Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
12 results
Search Results
Item Handover between Wi-Fi and WiMAX technologies using GRE tunnel(Springer, 2019) Aimen, Aroof; Hamid,, S; Ahmad, S; Chisti, M.A; Khurana, Surinder Singh; Kaur, AmandeepThe next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible mixed chains. This paper considers the issue of handover between Wi-Fi and WiMAX grids with seamless connectivity. For this, first, a mobile terminal that abuts both IEEE 802.11 and IEEE 802.16 technologies was designed in the simulator. The developed mobile node was then introduced in the simulation scenario to study the various metrics. Second, we present the incorporation of GRE tunnel between the home agent and base stations for doing away with latency and packet drop and thereby improving the MOS value of the interest of consumers, giving impetus to efficiency day instant and day forth. © 2019, Springer Nature Singapore Pte Ltd.Item Face detection techniques: a review(Springer, 2019) Kumar, A; Kaur, Amandeep; Kumar, M.With the marvelous increase in video and image database there is an incredible need of automatic understanding and examination of information by the intelligent systems as manually it is getting to be plainly distant. Face plays a major role in social intercourse for conveying identity and feelings of a person. Human beings have not tremendous ability to identify different faces than machines. So, automatic face detection system plays an important role in face recognition, facial expression recognition, head-pose estimation, human–computer interaction etc. Face detection is a computer technology that determines the location and size of a human face in a digital image. Face detection has been a standout amongst topics in the computer vision literature. This paper presents a comprehensive survey of various techniques explored for face detection in digital images. Different challenges and applications of face detection are also presented in this paper. At the end, different standard databases for face detection are also given with their features. Furthermore, we organize special discussions on the practical aspects towards the development of a robust face detection system and conclude this paper with several promising directions for future research. © 2018, Springer Nature B.V.Item A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model(IJRET, 2014) Kaur, Amandeep; Mittal, MeenakshiWireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery RatioItem Resolving the celestial classification using fine k-NN classifier(Institute of Electrical and Electronics Engineers Inc., 2016) Yadav, Sangeeta; Kaur, Amandeep; Bhauryal, Neeraj SinghWith the rapid growth in space technology, space exploration is on the high demand. With each such type of mission, data is accumulating in heaps. Be it manned or unmanned mission, its credibility is defined by the quality of research which can be conducted on the data collected in such missions through remote or on the capsule experiments. Thus there is huge demand of soft techniques, which can make the space or celestial data as useful as possible. One of the major issues is dearth of automated technique for image classification of celestial bodies. Though many image classification techniques exist, but none of them is totally attributed to celestial bodies. An artificial neural network based classifier is proposed to classify celestial object from its image. Texture features are extracted from 90 images of size of 225-225 of different planets. Different classifiers were applied on this training data. Accuracy of different classifiers is compared to find out the best classifier for space data classification. Different validation schemes are applied and the results are compared to figure out the best validation scheme. ? 2016 IEEE.Item Mobility model based performance analysis of DSDV mobile ad hoc routing protocol(Institute of Electrical and Electronics Engineers Inc., 2014) Kaur, AmandeepWireless Networking has become the phrase du jour these days because of an attractive number of benefits it offers to the end users, by enabling them to access a wide pool of resources and information irrespective of the physical location of the devices used by them across the globe. Mobile ad hoc networks are a kind of infrastructure less wireless networks in which all the nodes act as peers and share information as well as resources. Mobile ad hoc networks are an open area of research since these have not been deployed widely yet. Every research in the field of networking focuses on the efficient, accurate, reliable, secure and immediate delivery of data. Therefore, the routing of data across the mobile ad hoc network is a major concern of researchers all over the world. Several routing protocols have been proposed and implemented to send data efficiently across mobile ad hoc networks. The performance evaluation of these protocols has been going on since a long time. In most of the studies, the focus has been on the variations in pause times and network size to measure the performance of various mobile ad hoc network routing protocols. A very few work has been done on the performance analysis of protocols by varying the underlying mobility models. Through this paper, investigations have been made into the behavior of DSDV mobile ad hoc routing protocol by varying the underlying mobility models. The metrics used to analyze the performance are Throughput, Average End to End delay, Routing overhead and Packet Delivery Ratio. ? 2014 IEEE.Item Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models(Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, MeenakshiThe performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.Item A New Approach to Punjabi Text Steganography using Naveen Toli(Department of Computer Science & engineering, NITTTR,, 2017) Kumar, Arun; Kaur, AmandeepItem Degraded Document Binarization(International Conference on Advancements in Engineering and Technology (ICAET), 2017) Rani, Usha; Kaur, Amandeep; Joshan, Gurpreet SinghDocument image binarization is first and very important step of Optical Character Recognition system. Binarization converts the document image into bi-level form.There exists many Document binarization techniques in which we have mainly one or two parameters. Output completely depends upon the values of these user defined parameters. One such parameter is window size in case of sliding window binarization techniques like Niblack;s, Bernsen's, Nick, Sauvola etc. In this proposed work we have tried to modify Sauvola's method is state of artItem INSPECTION OF DEFECTIVE PRINTED CIRCUIT BOARDS USING IMAGE PROCESSING(Indian Journal of Computer Science and Engineering (IJCSE), 2017) Kaur, Beant; Kaur, Amandeep; Kaur, GurmeetThe goal of this paper is to present the inspection of defective Printed Circuit boards with the help of image processing. As Image processing is an important and useful toolbox in these days. Printed circuit boards (PCBs) are the fundamental component of electronic devices. The performance of the electronics product depends on the quality of PCBs. The defects detection (if any) in the first stage of manufacturing process (on bare PCB) reduces the overall manufacturing cost of PCBs. In this paper, defects detection on bare PCB images is presented using different image processing techniques.Item Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards(International Journal of Advanced Research in Computer Science, 2017) Kaur, Beant; Kaur, Amandeep; Kaur, GurmeetIn these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the defective printed circuit boards. For finding the defective printed circuit boards, the parameters like entropy, standard deviation and euler number has been used. The result shows the effectiveness of the proposed method.