This page has only limited features, please log in for full access.

Dr. Robin Singh Bhadoria
Birla Institute of Applied Sciences (BIAS)

Basic Info


Research Keywords & Expertise

0 Data Science
0 Machine Learning
0 Blockchain Technology
0 Wireless Sensor Network (WSN)
0 Service oriented architectures

Fingerprints

Blockchain Technology
Machine Learning
Wireless Sensor Network (WSN)
Data Science

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
Profile ImageASHISH BAGWARI Uttarakhand Technical Univer...
Following: 1 user
View all

Feed

Journal article
Published: 09 July 2021 in Electronics
Reads 0
Downloads 0

To sustain the security services in a Mobile Ad Hoc Networks (MANET), applications in terms of confidentially, authentication, integrity, authorization, key management, and abnormal behavior detection/anomaly detection are significant. The implementation of a sophisticated security mechanism requires a large number of network resources that degrade network performance. In addition, routing protocols designed for MANETs should be energy efficient in order to maximize network performance. In line with this view, this work proposes a new hybrid method called the data-driven zone-based routing protocol (DD-ZRP) for resource-constrained MANETs that incorporate anomaly detection schemes for security and energy awareness using Network Simulator 3. Most of the existing schemes use constant threshold values, which leads to false positive issues in the network. DD-ZRP uses a dynamic threshold to detect anomalies in MANETs. The simulation results show an improved detection ratio and performance for DD-ZRP over existing schemes; the method is substantially better than the prevailing protocols with respect to anomaly detection for security enhancement, energy efficiency, and optimization of available resources.

ACS Style

Neeraj Chugh; Geetam Tomar; Robin Bhadoria; Neetesh Saxena. A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks. Electronics 2021, 10, 1635 .

AMA Style

Neeraj Chugh, Geetam Tomar, Robin Bhadoria, Neetesh Saxena. A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks. Electronics. 2021; 10 (14):1635.

Chicago/Turabian Style

Neeraj Chugh; Geetam Tomar; Robin Bhadoria; Neetesh Saxena. 2021. "A Novel Anomaly Behavior Detection Scheme for Mobile Ad Hoc Networks." Electronics 10, no. 14: 1635.

Research article
Published: 11 April 2021 in IETE Journal of Research
Reads 0
Downloads 0

The failure resilience in cloud computing is becoming mainstream due to unprecedented growth in the cloud. In order to enhance cloud service reliability, various fault tolerance techniques have been suggested in the literature. Many cloud service reliability and availability issues are arising due to the failure of virtual machines (VMs). Therefore, this study contributes a new Threshold-Based Adaptive Fault Tolerance (TBAFT) approach in the cloud by amalgamating proactive and reactive approaches. Furthermore, in this paper, VM migration and replication are being utilized in the proactive approach, whereas retry is used as a reactive approach. Additionally, experimental validation is performed by comparing three benchmark fault tolerance approaches by incorporating the first fit and least full host selection policies. The obtained experimental results of the proposed approach are presented in terms of different metrics such as failure rate, throughput, migration, and execution time using CloudSim simulator.

ACS Style

Ajay Rawat; Rama Sushil; Amit Agarwal; Afzal Sikander; Robin Singh Bhadoria. A New Adaptive Fault Tolerant Framework in the Cloud. IETE Journal of Research 2021, 1 -13.

AMA Style

Ajay Rawat, Rama Sushil, Amit Agarwal, Afzal Sikander, Robin Singh Bhadoria. A New Adaptive Fault Tolerant Framework in the Cloud. IETE Journal of Research. 2021; ():1-13.

Chicago/Turabian Style

Ajay Rawat; Rama Sushil; Amit Agarwal; Afzal Sikander; Robin Singh Bhadoria. 2021. "A New Adaptive Fault Tolerant Framework in the Cloud." IETE Journal of Research , no. : 1-13.

