Browsing by Author "Kaur, Gurmeet"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards(International Journal of Advanced Research in Computer Science, 2017) Kaur, Beant; Kaur, Amandeep; Kaur, GurmeetIn these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the defective printed circuit boards. For finding the defective printed circuit boards, the parameters like entropy, standard deviation and euler number has been used. The result shows the effectiveness of the proposed method.Item A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack(IJRET, 2014) Kaur, Gurmeet; Kaur, AmanpreetWireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.Item Detection of defective printed circuit boards using image processing(Inderscience Publishers, 2018) Kaur, Beant; Kaur, Gurmeet; Kaur, AmandeepManufacturing of printed circuit boards involves three stages (printing, component fabrication over surface of printed circuit boards, soldering of components), where inspection at every stage is very important to improve the quality of production. Image subtraction method is widely used for finding the difference between any two images. Using this method, defects have been detected by finding the difference between reference (defect free) and test image (to be inspected). The major limitation of image subtraction is that both the images should have same size and same orientation. The proposed method removes the above explained limitation of image subtraction method and also calculates total number of defects on printed circuit boards. The proposed method is tested on six test images. The experimental results show that proposed method is simple, economical and easy to implement in small and medium scale industries where most of the inspection is still done by humans.Item INSPECTION OF DEFECTIVE PRINTED CIRCUIT BOARDS USING IMAGE PROCESSING(Indian Journal of Computer Science and Engineering (IJCSE), 2017) Kaur, Beant; Kaur, Amandeep; Kaur, GurmeetThe goal of this paper is to present the inspection of defective Printed Circuit boards with the help of image processing. As Image processing is an important and useful toolbox in these days. Printed circuit boards (PCBs) are the fundamental component of electronic devices. The performance of the electronics product depends on the quality of PCBs. The defects detection (if any) in the first stage of manufacturing process (on bare PCB) reduces the overall manufacturing cost of PCBs. In this paper, defects detection on bare PCB images is presented using different image processing techniques.Item Performance analysis of aodv for wormhole attack using different mobility models(Central University of Punjab, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. According to structural arrangement, wireless networks are classified into two main types: fixed infrastructure wireless networks and non-infrastructure wireless networks. Mobile Ad-Hoc Networks (MANETs) fall under the type of infrastructure less wireless networks. Mobile nodes can communicate to each other through wireless links in this type of an autonomous system. At any time, whenever required nodes can join or leave the network as nodes are free to move. Although various routing protocols are used in the communication process but those protocols have numerous security complexities. An intruder can perform many attacks (both active and passive attacks) through different security flaws. Wormhole attack is an active attack in the context of mobile ad-hoc networks that disrupts the normal routing functioning of any routing protocol. In this work, an attempt has been made to analyze and compare the performance of demand oriented or reactive routing protocol: Ad-hoc On Demand Distance Vector (AODV) with two approaches: AODV without wormhole attack and AODV under attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. Evaluation of two examined approaches has been done in terms of performance metrics such as Average Throughput, PDR (Packet Delivery Ratio), Jitter, Average End to End Delay and Packet Drop Rate. An approach has also been used to analyze participated malicious nodes in the wormhole peer list. Along with this, the attack has been detected with the help of metrics such as Average Throughput, Average End to End Delay, Jitter and Packet Delivery Ratio.Item Performance Analysis of AODV for Wormhole Attack using Different Mobility Models(Excel India Publishers, 2014) Kaur, Gurmeet; Kaur, AmanpreetMobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many attacks. Wormhole attack is one of the serious attacks in the context of mobile ad-hoc networks that can disrupt any routing channel completely. In this work, an attempt has been made to analyze and compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: AODV without attack and AODV under wormhole attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. The performance metrics evaluated for the two examined approaches are Average Throughput, Packet Delivery Ratio, Average End to End Delay and Jitter. Along with this, an approach has also been used to analyze participated malicious nodes.Item Survey on Image Registration(Vidya Publications, 2016) Kaur, Beant; Kaur, Amandeep; Kaur, GurmeetThis paper aims to present a survey of image registration technique. It is a procedure of mapping points from one image to corresponding points in another image. The image registration geometrically align the two images (one is reference and second is sensed image). The procedure of image registration consists of four steps: feature detection, feature matching, mapping function design and image transformation and resampling which are explained in Section V. The goal of image registration, algorithms and steps for image registration methods have been presented in this review paper.