Ashok Kumar Yadav - Academia.edu (original) (raw)

Papers by Ashok Kumar Yadav

Research paper thumbnail of A Mathematical Model of Single Species Tree

International Journal of Trend in Scientific Research and Development, 2020

Presented herein are the studies of growth of single species trees. The parameters specifiedߙ , ‫... more Presented herein are the studies of growth of single species trees. The parameters specifiedߙ , ‫ݔ‬ , ݇ ܽ݊݀ ‫.ݐ‬ It has been observed that the increases of k, increase the single species tree. Again it has been observed increases the time increase the number of single species tree.

Research paper thumbnail of Enhanced Mobility Management Model for Mobile Communications

Springer eBooks, Aug 2, 2020

Providing anytime anywhere roaming along with maximizing quality of service (QoS) is one of cruci... more Providing anytime anywhere roaming along with maximizing quality of service (QoS) is one of crucial challenges in mobile communication. Accomplishing ongoing transaction during roaming of users is the challenge for researchers. High roaming behavior of mobile hosts (MH) may degrade the performance, efficiency and reliability of mobile communication system. Frequently generated handover requests may fail due to scarcity of free available channels in the next coming base station. To enhance the performance, efficiency and reliability of the mobile commerce systems, we have combined the GE/GE/C/N/FCFS and GE/GE/C/N/PR priority queuing mechanism to improve the performance in terms of HTR drop rate, NTR blocking rate, mean queue length of incoming requests and channel utilization.

Research paper thumbnail of Secure Blockchain with the Internet of Things(S-BIoT) for Modern World Applications

Lecture notes in mechanical engineering, 2021

Research paper thumbnail of A comprehensive survey of state-of-art techniques in digital watermarking

2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Dec 16, 2022

Research paper thumbnail of A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategy

Multimedia Tools and Applications

Research paper thumbnail of A Double Layered Auction Technique for Cloud Data Channel Allocation

2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)

Research paper thumbnail of Edge Computing in Centralized Data Server Deployment for Network Qos and Latency Improvement for Virtualization Environment

International Journal of Communication Networks and Information Security (IJCNIS)

With the advancement of Internet of Things (IoT), the network devices seem to be raising, and the... more With the advancement of Internet of Things (IoT), the network devices seem to be raising, and the cloud data centre load also raises; certain delay-sensitive services are not responded to promptly which leads to a reduced quality of service (QoS). The technique of resource estimation could offer the appropriate source for users through analyses of load of resource itself. Thus, the prediction of resource QoS was important to user fulfillment and task allotment in edge computing. This study develops a new manta ray foraging optimization with backpropagation neural network (MRFO-BPNN) model for resource estimation using quality of service (QoS) in the edge computing platform. Primarily, the MRFO-BPNN model makes use of BPNN algorithm for the estimation of resources in edge computing. Besides, the parameters relevant to the BPNN model are adjusted effectually by the use of MRFO algorithm. Moreover, an objective function is derived for the MRFO algorithm for the investigation of load st...

Research paper thumbnail of A Novel Approach of Object Detection using Deep Learning for Animal Safety

2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2022

This paper uses convolutional neural networks (CNN) algorithm to detect animals. Four different O... more This paper uses convolutional neural networks (CNN) algorithm to detect animals. Four different Object Detection frameworks are implemented and compared their performance with our novel approach. Many algorithms of convolutional neural networks like RCNN, Faster RCNN, Single Shot detection, YOLOv3 are used in object detection tasks are compared. A customized Faster RCNN is designed with anchor manipulations This framework is found to be best suited technique for Animal Detection System giving the best time-accuracy trade-off. Experimental results shows that this method has reduced the best inference time significantly.

Research paper thumbnail of An Additive Watermarking Technique In Gray Scale Images Using Discrete Wavelet Transformation And Its Analysis On Watermark Strength

Digital Watermarking is a procedure to prevent the unauthorized access and modification of person... more Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data<em>.</em> It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the waterma...

