Teaching Documents by Sanjay Singh
Conciseness and Clarity: The sentences are short and arguments are clearly presented.
A term paper is a long research paper written by a college or university student over an academic... more A term paper is a long research paper written by a college or university student over an academic term or semester which accounts for a large amount of a grade and makes up much of the course. Term papers are generally intended to describe an event or concept or argue a point. There is much overlap between the terms "research paper" and "term paper". The phrase "term paper" was originally used to describe a paper (usually a research based paper) that was due at the end of the "term" -either a semester or quarter, depending on which unit of measure a school used. However, the term has fallen out of favor. Common usage has "term paper" and "research paper" as interchangeable, but this is not completely accurate. Not all term papers involve academic research, and not all research papers are term papers.
Based on the network architecture, wireless networks can be logically divided into two classes: d... more Based on the network architecture, wireless networks can be logically divided into two classes: distributed and centralized.
π -calculus is a model of computation for concurrent systems.
Papers by Sanjay Singh

Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a p... more Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique for high bit rate transmission in wireless communication systems. OFDM is a spectrally efficient modulation technique that can achieve high speed data transmission over multipath fading channels without the need for powerful equalization techniques. A major drawback of OFDM is the high Peak-to-Average Power Ratio (PAPR) of the transmit signal which can significantly impact the performance of the power amplifier. In this paper we have compared the PAPR reduction performance of Golay and Reed-Muller coded OFDM signal. From our simulation it has been found that the PAPR reduction performance of Golay coded OFDM is better than the Reed-Muller coded OFDM signal. Moreover, for the optimum PAPR reduction performance, code configuration for Golay and Reed-Muller codes has been identified.

Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a p... more Multicarrier transmission system such as Orthogonal Frequency Division Multiplexing (OFDM) is a promising technique for high bit rate transmission in wireless communication system. OFDM is a spectrally efficient modulation technique that can achieve high speed data transmission over multipath fading channels without the need for powerful equalization techniques. However the price paid for this high spectral efficiency and less intensive equalization is low power efficiency. OFDM signals are very sensitive to nonlinear effects due to the high Peak-to-Average Power Ratio (PAPR), which leads to the power inefficiency in the RF section of the transmitter. This paper investigates the effect of PAPR reduction on the performance parameter of multicarrier communication system. Performance parameters considered are power consumption of Power Amplifier (PA) and Digital-to-Analog Converter (DAC), power amplifier efficiency, SNR of DAC and BER performance of the system. From our analysis it is ...

Face Detection and Tagging Using Deep Learning
2018 International Conference on Computer, Communication, and Signal Processing (ICCCSP), 2018
With the social media boom in today's world, we see people constantly uploading photos of the... more With the social media boom in today's world, we see people constantly uploading photos of themselves along with their friends and family on various social media platforms such as Facebook, Instagram, Twitter, Google+, etc. What if they want to see all the photos in a categorized form such as photos with a particular person. In this paper, we extend the concept of Multiview Face Detection using Convolution Neural Networks (CNN) used by Farfade et al. by providing a tagging system for the detected faces. For the face detection, we use Deep Dense Face Detector, which uses a single model based on deep convolutional neural networks. All the detected faces are recognized using Local Binary Patterns Histograms (LBPH) method. Precision, recall, and F-measure are the parameters used to measure the performance of the algorithm. An accuracy of 85% is achieved for tagging the faces which are successfully detected.

Chroot Hardening Through System Calls Modification
2018 8th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2018
The chroot system call implemented in Unix-like (or *nix) OSes changes a view of the file structu... more The chroot system call implemented in Unix-like (or *nix) OSes changes a view of the file structure for the calling process and its children by changing the root directory for them. It was intended as an administrative tool and not a security one and the Linux implementation follows the Portable Operating System Interface (POSIX) standards. However, it is used as a security tool extensively. Difference in intended use and actual use of chroot in Linux implementation has resulted in labeling of some features as security vulnerabilities. Vulnerabilities could allow malicious users to completely circumvent the security aspect of chroot. The methods used in this paper removes the cause of those vulnerabilities which results in a more secure construct. Some of those are: not changing of the Current Working Directory (CWD), not closing file descriptors and allowing mounting of file systems inside the newly created environment. In this paper we try to address these specific issues by modifying the system calls in the system call table and more generally, present a solution with a good design. The proposed solutions aims to improve the design of chroot when used as a security construct.

