Computer Science And Technology - Research Publications

Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82

Browse

Search Results

Now showing 1 - 10 of 39
  • Thumbnail Image
    Item
    Modified Sauvola binarization for degraded document images
    (Elsevier, 2020) Kaur, A; Rani, U; Josan, G.S.
    The binarization of historical documents is a difficult job due to the presence of many degradations. Many existing local binarization techniques use certain manually adjusted parameters. The output of these techniques is much dependent on the value of these parameters. One of such parameters is window size which is kept fixed for the whole text image. The fixed window size will not be able to perform well for images having variable stroke widths and text sizes. The proposed binarization technique (Modified Sauvola) is the modification of state of art Sauvola's binarization technique. It automatically computes window size dynamically across the image pixel to pixel using the stroke width transform (SWT). This led to reduction in number of manually adjusted parameters. The results are compared with the nine existing techniques using the quantitative measures: FM, PSNR, NRM, MPM, and DRD. The results show that the proposed method outperforms existing methods for images having variable stroke widths and text sizes. - 2020 Elsevier Ltd
  • Thumbnail Image
    Item
    Handover between Wi-Fi and WiMAX technologies using GRE tunnel
    (Springer, 2019) Aimen, Aroof; Hamid,, S; Ahmad, S; Chisti, M.A; Khurana, Surinder Singh; Kaur, Amandeep
    The next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible mixed chains. This paper considers the issue of handover between Wi-Fi and WiMAX grids with seamless connectivity. For this, first, a mobile terminal that abuts both IEEE 802.11 and IEEE 802.16 technologies was designed in the simulator. The developed mobile node was then introduced in the simulation scenario to study the various metrics. Second, we present the incorporation of GRE tunnel between the home agent and base stations for doing away with latency and packet drop and thereby improving the MOS value of the interest of consumers, giving impetus to efficiency day instant and day forth. © 2019, Springer Nature Singapore Pte Ltd.
  • Thumbnail Image
    Item
    Face detection techniques: a review
    (Springer, 2019) Kumar, A; Kaur, Amandeep; Kumar, M.
    With the marvelous increase in video and image database there is an incredible need of automatic understanding and examination of information by the intelligent systems as manually it is getting to be plainly distant. Face plays a major role in social intercourse for conveying identity and feelings of a person. Human beings have not tremendous ability to identify different faces than machines. So, automatic face detection system plays an important role in face recognition, facial expression recognition, head-pose estimation, human–computer interaction etc. Face detection is a computer technology that determines the location and size of a human face in a digital image. Face detection has been a standout amongst topics in the computer vision literature. This paper presents a comprehensive survey of various techniques explored for face detection in digital images. Different challenges and applications of face detection are also presented in this paper. At the end, different standard databases for face detection are also given with their features. Furthermore, we organize special discussions on the practical aspects towards the development of a robust face detection system and conclude this paper with several promising directions for future research. © 2018, Springer Nature B.V.
  • Thumbnail Image
    Item
    Analysis of Virtualization: Vulnerabilities and attacks over virtualized cloud computing
    (IASIR, 2014) Kanika; Sidhu, Navjot
    Cloud computing is the fastest growing technology in the IT world. The technology offers reduced IT costs and provides on the demand services to the individual users as well as organizations over the internet. The means of cloud computing is obtained by the virtualization of the resources such as hardware, platform, operating system and storages devices. Virtualization permits multiple operating systems to run on the same physical machine. Multiple tenants are unaware of the presence of the other tenant with whom they are sharing the resources. The co-existence of multiple virtual machines can be exploited to gain the access over other tenant's data or attack to deny of services. The significant concern is insuring the security and providing isolation between multiple operating systems. The paper explores various kinds of vulnerabilities and attacks associated with the virtualization.
  • Thumbnail Image
    Item
    Performance Analysis of AODV for Wormhole Attack using Different Mobility Models
    (Excel India Publishers, 2014) Kaur, Gurmeet; Kaur, Amanpreet
    Mobile Ad-Hoc Network (MANET) is a type of temporary wireless network, in which the nodes are mobile and have dynamic network topology. Communication among nodes in these networks is accomplished via different routing protocols. But these protocols have different security flaws and using these flaws, an attacker can launch many attacks. Wormhole attack is one of the serious attacks in the context of mobile ad-hoc networks that can disrupt any routing channel completely. In this work, an attempt has been made to analyze and compare the performance of on-demand reactive routing protocol: Ad hoc On Demand Distance Vector (AODV) with two approaches: AODV without attack and AODV under wormhole attack using two mobility models viz. Random Way Point Model and Reference Point Group Mobility Model. The performance metrics evaluated for the two examined approaches are Average Throughput, Packet Delivery Ratio, Average End to End Delay and Jitter. Along with this, an approach has also been used to analyze participated malicious nodes.
  • Thumbnail Image
    Item
    A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model
    (IJRET, 2014) Kaur, Amandeep; Mittal, Meenakshi