Research paper thumbnail of Downlink Performance Improvement Using Base Station Cooperation for Multicell Cellular Networks

In this paper, we consider the multicell network which consists of several mobile stations (user ... more In this paper, we consider the multicell network which consists of several mobile stations (user terminal) and Base Stations (BSs) with multiple antennas at both BSs and user terminal respectively with random BS cooperation. We consider the cell interior users and use the rectangular and polar coordinate to calculate the distance of users from their home cell. Also, path loss model with distance-dependent is used for signal propagation. We use the BS cooperation scheme to the homogeneous multicell network and observe that BS cooperation also improves the downlink cell interior performance in the context spectral efficiency. BS cooperation is a scheme which improves the downlink Signal to Interference plus noise ratio (SINR) by canceling the Inter Cell Interference (ICI) for multi-cell cellular network. Further, it is noted that Coordinated Multipoint (CoMP) improves the system work. Showing the result of simulation, the cell interior SINR and channel capacity at various positions in...

Research paper thumbnail of Analysis on Mobile Cloud Security and Comparison of Existing Models

Indian Journal of Computer Science and Engineering, 2021

The explosive emergence of Cloud Computing and its services are now everywhere in the World and i... more The explosive emergence of Cloud Computing and its services are now everywhere in the World and it is one of the well-known technologies that we are using for both research and development activities nowadays. As small and medium organizations or companies are moving to Cloud Computing because as it supports rapid access to their applications and limits the cost of infrastructure. Cloud Computing for mobiles refers to Mobile Cloud Computing (MCC) as it is the collection of Mobile Computing and Cloud Computing to get one of the industry trend words and the major threads in the IT world since 2009. As business is growing using the computational resources on a pay as you go Model. This paper highlights the benefits and modern MCC uses and issues of MCC are briefly explained and also the security mechanism. MCC is investigating immense in IT due to anyplace whenever information gets to. Cell phones are empowered with rich client experience particularly, smartphones. Apple, Google, Facebook, and Amazon are the main four horsemen in the mobile world. That is the reason versatile distributed computing innovation is developing quickly among the clients and simultaneously, it presents new security dangers moreover. In MCC, a great deal of examinations is being done to annihilate the issues to make IT more solid and secure because all the more valuable information is put away in the Cloud condition. As the Internet-empowered cell phones, tablets keep on developing, online noxious dangers will keep on expanding in number to make more mind-boggling. Making sure information is more basic in the Mobile Cloud environment. In this paper, the working ideas of MCC and its different security issues and arrangements are given by analysts are broke down and also compare with different models.

Research paper thumbnail of A Paper on Group Data Exchange in Cloud Computing

The sharing of data in cloud computing allows multiple participants to freely share group data, i... more The sharing of data in cloud computing allows multiple participants to freely share group data, improving efficiency and broad potential applications in co-operative environments. Nonetheless, it is daunting challenges how to ensure the security of data sharing in a company and how to transfer outsourced knowledge effectively. Note that key agreement protocols have played a very important role in secure and efficient group data sharing in cloud computing. Block Designbased Key Agreement for Group Data Sharing in Cloud Computing. In this article, a new block design cantered main arrangement, which assisted multiple participants, by using the symmetrical balanced incomplete block design (SBIBD), which allows the number of participants in the cloud environment to be expanded in a flexible way according to the block design structure. General formulas for creating a popular conference core K for several participants cantered on the suggested community data sharing model. It should be rem...

Research paper thumbnail of HPC as a Service on Cloud: A Market Oriented Approach

International Journal of Advance Research and Innovative Ideas in Education, 2016

Cloud is a latest technology used in most of enterprise. Every enterprise is moving towards the c... more Cloud is a latest technology used in most of enterprise. Every enterprise is moving towards the cloud platform. On the other hand High Performance Computing (HPC) is a necessity for many industries for their data analytics or huge computations tasks. HPC needed large set of resources so, all enterprises cannot afford supercomputers. HPC as a service (HPCaaS) can deal with these issues. Moving towards HPC systems on the cloud environment is cost effective for small scale industry. Costing is major area in HPC as a service on cloud. This paper addresses some issues and challenges. This paper provides solution for one of these problems as a costing model for HPC as a Services on the cloud environment so that it will enable the small organization to have their own HPC systems at the low costs.