Neural network approach for vision-based track navigation using low-powered computers on mavs
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network appro... more A quadrotor Micro Aerial Vehicle (MAV) is designed to navigate a track using neural network approach to identify the direction of the path from a stream of monocular images received from a downward-facing camera mounted on the vehicle. Current autonomous MAVs mainly employ computer vision techniques based on image processing and feature tracking for vision-based navigation tasks. It requires expensive onboard computation and can create latency in the real-time system when working with low-powered computers. By using a supervised image classifier, we shift the costly computational task of training a neural network to classify the direction of the track to an offboard computer. We make use of the learned weights obtained after training to perform simple mathematical operations to predict the class of the image on the onboard computer. We compare the computer vision based tracking approach with the proposed approach to navigate a track using a quadrotor and show that the processing rat...

Path independent real time points of interest detection in road networks
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), 2016
Finding regions of interest is a challenge when traveling in an unfamiliar area. Users traveling ... more Finding regions of interest is a challenge when traveling in an unfamiliar area. Users traveling in an unfamiliar region may like to travel in a direction which includes places that are interesting to them. In this paper we propose a method of finding nearby regions for potential Points of Interest (POI) (e.g., sightseeing places and commercial centers) while traveling in an undefined path. A continuous algorithm is proposed to address these challenges. Conceptually, the algorithm searches for nearby spatial objects(POIs or geo-tagged tweets). Distance and density are the two factors used to progress as well as stop the search. The search space is constrained using density and distance threshold along with an adjustment factor to adjust the importance of the two domains. The performance of the continuous algorithm is measured based on experiments conducted on spatial data. The experimental results has shown to retrieve all the POIs on a unfamiliar path in the real time.

Word based thematic game on Indian mythology
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
In Artificial Intelligence, games are the most challenging and exploited field. A language game i... more In Artificial Intelligence, games are the most challenging and exploited field. A language game is one such type of open-world game in which the word or phrase meaning plays an important role. Playing and solving such type of game is based on the player's ability to find the solution which depends on the richness of the player's cultural background for answering the question by understanding the question very well. This paper presents a challenging game which tells about Indian mythology in the form of games and requires knowledge covering a broad range of sources to be stored, which provides the knowledge background for getting the candidate solutions. The primary motivation is to create a system that processes the query and the clues provided, by finding the hidden association between the query and the clues within the knowledge repository and generates a list of multiple candidate solutions. For retrieving the unique solution, the multiple candidate solutions must be rank...

IoT Based Driving Risk Assessment and Warning System
2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), 2018
Drivers of vehicles encounter various risks both external and internal during their course of ope... more Drivers of vehicles encounter various risks both external and internal during their course of operation of a vehicle on the road. One such risk is the proximity of vehicle with respect to another vehicle or an obstacle. This IoT based project examines a solution which directs/assists the driver to maintain a specified safe distance between vehicles on roads to and avoid unsafe conditions leading to accidents. In the event of lack of attention on behalf of the driver or temporary distraction, the system is designed to alert him to the required focus on the road. The project will attempt to examine the possible risk factors both qualitatively and quantitatively in order to incorporate data-based features into the system. Evaluation of the risk factors will be done through the study of published causes of road accidents in India. The results shall be in the form of a sensor graph which can be used to design the system and offer a standalone solution. The sensor data in the form of sens...