    Wireless networks have become an epitome of revolution in the communication industry as these have enabled the devices to communicate and access information independent of their location. These networks can be classified into two categories: Infrastructure based and Infrastructure less. Mobile ad hoc networks (MANET) fall under infrastructureless category in which nodes are able to move thereby making the topology of the network highly dynamic. Due to the dynamically changing topology, efficient routing mechanisms needed to be developed, which led to the foundations of various mobile ad hoc routing protocols. There are a number of mobile ad hoc routing protocols proposed to serve different purposes like security and transmission efficiency. These protocols are divided into two categories: Table based and Demand based. Through this work, table based traditional routing protocol DSDV and demand based routing protocol AODV have been assessed through simulation using Manhattan Grid mobility model. Comprehensive analysis was carried out to analyze which protocol performs better in the assumed scenarios. The performance metrics evaluated for the two protocols are Throughput, Average End to End delay, Routing Overhead and Packet Delivery Ratio
  • Thumbnail Image
    Item
    AODV Based Congestion Control Protocols: Review
    (IJCSIT, 2014) Bhatia, Bandana; Sood, Neha
    Ad- hoc network is defined as the network in which the users communicate with each other by forming a temporary network without any centralized administration. Here each node acts both as a host as well as a router. They have highly deployable, dynamic and self-configurable topologies. Various routing protocols are defined for MANETs. These protocols may follow proactive, reactive or hybrid approach. Due to many number of nodes transmitting packets over the network, the chances of losing the packets over the network increases to a great extent. Also, with the increase in size of data packets, the congestion over the network increases which may lead to packet loses. The existing routing protocols for MANETs do not support congestion control as they are not congestion adaptive. There are many proposed protocols that are congestion adaptive and deals with the congestion over the network. This paper discusses congestion control protocols in MANETs. Also, three congestion control protocols, EDAODV, AODV-I and CRP, are discussed. Simulation results are gathered for AODV by varying the number of nodes and size of the data packets for four performance metrics, namely, throughput, routing overhead, packet delivery ratio and end-to-end delay.
  • Thumbnail Image
    Item
    Third Party Auditor: An integrity checking Technique for Client Data Security in Cloud Computing
    (IJCSIT, 2014) Goyal, Renuka| Sidhu, Navjot
    Now-a-days the concept of Cloud Computing is one of the major theories in the world of IT. Its services are now being applied to several IT scenarios. Cloud Computing is the internet based computing which provides users with a number of services. Users store their data in the cloud without the burden of local data storage. As the user no longer have physical possession of data so the integrity and security of data become the major concern in the cloud computing. Data stored on the cloud server may be get corrupted and sometimes even the cloud service provider for his own benefit like for more space on data centre can discard the user data which is not used for a longer time. In order to maintain the integrity of data, the user takes the assistance of a Third Party Auditor (TPA). The TPA checks the integrity of data on user demand and the released audit reports help the user to evaluate the risk of their services. TPA have an experience that user does not have and have capability to check integrity of data which is not easy for the user to check. This paper highlighted the basics of cloud computing, general model and different approaches used for TPA.
  • Thumbnail Image
    Item
    Advance Stable Election Protocol in Wireless Sensor Network
    (Excel India Publishers, 2014) Singh, Mandeep; Sidhu, Navjot
    Wireless sensor network (WSN) is an emerging research field. There are large numbers of sensors that collect and send data to base station. Saving energy by using various routing techniques is a challenge. Clustering is main technique used for this. Various protocols like SEP (Stable Election Protocol) and ESEP (Extended Stable Election Protocol) are clustering based heterogeneous aware protocols. In this paper, a new protocol ASEP (Advance Stable Election Protocol) has been proposed based on SEP. This is based on changing more efficiently and dynamically the cluster head election probability. Performance of this protocol has been evaluated in MATLAB and graphical results have been shown. The performance of ASEP is better than SEP in form of first node dies and total number of packets delivered.
  • Thumbnail Image
    Item
    Security Enhancement in AODV protocol against Network Layer Attacks
    (Excel India Publishers, 2014) Singh, Khushmeet; Kaur, Amanpreet
    A mobile Ad hoc network (MANET) is a wireless decentralized and self-configuring network in which nodes communicate with each other either directly or through intermediate nodes. Each node plays role of both transmitter and receiver. These unique features make MANET suitable for use in various emergency situations. Besides the various advantages, the open medium, rapidly changing topology and lack of centralized monitoring make MANET's vulnerable to different attacks. Hence it is vital to develop some security mechanism to protect MANET from attacks. In this paper performance of AODV Protocol is analyzed in presence of two network layer active attacks namely Blackhole and Malicious packet dropping. In active attack, an attacker disrupts the regular operation of the network, change the data or harm the system. Both these attacks are performed simultaneously on the network. Solution is proposed and simulated to prevent Blackhole attack. Malicious packet dropping attack is prevented by using watchdog intrusion detection system. Both solutions are combined and Performance of AODV and Modified AODV protocol is analysed under both attacks with respect to Packet Delivery Ratio, Average End-to-End Delay and Routing Overhead using NS2.