma; Zakir Ali; Vinod Kumar Singh; Akash Kumar Bhoi

In this paper, a novel design of defected ground circular patch antenna using glass epoxy materials has been presented. The substrate of the intended antenna was prepared of glass epoxy, whereas patch and ground plane are made out of copper. Enhancement in the geometry is done by increasing the electrical length and volume without growing the size of the patch antenna. The simulations were accomplished using Computer Simulation Technology software and the association of measured and simulated results of anticipated antenna has been studied. Experimental and simulated outcome are in outstanding conformity.


Archive | 2018

A Compact Pentagonal Textile Microstrip Antenna for Wide Band Application

Rachana Kushwaha; Vinod Kumar Singh; Nikhil Kumar Singh; Anurag Saxena; Deepak Sharma

In this article, a compact-slotted pentagonal-shaped patch antenna for multiband applications with improved bandwidth is presented. The presented antenna is designed on a textile substrate with dielectric constant of 4.4. The compact size of antenna is 50 × 50 × 1 mm. This presented antenna has been simulated using CST tool. The presented antenna resonates at frequency 4 GHz with the reflection coefficient of −31.84. It covers a bandwidth of 6.45 GHz extending from 2.85 to 9.30 GHz. It has maximum directivity of 2.932 dBi.


Archive | 2018

A Compact Slotted Textile Patch Antenna for Ultra-wide Band Application

Nikhil Kumar Singh; Vinod Kumar Singh; Anurag Saxena; Akash Kumar Bhoi; Amik Garg; Karma Sonam Sherpa

In this article a compact slotted textile patch antenna for Ultra-Wideband applications with enhanced bandwidth is presented. The optimized antenna is intended on textile substrate with dielectric constant of 1.7. The compact size of antenna is 50 × 50 × 1 mm. This presented rectangular-shaped antenna that has been simulated using CST tool. The presented antenna resonates at frequency 3.98 GHz with the reflection coefficient of −34.12. It covers a bandwidth of 6.27 GHz extending from 2.86 to 9.13 GHz. It has maximum directivity of 2.969 dBi.


2017 ISEA Asia Security and Privacy (ISEASP) | 2017

End user privacy preservation in social networks against neighborhood attack

Alpendra Kumar Diwakar; Nikhil Kumar Singh; Deepak Singh Tomar

Neighborhood attack over social networking sites breach the privacy of end users having an identical scenario. Recently numbers of anonymization techniques are developed to preserve privacy against neighborhood attack by adding dummy vertices and edges. Anonymization through dummy data increases the noise level in social networks data that lead to alter the originality and increase the information loss. This paper proposed one-neighborhood adjacency matrix (ONAM) base anonymization process in which optimum numbers of dummy edges are added into the unique sub-graph. The unique subgraph is suggested by 1-neighborhood adjacency matrix of their neighbors subgraph. In proposed anonymization process, the number of vertices remains same as that before anonymization. The addition of dummy edges increases isomorphic sub-networks and reduces the information loss. An analytic experiment is being conducted on Zacharys karate club, modified karate club, Les Miserables, and PolBooks four different datasets. After adding the dummy edges suggested by ONAM on these datasets, the noise level has measured as 6% to 8% with 0.0189 attack probability.


international conference on computational intelligence and communication networks | 2015

An Unsupervised Signature Generation Approach to Detect Email Bombing Using DBSCAN Clustering

Parveen Kumar; Khushboo Singh; Nikhil Kumar Singh; Deepak Singh Tomar

Network attack is a form of intelligent and sophisticated crimes in the web environment. Network based attacks are increasing at fast speed to hamper the smooth working of web resources. New style of Network attacks is a growing amount of indirect attacks that exploit network traffic, instead of directly manipulating a network resource. In recent time, damages from indirect attack are estimated to be more severe. In addition, the bandwidth utilization by these attacks manipulates the whole network performance. In proposed work, a novel Email bombing signature is generated and furthers the generated signature is used for detecting mass mailing attack in the network traffic. The proposed approach deployed Rule Based Filtering and DBSCAN Clustering technique for filtering out enormous unwanted network traffic and group the similar data instances respectively. The proposed approach may restrain and prevent circulation of mass-mailing attacks in the network.


International Journal of Computer Applications | 2016

Enhancement in lifetime of sensor node using Data Reduction Technique in Wireless Sensor Network

Nikhil Kumar Singh; Ankit Kasana; Vibhav Kumar Sachan


Journal of Telecommunication, Switching Systems and Networks | 2018

Dual Band Rectenna for Energy Harvesting and Wireless Power Transfer

Deeksha Kashyap; Amreen Sheikh; Neha Varma; Nikhil Kumar Singh; Vinod Kumar Singh


Journal of Ambient Intelligence and Humanized Computing | 2018

Sentiment analysis: a review and comparative analysis over social media

Nikhil Kumar Singh; Deepak Singh Tomar; Arun Kumar Sangaiah

Collaboration


Dive into the Nikhil Kumar Singh's collaboration.

Top Co-Authors

Avatar

Deepak Singh Tomar

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vibhav Kumar Sachan

Krishna Institute of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar

Alpendra Kumar Diwakar

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Amik Garg

Sikkim Manipal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Parveen Kumar

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Zakir Ali

Bundelkhand University

View shared research outputs
Researchain Logo
Decentralizing Knowledge