Darpan Anand

Darpan Anand
Chandigarh University | CU · Department of Computer Science & Engineering

B.Tech., M.Tech., Ph.D.

About

54
Publications
10,123
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
331
Citations

Publications

Publications (54)
Chapter
Cocoa is an essential ingredient in chocolate and chocolate-flavoured treats. Chocolate is one of the world's most desired foods because of its worldwide popularity. It is necessary to test the quality of cocoa to produce high-quality chocolate. Early prediction and classification of the cocoa computer vision system are required. In computer vision...
Chapter
This book explains different applications of supervised and unsupervised data engineering for working with multimedia objects. Throughout this book, the contributors highlight the use of Artificial Intelligence-based soft computing and machine techniques in the field of medical diagnosis, biometrics, networking, automation in vehicle manufacturing,...
Chapter
Cocoa is worldwide most significant crop grown across the world. The crop generates revenues and employment for countries producing cocoa. Ghana’s cocoa industries play important role in the global cocoa market. Ghana is the second-largest producer and exporter of cocoa beans of worldwide production. In Ghana cocoa industries have large impact on s...
Article
The export of cocoa beans is economically significant in Ghana and numerous other tropical nations. Before the cocoa beans can be processed into finished goods, they must undergo a post-harvest treatment. Fermentation is one of the most crucial steps in this process because it improves the final product's quality. Traditionally, a cut-test is used...
Article
Full-text available
The practice of Deep Convolution neural networks in the field of medicine has congregated immense success and significance in present situations. Previously, researchers have developed numerous models for detecting abnormalities in musculoskeletal radiographs of upper extremities, but did not succeed in achieving respectable accuracy in the case of...
Chapter
In the era of 20th century, the advancement in Internet of Things (IoT) technologies leads to revolutionary development in healthcare. Since there is tremendous growth in the IoT devices which therefore leads to the problem of load balancing, dynamic IP allocation, change in routing, bandwidth management end‐to‐end reachability, innovation, etc. SD...
Article
Full-text available
The goal of this article is to assess the most recent work on Industry 4.0 as well as the present state of science on Industry 4.0 through papers produced between January 2017 and March 2020.A systematic review process with a 5-step approach to article selection was employed, which included the following steps: 1) Selection of database 2) Research...
Article
Cocoa industry of Ghana employs above a million people across Ghana areas of cocoa-growing, and it is the principal source of revenue for above 6 million people. The government of Ghana spends an important amount of money yearly on cocoa procurements in addition to farm inputs. However, the business of cocoa stays to meet many obstacles in testing...
Article
A collection of interconnected devices that deal with communication protocols that are common to share resources provided by nodes of a network over digital interconnections is a computer network. The process of determining the most efficient route from a source to a given target is called routing. Cisco's Enriched Internal Routing Gateway Protocol...
Article
The internet protocols are increasingly imposed in recent times, there is a need to propose a study on the performance analysis on OSPFV3 and EIGRP in IPV6 application. IP is currently involved in sensitive areas of internet protocols, remote sensing, telepresence, computer networks and so on. The IP exists in two versions (IPv4 and IPv6), the diff...
Article
Full-text available
The Analysis of common conceptual frameworks associated with Performance analysis of OSPFV3 and EIGRP in applications in IPV6 for analysis of articles published in Scopus between 2016 and 2021 by applying the Corresponding method analysis. The number of times an article is downloaded is also being considered as a measurement instrument or method of...
Article
Full-text available
The advanced technology Internet of Things (IoT) visualizes a worldwide, that is, internally connected, networks of smart physical entities. IoT is a promising technology used in several applications including disaster management. In disaster management, the role of IoT is so important and ubiquitous and could be life-saving. This article describes...
Article
Full-text available
Authentication is the primary and mandatory process for any Information and Communication Technology (ICT) application to prove the legitimacy of the genuine user. It becomes more important and crucial for public platforms like e-governance platforms. The Government of India is transforming the country into Digital India through various e-governanc...
Article
This research paper explores the concept of e-Auction, an increasingly form of online procurement. There is fixed delivery policy. This is a fully dynamic system which can be easily operated by the users. This research paper explores all the increasing form of online procurement. Online e auction system is gaining popularity day by day because of i...
Article
The sentimental analysis is phenomenon of exploring, analyzing and organizing human feelings. It is a process of extracting feelings of human faro pictures. It involves the separation of image into various characters such as face, background, etc. It uses lips and eye shape for extracting human feelings. It uses numerous of applications such as Pyc...
Chapter
For long, software-defined network (SDN) has been the new trend in the field of networking. Despite being way better than the traditional networking approach, security issues related to SDN are a major concern for technologists all over the globe. It has drawn great attention and is still a highly interesting field of study for network administrato...
Chapter
Diabetes is a metabolic chronic disease that due to the lack of insulin makes a serious problem with the transfer of blood all over the body. Nowadays, this epidemic has been expanding steadily everywhere throughout the world. Furthermore, negligence can lead to visual deficiency, amputations, cardiovascular breakdown, heart failure, and stroke. Di...
