Amit Sahu - Academia.edu (original) (raw)

Papers by Amit Sahu

Research paper thumbnail of Wireless Sensor Network Security

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012

Research paper thumbnail of Analysis of Phase Noise and Gaussian Noise in terms of Average BER for DP 16-QAM Optical Coherent Receiver Using Digital Filters

1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and ... more 1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior,India 2Asssociate Professor, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The proposed paper utilized the concept of Coherent detection. A field received by advances in Digital Signal Processing (DSP), has renewed interest in optical communication systems with spectrally efficient modulation formats. Phase Noise and Gaussian Noise has been analyzed in terms of Average Bit Error Rate (BER) and Optical Signal to Noise Ratio (OSNR). OSNR component is used in order to introduce noise in the dual polarization Quadrature Amplitude Modulation (DP 16-QAM) optical coherent receiver system. The Noise is analyzed under the influence of different filters. Finally the best...

Research paper thumbnail of A Review on Enhancing Privacy Preservation of Web Service through Negotiation Mechanism

Web service composition is a web technology which is use for combining the information from multi... more Web service composition is a web technology which is use for combining the information from multiple sources into single application. This technique provides a special type of composition application that aims at integrating data from multiple data provider depending on user request. DaaS depend on the specified useful data can be supplied according to the user demand. The main use of DaaS is eliminating redundancy and reduces associated expenditures. It modifies the data via single update point for multiple users. This paper proposes a formal privacy model in order to extend DaaS description with privacy capabilities. DaaS composition approach allowing to verify the compatibilities between privacy requirements and policies in DaaS composition.

Research paper thumbnail of Survey on Speech Recognization Techniques . ( Natural Language Processing )

Natural Language Processing is a technique where machine can become more human and thereby reduci... more Natural Language Processing is a technique where machine can become more human and thereby reducing the distance between human being and the machine can be reduced. Therefore in simple sense NLP makes human to communicate with the machine easily. There are many applications developed in past few decades in NLP. Spoken language recognition refers to the automatic process through which we determine or verify the identity of the language spoken in a speech sample. And these are very useful in everyday life for example a machine that takes instructions by voice. Humans are born with the ability of discrimination to discriminate between spoken languages as part of human intelligence There are lots of research groups working on this topic to develop more practical are useful systems. Natural Language Processing holds great promise for making computer interfaces that are easier to use for people, since people will hopefully be able to talk to the computer in their own language, rather than...

Research paper thumbnail of Comparative analysis of DP QPSK and DP 16-QAM Optical Coherent receiver, with taking in view the best analyses of the phase noise in terms of average BER using Digital Filters

1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and ... more 1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior,India 2Asssociate Professor, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The proposed paper utilized the concept of Coherent detection. A field received by advances in Digital Signal Processing (DSP), has renewed interest in optical communication systems with spectrally efficient modulation formats. Starting with the point of view in comparison between the DP QPSK and DP 16-QAM analyses of Phase Noise in terms of Average Bit Error Rate (BER) and Optical Signal to Noise Ratio (OSNR) has been done. OSNR component is used in order to introduce noise in the dual polarization Optical coherent receiver system. The Noise is analyzed under the influence of different ...

Research paper thumbnail of Enhancing Privacy Preservation of WebService through Negotiation Mechanism

International Journal of Innovative Research in Computer and Communication Engineering, 2015

Web service composition is a web technology which is use for combining the information from multi... more Web service composition is a web technology which is use for combining the information from multiple sources into single application. With the help of this web service we can collected the large amount of data. Web Service is a technique provides a special type of composition application that aims at integrating data from multiple data provider depending on user request. DaaS depend on the specified useful data can be supplied according to the user demand. The main use of DaaS is eliminating redundancy and reduces associated expenditures. It modifies the data via single update point for multiple users. This paper proposes a formal privacy model in order to extend DaaS description with privacy capabilities. DaaS composition approach allowing verifying the compatibilities between privacy requirements and policies in DaaS composition.

Research paper thumbnail of Therapeutic Decisions Making System Using Data Mining Techniques: A Review

Medical prognosis has played an increasing role in health, namely in the critical care medicine. ... more Medical prognosis has played an increasing role in health, namely in the critical care medicine. These factors have induced the medical community to take a more active interest in developing models for mortality prediction based on Artificial Intelligence (AI) techniques [1]. that make possible the doctors pro-active action. In this context, the existence of large Databases (DB) containing Intensive Care Units (ICU) clinical information, motivate and enable the application of Data Mining (DM) techniques, in a Knowledge Discovery Database process (KDD). to induce prediction models of organ failure in a much more efficient way than other approaches (e.g.. Logistic Regr es sion) [2]. Clinical guidelines carry medical evidence to the point of practice. As evidence is not always available, many guidelines do not provide recommendations for all clinical situations encountered in practice. We propose a decisions making system for exploring physicians' therapeutic decisions with data mi...