Journal article
Published: 13 February 2021 in Electronics
Reads 0
Downloads 0

Authentication and privacy play an important role in the present electronic world. Biometrics and especially fingerprint-based authentication are extremely useful for unlocking doors, mobile phones, etc. Fingerprint biometrics usually store the attributes of the minutia point of a fingerprint directly in the database as a user template. Existing research works have shown that from such insecure user templates, original fingerprints can be constructed. If the database gets compromised, the attacker may construct the fingerprint of a user, which is a serious security and privacy issue. Security of original fingerprints is therefore extremely important. Ali et al. have designed a system for secure fingerprint biometrics; however, their technique has various limitations and is not optimized. In this paper, first we have proposed a secure technique which is highly robust, optimized, and fast. Secondly, unlike most of the fingerprint biometrics apart from the minutiae point location and orientation, we have used the quality of minutiae points as well to construct an optimized template. Third, the template constructed is in 3D shell shape. We have rigorously evaluated the technique on nine different fingerprint databases. The obtained results from the experiments are highly promising and show the effectiveness of the technique.

ACS Style

Uttam Sharma; Pradeep Tomar; Syed Ali; Neetesh Saxena; Robin Bhadoria. Optimized Authentication System with High Security and Privacy. Electronics 2021, 10, 458 .

AMA Style

Uttam Sharma, Pradeep Tomar, Syed Ali, Neetesh Saxena, Robin Bhadoria. Optimized Authentication System with High Security and Privacy. Electronics. 2021; 10 (4):458.

Chicago/Turabian Style

Uttam Sharma; Pradeep Tomar; Syed Ali; Neetesh Saxena; Robin Bhadoria. 2021. "Optimized Authentication System with High Security and Privacy." Electronics 10, no. 4: 458.

Original article
Published: 13 January 2021 in Medical & Biological Engineering & Computing
Reads 0
Downloads 0

This paper proposes a deep image analysis–based model for glaucoma diagnosis that uses several features to detect the formation of glaucoma in retinal fundus. These features are combined with most extracted parameters like inferior, superior, nasal, and temporal region area, and cup-to-disc ratio that overall forms a deep image analysis. This proposed model is exercised to investigate the various aspects related to the prediction of glaucoma in retinal fundus images that help the ophthalmologist in making better decisions for the human eye. The proposed model is presented with the combination of four machine learning algorithms that provide the classification accuracy of 98.60% while other existing models like support vector machine (SVM), K-nearest neighbors (KNN), and Naïve Bayes provide individually with accuracies of 97.61%, 90.47%, and 95.23% respectively. These results clearly demonstrate that this proposed model offers the best methodology to an early diagnosis of glaucoma in retinal fundus.

ACS Style

Law Kumar Singh; Pooja; Hitendra Garg; Munish Khanna; Robin Singh Bhadoria. An enhanced deep image model for glaucoma diagnosis using feature-based detection in retinal fundus. Medical & Biological Engineering & Computing 2021, 59, 333 -353.

AMA Style

Law Kumar Singh, Pooja, Hitendra Garg, Munish Khanna, Robin Singh Bhadoria. An enhanced deep image model for glaucoma diagnosis using feature-based detection in retinal fundus. Medical & Biological Engineering & Computing. 2021; 59 (2):333-353.

Chicago/Turabian Style

Law Kumar Singh; Pooja; Hitendra Garg; Munish Khanna; Robin Singh Bhadoria. 2021. "An enhanced deep image model for glaucoma diagnosis using feature-based detection in retinal fundus." Medical & Biological Engineering & Computing 59, no. 2: 333-353.

Journal
Published: 01 January 2021 in International Journal of Computational Intelligence Systems
Reads 0
Downloads 0

In the literature of graph theory, networks are represented as directed graphs or undirected graphs and a mixed of both combinations. In today's era of computing, networks like brain and facebook that do not belong to any of the mentioned networks category and in fact, it belongs to the combination of both networks which have connections as directed as well as undirected. To represent such networks, semi-directed graphs have been studied in this paper that provides the detailed mathematical fundamentals related to better understand the conceptualization for social media networks. This paper also discusses the suitable matrices analyze for the representation of the graphs. Few new terminologies like incidence number, complete-incidence related to semi-directed graphs and counter isomorphism of semi-directed graphs have been inculcated. A centrality measure, namely incidence centrality, has also been proposed based on incidence number on neighbors in social media networks.

