scispace - formally typeset
Search or ask a question
Author

Sonakshi Vij

Bio: Sonakshi Vij is an academic researcher from Indira Gandhi Institute of Technology. The author has contributed to research in topics: WordNet & Fuzzy logic. The author has an hindex of 5, co-authored 23 publications receiving 105 citations. Previous affiliations of Sonakshi Vij include Guru Gobind Singh Indraprastha University & Krishna Engineering College.

Papers
More filters
Book ChapterDOI
01 Jan 2019
TL;DR: This study shows that AI is the backbone of all the NLP enabled intelligent tutor systems and helps in developing qualities such as self reflection, answering deep questions, resolving conflict statements, generating creative questions, and choice-making skills.
Abstract: The contribution of Artificial Intelligence (AI) in the field of education has always been significant. From robotic teaching to the development of an automated system for answer sheet evaluation, AI has always helped both the teachers and the students. In this paper we have done an in depth analysis of the various research developments that were carried out across the globe corresponding to artificial intelligence techniques applied to education sector so as to summarize and highlight the role of AI in teaching and student’s evaluation. Our study shows that AI is the backbone of all the NLP enabled intelligent tutor systems. These systems helps in developing qualities such as self reflection, answering deep questions, resolving conflict statements, generating creative questions, and choice-making skills.

35 citations

Proceedings Article
16 Mar 2016
TL;DR: Various security issues of 4G with respect to Wi-max and long term evolution are discussed at MAC and physical layer level and the futuristic architectural framework for 5G networks is considered.
Abstract: The mobile technology is an ever evolving concept. The world has seen various generations of mobile technology be it 1G, 2G, 3G or 4G. The fifth generation of mobile technology i.e. 5G is seen as a futuristic notion that would help in solving the issues that are pertaining in the 4G. In this paper we have discussed various security issues of 4G with respect to Wi-max and long term evolution. These issues are discussed at MAC and physical layer level. The security issues are seen in terms of possible attacks, system vulnerabilities and privacy concerns. We have also highlighted how the notions of 5G can be tailored to provide a more secure mobile computing environment. We have considered the futuristic architectural framework for 5G networks in our discussion. The basic concepts and features of the fifth generation technology are explained here. We have also analyzed five pillars of strength for the 5G network security which would work in collaboration with each other to provide a secure mobile computing environment to the user.

19 citations

Proceedings ArticleDOI
18 Apr 2019
TL;DR: Using the dataset from the fields of Indian Agriculture Research Institute (IARI), the authors have applied transfer learning technique to identify three weeds Phalaris minor, Dactyloctenium aegyptium, Digera arvensis, Echinochloa colona which achieved achieve accuracy of 95%,65%,61%,54% respectively for the datasets which were not involved in training of model.
Abstract: Weeds present in the crops are one of the factors that lead to decrease in crop production. The weeds take up nutrients, water which leads to weight reduction in plant and decreases the grains per ear and grain yield.so a method needs to be developed which would detect these weeds in the field and then herbicide is sprayed on them to completely destroy through the use of new drone technology and deep learning in field of convolutional neural networks. Using the dataset from the fields of Indian Agriculture Research Institute (IARI), THE AUTHORS have applied transfer learning technique to identify three weeds Phalaris minor, Dactyloctenium aegyptium, Digera arvensis, Echinochloa colona which achieved achieve accuracy of 95%,65%,61%,54% respectively for the datasets which were not involved in training of model.

18 citations

Proceedings Article
16 Mar 2016
TL;DR: A taxonomy of the security aspects of IOT is proposed and the basic concepts and motivation behind the evolution of Iot, its architecture, and applications are explained.
Abstract: The Internet is a Heterogeneous entity which is constantly changing and evolving. The concept of “Internet of Things” (IOT) refers to extending the intelligent sensors in our day to day objects such as televisions, fridge, media players, heating appliances etc. This would help in extending the ability of the objects to provide feedback to the user. This enables the object to have some sort of consciousness. What we have today is the human interacting with the object and not vice-versa, but the IOT would help us to complete this loop. This kind of digitization would mean that our next generation of refrigerators would know more about our diet then our current dieticians. This would help in creating a “system of systems”. Considering a current scenario where the number of digital security threats and attacks are increasing day by day, the notion of IOT would be incomplete if we ignore its security aspects. In this paper, we would be exploring the various security aspects of IOT such as security of remote frequency identifiers(RFID), wireless sensors etc. We have proposed a taxonomy of the security aspects of IOT. We have also explained the basic concepts and motivation behind the evolution of IOT, its architecture, and applications.