Research paper thumbnail of SDN Control Plan Security in Cloud Computing Again DDOS Attack

International Journal of Advance Research and Innovative Ideas in Education, 2016

In Software Defined Networking a Denial-of- Service (DoS) or Distributed Denial-of- Service (DDoS... more In Software Defined Networking a Denial-of- Service (DoS) or Distributed Denial-of- Service (DDoS) attack is an attempt to make a machine or network resources unreachable for its particular users.so, the require for security of such network controller against attacks from within or outside a network is very more important. Although network devices in OpenFlow can also be targeted by attackers and so required a Defense mechanism to avoid problems in smooth packet forwarding attack. SDN Give the Functionality to Overcome DDoS Attack use Control plan and data plan. Also, they manage the network use SDN controller to monitor network. SDN network flexibility provides they interface OpenFlow and switches network by Mininet. That all are merge to single centralized control point.

Research paper thumbnail of Significance and Impact of Blockchain Technology in Education System

Advances in Mechanical Engineering, 2021

Research paper thumbnail of Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises

Advances in Data Mining and Database Management, 2021

Unprecedented advancement in wireless technology, storage, and computing power of portable device... more Unprecedented advancement in wireless technology, storage, and computing power of portable devices with the gigabyte speed of internet connectivity enables the possibility of communication among machine to machine. IoT has a different way to connect many nodes simultaneously to store, access, and share the information to improve the quality of life by the elimination of the involvement of human. Irrespective of unlimited benefit, IoT has so many issues that arise to eclipse IoT in reality because of its centralized model. Scalability, reliability, privacy, and security challenges are rising because of the huge numbers of IoT nodes, centralized architecture, and complex networks. Centralized architecture may lead to problems like a single point of failure, single way traffic, huge infrastructure cost, privacy, security, and single source of trust. Therefore, to overcome the issues of the centralized infrastructure of the IoT, the authors diverted to decentralized infrastructure. It m...

Research paper thumbnail of An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain

Multimedia Tools and Applications, 2020

A novel adaptive gray scale image watermarking approach based on the combination of machine learn... more A novel adaptive gray scale image watermarking approach based on the combination of machine learning (ML) algorithms in wavelet domain is presented. Based upon fuzzy entropy information, non-overlapping and significant regions are selected. Lifting wavelet transform (LWT) is performed on selected significant regions in order to obtain low frequency sub band and underwent through the QR factorization. Prominent low frequency features of each region are supplied as input features for the training purpose of Lagrangian twin support vector regression (LTSVR) model. Then the optimal value of watermark scaling factor (strength) obtained using genetic algorithm (GA) is used to embed the watermark in the test data of output wavelet coefficient obtained by trained LTSVR. Arnold transformation is performed for the security of watermark along with the imperceptibility and robustness. The experimental results as well as the comparison between traditional methods and the proposed one showed a significant improvement in robustness in terms of image processing attacks which makes it suitable for implementing copyright protection applications.

Research paper thumbnail of Redundancy Avoiding Algorithm in Network

International Journal of Computer Theory and Engineering, 2018

Computer connects to the internet with single path, does not more reliable because many problems ... more Computer connects to the internet with single path, does not more reliable because many problems occur such as cable cutting device fail etc. For finding more reliable, we need two or more paths between switches. Multiple path between two system is insure that more reliable. But occurs a problem that is redundancy problem and creates a cycle. According to switch concept data move between two systems continuously, for this activity switch work very slow or shutdown. We can remove this problem using a bridge protocol data unit concept. In which easily finds the cycle in a network or not. If a cycle between switch devices so need to remove the cycle. We use new spanning tree avoiding algorithms which break the cycle and improve the efficiency of the network.