Research paper thumbnail of Data Mining Techniques in Association Rule : A Review

Data mining may be seen as the extraction of data and display from wanted information for specifi... more Data mining may be seen as the extraction of data and display from wanted information for specific process intended to searching information. There are different systems, tools and software’s which are used to extract a relative data from a specific group of data. The greater part of data mining methods can manage distinctive information sorts. The paper gives a review and relative study on a percentage of the most widely data mining techniques being used today in normal life and commercial business. KeywordsData mining, Knowledge management, Data mining techniques, Data mining applications.

Research paper thumbnail of Character Recognition Technique using Neural Network

Character Recognition (CR) has been extensively studied in the last half century and progressed t... more Character Recognition (CR) has been extensively studied in the last half century and progressed to a level, sufficient to produce technology driven applications. The preprocessing of characters comprises bounding of characters for translation invariance and normalization of characters for size invariance. Now, the rapidly growing computational power enables the implementation of the present CR methodologies and also creates an increasing demand on many emerging application domains, which require more advanced methodologies. In this paper an attempt is made to develop neural network strategies for the isolated. Handwritten English characters (A to Z. a to z). The preprocessing of characters comprises bounding of characters for translation invariance and normalization of characters for size invariance. First, an overview of CR systems and their evolution over time is presented. Then, the available CR techniques with their superiorities and weaknesses are reviewed. Finally, the current...

Research paper thumbnail of Abstracts In Infrared Image Enhancement using Wavelet

Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SH... more Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images.

Research paper thumbnail of Security in Data Storage and Transmission in Cloud Computing

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the ... more Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the cloud, the data is transferred among the server and client. High speed is the important issue in networking. Cloud security is the current discussion in the IT world. This research paper helps in securing the data without affecting the network layers and protecting the data from unauthorized entries into the server, the data is secured in server based on users’ choice of security method so that data is given high secure priority. Cloud Computing has been fancied as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well unde...

Research paper thumbnail of Infrared Image Enhancement Using Wavelet Transform

In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial ... more In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images. Keywords: Infrard Images, Additive Wavelet transform, Homomorphic Image Enhancement,

Research paper thumbnail of Infrared Image Enhancement Using Wavelet Transform

Computer Engineering and Intelligent Systems, Feb 28, 2012

In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial ... more In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images.

Research paper thumbnail of Host-Virus Interaction: Role of miRNA and Bioinformatics Tools for miRNA Target Prediction

Advances in Animal and Veterinary Sciences, 2015

M icroRNAs (miRNAs or miRs) are the small, non-coding, regulatory, functional and endogenously pr... more M icroRNAs (miRNAs or miRs) are the small, non-coding, regulatory, functional and endogenously produced RNA molecules of approximately 22 nucleotide in length and mediate gene expression post-transcriptionally (

Research paper thumbnail of Therapeutic Decisions Making System Using Data Mining  Techniques: A Review

Medical prognosis has played an increasing role in health, namely in the critical care medicine. ... more Medical prognosis has played an increasing role in health, namely in the critical care medicine. These factors have induced the medical community to take a more active interest in developing models for mortality prediction based on Artificial Intelligence (AI) techniques . that make possible the doctors pro-active action. In this context, the existence of large Databases (DB) containing Intensive Care Units (ICU) clinical information, motivate and enable the application of Data Mining (DM) techniques, in a Knowledge Discovery Database process (KDD). to induce prediction models of organ failure in a much more efficient way than other approaches (e.g.. Logistic Regr es sion) . Clinical guidelines carry medical evidence to the point of practice. As evidence is not always available, many guidelines do not provide recommendations for all clinical situations encountered in practice. We propose a decisions making system for exploring physicians' therapeutic decisions with data mining techniques to fill knowledge gaps. The various data mining techniques are explored in this paper for the proposed system

Research paper thumbnail of Ijcsit2014050148

Data mining may be seen as the extraction of data and display from wanted information for specifi... more Data mining may be seen as the extraction of data and display from wanted information for specific process intended to searching information. There are different systems, tools and software's which are used to extract a relative data from a specific group of data. The greater part of data mining methods can manage distinctive information sorts. The paper gives a review and relative study on a percentage of the most widely data mining techniques being used today in normal life and commercial business.