ACS Style

Sovan Samanta; Madhumangal Pal; Rupkumar Mahapatra; Kousik Das; Robin Singh Bhadoria. A Study on Semi-directed Graphs for Social Media Networks. International Journal of Computational Intelligence Systems 2021, 14, 1034 -1041.

AMA Style

Sovan Samanta, Madhumangal Pal, Rupkumar Mahapatra, Kousik Das, Robin Singh Bhadoria. A Study on Semi-directed Graphs for Social Media Networks. International Journal of Computational Intelligence Systems. 2021; 14 (1):1034-1041.

Chicago/Turabian Style

Sovan Samanta; Madhumangal Pal; Rupkumar Mahapatra; Kousik Das; Robin Singh Bhadoria. 2021. "A Study on Semi-directed Graphs for Social Media Networks." International Journal of Computational Intelligence Systems 14, no. 1: 1034-1041.

Chapter
Published: 01 January 2021 in Political and Economic Implications of Blockchain Technology in Business and Healthcare
Reads 0
Downloads 0

The advancement in AI and blockchain can fundamentally reshape our way of working, learning, and almost our way of living. Though the research in both areas helps us in advancing our knowledge, it is even more advantageous by converging concepts of blockchain and AI (i.e., developing the thinking through blockchain). Blockchain is decentralized, distributed, and often a public system. Thinking, fundamentally defined as rationally concluding something, with a few known premises, is the fundamental concept behind AI and implementing the AI to become as close to human intelligence as possible; therefore, improvements in thinking are always welcomed. Both being incomplete, AI suffers from issues with trustworthiness, explainability, and privacy, while blockchain suffers in case of security, scalability, and efficiency. Bringing these two together can complement each other and make the system efficient. The chapter deals with various uses of integrating blockchain with AI. It also gives a brief on the uses of blockchain for improving both human and machine thinking.

ACS Style

Radha Madhu Seekar Vedula; Robin Singh Bhadoria; Manish Dixit. Integrating Blockchain With AI. Political and Economic Implications of Blockchain Technology in Business and Healthcare 2021, 1 -25.

AMA Style

Radha Madhu Seekar Vedula, Robin Singh Bhadoria, Manish Dixit. Integrating Blockchain With AI. Political and Economic Implications of Blockchain Technology in Business and Healthcare. 2021; ():1-25.

Chicago/Turabian Style

Radha Madhu Seekar Vedula; Robin Singh Bhadoria; Manish Dixit. 2021. "Integrating Blockchain With AI." Political and Economic Implications of Blockchain Technology in Business and Healthcare , no. : 1-25.

Journal article
Published: 01 January 2021 in Computers, Materials & Continua
Reads 0
Downloads 0
ACS Style

Rupkumar Mahapatra; Sovan Samanta; Madhumangal Pal; Jeong-Gon Lee; Shah Khalid Khan; Usman Naseem; Robin Singh Bhadoria. Colouring of COVID-19 Affected Region Based on Fuzzy Directed Graphs. Computers, Materials & Continua 2021, 68, 1219 -1233.

AMA Style

Rupkumar Mahapatra, Sovan Samanta, Madhumangal Pal, Jeong-Gon Lee, Shah Khalid Khan, Usman Naseem, Robin Singh Bhadoria. Colouring of COVID-19 Affected Region Based on Fuzzy Directed Graphs. Computers, Materials & Continua. 2021; 68 (1):1219-1233.

Chicago/Turabian Style

Rupkumar Mahapatra; Sovan Samanta; Madhumangal Pal; Jeong-Gon Lee; Shah Khalid Khan; Usman Naseem; Robin Singh Bhadoria. 2021. "Colouring of COVID-19 Affected Region Based on Fuzzy Directed Graphs." Computers, Materials & Continua 68, no. 1: 1219-1233.

