CINXE.COM

Heena Rathore | IIT Jodhpur - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Heena Rathore | IIT Jodhpur - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "profiles/works", 'action': "summary", 'controller_action': 'profiles/works#summary', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="jbrDB57hsRdaTj1G9CuQaFJ6pulf8QAiGpe7yEUeK6W36KFLWfGWp4jW4z9QE/hpZxzPmEcXlCsWAV9LuFCrMw==" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/wow-77f7b87cb1583fc59aa8f94756ebfe913345937eb932042b4077563bebb5fb4b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/social/home-1c712297ae3ac71207193b1bae0ecf1aae125886850f62c9c0139dd867630797.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/heading-b2b823dd904da60a48fd1bfa1defd840610c2ff414d3f39ed3af46277ab8df3b.css" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/button-3cea6e0ad4715ed965c49bfb15dedfc632787b32ff6d8c3a474182b231146ab7.css" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-10fa40af19d25203774df2d4a03b9b5771b45109c2304968038e88a81d1215c5.css" /> <meta name="author" content="heena rathore" /> <meta name="description" content="Heena Rathore, IIT Jodhpur: 347 Followers, 90 Following, 56 Research papers. Research interests: Biologically inspired computing, Biologically Inspired…" /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'works'; var $action_name = "summary"; var $rails_env = 'production'; var $app_rev = '49879c2402910372f4abc62630a427bbe033d190'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":15276,"monthly_visitors":"112 million","monthly_visitor_count":112794806,"monthly_visitor_count_in_millions":112,"user_count":277197435,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1732467682000); window.Aedu.timeDifference = new Date().getTime() - 1732467682000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" rel="stylesheet"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-296162c7af6fd81dcdd76f1a94f1fad04fb5f647401337d136fe8b68742170b1.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-8d53a22151f33ab413d88fa1c02f979c3f8706d470fc1bced09852c72a9f3454.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-f8fe82512740391f81c9e8cc48220144024b425b359b08194e316f4de070b9e8.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://iitj.academia.edu/HeenaRathore" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-profiles/works a-summary logged_out'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-profiles/works a-summary logged_out'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://medium.com/@academia">Blog</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <script src="//a.academia-assets.com/assets/webpack_bundles/profile.wjs-bundle-9601d1cc3d68aa07c0a9901d03d3611aec04cc07d2a2039718ebef4ad4d148ca.js" defer="defer"></script><script>Aedu.rankings = { showPaperRankingsLink: false } $viewedUser = Aedu.User.set_viewed( {"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore","photo":"https://0.academia-photos.com/26678070/8232471/15250726/s65_heena.rathore.jpg","has_photo":true,"department":{"id":293193,"name":"Computer Science","url":"https://iitj.academia.edu/Departments/Computer_Science/Documents","university":{"id":14288,"name":"IIT Jodhpur","url":"https://iitj.academia.edu/"}},"position":"Doctor of Philosophy","position_id":4,"is_analytics_public":false,"interests":[{"id":29669,"name":"Biologically inspired computing","url":"https://www.academia.edu/Documents/in/Biologically_inspired_computing"},{"id":578881,"name":"Biologically Inspired Computing Algorithms in Security","url":"https://www.academia.edu/Documents/in/Biologically_Inspired_Computing_Algorithms_in_Security"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security"},{"id":193315,"name":"Software defined networking","url":"https://www.academia.edu/Documents/in/Software_defined_networking"},{"id":36299,"name":"Distributed Systems","url":"https://www.academia.edu/Documents/in/Distributed_Systems"},{"id":3485,"name":"Artificial Immune Systems","url":"https://www.academia.edu/Documents/in/Artificial_Immune_Systems"},{"id":5395,"name":"Swarm Intelligence","url":"https://www.academia.edu/Documents/in/Swarm_Intelligence"}]} ); if ($a.is_logged_in() && $viewedUser.is_current_user()) { $('body').addClass('profile-viewed-by-owner'); } $socialProfiles = [{"id":10046269,"link":"https://www.facebook.com/heena7sept","name":"Facebook","link_domain":"www.facebook.com","icon":"//www.google.com/s2/u/0/favicons?domain=www.facebook.com"}]</script><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://iitj.academia.edu/HeenaRathore&quot;,&quot;location&quot;:&quot;/HeenaRathore&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;iitj.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/HeenaRathore&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="ProfileCheckPaperUpdate" data-props="{}" data-trace="false" data-dom-id="ProfileCheckPaperUpdate-react-component-88170927-ef11-4fa8-89a1-c6b1dc8cbd48"></div> <div id="ProfileCheckPaperUpdate-react-component-88170927-ef11-4fa8-89a1-c6b1dc8cbd48"></div> <div class="DesignSystem"><div class="onsite-ping" id="onsite-ping"></div></div><div class="profile-user-info DesignSystem"><div class="social-profile-container"><div class="left-panel-container"><div class="user-info-component-wrapper"><div class="user-summary-cta-container"><div class="user-summary-container"><div class="social-profile-avatar-container"><img class="profile-avatar u-positionAbsolute" alt="Heena Rathore" border="0" onerror="if (this.src != &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;) this.src = &#39;//a.academia-assets.com/images/s200_no_pic.png&#39;;" width="200" height="200" src="https://0.academia-photos.com/26678070/8232471/15250726/s200_heena.rathore.jpg" /></div><div class="title-container"><h1 class="ds2-5-heading-sans-serif-sm">Heena Rathore</h1><div class="affiliations-container fake-truncate js-profile-affiliations"><div><a class="u-tcGrayDarker" href="https://iitj.academia.edu/">IIT Jodhpur</a>, <a class="u-tcGrayDarker" href="https://iitj.academia.edu/Departments/Computer_Science/Documents">Computer Science</a>, <span class="u-tcGrayDarker">Doctor of Philosophy</span></div></div></div></div><div class="sidebar-cta-container"><button class="ds2-5-button hidden profile-cta-button grow js-profile-follow-button" data-broccoli-component="user-info.follow-button" data-click-track="profile-user-info-follow-button" data-follow-user-fname="Heena" data-follow-user-id="26678070" data-follow-user-source="profile_button" data-has-google="false"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">add</span>Follow</button><button class="ds2-5-button hidden profile-cta-button grow js-profile-unfollow-button" data-broccoli-component="user-info.unfollow-button" data-click-track="profile-user-info-unfollow-button" data-unfollow-user-id="26678070"><span class="material-symbols-outlined" style="font-size: 20px" translate="no">done</span>Following</button></div></div><div class="user-stats-container"><a><div class="stat-container js-profile-followers"><p class="label">Followers</p><p class="data">347</p></div></a><a><div class="stat-container js-profile-followees" data-broccoli-component="user-info.followees-count" data-click-track="profile-expand-user-info-following"><p class="label">Following</p><p class="data">90</p></div></a><a><div class="stat-container js-profile-coauthors" data-broccoli-component="user-info.coauthors-count" data-click-track="profile-expand-user-info-coauthors"><p class="label">Co-authors</p><p class="data">3</p></div></a><span><div class="stat-container"><p class="label"><span class="js-profile-total-view-text">Public Views</span></p><p class="data"><span class="js-profile-view-count"></span></p></div></span></div><div class="ri-section"><div class="ri-section-header"><span>Interests</span><a class="ri-more-link js-profile-ri-list-card" data-click-track="profile-user-info-primary-research-interest" data-has-card-for-ri-list="26678070">View All (7)</a></div><div class="ri-tags-container"><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="26678070" href="https://www.academia.edu/Documents/in/Biologically_inspired_computing"><div id="js-react-on-rails-context" style="display:none" data-rails-context="{&quot;inMailer&quot;:false,&quot;i18nLocale&quot;:&quot;en&quot;,&quot;i18nDefaultLocale&quot;:&quot;en&quot;,&quot;href&quot;:&quot;https://iitj.academia.edu/HeenaRathore&quot;,&quot;location&quot;:&quot;/HeenaRathore&quot;,&quot;scheme&quot;:&quot;https&quot;,&quot;host&quot;:&quot;iitj.academia.edu&quot;,&quot;port&quot;:null,&quot;pathname&quot;:&quot;/HeenaRathore&quot;,&quot;search&quot;:null,&quot;httpAcceptLanguage&quot;:null,&quot;serverSide&quot;:false}"></div> <div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Biologically inspired computing&quot;]}" data-trace="false" data-dom-id="Pill-react-component-1085afca-41df-4ae0-9a6d-132ef339411c"></div> <div id="Pill-react-component-1085afca-41df-4ae0-9a6d-132ef339411c"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="26678070" href="https://www.academia.edu/Documents/in/Biologically_Inspired_Computing_Algorithms_in_Security"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Biologically Inspired Computing Algorithms in Security&quot;]}" data-trace="false" data-dom-id="Pill-react-component-5cc5a3ba-4481-4b37-887f-9e4d773b3506"></div> <div id="Pill-react-component-5cc5a3ba-4481-4b37-887f-9e4d773b3506"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="26678070" href="https://www.academia.edu/Documents/in/Network_Security"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Network Security&quot;]}" data-trace="false" data-dom-id="Pill-react-component-83e5c54c-fc68-4440-a667-35d0a179fa34"></div> <div id="Pill-react-component-83e5c54c-fc68-4440-a667-35d0a179fa34"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="26678070" href="https://www.academia.edu/Documents/in/Software_defined_networking"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Software defined networking&quot;]}" data-trace="false" data-dom-id="Pill-react-component-cb060971-3ac5-45bf-913d-8d678a65a3ed"></div> <div id="Pill-react-component-cb060971-3ac5-45bf-913d-8d678a65a3ed"></div> </a><a data-click-track="profile-user-info-expand-research-interests" data-has-card-for-ri-list="26678070" href="https://www.academia.edu/Documents/in/Distributed_Systems"><div class="js-react-on-rails-component" style="display:none" data-component-name="Pill" data-props="{&quot;color&quot;:&quot;gray&quot;,&quot;children&quot;:[&quot;Distributed Systems&quot;]}" data-trace="false" data-dom-id="Pill-react-component-311d2f41-38e8-4d75-a96d-09b18679a693"></div> <div id="Pill-react-component-311d2f41-38e8-4d75-a96d-09b18679a693"></div> </a></div></div><div class="external-links-container"><ul class="profile-links new-profile js-UserInfo-social"><li class="profile-profiles js-social-profiles-container"><i class="fa fa-spin fa-spinner"></i></li></ul></div></div></div><div class="right-panel-container"><div class="user-content-wrapper"><div class="uploads-container" id="social-redesign-work-container"><div class="upload-header"><h2 class="ds2-5-heading-sans-serif-xs">Uploads</h2></div><div class="documents-container backbone-social-profile-documents" style="width: 100%;"><div class="u-taCenter"></div><div class="profile--tab_content_container js-tab-pane tab-pane active" id="all"><div class="profile--tab_heading_container js-section-heading" data-section="Papers" id="Papers"><h3 class="profile--tab_heading_container">Papers by Heena Rathore</h3></div><div class="js-work-strip profile--work_container" data-work-id="78356346"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices"><img alt="Research paper thumbnail of A review of security challenges, attacks and resolutions for wireless medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices">A review of security challenges, attacks and resolutions for wireless medical devices</a></div><div class="wp-workCard_item"><span>2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Evolution of implantable medical devices for human beings has provided a radical new way for trea...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356346"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356346"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356346; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356346]").text(description); $(".js-view-count[data-work-id=78356346]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356346; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356346']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356346, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356346]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356346,"title":"A review of security challenges, attacks and resolutions for wireless medical devices","translated_title":"","metadata":{"abstract":"Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"},"translated_abstract":"Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.","internal_url":"https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:25.018-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178629,"url":"http://xplorestaging.ieee.org/ielx7/7975134/7986245/07986505.pdf?arnumber=7986505"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356345"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment"><img alt="Research paper thumbnail of DLRT: Deep Learning Approach for Reliable Diabetic Treatment" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment">DLRT: Deep Learning Approach for Reliable Diabetic Treatment</a></div><div class="wp-workCard_item"><span>GLOBECOM 2017 - 2017 IEEE Global Communications Conference</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today,...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356345"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356345"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356345; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356345]").text(description); $(".js-view-count[data-work-id=78356345]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356345; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356345']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356345, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356345]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356345,"title":"DLRT: Deep Learning Approach for Reliable Diabetic Treatment","translated_title":"","metadata":{"abstract":"Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference"},"translated_abstract":"Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.","internal_url":"https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment","translated_internal_url":"","created_at":"2022-05-03T12:23:24.841-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178628,"url":"http://xplorestaging.ieee.org/ielx7/8253768/8253909/08255028.pdf?arnumber=8255028"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356344"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks"><img alt="Research paper thumbnail of Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks">Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks</a></div><div class="wp-workCard_item"><span>2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The immune system of the human body has massive potential in defending it against multiple harmfu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356344"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356344"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356344; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356344]").text(description); $(".js-view-count[data-work-id=78356344]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356344; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356344']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356344, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356344]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356344,"title":"Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks","translated_title":"","metadata":{"abstract":"The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)"},"translated_abstract":"The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.","internal_url":"https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks","translated_internal_url":"","created_at":"2022-05-03T12:23:24.690-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178627,"url":"http://xplorestaging.ieee.org/ielx7/8622653/8629585/08629728.pdf?arnumber=8629728"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356341"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework"><img alt="Research paper thumbnail of Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework">Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework</a></div><div class="wp-workCard_item"><span>2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356341"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356341"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356341; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356341]").text(description); $(".js-view-count[data-work-id=78356341]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356341; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356341']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356341, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356341]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356341,"title":"Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework","translated_title":"","metadata":{"abstract":"As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"},"translated_abstract":"As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","internal_url":"https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework","translated_internal_url":"","created_at":"2022-05-03T12:23:24.428-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178624,"url":"http://xplorestaging.ieee.org/ielx7/9145943/9156071/09156144.pdf?arnumber=9156144"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356340"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables"><img alt="Research paper thumbnail of Towards a Practical Pedestrian Distraction Detection Framework using Wearables" class="work-thumbnail" src="https://attachments.academia-assets.com/85433105/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables">Towards a Practical Pedestrian Distraction Detection Framework using Wearables</a></div><div