Research paper thumbnail of Color Sorting Based on Internet of Things

International Journal of Computer Sciences and Engineering, 2018

Research paper thumbnail of Indian Test Facility (INTF) and its updates

Journal of Physics: Conference Series, 2017

To characterize ITER Diagnostic Neutral Beam (DNB) system with full specification and to support ... more To characterize ITER Diagnostic Neutral Beam (DNB) system with full specification and to support IPR's negative ion beam based neutral beam injector (NBI) system development program, a R&D facility, named INTF is under commissioning phase. Implementation of a successful DNB at ITER requires several challenges need to be overcome. These issues are related to the negative ion production, its neutralization and corresponding neutral beam transport over the path lengths of ~ 20.67 m to reach ITER plasma. DNB is a procurement package for INDIA, as an in-kind contribution to ITER. Since ITER is considered as a nuclear facility, minimum diagnostic systems, linked with safe operation of the machine are planned to be incorporated in it and so there is difficulty to characterize DNB after onsite commissioning. Therefore, the delivery of DNB to ITER will be benefited if DNB is operated and characterized prior to onsite commissioning. INTF has been envisaged to be operational with the large size ion source activities in the similar timeline, as with the SPIDER (RFX, Padova) facility. This paper describes some of the development updates of the facility.

Research paper thumbnail of A Mathematical Model of Single Species Tree

International Journal of Trend in Scientific Research and Development, 2020

Presented herein are the studies of growth of single species trees. The parameters specifiedߙ , ‫... more Presented herein are the studies of growth of single species trees. The parameters specifiedߙ , ‫ݔ‬ , ݇ ܽ݊݀ ‫.ݐ‬ It has been observed that the increases of k, increase the single species tree. Again it has been observed increases the time increase the number of single species tree.

Research paper thumbnail of Enhanced Mobility Management Model for Mobile Communications

Springer eBooks, Aug 2, 2020

Providing anytime anywhere roaming along with maximizing quality of service (QoS) is one of cruci... more Providing anytime anywhere roaming along with maximizing quality of service (QoS) is one of crucial challenges in mobile communication. Accomplishing ongoing transaction during roaming of users is the challenge for researchers. High roaming behavior of mobile hosts (MH) may degrade the performance, efficiency and reliability of mobile communication system. Frequently generated handover requests may fail due to scarcity of free available channels in the next coming base station. To enhance the performance, efficiency and reliability of the mobile commerce systems, we have combined the GE/GE/C/N/FCFS and GE/GE/C/N/PR priority queuing mechanism to improve the performance in terms of HTR drop rate, NTR blocking rate, mean queue length of incoming requests and channel utilization.

Research paper thumbnail of Secure Blockchain with the Internet of Things(S-BIoT) for Modern World Applications

Lecture notes in mechanical engineering, 2021

Research paper thumbnail of A comprehensive survey of state-of-art techniques in digital watermarking

2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N), Dec 16, 2022

Research paper thumbnail of A new data hiding model based on adaptive keyed Huffman multi-layer midpoint folding and optimized deep wavelet histogram modification strategy

Multimedia Tools and Applications

Research paper thumbnail of A Double Layered Auction Technique for Cloud Data Channel Allocation

2022 International Interdisciplinary Humanitarian Conference for Sustainability (IIHC)

Research paper thumbnail of Edge Computing in Centralized Data Server Deployment for Network Qos and Latency Improvement for Virtualization Environment

International Journal of Communication Networks and Information Security (IJCNIS)