Chapter
In today, the robots and machine, translation tasks are performing the main role in hand gestures. Gesture or detection implementation will help humans in several means. Gesture recognition systems are used in various fields such as DNN, ML, and NNs. The applications of this research are sign language translation, music creation, robot remote contr...
Chapter
The interconnections between persons, organizations and various entities are possible only because of information communication technology (ICT). ICT changes the era into digital world. In this digital world, all things are possibly connected to each other through ICT and makes possible the concept of Internet of things (IoT). To implement these co...
Chapter
Internet is a major communication medium for sharing data, audios, videos for various services like retrieval of information, online shopping, video streaming, online financial transactions (like banking, online trading, etc.), social networking, and others. This communication and connection through the Internet is extended up to the connection of...
Chapter
The information and communication technology transforms the industry 1.0 to interconnected industry 4.0. This transformation affects the health care also, while healthcare 1.0 is man oriented and doctor centric. The things are changed and healthcare 2.0 evolved where manual records are converted to electronic records which is called by electronic h...
Chapter
E-Governance is the process of delivering public services to the citizens through the Information and Communication Technology with reliability, transparency and efficiency, without breaking the concept of cost-effectiveness. E-governance saves money, fuel and time of citizens by avoiding the visits of the government offices and on the other hand i...
Article
Full-text available
Gait recognition basically focuses on the task of human identification by using identifying human beings at a gap cantered on the style they walk. The supervised classification methods like SVM, RVM, KNN, CNN are u sed for recognition on general datasets CASIA, AVAMG and Self-generated dataset. Self-generated dataset of 20 male and 10 female is cre...
Article
Full-text available
In today’s world, secured communication is what every field wants. But due to the escalation of theft and unauthorized access to the data, the need for new encryption algorithms has also gone high. This paper proposed a hybrid encryption scheme which uses ElGamal key exchange algorithm and Genetic algorithms. In this scheme, the users share sevente...
Article
E-governance or electronic governance is an application of Information and Communication Technology (ICT) for delivering cost-effective government services by any country to its citizens with reliability, transparency and efficiency. Majority of authentication schemes for e-governance in India are based on single-server environment. To access the s...
Article
This paper details the influence of geometry variation such as shape transition of the isolator from its entry to exit on overall performance of scramjet isolators. The experiments are conducted to assess the performance of two isolator geometries of circle to pentagon and circle to hexagon. The pseudo shock length is obtained for the two cases by...
Article
The Television Reality shows are increasing day-by-day in the present generations. There are many different ways to find the Television Rating Point (TRP). Firstly the raw data is taken based upon the People’s Meter and the no of views will be counted from that. Then we need to divide the whole data set into clusters based on different channels. He...
Article
Full-text available
E-Governance is the process of delivering public services to the citizens through the Information and Communication Technology with reliability, transparency and efficiency, without breaking the concept of cost-effectiveness. E-governance saves money, fuel and time of citizens by avoiding the visits of the government offices and on the other hand i...
Article
Full-text available
Digital Signature protects the document`s integrity and binds the authenticity of the user who have signed. Present Digital Signature algorithm confirms authenticity but it does not ensure secrecy of the data. Techniques like encryption and decryption are needed to be used for this purpose. Biometric security has been a useful way for authenticatio...
Article
Full-text available
Internet and Communication Technologies operates widely in a multi-server environment. Authentication is one of a primary concern in multi-server environment. There are so many remote user authentication schemes using smart cards that operate in multi-server environment. But there are some authentication bottlenecks that these schemes suffer from....
Article
Full-text available
Conservatory growers want steadfast amount of yields so as to precisely meet the demand. Objective of this paper is to apply rule based fuzzy inference system (RBFIS) to forecasting crop yield by using ecological parameters. Inputs to RBFIS are derived from a crop development model (temperature, humidity, water/ irrigation, available soil, fertiliz...
Conference Paper
Full-text available
This paper is reviewed the state of research on the important topic in the field of information interchange that is identity based cryptography which more or less extention of the public key cryptography field. The paper starts with analyzing the fundamental concepts of identity based cryptography techniques, which includes encryption and the techn...
Article
Full-text available
Rapid growth of internet and networked information systems has contributed a lot in the increase of multimedia contents. As digital contents are increasing day by day on internet it has raised requirement for the effective protection of multimedia assets (images, audios, videos). This paper proposes a new approach to protect the multimedia contents...

Questions

Questions (2)
Question
For a research, I required a dataset containing the traffic controlled by a load balancer for Software-Defined network(SDN).
Question
Dear Friends,
In your point of view / perception/ experience ... please share the drawbacks and benefits of AADHAR .

Network

Cited By