Amit Wadhwa

@glbitm.org

Associate Professor
G L Bajaj Institute of Technology and Management, Greater Noida



                    

https://researchid.co/amitnew8781

EDUCATION

PhD in Computer Science and Engineering
M.Tech in Computer Science and Engineeirng
B.Tech in Computer Engineering
C-DAC in Advanced Computing (DAC Course)

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Science, Computer Engineering, Computer Science Applications, Artificial Intelligence

6

Scopus Publications

145

Scholar Citations

5

Scholar h-index

5

Scholar i10-index

Scopus Publications

  • Security System for Services Access in Smart City System Using Internet of Everything and Cloud
    Amit Wadhwa and Neerja Arora

    IEEE
    With the advancement of technologies like cloud computing and Internet of things, there are enormous areas in which these can be utilized. One such domain is Smart City concept utilizing or based on the architecture of Internet of everything. In a smart city the distinguish concept is the utilization of internet of everything architecture to effectively manage the services provided to users. Moreover, integration of internet of everything with cloud computing architecture would provide a better ecosystem in the area of smart cities. Providing services to smart city users could pose certain challenges and security issues with the integration of cloud computing. As per previous studied literature there is scope for improving access and authentication-based security of services imparted to smart city users. In this work, initially the consolidation of internet of everything (IoE) and cloud computing in smart cities is put forward. Further, this work focusses upon issues and challenges encountered in leveraging IoE in smart city environments with analysis of existing techniques for authentication and access control of cloud-based services and later provides a proposed system focusing upon imparting access control and authentication-oriented security for services delivered over a cloud and IoE followed by its analysis.

  • Deep learning approach for Sentinel-1 surface water mapping leveraging Google Earth Engine
    Timothy Mayer, Ate Poortinga, Biplov Bhandari, Andrea P. Nicolau, Kel Markert, Nyein Soe Thwal, Amanda Markert, Arjen Haag, John Kilbride, Farrukh Chishtie,et al.

    Elsevier BV

  • Recommendation System with Exploratory Data Analytics using Machine Learning
    Manu Panwar, Amit Wadhwa, and Sanjeev Pippal

    IEEE
    Digital data is generated on a vast scale nowadays and has been for the past two decades. This phenomenon implies shift in how data is managed, and conclusions drawn from it. Furthermore, artificial intelligence approaches and procedures for new ideas of analyzing Big Data, Sentiment Analysis (SA), also known as Opinion Mining (OM), has been a hot topic in recent, because of its ability to extract value from data, it has been around for a long time. It is, however, a topic that has gotten more attention in the fields of engineering and linguistics. As a result, the goal of this research is to provide insights into the field of exploratory data analysis, as well as an orientation toward the study of a recommendation system employing big data in the context of an e-commerce system, through the use of machine learning. probable machine learning based model. Initially the research contribution briefly summarizes discussion of the strategies and processes currently used in Sentiment Analysis and further we work upon the analysis of a recommendation system with e- commerce data using LSTM Model.

  • An Overview: Exploratory Data Analytics on E-Commerce Dataset
    Manu Panwar, Amit Wadhwa, and Sanjeev Pippal

    IEEE
    Its not news that people have been increasingly relying on digital technologies in recent years. As a result of this consumption, humans and machines are producing more data. On the other hand, these tools imply that organizations are complex. Furthermore, as the volume of data generated by users grows as a result of improved internet connections around the world, the issues of handling that data grow as well. As a result, techniques like machine learning (ML) can assist firms in managing and utilizing data supplied by users. Further, the focus of this work is to give insights in the field of exploratory data analysis to e-commerce system by applying probable machine learning based model.