class="wp-workCard_item"><span>2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e87b3c9de2c134f4fd67bfd63e61b7a0" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433105,&quot;asset_id&quot;:78356340,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356340"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356340"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356340; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356340]").text(description); $(".js-view-count[data-work-id=78356340]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356340; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356340']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356340, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e87b3c9de2c134f4fd67bfd63e61b7a0" } } $('.js-work-strip[data-work-id=78356340]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356340,"title":"Towards a Practical Pedestrian Distraction Detection Framework using Wearables","translated_title":"","metadata":{"publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables","translated_internal_url":"","created_at":"2022-05-03T12:23:24.275-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433105/thumbnails/1.jpg","file_name":"sureshkantharXiv17-PedSafe.pdf","download_url":"https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Towards_a_Practical_Pedestrian_Distracti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433105/sureshkantharXiv17-PedSafe-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DTowards_a_Practical_Pedestrian_Distracti.pdf\u0026Expires=1732471281\u0026Signature=BGge8wFcFSbi0fDnrEnuPW654vMyi2TVsqck1GT64yEmvPQ6~lRlTSGQwUQwtKqzE~YHLZhVahX23cNBlZ6FGIjcO03VITOyQuRcaggbvIDiDHKznHFF~271Qifo0KVQAmH7svALgmtwSbqFCl2lPlB7FFxtTDK5CwOKBxCUfpHllqvUM26aqogPkRN1XfE6OBlSoygmjoIdNYWyZuR0z-q~QvmYZcb4SwGDmnPR-K~OolnSxwRS5Tnzgf3poUieAQ~9FCm6V9bD6VssXaMzL3CTbL0jswP24Pwk8x9WT8qYaOOHailUq0x0YvcUdoW9sm2YX6oT5JEKYxdnZ51Gyg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433105/thumbnails/1.jpg","file_name":"sureshkantharXiv17-PedSafe.pdf","download_url":"https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Towards_a_Practical_Pedestrian_Distracti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433105/sureshkantharXiv17-PedSafe-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DTowards_a_Practical_Pedestrian_Distracti.pdf\u0026Expires=1732471281\u0026Signature=BGge8wFcFSbi0fDnrEnuPW654vMyi2TVsqck1GT64yEmvPQ6~lRlTSGQwUQwtKqzE~YHLZhVahX23cNBlZ6FGIjcO03VITOyQuRcaggbvIDiDHKznHFF~271Qifo0KVQAmH7svALgmtwSbqFCl2lPlB7FFxtTDK5CwOKBxCUfpHllqvUM26aqogPkRN1XfE6OBlSoygmjoIdNYWyZuR0z-q~QvmYZcb4SwGDmnPR-K~OolnSxwRS5Tnzgf3poUieAQ~9FCm6V9bD6VssXaMzL3CTbL0jswP24Pwk8x9WT8qYaOOHailUq0x0YvcUdoW9sm2YX6oT5JEKYxdnZ51Gyg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178623,"url":"http://xplorestaging.ieee.org/ielx7/8454955/8480085/08480238.pdf?arnumber=8480238"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356339"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356339/Blockchain_applications_for_healthcare"><img alt="Research paper thumbnail of Blockchain applications for healthcare" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356339/Blockchain_applications_for_healthcare">Blockchain applications for healthcare</a></div><div class="wp-workCard_item"><span>Energy Efficiency of Medical Devices and Healthcare Applications</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract Healthcare systems control and monitor the health of patients with the help of advanced ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people&amp;#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356339"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356339"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356339; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356339]").text(description); $(".js-view-count[data-work-id=78356339]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356339; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356339']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356339, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356339]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356339,"title":"Blockchain applications for healthcare","translated_title":"","metadata":{"abstract":"Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people\u0026#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.","publisher":"Elsevier","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Energy Efficiency of Medical Devices and Healthcare Applications"},"translated_abstract":"Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people\u0026#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.","internal_url":"https://www.academia.edu/78356339/Blockchain_applications_for_healthcare","translated_internal_url":"","created_at":"2022-05-03T12:23:24.113-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Blockchain_applications_for_healthcare","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1131312,"name":"Academic","url":"https://www.academia.edu/Documents/in/Academic"}],"urls":[{"id":20178622,"url":"https://api.elsevier.com/content/article/PII:B978012819045600008X?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356338"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture"><img alt="Research paper thumbnail of mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture" class="work-thumbnail" src="https://attachments.academia-assets.com/85433042/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture">mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing arc...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5fa409609fcf9226ba729f821c44fccf" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433042,&quot;asset_id&quot;:78356338,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356338"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356338"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356338; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356338]").text(description); $(".js-view-count[data-work-id=78356338]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356338; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356338']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356338, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5fa409609fcf9226ba729f821c44fccf" } } $('.js-work-strip[data-work-id=78356338]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356338,"title":"mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture","translated_title":"","metadata":{"abstract":"We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","internal_url":"https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture","translated_internal_url":"","created_at":"2022-05-03T12:23:23.980-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433042,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433042/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433042/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=XC8C4jjrv~sTfeJCAYwSIpa~twR1gyyLMx9miS3Zh6uZiyRjhDBrWMMH5xoOSzqQqxsi1NG~Gt43GUkPmWmMq1L4F1xuv6VXtnVjQ0dpx8TtOMQpvX11qsYxoBxj-UjJzd3C3Vtif~TpHOmLAUf~wuZikVKIGuMiq79PSr13LRCG5rrrhVGM7Y-TzSer0jZaWDCMN1~QtEceNBgFzxD1YwnNa-cDxPp~ecuUiIOJTiiztScn4WJdn7DivgmDHWH-17p1ho7eK4Dukf7duMy3YCtMWMMmHSYb1ZgHadezGgMWyOs-6y6jLOkJkty25goghtH5umuOkVnjMVK~R9lIFg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433042,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433042/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433042/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=XC8C4jjrv~sTfeJCAYwSIpa~twR1gyyLMx9miS3Zh6uZiyRjhDBrWMMH5xoOSzqQqxsi1NG~Gt43GUkPmWmMq1L4F1xuv6VXtnVjQ0dpx8TtOMQpvX11qsYxoBxj-UjJzd3C3Vtif~TpHOmLAUf~wuZikVKIGuMiq79PSr13LRCG5rrrhVGM7Y-TzSer0jZaWDCMN1~QtEceNBgFzxD1YwnNa-cDxPp~ecuUiIOJTiiztScn4WJdn7DivgmDHWH-17p1ho7eK4Dukf7duMy3YCtMWMMmHSYb1ZgHadezGgMWyOs-6y6jLOkJkty25goghtH5umuOkVnjMVK~R9lIFg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433041,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433041/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433041/download_file","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433041/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=ZU5ajJK92JQn1pCaUfEKtWpqb9h7Fd10q7vJoLdMjuwWYXeDk7dNSHL4030L5V4RdctvbKhQfbC2XvxG9vV2eZ~fLmQhAVH0mNmzgjMkGffozwA5~rB5o9bySWlu61wPCEPBe9ie~P3z0a5yDeu53Pr1YVLnTk~fwsxsP9vdxu7MK5uKj~QAKpZRPtOVdS5vdKH2um6cgZdGeI-FELbo9NS8od277R8lJ~VIal1o7MG7I4O8HmxpTE1SEDIX84g9NK5jWZJ4bnfg894088DcOsO0Myg9SzGl-WxaW71pZNJ-T4rN6izN2yT3RV5OfZLpb9uLicIyxOFs83Dtz0rDFA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":20178621,"url":"https://s2.smu.edu/~camp/pubs/mmMoReEdge_PerCom_SmartEdge_2020.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356337"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation"><img alt="Research paper thumbnail of IMS2021 Project Connect: Connecting to Broaden Participation" class="work-thumbnail" src="https://attachments.academia-assets.com/85433103/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation">IMS2021 Project Connect: Connecting to Broaden Participation</a></div><div class="wp-workCard_item"><span>IEEE Microwave Magazine</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="13343641aec8d44e5ebe33c8191de203" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433103,&quot;asset_id&quot;:78356337,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356337"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356337"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356337; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356337]").text(description); $(".js-view-count[data-work-id=78356337]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356337; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356337']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356337, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "13343641aec8d44e5ebe33c8191de203" } } $('.js-work-strip[data-work-id=78356337]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356337,"title":"IMS2021 Project Connect: Connecting to Broaden Participation","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"IEEE Microwave Magazine"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation","translated_internal_url":"","created_at":"2022-05-03T12:23:23.883-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433103,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433103/thumbnails/1.jpg","file_name":"09393991.pdf","download_url":"https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2021_Project_Connect_Connecting_to_Br.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433103/09393991-libre.pdf?1651606123=\u0026response-content-disposition=attachment%3B+filename%3DIMS2021_Project_Connect_Connecting_to_Br.pdf\u0026Expires=1732471281\u0026Signature=cb8H26yjPmEm7VGlUvs-t6RFi71-KB5tcFt1eTkhoaheuvi79FqBEiCMQWBLE-6iYU295UWmxUNOxjFIFMvt77Gyi-P-uS41OKW92sxLEFJ7YlBVQRjju3XrRSkw4eJBod8eTuLAaWIJQg6OZfIdFTuLXp3RGEw1qCokAEPR2S9O0D3GX6efRyCG3oE7FTPc5Exk8ZwaHMwemStIQpy6FJnPuF8Ve22PBrpDxZ9B4u0aPWqyyD2YVorhHOiiLni5~fUMcF5ivmh5-hmz-Jw5bxsjqN8S-paxrHdINJ05IvLTkLdNggvvhvETjPyV~jl2HfnegUKy~RYvE~QXP0O4KA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"IMS2021_Project_Connect_Connecting_to_Broaden_Participation","translated_slug":"","page_count":2,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433103,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433103/thumbnails/1.jpg","file_name":"09393991.pdf","download_url":"https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2021_Project_Connect_Connecting_to_Br.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433103/09393991-libre.pdf?1651606123=\u0026response-content-disposition=attachment%3B+filename%3DIMS2021_Project_Connect_Connecting_to_Br.pdf\u0026Expires=1732471281\u0026Signature=cb8H26yjPmEm7VGlUvs-t6RFi71-KB5tcFt1eTkhoaheuvi79FqBEiCMQWBLE-6iYU295UWmxUNOxjFIFMvt77Gyi-P-uS41OKW92sxLEFJ7YlBVQRjju3XrRSkw4eJBod8eTuLAaWIJQg6OZfIdFTuLXp3RGEw1qCokAEPR2S9O0D3GX6efRyCG3oE7FTPc5Exk8ZwaHMwemStIQpy6FJnPuF8Ve22PBrpDxZ9B4u0aPWqyyD2YVorhHOiiLni5~fUMcF5ivmh5-hmz-Jw5bxsjqN8S-paxrHdINJ05IvLTkLdNggvvhvETjPyV~jl2HfnegUKy~RYvE~QXP0O4KA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356336"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking"><img alt="Research paper thumbnail of A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking" class="work-thumbnail" src="https://attachments.academia-assets.com/85433102/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking">A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking</a></div><div class="wp-workCard_item"><span>2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software Defined Networking (SDN) is an emerging architecture providing services on a priority ba...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="85cc92cd02c60942fcbfc520b3c4b216" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433102,&quot;asset_id&quot;:78356336,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356336"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356336"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356336; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356336]").text(description); $(".js-view-count[data-work-id=78356336]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356336; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356336']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356336, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "85cc92cd02c60942fcbfc520b3c4b216" } } $('.js-work-strip[data-work-id=78356336]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356336,"title":"A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking","translated_title":"","metadata":{"abstract":"Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...","publisher":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"},"translated_abstract":"Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...","internal_url":"https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking","translated_internal_url":"","created_at":"2022-05-03T12:23:23.749-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433102,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433102/thumbnails/1.jpg","file_name":"66615.pdf","download_url":"https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Bio_Inspired_Framework_to_Mitigate_DoS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433102/66615-libre.pdf?1651606122=\u0026response-content-disposition=attachment%3B+filename%3DA_Bio_Inspired_Framework_to_Mitigate_DoS.pdf\u0026Expires=1732471281\u0026Signature=V-BciBEW7hUIET1axy-MIKO25uBmS2jQ7FHcqM8mnai0KoPdGzuvdYCXjkg2NFJRcu4aoChuwb0YOn7N4y4K7huf2Y7GfiOqlGntLvM4miHGyopNUJlcwRj9v1WUNTXsxF0xlpGIkoSNrjYUwhwFIArJk8HyH7RFZaKHq9kizzopSY92jj2IyzoCBaOLVkBobEvIwq5c1zAvzvgb-5tolMtmYTHMxvVm0DGNqrFnEOiIrnkgWZivievXH~noMWNjHeOWYGLhhFNzdskrBxWWK13tr-o4PvkAvdcvWPq4tgUb62VDHU4WhjqG21w3KyRlSAwucIHJPX941kWT7ghzcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking","translated_slug":"","page_count":2,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433102,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433102/thumbnails/1.jpg","file_name":"66615.pdf","download_url":"https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Bio_Inspired_Framework_to_Mitigate_DoS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433102/66615-libre.pdf?1651606122=\u0026response-content-disposition=attachment%3B+filename%3DA_Bio_Inspired_Framework_to_Mitigate_DoS.pdf\u0026Expires=1732471281\u0026Signature=V-BciBEW7hUIET1axy-MIKO25uBmS2jQ7FHcqM8mnai0KoPdGzuvdYCXjkg2NFJRcu4aoChuwb0YOn7N4y4K7huf2Y7GfiOqlGntLvM4miHGyopNUJlcwRj9v1WUNTXsxF0xlpGIkoSNrjYUwhwFIArJk8HyH7RFZaKHq9kizzopSY92jj2IyzoCBaOLVkBobEvIwq5c1zAvzvgb-5tolMtmYTHMxvVm0DGNqrFnEOiIrnkgWZivievXH~noMWNjHeOWYGLhhFNzdskrBxWWK13tr-o4PvkAvdcvWPq4tgUb62VDHU4WhjqG21w3KyRlSAwucIHJPX941kWT7ghzcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":37747,"name":"OpenFlow","url":"https://www.academia.edu/Documents/in/OpenFlow"},{"id":193315,"name":"Software defined networking","url":"https://www.academia.edu/Documents/in/Software_defined_networking"}],"urls":[{"id":20178620,"url":"https://doi.org/10.1109/NTMS.2019.8763818"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356335"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356335/TangleCV"><img alt="Research paper thumbnail of TangleCV" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356335/TangleCV">TangleCV</a></div><div class="wp-workCard_item"><span>Proceedings of the ACM Workshop on Automotive Cybersecurity</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Connected vehicles are designed to make informed safety-related decisions based on data/informati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356335"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356335"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356335; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356335]").text(description); $(".js-view-count[data-work-id=78356335]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356335; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356335']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356335, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356335]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356335,"title":"TangleCV","translated_title":"","metadata":{"abstract":"Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.","publisher":"ACM","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of the ACM Workshop on Automotive Cybersecurity"},"translated_abstract":"Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.","internal_url":"https://www.academia.edu/78356335/TangleCV","translated_internal_url":"","created_at":"2022-05-03T12:23:23.600-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"TangleCV","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178619,"url":"https://dl.acm.org/doi/pdf/10.1145/3309171.3309177"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356334"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices"><img alt="Research paper thumbnail of Deep learning-based security schemes for implantable medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices">Deep learning-based security schemes for implantable medical devices</a></div><div class="wp-workCard_item"><span>Energy Efficiency of Medical Devices and Healthcare Applications</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns i...