sandeep bhargava | Suresh Gyan Vihar University (original) (raw)
Uploads
Papers by sandeep bhargava
International Journal of Recent Technology and Engineering (IJRTE) , 2019
Abstract: Evaluation of Internet of Things (IoT) technologies in real life has scaled the enumera... more Abstract: Evaluation of Internet of Things (IoT) technologies in real life has scaled the enumeration of data in huge volumes and that too with high velocity, and thus a new issue has come into picture that is of management & analytics of this BIG IOT STREAM data. In order to optimize the performance of the IoT Machines and services provided by the vendors, industry is giving high priority to analyze this big IoT Stream Data for surviving in the competitive global environment. Thses analysis are done through number of applications using various Data Analytics Framework, which require obtaining the valuable information intelligently from a large amount of real-time produced data. This paper, discusses the challenges and issues faced by distributed stream analytics frameworks at the data processing level and tries to recommend a possible a Scalable Framework to adapt with the volume and velocity of Big IoT Stream Data. Experiments focus on evaluating the performance of three Distributed Stream Analytics Here Analytics frameworks, namely Apache Spark, Splunk and Apache Storm are being evaluated over large steam IoT data on latency & throughput as parameters in respect to concurrency. The outcome of the paper is to find the best possible existing framework and recommend a possible scalable framework.
Steganography refers to the technique of hiding secret messages into media such as text, audio, i... more Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence of steganography. It can be used for the benefit of the mankind to serve us as well as by terrorists and criminals for malicious purposes. Both steganography and steganalysis have received a lot of attention from law enforcement and media. In the past, different steganographic techniques with properties of imperceptibility, undetectability, robustness and capacity have been proposed. Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection. The battle between steganography and steganalysis is never ending. In this paper, we are hiding data using evolutionary computing technique that is enriched with OPAP to enhance the picture quality. Evolutionary techniques are used to increase the robustness of the program and steganalysis techniques are proposed against RS attack.
Previous systems have used data gloves, markers or any other input devices for interaction. Hand ... more Previous systems have used data gloves, markers or any other input devices for interaction. Hand gesture recognition system provides an alternative to interface devices for human computer interaction (HCI). There are several hand gesture recognition techniques are proposed. In this paper various hand gesture recognition techniquesare used for HCI applications and this system is real time system. It will recognize real time hand gestures. In this paper, overviews of various different methods for hand gesture are discussed. It has overview of the system that is completely divided into 3 main steps are segmentation, feature extraction and classification. The features that we are extracted are shape based and used in combination for hand gesture detection. In this, trained and untrained gestures are not used for training and testing respectively and the results yields a robust and efficient hand recognition.
Cloud computing is collection of services and resources offered via internet. Cloud services and ... more Cloud computing is collection of services and resources offered via internet. Cloud services and resources are shared through Internet and similar to services on demand basis. Cloud computing is one of the rapidly growing technology, as it provides high power and better resources while minimizes cost. IT industries had understood the power of cloud computing so most of the IT industries had already adopted it and others are in process to adopt it. But there are a lot of security issues that IT industrialist like to remove before adopting to cloud computing. Main concern over cloud computing is data security and confidentiality. In Recent Survey CSA identified the notorious nine security issues that every cloud computing service vendor should consider. Among them important security issue is internal theft of data. Users or company usually upload their data on cloud system and believes that their data is secure and confidential. But what will happen if some employee of company will steal your data for some reason. File Encryption is a good solution to this problem, but still there are chances of applying brute force attack on data. In this paper I provide a method that will help to provide more secure environment of data storage and reduces the chance of internal theft. By extending zero trust security models we can provide more secure environment and can increase security from internal theft. In my research work, cloud application randomly select encryption algorithm based on user security key and encrypt user data at the time of upload and no information about algorithm selection is saved in database. This approach provides more security to tackle brute force attack.
In modern era there are lots of data mining algorithms which focus on clustering methods. There a... more In modern era there are lots of data mining algorithms which focus on clustering methods. There are also several types of approaches designed for outlier detection. Outliers are those data objects that do not fulfill with the common behavior or model of the data. Many data mining algorithms try to reduce the effects of outliers or remove them all together. We investigated that in many different conditions clusters and outliers whose meanings are connected to each other, especially for those data sets which contains some noise. So it is important to deal clusters and outliers as concepts of the same significance in data analysis. So in this paper we introduce an algorithm which is based on k means [1] for the detection of clusters and outliers that aim to detect the clusters and the outliers in a different view for those data sets which contains some noise. In this algorithm clusters are detected and managed according to the intra-relationship within the clusters and interrelationship between the clusters and the outliers. The whole management and modification of the clusters and outliers are done repeatedly just before a certain termination is reached.
