Page Not Found
Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
Page not found. Your pixels are in another canvas.
This is a page not in th emain menu
Published:
This lesson covers JavaScript Fundamentals.
Published:
This post covers Bivariate Visualization.
Published:
This post covers Univariate Data Visualization.
Published:
This lesson covers protocols for MIME.
Published:
This lesson covers protocols for security in Internet Programming.
Published:
This post covers installation of MySQL.
Published:
This post covers Cookie and Session in Flask.
Published:
This post covers user profile management system using MySQL.
Published:
This post covers cookie in Flask!
Published:
This post covers Data Assessing and Cleaning.
Published:
This post covers Data Gathering.
Published:
This post covers forms in Flask using Calculator App!
Published:
This post covers introduction to Flask!
Published:
This post covers projects covered by Students.
Published:
This post covers Data Wrangling.
Published:
This post describes model evaluation metrics used in Classification and Regression problems.
Published:
This post covers introduction to Image Classification using Deep Learning.
Published:
This post covers CNN Architecture from cs231n.
Published:
This post covers CNN Architecture from cs231n.
Published:
This post covers Optimization and Backpropogation from cs231n.
Published:
This post covers Optimization and Gradient Descent from cs231n.
Published:
This post covers image classification, nearest neighbor classifier, k-nearest neighbor classifier and validation sets from cs231n.
Published:
This post covers Introduction to descriptive statistics.
Published:
This post covers Introduction to Pandas.
Published:
This post covers Introduction to Python Programming.
Published:
Download Python.
Published:
This post covers Dashboard and Stories.
Published:
This post covers Trend Lines.
Published:
This post covers Calculated Field.
Published:
This post covers Calculated Field.
Published:
This post covers Forecasting.
Published:
This post covers Data Aggregation.
Published:
This post covers Filtering and Sorting
Published:
This post covers Dimensions and Measures.
Published:
This post covers visualization.
Published:
Published:
This post covers introduction to Neural Network using MNIST dataset.
Published:
This post covers introduction to Convolution Neural Network using MNIST dataset.
Published:
This post covers introduction to HTML Forms.
Published:
Download Tableau Public.
Published:
This lesson covers Client-Side Web Development.
Published:
This lesson covers Standards and Accessibility
Published:
This lesson covers HTML Fundamentals.
Published:
This lesson covers CSS Fundamentals
Published:
This lesson covers lab instructions
Published:
This post covers certain formulas useful for Deep Learning.
Published:
The patent describes a safe card that that by default is in a blocked state so that no transcation can be made. The safe card can be activated for a limited time by an authorized user for the transaction.
Recommended citation: Aneja, N., and Aneja, S. "Anti-fraud computer implemented method for financial card transaction." U.S. Patent Publication 2015/0339,657, filed May 23, 2014, published Nov 26, 2015. https://patentimages.storage.googleapis.com/06/22/8e/674c30a57d0fe8/US20150339657A1.pdf
Published:
The patent describes a method to create a social network based on dynamic interests of users and using ad-hoc networking. A user of mobile device can identify another user who is close by and has similar interests. Dynamic interests of the users can be extracted or identified based on mobile usage, browsing history, places traveled, and other user actions. Users are notified if another user who is similar more than a threshold is present nearby. The system also facilitates communication between users by way of chatting, file sharing, image sharing etc.
Recommended citation: Aneja, N., and Gambhir, S. "Method and system for Ad-hoc Social Networking and Profile Matching." U.S. Patent 10,264,609, filed Dec 28, 2015, issued April 16, 2019. https://patentimages.storage.googleapis.com/0f/63/b5/a0d9ef4311bf34/US10264609B2.pdf
Published:
The discloosure presents unified instant messaging application/service that enables to concurrently send messages via online mode using internet and Offline or Airplane mode
Recommended citation: Aneja, S., Aneja. N., and Petra, I. "Instant messaging for mobile device with offline and online mode." U.S. Patent 10,834,035, filed Dec 28, 2015, issued Nov 10, 2020. https://patentimages.storage.googleapis.com/58/d4/f7/58ebe5626a9362/US10834035.pdf
Implementation of convolutional neural network to clone driving behavior using Keras. The model outputs a steering angle to an autonomous vehicle.