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356334"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356334]").text(description); $(".js-view-count[data-work-id=78356334]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356334']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356334, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356334]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356334,"title":"Deep learning-based security schemes for implantable medical devices","translated_title":"","metadata":{"abstract":"Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.","publisher":"Elsevier","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Energy Efficiency of Medical Devices and Healthcare Applications"},"translated_abstract":"Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.","internal_url":"https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:23.416-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Deep_learning_based_security_schemes_for_implantable_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1131312,"name":"Academic","url":"https://www.academia.edu/Documents/in/Academic"}],"urls":[{"id":20178618,"url":"https://api.elsevier.com/content/article/PII:B9780128190456000066?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356332"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations"><img alt="Research paper thumbnail of Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations">Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations</a></div><div class="wp-workCard_item"><span>2021 IEEE International Conference on Communications Workshops (ICC Workshops)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic o...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356332"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356332"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356332; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356332]").text(description); $(".js-view-count[data-work-id=78356332]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356332; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356332']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356332, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356332]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356332,"title":"Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations","translated_title":"","metadata":{"abstract":"As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)"},"translated_abstract":"As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.","internal_url":"https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations","translated_internal_url":"","created_at":"2022-05-03T12:23:23.274-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1688,"name":"Reinforcement Learning","url":"https://www.academia.edu/Documents/in/Reinforcement_Learning"}],"urls":[{"id":20178617,"url":"http://xplorestaging.ieee.org/ielx7/9473476/9473480/09473604.pdf?arnumber=9473604"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356331"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach"><img alt="Research paper thumbnail of Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach">Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach</a></div><div class="wp-workCard_item"><span>Neural Computing and Applications</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Athletes represent the apex of physical capacity filling in a social picture of performance and b...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356331"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356331"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356331; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356331]").text(description); $(".js-view-count[data-work-id=78356331]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356331; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356331']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356331, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356331]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356331,"title":"Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach","translated_title":"","metadata":{"abstract":"Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.","publisher":"Springer Science and Business Media LLC","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Neural Computing and Applications"},"translated_abstract":"Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.","internal_url":"https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach","translated_internal_url":"","created_at":"2022-05-03T12:23:23.118-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"}],"urls":[{"id":20178616,"url":"http://link.springer.com/content/pdf/10.1007/s00521-021-05704-5.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356330"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works"><img alt="Research paper thumbnail of IMS2020 Project Connect: Connectivity That Works" class="work-thumbnail" src="https://attachments.academia-assets.com/85433038/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works">IMS2020 Project Connect: Connectivity That Works</a></div><div class="wp-workCard_item"><span>IEEE Microwave Magazine</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0b0b6249c0ec5e60c3bfaedd58301019" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433038,&quot;asset_id&quot;:78356330,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356330"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356330"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356330; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356330]").text(description); $(".js-view-count[data-work-id=78356330]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356330; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356330']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356330, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0b0b6249c0ec5e60c3bfaedd58301019" } } $('.js-work-strip[data-work-id=78356330]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356330,"title":"IMS2020 Project Connect: Connectivity That Works","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"IEEE Microwave Magazine"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works","translated_internal_url":"","created_at":"2022-05-03T12:23:22.967-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433038,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433038/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433038/09052024-libre.pdf?1651606126=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=KoP9Ajz8fjthEfJJSrKddYetdJADF2ei99MBLqj0PR06VWhnyFVblCyj62UaT2sgy9k3hiBfob~oxE6v1B2FshIThPu1QC9PcempWAP~ZQXByxO-Xr7SdE5lfZGyqwBVIL4NO~1RMHFg7mZOpoAeHr8oEwdxyDXwU3~gDSSGQPy~RxyC7HmOgBhI0WBEhTaki9J0h9NAb3hYVRo1VunXErnWYG9qbUO25UsBgOnMWO4f~oxPNZ4yScivc-25AZStFmCYmdAW95qXGfeApvabOp1LktLHpDrVtyoi-QA0F1msvnAq9Zo9A4RdbsxTTXywqegnt37zmW~qZasdpQh2mQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"IMS2020_Project_Connect_Connectivity_That_Works","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433038,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433038/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433038/09052024-libre.pdf?1651606126=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=KoP9Ajz8fjthEfJJSrKddYetdJADF2ei99MBLqj0PR06VWhnyFVblCyj62UaT2sgy9k3hiBfob~oxE6v1B2FshIThPu1QC9PcempWAP~ZQXByxO-Xr7SdE5lfZGyqwBVIL4NO~1RMHFg7mZOpoAeHr8oEwdxyDXwU3~gDSSGQPy~RxyC7HmOgBhI0WBEhTaki9J0h9NAb3hYVRo1VunXErnWYG9qbUO25UsBgOnMWO4f~oxPNZ4yScivc-25AZStFmCYmdAW95qXGfeApvabOp1LktLHpDrVtyoi-QA0F1msvnAq9Zo9A4RdbsxTTXywqegnt37zmW~qZasdpQh2mQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433039,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433039/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433039/download_file","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433039/09052024-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=Fh5HpGTQUOcsxpgZq-wXJJBT65XwfZiqlejO8ZZbXUASTU1VhYREUdrz~flEJhewfXOBKU8aEWg~tm0BllGYfwn~ZNMm~cjmKCx1T--cvyuR-vi6xiBCiNjdtutRd1ba25YgwImgGhrGoDR5EiFKPURHyMBZs5N0GqTu6gMFyMMsrg2SUqopvc7MGXL~0TGe9SVipQ0mbB07vMAd-O389jAIzPadXhZaAib4eiEAt4g~Ea2kFsI3U4oxQmGCAjKX31Ni03zoC7RWKTC28ckLX1NTb9L~H~oBq1aPICwudvLC~r6KvVV7Nldh8MM98KGYkcLmTBaDic8t2oYo5OljmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":20178615,"url":"http://xplorestaging.ieee.org/ielx7/6668/9052012/09052024.pdf?arnumber=9052024"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356329"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems"><img alt="Research paper thumbnail of A Survey of Blockchain Enabled Cyber-Physical Systems" class="work-thumbnail" src="https://attachments.academia-assets.com/85433035/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems">A Survey of Blockchain Enabled Cyber-Physical Systems</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="daabaf3dda25d66dea04f6bed71068cb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433035,&quot;asset_id&quot;:78356329,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356329"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356329"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356329; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356329]").text(description); $(".js-view-count[data-work-id=78356329]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356329; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356329']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356329, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "daabaf3dda25d66dea04f6bed71068cb" } } $('.js-work-strip[data-work-id=78356329]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356329,"title":"A Survey of Blockchain Enabled Cyber-Physical Systems","translated_title":"","metadata":{"abstract":"Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...","internal_url":"https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems","translated_internal_url":"","created_at":"2022-05-03T12:23:22.821-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433035,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433035/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433035/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=IPi8OQNbOtnAJun8OF~muCh1n446fEEOLCiRBgvNIqmNuNYBzb2Lxlwb8WZDkTfgYbO8wCw8DFYenTsQCaOEY~V3vd4FcvKTcwWmZ6~zytjLtD7A6D9uxVnLILBNye6hATF6PSFuov3o0jb5-vy-GbILozWH38X41pLvqbU0J02vorsdEKzXCWXsf4Fcy4Bq3eAXDIP47dZWdohjQ~FklSvLWT8hMt~zD2DGYSk9iUA58KIe3tlrDUNKSLgh0cNQOkK~yRsYA3Askea2rauP8HZGfZiA-bAnj-uO-Bht5VBpDpZ4p99H38g2RljBjYS-gdZvdPVFagbMFVb5U~akxQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems","translated_slug":"","page_count":28,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433035,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433035/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433035/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=IPi8OQNbOtnAJun8OF~muCh1n446fEEOLCiRBgvNIqmNuNYBzb2Lxlwb8WZDkTfgYbO8wCw8DFYenTsQCaOEY~V3vd4FcvKTcwWmZ6~zytjLtD7A6D9uxVnLILBNye6hATF6PSFuov3o0jb5-vy-GbILozWH38X41pLvqbU0J02vorsdEKzXCWXsf4Fcy4Bq3eAXDIP47dZWdohjQ~FklSvLWT8hMt~zD2DGYSk9iUA58KIe3tlrDUNKSLgh0cNQOkK~yRsYA3Askea2rauP8HZGfZiA-bAnj-uO-Bht5VBpDpZ4p99H38g2RljBjYS-gdZvdPVFagbMFVb5U~akxQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433036,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433036/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433036/download_file","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433036/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=Uyc8GObC3QBwIUZjKfmRCQJo9sRnOFKy3bPpUZIt50h02JlcLvYy2YmjW4rrR342d8~Q-7pUGQTZAwSQrQQe5cpAwAVjtj8kvvY8HdPoiAP4Ie8rIiJ-VhJrk1ntpVYfQXdfx0coeem3~OPHQoDNDjL3QDK0ZwrGaG~BkTqF8bCBhnOfkVYEoGjoAAPYospL81QRlROCAJy5yiCbzeNd9BWkzh0jVx7CYD0quBS31K9voTrEVFZufy1DVNKluX8KiygLXtxOHcq5t~1TaV0CB6iuOFd0JGS6t9PnphYUcfwbSQxL7YAPOw869mGElJp1-PwQxfcdA2sXNQ9jdKV9iA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":442135,"name":"Cyber Physical System","url":"https://www.academia.edu/Documents/in/Cyber_Physical_System"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"},{"id":2199949,"name":"Blockchain","url":"https://www.academia.edu/Documents/in/Blockchain"}],"urls":[{"id":20178614,"url":"https://www.mdpi.com/1424-8220/20/1/282/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356328"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices"><img alt="Research paper thumbnail of Multi-layer security scheme for implantable medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices">Multi-layer security scheme for implantable medical devices</a></div><div class="wp-workCard_item"><span>Neural Computing and Applications</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the area...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356328"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356328"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356328; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356328]").text(description); $(".js-view-count[data-work-id=78356328]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356328; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356328']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356328, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356328]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356328,"title":"Multi-layer security scheme for implantable medical devices","translated_title":"","metadata":{"abstract":"Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.","publisher":"Springer Science and Business Media LLC","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Neural Computing and Applications"},"translated_abstract":"Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.","internal_url":"https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:22.646-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Multi_layer_security_scheme_for_implantable_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178613,"url":"http://link.springer.com/content/pdf/10.1007/s00521-018-3819-0.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356327"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment"><img alt="Research paper thumbnail of Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment" class="work-thumbnail" src="https://attachments.academia-assets.com/85433037/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment">Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="9fd68528b76da12122de5efe797a0437" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433037,&quot;asset_id&quot;:78356327,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356327"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356327"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356327; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356327]").text(description); $(".js-view-count[data-work-id=78356327]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356327; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356327']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356327, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "9fd68528b76da12122de5efe797a0437" } } $('.js-work-strip[data-work-id=78356327]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356327,"title":"Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","grobid_abstract":"Diabetic patients use therapy from the insulin pump, a type of implantable medical device, for the infusion of insulin to control blood glucose level. While these devices offer many clinical benefits, there has been a recent increase in the number of cases, wherein, the wireless communication channel of such devices has been compromised. This not only causes the device to malfunction but also potentially threatens the patient's life. In this paper, a neural networks-based multi-layer perceptron model was designed for real-time medical device security. Machine learning algorithms are among the most effective and broadly utilized systems for classification, identification, and segmentation. Although they are effective, they are both computationally and memory intensive, making them hard to be deployed on low-power embedded frameworks. In this paper, we present an on-chip neural system network for securing diabetic treatment. The model achieved 98.1% accuracy in classifying fake versus genuine glucose measurements. The proposed model was comparatively evaluated with a linear support vector machine which achieved only 90.17% accuracy with negligible precision and recall. Moreover, the proposal estimates the reliability of the framework through the use of the Bayesian network. The proposed approach enhances the reliability of the overall framework by 18% when only one device is secured, and over 90% when all devices are secured. INDEX TERMS Security, machine learning, insulin pumps, deep learning, implantable medical devices.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"IEEE Access","grobid_abstract_attachment_id":85433037},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment","translated_internal_url":"","created_at":"2022-05-03T12:23:22.497-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433037,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433037/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433037/08409455-libre.pdf?1651606133=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=KO86pIIs0iBryrielntJEbdaC99RwWfZ-sK--6aI7irg95CGSa0tTP2r3Vwr1jPSGTgQarUoRAu6ofb8zRvGO10jbydLYZt5oESdvuLCNQWVBfinmxxpoUZJQwFfDprYQlCOfwLJ98EHV98hYgT4kXeklHG6Vq0B67nEgEQKrPq0FdHdnk0JEkov6-X1iqOZCsY~oeSFTwGh1eOHSZRSR7SmqfoBxxg~V~G7lCaIErlpkW-14XflCyQ-OLCaJ1th1E3XrL~LJ84vBvKRvDLzjnJCQXKdN1ziJz9r8217t0Da8ViEPdYoD71Mh4ofj22t3To50V8Hf8nDN0uRltc~NA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433037,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433037/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433037/08409455-libre.pdf?1651606133=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=KO86pIIs0iBryrielntJEbdaC99RwWfZ-sK--6aI7irg95CGSa0tTP2r3Vwr1jPSGTgQarUoRAu6ofb8zRvGO10jbydLYZt5oESdvuLCNQWVBfinmxxpoUZJQwFfDprYQlCOfwLJ98EHV98hYgT4kXeklHG6Vq0B67nEgEQKrPq0FdHdnk0JEkov6-X1iqOZCsY~oeSFTwGh1eOHSZRSR7SmqfoBxxg~V~G7lCaIErlpkW-14XflCyQ-OLCaJ1th1E3XrL~LJ84vBvKRvDLzjnJCQXKdN1ziJz9r8217t0Da8ViEPdYoD71Mh4ofj22t3To50V8Hf8nDN0uRltc~NA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433040,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433040/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433040/download_file","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433040/08409455-libre.pdf?1651606132=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=dF9fw6Kz4iTUxIXZpSysTiDncjVHrhU6B71l5KNbl1oLDPxV5Hc6DJULmCBA9E0wKoMLRlK2szpvg51HpYbqIRMPBGfOXScw0WFUigX1-SMaBZPTmine4wCc-c--~PIGjmhNElUeth72La6NnTJpvCQBFyPyhfzk2YeOuzvQDzR2z581NnSaf0UsOImErAcioLMwBOryDC3RyHPdeE8jWMR7PC3cmb0OeW-NrjvmKENc5vw6gjX-WeKmkUtrf~SyqWT9HX-RorG9~fR4JlWC1VKJOy2fMYdvV8SUJy4U2hCJ4EN7isOXrcS~ybxUNyCWzpBy1B4jpJzQQ9Ek2ft4SQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":238159,"name":"Multilayer Perceptron","url":"https://www.academia.edu/Documents/in/Multilayer_Perceptron"},{"id":1004747,"name":"Perceptron","url":"https://www.academia.edu/Documents/in/Perceptron"},{"id":1211304,"name":"Artificial Neural Network","url":"https://www.academia.edu/Documents/in/Artificial_Neural_Network"}],"urls":[{"id":20178612,"url":"http://xplorestaging.ieee.org/ielx7/6287639/8274985/08409455.pdf?arnumber=8409455"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356326"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants"><img alt="Research paper thumbnail of A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants" class="work-thumbnail" src="https://attachments.academia-assets.com/85433034/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants">A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="053726766b38da2094f1d73ea23d7b5f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433034,&quot;asset_id&quot;:78356326,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356326"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356326]").text(description); $(".js-view-count[data-work-id=78356326]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356326']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356326, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "053726766b38da2094f1d73ea23d7b5f" } } $('.js-work-strip[data-work-id=78356326]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356326,"title":"A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"IEEE Access"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants","translated_internal_url":"","created_at":"2022-05-03T12:23:22.330-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433034,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433034/thumbnails/1.jpg","file_name":"08645788.pdf","download_url":"https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Deep_Learning_Strategy_for_Class.