Chapter
Published: 01 January 2021 in Political and Economic Implications of Blockchain Technology in Business and Healthcare
Reads 0
Downloads 0

The last few months have produced a remarkable expansion in research and deep study in the field of machine learning. Machine learning is a technique in which the set of the methods are used by the computers to make prediction, improve prediction and behavior prediction based on dataset. The learning techniques can be classified as supervised and unsupervised learning. The focus is on supervised machine learning that covers all the predictions problem for which we had the dataset in which the outcome is already known. Some of the algorithm like naive bayes, linear regression, SVM, k-nearest neighbor, especially neural network have gain growth in this area. The classifiers of machine learning are completely unconstrained with the assumptions of statistical and for that they are adapted by complex data. The authors have demonstrated the application of machine learning techniques and its ethical issues.

ACS Style

Law Kumar Singh; Pooja; Hitendra Garg; Munish Khanna; Robin Singh Bhadoria. An Analytical Study on Machine Learning Techniques. Political and Economic Implications of Blockchain Technology in Business and Healthcare 2021, 137 -157.

AMA Style

Law Kumar Singh, Pooja, Hitendra Garg, Munish Khanna, Robin Singh Bhadoria. An Analytical Study on Machine Learning Techniques. Political and Economic Implications of Blockchain Technology in Business and Healthcare. 2021; ():137-157.

Chicago/Turabian Style

Law Kumar Singh; Pooja; Hitendra Garg; Munish Khanna; Robin Singh Bhadoria. 2021. "An Analytical Study on Machine Learning Techniques." Political and Economic Implications of Blockchain Technology in Business and Healthcare , no. : 137-157.

Chapter
Published: 01 January 2021 in Political and Economic Implications of Blockchain Technology in Business and Healthcare
Reads 0
Downloads 0

Conventional machine learning (ML) needs centralized training data to be present on a given machine or datacenter. The healthcare, finance, and other institutions where data sharing is prohibited require an approach for training ML models in secured architecture. Recently, techniques such as federated learning (FL), MIT Media Lab's Split Neural networks, blockchain, aim to address privacy and regulation of data. However, there are difference between the design principles of FL and the requirements of Institutions like healthcare, finance, etc., which needs blockchain-orchestrated FL having the following features: clients with their local data can define access policies to their data and define how updated weights are to be encrypted between the workers and the aggregator using blockchain technology and also prepares audit trail logs undertaken within network and it keeps actual list of participants hidden. This is expected to remove barriers in a range of sectors including healthcare, finance, security, logistics, governance, operations, and manufacturing.

ACS Style

Ankit Khushal Barai; Robin Singh Bhadoria; Jyotshana Bagwari; Ivan A. Perl. A Blockchain-Based Federated Learning. Political and Economic Implications of Blockchain Technology in Business and Healthcare 2021, 158 -177.

AMA Style

Ankit Khushal Barai, Robin Singh Bhadoria, Jyotshana Bagwari, Ivan A. Perl. A Blockchain-Based Federated Learning. Political and Economic Implications of Blockchain Technology in Business and Healthcare. 2021; ():158-177.

Chicago/Turabian Style

Ankit Khushal Barai; Robin Singh Bhadoria; Jyotshana Bagwari; Ivan A. Perl. 2021. "A Blockchain-Based Federated Learning." Political and Economic Implications of Blockchain Technology in Business and Healthcare , no. : 158-177.

