Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 6 of 6
  • Thumbnail Image
    Item
    Performance Analysis of AODV for Wormhole Attack using Different Mobility Models
    (Excel India Publishers, 2014) Kaur, Gurmeet; Kaur, Amanpreet
    Mobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many attacks. Wormhole attack is one of the serious attacks in the context of mobile ad-hoc networks that can disrupt any routing channel completely. In this work, an attempt has been made to analyze and compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: AODV without attack and AODV under wormhole attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. The performance metrics evaluated for the two examined approaches are Average Throughput, Packet Delivery Ratio, Average End to End Delay and Jitter. Along with this, an approach has also been used to analyze participated malicious nodes.
  • Item
    A Comprehensive Review on Performance of AODV Protocol for Wormhole Attack
    (IJRET, 2014) Kaur, Gurmeet; Kaur, Amanpreet
    Wireless Networking is becoming very popular and interesting technology especially in these days as everyone wants wireless connectivity at anywhere anytime. It contains numerous wireless network technologies such as WiFi, WiMax, HSDPA and WiBro etc. Based on structural arrangement, wireless networks are categorized into two main categories: fixed infrastructure wireless networks and infrastructure less wireless networks. Mobile Ad-Hoc Networks (MANETs) come under the category of infrastructure less wireless networks, which is an autonomous system of mobile hosts connected by wireless links. Nodes are free to move and can join or leave the network at any time whenever required. Wireless ad hoc networks eradicate various problems which may come out while setting up the infrastructure. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many kinds of attacks. Wormhole attack is one of the serious attack in the context of mobile ad-hoc network, which can disrupt any routing channel completely. In this work, an attempt has been made to compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: normal and attack. The performance metrics evaluated for the two examined approaches are Throughput, Packet Delivery Ratio, Delay and Jitter.
  • Item
    Detection of defective printed circuit boards using image processing
    (Inderscience Publishers, 2018) Kaur, Beant; Kaur, Gurmeet; Kaur, Amandeep
    Manufacturing of printed circuit boards involves three stages (printing, component fabrication over surface of printed circuit boards, soldering of components), where inspection at every stage is very important to improve the quality of production. Image subtraction method is widely used for finding the difference between any two images. Using this method, defects have been detected by finding the difference between reference (defect free) and test image (to be inspected). The major limitation of image subtraction is that both the images should have same size and same orientation. The proposed method removes the above explained limitation of image subtraction method and also calculates total number of defects on printed circuit boards. The proposed method is tested on six test images. The experimental results show that proposed method is simple, economical and easy to implement in small and medium scale industries where most of the inspection is still done by humans.
  • Thumbnail Image
    Item
    INSPECTION OF DEFECTIVE PRINTED CIRCUIT BOARDS USING IMAGE PROCESSING
    (Indian Journal of Computer Science and Engineering (IJCSE), 2017) Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet
    The goal of this paper is to present the inspection of defective Printed Circuit boards with the help of image processing. As Image processing is an important and useful toolbox in these days. Printed circuit boards (PCBs) are the fundamental component of electronic devices. The performance of the electronics product depends on the quality of PCBs. The defects detection (if any) in the first stage of manufacturing process (on bare PCB) reduces the overall manufacturing cost of PCBs. In this paper, defects detection on bare PCB images is presented using different image processing techniques.
  • Thumbnail Image
    Item
    Application of Image Processing using Computer in Detection of Defective Printed Circuit Boards
    (International Journal of Advanced Research in Computer Science, 2017) Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet
    In these days, image processing has been used in many applications. It is the process for performing the different operations on the images using various functions. In this paper, image processing is used for finding the defective printed circuit boards. For finding the defective printed circuit boards, the parameters like entropy, standard deviation and euler number has been used. The result shows the effectiveness of the proposed method.
  • Thumbnail Image
    Item
    Survey on Image Registration
    (Vidya Publications, 2016) Kaur, Beant; Kaur, Amandeep; Kaur, Gurmeet
    This paper aims to present a survey of image registration technique. It is a procedure of mapping points from one image to corresponding points in another image. The image registration geometrically align the two images (one is reference and second is sensed image). The procedure of image registration consists of four steps: feature detection, feature matching, mapping function design and image transformation and resampling which are explained in Section V. The goal of image registration, algorithms and steps for image registration methods have been presented in this review paper.