Research paper thumbnail of Wireless Sensor Network Security

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2012

Research paper thumbnail of Analysis of Phase Noise and Gaussian Noise in terms of Average BER for DP 16-QAM Optical Coherent Receiver Using Digital Filters

1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and ... more 1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior,India 2Asssociate Professor, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The proposed paper utilized the concept of Coherent detection. A field received by advances in Digital Signal Processing (DSP), has renewed interest in optical communication systems with spectrally efficient modulation formats. Phase Noise and Gaussian Noise has been analyzed in terms of Average Bit Error Rate (BER) and Optical Signal to Noise Ratio (OSNR). OSNR component is used in order to introduce noise in the dual polarization Quadrature Amplitude Modulation (DP 16-QAM) optical coherent receiver system. The Noise is analyzed under the influence of different filters. Finally the best...

Research paper thumbnail of A Review on Enhancing Privacy Preservation of Web Service through Negotiation Mechanism

Web service composition is a web technology which is use for combining the information from multi... more Web service composition is a web technology which is use for combining the information from multiple sources into single application. This technique provides a special type of composition application that aims at integrating data from multiple data provider depending on user request. DaaS depend on the specified useful data can be supplied according to the user demand. The main use of DaaS is eliminating redundancy and reduces associated expenditures. It modifies the data via single update point for multiple users. This paper proposes a formal privacy model in order to extend DaaS description with privacy capabilities. DaaS composition approach allowing to verify the compatibilities between privacy requirements and policies in DaaS composition.

Research paper thumbnail of Survey on Speech Recognization Techniques . ( Natural Language Processing )

Natural Language Processing is a technique where machine can become more human and thereby reduci... more Natural Language Processing is a technique where machine can become more human and thereby reducing the distance between human being and the machine can be reduced. Therefore in simple sense NLP makes human to communicate with the machine easily. There are many applications developed in past few decades in NLP. Spoken language recognition refers to the automatic process through which we determine or verify the identity of the language spoken in a speech sample. And these are very useful in everyday life for example a machine that takes instructions by voice. Humans are born with the ability of discrimination to discriminate between spoken languages as part of human intelligence There are lots of research groups working on this topic to develop more practical are useful systems. Natural Language Processing holds great promise for making computer interfaces that are easier to use for people, since people will hopefully be able to talk to the computer in their own language, rather than...

Research paper thumbnail of Comparative analysis of DP QPSK and DP 16-QAM Optical Coherent receiver, with taking in view the best analyses of the phase noise in terms of average BER using Digital Filters

1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and ... more 1Student, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior,India 2Asssociate Professor, Dept. of Electronics and Communication Engineering, Madhav Institute of Technology and Science, Gwalior, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The proposed paper utilized the concept of Coherent detection. A field received by advances in Digital Signal Processing (DSP), has renewed interest in optical communication systems with spectrally efficient modulation formats. Starting with the point of view in comparison between the DP QPSK and DP 16-QAM analyses of Phase Noise in terms of Average Bit Error Rate (BER) and Optical Signal to Noise Ratio (OSNR) has been done. OSNR component is used in order to introduce noise in the dual polarization Optical coherent receiver system. The Noise is analyzed under the influence of different ...

Research paper thumbnail of Enhancing Privacy Preservation of WebService through Negotiation Mechanism

International Journal of Innovative Research in Computer and Communication Engineering, 2015

Web service composition is a web technology which is use for combining the information from multi... more Web service composition is a web technology which is use for combining the information from multiple sources into single application. With the help of this web service we can collected the large amount of data. Web Service is a technique provides a special type of composition application that aims at integrating data from multiple data provider depending on user request. DaaS depend on the specified useful data can be supplied according to the user demand. The main use of DaaS is eliminating redundancy and reduces associated expenditures. It modifies the data via single update point for multiple users. This paper proposes a formal privacy model in order to extend DaaS description with privacy capabilities. DaaS composition approach allowing verifying the compatibilities between privacy requirements and policies in DaaS composition.

Research paper thumbnail of Therapeutic Decisions Making System Using Data Mining Techniques: A Review

Medical prognosis has played an increasing role in health, namely in the critical care medicine. ... more Medical prognosis has played an increasing role in health, namely in the critical care medicine. These factors have induced the medical community to take a more active interest in developing models for mortality prediction based on Artificial Intelligence (AI) techniques [1]. that make possible the doctors pro-active action. In this context, the existence of large Databases (DB) containing Intensive Care Units (ICU) clinical information, motivate and enable the application of Data Mining (DM) techniques, in a Knowledge Discovery Database process (KDD). to induce prediction models of organ failure in a much more efficient way than other approaches (e.g.. Logistic Regr es sion) [2]. Clinical guidelines carry medical evidence to the point of practice. As evidence is not always available, many guidelines do not provide recommendations for all clinical situations encountered in practice. We propose a decisions making system for exploring physicians' therapeutic decisions with data mi...