Chapter
Published: 09 December 2020 in Studies in Big Data
Reads 0
Downloads 0

Blockchain is a developing technology which provides data storage, secure transactions and establishing trust in an open environment. Blockchain is widely implemented in cryptocurrency systems like Bitcoins, smart contracts, smart grids over IoT devices etc. Blockchain also has wide applications in healthcare, automobile industries, private and public sectors. This growing popularity of Blockchain is luring hackers to perform various cyber-attacks in order to detect vulnerabilities in the applied Blockchain system. A vulnerable block chain system is open for network breaches, data thefts and information manipulations. Therefore, it is important to design a Blockchain system with proper security, privacy and trust management. However, increasing security and privacy in Blockchain reduces its performance because security and privacy policies are overhead to the applied Blockchain system. Therefore, it is also important to optimize the performance of Blockchain system with proper implementation of security and privacy. This chapter discuss the current scenarios of security, privacy and trust issues in Blockchain. The chapter also discuss the proposed solutions regarding these issues. Further, the chapter discuss the performance analysis on increasing security and privacy in the Blockchain technology and proposed optimizations in the literature. This chapter is then conclude by providing few research directions for improving security, privacy and trust in Blockchain technology while keeping its performance optimized.

ACS Style

Mayank Swarnkar; Robin Singh Bhadoria; Neha Sharma. Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology. Studies in Big Data 2020, 69 -92.

AMA Style

Mayank Swarnkar, Robin Singh Bhadoria, Neha Sharma. Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology. Studies in Big Data. 2020; ():69-92.

Chicago/Turabian Style

Mayank Swarnkar; Robin Singh Bhadoria; Neha Sharma. 2020. "Security, Privacy, Trust Management and Performance Optimization of Blockchain Technology." Studies in Big Data , no. : 69-92.

Earlycite article
Published: 15 October 2020 in World Journal of Engineering
Reads 0
Downloads 0

Purpose The Purpose of this research is to make an energy efficient finite state machine (FSM) in order to achieve the core objective of green computing because FSM is an indispensable part of multiple computer hardware. Design/methodology/approach This study uses ultra-scale plus FPGA architecture in place of seven-series field-programmable gate array (FPGA) for the implementation of the FSM design and also uses output load scaling for the design of environment-friendly FSM. This design study is done using Verilog Hardware description language and Vivado integrated system environment design tools and implemented on 16 nm ultra-scale FPGA architecture. Findings There is up to 98.57% reduction in dynamic power when operating frequency is managed as per smart job scheduling. There is up to a 21.97% reduction in static power with proper management of output load capacitance. There is up to 98.43% saving in dynamic power with the proposed management of output load capacitance. Originality/value The proposed design will be environment friendly that eventually leads to the green earth. This is the main motive of the research area i.e. green computing.

ACS Style

Bishwajeet Pandey; Geetam Singh Tomar; Robin Singh Bhadoria; Dil Muhammad Akbar Hussain; Ciro Rodriguez Rodriguez. Environment-friendly FSM design on ultra-scale architecture: energy-efficient green computing approach. World Journal of Engineering 2020, 18, 553 -557.

AMA Style

Bishwajeet Pandey, Geetam Singh Tomar, Robin Singh Bhadoria, Dil Muhammad Akbar Hussain, Ciro Rodriguez Rodriguez. Environment-friendly FSM design on ultra-scale architecture: energy-efficient green computing approach. World Journal of Engineering. 2020; 18 (4):553-557.

Chicago/Turabian Style

Bishwajeet Pandey; Geetam Singh Tomar; Robin Singh Bhadoria; Dil Muhammad Akbar Hussain; Ciro Rodriguez Rodriguez. 2020. "Environment-friendly FSM design on ultra-scale architecture: energy-efficient green computing approach." World Journal of Engineering 18, no. 4: 553-557.

Journal article
Published: 01 October 2020 in International Journal of Applied Evolutionary Computation
Reads 0
Downloads 0

Modern supply chain management systems have evolved into a complex and critical system. Thus, it has grown more interesting to verify the source of products and its visibility as it is moving through the supply chain network. The application of blockchain technology and Internet of Things (IoT) are likely to affect the supply chain management objectives such as cost, quality, speed, dependability, risk reduction, sustainability, and flexibility. This paper presented the concept of how blockchain technology and IoT can help to achieve supply chain objectives. This research focuses on the impact of blockchain on current and future supply chain management systems.

