Now showing items 1-20 of 132

    • 3D modelling and visualization for Vision-based Vibration Signal Processing and Measurement 

      Yao, Qi; Shabaz, Mohammad; Singh, Raj Karan; Lohani, Tarun Kumar; Bhatt, Mohammed Wasim; Panesar, Gurpreet Singh (De Gruyter Open Ltd, 2021-04-10)
      With the technological evolutionary advent, a vision-based approach presents the remote measuring approach for the analysis of vibration. The structure vibration test and model parameter identification in the detection of ...
    • Advance Stable Election Protocol in Wireless Sensor Network 

      Singh, Mandeep; Sidhu, Navjot (Excel India Publishers, 2014)
      Wireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering ...
    • Advances and challenges in thyroid cancer: The interplay of genetic modulators, targeted therapies, and AI-driven approaches 

      Bhattacharya, Srinjan; Mahato, Rahul Kumar; Singh, Satwinder; Bhatti, Gurjit Kaur; Mastana, Sarabjit Singh; Bhatti, Jasvinder Singh (Elsevier Inc., 2023-09-20)
      Thyroid cancer continues to exhibit a rising incidence globally, predominantly affecting women. Despite stable mortality rates, the unique characteristics of thyroid carcinoma warrant a distinct approach. Differentiated ...
    • Analysis of leach protocol for lifetime optimization of wireless sensor networks 

      Maurya, Prashant (Central University of Punjab, 2014)
      A Wireless Sensor Network (WSN) is an emerging field comprised of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
    • Analysis of MAODV MANET routing protocol on different mobility models 

      Kaur, N. (Institute of Electrical and Electronics Engineers Inc., 2018)
      MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET ...
    • Analysis of VANET geographic routing protocols on real city map 

      Kaur, H.; Meenakshi (Institute of Electrical and Electronics Engineers Inc., 2018)
      Vehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET ...
    • Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing 

      Kanika; Sidhu, Navjot (IASIR, 2014)
      Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means ...
    • Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data 

      Mishra H.K.; Mittal M. (Springer, 2020)
      Wireless ad hoc networks due to their open deployment architecture, are highly exposed to many security compromising attacks. These attacks can cause a lot of damage to privacy, security, and robustness of networks. The ...
    • Analyze Dark Web and Security Threats 

      Ansh, Samar; Singh, Satwinder (Springer Science and Business Media Deutschland GmbH, 2023-05-03)
      The deepest area of data storage where data mining and data management are not possible without the Tor (network) Policy is known as the dark web. The dark web is a paradise for government and private sponsored cybercriminals. ...
    • AODV Based Congestion Control Protocols: Review 

      Bhatia, Bandana; Sood, Neha (IJCSIT, 2014)
      Ad- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They ...
    • Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards 

      Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet (International Journal of Advanced Research in Computer Science, 2017)
      In these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the ...
    • Application of UAV tilt photogrammetry in 3D modeling of ancient buildings 

      Guo, Qiu; Liu, Hechun; Hassan, Faez M.; Bhatt, Mohammed Wasim; Buttar, Ahmed Mateen (Springer, 2021-11-03)
      The initiation of photogrammetry that arrived in late 90�s permitted the 3D stereoscopic vision for the acquirement of information. A number of methodologies were embraced by several researchers to discover the innumerable ...
    • Behavior analysis of LEACH protocol 

      Maurya, Prashant; Kaur, Amanpreet; Choudhary, Rohit (Institute of Electrical and Electronics Engineers Inc., 2014)
      A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor ...
    • Bell�s inequality with biased experimental settings 

      Singh, Parvinder; Faujdar, Jyoti; Sarkar, Maitreyee; Kumar, Atul (Springer, 2022-04-30)
      We analyse the efficiency of nonlocal correlations in comparison with classical correlations under biased experimental set-up, e.g. for a nonlocal game or a class of Bell-CHSH inequality where both Alice and Bob choose ...
    • Bug Classification Depend Upon Refactoring Area of Code 

      Singh, Satwinder; Jalal, Maddassar; Kaur, Sharanpreet (Springer, 2023-01-05)
      Due to rapid development in the software industry, various software is being developed, which compromises the software quality. As long as time passes, the software which compromises with the quality starts showing bugs ...
    • Classification of Breast Cancer Mammographic Images Using A Light-Weighted Convolutional Neural Network 

      Kaur, Palwinder; Kaur, Amandeep (Institute of Electrical and Electronics Engineers Inc., 2023-04-10)
      Deep learning is a method demanded by radiologists to assist them interpret and classify medical images correctly. A Convolutional Neural Network (CNN) is the most widely used method for classifying and analysing images. ...
    • Classification of defective modules using object-oriented metrics 

      Singh, Satwinder; Singla, Rozy (Inderscience Enterprises Ltd., 2017)
      Software defect in today's era is crucial in the field of software engineering. Most of the organisations use various techniques to predict defects in their products before they are delivered. Defect prediction techniques ...
    • Clustering of tweets: A novel approach to label the unlabelled tweets 

      Jan T.G. (Springer, 2020)
      Twitter is one of the fastest growing microblogging and online social networking site that enables users to send and receive messages in the form of tweets. Twitter is the trend of today for news analysis and discussions. ...
    • Code clone detection and analysis using software metrics and neural network: A Literature Review 

      Kumar, Balwinder; Singh, Satwinder (Eighth Sense Research Group, 2015)
      Code clones are the duplicated code which degrade the software quality and hence increase the maintenance cost. Detection of clones in a large software system is very tedious tasks but it is necessary to improve the design, ...
    • Combinational feature selection approach for network intrusion detection system 

      Garg, T.; Kumar, Y. (Institute of Electrical and Electronics Engineers Inc., 2015)
      In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from ...