Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tanya Singh is active.

Publication


Featured researches published by Tanya Singh.


international journal of engineering trends and technology | 2014

Study and Capacity Evaluation of SISO, MISO and MIMO RF Wireless Communication Systems

Kritika Sengar; Nishu Rani; Ankita Singhal; Dolly Sharma; Seema Verma; Tanya Singh

The wireless communication systems has gone from different generations from SISO systems to MIMO systems. Bandwidth is one important constraint in wireless communication. In wireless communication, high data transmission rates are essential for the services like tripple play i.e. data, voice and video. At user end the capacity determines the quality of the communication systems. This paper aims to compare the different RF wireless communication systems like SISO, MISO, SIMO and MIMO systems on the capacity basis and explaining the concept as today, the wireless communication has evolved from 2G, 3G to 4G and the companies are fighting to create networks with more and more capacity so that data rates can be increased and customers can be benefitted more. The ultimate goal of wireless communication systems is to create a global personal and multimedia communication without any capacity issues.


wireless and optical communications networks | 2012

Automated multilevel defence model to investigate packets for web interface

Seema Verma; Tanya Singh

Web applications placed on server are subject to various forms of attacks. When a server is hacked, the client gets exposed to malicious servers. These malicious servers completely control the exposed and compromised client web servers through remote access of the SQL database connected to them. The aim of this paper is to develop and deploy an automated multilevel defence Intrusion Response Model which would filter the packets in the first stage, look for the malicious data hidden in the second stage, investigate packets for securing web server using client honeypot in the third stage and analyse the data stored in the repository of the client honeypot in the fourth stage. Hence, the paper offers simulated web based applications in order to detect, monitor and analyse any malicious activity. The different client honeypot are efficient up to 60%. As can be seen, by using the right mix of effective network management and fast analysis of packets, we can greatly reduce the level of false alarms up to 28%. This practice would make the system most effective.


international conference on information and communication technology | 2016

Intrusion Detection System Using Genetic Algorithm for Cloud

Tanya Singh; Seema Verma; Vartika Kulshrestha; Sumeet Katiyar

Cloud and its transactions have emerged as a major challenge. This paper aims to come up with an efficient and best possible way to transfer data in cloud computing environment. This goal is achieved with the help of Soft Computing Techniques. Of the various techniques such as fuzzy logic, genetic algorithm or neural network, the paper proposes an effective method of intrusion detection using genetic algorithm. The selection of the optimized path for the data transmission proved to be effective method in cloud computing environment. Network path optimization increases data transmission speed making intrusion in network nearly impossible. Intruders are forced to act quickly for intruding the network which is quite a tough task for them in such high speed data transmission network.


international conference on computing communication and automation | 2016

E-commerce website quality assessment based on usability

Tanya Singh; Sachin Malik; Darothi Sarkar

Today website is considered as an image of an organization. For designing an effective website it is required to identify the need of the visitors of the website. In current scenario the objective of e-commerce websites is to provide the users or customers a platform where they can retrieve any information and also can perform other tasks like adding to cart, save for later, checkout, payment, tracking records and may more. In this paper, techniques like Adaptive Neuro Fuzzy Inference System Approach (ANFIS) and Analytical Hierarchy Process (AHP) were used to assess the usability of e commerce website and propose a model to successfully assess and compare websites on the basis of usability. First of all, the important factors related to usability from the literature or educational materials were identified. A survey using these factors as base was conducted which served as a valuable input from user for identifying the parameters affecting usability, which was further used in assessing the usability parameters of the e-commerce websites (such as Flipkart, Amazon, Snapdeal, Myntra). A Fuzzy inference system (FIS) file was generated using the parameters identified in the survey, member functions and other rules. Training data was generated using the survey conducted. ANFIS system used this training data and FIS file to create an optimal model for assessing the usability of the websites. This model can also be used to identify the important parameters to improve usability of the website using the valuable review of daily website users via the conduct of survey.


international conference on computer communications | 2015

A heterogeneous wireless network integrating smartphones, WLANs and VANET to enhance on-road surveillance and security

V.K. Remya; Tanya Singh

In todays scenario, crime is widely prevalent in every sector of the society. However it has been observed that in most of the cases a vehicle was involved in some or the other way. To make the roads safer and to enhance the public safety on roads, various technologies have been combined which constituents Intelligent Transportation Systems (ITS) network. One example of this field is “Vehicular Ad hoc Networks” (VANETs) which is a subclass of “Mobile Ad hoc Networks” (MANETs). In VANET, automobiles act as mobile nodes and are capable of communicating with one another as well as stationary infrastructure, hence creating an autonomous and dynamic mobile network. This research paper focusses on the proposal of a model for on-road surveillance & security system by integrating various different wireless network technologies/devices, such as Smart phones, WLANs & MANET. The paper also discusses the insecure environment that stirred the need for an efficient surveillance system and how this model approaches to provide a solution. We have used MATLAB tool to simulate and validate the proposed model. The successful implementation of any such system will help in controlling the crime rate as well as it may also aid in providing necessary evidences.