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433034/08645788-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Deep_Learning_Strategy_for_Class.pdf\u0026Expires=1732471282\u0026Signature=MeA5T6FINEBoqIAwlgTNuI070icN4fOLmoD9qXRGjnJMvl-dr5ZXgyBRR5itHIGK19J28y7AXwY2bKdVya6LM4D2I~EBtQElqrhgSjq9HhR5c9bn6i0ULJ5lsgfRPGgMiX-MeZVcTCVt0meLa3P9Y6Qrzbp5UUZ8FgklfB4GRJnAVxm7vmSHxp90qwj2rMvM50c~lkO0qdxge~PHBJEKJ8fzNGXoPLB~O6DUgrZCNWAr-nUO6T2qzLQFdhzsZ8O~-v0gC-eg5u-2~kCyeRu5CshaU-R1XehH~Phu91FnJ6pEhkfBP9YA-dvlMhmiJ~UAet6aKPOpokpdDz9xNhC48w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants","translated_slug":"","page_count":10,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433034,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433034/thumbnails/1.jpg","file_name":"08645788.pdf","download_url":"https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Deep_Learning_Strategy_for_Class.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433034/08645788-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Deep_Learning_Strategy_for_Class.pdf\u0026Expires=1732471282\u0026Signature=MeA5T6FINEBoqIAwlgTNuI070icN4fOLmoD9qXRGjnJMvl-dr5ZXgyBRR5itHIGK19J28y7AXwY2bKdVya6LM4D2I~EBtQElqrhgSjq9HhR5c9bn6i0ULJ5lsgfRPGgMiX-MeZVcTCVt0meLa3P9Y6Qrzbp5UUZ8FgklfB4GRJnAVxm7vmSHxp90qwj2rMvM50c~lkO0qdxge~PHBJEKJ8fzNGXoPLB~O6DUgrZCNWAr-nUO6T2qzLQFdhzsZ8O~-v0gC-eg5u-2~kCyeRu5CshaU-R1XehH~Phu91FnJ6pEhkfBP9YA-dvlMhmiJ~UAet6aKPOpokpdDz9xNhC48w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178611,"url":"http://xplorestaging.ieee.org/ielx7/6287639/6514899/08645788.pdf?arnumber=8645788"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356325"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables"><img alt="Research paper thumbnail of A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables" class="work-thumbnail" src="https://attachments.academia-assets.com/85433033/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables">A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c4a2003c75b4ad920ddf14e8566fda61" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433033,&quot;asset_id&quot;:78356325,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356325"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356325"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356325; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356325]").text(description); $(".js-view-count[data-work-id=78356325]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356325; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356325']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356325, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c4a2003c75b4ad920ddf14e8566fda61" } } $('.js-work-strip[data-work-id=78356325]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356325,"title":"A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"IEEE Access"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables","translated_internal_url":"","created_at":"2022-05-03T12:23:22.083-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433033,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433033/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433033/08555979-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=UgNvhmN4V8C5AY~3nr2-scUNwubI4mcWffe~G1S3rkFQWtWm3W8TJZhH2BdHvPb6ov1BoMY0em1jJl05gg37ZHsYIc7-JEFaIaXYFPV7qwsLmxYBDUKQ-L8wrlgvpXlQTeIyKY1O8aJPVxNSWJqLhzgbMMdkSpHMBZ2Shi~zYQ66tgvLmjXRef4myrIxC6McjP6ycovi0andNMtyAMwtoC15tMFvxGJ3Og78Z~QoSMemieB0jkOulAqsajq8bbnJWnG9paC51MsfXPQ1Mn1no6HP6GWl-CccxYzJdzN4HNkImWg4uEhQvOx1hWFzEd6Cxn6yWWPuwpCoaaQ1tzZNvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433033,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433033/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433033/08555979-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=UgNvhmN4V8C5AY~3nr2-scUNwubI4mcWffe~G1S3rkFQWtWm3W8TJZhH2BdHvPb6ov1BoMY0em1jJl05gg37ZHsYIc7-JEFaIaXYFPV7qwsLmxYBDUKQ-L8wrlgvpXlQTeIyKY1O8aJPVxNSWJqLhzgbMMdkSpHMBZ2Shi~zYQ66tgvLmjXRef4myrIxC6McjP6ycovi0andNMtyAMwtoC15tMFvxGJ3Og78Z~QoSMemieB0jkOulAqsajq8bbnJWnG9paC51MsfXPQ1Mn1no6HP6GWl-CccxYzJdzN4HNkImWg4uEhQvOx1hWFzEd6Cxn6yWWPuwpCoaaQ1tzZNvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433032,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433032/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433032/download_file","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433032/08555979-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=Mf5vHuKcX5lEOFdn-HmViOVaNKoVc~HmRsYLnTmNkL6PdlAYF2jjRN3GVsLPsfoqQe30EaY4snkCoKwupwaJaGhJAWNrWd4zH0B4MF-sj7xP11KCYjJvB5tNOWVxEUQZXHpkPpf~kioS3nwHTQPT5M1sDInIr0JDhN1gdLxkxk5dXgv7XBSNuEDgciM01sLtvd~o1QbloTnY5NCFlYQc8~VaoWd6h-lcIkZpeWAAcA6ry5go9VHh4fecdHRQwYE1RSxQju643Lqt~DphnzAy-InLRW82QpihMo84zI2PyrSF1BerbQDBEPkdmfBNxmKcH0OpuaaA5Zr6N8BYCS3rkg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178610,"url":"http://xplorestaging.ieee.org/ielx7/6287639/6514899/08555979.pdf?arnumber=8555979"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356323"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356323/TangleCV"><img alt="Research paper thumbnail of TangleCV" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356323/TangleCV">TangleCV</a></div><div class="wp-workCard_item"><span>ACM Transactions on Cyber-Physical Systems</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Connected vehicles are set to define the future of transportation; however, this upcoming technol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356323"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356323"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356323; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356323]").text(description); $(".js-view-count[data-work-id=78356323]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356323; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356323']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356323, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356323]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356323,"title":"TangleCV","translated_title":"","metadata":{"abstract":"Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...","publisher":"Association for Computing Machinery (ACM)","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"ACM Transactions on Cyber-Physical Systems"},"translated_abstract":"Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...","internal_url":"https://www.academia.edu/78356323/TangleCV","translated_internal_url":"","created_at":"2022-05-03T12:23:16.055-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"TangleCV","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[],"urls":[{"id":20178608,"url":"https://dl.acm.org/doi/pdf/10.1145/3404500"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div><div class="profile--tab_content_container js-tab-pane tab-pane" data-section-id="2619380" id="papers"><div class="js-work-strip profile--work_container" data-work-id="78356346"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices"><img alt="Research paper thumbnail of A review of security challenges, attacks and resolutions for wireless medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices">A review of security challenges, attacks and resolutions for wireless medical devices</a></div><div class="wp-workCard_item"><span>2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Evolution of implantable medical devices for human beings has provided a radical new way for trea...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356346"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356346"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356346; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356346]").text(description); $(".js-view-count[data-work-id=78356346]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356346; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356346']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356346, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356346]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356346,"title":"A review of security challenges, attacks and resolutions for wireless medical devices","translated_title":"","metadata":{"abstract":"Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC)"},"translated_abstract":"Evolution of implantable medical devices for human beings has provided a radical new way for treating chronic diseases such as diabetes, cardiac arrhythmia, cochlear, gastric diseases etc. Implantable medical devices have provided a breakthrough in network transformation by enabling and accessing the technology on demand. However, with the advancement of these devices with respect to wireless communication and ability for outside caregiver to communicate wirelessly have increased its potential to impact the security, and breach in privacy of human beings. There are several vulnerable threats in wireless medical devices such as information harvesting, tracking the patient, impersonation, relaying attacks and denial of service attack. These threats violate confidentiality, integrity, availability properties of these devices. For securing implantable medical devices diverse solutions have been proposed ranging from machine learning techniques to hardware technologies. The present survey paper focusses on the challenges, threats and solutions pertaining to the privacy and safety issues of medical devices.","internal_url":"https://www.academia.edu/78356346/A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:25.018-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"A_review_of_security_challenges_attacks_and_resolutions_for_wireless_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"},{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications"},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178629,"url":"http://xplorestaging.ieee.org/ielx7/7975134/7986245/07986505.pdf?arnumber=7986505"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356345"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment"><img alt="Research paper thumbnail of DLRT: Deep Learning Approach for Reliable Diabetic Treatment" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment">DLRT: Deep Learning Approach for Reliable Diabetic Treatment</a></div><div class="wp-workCard_item"><span>GLOBECOM 2017 - 2017 IEEE Global Communications Conference</span><span>, 2017</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today,...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356345"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356345"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356345; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356345]").text(description); $(".js-view-count[data-work-id=78356345]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356345; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356345']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356345, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356345]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356345,"title":"DLRT: Deep Learning Approach for Reliable Diabetic Treatment","translated_title":"","metadata":{"abstract":"Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2017,"errors":{}},"publication_name":"GLOBECOM 2017 - 2017 IEEE Global Communications Conference"},"translated_abstract":"Diabetic therapy or insulin treatment enables patients to control the blood glucose level. Today, instead of physically utilizing syringes for infusing insulin, a patient can utilize a gadget, for example, a Wireless Insulin Pump (WIP) to pass insulin into the body. A typical WIP framework comprises of an insulin pump, continuous glucose management system, blood glucose monitor, and other associated devices with all connected wireless links. This takes into consideration more granular insulin conveyance while achieving blood glucose control. WIP frameworks have progressively benefited patients, yet the multifaceted nature of the subsequent framework has posed in parallel certain security implications. This paper proposes a highly accurate yet efficient deep learning methodology to protect these vulnerable devices against fake glucose dosage. Moreover, the proposal estimates the reliability of the framework through the Bayesian network. We conduct comparative study to conclude that the proposed method outperforms the state of the art by over 15% in accuracy achieving more than 93% accuracy. Also, the proposed approach enhances the reliability of the overall system by 18% when only one wireless link is secured, and more than 90% when all wireless links are secured.","internal_url":"https://www.academia.edu/78356345/DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment","translated_internal_url":"","created_at":"2022-05-03T12:23:24.841-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"DLRT_Deep_Learning_Approach_for_Reliable_Diabetic_Treatment","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178628,"url":"http://xplorestaging.ieee.org/ielx7/8253768/8253909/08255028.pdf?arnumber=8255028"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356344"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks"><img alt="Research paper thumbnail of Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks">Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks</a></div><div class="wp-workCard_item"><span>2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">The immune system of the human body has massive potential in defending it against multiple harmfu...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356344"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356344"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356344; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356344]").text(description); $(".js-view-count[data-work-id=78356344]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356344; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356344']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356344, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356344]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356344,"title":"Mathematical Evaluation of Human Immune Systems For Securing Software Defined Networks","translated_title":"","metadata":{"abstract":"The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM)"},"translated_abstract":"The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. In order to restrict the nature, size, and intensity of these microbial invasions, human beings have inherent capabilities to deal with them. The human immune system is capable of protecting the body in the form of external barriers such as skin, cells, and tissues. Furthermore, it is capable of differentiating among the self and the non-self cells with the distinct properties and features that infiltrate the human body. This paper presents a case study of the human immune system in which we develop mathematical models of innate and adaptive immune system. Extensive simulations were carried out to study the effect of the foreign particles when the recovery mechanism occurs in the body. The results obtained, substantiate the reliability of the human immune mathematical model. Finally, we advocate that having a strong security and privacy around the human body can contribute in building a strong network system. For instance, the two layer immune inspired framework viz innate layer and adaptive layer can be instigated at the data layer and the control layer of Software Defined Networking respectively.","internal_url":"https://www.academia.edu/78356344/Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks","translated_internal_url":"","created_at":"2022-05-03T12:23:24.690-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Mathematical_Evaluation_of_Human_Immune_Systems_For_Securing_Software_Defined_Networks","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178627,"url":"http://xplorestaging.ieee.org/ielx7/8622653/8629585/08629728.pdf?arnumber=8629728"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356341"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework"><img alt="Research paper thumbnail of Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework">Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework</a></div><div class="wp-workCard_item"><span>2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356341"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356341"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356341; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356341]").text(description); $(".js-view-count[data-work-id=78356341]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356341; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356341']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356341, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356341]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356341,"title":"Invited