Detecting Fake News using language features
Transfer Learning for detecting cancer from Histopathology images
Transfer Learning for detecting cancer
Published in International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), 2006
The paper presents a co-operative security scheme called Reliable Ad hoc On-demand Distance Vector (RAODV) routing protocol based on local monitoring has been proposed to solve the problem of attack by malicious node as well as selfish behavior
Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Reliable Ad-hoc On-demand Distance Vector Routing Protocol," International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL06), Morne, Mauritius, 2006, pp. 98-98, doi: 10.1109/ICNICONSMCL.2006.183. https://ieeexplore.ieee.org/document/1628344
Published in Sixth International Conference on Networking (ICN07), 2007
The paper presents algorithm to determine a path which is farthest from the endangered nodes in mobile ad-hoc social network.
Recommended citation: S. Khurana, N. Gupta and N. Aneja, "Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET)," Sixth International Conference on Networking (ICN07), Martinique, 2007, pp. 16-16, doi: 10.1109/ICN.2007.57. https://ieeexplore.ieee.org/document/4196209
Published in National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology, 2012
The paper presents research challenges in ad-hoc social network.
Recommended citation: Aneja, N. and Gambhir, S. (2012) "Various Issues in Ad-hoc Social Networks", National Conference on Recent Trends in Computer Science and Information Technology (RTCSIT), 2012, Echelon Institute of Technology Faridabad Haryana India, 6-9
Published in International Journal of Scientific and Engineering Research, 2014
The paper presents research challenges in ad-hoc social network.
Recommended citation: Gambhir, S. and Aneja, N. (2013) International Journal of Scientific and Engineering Research, Vol 4, Issue 8, August 2013
Published in Social Networking, 2014
The paper presents a profile-matching algorithm for automatically building a user profile based on dynamic GPS (Global Positing System) location and browsing history of users.
Recommended citation: Aneja, N. and Gambhir, S. (2014) Geo-Social Profile Matching Algorithm for Dynamic Interests in Ad-Hoc Social Network. Social Networking, 3, 240-247. doi: 10.4236/sn.2014.35029 https://scirp.org/journal/PaperInformation.aspx?PaperID=51108
Published in IEEE International Conference on Computational Intelligence & Communication Technology, 2015
This paper provides an algorithm to semantically match users profiles based on geographic location and dynamic interests.
Recommended citation: N. Aneja and S. Gambhir, "Geo-Social Semantic Profile Matching Algorithm for Dynamic Interests in Ad-hoc Social Network," 2015 IEEE International Conference on Computational Intelligence and Communication Technology, Ghaziabad, 2015, pp. 354-358, doi: 10.1109/CICT.2015.50. https://ieeexplore.ieee.org/document/7078725
Published in International Conference on Soft Computing Techniques and Implementations (ICSCTI), 2015
This paper presents survey results for need of ad-hoc social network. Results indicate that users prefer 75 percent of average profile similarity to connect nearby users.
Recommended citation: S. Gambhir, N. Aneja and S. Mangla, "Need of ad-hoc social network based on users dynamic interests," 2015 International Conference on Soft Computing Techniques and Implementations (ICSCTI), Faridabad, 2015, pp. 52-56, doi: 10.1109/ICSCTI.2015.7489562. https://ieeexplore.ieee.org/document/7489562
Published in 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
This paper proposes software design and implementation of profile matching algorithm to create ad-hoc social network on top of Android.
Recommended citation: S. Gambhir, S. Mangla and N. Aneja, "Software design for social profile matching algorithm to create ad-hoc social network on top of Android," 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, 2016, pp. 3450-3454. https://ieeexplore.ieee.org/document/7724906
Published in Wireless Personal Communications, 2016
The paper presents middleware architecture for Ad-hoc Social Network that provides software developers a platform for developing mobile apps that enable social connections. The proposed architecture is a software suite that includes an application layer, transport layer, ad-hoc social layer and ad-hoc communication layer.
Recommended citation: Aneja, N., and Gambhir, S. (2016), "Middleware Architecture for Ad-hoc Social Network" Research Journal of Applied Sciences, Engineering and Technology https://maxwellsci.com/jp/mspabstract.php?jid=RJASET&doi=rjaset.13.3342
Published in IEEE, 2017
The purpose of this paper is to present a set of well-investigated Internet of Things (IoT) security guidelines and best practices that others can use as a basis for future standards, certifications, laws, policies and/or product ratings.