Research paper thumbnail of Data Mining Techniques in Association Rule : A Review

Data mining may be seen as the extraction of data and display from wanted information for specifi... more Data mining may be seen as the extraction of data and display from wanted information for specific process intended to searching information. There are different systems, tools and software’s which are used to extract a relative data from a specific group of data. The greater part of data mining methods can manage distinctive information sorts. The paper gives a review and relative study on a percentage of the most widely data mining techniques being used today in normal life and commercial business. KeywordsData mining, Knowledge management, Data mining techniques, Data mining applications.

Research paper thumbnail of Character Recognition Technique using Neural Network

Character Recognition (CR) has been extensively studied in the last half century and progressed t... more Character Recognition (CR) has been extensively studied in the last half century and progressed to a level, sufficient to produce technology driven applications. The preprocessing of characters comprises bounding of characters for translation invariance and normalization of characters for size invariance. Now, the rapidly growing computational power enables the implementation of the present CR methodologies and also creates an increasing demand on many emerging application domains, which require more advanced methodologies. In this paper an attempt is made to develop neural network strategies for the isolated. Handwritten English characters (A to Z. a to z). The preprocessing of characters comprises bounding of characters for translation invariance and normalization of characters for size invariance. First, an overview of CR systems and their evolution over time is presented. Then, the available CR techniques with their superiorities and weaknesses are reviewed. Finally, the current...

Research paper thumbnail of Abstracts In Infrared Image Enhancement using Wavelet

Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SH... more Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images.

Research paper thumbnail of Security in Data Storage and Transmission in Cloud Computing

Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the ... more Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the cloud, the data is transferred among the server and client. High speed is the important issue in networking. Cloud security is the current discussion in the IT world. This research paper helps in securing the data without affecting the network layers and protecting the data from unauthorized entries into the server, the data is secured in server based on users’ choice of security method so that data is given high secure priority. Cloud Computing has been fancied as the next generation architecture of IT Enterprise. In contrast to traditional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This unique attribute, however, poses many new security challenges which have not been well unde...

Research paper thumbnail of Infrared Image Enhancement Using Wavelet Transform

In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial ... more In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images. Keywords: Infrard Images, Additive Wavelet transform, Homomorphic Image Enhancement,

Research paper thumbnail of Infrared Image Enhancement Using Wavelet Transform

Computer Engineering and Intelligent Systems, Feb 28, 2012

In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial ... more In Infrared Image Enhancement using Wavelet Transform, two enhancement algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) have been given for enhancement of the far infrared images based upon a far infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. In this dissertation work an additive wavelet transform will be proposed for enhancement and filtration of homomorphic infrared images.

Research paper thumbnail of Host-Virus Interaction: Role of miRNA and Bioinformatics Tools for miRNA Target Prediction

Advances in Animal and Veterinary Sciences, 2015

M icroRNAs (miRNAs or miRs) are the small, non-coding, regulatory, functional and endogenously pr... more M icroRNAs (miRNAs or miRs) are the small, non-coding, regulatory, functional and endogenously produced RNA molecules of approximately 22 nucleotide in length and mediate gene expression post-transcriptionally (

Research paper thumbnail of Therapeutic Decisions Making System Using Data Mining  Techniques: A Review

Medical prognosis has played an increasing role in health, namely in the critical care medicine. ... more Medical prognosis has played an increasing role in health, namely in the critical care medicine. These factors have induced the medical community to take a more active interest in developing models for mortality prediction based on Artificial Intelligence (AI) techniques . that make possible the doctors pro-active action. In this context, the existence of large Databases (DB) containing Intensive Care Units (ICU) clinical information, motivate and enable the application of Data Mining (DM) techniques, in a Knowledge Discovery Database process (KDD). to induce prediction models of organ failure in a much more efficient way than other approaches (e.g.. Logistic Regr es sion) . Clinical guidelines carry medical evidence to the point of practice. As evidence is not always available, many guidelines do not provide recommendations for all clinical situations encountered in practice. We propose a decisions making system for exploring physicians' therapeutic decisions with data mining techniques to fill knowledge gaps. The various data mining techniques are explored in this paper for the proposed system

Research paper thumbnail of Ijcsit2014050148

Data mining may be seen as the extraction of data and display from wanted information for specifi... more Data mining may be seen as the extraction of data and display from wanted information for specific process intended to searching information. There are different systems, tools and software's which are used to extract a relative data from a specific group of data. The greater part of data mining methods can manage distinctive information sorts. The paper gives a review and relative study on a percentage of the most widely data mining techniques being used today in normal life and commercial business.