18 citations

Journal ArticleDOI
TL;DR: This work is the first attempt in the field of short answer-based evaluation using WordNet graphs and a novel marking algorithm is provided which can incorporate semantic relations of the answer text into consideration.
Abstract: Answer sheet evaluation is a time-consuming task that requires lot of efforts by the teachers and hence there is a strong need of automation for the same. This paper proposes a machine learning based approach that relies on WordNet graphs for finding out the text similarity between the answer provided by the student and the ideal answer provided by the teacher to facilitate the automation of answer sheet evaluation. This work is the first attempt in the field of short answer-based evaluation using WordNet graphs. Here, a novel marking algorithm is provided which can incorporate semantic relations of the answer text into consideration. The results when tested on 400 answer sheets yield promising results as compared with the state-of-art.

17 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The potential for blockchain technology in facilitating secure sharing of IoT datasets and securing IoT systems is posited, before presenting two conceptual blockchain-based approaches.

418 citations

Journal ArticleDOI
TL;DR: A systematic study of the peculiarities of the IoT environment including its security and performance requirements and progression in blockchain technologies is carried out and a way forward is proposed to resolve some of the significant challenges to the blockchain's adoption in IoT.

339 citations

Journal ArticleDOI
TL;DR: A composite guideline for the development of an IoT security framework based on industry best practices is proposed and also highlights lessons learned, pitfalls and some open research challenges.
Abstract: The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from industrial control systems (ICS) to e-Health, e-Commerce, smart cities, supply chain management, smart cars, cyber physical systems (CPS), and a lot more. Such reliance on IoT is resulting in a significant amount of data to be generated, collected, processed, and analyzed. The big data analytics is no doubt beneficial for business development. However, at the same time, numerous threats to the availability and privacy of the user data, message, and device integrity, the vulnerability of IoT devices to malware attacks and the risk of physical compromise of devices pose a significant danger to the sustenance of IoT. This paper thus endeavors to highlight most of the known threats at various layers of the IoT architecture with a focus on the anatomy of malware attacks. We present a detailed attack methodology adopted by some of the most successful malware attacks on IoT, including ICS and CPS. We also deduce an attack strategy of a distributed denial of service attack through IoT botnet followed by requisite security measures. In the end, we propose a composite guideline for the development of an IoT security framework based on industry best practices and also highlight lessons learned, pitfalls and some open research challenges.

216 citations

Journal ArticleDOI
TL;DR: A new 5G wireless security architecture is proposed, based on which the analysis of identity management and flexible authentication is provided, and a handover procedure as well as a signaling load scheme are explored to show the advantages of the proposed security architecture.
Abstract: The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive study on the security of 5G wireless network systems compared with the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services are summarized with the consideration of new service requirements and new use cases in 5G wireless networks. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services, including authentication, availability, data confidentiality, key management, and privacy. This paper further discusses the new security features involving different technologies applied to 5G, such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software-defined networks, and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantages of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized.

205 citations

Journal ArticleDOI
TL;DR: The threats, security requirements, challenges, and the attack vectors pertinent to IoT networks are reviewed, and a novel paradigm that combines a network-based deployment of IoT architecture through software-defined networking (SDN) is proposed.
Abstract: Internet of Things (IoT) is transforming everyone’s life by providing features, such as controlling and monitoring of the connected smart objects. IoT applications range over a broad spectrum of services including smart cities, homes, cars, manufacturing, e-healthcare, smart control system, transportation, wearables, farming, and much more. The adoption of these devices is growing exponentially, that has resulted in generation of a substantial amount of data for processing and analyzing. Thus, besides bringing ease to the human lives, these devices are susceptible to different threats and security challenges, which do not only worry the users for adopting it in sensitive environments, such as e-health, smart home, etc., but also pose hazards for the advancement of IoT in coming days. This article thoroughly reviews the threats, security requirements, challenges, and the attack vectors pertinent to IoT networks. Based on the gap analysis, a novel paradigm that combines a network-based deployment of IoT architecture through software-defined networking (SDN) is proposed. This article presents an overview of the SDN along with a thorough discussion on SDN-based IoT deployment models, i.e., centralized and decentralized. We further elaborated SDN-based IoT security solutions to present a comprehensive overview of the software-defined security (SDSec) technology. Furthermore, based on the literature, core issues are highlighted that are the main hurdles in unifying all IoT stakeholders on one platform and few findings that emphases on a network-based security solution for IoT paradigm. Finally, some future research directions of SDN-based IoT security technologies are discussed.

175 citations