  • Proposed framework with comparative analysis of access control & authentication based security models employed over cloud


  • Measuring Poverty for Food Security Analysis: Consumption-Versus Asset-Based Approaches
    Lisa Hjelm, Astrid Mathiassen, and Amit Wadhwa

    SAGE Publications
    Background: Poverty and food insecurity are intrinsically linked as poor households often lack the resources required to access sufficient nutritious food to live an active and healthy life. Consumption and expenditure surveys are typically used to identify poor versus nonpoor households but are detailed and costly. Measures of wealth based on asset ownership and housing characteristics can be generated from lighter, less costly surveys. Objective: To examine whether indices based on asset ownership and housing characteristics (stock) complement household consumption (flow) when used to analyze inequalities in food security outcomes. Methods: Comprehensive data from Nepal, Malawi, Tanzania, Uganda, and Madagascar are used to examine correlations and overlaps in classification between indices of household wealth and consumption per capita. Inequality in food security indicators representing quantity, quality, and vulnerability is examined across wealth and consumption per capita quintiles. Results: Wealth indices are correlated with consumption per capita, with coefficients between 0.5 and 0.6. The prevalence of food insecurity decreases from poorer to wealthier quintiles for all variables and for all food security measures in all countries. Energy deficiency varies much more across consumption quintiles than wealth index quintiles. Interestingly, inequalities in the share of consumption of food are more pronounced across the wealth index quintiles than per capita consumption. Conclusion: Although wealth indices and consumption per capita are related and both are drivers of food security, they cannot be used interchangeably for food security analysis. Each inequality measure is important for describing different aspects of food security.

RECENT SCHOLAR PUBLICATIONS

  • Security System for Services Access in Smart City System Using Internet of Everything and Cloud
    A Wadhwa, N Arora
    2024 2nd International Conference on Disruptive Technologies (ICDT), 1202-1207 2024

  • Recommendation System with Exploratory Data Analytics using Machine Learning
    M Panwar, A Wadhwa, S Pippal
    2021 3rd International Conference on Advances in Computing, Communication 2021

  • An overview: Exploratory data analytics on e-commerce dataset
    M Panwar, A Wadhwa, S Pippal
    2021 3rd International Conference on Advances in Computing, Communication 2021

  • Comparative Analysis of Authentication Techniques with Mechanism Implementing HoneyPot Over Cloud
    A Wadhwa
    Machine Intelligence and Smart Systems: Proceedings of MISS 2020, 501-511 2021

  • Analysis of Multilevel Security based Service Access Control and Data Protection Approach for Cloud
    A Wadhwa
    International Journal of Advanced Science and Technology 29 (5), 11136-11145 2020

  • Security Approaches and Implementation for Data Protection over Cloud
    A Wadhwa
    Journal of Emerging Technologies and Innovative Research 6 (5), 500-503 2019

  • PRACTICAL IMPLEMENTATION AND ANALYSIS OF MLBAAC MODEL FOR CLOUD
    A Wadhwa
    International Journal of Computer Engineering & Technology 9 (3), 14-22 2018

  • Proposed Technique for Securing Critical Data Over Cloud
    A Wadhwa
    Journal of Emerging Technologies and Innovative Research 5 (5), 592-595 2018

  • Performance Analysis of Selection Schemes in Genetic Algorithm for Solving Optimization Problem Using De Jong’s Function1
    A Wadhwa
    International Journal on Recent and Innovation Trends in Computing and 2017

  • A Review on Cyber Crime: Major Threats and Solutions.
    A Wadhwa, N Arora
    International Journal of Advanced Research in Computer Science 8 (5) 2017

  • Proposed framework with comparative analysis of access control & authentication based security models employed over cloud
    A Wadhwa, VK Gupta
    International Journal of Applied Engineering Research 12 (24), 15715-15722 2017

  • Analysis of Selection Techniques in Genetic Algorithm
    A Wadhwa
    LAP LAMBERT Academic Publishing 1, 80 2016

  • Comprehensive Analysis of Security Issues and Solutions While Migrating to Cloud Environment
    A Wadhwa
    International Journal of New Innovations in Engineering and Technology 4 (4 2016

  • Study of security issues in cloud computing
    AW Varsha, S Gupta
    Int. J. Comput. Sci. Mob. Comput 4 (6), 230-234 2015