Recommended citation: Glenn A. Fink, Mohammed Aledhari, Jared Bielby, Rajesh Nighot, Sukanya Mandal, Nagender Aneja, Chris Hrivnak, Lucian Cristache, "Internet of Things (IOT) Security Best Practices" IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/internet_of_things_may_2017.pdf
Published in IEEE, 2017
The white paper presents a set of well investigated internet traffic security guidelines and best practices which others can use as a basis for future standards, certifications, laws, policies and/or product ratings.
Recommended citation: Mohammed Aledhari, Sukanya Mandal, Nagender Aneja, Mikael Dautrey, Rajesh Nighot, Prasad Mantri, Jared Bielby, "Protecting Internet Traffic: Security Challenges and Solutions", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/protecting_internet_traffic_may_2017.pdf
Published in NoSQL Database for Storage and Retrieval of Data in Cloud, 2017
The chapter discusses security of traditional database systems using an example of PostgreSQL database system. It explains RBAC and its variations with an example of PostgreSQL and describes the basic RBAC model in context of MongoDB.
Recommended citation: Aneja S, Aneja N. "Security and Privacy: Challenges and Defending Solutions for NoSQL Data Stores", book chapter in NoSQL Database for Storage and Retrieval of Data in Cloud, 237-250., Taylor & Francis Group, CRC Press 2017, Print ISBN: 978-1-4987-8436-8, eBook ISBN: 978-1-4987-8437-5 https://www.taylorfrancis.com/books/e/9781315155579/chapters/10.1201/9781315155579-13
Published in Wireless Personal Communications, 2017
The paper proposes contextual social profile aware routing protocol that allows users to use social networking applications using social routing protocol.
Recommended citation: Aneja, N., Gambhir, S. Social Profile Aware AODV Protocol for Ad-Hoc Social Networks. Wireless Pers Commun 97, 4161–4182 (2017). https://doi.org/10.1007/s11277-017-4718-x https://link.springer.com/article/10.1007%2Fs11277-017-4718-x
Published in Wireless Personal Communications, 2017
The paper proposes Piecewise Maximal Similarity metric to match users profiles. The proposed metric is more effective to measure similarity than cosine similarity based on computations on real data.
Recommended citation: Gambhir, S., Aneja, N. and De Silva, L.C. Piecewise Maximal Similarity for Ad-hoc Social Networks. Wireless Pers Commun 97, 3519–3529 (2017). https://doi.org/10.1007/s11277-017-4683-4 https://link.springer.com/article/10.1007/s11277-017-4683-4
Published in IEEE, 2018
The white paper presents obstacles and challenges towards achieving universal Internet access.
Recommended citation: Prasad Mantri, Mohammed Aledhari, Helen Anne Hicks, Rajesh Nighot, Nagender Aneja, Sukanya Mandal, Ali Kashif Bashir, Jay Wack, Jared Bielby, "Options and Challenges in Providing Universal Access", IEEE Internet Technology Policy Community White Paper https://internetinitiative.ieee.org/images/files/resources/white_papers/OPTIONS-AND-CHALLENGES-IN-PROVIDING-UNIVERSAL-ACCESS-v180418.pdf
Published in Mobile Information Systems, 2018
The paper proposes a method to form a group of users based on their profile or interests using WiFi Direct.
Recommended citation: Aneja, N., & Gambhir, S. (2018). Profile-Based Ad Hoc Social Networking Using Wi-Fi Direct on the Top of Android. Mobile Information Systems, 2018. https://www.hindawi.com/journals/misy/2018/9469536/
Published in IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), 2018
This work proposes identifying IoT devices based on Inter-Arrival-Time of Packets and improves efficiency to identify a device by feeding 100 IATs in the form of a graph to CNN
Recommended citation: S. Aneja, N. Aneja and M. S. Islam (2018). " IoT Device Fingerprint using Deep Learning." IEEE International Conference on Internet of Things and Intelligence System (IOTAIS), Bali, 2018, pp. 174-179, doi: 10.1109/IOTAIS.2018.8600824. https://ieeexplore.ieee.org/abstract/document/8600824
Published in Towards Causal, Explainable and Universal Medical Visual Diagnosis, CVPR Workshop, 2019
The proposed model trained with a semi-supervised learning approach by using pseudo labels on PCam-level significantly leads to better performances to strong CNN baseline on the AUC metric.
