Ajay Kaushik


NameAjay Kaushik
Job titleLecturer in Computer Science
Research instituteCollege of Science and Engineering
ORCIDhttps://orcid.org/0000-0001-7163-2337

Research outputs

A Sign Language Recognition System Using Artificial Intelligence

Dahiya, R., Dwivedi, N., Singh Rathore, A., Kalra, M., Chauhan, P., Ajay Kaushik and Sharma, R. 2024. A Sign Language Recognition System Using Artificial Intelligence. ISBM: World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_7

An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis

Anil Tak, Sarthak Jain, B. N. V. Gnandeep, Mradul, Nikhil Kaushik, Yogendra, Ajay Kaushik, Ritu Sharma and Aman 2024. An Integrated Web Based and Application Programming Interfaces for Disease Prediction Through Self Diagnosis. World Conference on Information Systems for Business Management. Springer. https://doi.org/10.1007/978-981-99-8612-5_8

Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm

Parashar, K., Ajay Kaushik, Sharma, R. and Aman 2024. Breast Tumor Prediction Using SVM with Rain Fall Optimisation Algorithm. in: So In, C., Londhe, N. D., Bhatt, N. and Kitsing, M. (ed.) Information Systems for Intelligent Systems: Proceedings of ISBM 2023 Singapore Springer. pp. 167-180

A novel intrusion detection system for internet of things devices and data

Kaushik, A. and Al-Raweshidy, H. 2023. A novel intrusion detection system for internet of things devices and data. Wireless Networks. 30, pp. 285-294. https://doi.org/10.1007/s11276-023-03435-0

Post Quantum Public and Private Key Cryptography Optimized for IoT Security

Ajay Kaushik, Lakshmi Sai Srikar Vadlamani, Mohammed Mohsin Hussain, Milind Sahay, Rahul Singh, Ananya Komal Singh, S. Indu, Puneet Goswami and Nalliyanna Goundar Veerappan Kousik 2022. Post Quantum Public and Private Key Cryptography Optimized for IoT Security. Wireless Personal Communications. 129, pp. 893-909. https://doi.org/10.1007/s11277-022-10162-w

A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems

Ajay Kaushik and Raj, S. V. 2022. A Real-Time Intrusion Detection System for Bio-Medical and Cyber-Physical Systems. The 5th International Conference on Research in Humanities. Diamond Scientific Publishing . https://doi.org/10.33422/5th.icrhconf.2022.08.200

A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems

Kaushik, A. and Al-Raweshidy, H. 2022. A Hybrid Latency- and Power-Aware Approach for Beyond Fifth-Generation Internet-of-Things Edge Systems. IEEE Access. 10, pp. 87974 - 87989. https://doi.org/10.1109/access.2022.3200035

Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices

Rahul Singh, Mohammed Mohsin Hussain, Milind Sahay, S. Indu, Ajay Kaushik and Alok Kumar Singh 2020. Loki: A Lightweight LWE Method with Rogue Bits for Quantum Security in IoT Devices. International Conference on Information and Communication Technology for Intelligent Systems. Springer. https://doi.org/10.1007/978-981-15-7062-9_54

A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks

Ajay Kaushik, Goswami, M., Manuja, M., Sreedevi, I. and Gupta, D. 2020. A Binary PSO Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 113, pp. 263-297. https://doi.org/10.1007/s11277-020-07188-3

Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization

Ajay Kaushik, Indu, S. and Gupta, D. 2019. Adaptive Mobile Sink for Energy Efficient WSN Using Biogeography-Based Optimization. International Journal of Mobile Computing and Multimedia Communications. 10 (3), pp. 1-22. https://doi.org/10.4018/ijmcmc.2019070101

A Self-Configurable Event Coverage Approach for Wireless Sensor Networks

Ajay Kaushik, Yakkali, R. T., Indu, S., Ahmed, F., Gupta, D., Nayar, R. and Yadav, S. 2019. A Self-Configurable Event Coverage Approach for Wireless Sensor Networks. International Journal of Mobile Computing and Multimedia Communications. 10 (2), pp. 1-18. https://doi.org/10.4018/ijmcmc.2019040101

A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks

Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Approach for Improving the Performance of Wireless Sensor Networks. Wireless Personal Communications. 106, pp. 1429-1449. https://doi.org/10.1007/s11277-019-06223-2

A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement

Kaushik, A., Indu, S. and Gupta, D. 2019. A Grey Wolf Optimization Based Algorithm for Optimum Camera Placement. Wireless Personal Communications. 105, pp. 1143-1167. https://doi.org/10.1007/s11277-019-06140-4

Nature-Inspired Algorithms in Wireless Sensor Networks

Ajay Kaushik, Indu, S. and Gupta, D. 2019. Nature-Inspired Algorithms in Wireless Sensor Networks. in: Banati, H., Mehta, S. and Kaur, P. (ed.) Nature-Inspired Algorithms for Big Data Frameworks Hershey, Pennsylvania IGI Global. pp. 75-92

Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization

Ajay Kaushik, Indu, S. and Gupta, D. 2018. Optimizing and Enhancing the Lifetime of a Wireless Sensor Network Using Biogeography Based Optimization. Applications of Computing and Communication Technologies First International Conference, ICACCT 2018. Springer. https://doi.org/10.1007/978-981-13-2035-4_23

A novel load balanced energy conservation approach in WSN using biogeography based optimization

Ajay Kaushik, Indu, S. and Gupta, D. 2017. A novel load balanced energy conservation approach in WSN using biogeography based optimization. THE 2ND INTERNATIONAL CONFERENCE ON ENERGY ENGINEERING AND SMART MATERIALS: ICEESM 2017. AIP Publishing. https://doi.org/10.1063/1.5002507

Technology transfer: enablers and barriers - a review

Ajay Kaushik, Kumar, S., Luthra, S. and Haleem, A. 2014. Technology transfer: enablers and barriers - a review. International Journal of Technology, Policy and Management. 14 (2), pp. 133-159. https://doi.org/10.1504/ijtpm.2014.060152
  • 382
    total views of outputs
  • 7
    total downloads of outputs
  • 12
    views of outputs this month
  • 5
    downloads of outputs this month