Paper: mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using a Smart Edge Framework","translated_title":"","metadata":{"abstract":"As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"2020 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"},"translated_abstract":"As the complexity of hardware (sensors, components, antennas) and software (algorithms) increases, it is practical and efficient to manage and process test configuration and data analysis as close to the testbed as possible (inline) instead of offline compute platforms. We present mmMoReEdge, a mmWave modular and reconfigurable testbed inspired by a smart edge networking and communication framework, typically found in IoT devices. In mmMoReEdge, complex signal processing is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. Using a mathematical model for processing time (the proposed figure of merit), we present results which show that mmMoReEdge is 50% to 70% faster as compared to an offline general-purpose processor based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","internal_url":"https://www.academia.edu/78356341/Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework","translated_internal_url":"","created_at":"2022-05-03T12:23:24.428-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Invited_Paper_mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_a_Smart_Edge_Framework","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178624,"url":"http://xplorestaging.ieee.org/ielx7/9145943/9156071/09156144.pdf?arnumber=9156144"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356340"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables"><img alt="Research paper thumbnail of Towards a Practical Pedestrian Distraction Detection Framework using Wearables" class="work-thumbnail" src="https://attachments.academia-assets.com/85433105/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables">Towards a Practical Pedestrian Distraction Detection Framework using Wearables</a></div><div class="wp-workCard_item"><span>2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="e87b3c9de2c134f4fd67bfd63e61b7a0" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433105,&quot;asset_id&quot;:78356340,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356340"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356340"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356340; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356340]").text(description); $(".js-view-count[data-work-id=78356340]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356340; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356340']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356340, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "e87b3c9de2c134f4fd67bfd63e61b7a0" } } $('.js-work-strip[data-work-id=78356340]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356340,"title":"Towards a Practical Pedestrian Distraction Detection Framework using Wearables","translated_title":"","metadata":{"publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"2018 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356340/Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables","translated_internal_url":"","created_at":"2022-05-03T12:23:24.275-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433105/thumbnails/1.jpg","file_name":"sureshkantharXiv17-PedSafe.pdf","download_url":"https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Towards_a_Practical_Pedestrian_Distracti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433105/sureshkantharXiv17-PedSafe-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DTowards_a_Practical_Pedestrian_Distracti.pdf\u0026Expires=1732471281\u0026Signature=BGge8wFcFSbi0fDnrEnuPW654vMyi2TVsqck1GT64yEmvPQ6~lRlTSGQwUQwtKqzE~YHLZhVahX23cNBlZ6FGIjcO03VITOyQuRcaggbvIDiDHKznHFF~271Qifo0KVQAmH7svALgmtwSbqFCl2lPlB7FFxtTDK5CwOKBxCUfpHllqvUM26aqogPkRN1XfE6OBlSoygmjoIdNYWyZuR0z-q~QvmYZcb4SwGDmnPR-K~OolnSxwRS5Tnzgf3poUieAQ~9FCm6V9bD6VssXaMzL3CTbL0jswP24Pwk8x9WT8qYaOOHailUq0x0YvcUdoW9sm2YX6oT5JEKYxdnZ51Gyg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Towards_a_Practical_Pedestrian_Distraction_Detection_Framework_using_Wearables","translated_slug":"","page_count":11,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433105,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433105/thumbnails/1.jpg","file_name":"sureshkantharXiv17-PedSafe.pdf","download_url":"https://www.academia.edu/attachments/85433105/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Towards_a_Practical_Pedestrian_Distracti.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433105/sureshkantharXiv17-PedSafe-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DTowards_a_Practical_Pedestrian_Distracti.pdf\u0026Expires=1732471281\u0026Signature=BGge8wFcFSbi0fDnrEnuPW654vMyi2TVsqck1GT64yEmvPQ6~lRlTSGQwUQwtKqzE~YHLZhVahX23cNBlZ6FGIjcO03VITOyQuRcaggbvIDiDHKznHFF~271Qifo0KVQAmH7svALgmtwSbqFCl2lPlB7FFxtTDK5CwOKBxCUfpHllqvUM26aqogPkRN1XfE6OBlSoygmjoIdNYWyZuR0z-q~QvmYZcb4SwGDmnPR-K~OolnSxwRS5Tnzgf3poUieAQ~9FCm6V9bD6VssXaMzL3CTbL0jswP24Pwk8x9WT8qYaOOHailUq0x0YvcUdoW9sm2YX6oT5JEKYxdnZ51Gyg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178623,"url":"http://xplorestaging.ieee.org/ielx7/8454955/8480085/08480238.pdf?arnumber=8480238"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356339"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356339/Blockchain_applications_for_healthcare"><img alt="Research paper thumbnail of Blockchain applications for healthcare" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356339/Blockchain_applications_for_healthcare">Blockchain applications for healthcare</a></div><div class="wp-workCard_item"><span>Energy Efficiency of Medical Devices and Healthcare Applications</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract Healthcare systems control and monitor the health of patients with the help of advanced ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people&amp;#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356339"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356339"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356339; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356339]").text(description); $(".js-view-count[data-work-id=78356339]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356339; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356339']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356339, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356339]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356339,"title":"Blockchain applications for healthcare","translated_title":"","metadata":{"abstract":"Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people\u0026#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.","publisher":"Elsevier","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Energy Efficiency of Medical Devices and Healthcare Applications"},"translated_abstract":"Abstract Healthcare systems control and monitor the health of patients with the help of advanced technologies. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchain and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a de-centralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient, and enables the provision of financial services, thereby giving users more freedom and power. This emerging technology provides internet users the capability to create value and authenticate the digital information. It has the capability to revolutionize a diverse set of business applications ranging from sharing economy to data management and prediction markets. In this paper, we present a survey of blockchain applications in healthcare. Healthcare systems play a very crucial role in people\u0026#39;s life and there are diverse ways by which it can benefit from the blockchain technology and have been discussed in the chapter. The survey results demonstrate that Blockchain has distinct advantages for healthcare applications as compared to other applications. The benefits of blockchain can be further amplified by using a light-weight distributed ledger system like IOTA.","internal_url":"https://www.academia.edu/78356339/Blockchain_applications_for_healthcare","translated_internal_url":"","created_at":"2022-05-03T12:23:24.113-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Blockchain_applications_for_healthcare","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1131312,"name":"Academic","url":"https://www.academia.edu/Documents/in/Academic"}],"urls":[{"id":20178622,"url":"https://api.elsevier.com/content/article/PII:B978012819045600008X?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356338"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture"><img alt="Research paper thumbnail of mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture" class="work-thumbnail" src="https://attachments.academia-assets.com/85433042/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture">mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture</a></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing arc...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="5fa409609fcf9226ba729f821c44fccf" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433042,&quot;asset_id&quot;:78356338,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356338"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356338"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356338; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356338]").text(description); $(".js-view-count[data-work-id=78356338]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356338; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356338']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356338, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "5fa409609fcf9226ba729f821c44fccf" } } $('.js-work-strip[data-work-id=78356338]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356338,"title":"mmMoReEdge: A mmWave Modular and Reconfigurable Testbed Design using an Edge-Inspired Architecture","translated_title":"","metadata":{"abstract":"We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","publication_date":{"day":null,"month":null,"year":2020,"errors":{}}},"translated_abstract":"We present mmMoReEdge, a modular and reconfigurable mmWave testbed inspired by edge computing architecture found in IoT devices. In mmMoReEdge, complex signal processing, typically required for 5G testing, is performed on the edge (local servers in close proximity) of a group of testbed nodes. mmMoReEdge offers modularity via configuration of phased-array antennas, RF front ends, ADC, and DAC, while the edge processing provides reconfigurability via scalable inline processing. We present simulation results that show that mmMoReEdge is 50% to 70% faster as compared to an offline CPU-based architecture and is 30% to 40% faster as compared to a node-based architecture with one FPGA.","internal_url":"https://www.academia.edu/78356338/mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture","translated_internal_url":"","created_at":"2022-05-03T12:23:23.980-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433042,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433042/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433042/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=XC8C4jjrv~sTfeJCAYwSIpa~twR1gyyLMx9miS3Zh6uZiyRjhDBrWMMH5xoOSzqQqxsi1NG~Gt43GUkPmWmMq1L4F1xuv6VXtnVjQ0dpx8TtOMQpvX11qsYxoBxj-UjJzd3C3Vtif~TpHOmLAUf~wuZikVKIGuMiq79PSr13LRCG5rrrhVGM7Y-TzSer0jZaWDCMN1~QtEceNBgFzxD1YwnNa-cDxPp~ecuUiIOJTiiztScn4WJdn7DivgmDHWH-17p1ho7eK4Dukf7duMy3YCtMWMMmHSYb1ZgHadezGgMWyOs-6y6jLOkJkty25goghtH5umuOkVnjMVK~R9lIFg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"mmMoReEdge_A_mmWave_Modular_and_Reconfigurable_Testbed_Design_using_an_Edge_Inspired_Architecture","translated_slug":"","page_count":7,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433042,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433042/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433042/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433042/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=XC8C4jjrv~sTfeJCAYwSIpa~twR1gyyLMx9miS3Zh6uZiyRjhDBrWMMH5xoOSzqQqxsi1NG~Gt43GUkPmWmMq1L4F1xuv6VXtnVjQ0dpx8TtOMQpvX11qsYxoBxj-UjJzd3C3Vtif~TpHOmLAUf~wuZikVKIGuMiq79PSr13LRCG5rrrhVGM7Y-TzSer0jZaWDCMN1~QtEceNBgFzxD1YwnNa-cDxPp~ecuUiIOJTiiztScn4WJdn7DivgmDHWH-17p1ho7eK4Dukf7duMy3YCtMWMMmHSYb1ZgHadezGgMWyOs-6y6jLOkJkty25goghtH5umuOkVnjMVK~R9lIFg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433041,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433041/thumbnails/1.jpg","file_name":"mmMoReEdge_PerCom_SmartEdge_2020.pdf","download_url":"https://www.academia.edu/attachments/85433041/download_file","bulk_download_file_name":"mmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433041/mmMoReEdge_PerCom_SmartEdge_2020-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DmmMoReEdge_A_mmWave_Modular_and_Reconfig.pdf\u0026Expires=1732471281\u0026Signature=ZU5ajJK92JQn1pCaUfEKtWpqb9h7Fd10q7vJoLdMjuwWYXeDk7dNSHL4030L5V4RdctvbKhQfbC2XvxG9vV2eZ~fLmQhAVH0mNmzgjMkGffozwA5~rB5o9bySWlu61wPCEPBe9ie~P3z0a5yDeu53Pr1YVLnTk~fwsxsP9vdxu7MK5uKj~QAKpZRPtOVdS5vdKH2um6cgZdGeI-FELbo9NS8od277R8lJ~VIal1o7MG7I4O8HmxpTE1SEDIX84g9NK5jWZJ4bnfg894088DcOsO0Myg9SzGl-WxaW71pZNJ-T4rN6izN2yT3RV5OfZLpb9uLicIyxOFs83Dtz0rDFA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[{"id":20178621,"url":"https://s2.smu.edu/~camp/pubs/mmMoReEdge_PerCom_SmartEdge_2020.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356337"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation"><img alt="Research paper thumbnail of IMS2021 Project Connect: Connecting to Broaden Participation" class="work-thumbnail" src="https://attachments.academia-assets.com/85433103/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation">IMS2021 Project Connect: Connecting to Broaden Participation</a></div><div class="wp-workCard_item"><span>IEEE Microwave Magazine</span><span>, 2021</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="13343641aec8d44e5ebe33c8191de203" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433103,&quot;asset_id&quot;:78356337,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356337"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356337"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356337; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356337]").text(description); $(".js-view-count[data-work-id=78356337]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356337; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356337']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356337, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "13343641aec8d44e5ebe33c8191de203" } } $('.js-work-strip[data-work-id=78356337]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356337,"title":"IMS2021 Project Connect: Connecting to Broaden Participation","translated_title":"","metadata":{"publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"IEEE Microwave Magazine"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356337/IMS2021_Project_Connect_Connecting_to_Broaden_Participation","translated_internal_url":"","created_at":"2022-05-03T12:23:23.883-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433103,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433103/thumbnails/1.jpg","file_name":"09393991.pdf","download_url":"https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2021_Project_Connect_Connecting_to_Br.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433103/09393991-libre.pdf?1651606123=\u0026response-content-disposition=attachment%3B+filename%3DIMS2021_Project_Connect_Connecting_to_Br.pdf\u0026Expires=1732471281\u0026Signature=cb8H26yjPmEm7VGlUvs-t6RFi71-KB5tcFt1eTkhoaheuvi79FqBEiCMQWBLE-6iYU295UWmxUNOxjFIFMvt77Gyi-P-uS41OKW92sxLEFJ7YlBVQRjju3XrRSkw4eJBod8eTuLAaWIJQg6OZfIdFTuLXp3RGEw1qCokAEPR2S9O0D3GX6efRyCG3oE7FTPc5Exk8ZwaHMwemStIQpy6FJnPuF8Ve22PBrpDxZ9B4u0aPWqyyD2YVorhHOiiLni5~fUMcF5ivmh5-hmz-Jw5bxsjqN8S-paxrHdINJ05IvLTkLdNggvvhvETjPyV~jl2HfnegUKy~RYvE~QXP0O4KA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"IMS2021_Project_Connect_Connecting_to_Broaden_Participation","translated_slug":"","page_count":2,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433103,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433103/thumbnails/1.jpg","file_name":"09393991.pdf","download_url":"https://www.academia.edu/attachments/85433103/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2021_Project_Connect_Connecting_to_Br.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433103/09393991-libre.pdf?1651606123=\u0026response-content-disposition=attachment%3B+filename%3DIMS2021_Project_Connect_Connecting_to_Br.pdf\u0026Expires=1732471281\u0026Signature=cb8H26yjPmEm7VGlUvs-t6RFi71-KB5tcFt1eTkhoaheuvi79FqBEiCMQWBLE-6iYU295UWmxUNOxjFIFMvt77Gyi-P-uS41OKW92sxLEFJ7YlBVQRjju3XrRSkw4eJBod8eTuLAaWIJQg6OZfIdFTuLXp3RGEw1qCokAEPR2S9O0D3GX6efRyCG3oE7FTPc5Exk8ZwaHMwemStIQpy6FJnPuF8Ve22PBrpDxZ9B4u0aPWqyyD2YVorhHOiiLni5~fUMcF5ivmh5-hmz-Jw5bxsjqN8S-paxrHdINJ05IvLTkLdNggvvhvETjPyV~jl2HfnegUKy~RYvE~QXP0O4KA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[],"urls":[]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356336"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking"><img alt="Research paper thumbnail of A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking" class="work-thumbnail" src="https://attachments.academia-assets.com/85433102/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking">A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking</a></div><div class="wp-workCard_item"><span>2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Software Defined Networking (SDN) is an emerging architecture providing services on a priority ba...