Recommended citation: Jaiswal, A. K., Panshin, I., Shulkin, D., Aneja, N., & Abramov, S. (2019). " Semi-Supervised Learning for Cancer Detection of Lymph Node Metastases." arXiv preprint arXiv:1906.09587. https://s1155026040.github.io/mvd-2019-cvpr-workshop/
Published in IEEE International Conference on Advances in Information Technology (ICAIT), 2019
This paper presents an analysis of pre-trained models to recognize handwritten Devanagari alphabets using transfer learning for Deep Convolution Neural Network (DCNN).
Recommended citation: N. Aneja and S. Aneja, "Transfer Learning using CNN for Handwritten Devanagari Character Recognition," 2019 1st International Conference on Advances in Information Technology (ICAIT), Chikmagalur, India, 2019, pp. 293-296, c. https://ieeexplore.ieee.org/document/8987286
Published in International Conference on Natural Language Processing (ICNLP 2020), 2020
A regional vocabulary-based application-oriented Neural Machine Translation (NMT) model is proposed over the data set of emails.
Recommended citation: Sandhya Aneja, Siti Nur Afikah Bte Abdul Mazid, Nagender Aneja, Neural Machine Translation model for University Email Application, International Conference on Natural Language Processing (ICNLP 2020), July 11-13, 2020, https://arxiv.org/abs/2007.16011 https://arxiv.org/abs/2007.16011
Published in 4th International Conference on Big Data and Internet of Things, BDIOT 2020, Singapore, 2020
TCP/IP packet header features to fingerprint a device for device identification based on its communication pattern.
Recommended citation: Chowdhury R., Aneja S., Aneja N., and Abas E. Network Traffic Analysis based IoT Device Identification. In Proceedings of the 2020 the 4th International Conference on Big Data and Internet of Things (BDIOT 2020). Association for Computing Machinery, New York, NY, USA, 79–89. DOI:https://doi.org/10.1145/3421537.3421545 https://dl.acm.org/doi/abs/10.1145/3421537.3421545
Published in Wireless Personal Communications, 2020
This paper presents survey and future directions in four areas of establishing ad-hoc social network using mobile ad-hoc social network (MANET) that includes architecture or implementation features, Profile Management of users, Similarity Metric, and Routing Protocols. The survey presents the need to provide social applications over MANET, optimizing profile matching algorithms of users, and context aware routing protocols.
Recommended citation: Aneja, N., Gambhir, S. Recent Advances in Ad-Hoc Social Networking: Key Techniques and Future Research Directions. Wireless Pers Commun (2020). https://doi.org/10.1007/s11277-020-07942-7 https://link.springer.com/article/10.1007/s11277-020-07942-7
Published in International Conference on Deep Learning, Artificial Intelligence and Robotics, (ICDLAIR), 2021
This paper provides algorithm to detect Fake News and in particular the paper proposes most important language features that can determine if the news content is fake or real.
Recommended citation: Aneja N., Aneja S. (2021) Detecting Fake News with Machine Learning. Conference Proceedings of ICDLAIR2019. ICDLAIR 2019. Lecture Notes in Networks and Systems, vol 175. Springer, Cham. https://doi.org/10.1007/978-3-030-67187-7_7 https://link.springer.com/chapter/10.1007/978-3-030-67187-7_7
Published:
The webinar was conducted by IEEE Collaborate Group on the white paper related to protecting Internet Traffic.
Published:
The talk covered topics related to a talk on Prior Art Search, Patentability Criteria, and introduction to Patent Drafting.
Published:
A webinar on introduction to deep learning and practical implementation of neural network and convolutional neural network in MNIST dataset.
Bachelor of Digital Science, Universiti Brunei Darussalam, Digital Science, 2021
Students will learn the latest technologies including Tableau and Python in the field of data analytics.
Bachelor of Science, Universiti Brunei Darussalam, Digital Science, 2021
Students will learn the latest technologies including Python in the field of Internet Programming.
online course, web, 2021
This is the collection of posts on Machine Learning, Deep Learning, and Python Programming.