With the advancement of Internet of Things (IoT), the network devices seem to be raising, and the... more With the advancement of Internet of Things (IoT), the network devices seem to be raising, and the cloud data centre load also raises; certain delay-sensitive services are not responded to promptly which leads to a reduced quality of service (QoS). The technique of resource estimation could offer the appropriate source for users through analyses of load of resource itself. Thus, the prediction of resource QoS was important to user fulfillment and task allotment in edge computing. This study develops a new manta ray foraging optimization with backpropagation neural network (MRFO-BPNN) model for resource estimation using quality of service (QoS) in the edge computing platform. Primarily, the MRFO-BPNN model makes use of BPNN algorithm for the estimation of resources in edge computing. Besides, the parameters relevant to the BPNN model are adjusted effectually by the use of MRFO algorithm. Moreover, an objective function is derived for the MRFO algorithm for the investigation of load st...

Research paper thumbnail of A Novel Approach of Object Detection using Deep Learning for Animal Safety

2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence), 2022

This paper uses convolutional neural networks (CNN) algorithm to detect animals. Four different O... more This paper uses convolutional neural networks (CNN) algorithm to detect animals. Four different Object Detection frameworks are implemented and compared their performance with our novel approach. Many algorithms of convolutional neural networks like RCNN, Faster RCNN, Single Shot detection, YOLOv3 are used in object detection tasks are compared. A customized Faster RCNN is designed with anchor manipulations This framework is found to be best suited technique for Animal Detection System giving the best time-accuracy trade-off. Experimental results shows that this method has reduced the best inference time significantly.

Research paper thumbnail of An Additive Watermarking Technique In Gray Scale Images Using Discrete Wavelet Transformation And Its Analysis On Watermark Strength

Digital Watermarking is a procedure to prevent the unauthorized access and modification of person... more Digital Watermarking is a procedure to prevent the unauthorized access and modification of personal data<em>.</em> It assures that the communication between two parties remains secure and their communication should be undetected. This paper investigates the consequence of the watermark strength of the grayscale image using a Discrete Wavelet Transformation (DWT) additive technique. In this method, the gray scale host image is divided into four sub bands: LL (Low-Low), HL (High-Low), LH (Low-High), HH (High-High) and the watermark is inserted in an LL sub band using DWT technique. As the image is divided into four sub bands, a watermark of equal size of the LL sub band has been inserted and the results are discussed. LL represents the average component of the host image which contains the maximum information of the image. Two kinds of experiments are performed. In the first, the same watermark is embedded in different images and in the later on the strength of the waterma...

Research paper thumbnail of Downlink Performance Improvement Using Base Station Cooperation for Multicell Cellular Networks

In this paper, we consider the multicell network which consists of several mobile stations (user ... more In this paper, we consider the multicell network which consists of several mobile stations (user terminal) and Base Stations (BSs) with multiple antennas at both BSs and user terminal respectively with random BS cooperation. We consider the cell interior users and use the rectangular and polar coordinate to calculate the distance of users from their home cell. Also, path loss model with distance-dependent is used for signal propagation. We use the BS cooperation scheme to the homogeneous multicell network and observe that BS cooperation also improves the downlink cell interior performance in the context spectral efficiency. BS cooperation is a scheme which improves the downlink Signal to Interference plus noise ratio (SINR) by canceling the Inter Cell Interference (ICI) for multi-cell cellular network. Further, it is noted that Coordinated Multipoint (CoMP) improves the system work. Showing the result of simulation, the cell interior SINR and channel capacity at various positions in...

Research paper thumbnail of Analysis on Mobile Cloud Security and Comparison of Existing Models