  • Analysing Security Threats and Solutions during Transition to Cloud Environment
    A Wadhwa, R Kamra
    International Journal of Computer Applications, 24-26 2015

  • Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center
    A Wadhwa, A Garg
    International Journal of Computer Applications 117 (14) 2015

  • Framework using Multitenancy Architecture in Cloud Computing
    A Wadhwa, S Gupta
    International Journal of Computer Applications 121 (15) 2015

  • Content Aware Media Retargeting for still images using Seam Carving
    A Garg, A Negi, A Wadhwa
    International Journal on computer science and Engineering (IJCSE) 6, 125-136 2014

  • Framework for user authenticity and access control security over a cloud
    A Wadhwa, VK Gupta
    International Journal on Computer Science and Engineering 6 (04), 138-141 2014

  • Analysis of selection schemes for solving an optimization problem in genetic algorithm
    P Sharma, A Wadhwa
    International Journal of Computer Applications 93 (11) 2014

MOST CITED SCHOLAR PUBLICATIONS

  • Analysis of selection schemes for solving an optimization problem in genetic algorithm
    P Sharma, A Wadhwa
    International Journal of Computer Applications 93 (11) 2014
    Citations: 41

  • Study of security issues in cloud computing
    AW Varsha, S Gupta
    Int. J. Comput. Sci. Mob. Comput 4 (6), 230-234 2015
    Citations: 35

  • A Review on Cyber Crime: Major Threats and Solutions.
    A Wadhwa, N Arora
    International Journal of Advanced Research in Computer Science 8 (5) 2017
    Citations: 24

  • Proposed framework with comparative analysis of access control & authentication based security models employed over cloud
    A Wadhwa, VK Gupta
    International Journal of Applied Engineering Research 12 (24), 15715-15722 2017
    Citations: 12

  • Framework for user authenticity and access control security over a cloud
    A Wadhwa, VK Gupta
    International Journal on Computer Science and Engineering 6 (04), 138-141 2014
    Citations: 12

  • Comprehensive Analysis of Security Issues and Solutions While Migrating to Cloud Environment
    A Wadhwa
    International Journal of New Innovations in Engineering and Technology 4 (4 2016
    Citations: 5

  • PRACTICAL IMPLEMENTATION AND ANALYSIS OF MLBAAC MODEL FOR CLOUD
    A Wadhwa
    International Journal of Computer Engineering & Technology 9 (3), 14-22 2018
    Citations: 4

  • Performance Analysis of Selection Schemes in Genetic Algorithm for Solving Optimization Problem Using De Jong’s Function1
    A Wadhwa
    International Journal on Recent and Innovation Trends in Computing and 2017
    Citations: 3

  • Studying and Analyzing Virtualization While Transition from Classical to Virtualized Data Center
    A Wadhwa, A Garg
    International Journal of Computer Applications 117 (14) 2015
    Citations: 3

  • Framework using Multitenancy Architecture in Cloud Computing
    A Wadhwa, S Gupta
    International Journal of Computer Applications 121 (15) 2015
    Citations: 2

  • Recommendation System with Exploratory Data Analytics using Machine Learning
    M Panwar, A Wadhwa, S Pippal
    2021 3rd International Conference on Advances in Computing, Communication 2021
    Citations: 1

  • An overview: Exploratory data analytics on e-commerce dataset
    M Panwar, A Wadhwa, S Pippal
    2021 3rd International Conference on Advances in Computing, Communication 2021
    Citations: 1

  • Proposed Technique for Securing Critical Data Over Cloud
    A Wadhwa
    Journal of Emerging Technologies and Innovative Research 5 (5), 592-595 2018
    Citations: 1

  • Content Aware Media Retargeting for still images using Seam Carving
    A Garg, A Negi, A Wadhwa
    International Journal on computer science and Engineering (IJCSE) 6, 125-136 2014
    Citations: 1