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="85cc92cd02c60942fcbfc520b3c4b216" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433102,&quot;asset_id&quot;:78356336,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356336"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356336"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356336; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356336]").text(description); $(".js-view-count[data-work-id=78356336]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356336; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356336']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356336, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "85cc92cd02c60942fcbfc520b3c4b216" } } $('.js-work-strip[data-work-id=78356336]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356336,"title":"A Bio-Inspired Framework to Mitigate DoS Attacks in Software Defined Networking","translated_title":"","metadata":{"abstract":"Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...","publisher":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"2019 10th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"},"translated_abstract":"Software Defined Networking (SDN) is an emerging architecture providing services on a priority basis for real-time communication, by pulling out the intelligence from the hardware and developing a better management system for effective networking. Denial of service (DoS) attacks pose a significant threat to SDN, as it can disable the genuine hosts and routers by exhausting their resources. It is thus vital to provide efficient traffic management, both at the data layer and the control layer, thereby becoming more responsive to dynamic network threats such as DoS. Existing DoS prevention and mitigation models for SDN are computationally expensive and are slow to react. This paper introduces a novel biologically inspired architecture for SDN to detect DoS flooding attacks. The proposed biologically inspired architecture utilizes the concepts of the human immune system to provide a robust solution against DoS attacks in SDNs. The two layer immune inspired framework, viz innate layer an...","internal_url":"https://www.academia.edu/78356336/A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking","translated_internal_url":"","created_at":"2022-05-03T12:23:23.749-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433102,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433102/thumbnails/1.jpg","file_name":"66615.pdf","download_url":"https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Bio_Inspired_Framework_to_Mitigate_DoS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433102/66615-libre.pdf?1651606122=\u0026response-content-disposition=attachment%3B+filename%3DA_Bio_Inspired_Framework_to_Mitigate_DoS.pdf\u0026Expires=1732471281\u0026Signature=V-BciBEW7hUIET1axy-MIKO25uBmS2jQ7FHcqM8mnai0KoPdGzuvdYCXjkg2NFJRcu4aoChuwb0YOn7N4y4K7huf2Y7GfiOqlGntLvM4miHGyopNUJlcwRj9v1WUNTXsxF0xlpGIkoSNrjYUwhwFIArJk8HyH7RFZaKHq9kizzopSY92jj2IyzoCBaOLVkBobEvIwq5c1zAvzvgb-5tolMtmYTHMxvVm0DGNqrFnEOiIrnkgWZivievXH~noMWNjHeOWYGLhhFNzdskrBxWWK13tr-o4PvkAvdcvWPq4tgUb62VDHU4WhjqG21w3KyRlSAwucIHJPX941kWT7ghzcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Bio_Inspired_Framework_to_Mitigate_DoS_Attacks_in_Software_Defined_Networking","translated_slug":"","page_count":2,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433102,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433102/thumbnails/1.jpg","file_name":"66615.pdf","download_url":"https://www.academia.edu/attachments/85433102/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Bio_Inspired_Framework_to_Mitigate_DoS.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433102/66615-libre.pdf?1651606122=\u0026response-content-disposition=attachment%3B+filename%3DA_Bio_Inspired_Framework_to_Mitigate_DoS.pdf\u0026Expires=1732471281\u0026Signature=V-BciBEW7hUIET1axy-MIKO25uBmS2jQ7FHcqM8mnai0KoPdGzuvdYCXjkg2NFJRcu4aoChuwb0YOn7N4y4K7huf2Y7GfiOqlGntLvM4miHGyopNUJlcwRj9v1WUNTXsxF0xlpGIkoSNrjYUwhwFIArJk8HyH7RFZaKHq9kizzopSY92jj2IyzoCBaOLVkBobEvIwq5c1zAvzvgb-5tolMtmYTHMxvVm0DGNqrFnEOiIrnkgWZivievXH~noMWNjHeOWYGLhhFNzdskrBxWWK13tr-o4PvkAvdcvWPq4tgUb62VDHU4WhjqG21w3KyRlSAwucIHJPX941kWT7ghzcQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":37747,"name":"OpenFlow","url":"https://www.academia.edu/Documents/in/OpenFlow"},{"id":193315,"name":"Software defined networking","url":"https://www.academia.edu/Documents/in/Software_defined_networking"}],"urls":[{"id":20178620,"url":"https://doi.org/10.1109/NTMS.2019.8763818"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356335"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356335/TangleCV"><img alt="Research paper thumbnail of TangleCV" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356335/TangleCV">TangleCV</a></div><div class="wp-workCard_item"><span>Proceedings of the ACM Workshop on Automotive Cybersecurity</span><span>, 2019</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Connected vehicles are designed to make informed safety-related decisions based on data/informati...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356335"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356335"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356335; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356335]").text(description); $(".js-view-count[data-work-id=78356335]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356335; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356335']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356335, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356335]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356335,"title":"TangleCV","translated_title":"","metadata":{"abstract":"Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.","publisher":"ACM","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"Proceedings of the ACM Workshop on Automotive Cybersecurity"},"translated_abstract":"Connected vehicles are designed to make informed safety-related decisions based on data/information they receive from various on-board sensors and other vehicles in the vicinity. However, attacks directed towards on-board sensors and network attacks on the wireless communication channels can adversely impact the correctness and integrity of this information and present a grave security and safety challenge to connected vehicles. Current centralized security solutions are not a good fit as they do not scale well and are unable to validate the correctness of the shared data. Decentralizing security provisioning in connected vehicles by means of the upcoming blockchain technology is an interesting alternative for overcoming these limitations. However, current permission-less linear hash-chain based blockchain solutions have low transaction throughput, high computational cost and are resource intensive, thereby making their adoption for designing a security solution for resource constrained connected cars difficult. In this paper, we present TangleCV, a decentralized technique for secure message sharing and recording for connected vehicles using an approach like Tangle, a directed acyclic graph based blockchain architecture. We introduce an initial design of TangleCV and describe how it provides improved efficiency and scalability against information correctness and information integrity attacks in connected vehicle networks.","internal_url":"https://www.academia.edu/78356335/TangleCV","translated_internal_url":"","created_at":"2022-05-03T12:23:23.600-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"TangleCV","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178619,"url":"https://dl.acm.org/doi/pdf/10.1145/3309171.3309177"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356334"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices"><img alt="Research paper thumbnail of Deep learning-based security schemes for implantable medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices">Deep learning-based security schemes for implantable medical devices</a></div><div class="wp-workCard_item"><span>Energy Efficiency of Medical Devices and Healthcare Applications</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns i...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356334"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356334"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356334; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356334]").text(description); $(".js-view-count[data-work-id=78356334]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356334; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356334']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356334, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356334]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356334,"title":"Deep learning-based security schemes for implantable medical devices","translated_title":"","metadata":{"abstract":"Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.","publisher":"Elsevier","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Energy Efficiency of Medical Devices and Healthcare Applications"},"translated_abstract":"Abstract Deep learning is a subset of machine learning, which learns from the inherent patterns in the data for solving a diverse set of problems such as recognition, classification, and segmentation. It is a neural network-based, biologically inspired model, which has benefitted health, transport, energy, and public safety sectors in diverse ways. It has enabled new potential innovations in these domains, including data analytics, security, treatment, and diagnostics. Intelligent healthcare enables medical specialists to remotely monitor patients, thereby leading to an increase in the popularity of this field in recent years. Doctors are able to provide a better quality of treatment to their patients through a variety of implanted medical devices. The addition of communication ability enables such devices to talk with one another and to the Internet, which leads to the concept of the Internet of Things applied for medical devices. Such devices now have 802.11x or LTE chips on, with the goal that they can converse with one another, in addition to the conventional jobs of sensing and actuating. However, on the other end, the addition of wireless connectivity now makes these devices too prone to be hacked, leading sometimes to lethal events for patients if they are not mitigated. This chapter focuses on how deep learning can be utilized to make these devices more secure while addressing the tradeoffs related to constrained computations, and energy available on such devices.","internal_url":"https://www.academia.edu/78356334/Deep_learning_based_security_schemes_for_implantable_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:23.416-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Deep_learning_based_security_schemes_for_implantable_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1131312,"name":"Academic","url":"https://www.academia.edu/Documents/in/Academic"}],"urls":[{"id":20178618,"url":"https://api.elsevier.com/content/article/PII:B9780128190456000066?httpAccept=text/xml"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356332"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations"><img alt="Research paper thumbnail of Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations">Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations</a></div><div class="wp-workCard_item"><span>2021 IEEE International Conference on Communications Workshops (ICC Workshops)</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic o...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356332"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356332"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356332; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356332]").text(description); $(".js-view-count[data-work-id=78356332]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356332; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356332']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356332, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356332]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356332,"title":"Using Control Theory and Bayesian Reinforcement Learning for Policy Management in Pandemic Situations","translated_title":"","metadata":{"abstract":"As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.","publisher":"IEEE","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"2021 IEEE International Conference on Communications Workshops (ICC Workshops)"},"translated_abstract":"As engineers and scientists, it is our responsibility to learn lessons from the recent pandemic outbreak and see how public health policies can be effectively managed to reduce the severe loss of lives and minimize the impact on people’s livelihood. Non-pharmaceutical interventions, such as in-place sheltering and social distancing, are typically introduced to slow the spread (flatten the curve) and reverse the growth of the virus. However, such approaches have the unintended consequences of causing economic activities to plummet and bringing local businesses to a standstill, thereby putting millions of jobs at risk. City administrators have generally resorted to an open loop, belief-based decision-making process, thereby struggling to manage (identify and enforce) timely and optimal policies. To overcome this challenge, this position paper explores a systematically designed, feedback-based strategy, to modulate parameters that control suppression and mitigation. Our work leverages advances in Bayesian Reinforcement Learning algorithms and known techniques in control theory, to stabilize and diminish the rate of propagation in pandemic situations. This paper discusses how offline exploitation using pre-trigger data, online exploration using observations from the environment, and a careful orchestration between the two using granular control of multiple on-off control signals can be used to modulate policy enforcement based on established metrics, such as reproduction number.","internal_url":"https://www.academia.edu/78356332/Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations","translated_internal_url":"","created_at":"2022-05-03T12:23:23.274-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Using_Control_Theory_and_Bayesian_Reinforcement_Learning_for_Policy_Management_in_Pandemic_Situations","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":1688,"name":"Reinforcement Learning","url":"https://www.academia.edu/Documents/in/Reinforcement_Learning"}],"urls":[{"id":20178617,"url":"http://xplorestaging.ieee.org/ielx7/9473476/9473480/09473604.pdf?arnumber=9473604"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356331"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach"><img alt="Research paper thumbnail of Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach">Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach</a></div><div class="wp-workCard_item"><span>Neural Computing and Applications</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Athletes represent the apex of physical capacity filling in a social picture of performance and b...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356331"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356331"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356331; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356331]").text(description); $(".js-view-count[data-work-id=78356331]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356331; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356331']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356331, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356331]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356331,"title":"Neuro-fuzzy analytics in athlete development (NueroFATH): a machine learning approach","translated_title":"","metadata":{"abstract":"Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.","publisher":"Springer Science and Business Media LLC","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"Neural Computing and Applications"},"translated_abstract":"Athletes represent the apex of physical capacity filling in a social picture of performance and build. In light of the fundamental contrasts in athletic capacities required for different games, each game demands an alternate body type standard. Because of the decent variety of these body types, each can have an altogether different body standard. Nowadays, a large number of athletes participate in assessments and a large number of human hours are spent on playing out these assessments every year. These assessments are performed to check the physical strength of athletes and evaluate them for different games. This paper presents a machine learning approach to the physical assessment of athletes known as NueroFATH. The proposed NueroFATH approach relies on neuro-fuzzy analytics that involves the deployment of neural networks and fuzzy c-means techniques to predict the athletes for the potential of winning medals. This can be achieved using athletes’ physical assessment parameters. The goal of this study is not only to identify the athletes based on which group they fall into (gold/silver/bronze), but also to understand which physical characteristic is important to identify them and categorize them in a medal group. It was determined that features, namely height, body mass, body mass index, 40 m and vertical jump are the most important for achieving 98.40% accuracy for athletes to classify them in the gold category when they are in the bronze category. Unsupervised learning showed that features, namely body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity have the highest variability. We can achieve upto 97.06% accuracy when features, i.e., body mass, body mass index, vertical jump, med ball, 40 m, peak oxygen content, peak height velocity were used.","internal_url":"https://www.academia.edu/78356331/Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach","translated_internal_url":"","created_at":"2022-05-03T12:23:23.118-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Neuro_fuzzy_analytics_in_athlete_development_NueroFATH_a_machine_learning_approach","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence"},{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning"}],"urls":[{"id":20178616,"url":"http://link.springer.com/content/pdf/10.1007/s00521-021-05704-5.