Indian Journal of Computer Science and Engineering, 2021

The explosive emergence of Cloud Computing and its services are now everywhere in the World and i... more The explosive emergence of Cloud Computing and its services are now everywhere in the World and it is one of the well-known technologies that we are using for both research and development activities nowadays. As small and medium organizations or companies are moving to Cloud Computing because as it supports rapid access to their applications and limits the cost of infrastructure. Cloud Computing for mobiles refers to Mobile Cloud Computing (MCC) as it is the collection of Mobile Computing and Cloud Computing to get one of the industry trend words and the major threads in the IT world since 2009. As business is growing using the computational resources on a pay as you go Model. This paper highlights the benefits and modern MCC uses and issues of MCC are briefly explained and also the security mechanism. MCC is investigating immense in IT due to anyplace whenever information gets to. Cell phones are empowered with rich client experience particularly, smartphones. Apple, Google, Facebook, and Amazon are the main four horsemen in the mobile world. That is the reason versatile distributed computing innovation is developing quickly among the clients and simultaneously, it presents new security dangers moreover. In MCC, a great deal of examinations is being done to annihilate the issues to make IT more solid and secure because all the more valuable information is put away in the Cloud condition. As the Internet-empowered cell phones, tablets keep on developing, online noxious dangers will keep on expanding in number to make more mind-boggling. Making sure information is more basic in the Mobile Cloud environment. In this paper, the working ideas of MCC and its different security issues and arrangements are given by analysts are broke down and also compare with different models.

Research paper thumbnail of A Paper on Group Data Exchange in Cloud Computing

The sharing of data in cloud computing allows multiple participants to freely share group data, i... more The sharing of data in cloud computing allows multiple participants to freely share group data, improving efficiency and broad potential applications in co-operative environments. Nonetheless, it is daunting challenges how to ensure the security of data sharing in a company and how to transfer outsourced knowledge effectively. Note that key agreement protocols have played a very important role in secure and efficient group data sharing in cloud computing. Block Designbased Key Agreement for Group Data Sharing in Cloud Computing. In this article, a new block design cantered main arrangement, which assisted multiple participants, by using the symmetrical balanced incomplete block design (SBIBD), which allows the number of participants in the cloud environment to be expanded in a flexible way according to the block design structure. General formulas for creating a popular conference core K for several participants cantered on the suggested community data sharing model. It should be rem...

Research paper thumbnail of HPC as a Service on Cloud: A Market Oriented Approach

International Journal of Advance Research and Innovative Ideas in Education, 2016

Cloud is a latest technology used in most of enterprise. Every enterprise is moving towards the c... more Cloud is a latest technology used in most of enterprise. Every enterprise is moving towards the cloud platform. On the other hand High Performance Computing (HPC) is a necessity for many industries for their data analytics or huge computations tasks. HPC needed large set of resources so, all enterprises cannot afford supercomputers. HPC as a service (HPCaaS) can deal with these issues. Moving towards HPC systems on the cloud environment is cost effective for small scale industry. Costing is major area in HPC as a service on cloud. This paper addresses some issues and challenges. This paper provides solution for one of these problems as a costing model for HPC as a Services on the cloud environment so that it will enable the small organization to have their own HPC systems at the low costs.

Research paper thumbnail of SDN Control Plan Security in Cloud Computing Again DDOS Attack

International Journal of Advance Research and Innovative Ideas in Education, 2016

In Software Defined Networking a Denial-of- Service (DoS) or Distributed Denial-of- Service (DDoS... more In Software Defined Networking a Denial-of- Service (DoS) or Distributed Denial-of- Service (DDoS) attack is an attempt to make a machine or network resources unreachable for its particular users.so, the require for security of such network controller against attacks from within or outside a network is very more important. Although network devices in OpenFlow can also be targeted by attackers and so required a Defense mechanism to avoid problems in smooth packet forwarding attack. SDN Give the Functionality to Overcome DDoS Attack use Control plan and data plan. Also, they manage the network use SDN controller to monitor network. SDN network flexibility provides they interface OpenFlow and switches network by Mininet. That all are merge to single centralized control point.