Today world is running behind the computer industries and pattern recognition is one of the impor... more Today world is running behind the computer industries and pattern recognition is one of the important and vast fields of computer intelligence. Gesture recognition is one of the applications of Pattern recognition and further hand gesture recognition; hand gesture recognition system can be used as an interface between human hand and computer. Our technique provides a human hand interface with computer which can recognize static gestures from American Sign Language. Since 24 gestures from American Sign Language (ASL) are static so, we was able to recognize them. Our objective is to develop a hand gesture recognition system which can recognize most of the static characters from ASL with a good accuracy which can only work offline and is mainly dependent on database.
— Cloud computing is promising as a latest feature of widespread distributed computing. Cloud com... more — Cloud computing is promising as a latest feature of widespread distributed computing. Cloud computing is a framework for provide a use of appropriate, on-demand network right to use to a collective pool of computing resources. Load balancing is one of the major and important part in cloud computing which is necessary to share out the dynamic work load across numerous nodes to make sure that no single node is staggered. It helps in most favorable consumption of resources and hence in augmenting the performance of the system. The objective of load balancing is to increase the throughput of the processor. By using virtual machine server balance the load .This determines that when user send request to server, it provide proper throughput to user and zero downtime in order of millisecond. The load balancing criteria have significant influence on the performance, and they can change the behavior of the system. By using this research work basically we can redistribute the work load among different server of the distributed system. .[1]
The concept of data warehouse deals in huge amount of data and lot of analytically queries runs o... more The concept of data warehouse deals in huge amount of data and lot of analytically queries runs on DWH, which covers base data in terms of thousands of gigabytes, to unveil the hidden pattern of business. So response time of query is exponential proportional (metaphorically) to involved base data. So we can say THUMB RULE as "MORE BASE DATE MORE ACCURATE RESULTS". But it will degrade the performance if not taken care properly. Also we, as human, hate to wait due to natural phenomenon encoded in our DNA. Lot of works has been done by many literates around the globe on DWH performance tuning by proposing many frameworks related with various focus data quality, Metadata management etc...
International Journal of Recent Technology and Engineering (IJRTE) , 2019
Abstract: Evaluation of Internet of Things (IoT) technologies in real life has scaled the enumera... more Abstract: Evaluation of Internet of Things (IoT) technologies in real life has scaled the enumeration of data in huge volumes and that too with high velocity, and thus a new issue has come into picture that is of management & analytics of this BIG IOT STREAM data. In order to optimize the performance of the IoT Machines and services provided by the vendors, industry is giving high priority to analyze this big IoT Stream Data for surviving in the competitive global environment. Thses analysis are done through number of applications using various Data Analytics Framework, which require obtaining the valuable information intelligently from a large amount of real-time produced data. This paper, discusses the challenges and issues faced by distributed stream analytics frameworks at the data processing level and tries to recommend a possible a Scalable Framework to adapt with the volume and velocity of Big IoT Stream Data. Experiments focus on evaluating the performance of three Distributed Stream Analytics Here Analytics frameworks, namely Apache Spark, Splunk and Apache Storm are being evaluated over large steam IoT data on latency & throughput as parameters in respect to concurrency. The outcome of the paper is to find the best possible existing framework and recommend a possible scalable framework.
Steganography refers to the technique of hiding secret messages into media such as text, audio, i... more Steganography refers to the technique of hiding secret messages into media such as text, audio, image and video without any suspicion, while steganalysis is the art and science of detection of the presence of steganography. It can be used for the benefit of the mankind to serve us as well as by terrorists and criminals for malicious purposes. Both steganography and steganalysis have received a lot of attention from law enforcement and media. In the past, different steganographic techniques with properties of imperceptibility, undetectability, robustness and capacity have been proposed. Newer and more sophisticated steganographic techniques for embedding secret message will require more powerful steganalysis methods for detection. The battle between steganography and steganalysis is never ending. In this paper, we are hiding data using evolutionary computing technique that is enriched with OPAP to enhance the picture quality. Evolutionary techniques are used to increase the robustness of the program and steganalysis techniques are proposed against RS attack.