ACS Style

Robin Singh Bhadoria; Neha Sharma; Manish Kumar Pandey. Demystifying the Power of Blockchain Technology in Supply Chain Management. International Journal of Applied Evolutionary Computation 2020, 11, 38 -53.

AMA Style

Robin Singh Bhadoria, Neha Sharma, Manish Kumar Pandey. Demystifying the Power of Blockchain Technology in Supply Chain Management. International Journal of Applied Evolutionary Computation. 2020; 11 (4):38-53.

Chicago/Turabian Style

Robin Singh Bhadoria; Neha Sharma; Manish Kumar Pandey. 2020. "Demystifying the Power of Blockchain Technology in Supply Chain Management." International Journal of Applied Evolutionary Computation 11, no. 4: 38-53.

Book chapter
Published: 01 January 2020 in Advances in Computer and Electrical Engineering
Reads 0
Downloads 0

The internet plays important role in the modern society. With the passage of time, internet consumers are increasing. Therefore, the traffic loads during communication between client and its associated server are getting complex. Various networking systems are available to send the information or to receive messages via the internet. Some networking systems are so expensive that they cannot be used for the regular purpose. A user always tries to use that networking system that works on expansion of optimizing the cost. A content delivery network (CDN) also called as content distribution network has been developed to manage better performance between client and list of available servers. This chapter presents the mathematical model to find optimization among client and cache server during delivery of content based on fuzzy logic.

ACS Style

Manoj Kumar Srivastav; Robin Singh Bhadoria; Tarasankar Pramanik. Integration of Multiple Cache Server Scheme for User-Based Fuzzy Logic in Content Delivery Networks. Advances in Computer and Electrical Engineering 2020, 386 -396.

AMA Style

Manoj Kumar Srivastav, Robin Singh Bhadoria, Tarasankar Pramanik. Integration of Multiple Cache Server Scheme for User-Based Fuzzy Logic in Content Delivery Networks. Advances in Computer and Electrical Engineering. 2020; ():386-396.

Chicago/Turabian Style

Manoj Kumar Srivastav; Robin Singh Bhadoria; Tarasankar Pramanik. 2020. "Integration of Multiple Cache Server Scheme for User-Based Fuzzy Logic in Content Delivery Networks." Advances in Computer and Electrical Engineering , no. : 386-396.

Chapter
Published: 25 September 2019 in Studies in Big Data
Reads 0
Downloads 0

This chapter discusses the data processing models which are applicable in the blockchain technology. It also allows providing the distributed ledger technology for handling data. By exercising this chapter, one can create the own methodology for blockchain without hopping onto preexisting knowledge on it. This chapter also provides the underpinnings and practical aspects of blockchain implementation on platforms like Ethereum and Hyperledger Fabric.

ACS Style

Robin Singh Bhadoria; Yatharth Arora; Kartik Gautam. Blockchain Hands on for Developing Genesis Block. Studies in Big Data 2019, 269 -278.

AMA Style

Robin Singh Bhadoria, Yatharth Arora, Kartik Gautam. Blockchain Hands on for Developing Genesis Block. Studies in Big Data. 2019; ():269-278.

Chicago/Turabian Style

Robin Singh Bhadoria; Yatharth Arora; Kartik Gautam. 2019. "Blockchain Hands on for Developing Genesis Block." Studies in Big Data , no. : 269-278.

Chapter
Published: 25 September 2019 in Studies in Big Data
Reads 0
Downloads 0

Blockchain is a database of records, which tracks Querythe history of all transactions and communications between different nodes of a network. It provides a decentralized platform to execute transactions with mutual trust among the participants, while at the same time, eliminating the presence of a central mediating authority. Record of every transaction is stored in the Blockchain and is entirely tamper-proof. Blockchain creates a peer-to-peer network where all nodes get to verify transactions occurring in the network, through a consensus-based governance system. It has been used to implement the world’s most popular cryptocurrency Bitcoin. This is a highly promised technology, which is being adopted and implemented in several domains, such as Internet-of-Things-based systems, health care, energy systems, education systems, banking, and many more.