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356330"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works"><img alt="Research paper thumbnail of IMS2020 Project Connect: Connectivity That Works" class="work-thumbnail" src="https://attachments.academia-assets.com/85433038/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works">IMS2020 Project Connect: Connectivity That Works</a></div><div class="wp-workCard_item"><span>IEEE Microwave Magazine</span><span>, 2020</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="0b0b6249c0ec5e60c3bfaedd58301019" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433038,&quot;asset_id&quot;:78356330,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356330"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356330"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356330; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356330]").text(description); $(".js-view-count[data-work-id=78356330]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356330; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356330']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356330, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "0b0b6249c0ec5e60c3bfaedd58301019" } } $('.js-work-strip[data-work-id=78356330]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356330,"title":"IMS2020 Project Connect: Connectivity That Works","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"IEEE Microwave Magazine"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356330/IMS2020_Project_Connect_Connectivity_That_Works","translated_internal_url":"","created_at":"2022-05-03T12:23:22.967-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433038,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433038/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433038/09052024-libre.pdf?1651606126=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=KoP9Ajz8fjthEfJJSrKddYetdJADF2ei99MBLqj0PR06VWhnyFVblCyj62UaT2sgy9k3hiBfob~oxE6v1B2FshIThPu1QC9PcempWAP~ZQXByxO-Xr7SdE5lfZGyqwBVIL4NO~1RMHFg7mZOpoAeHr8oEwdxyDXwU3~gDSSGQPy~RxyC7HmOgBhI0WBEhTaki9J0h9NAb3hYVRo1VunXErnWYG9qbUO25UsBgOnMWO4f~oxPNZ4yScivc-25AZStFmCYmdAW95qXGfeApvabOp1LktLHpDrVtyoi-QA0F1msvnAq9Zo9A4RdbsxTTXywqegnt37zmW~qZasdpQh2mQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"IMS2020_Project_Connect_Connectivity_That_Works","translated_slug":"","page_count":3,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433038,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433038/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433038/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4MSw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433038/09052024-libre.pdf?1651606126=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=KoP9Ajz8fjthEfJJSrKddYetdJADF2ei99MBLqj0PR06VWhnyFVblCyj62UaT2sgy9k3hiBfob~oxE6v1B2FshIThPu1QC9PcempWAP~ZQXByxO-Xr7SdE5lfZGyqwBVIL4NO~1RMHFg7mZOpoAeHr8oEwdxyDXwU3~gDSSGQPy~RxyC7HmOgBhI0WBEhTaki9J0h9NAb3hYVRo1VunXErnWYG9qbUO25UsBgOnMWO4f~oxPNZ4yScivc-25AZStFmCYmdAW95qXGfeApvabOp1LktLHpDrVtyoi-QA0F1msvnAq9Zo9A4RdbsxTTXywqegnt37zmW~qZasdpQh2mQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433039,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433039/thumbnails/1.jpg","file_name":"09052024.pdf","download_url":"https://www.academia.edu/attachments/85433039/download_file","bulk_download_file_name":"IMS2020_Project_Connect_Connectivity_Tha.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433039/09052024-libre.pdf?1651606125=\u0026response-content-disposition=attachment%3B+filename%3DIMS2020_Project_Connect_Connectivity_Tha.pdf\u0026Expires=1732471281\u0026Signature=Fh5HpGTQUOcsxpgZq-wXJJBT65XwfZiqlejO8ZZbXUASTU1VhYREUdrz~flEJhewfXOBKU8aEWg~tm0BllGYfwn~ZNMm~cjmKCx1T--cvyuR-vi6xiBCiNjdtutRd1ba25YgwImgGhrGoDR5EiFKPURHyMBZs5N0GqTu6gMFyMMsrg2SUqopvc7MGXL~0TGe9SVipQ0mbB07vMAd-O389jAIzPadXhZaAib4eiEAt4g~Ea2kFsI3U4oxQmGCAjKX31Ni03zoC7RWKTC28ckLX1NTb9L~H~oBq1aPICwudvLC~r6KvVV7Nldh8MM98KGYkcLmTBaDic8t2oYo5OljmA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"}],"urls":[{"id":20178615,"url":"http://xplorestaging.ieee.org/ielx7/6668/9052012/09052024.pdf?arnumber=9052024"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356329"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems"><img alt="Research paper thumbnail of A Survey of Blockchain Enabled Cyber-Physical Systems" class="work-thumbnail" src="https://attachments.academia-assets.com/85433035/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems">A Survey of Blockchain Enabled Cyber-Physical Systems</a></div><div class="wp-workCard_item"><span>Sensors</span><span>, 2020</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. ...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="daabaf3dda25d66dea04f6bed71068cb" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433035,&quot;asset_id&quot;:78356329,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356329"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356329"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356329; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356329]").text(description); $(".js-view-count[data-work-id=78356329]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356329; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356329']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356329, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "daabaf3dda25d66dea04f6bed71068cb" } } $('.js-work-strip[data-work-id=78356329]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356329,"title":"A Survey of Blockchain Enabled Cyber-Physical Systems","translated_title":"","metadata":{"abstract":"Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...","publisher":"MDPI AG","publication_date":{"day":null,"month":null,"year":2020,"errors":{}},"publication_name":"Sensors"},"translated_abstract":"Cyber-physical systems (CPS) is a setup that controls and monitors the physical world around us. The advancement of these systems needs to incorporate an unequivocal spotlight on making these systems efficient. Blockchains and their inherent combination of consensus algorithms, distributed data storage, and secure protocols can be utilized to build robustness and reliability in these systems. Blockchain is the underlying technology behind bitcoins and it provides a decentralized framework to validate transactions and ensure that they cannot be modified. By distributing the role of information validation across the network peers, blockchain eliminates the risks associated with a centralized architecture. It is the most secure validation mechanism that is efficient and enables the provision of financial services, thereby giving users more freedom and power. This upcoming technology provides internet users with the capability to create value and authenticate digital information. It has...","internal_url":"https://www.academia.edu/78356329/A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems","translated_internal_url":"","created_at":"2022-05-03T12:23:22.821-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433035,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433035/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433035/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=IPi8OQNbOtnAJun8OF~muCh1n446fEEOLCiRBgvNIqmNuNYBzb2Lxlwb8WZDkTfgYbO8wCw8DFYenTsQCaOEY~V3vd4FcvKTcwWmZ6~zytjLtD7A6D9uxVnLILBNye6hATF6PSFuov3o0jb5-vy-GbILozWH38X41pLvqbU0J02vorsdEKzXCWXsf4Fcy4Bq3eAXDIP47dZWdohjQ~FklSvLWT8hMt~zD2DGYSk9iUA58KIe3tlrDUNKSLgh0cNQOkK~yRsYA3Askea2rauP8HZGfZiA-bAnj-uO-Bht5VBpDpZ4p99H38g2RljBjYS-gdZvdPVFagbMFVb5U~akxQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Survey_of_Blockchain_Enabled_Cyber_Physical_Systems","translated_slug":"","page_count":28,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433035,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433035/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433035/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433035/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=IPi8OQNbOtnAJun8OF~muCh1n446fEEOLCiRBgvNIqmNuNYBzb2Lxlwb8WZDkTfgYbO8wCw8DFYenTsQCaOEY~V3vd4FcvKTcwWmZ6~zytjLtD7A6D9uxVnLILBNye6hATF6PSFuov3o0jb5-vy-GbILozWH38X41pLvqbU0J02vorsdEKzXCWXsf4Fcy4Bq3eAXDIP47dZWdohjQ~FklSvLWT8hMt~zD2DGYSk9iUA58KIe3tlrDUNKSLgh0cNQOkK~yRsYA3Askea2rauP8HZGfZiA-bAnj-uO-Bht5VBpDpZ4p99H38g2RljBjYS-gdZvdPVFagbMFVb5U~akxQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433036,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433036/thumbnails/1.jpg","file_name":"pdf.pdf","download_url":"https://www.academia.edu/attachments/85433036/download_file","bulk_download_file_name":"A_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433036/pdf-libre.pdf?1651606131=\u0026response-content-disposition=attachment%3B+filename%3DA_Survey_of_Blockchain_Enabled_Cyber_Phy.pdf\u0026Expires=1732471282\u0026Signature=Uyc8GObC3QBwIUZjKfmRCQJo9sRnOFKy3bPpUZIt50h02JlcLvYy2YmjW4rrR342d8~Q-7pUGQTZAwSQrQQe5cpAwAVjtj8kvvY8HdPoiAP4Ie8rIiJ-VhJrk1ntpVYfQXdfx0coeem3~OPHQoDNDjL3QDK0ZwrGaG~BkTqF8bCBhnOfkVYEoGjoAAPYospL81QRlROCAJy5yiCbzeNd9BWkzh0jVx7CYD0quBS31K9voTrEVFZufy1DVNKluX8KiygLXtxOHcq5t~1TaV0CB6iuOFd0JGS6t9PnphYUcfwbSQxL7YAPOw869mGElJp1-PwQxfcdA2sXNQ9jdKV9iA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":524,"name":"Analytical Chemistry","url":"https://www.academia.edu/Documents/in/Analytical_Chemistry"},{"id":26327,"name":"Medicine","url":"https://www.academia.edu/Documents/in/Medicine"},{"id":55405,"name":"Sensors","url":"https://www.academia.edu/Documents/in/Sensors"},{"id":442135,"name":"Cyber Physical System","url":"https://www.academia.edu/Documents/in/Cyber_Physical_System"},{"id":1237788,"name":"Electrical And Electronic Engineering","url":"https://www.academia.edu/Documents/in/Electrical_And_Electronic_Engineering"},{"id":2199949,"name":"Blockchain","url":"https://www.academia.edu/Documents/in/Blockchain"}],"urls":[{"id":20178614,"url":"https://www.mdpi.com/1424-8220/20/1/282/pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356328"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices"><img alt="Research paper thumbnail of Multi-layer security scheme for implantable medical devices" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices">Multi-layer security scheme for implantable medical devices</a></div><div class="wp-workCard_item"><span>Neural Computing and Applications</span><span>, 2018</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the area...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356328"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356328"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356328; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356328]").text(description); $(".js-view-count[data-work-id=78356328]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356328; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356328']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356328, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356328]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356328,"title":"Multi-layer security scheme for implantable medical devices","translated_title":"","metadata":{"abstract":"Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.","publisher":"Springer Science and Business Media LLC","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"Neural Computing and Applications"},"translated_abstract":"Internet of Medical Things (IoMTs) is fast emerging, thereby fostering rapid advances in the areas of sensing, actuation and connectivity to significantly improve the quality and accessibility of health care for everyone. Implantable medical device (IMD) is an example of such an IoMT-enabled device. IMDs treat the patient’s health and give a mechanism to provide regular remote monitoring to the healthcare providers. However, the current wireless communication channels can curb the security and privacy of these devices by allowing an attacker to interfere with both the data and communication. The privacy and security breaches in IMDs have thereby alarmed both the health providers and government agencies. Ensuring security of these small devices is a vital task to prevent severe health consequences to the bearer. The attacks can range from system to infrastructure levels where both the software and hardware of the IMD are compromised. In the recent years, biometric and cryptographic approaches to authentication, machine learning approaches to anomaly detection and external wearable devices for wireless communication protection have been proposed. However, the existing solutions for wireless medical devices are either heavy for memory constrained devices or require additional devices to be worn. To treat the present situation, there is a requirement to facilitate effective and secure data communication by introducing policies that will incentivize the development of security techniques. This paper proposes a novel electrocardiogram authentication scheme which uses Legendre approximation coupled with multi-layer perceptron model for providing three levels of security for data, network and application levels. The proposed model can reach up to 99.99% testing accuracy in identifying the authorized personnel even with 5 coefficients.","internal_url":"https://www.academia.edu/78356328/Multi_layer_security_scheme_for_implantable_medical_devices","translated_internal_url":"","created_at":"2022-05-03T12:23:22.646-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"Multi_layer_security_scheme_for_implantable_medical_devices","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science"},{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"}],"urls":[{"id":20178613,"url":"http://link.springer.com/content/pdf/10.1007/s00521-018-3819-0.pdf"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356327"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment"><img alt="Research paper thumbnail of Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment" class="work-thumbnail" src="https://attachments.academia-assets.com/85433037/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment">Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="9fd68528b76da12122de5efe797a0437" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433037,&quot;asset_id&quot;:78356327,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356327"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356327"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356327; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356327]").text(description); $(".js-view-count[data-work-id=78356327]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356327; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356327']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356327, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "9fd68528b76da12122de5efe797a0437" } } $('.js-work-strip[data-work-id=78356327]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356327,"title":"Multi-Layer Perceptron Model on Chip for Secure Diabetic Treatment","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","grobid_abstract":"Diabetic patients use therapy from the insulin pump, a type of implantable medical device, for the infusion of insulin to control blood glucose level. While these devices offer many clinical benefits, there has been a recent increase in the number of cases, wherein, the wireless communication channel of such devices has been compromised. This not only causes the device to malfunction but also potentially threatens the patient's life. In this paper, a neural networks-based multi-layer perceptron model was designed for real-time medical device security. Machine learning algorithms are among the most effective and broadly utilized systems for classification, identification, and segmentation. Although they are effective, they are both computationally and memory intensive, making them hard to be deployed on low-power embedded frameworks. In this paper, we present an on-chip neural system network for securing diabetic treatment. The model achieved 98.1% accuracy in classifying fake versus genuine glucose measurements. The proposed model was comparatively evaluated with a linear support vector machine which achieved only 90.17% accuracy with negligible precision and recall. Moreover, the proposal estimates the reliability of the framework through the use of the Bayesian network. The proposed approach enhances the reliability of the overall framework by 18% when only one device is secured, and over 90% when all devices are secured. INDEX TERMS Security, machine learning, insulin pumps, deep learning, implantable medical devices.","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"IEEE Access","grobid_abstract_attachment_id":85433037},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356327/Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment","translated_internal_url":"","created_at":"2022-05-03T12:23:22.497-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433037,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433037/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433037/08409455-libre.pdf?1651606133=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=KO86pIIs0iBryrielntJEbdaC99RwWfZ-sK--6aI7irg95CGSa0tTP2r3Vwr1jPSGTgQarUoRAu6ofb8zRvGO10jbydLYZt5oESdvuLCNQWVBfinmxxpoUZJQwFfDprYQlCOfwLJ98EHV98hYgT4kXeklHG6Vq0B67nEgEQKrPq0FdHdnk0JEkov6-X1iqOZCsY~oeSFTwGh1eOHSZRSR7SmqfoBxxg~V~G7lCaIErlpkW-14XflCyQ-OLCaJ1th1E3XrL~LJ84vBvKRvDLzjnJCQXKdN1ziJz9r8217t0Da8ViEPdYoD71Mh4ofj22t3To50V8Hf8nDN0uRltc~NA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"Multi_Layer_Perceptron_Model_on_Chip_for_Secure_Diabetic_Treatment","translated_slug":"","page_count":13,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433037,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433037/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433037/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433037/08409455-libre.pdf?1651606133=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=KO86pIIs0iBryrielntJEbdaC99RwWfZ-sK--6aI7irg95CGSa0tTP2r3Vwr1jPSGTgQarUoRAu6ofb8zRvGO10jbydLYZt5oESdvuLCNQWVBfinmxxpoUZJQwFfDprYQlCOfwLJ98EHV98hYgT4kXeklHG6Vq0B67nEgEQKrPq0FdHdnk0JEkov6-X1iqOZCsY~oeSFTwGh1eOHSZRSR7SmqfoBxxg~V~G7lCaIErlpkW-14XflCyQ-OLCaJ1th1E3XrL~LJ84vBvKRvDLzjnJCQXKdN1ziJz9r8217t0Da8ViEPdYoD71Mh4ofj22t3To50V8Hf8nDN0uRltc~NA__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433040,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433040/thumbnails/1.jpg","file_name":"08409455.pdf","download_url":"https://www.academia.edu/attachments/85433040/download_file","bulk_download_file_name":"Multi_Layer_Perceptron_Model_on_Chip_for.