Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 6 of 6
  • Thumbnail Image
    Item
    Resolving the celestial classification using fine k-NN classifier
    (Institute of Electrical and Electronics Engineers Inc., 2016) Yadav, Sangeeta; Kaur, Amandeep; Bhauryal, Neeraj Singh
    With the rapid growth in space technology, space exploration is on the high demand. With each such type of mission, data is accumulating in heaps. Be it manned or unmanned mission, its credibility is defined by the quality of research which can be conducted on the data collected in such missions through remote or on the capsule experiments. Thus there is huge demand of soft techniques, which can make the space or celestial data as useful as possible. One of the major issues is dearth of automated technique for image classification of celestial bodies. Though many image classification techniques exist, but none of them is totally attributed to celestial bodies. An artificial neural network based classifier is proposed to classify celestial object from its image. Texture features are extracted from 90 images of size of 225-225 of different planets. Different classifiers were applied on this training data. Accuracy of different classifiers is compared to find out the best classifier for space data classification. Different validation schemes are applied and the results are compared to figure out the best validation scheme. ? 2016 IEEE.
  • Thumbnail Image
    Item
    Performance evaluation of various symmetric encryption algorithms
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kansal, S.; Mittal, M.
    With rise in the use of internet in various fields like banking, military and government sector, the security and privacy of the data has been the main concern. Today, most of the data handling and electronic transactions are done on the internet. When the information is transferred from the sender to the receiver over the internet, it may be eavesdropped by an intruder and thus is a continuous threat to the secrecy or confidentiality of the data. The popular technique that protects the confidentiality of the data is cryptography which converts the plain text into unreadable form and then receiver applies reverse mechanism to decrypt the unreadable form of data to readable form. This mechanism is called as encryption-decryption process. Thus to secure the data over the internet, it is important to find out which algorithm performs better than the other algorithms. In this paper, the different symmetric encryption algorithms like DES, 3DES, AES have been analyzed with respect to different parameters and data types (like text files, image) on i7 processor. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kaur, Amandeep; Mittal, Meenakshi
    The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Combinational feature selection approach for network intrusion detection system
    (Institute of Electrical and Electronics Engineers Inc., 2015) Garg, T.; Kumar, Y.
    In the era of digital world, the computer networks are receiving multidimensional advancements. Due to these advancements more and more services are available for malicious exploitation. New vulnerabilities are found from common programs and even on vulnerability in a single computer might compromise the network of an entire company. There are two parallel ways to address this threat. The first way is to ensure that a computer doesn't have any known security vulnerabilities, before allowing it to the network it has access rights. The other way, is to use an Intrusion Detection System. IDSs concentrate on detecting malicious network traffic, such as packets that would exploit known security vulnerability. Generally the intrusions are detected by analyzing 41 attributes from the intrusion detection dataset. In this work we tried to reduce the number of attributes by using various ranking based feature selection techniques and evaluation has been done using ten classification algorithms that I have evaluated most important. So that the intrusions can be detected accurately in short period of time. Then the combinations of the six reduced feature sets have been made using Boolean AND operator. Then their performance has been analyzed using 10 classification algorithms. Finally the top ten combinations of feature selection have been evaluated among 1585 unique combinations. Combination of Symmetric and Gain Ratio while considering top 15 attributes has highest performance. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Behavior analysis of LEACH protocol
    (Institute of Electrical and Electronics Engineers Inc., 2014) Maurya, Prashant; Kaur, Amanpreet; Choudhary, Rohit
    A wireless sensor network (WSN) is an emerging field comprising of sensor nodes with limited resources like power, memory etc. It is used to monitor the remote areas where recharging or replacing the battery power of sensor nodes is not possible. So, energy is a most challenging issue in case of WSN. Low-Energy Adaptive Clustering Hierarchy (LEACH) is the first significant protocol which consumes less amount of energy while routing the data to the base station. In this paper LEACH protocol has been analyzed with different percentage of cluster heads at different locations of base station in the network. ? 2014 IEEE.
  • Thumbnail Image
    Item
    Segregated receive and relay scheme for communication in wireless sensor networks
    (Institute of Electrical and Electronics Engineers Inc., 2015) Saini, S.; Khurana, S.S.
    A Wireless Sensor Network (WSN) is a set of self-powered sensor nodes. These nodes are deployed in infrastructure less mode to collect the useful information from the environment and transmit it to the sink node. The significance of Wireless Sensor Networks has been evidenced in many applications like military areas, health monitoring and observation of earthquake etc. However, WSN has also some limitations including limited energy supply that leads to shorter life time of the network. Although numerous techniques have been proposed to improve the life time of sensor nodes, yet the large energy requirements for communication activities is still a serious issue. In this work, Segregated Receive and Relay (SRR) based routing scheme has been proposed to increase the lifetime of WSN. To achieve the purpose, relay nodes have been introduced in interior regions of the network area. The results confirm that proposed scheme significantly reduce the energy consumed by interior region nodes, which proves the usefulness of the proposed scheme in prolonging WSN lifetime. ? 2014 IEEE.