Gurjot Singh Gaba
YOU?
Author Swipe
View article: Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories
Towards a federated and hybrid cloud computing environment for sustainable and effective provisioning of cyber security virtual laboratories Open
Cloud Computing (CC) and virtualization concepts are two advanced technologies introduced to empower distance and blended learning. Besides, they play a crucial role in equipping learners with practical skills and fostering hands-on experi…
View article: A critical analysis of the industrial device scanners’ potentials, risks, and preventives
A critical analysis of the industrial device scanners’ potentials, risks, and preventives Open
View article: A systematic review of cybersecurity assessment methods for HTTPS
A systematic review of cybersecurity assessment methods for HTTPS Open
View article: GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems
GAN-Based Evasion Attack in Filtered Multicarrier Waveforms Systems Open
Generative adversarial networks (GANs), a category of deep learning models, have become a cybersecurity concern for wireless communication systems. These networks enable potential attackers to deceive receivers that rely on convolutional n…
View article: AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications Open
Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidth efficient, which makes it the best choice for tr…
View article: An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0
An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0 Open
View article: A user-centric privacy-preserving authentication protocol for IoT-AmI environments
A user-centric privacy-preserving authentication protocol for IoT-AmI environments Open
View article: Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT
Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT Open
The coronavirus pandemic has overburdened medical institutions, forcing physicians to diagnose and treat their patients remotely. Moreover, COVID-19 has made humans more conscious about their health, resulting in the extensive purchase of …
View article: Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare
Zero knowledge proofs based authenticated key agreement protocol for sustainable healthcare Open
View article: Design and Analysis of Commercially Viable Free-Space Optical Communication Link for Diverse Beam Divergence Profiles
Design and Analysis of Commercially Viable Free-Space Optical Communication Link for Diverse Beam Divergence Profiles Open
With an exponential increase in the use of smart devices and with increasing demand for high-speed data applications, the Radio Frequency and Microwave links will find themselves almost incapable of meeting this deficit. Free-space optical…
View article: A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments
A Novel Intrusion Detection Approach Using Machine Learning Ensemble for IoT Environments Open
The Internet of Things (IoT) has gained significant importance due to its applicability in diverse environments. Another reason for the influence of the IoT is its use of a flexible and scalable framework. The extensive and diversified use…
View article: A sequential roadmap to Industry 6.0: Exploring future manufacturing trends
A sequential roadmap to Industry 6.0: Exploring future manufacturing trends Open
It has been speculated that by the year 2050, technology will have progressed to the point of complete autonomy. This paper scrolls through patent pathways and intellectual developments throughout the industrial revolutions listing signifi…
View article: Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks
Miniaturized Novel UWB Band-Notch Textile Antenna for Body Area Networks Open
This paper presents the design and analysis of a miniaturized and novel wearable ultra-wideband (UWB) band-notch textile antenna for Body Area Networks (BANs). The major goal of building the antenna for wearable applications with band notc…
View article: Design and Analysis of High-Speed Free Space Optical (FSO) Communication System for Supporting Fifth Generation (5G) Data Services in Diverse Geographical Locations of India
Design and Analysis of High-Speed Free Space Optical (FSO) Communication System for Supporting Fifth Generation (5G) Data Services in Diverse Geographical Locations of India Open
Free space optical (FSO) communication has established a reputation for itself as a next-generation network capable of delivering high-speed data services. In light of the upcoming launch of 5G services, this paper aims to evaluate the per…
View article: Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications
Novel Compact UWB Band Notch Antenna Design for Body-Centric Communications Open
In this paper, a novel and compact ultra-wideband (UWB) antenna with band-notched characteristics for body-centric communication is examined and implemented. The shape of the designed antenna looks like a 'swan' with a slotted patch. The p…
View article: Efficient and Robust Image Communication Techniques for 5G Applications in Smart Cities
Efficient and Robust Image Communication Techniques for 5G Applications in Smart Cities Open
A wide range of multimedia applications must be supported by the modern fifth generation (5G) wireless communication systems for realizing the diverse applications in smart cities. The diverse applications such as real-time monitoring of r…
View article: Chest CT Findings and Differential Diagnosis of Mycoplasma pneumoniae Pneumonia and Mycoplasma pneumoniae Combined with Streptococcal Pneumonia in Children
