Now showing items 1-20 of 132

    • Comparison of classification techniques for intrusion detection dataset using WEKA 

      Garg, T.; Khurana, S.S. (Institute of Electrical and Electronics Engineers Inc., 2014)
      As the network based applications are growing rapidly, the network security mechanisms require more attention to improve speed and precision. The ever evolving new intrusion types pose a serious threat to network security. ...
    • Segregated receive and relay scheme for communication in wireless sensor networks 

      Saini, S.; Khurana, S.S. (Institute of Electrical and Electronics Engineers Inc., 2015)
      A Wireless Sensor Network (WSN) is a set of self-powered sensor nodes. These nodes are deployed in infrastructure less mode to collect the useful information from the environment and transmit it to the sink node. The ...
    • Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN 

      Saini, Ravinder; Khurana, Surinder Singh (Modern Education and Computer Science Press, 2016)
      The use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The ...
    • GRAY HOLE ATTACK ON HYBRID 5G NETWORK 

      Bhan, Anshu; Khurana, Surinder Singh (International Journal of Advanced Research in Computer Science, 2017)
      5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different ...
    • Recovery Based Architecture To Protect Hids Log Files Using Time Stamps 

      Khurana, Surinder Singh; Bansal, Divya; Sofat, Sanjeev (ACADEMY PUBLISHER, 2010)
      After the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in ...
    • SHED: Spam Ham Email Dataset 

      Sharma, Upasana; Khurana, Surinder Singh (International Journal on Recent and Innovation Trends in Computing and Communication (, 2017)
      Automatic filtering of spam emails becomes essential feature for a good email service provider. To gain direct or indirect benefits organizations/individuals are sending a lot of spam emails. Such kind emails activities ...
    • SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter 

      Khurana, Surinder Singh; Kaur, Nirmaljeet (Publishing India, 2014)
      The massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy ...
    • TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection 

      Chahal, Prabhjot Singh; Khurana, Surinder Singh (Modern Education and Computer Science Press, 2016)
      Fast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN ...
    • Contrast enhancement for cephalometric images using wavelet-based modified adaptive histogram equalization 

      Kaur, Amandeep; Singh, Chandan (Elsevier Ltd, 2017)
      Cephalometric images usually have low contrast. The existing techniques for automatic cephalometric analysis usually use histogram equalization for image enhancement. This technique has the advantage of being fully automatic ...
    • Survey on Image Registration 

      Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet (Vidya Publications, 2016)
      This paper aims to present a survey of image registration technique. It is a procedure of mapping points from one image to corresponding points in another image. The image registration geometrically align the two images ...
    • Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards 

      Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet (International Journal of Advanced Research in Computer Science, 2017)
      In these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the ...
    • INSPECTION OF DEFECTIVE PRINTED CIRCUIT BOARDS USING IMAGE PROCESSING 

      Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet (Indian Journal of Computer Science and Engineering (IJCSE), 2017)
      The goal of this paper is to present the inspection of defective Printed Circuit boards with the help of image processing. As Image processing is an important and useful toolbox in these days. Printed circuit boards ...
    • Degraded Document Binarization 

      Rani, Usha; Kaur, Amandeep; Joshan, Gurpreet Singh (International Conference on Advancements in Engineering and Technology (ICAET), 2017)
      Document image binarization is first and very important step of Optical Character Recognition system. Binarization converts the document image into bi-level form.There exists many Document binarization techniques in which ...
    • A New Approach to Punjabi Text Steganography using Naveen Toli 

      Kumar, Arun; Kaur, Amandeep (Department of Computer Science & engineering, NITTTR,, 2017)
    • A review of De-facto MAC standard: IEEE 802.11 DCF 

      Hans, S.; Nayyar, A. (Institute of Electrical and Electronics Engineers Inc., 2014)
      Advancement in the wireless networking technologies has drastically changed our world and has led us to new direction of 'Infrastructure-less networking- Mobile Adhoc Networks'. MANETs is a troupe of mobile nodes tied by ...
    • A comparative analysis and awareness survey of phishing detection tools 

      Sharma, H.; Meenakshi, E.; Bhatia, S.K. (Institute of Electrical and Electronics Engineers Inc., 2018)
      Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to steal personal information of people. Nowadays various tools are freely available to detect phishing and other web-based scams, ...
    • A systematic literature review: Refactoring for disclosing code smells in object oriented software 

      Singh, Satwinder; Kaur, Sharanpreet (Ain Shams University, 2016)
      Context: Reusing a design pattern is not always in the favor of developers. Thus, the code starts smelling. The presence of "Code Smells" leads to more difficulties for the developers. This racket of code smells is sometimes ...
    • Analysis of MAODV MANET routing protocol on different mobility models 

      Kaur, N. (Institute of Electrical and Electronics Engineers Inc., 2018)
      MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET ...
    • Analysis of VANET geographic routing protocols on real city map 

      Kaur, H.; Meenakshi (Institute of Electrical and Electronics Engineers Inc., 2018)
      Vehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET ...
    • Behavior analysis of LEACH protocol 

      Maurya, Prashant; Kaur, Amanpreet; Choudhary, Rohit (Institute of Electrical and Electronics Engineers Inc., 2014)
      A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...