Multi-modality face recognition: An information theoretic approach
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
Face recognition has gained a great importance in recent years due to the increasing demands of t... more Face recognition has gained a great importance in recent years due to the increasing demands of the real-world applications. The modality-independent face recognition also known as heterogeneous face recognition is useful in many applications. Here modality refers to different lighting scenarios in which the picture of the subject is taken. Modality-independent face recognition addresses the issues of low illumination, discrepancies based on the modalities that is recognition of one image from the other image captured from two different sources for the same subject. To address this issue we have made use of mutual information concept. The mutual information between input and gallery images has been used to find the appropriate match between multi-modal images. The idea here is to find the appropriate match between a sketch and a photograph of the same subject. The proposed methodology is useful in crime investigation, law enforcement and for surveillance purposes.

WSEAS TRANSACTIONS on COMMUNICATIONS archive, 2012
Now a days almost everybody is having a portable communication device, be it a laptop, a tablet o... more Now a days almost everybody is having a portable communication device, be it a laptop, a tablet or smart phones. The user would like to have all the services at his fingertips and access them through the portable device he owns. The user would exchange data with the other user or the service provider or control the smart appliances at his home. The interactions between the user’s device and the service provider must be secure enough regardless of the type of device used to access or utilize the services. In this paper we propose a ”Three Way Authentication (TWA)” technique intended to preserve the user privacy and to accomplish ownership authentication in order to securely deliver the services to the user devices. This technique will also help the users or the service providers to check whether the device is compromised or not with the help of the encrypted pass-phrases that are being exchanged. The users use the devices to store most of the valuable information and will prove risky...

2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2017
Partial derivatives are used to describe the trend of a dependent categorical variable. This is u... more Partial derivatives are used to describe the trend of a dependent categorical variable. This is used to extract quality relations from categorical data through the definition of a Probabilistic Discrete Qualitative Partial Derivative (PDQ PD). This has been covered in the Qube algorithm. However, on analysis of the current method, it is found that a large amount of the time is taken in the attribute selection phase. The objective of this paper is to improve the efficiency of this algorithm in particular by decreasing the time taken for attribute selection. In this paper we have modified the Qube algorithm, the modified algorithm is able to reduce the time taken by searching the data set for rows with the same variable values. The ordering is then replicated in each case. This has been found to improve the efficiency of the algorithm especially in data sets where there are multiple items with the same values.
Out of the Closet: Lexicon Based Sentiment Analysis on Tweets about Homosexuality
Social media sites such as Twitter have given a platform to people to express their thoughts even... more Social media sites such as Twitter have given a platform to people to express their thoughts even on the most sensitive of topics. In this paper, we analyze tweets which are posted by people who acknowledged their sexuality and shared their friends and families' response publicly. In our experiment, we have used a set of Tweets data with specific hashtags to analyze the response. Context-based topic modeling was used to gather tweets surrounding this topic to get the relevant tweets. The unwanted tweets discovered by the topic model was discarded. The sentiment of these tweets was then extracted using novel methods. The motivation for this process was to find out how their declaration of sexuality was perceived. Unfortunately, homophobia is one of the battles humanity continues to fight.

Intelligence analysis of Tay Twitter bot
2016 2nd International Conference on Contemporary Computing and Informatics (IC3I), 2016
The aim of this paper is to provide a framework to understand and analyse the intelligence of cha... more The aim of this paper is to provide a framework to understand and analyse the intelligence of chat-bots. With the ever increasing number of chat-bots available, we have considered intelligence analysis to be a functional parameter to determine the usefulness of a bot. For our analysis, we consider Microsoft's Twitter bot Tay released for online interaction in March 2016. We perform various natural language processing tasks on the tweets tweeted by and tweeted at Tay and discuss the implications of the results. We perform classification, text categorization, entity extraction, latent Dirichlet allocation analysis, frequency analysis and model the vocabulary used by the bot using a word2vec system to achieve this goal. Using the results from our analysis we define a metric called the bot intelligence score to evaluate and compare the intelligence of bots in general.
Uploads
Teaching Documents by Sanjay Singh
Papers by Sanjay Singh