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433040/08409455-libre.pdf?1651606132=\u0026response-content-disposition=attachment%3B+filename%3DMulti_Layer_Perceptron_Model_on_Chip_for.pdf\u0026Expires=1732471282\u0026Signature=dF9fw6Kz4iTUxIXZpSysTiDncjVHrhU6B71l5KNbl1oLDPxV5Hc6DJULmCBA9E0wKoMLRlK2szpvg51HpYbqIRMPBGfOXScw0WFUigX1-SMaBZPTmine4wCc-c--~PIGjmhNElUeth72La6NnTJpvCQBFyPyhfzk2YeOuzvQDzR2z581NnSaf0UsOImErAcioLMwBOryDC3RyHPdeE8jWMR7PC3cmb0OeW-NrjvmKENc5vw6gjX-WeKmkUtrf~SyqWT9HX-RorG9~fR4JlWC1VKJOy2fMYdvV8SUJy4U2hCJ4EN7isOXrcS~ybxUNyCWzpBy1B4jpJzQQ9Ek2ft4SQ__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":238159,"name":"Multilayer Perceptron","url":"https://www.academia.edu/Documents/in/Multilayer_Perceptron"},{"id":1004747,"name":"Perceptron","url":"https://www.academia.edu/Documents/in/Perceptron"},{"id":1211304,"name":"Artificial Neural Network","url":"https://www.academia.edu/Documents/in/Artificial_Neural_Network"}],"urls":[{"id":20178612,"url":"http://xplorestaging.ieee.org/ielx7/6287639/8274985/08409455.pdf?arnumber=8409455"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356326"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants"><img alt="Research paper thumbnail of A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants" class="work-thumbnail" src="https://attachments.academia-assets.com/85433034/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants">A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2019</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="053726766b38da2094f1d73ea23d7b5f" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433034,&quot;asset_id&quot;:78356326,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356326"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356326"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356326; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356326]").text(description); $(".js-view-count[data-work-id=78356326]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356326; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356326']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356326, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "053726766b38da2094f1d73ea23d7b5f" } } $('.js-work-strip[data-work-id=78356326]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356326,"title":"A Novel Deep Learning Strategy for Classifying Different Attack Patterns for Deep Brain Implants","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2019,"errors":{}},"publication_name":"IEEE Access"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356326/A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants","translated_internal_url":"","created_at":"2022-05-03T12:23:22.330-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433034,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433034/thumbnails/1.jpg","file_name":"08645788.pdf","download_url":"https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Deep_Learning_Strategy_for_Class.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433034/08645788-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Deep_Learning_Strategy_for_Class.pdf\u0026Expires=1732471282\u0026Signature=MeA5T6FINEBoqIAwlgTNuI070icN4fOLmoD9qXRGjnJMvl-dr5ZXgyBRR5itHIGK19J28y7AXwY2bKdVya6LM4D2I~EBtQElqrhgSjq9HhR5c9bn6i0ULJ5lsgfRPGgMiX-MeZVcTCVt0meLa3P9Y6Qrzbp5UUZ8FgklfB4GRJnAVxm7vmSHxp90qwj2rMvM50c~lkO0qdxge~PHBJEKJ8fzNGXoPLB~O6DUgrZCNWAr-nUO6T2qzLQFdhzsZ8O~-v0gC-eg5u-2~kCyeRu5CshaU-R1XehH~Phu91FnJ6pEhkfBP9YA-dvlMhmiJ~UAet6aKPOpokpdDz9xNhC48w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Novel_Deep_Learning_Strategy_for_Classifying_Different_Attack_Patterns_for_Deep_Brain_Implants","translated_slug":"","page_count":10,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433034,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433034/thumbnails/1.jpg","file_name":"08645788.pdf","download_url":"https://www.academia.edu/attachments/85433034/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Novel_Deep_Learning_Strategy_for_Class.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433034/08645788-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Novel_Deep_Learning_Strategy_for_Class.pdf\u0026Expires=1732471282\u0026Signature=MeA5T6FINEBoqIAwlgTNuI070icN4fOLmoD9qXRGjnJMvl-dr5ZXgyBRR5itHIGK19J28y7AXwY2bKdVya6LM4D2I~EBtQElqrhgSjq9HhR5c9bn6i0ULJ5lsgfRPGgMiX-MeZVcTCVt0meLa3P9Y6Qrzbp5UUZ8FgklfB4GRJnAVxm7vmSHxp90qwj2rMvM50c~lkO0qdxge~PHBJEKJ8fzNGXoPLB~O6DUgrZCNWAr-nUO6T2qzLQFdhzsZ8O~-v0gC-eg5u-2~kCyeRu5CshaU-R1XehH~Phu91FnJ6pEhkfBP9YA-dvlMhmiJ~UAet6aKPOpokpdDz9xNhC48w__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178611,"url":"http://xplorestaging.ieee.org/ielx7/6287639/6514899/08645788.pdf?arnumber=8645788"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356325"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables"><img alt="Research paper thumbnail of A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables" class="work-thumbnail" src="https://attachments.academia-assets.com/85433033/thumbnails/1.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables">A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables</a></div><div class="wp-workCard_item"><span>IEEE Access</span><span>, 2018</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><a id="c4a2003c75b4ad920ddf14e8566fda61" class="wp-workCard--action" rel="nofollow" data-click-track="profile-work-strip-download" data-download="{&quot;attachment_id&quot;:85433033,&quot;asset_id&quot;:78356325,&quot;asset_type&quot;:&quot;Work&quot;,&quot;button_location&quot;:&quot;profile&quot;}" href="https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&s=profile"><span><i class="fa fa-arrow-down"></i></span><span>Download</span></a><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356325"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356325"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356325; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356325]").text(description); $(".js-view-count[data-work-id=78356325]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356325; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356325']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356325, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (true){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "c4a2003c75b4ad920ddf14e8566fda61" } } $('.js-work-strip[data-work-id=78356325]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356325,"title":"A Practical Framework for Preventing Distracted Pedestrian-related Incidents using Wrist Wearables","translated_title":"","metadata":{"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","publication_date":{"day":null,"month":null,"year":2018,"errors":{}},"publication_name":"IEEE Access"},"translated_abstract":null,"internal_url":"https://www.academia.edu/78356325/A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables","translated_internal_url":"","created_at":"2022-05-03T12:23:22.083-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[{"id":85433033,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433033/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433033/08555979-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=UgNvhmN4V8C5AY~3nr2-scUNwubI4mcWffe~G1S3rkFQWtWm3W8TJZhH2BdHvPb6ov1BoMY0em1jJl05gg37ZHsYIc7-JEFaIaXYFPV7qwsLmxYBDUKQ-L8wrlgvpXlQTeIyKY1O8aJPVxNSWJqLhzgbMMdkSpHMBZ2Shi~zYQ66tgvLmjXRef4myrIxC6McjP6ycovi0andNMtyAMwtoC15tMFvxGJ3Og78Z~QoSMemieB0jkOulAqsajq8bbnJWnG9paC51MsfXPQ1Mn1no6HP6GWl-CccxYzJdzN4HNkImWg4uEhQvOx1hWFzEd6Cxn6yWWPuwpCoaaQ1tzZNvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"slug":"A_Practical_Framework_for_Preventing_Distracted_Pedestrian_related_Incidents_using_Wrist_Wearables","translated_slug":"","page_count":15,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[{"id":85433033,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433033/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433033/download_file?st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&st=MTczMjQ2NzY4Miw4LjIyMi4yMDguMTQ2&","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433033/08555979-libre.pdf?1651606128=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=UgNvhmN4V8C5AY~3nr2-scUNwubI4mcWffe~G1S3rkFQWtWm3W8TJZhH2BdHvPb6ov1BoMY0em1jJl05gg37ZHsYIc7-JEFaIaXYFPV7qwsLmxYBDUKQ-L8wrlgvpXlQTeIyKY1O8aJPVxNSWJqLhzgbMMdkSpHMBZ2Shi~zYQ66tgvLmjXRef4myrIxC6McjP6ycovi0andNMtyAMwtoC15tMFvxGJ3Og78Z~QoSMemieB0jkOulAqsajq8bbnJWnG9paC51MsfXPQ1Mn1no6HP6GWl-CccxYzJdzN4HNkImWg4uEhQvOx1hWFzEd6Cxn6yWWPuwpCoaaQ1tzZNvw__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"},{"id":85433032,"title":"","file_type":"pdf","scribd_thumbnail_url":"https://attachments.academia-assets.com/85433032/thumbnails/1.jpg","file_name":"08555979.pdf","download_url":"https://www.academia.edu/attachments/85433032/download_file","bulk_download_file_name":"A_Practical_Framework_for_Preventing_Dis.pdf","bulk_download_url":"https://d1wqtxts1xzle7.cloudfront.net/85433032/08555979-libre.pdf?1651606129=\u0026response-content-disposition=attachment%3B+filename%3DA_Practical_Framework_for_Preventing_Dis.pdf\u0026Expires=1732471282\u0026Signature=Mf5vHuKcX5lEOFdn-HmViOVaNKoVc~HmRsYLnTmNkL6PdlAYF2jjRN3GVsLPsfoqQe30EaY4snkCoKwupwaJaGhJAWNrWd4zH0B4MF-sj7xP11KCYjJvB5tNOWVxEUQZXHpkPpf~kioS3nwHTQPT5M1sDInIr0JDhN1gdLxkxk5dXgv7XBSNuEDgciM01sLtvd~o1QbloTnY5NCFlYQc8~VaoWd6h-lcIkZpeWAAcA6ry5go9VHh4fecdHRQwYE1RSxQju643Lqt~DphnzAy-InLRW82QpihMo84zI2PyrSF1BerbQDBEPkdmfBNxmKcH0OpuaaA5Zr6N8BYCS3rkg__\u0026Key-Pair-Id=APKAJLOHF5GGSLRBV4ZA"}],"research_interests":[{"id":422,"name":"Computer Science","url":"https://www.academia.edu/Documents/in/Computer_Science"},{"id":111436,"name":"IEEE","url":"https://www.academia.edu/Documents/in/IEEE"}],"urls":[{"id":20178610,"url":"http://xplorestaging.ieee.org/ielx7/6287639/6514899/08555979.pdf?arnumber=8555979"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> <div class="js-work-strip profile--work_container" data-work-id="78356323"><div class="profile--work_thumbnail hidden-xs"><a class="js-work-strip-work-link" data-click-track="profile-work-strip-thumbnail" href="https://www.academia.edu/78356323/TangleCV"><img alt="Research paper thumbnail of TangleCV" class="work-thumbnail" src="https://a.academia-assets.com/images/blank-paper.jpg" /></a></div><div class="wp-workCard wp-workCard_itemContainer"><div class="wp-workCard_item wp-workCard--title"><a class="js-work-strip-work-link text-gray-darker" data-click-track="profile-work-strip-title" href="https://www.academia.edu/78356323/TangleCV">TangleCV</a></div><div class="wp-workCard_item"><span>ACM Transactions on Cyber-Physical Systems</span><span>, 2021</span></div><div class="wp-workCard_item"><span class="js-work-more-abstract-truncated">Connected vehicles are set to define the future of transportation; however, this upcoming technol...</span><a class="js-work-more-abstract" data-broccoli-component="work_strip.more_abstract" data-click-track="profile-work-strip-more-abstract" href="javascript:;"><span> more </span><span><i class="fa fa-caret-down"></i></span></a><span class="js-work-more-abstract-untruncated hidden">Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...</span></div><div class="wp-workCard_item wp-workCard--actions"><span class="work-strip-bookmark-button-container"></span><span class="wp-workCard--action visible-if-viewed-by-owner inline-block" style="display: none;"><span class="js-profile-work-strip-edit-button-wrapper profile-work-strip-edit-button-wrapper" data-work-id="78356323"><a class="js-profile-work-strip-edit-button" tabindex="0"><span><i class="fa fa-pencil"></i></span><span>Edit</span></a></span></span><span id="work-strip-rankings-button-container"></span></div><div class="wp-workCard_item wp-workCard--stats"><span><span><span class="js-view-count view-count u-mr2x" data-work-id="78356323"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 78356323; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=78356323]").text(description); $(".js-view-count[data-work-id=78356323]").attr('title', description).tooltip(); }); });</script></span></span><span><span class="percentile-widget hidden"><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 78356323; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-work-strip[data-work-id='78356323']"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></span><span><script>$(function() { new Works.PaperRankView({ workId: 78356323, container: "", }); });</script></span></div><div id="work-strip-premium-row-container"></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/work_edit-ad038b8c047c1a8d4fa01b402d530ff93c45fee2137a149a4a5398bc8ad67560.js"], function() { // from javascript_helper.rb var dispatcherData = {} if (false){ window.WowProfile.dispatcher = window.WowProfile.dispatcher || _.clone(Backbone.Events); dispatcherData = { dispatcher: window.WowProfile.dispatcher, downloadLinkId: "-1" } } $('.js-work-strip[data-work-id=78356323]').each(function() { if (!$(this).data('initialized')) { new WowProfile.WorkStripView({ el: this, workJSON: {"id":78356323,"title":"TangleCV","translated_title":"","metadata":{"abstract":"Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...","publisher":"Association for Computing Machinery (ACM)","publication_date":{"day":null,"month":null,"year":2021,"errors":{}},"publication_name":"ACM Transactions on Cyber-Physical Systems"},"translated_abstract":"Connected vehicles are set to define the future of transportation; however, this upcoming technology continues to be plagued with serious security risks. If these risks are not addressed in a timely fashion, then they could threaten the adoption and success of this promising technology. This article deals with a specific class of attacks in connected vehicles, namely tampering attacks caused due to compromise of on-board sensors. Current centralized solutions that employ trusted infrastructure to protect against adversarial manipulation of information cannot validate the correctness of the shared data and do not scale well. To overcome these issues, decentralized protection mechanisms by means of blockchain technology have emerged as a promising research direction. However, current permission-less, linear blockchain-based solutions have low transaction performance and high computational cost, thereby making it difficult to adopt them for security in connected vehicles. In this artic...","internal_url":"https://www.academia.edu/78356323/TangleCV","translated_internal_url":"","created_at":"2022-05-03T12:23:16.055-07:00","preview_url":null,"current_user_can_edit":null,"current_user_is_owner":null,"owner_id":26678070,"coauthors_can_edit":true,"document_type":"paper","co_author_tags":[],"downloadable_attachments":[],"slug":"TangleCV","translated_slug":"","page_count":null,"language":"en","content_type":"Work","owner":{"id":26678070,"first_name":"Heena","middle_initials":"","last_name":"Rathore","page_name":"HeenaRathore","domain_name":"iitj","created_at":"2015-02-23T13:40:17.279-08:00","display_name":"Heena Rathore","url":"https://iitj.academia.edu/HeenaRathore"},"attachments":[],"research_interests":[],"urls":[{"id":20178608,"url":"https://dl.acm.org/doi/pdf/10.1145/3404500"}]}, dispatcherData: dispatcherData }); $(this).data('initialized', true); } }); $a.trackClickSource(".js-work-strip-work-link", "profile_work_strip") }); </script> </div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js","https://a.academia-assets.com/assets/google_contacts-0dfb882d836b94dbcb4a2d123d6933fc9533eda5be911641f20b4eb428429600.js"], function() { // from javascript_helper.rb $('.js-google-connect-button').click(function(e) { e.preventDefault(); GoogleContacts.authorize_and_show_contacts(); Aedu.Dismissibles.recordClickthrough("WowProfileImportContactsPrompt"); }); $('.js-update-biography-button').click(function(e) { e.preventDefault(); Aedu.Dismissibles.recordClickthrough("UpdateUserBiographyPrompt"); $.ajax({ url: $r.api_v0_profiles_update_about_path({ subdomain_param: 'api', about: "", }), type: 'PUT', success: function(response) { location.reload(); } }); }); $('.js-work-creator-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_document_path({ source: encodeURIComponent(""), }); }); $('.js-video-upload-button').click(function (e) { e.preventDefault(); window.location = $r.upload_funnel_video_path({ source: encodeURIComponent(""), }); }); $('.js-do-this-later-button').click(function() { $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("WowProfileImportContactsPrompt"); }); $('.js-update-biography-do-this-later-button').click(function(){ $(this).closest('.js-profile-nag-panel').remove(); Aedu.Dismissibles.recordDismissal("UpdateUserBiographyPrompt"); }); $('.wow-profile-mentions-upsell--close').click(function(){ $('.wow-profile-mentions-upsell--panel').hide(); Aedu.Dismissibles.recordDismissal("WowProfileMentionsUpsell"); }); $('.wow-profile-mentions-upsell--button').click(function(){ Aedu.Dismissibles.recordClickthrough("WowProfileMentionsUpsell"); }); new WowProfile.SocialRedesignUserWorks({ initialWorksOffset: 20, allWorksOffset: 20, maxSections: 1 }) }); </script> </div></div></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/wow_profile_edit-5ea339ee107c863779f560dd7275595239fed73f1a13d279d2b599a28c0ecd33.js","https://a.academia-assets.com/assets/add_coauthor-22174b608f9cb871d03443cafa7feac496fb50d7df2d66a53f5ee3c04ba67f53.js","https://a.academia-assets.com/assets/tab-dcac0130902f0cc2d8cb403714dd47454f11fc6fb0e99ae6a0827b06613abc20.js","https://a.academia-assets.com/assets/wow_profile-f77ea15d77ce96025a6048a514272ad8becbad23c641fc2b3bd6e24ca6ff1932.js"], function() { // from javascript_helper.rb window.ae = window.ae || {}; window.ae.WowProfile = window.ae.WowProfile || {}; if(Aedu.User.current && Aedu.User.current.id === $viewedUser.id) { window.ae.WowProfile.current_user_edit = {}; new WowProfileEdit.EditUploadView({ el: '.js-edit-upload-button-wrapper', model: window.$current_user, }); new AddCoauthor.AddCoauthorsController(); } var userInfoView = new WowProfile.SocialRedesignUserInfo({ recaptcha_key: "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB" }); WowProfile.router = new WowProfile.Router({ userInfoView: userInfoView }); Backbone.history.start({ pushState: true, root: "/" + $viewedUser.page_name }); new WowProfile.UserWorksNav() }); </script> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "837d7bc5df6cb4e830dcd4d522af2d14db193c1366da90ef3a1e0a34d78cabfd", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="NICKjpCIS11o7Q8RXB3PL5ztfG7VVoSgSV4H+8HU6q8O0ujCV5hs7bp10Wj4JacuqYsVH82wEKlFyON4PJpqOQ==" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://iitj.academia.edu/HeenaRathore" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input name="utf8" type="hidden" value="&#x2713;" autocomplete="off" /><input type="hidden" name="authenticity_token" value="yreY3gX519L3AF6c0lNRpqYcD+V4+kiPMz+Vj7wM0cfw5fqSwunwYiWYgOV2azmnk3pmlGAc3IY/qXEMQUJRUQ==" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a rel="nofollow" href="https://medium.com/academia">Blog</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2024</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10