Previous systems have used data gloves, markers or any other input devices for interaction. Hand ... more Previous systems have used data gloves, markers or any other input devices for interaction. Hand gesture recognition system provides an alternative to interface devices for human computer interaction (HCI). There are several hand gesture recognition techniques are proposed. In this paper various hand gesture recognition techniquesare used for HCI applications and this system is real time system. It will recognize real time hand gestures. In this paper, overviews of various different methods for hand gesture are discussed. It has overview of the system that is completely divided into 3 main steps are segmentation, feature extraction and classification. The features that we are extracted are shape based and used in combination for hand gesture detection. In this, trained and untrained gestures are not used for training and testing respectively and the results yields a robust and efficient hand recognition.
Cloud computing is collection of services and resources offered via internet. Cloud services and ... more Cloud computing is collection of services and resources offered via internet. Cloud services and resources are shared through Internet and similar to services on demand basis. Cloud computing is one of the rapidly growing technology, as it provides high power and better resources while minimizes cost. IT industries had understood the power of cloud computing so most of the IT industries had already adopted it and others are in process to adopt it. But there are a lot of security issues that IT industrialist like to remove before adopting to cloud computing. Main concern over cloud computing is data security and confidentiality. In Recent Survey CSA identified the notorious nine security issues that every cloud computing service vendor should consider. Among them important security issue is internal theft of data. Users or company usually upload their data on cloud system and believes that their data is secure and confidential. But what will happen if some employee of company will steal your data for some reason. File Encryption is a good solution to this problem, but still there are chances of applying brute force attack on data. In this paper I provide a method that will help to provide more secure environment of data storage and reduces the chance of internal theft. By extending zero trust security models we can provide more secure environment and can increase security from internal theft. In my research work, cloud application randomly select encryption algorithm based on user security key and encrypt user data at the time of upload and no information about algorithm selection is saved in database. This approach provides more security to tackle brute force attack.
In modern era there are lots of data mining algorithms which focus on clustering methods. There a... more In modern era there are lots of data mining algorithms which focus on clustering methods. There are also several types of approaches designed for outlier detection. Outliers are those data objects that do not fulfill with the common behavior or model of the data. Many data mining algorithms try to reduce the effects of outliers or remove them all together. We investigated that in many different conditions clusters and outliers whose meanings are connected to each other, especially for those data sets which contains some noise. So it is important to deal clusters and outliers as concepts of the same significance in data analysis. So in this paper we introduce an algorithm which is based on k means [1] for the detection of clusters and outliers that aim to detect the clusters and the outliers in a different view for those data sets which contains some noise. In this algorithm clusters are detected and managed according to the intra-relationship within the clusters and interrelationship between the clusters and the outliers. The whole management and modification of the clusters and outliers are done repeatedly just before a certain termination is reached.
Today world is running behind the computer industries and pattern recognition is one of the impor... more Today world is running behind the computer industries and pattern recognition is one of the important and vast fields of computer intelligence. Gesture recognition is one of the applications of Pattern recognition and further hand gesture recognition; hand gesture recognition system can be used as an interface between human hand and computer. Our technique provides a human hand interface with computer which can recognize static gestures from American Sign Language. Since 24 gestures from American Sign Language (ASL) are static so, we was able to recognize them. Our objective is to develop a hand gesture recognition system which can recognize most of the static characters from ASL with a good accuracy which can only work offline and is mainly dependent on database.
— Cloud computing is promising as a latest feature of widespread distributed computing. Cloud com... more — Cloud computing is promising as a latest feature of widespread distributed computing. Cloud computing is a framework for provide a use of appropriate, on-demand network right to use to a collective pool of computing resources. Load balancing is one of the major and important part in cloud computing which is necessary to share out the dynamic work load across numerous nodes to make sure that no single node is staggered. It helps in most favorable consumption of resources and hence in augmenting the performance of the system. The objective of load balancing is to increase the throughput of the processor. By using virtual machine server balance the load .This determines that when user send request to server, it provide proper throughput to user and zero downtime in order of millisecond. The load balancing criteria have significant influence on the performance, and they can change the behavior of the system. By using this research work basically we can redistribute the work load among different server of the distributed system. .[1]
The concept of data warehouse deals in huge amount of data and lot of analytically queries runs o... more The concept of data warehouse deals in huge amount of data and lot of analytically queries runs on DWH, which covers base data in terms of thousands of gigabytes, to unveil the hidden pattern of business. So response time of query is exponential proportional (metaphorically) to involved base data. So we can say THUMB RULE as "MORE BASE DATE MORE ACCURATE RESULTS". But it will degrade the performance if not taken care properly. Also we, as human, hate to wait due to natural phenomenon encoded in our DNA. Lot of works has been done by many literates around the globe on DWH performance tuning by proposing many frameworks related with various focus data quality, Metadata management etc...