Research paper thumbnail of Significance and Impact of Blockchain Technology in Education System

Advances in Mechanical Engineering, 2021

Research paper thumbnail of Comprehensive Study on Incorporation of Blockchain Technology With IoT Enterprises

Advances in Data Mining and Database Management, 2021

Unprecedented advancement in wireless technology, storage, and computing power of portable device... more Unprecedented advancement in wireless technology, storage, and computing power of portable devices with the gigabyte speed of internet connectivity enables the possibility of communication among machine to machine. IoT has a different way to connect many nodes simultaneously to store, access, and share the information to improve the quality of life by the elimination of the involvement of human. Irrespective of unlimited benefit, IoT has so many issues that arise to eclipse IoT in reality because of its centralized model. Scalability, reliability, privacy, and security challenges are rising because of the huge numbers of IoT nodes, centralized architecture, and complex networks. Centralized architecture may lead to problems like a single point of failure, single way traffic, huge infrastructure cost, privacy, security, and single source of trust. Therefore, to overcome the issues of the centralized infrastructure of the IoT, the authors diverted to decentralized infrastructure. It m...

Research paper thumbnail of An adaptive framework to image watermarking based on the twin support vector regression and genetic algorithm in lifting wavelet transform domain

Multimedia Tools and Applications, 2020

A novel adaptive gray scale image watermarking approach based on the combination of machine learn... more A novel adaptive gray scale image watermarking approach based on the combination of machine learning (ML) algorithms in wavelet domain is presented. Based upon fuzzy entropy information, non-overlapping and significant regions are selected. Lifting wavelet transform (LWT) is performed on selected significant regions in order to obtain low frequency sub band and underwent through the QR factorization. Prominent low frequency features of each region are supplied as input features for the training purpose of Lagrangian twin support vector regression (LTSVR) model. Then the optimal value of watermark scaling factor (strength) obtained using genetic algorithm (GA) is used to embed the watermark in the test data of output wavelet coefficient obtained by trained LTSVR. Arnold transformation is performed for the security of watermark along with the imperceptibility and robustness. The experimental results as well as the comparison between traditional methods and the proposed one showed a significant improvement in robustness in terms of image processing attacks which makes it suitable for implementing copyright protection applications.

Research paper thumbnail of Redundancy Avoiding Algorithm in Network

International Journal of Computer Theory and Engineering, 2018

Computer connects to the internet with single path, does not more reliable because many problems ... more Computer connects to the internet with single path, does not more reliable because many problems occur such as cable cutting device fail etc. For finding more reliable, we need two or more paths between switches. Multiple path between two system is insure that more reliable. But occurs a problem that is redundancy problem and creates a cycle. According to switch concept data move between two systems continuously, for this activity switch work very slow or shutdown. We can remove this problem using a bridge protocol data unit concept. In which easily finds the cycle in a network or not. If a cycle between switch devices so need to remove the cycle. We use new spanning tree avoiding algorithms which break the cycle and improve the efficiency of the network.

Research paper thumbnail of Color Sorting Based on Internet of Things

International Journal of Computer Sciences and Engineering, 2018

Research paper thumbnail of Indian Test Facility (INTF) and its updates

Journal of Physics: Conference Series, 2017

To characterize ITER Diagnostic Neutral Beam (DNB) system with full specification and to support ... more To characterize ITER Diagnostic Neutral Beam (DNB) system with full specification and to support IPR's negative ion beam based neutral beam injector (NBI) system development program, a R&D facility, named INTF is under commissioning phase. Implementation of a successful DNB at ITER requires several challenges need to be overcome. These issues are related to the negative ion production, its neutralization and corresponding neutral beam transport over the path lengths of ~ 20.67 m to reach ITER plasma. DNB is a procurement package for INDIA, as an in-kind contribution to ITER. Since ITER is considered as a nuclear facility, minimum diagnostic systems, linked with safe operation of the machine are planned to be incorporated in it and so there is difficulty to characterize DNB after onsite commissioning. Therefore, the delivery of DNB to ITER will be benefited if DNB is operated and characterized prior to onsite commissioning. INTF has been envisaged to be operational with the large size ion source activities in the similar timeline, as with the SPIDER (RFX, Padova) facility. This paper describes some of the development updates of the facility.