Chest CT Findings and Differential Diagnosis of Mycoplasma pneumoniae Pneumonia and Mycoplasma pneumoniae Combined with Streptococcal Pneumonia in Children Open
Background. In this day and age, 17% of children less than 5 years of age died of pneumonia; it is the common cause of children death. It is one of the main children respiratory infectious diseases, i.e., mycoplasma pneumonia (MP). The ima…
View article: Urban Rain Flood Ecosystem Design Planning and Feasibility Study for the Enrichment of Smart Cities
Urban Rain Flood Ecosystem Design Planning and Feasibility Study for the Enrichment of Smart Cities Open
The urban flooding situations have arisen in the modern scenario of urbanization due to climatic changes. This work contributes to designing a planned and feasible urban rain flood ecosystem to promote the construction of a sponge city. It…
View article: A robust and lightweight secure access scheme for cloud based E-healthcare services
A robust and lightweight secure access scheme for cloud based E-healthcare services Open
View article: Design of Multi-Information Fusion Based Intelligent Electrical Fire Detection System for Green Buildings
Design of Multi-Information Fusion Based Intelligent Electrical Fire Detection System for Green Buildings Open
Building management systems are costly for small- to medium-sized buildings. A massive volume of data is collected on different building contexts by the Internet of Things (IoT), which is then further monitored. This intelligence is integr…
View article: Nature-Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking
Nature-Inspired-Based Approach for Automated Cyberbullying Classification on Multimedia Social Networking Open
In the modern era, the cyberbullying (CB) is an intentional and aggressive action of an individual or a group against a victim via electronic media. The consequence of CB is increasing alarmingly, affecting the victim either physically or …
View article: A Novel Hybrid Precoding-Companding Technique for Peak-to-Average Power Ratio Reduction in 5G and beyond
A Novel Hybrid Precoding-Companding Technique for Peak-to-Average Power Ratio Reduction in 5G and beyond Open
Several high-speed wireless systems use Orthogonal Frequency Division Multiplexing (OFDM) due to its advantages. 5G has adopted OFDM and is expected to be considered beyond 5G (B5G). Meanwhile, OFDM has a high Peak-to-Average Power Ratio (…
View article: Fully Integrated High Gain S-Band Triangular Slot Antenna for CubeSat Communications
Fully Integrated High Gain S-Band Triangular Slot Antenna for CubeSat Communications Open
Among other CubeSat subsystems, Antenna is one of the most important CubeSat components as its design determines all the telecommunication subsystems’ performances. This paper presents a coplanar wave-guide (CPW)-fed equilateral triangular…
View article: An improved association rule mining algorithm for large data
An improved association rule mining algorithm for large data Open
The data with the advancement of information technology are increasing on daily basis. The data mining technique has been applied to various fields. The complexity and execution time are the major factors viewed in existing data mining tec…
View article: A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities
A New Hybrid Deep Learning Algorithm for Prediction of Wide Traffic Congestion in Smart Cities Open
The vehicular adhoc network (VANET) is an emerging research topic in the intelligent transportation system that furnishes essential information to the vehicles in the network. Nearly 150 thousand people are affected by the road accidents t…
View article: An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks
An Exhaustive Research on the Application of Intrusion Detection Technology in Computer Network Security in Sensor Networks Open
Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervise…
View article: BER Assessment of OFDM System Augmented with MRC Technique under the Effect of CFO
BER Assessment of OFDM System Augmented with MRC Technique under the Effect of CFO Open
View article: Performance Analysis of WOFDM‐WiMAX Integrating Diverse Wavelets for 5G Applications
Performance Analysis of WOFDM‐WiMAX Integrating Diverse Wavelets for 5G Applications Open
In the 5 th generation (5G) and 6 th generation (6G) of wireless mobile telecommunication networks, the requests for an elevated data rate with access to stationary as well as portable customers are going to be overwhelming. Mobile worldwi…
View article: An empirical study on vulnerability assessment and penetration detection for highly sensitive networks
An empirical study on vulnerability assessment and penetration detection for highly sensitive networks Open
With the advancement of internet and the emergence of network globalization, security has always been a major concern. During the trial operation, the management control platform discussed in this article included more than 600 network sec…
View article: Multimedia Concepts on Object Detection and Recognition with F1 Car Simulation Using Convolutional Layers
Multimedia Concepts on Object Detection and Recognition with F1 Car Simulation Using Convolutional Layers Open
This paper presents a framework for detecting objects in images based on global features and contours. The first step is a shape matching algorithm that uses the background subtraction process. Object detection is accomplished by an examin…