Archive | 2016

The Cost-Benefit Analysis of Vulnerability of Web Server Through Investigation

Seema Verma; Tanya Singh

With the rise of web applications, there has been a paradigm shift as web servers are no longer a technical requirement for any organization, but it is seen as an extension for business propositions. These web servers are designed with the basic function of hosting websites and applications such as gaming, data storage and enterprise applications. This paper attempts to investigate the various vulnerabilities of the web server and the path followed by the attacker to attack. The extensive survey has been done on the various methods of attacks which are an outcome of the loopholes in the design and architecture, deployment of the web server. If the components are designed and modeled taking into considerations the various vulnerabilities explained in the paper, the chances of attacks on the web server is minimized drastically. The paper also discusses the novel formula for the calculation of severity of attacks. This formula helps to assess the attack and is instrumental in the calculation of cost-benefit analysis.


International Conference on Smart Trends for Information Technology and Computer Communications | 2016

Securing Internet of Things in 5G Using Audio Steganography

Tanya Singh; Seema Verma; Vidushi Parashar

The data usage pattern is changing rapidly in many real life applications and these applications have converged in Smart Phones. 5th generation wireless networks will envision a widespread use of Internet of Things (IoT). With the growing demands for communication between Internet of Things using 5G networks, securing devices will emerge as a big challenge. There will be hidden exchange of data between the devices for which security can be achieved with audio steganography. The aim of the paper is to formulate the model supports the methodology and infrastructure desired to implement the security for IoT in 5G networks. Audio steganography is an invisible communication used for hidden exchange of the data. Internet of things applications varies from ubiquitous computing to machine to machine communications with most applications will be on Voice over IP and will require securing of data from eavesdroppers and attackers. So, the focus of this research paper is on how can we secure internet of things using audio steganography in 5G Platform.


international conference on computer communications | 2015

M-commerce: Evaluation of the technology drawbacks

Aneet Shilpa George; Tanya Singh

Recent researches have mainly focused on the m-commerce usage on single specific platforms, and on the disadvantages of m-commerce. One of the most important benefits of m-commerce as a service is the ability to perform tasks at any location and at any time hassle free. Despite its benefits, m-commerce has not been able to be promising in a few markets, due to security, product characteristics and user demands. This paper aims at evaluation of the technology drawbacks for successful application of m-commerce and helps to identify the prospective consumers for the given technology according to the user demands. The paper also suggests points for the correction of those constraints that can persuade the consumer loyalty. Current mobile phone enhancements and usage patterns, actually predicts positive hypothetical benefits, but does not emphasize on hypothetical risks. Although these risks contribute to a negative impact, m-commerce users are found to be more enthusiastic to fund towards the positive benefits of m-commerce. This paper is an assessment of different m-commerce strategies of acceptance and will help in the study of m-commerce disadvantages and adoption.


international conference on computer communications | 2015

Securing networks using Quantum Cryptography

Kostav Chaudhuri; Tanya Singh

Quantum Cryptography is a technology ensuring secured communication that is used as a means of data transaction among network systems. These data and informations are used in banking, secret services, military, business, scholastic instruction and research in various fields both in private as well as open systems. These days, mathematical hypothesis is applied for encoding and unscrambling on both sender and receiver in PC security and systems. Thus, to utilize security assault with superior PC (e.g. quantum PC) assailant has to locate a key and after that gets the information in feasible period. Quantum cryptography is an arrangement where the utilization of polarization guarantees that the transmitted information is not intercepted by any interfering entity. This paper deals with a new three way model where a reliable outsider is used to secure the correspondence channel using an unknown discreet key.


international journal of engineering trends and technology | 2014

RF Communication from SISO Systems to MIMO Systems: An Overview

Ankita Singhal; Nishu Rani; Kritika Sengar; Dolly Sharma; Seema Verma; Tanya Singh

The wireless communication has derived to the present scenario after pasing through number of stages and generation. From analog communication of 1 generation today we talk about digital communication in 4 generation, from the generation of single transmitting antenna and single receive antenna known as SISO systems, we reached the systems with multiple transmitting and multiple receiving antennas known as MIMO systems going through the systems of Multiple Transmit and single receive antenna systems known as MISO systems and Single transmit and multiple receive systems known as SIMO systems. This paper will present a study of generation from SISO systems to MIMO systems for digital communication under the research work going at Banasthali University, Rajasthan, India.

Collaboration


Dive into the Tanya Singh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge