Posts by Collection

patents

Anti-fraud computer implemented method for financial card transaction

U.S. Patent Publication, 2015

The patent describes a safe card that that by default is in a blocked state so that no transcation can be made. The safe card can be activated for a limited time by an authorized user for the transaction.

Recommended citation: Aneja, N., and Aneja, S. "Anti-fraud computer implemented method for financial card transaction." U.S. Patent Publication 2015/0339,657, filed May 23, 2014, published Nov 26, 2015. https://patentimages.storage.googleapis.com/06/22/8e/674c30a57d0fe8/US20150339657A1.pdf

Method and System for Ad-hoc Social Networking and Profile Matching

U.S. Issued Patent, 2019

The patent describes a method to create a social network based on dynamic interests of users and using ad-hoc networking. A user of mobile device can identify another user who is close by and has similar interests. Dynamic interests of the users can be extracted or identified based on mobile usage, browsing history, places traveled, and other user actions. Users are notified if another user who is similar more than a threshold is present nearby. The system also facilitates communication between users by way of chatting, file sharing, image sharing etc.

Recommended citation: Aneja, N., and Gambhir, S. "Method and system for Ad-hoc Social Networking and Profile Matching." U.S. Patent 10,264,609, filed Dec 28, 2015, issued April 16, 2019. https://patentimages.storage.googleapis.com/0f/63/b5/a0d9ef4311bf34/US10264609B2.pdf

Instant messaging for mobile device with offline and online mode

U.S. Issued Patent, 2020

The discloosure presents unified instant messaging application/service that enables to concurrently send messages via online mode using internet and Offline or Airplane mode

Recommended citation: Aneja, S., Aneja. N., and Petra, I. "Instant messaging for mobile device with offline and online mode." U.S. Patent 10,834,035, filed Dec 28, 2015, issued Nov 10, 2020. https://patentimages.storage.googleapis.com/58/d4/f7/58ebe5626a9362/US10834035.pdf

portfolio

Behavior-Cloning

Implementation of convolutional neural network to clone driving behavior using Keras. The model outputs a steering angle to an autonomous vehicle.

publications

Reliable Ad-hoc On-demand Distance Vector Routing Protocol

Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), 2006

The paper presents a co-operative security scheme called Reliable Ad hoc On-demand Distance Vector (RAODV) routing protocol based on local monitoring has been proposed to solve the problem of attack by malicious node as well as selfish behavior

Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol," International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), Morne, Mauritius, 2006, pp. 98-98, doi: 10.1109/ICNICONSMCL.2006.183. https://ieeexplore.ieee.org/document/1628344

Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)

Published in Sixth International Conference on Networking (ICN07), 2007

The paper presents algorithm to determine a path which is farthest from the endangered nodes in mobile ad-hoc social network.

Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)," Sixth International Conference on Networking (ICN07), Martinique, 2007, pp. 16-16, doi: 10.1109/ICN.2007.57. https://ieeexplore.ieee.org/document/4196209

Various Issues in Ad-hoc Social Networks ( ASN )

Published in National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology, 2012

The paper presents research challenges in ad-hoc social network.

Recommended citation: Aneja, N. and Gambhir, S. (2012) "Various Issues in Ad-hoc Social Networks", National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology Faridabad Haryana India, 6-9

Ad-hoc Social Network: A Comprehensive Survey

Published in International Journal of Scientific and Engineering Research, 2014

The paper presents research challenges in ad-hoc social network.

Recommended citation: Gambhir, S. and Aneja, N. (2013) International Journal of Scientific and Engineering Research, Vol 4, Issue 8, August 2013

Geo-Social Profile Matching Algorithm for Dynamic Interests in Ad-Hoc Social Network

Published in Social Networking, 2014

The paper presents a profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users.

Recommended citation: Aneja, N. and Gambhir, S. (2014) Geo-Social Profile Matching Algorithm for Dynamic Interests in Ad-Hoc Social Network. Social Networking, 3, 240-247. doi: 10.4236/sn.2014.35029 https://scirp.org/journal/PaperInformation.aspx?PaperID=51108

Geo-Social Semantic Profile Matching Algorithm for Dynamic Interests in Ad-hoc Social Network

Published in IEEE International Conference on Computational Intelligence & Communication Technology, 2015

This paper provides an algorithm to semantically match users profiles based on geographic location and dynamic interests.

Recommended citation: N. Aneja and S. Gambhir, "Geo-Social Semantic Profile Matching Algorithm for Dynamic Interests in Ad-hoc Social Network," 2015 IEEE International Conference on Computational Intelligence and Communication Technology, Ghaziabad, 2015, pp. 354-358, doi: 10.1109/CICT.2015.50. https://ieeexplore.ieee.org/document/7078725

Need of ad-hoc social network based on users dynamic interests

Published in International Conference on Soft Computing Techniques and Implementations (ICSCTI), 2015

This paper presents survey results for need of ad-hoc social network. Results indicate that users prefer 75 percent of average profile similarity to connect nearby users.

Recommended citation: S. Gambhir, N. Aneja and S. Mangla, "Need of ad-hoc social network based on users dynamic interests," 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), Faridabad, 2015, pp. 52-56, doi: 10.1109/ICSCTI.2015.7489562. https://ieeexplore.ieee.org/document/7489562

Software design for social profile matching algorithm to create ad-hoc social network on top of Android

Published in 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016

This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android.

Recommended citation: S. Gambhir, S. Mangla and N. Aneja, "Software design for social profile matching algorithm to create ad-hoc social network on top of Android," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 3450-3454. https://ieeexplore.ieee.org/document/7724906

Middleware Architecture for Ad-hoc Social Network

Published in Wireless Personal Communications, 2016

The paper presents middleware architecture for Ad-hoc Social Network that provides software developers a platform for developing mobile apps that enable social connections. The proposed architecture is a software suite that includes an application layer, transport layer, ad-hoc social layer and ad-hoc communication layer.

Recommended citation: Aneja, N., and Gambhir, S. (2016), "Middleware Architecture for Ad-hoc Social Network" Research Journal of Applied Sciences, Engineering and Technology https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.13.3342

Internet of Things (IOT) Security Best Practices

Published in IEEE, 2017

The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product ratings.

Recommended citation: Glenn A. Fink, Mohammed Aledhari, Jared Bielby, Rajesh Nighot, Sukanya Mandal, Nagender Aneja, Chris Hrivnak, Lucian Cristache, "Internet of Things (IOT) Security Best Practices" IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/internet_of_things_may_2017.pdf

Protecting Internet Traffic: Security Challenges and Solutions

Published in IEEE, 2017

The white paper presents a set of well investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product ratings.

Recommended citation: Mohammed Aledhari, Sukanya Mandal, Nagender Aneja, Mikael Dautrey, Rajesh Nighot, Prasad Mantri, Jared Bielby, "Protecting Internet Traffic: Security Challenges and Solutions", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/protecting_internet_traffic_may_2017.pdf

Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores

Published in NoSQL Database for Storage and Retrieval of Data in Cloud, 2017

The chapter discusses security of traditional database systems using an example of PostgreSQL database system. It explains RBAC and its variations with an example of PostgreSQL and describes the basic RBAC model in context of MongoDB.

Recommended citation: Aneja S, Aneja N. "Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores", book chapter in NoSQL Database for Storage and Retrieval of Data in Cloud, 237-250., Taylor & Francis Group, CRC Press 2017, Print ISBN: 978-1-4987-8436-8, eBook ISBN: 978-1-4987-8437-5 https://www.taylorfrancis.com/books/e/9781315155579/chapters/10.1201/9781315155579-13

Social Profile Aware AODV Protocol for Ad-Hoc Social Networks

Published in Wireless Personal Communications, 2017

The paper proposes contextual social profile aware routing protocol that allows users to use social networking applications using social routing protocol.

Recommended citation: Aneja, N., Gambhir, S. Social Profile Aware AODV Protocol for Ad-Hoc Social Networks. Wireless Pers Commun 97, 4161–4182 (2017). https://doi.org/10.1007/s11277-017-4718-x https://link.springer.com/article/10.1007%2Fs11277-017-4718-x

Piecewise Maximal Similarity for Ad-hoc Social Networks

Published in Wireless Personal Communications, 2017

The paper proposes Piecewise Maximal Similarity metric to match users profiles. The proposed metric is more effective to measure similarity than cosine similarity based on computations on real data.

Recommended citation: Gambhir, S., Aneja, N. and De Silva, L.C. Piecewise Maximal Similarity for Ad-hoc Social Networks. Wireless Pers Commun 97, 3519–3529 (2017). https://doi.org/10.1007/s11277-017-4683-4 https://link.springer.com/article/10.1007/s11277-017-4683-4

Options and Challenges in Providing Universal Access

Published in IEEE, 2018

The white paper presents obstacles and challenges towards achieving universal Internet access.

Recommended citation: Prasad Mantri, Mohammed Aledhari, Helen Anne Hicks, Rajesh Nighot, Nagender Aneja, Sukanya Mandal, Ali Kashif Bashir, Jay Wack, Jared Bielby, "Options and Challenges in Providing Universal Access", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/OPTIONS-AND-CHALLENGES-IN-PROVIDING-UNIVERSAL-ACCESS-v180418.pdf

IoT Device Fingerprint using Deep Learning

Published in IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), 2018

This work proposes identifying IoT devices based on Inter-Arrival-Time of Packets and improves efficiency to identify a device by feeding 100 IATs in the form of a graph to CNN

Recommended citation: S. Aneja, N. Aneja and M. S. Islam (2018). " IoT Device Fingerprint using Deep Learning." IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), Bali, 2018, pp. 174-179, doi: 10.1109/IOTAIS.2018.8600824. https://ieeexplore.ieee.org/abstract/document/8600824

Semi-Supervised Learning for Cancer Detection of Lymph Node Metastases

Published in Towards Causal, Explainable and Universal Medical Visual Diagnosis, CVPR Workshop, 2019

The proposed model trained with a semi-supervised learning approach by using pseudo labels on PCam-level significantly leads to better performances to strong CNN baseline on the AUC metric.

Recommended citation: Jaiswal, A. K., Panshin, I., Shulkin, D., Aneja, N., & Abramov, S. (2019). " Semi-Supervised Learning for Cancer Detection of Lymph Node Metastases." arXiv preprint arXiv:1906.09587. https://s1155026040.github.io/mvd-2019-cvpr-workshop/

Transfer Learning using CNN for Handwritten Devanagari Character Recognition

Published in IEEE International Conference on Advances in Information Technology (ICAIT), 2019

This paper presents an analysis of pre-trained models to recognize handwritten Devanagari alphabets using transfer learning for Deep Convolution Neural Network (DCNN).

Recommended citation: N. Aneja and S. Aneja, "Transfer Learning using CNN for Handwritten Devanagari Character Recognition," 2019 1st International Conference on Advances in Information Technology (ICAIT), Chikmagalur, India, 2019, pp. 293-296, c. https://ieeexplore.ieee.org/document/8987286

Neural Machine Translation model for University Email Application

Published in International Conference on Natural Language Processing (ICNLP 2020), 2020

A regional vocabulary-based application-oriented Neural Machine Translation (NMT) model is proposed over the data set of emails.

Recommended citation: Sandhya Aneja, Siti Nur Afikah Bte Abdul Mazid, Nagender Aneja, Neural Machine Translation model for University Email Application, International Conference on Natural Language Processing (ICNLP 2020), July 11-13, 2020, https://arxiv.org/abs/2007.16011 https://arxiv.org/abs/2007.16011

Network Traffic Analysis based IoT Device Identification

Published in 4th International Conference on Big Data and Internet of Things, BDIOT 2020, Singapore, 2020

TCP/IP packet header features to fingerprint a device for device identification based on its communication pattern.

Recommended citation: Chowdhury R., Aneja S., Aneja N., and Abas E. Network Traffic Analysis based IoT Device Identification. In Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things (BDIOT 2020). Association for Computing Machinery, New York, NY, USA, 79–89. DOI:https://doi.org/10.1145/3421537.3421545 https://dl.acm.org/doi/abs/10.1145/3421537.3421545

Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions

Published in Wireless Personal Communications, 2020

This paper presents survey and future directions in four areas of establishing ad-hoc social network using mobile ad-hoc social network (MANET) that includes architecture or implementation features, Profile Management of users, Similarity Metric, and Routing Protocols. The survey presents the need to provide social applications over MANET, optimizing profile matching algorithms of users, and context aware routing protocols.

Recommended citation: Aneja, N., Gambhir, S. Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07942-7 https://link.springer.com/article/10.1007/s11277-020-07942-7

Detecting Fake News with Machine Learning

Published in International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR), 2021

This paper provides algorithm to detect Fake News and in particular the paper proposes most important language features that can determine if the news content is fake or real.

Recommended citation: Aneja N., Aneja S. (2021) Detecting Fake News with Machine Learning. Conference Proceedings of ICDLAIR2019. ICDLAIR 2019. Lecture Notes in Networks and Systems, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-030-67187-7_7 https://link.springer.com/chapter/10.1007/978-3-030-67187-7_7

research

Deep Learning

Published:

This is the collection of posts on Machine Learning, Deep Learning, and Python Programming.

Available Projects

Published:

This post covers projects available for FYP/Research students. Students may also contact with their project proposals.

talks

Introduction to Deep Learning

Published:

Keynote Speech at International Conference (Virtual) Recent Trends in Computing (ICRTC-2021), Compucom Institute of Information Technology & Management, Jaipur, India

teaching

Introduction to Data Analytics (ZD-1201)

Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2021

Students will learn the latest technologies including Tableau and Python in the field of data analytics.

Internet Programming and Development (SS-2201)

Bachelor of Science (Computer Science), Universiti Brunei Darussalam, Digital Science, 2021

Students will learn the latest technologies including Python in the field of Internet Programming.

Patents Search

Bachelor/Master's Degree, Universiti Brunei Darussalam, 2021

Students will learn the Introduction to Patents and Patents Search.