ACS Style

Robin Singh Bhadoria; Atharva Nimbalkar; Neetesh Saxena. On the Role of Blockchain Technology in the Internet of Things. Studies in Big Data 2019, 129 -140.

AMA Style

Robin Singh Bhadoria, Atharva Nimbalkar, Neetesh Saxena. On the Role of Blockchain Technology in the Internet of Things. Studies in Big Data. 2019; ():129-140.

Chicago/Turabian Style

Robin Singh Bhadoria; Atharva Nimbalkar; Neetesh Saxena. 2019. "On the Role of Blockchain Technology in the Internet of Things." Studies in Big Data , no. : 129-140.

Article
Published: 22 April 2019 in Wireless Personal Communications
Reads 0
Downloads 0

The Internet of Things (IoT) is a network formed by smart devices whose core contains embedded technology in order to collect sensory information and exchange it with every single device present within the network. One major challenge in IoT is data stabilization of the sensory data collected by smart devices before it is fed into the cloud. Data collected by sensing devices suffer with random glitches, variation in volume; inter packet delay and data packet loss due to inline power fluctuations. The cleaning and filtration of such noisy characteristics must be done before restoring this raw data to some global repository. This paper advises a method for clean monitoring of captured environmental parameters and proposes few algorithms that help in stabilizing the captured sensory data on the basis of data packet volume, inter packet delay, data type and random amplitude levels. Such an approach supports service level implementation required by an enterprise for deploying error free stabilized data collection without any ambiguity in order to compute an accurate and sustainable result required for effective environmental parameter analysis.

ACS Style

Robin Singh Bhadoria; Dhananjai Bajpai. Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies Using Internet of Things. Wireless Personal Communications 2019, 108, 493 -510.

AMA Style

Robin Singh Bhadoria, Dhananjai Bajpai. Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies Using Internet of Things. Wireless Personal Communications. 2019; 108 (1):493-510.

Chicago/Turabian Style

Robin Singh Bhadoria; Dhananjai Bajpai. 2019. "Stabilizing Sensor Data Collection for Control of Environment-Friendly Clean Technologies Using Internet of Things." Wireless Personal Communications 108, no. 1: 493-510.

Journal article
Published: 01 April 2019 in Journal of Organizational and End User Computing
Reads 0
Downloads 0

The importance of an architectural semantic for service-oriented computing starts with the characteristics of software systems that has been recognized with sharing and the utilization of resources. However, an architectural characteristic for service-oriented based applications depends on interaction patterns that utilizes a data format in communication. These patterns also help in establishing communication between service components. The goal of service-oriented computing methodologies could be achieved by adopting a logical separation of services from the actual mechanism of resource assignment and allotment. This shows that how services are reliable as interaction patterns between service provider and requester. It generates the binding patterns between these two and establishes communication between them. This article discusses the mathematical-based semantic model that presents an architectural view for systems that follows a service-oriented computing methodology. It also briefs describes about different execution states and routes, which addresses the service specifications in service-oriented computing.

ACS Style

Robin Singh Bhadoria; Narendra S. Chaudhari. Pragmatic Sensory Data Semantics With Service-Oriented Computing. Journal of Organizational and End User Computing 2019, 31, 22 -36.

AMA Style

Robin Singh Bhadoria, Narendra S. Chaudhari. Pragmatic Sensory Data Semantics With Service-Oriented Computing. Journal of Organizational and End User Computing. 2019; 31 (2):22-36.

Chicago/Turabian Style

Robin Singh Bhadoria; Narendra S. Chaudhari. 2019. "Pragmatic Sensory Data Semantics With Service-Oriented Computing." Journal of Organizational and End User Computing 31, no. 2: 22-36.

Journal article
Published: 01 April 2019 in International Journal of Information Systems and Social Change
Reads 0
Downloads 0

The invention of blockchain technology has paved the way for the decentralization of existing systems. Blockchains have consistently delivered prominent applications, particularly in the finance sector. The most popular application of blockchain is cryptocurrency. Blockchain technology however has a variety of applications beyond cryptocurrencies. This article discusses the basics of blockchain technology along with some of its potential applications. With the rising use of this technology, the security of these systems is a major concern. The security threats and risks to blockchain systems are also reviewed along with the tools and methodologies to prevent and handle it in more sophisticated manner.

ACS Style

Robin Singh Bhadoria; Vaibhav Agasti. The Paradigms of Blockchain Technology. International Journal of Information Systems and Social Change 2019, 10, 1 -14.

AMA Style

Robin Singh Bhadoria, Vaibhav Agasti. The Paradigms of Blockchain Technology. International Journal of Information Systems and Social Change. 2019; 10 (2):1-14.

Chicago/Turabian Style

Robin Singh Bhadoria; Vaibhav Agasti. 2019. "The Paradigms of Blockchain Technology." International Journal of Information Systems and Social Change 10, no. 2: 1-14.

Conference paper
Published: 04 October 2018 in Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference
Reads 0
Downloads 0

The importance of sensory data is associated with computing which starts with the characteristics of middleware that has been recognized with sharing and utilization of resources. However, an architectural characteristic for supporting this feature of sharing depends on interaction patterns that utilize different data formats. These patterns also help in establishing communication between multiple services and its associated components. The main goal of these services is to carry the data which are sensed/captured from different sensor motes (nodes) and have been forwarded through specified gateway to the global repository. This computing methodology could be achieved by adopting a logical separation of services from the actual mechanism of resource assignment and allotment. This separability is best handled with enterprise service bus (ESB), which is an architectural framework for managing services with its data. This paper discusses the methodology for handling sensory data and making the overall system as stable by removing the noise or error received data during sensing process from sensor mote.

ACS Style

Robin Singh Bhadoria; Narendra S. Chaudhari. Provisioning for Sensory Data Using Enterprise Service Bus: A Middleware Epitome. Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference 2018, 197 -203.

AMA Style

Robin Singh Bhadoria, Narendra S. Chaudhari. Provisioning for Sensory Data Using Enterprise Service Bus: A Middleware Epitome. Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference. 2018; ():197-203.

Chicago/Turabian Style

Robin Singh Bhadoria; Narendra S. Chaudhari. 2018. "Provisioning for Sensory Data Using Enterprise Service Bus: A Middleware Epitome." Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference , no. : 197-203.

Chapter
Published: 10 June 2018 in Emerging Wireless Communication and Network Technologies
Reads 0
Downloads 0

Light fidelity commonly known as Li-Fi is the technology emerged from visible light communication (VLC) that allows to transmit data through illumination, i.e., through light emitting diode (LED). Li-Fi varies in intensity faster than human eye to be followed, and therefore, Li-Fi is known for high data speed. With the increase in the number of wireless gadgets such as smartphones, tabs, smart wrist watches, etc., Li-Fi will surely be an incredible companion of Wi-Fi and an interesting subject for research. Therefore, in this chapter, we cover the evolution of Li-Fi, its architecture, requirement of Li-Fi, and its challenges. We also discuss the integration of Li-Fi protocols with existing protocols for integrated communication and conclude the chapter with the future scope of Li-Fi in the Internet.

ACS Style

Mayank Swarnkar; Robin Singh Bhadoria; Karm Veer Arya. Architectural Building Protocols for Li-Fi (Light Fidelity). Emerging Wireless Communication and Network Technologies 2018, 127 -137.

AMA Style

Mayank Swarnkar, Robin Singh Bhadoria, Karm Veer Arya. Architectural Building Protocols for Li-Fi (Light Fidelity). Emerging Wireless Communication and Network Technologies. 2018; ():127-137.

Chicago/Turabian Style

Mayank Swarnkar; Robin Singh Bhadoria; Karm Veer Arya. 2018. "Architectural Building Protocols for Li-Fi (Light Fidelity)." Emerging Wireless Communication and Network Technologies , no. : 127-137.