Rajeev Bedi - Academia.edu (original) (raw)
Papers by Rajeev Bedi
Zenodo (CERN European Organization for Nuclear Research), Nov 1, 2014
Advances in computational intelligence and robotics book series, Jun 30, 2023
Cloud computing is the next big thing after internet in the field of information technology; some... more Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.
Users of World Wide Web utilize search engines for information retrieval in web as search engines... more Users of World Wide Web utilize search engines for information retrieval in web as search engines play a vital role in finding information on the web. With the rapid growth of information and the explosion of Web pages from the World Wide Web, it gets harder for search engines to retrieve the information relevant to a user. However, the performance of a web search is greatly affected by flooding of search results with information that is redundant in nature. Removing redundant content is an important data processing operation in search engines and other web applications. The existing architecture of WWW uses URL to identify web pages. A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. Web crawlers rely on URL normalization in order to identify equivalent URLs, which link to the same web pages. Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. De-duping URLs is an extremely important problem for search engines, since all the principal functions of a search engine, including crawling, indexing, ranking, and presentation, are adversely impacted by the presence of duplicate URLs. In this we have proposed a new technique for reducing duplicate content during web crawling and saving only unique pages in the database.
Indian journal of science and technology, Jun 1, 2017
Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers ... more Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers and this field has also touched the health sector. In this paper we have analyzed the various methods that are used to ensure the QoS in body nodes in WBANs. Methods/Statistical Analysis: The better functioning nodes with longevity of the battery nodes help to exchange the messages between the nodes uninterruptedly. Various works are presented each for improving the quality of one part or another of the network. The importance of the various methods and how these have benefitted in the better management of the sensor nodes has also been presented. The review of the researches that are undergoing in this field has been given. Findings: The body nodes work more efficiently if the interrupted energy supply is provided to them. Energy can be collected from the body movements also and can prove to be more beneficially limiting the health constraints of removing batteries again and again. Some scheduling algorithms can reduce the interference between the nodes and the routing protocols can manage the data traffic among the WBAN. The power optimizing techniques reduce the power consumption and the data loss. So many techniques provide the much needed quality of service in WBAN. Novelty/Improvement: The paper brings out various techniques which assist in better WBAN thus reinforces the use of wireless sensors in the health domain with better quality.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017
arXiv (Cornell University), Jan 14, 2012
Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technolo... more Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework is realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks, running overhead of the system and the privacy security of the frameworks.
MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes... more MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes which are free to move and are not controlled by any centralized mechanism. Nodes in mobile ad hoc network act both as hosts as well as routers. The nodes establish a dynamic network. Due to this dynamic nature of topology, Link Failure problem often degrades the network performance. This paper outlines link failure problem in Mobile Ad hoc Network. A new method has been proposed to eliminate link failure in Mobile ad hoc network by using signal strength parameter in AODV and provide a stable path for data transmission.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017
This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be... more This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be used for the removal of noise from digital images. Wavelets are functions that assure certain mathematical necessities and are used in place of data or other functions. Wavelet hypothesis represents possessions by breaking them down into many consistent component pieces, similar to pieces of jigsaw puzzle, when the pieces are scaled and translated wavelets, this breaking down process is wavelet decomposition or wavelet transform. This paper also describes the advantages of wavelets over Fourier Transformation and instead, wavelet transforms have an infinite set of possible basis functions which can be used for de-noising the digitized images.
Asian journal of computer science and technology, Aug 5, 2018
Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.
International Journal of Information Technology and Web Engineering, Apr 1, 2018
Asian Journal of Computer Science and Technology, Aug 5, 2018
Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.
With significant advancement of web, security of system activity is turning into a major issue PC... more With significant advancement of web, security of system activity is turning into a major issue PC system framework. Cyber attacks on system are expanding day-by-day. Intrusion is considered as most pitched attack on system traffic. Intrusion recognition framework has been utilized for finding out intrusion and to protect the security objectives of data from attacks. Data mining systems are utilized to screen and investigate extensive measure of system information and group this system information into anomalous and typical information. Since information originates from different sources, system traffic is substantial. Data mining methods such as classification and clustering are connected to design of intrusion detection framework. A viable Intrusion detection framework requires high recognition rate, low false caution rate and additionally high precision. This paper exhibits the audit on IDS and diverse Data mining methods connected on IDS for the powerful detection of pattern for ...
— The Cloud computing is blend of conventional
— Cloud computing has certainly created a buzz around the world of it is the next big thing after... more — Cloud computing has certainly created a buzz around the world of it is the next big thing after internet in the field of information technology; some say it’s a metaphor for internet. It is a computing technology based on internet, Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilizing pools of often virtualized resources. Even though the cloud continues to grow in popularity, Usability and respectability, Questions about cloud data protection, data privacy and other Security issues may continue to linger and are cited as the most substantial roadblock for cloud computing uptake. Privacy and security are the key issue for cloud storage. As promising as it is, this paradigm also brings into limelight many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same ...
ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the Worl... more ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the World Wide Web caused a dramatic increase in the usage of the Internet. The World Wide Web is a broadcast medium where a wide range of information can be obtained at a low cost. A great deal of the Web is replicate or near- replicate content. Documents may be served in different formats: HTML, PDF, and Text for different audiences. Documents may get mirrored to avoid delays or to provide fault tolerance. The problem of finding relevant documents has become much more prominent due to the presence of duplicate data on the WWW. This redundancy in results increases the users ’ seek time to find the desired information within the search results, while in general most users just want to cull through tens of result pages to find new/different results. This survey paper has a fundamental intention to present an review of the existing literature in duplicate and near duplicate detection of general do...
In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication a... more In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication among nodes is that the nodes should cooperate with each other. While in the presence of malicious nodes, this need might lead to the severe security concerns. Preventing MANET from such nodes has become an important and challenging security issue since most of the routing protocols are vulnerable to various types of attacks. In this paper we reviewed many research works which have focused on using either proactive or reactive defense mechanisms, intrusion detection systems, routing protocols to detect and prevent resource consumption and byzantine attacks.
A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure... more A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i.e., routing facilities, such as wired networks and access points), and whose mobile nodes must cooperate among themselves to regulate connectivity and routing. Attacks where adversaries have full control of a number of authenticated devices and behave randomly to disrupt the network are stated as Byzantine attacks. While in resource consumption attack, an attacker tries to consume or waste away resources such as bandwidth, computational power, and battery power of other nodes present in the network. In this context, preventing or detecting malicious nodes launching byzantine and resource consumption attacks is of mere concern. The objective of this paper is to utilize a hybrid mechanism, referred to as Cooperative Bait Detection Scheme, which is based on DSR routing protocol to detect the byzantine and resource consumption attacks.
Zenodo (CERN European Organization for Nuclear Research), Nov 1, 2014
Advances in computational intelligence and robotics book series, Jun 30, 2023
Cloud computing is the next big thing after internet in the field of information technology; some... more Cloud computing is the next big thing after internet in the field of information technology; some say it's a metaphor for internet. It is an Internet-based computing technology, in which software, shared recourses and information, are provided to consumers and devices on-demand, and as per users requirement on a pay per use model. Even though the cloud continues to grow in popularity, Usability and respectability, Problems with data protection and data privacy and other Security issues play a major setback in the field of Cloud Computing. Privacy and security are the key issue for cloud storage. Encryption is a well known technology for protecting sensitive data. Use of the combination of Public and Private key encryption to hide the sensitive data of users, and cipher text retrieval. The paper analyzes the feasibility of the applying encryption algorithm for data security and privacy in cloud Storage.
Users of World Wide Web utilize search engines for information retrieval in web as search engines... more Users of World Wide Web utilize search engines for information retrieval in web as search engines play a vital role in finding information on the web. With the rapid growth of information and the explosion of Web pages from the World Wide Web, it gets harder for search engines to retrieve the information relevant to a user. However, the performance of a web search is greatly affected by flooding of search results with information that is redundant in nature. Removing redundant content is an important data processing operation in search engines and other web applications. The existing architecture of WWW uses URL to identify web pages. A large fraction of the URLs on the web contain duplicate (or near-duplicate) content. Web crawlers rely on URL normalization in order to identify equivalent URLs, which link to the same web pages. Duplicate URLs have brought serious troubles to the whole pipeline of a search engine, from crawling, indexing, to result serving. De-duping URLs is an extremely important problem for search engines, since all the principal functions of a search engine, including crawling, indexing, ranking, and presentation, are adversely impacted by the presence of duplicate URLs. In this we have proposed a new technique for reducing duplicate content during web crawling and saving only unique pages in the database.
Indian journal of science and technology, Jun 1, 2017
Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers ... more Objectives: Wireless Body Area Networks (WBANs) have gained immense popularity among researchers and this field has also touched the health sector. In this paper we have analyzed the various methods that are used to ensure the QoS in body nodes in WBANs. Methods/Statistical Analysis: The better functioning nodes with longevity of the battery nodes help to exchange the messages between the nodes uninterruptedly. Various works are presented each for improving the quality of one part or another of the network. The importance of the various methods and how these have benefitted in the better management of the sensor nodes has also been presented. The review of the researches that are undergoing in this field has been given. Findings: The body nodes work more efficiently if the interrupted energy supply is provided to them. Energy can be collected from the body movements also and can prove to be more beneficially limiting the health constraints of removing batteries again and again. Some scheduling algorithms can reduce the interference between the nodes and the routing protocols can manage the data traffic among the WBAN. The power optimizing techniques reduce the power consumption and the data loss. So many techniques provide the much needed quality of service in WBAN. Novelty/Improvement: The paper brings out various techniques which assist in better WBAN thus reinforces the use of wireless sensors in the health domain with better quality.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017
arXiv (Cornell University), Jan 14, 2012
Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technolo... more Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It also design an interactive protocol and an extirpation-based key derivation algorithm, which are combined with lazy revocation, it uses multi-tree structure and symmetric encryption to form a privacy-preserving, efficient framework for cloud storage. [2] Proposes a framework which design a privacy-preserving cloud storage framework in which he designed an interaction protocol among participants, use key derivation algorithm to generate and manage keys, use both symmetric and asymmetric encryption to hide the sensitive data of users, and apply Bloom filter for cipher text retrieval. A system based on this framework is realized. This paper analyzes both the frameworks in terms of the feasibility of the frameworks, running overhead of the system and the privacy security of the frameworks.
MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes... more MANET stands for Mobile Ad hoc Network. Mobile ad hoc network is an arrangement of wireless nodes which are free to move and are not controlled by any centralized mechanism. Nodes in mobile ad hoc network act both as hosts as well as routers. The nodes establish a dynamic network. Due to this dynamic nature of topology, Link Failure problem often degrades the network performance. This paper outlines link failure problem in Mobile Ad hoc Network. A new method has been proposed to eliminate link failure in Mobile ad hoc network by using signal strength parameter in AODV and provide a stable path for data transmission.
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, Aug 7, 2017
This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be... more This paper represents an outline of wavelets and its use in Image De-noising. The wavelets can be used for the removal of noise from digital images. Wavelets are functions that assure certain mathematical necessities and are used in place of data or other functions. Wavelet hypothesis represents possessions by breaking them down into many consistent component pieces, similar to pieces of jigsaw puzzle, when the pieces are scaled and translated wavelets, this breaking down process is wavelet decomposition or wavelet transform. This paper also describes the advantages of wavelets over Fourier Transformation and instead, wavelet transforms have an infinite set of possible basis functions which can be used for de-noising the digitized images.
Asian journal of computer science and technology, Aug 5, 2018
Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.
International Journal of Information Technology and Web Engineering, Apr 1, 2018
Asian Journal of Computer Science and Technology, Aug 5, 2018
Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN theref... more Wireless Body Area Network (WBAN) is an application of wireless sensor network (WSN). WBAN therefore forms a comprehensive collection of devices that are not only capable of providing continuous information about the health status of a person but also offers helpful details about the activities and environment of the person. In this paper, we have evaluated TDMA based MAC protocol performance through several metrics and TDMA approach is used to avoid packet collision which leads to higher packet loss rate. Reinforcement Based Clock synchronization is the solution of problem like packet collision. After clocks of WBAN sensor nodes are synchronized, data can be transferred between sensor nodes and sink efficiently and rapidly. Reinforcement learning iteratively optimizes the clock synchronization technique. Experimental results indicate that the proposed algorithm is more efficient than existing techniques.
With significant advancement of web, security of system activity is turning into a major issue PC... more With significant advancement of web, security of system activity is turning into a major issue PC system framework. Cyber attacks on system are expanding day-by-day. Intrusion is considered as most pitched attack on system traffic. Intrusion recognition framework has been utilized for finding out intrusion and to protect the security objectives of data from attacks. Data mining systems are utilized to screen and investigate extensive measure of system information and group this system information into anomalous and typical information. Since information originates from different sources, system traffic is substantial. Data mining methods such as classification and clustering are connected to design of intrusion detection framework. A viable Intrusion detection framework requires high recognition rate, low false caution rate and additionally high precision. This paper exhibits the audit on IDS and diverse Data mining methods connected on IDS for the powerful detection of pattern for ...
— The Cloud computing is blend of conventional
— Cloud computing has certainly created a buzz around the world of it is the next big thing after... more — Cloud computing has certainly created a buzz around the world of it is the next big thing after internet in the field of information technology; some say it’s a metaphor for internet. It is a computing technology based on internet, Cloud computing presents a new model for IT service delivery and it typically involves over-a-network, on-demand, self-service access, which is dynamically scalable and elastic, utilizing pools of often virtualized resources. Even though the cloud continues to grow in popularity, Usability and respectability, Questions about cloud data protection, data privacy and other Security issues may continue to linger and are cited as the most substantial roadblock for cloud computing uptake. Privacy and security are the key issue for cloud storage. As promising as it is, this paradigm also brings into limelight many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers, which are not within the same ...
ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the Worl... more ABSTRACT---- World Wide Web consists of more than 50 billion pages online. The advent of the World Wide Web caused a dramatic increase in the usage of the Internet. The World Wide Web is a broadcast medium where a wide range of information can be obtained at a low cost. A great deal of the Web is replicate or near- replicate content. Documents may be served in different formats: HTML, PDF, and Text for different audiences. Documents may get mirrored to avoid delays or to provide fault tolerance. The problem of finding relevant documents has become much more prominent due to the presence of duplicate data on the WWW. This redundancy in results increases the users ’ seek time to find the desired information within the search results, while in general most users just want to cull through tens of result pages to find new/different results. This survey paper has a fundamental intention to present an review of the existing literature in duplicate and near duplicate detection of general do...
In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication a... more In mobile ad-hoc networks (MANETs), the primary need to achieve effective network communication among nodes is that the nodes should cooperate with each other. While in the presence of malicious nodes, this need might lead to the severe security concerns. Preventing MANET from such nodes has become an important and challenging security issue since most of the routing protocols are vulnerable to various types of attacks. In this paper we reviewed many research works which have focused on using either proactive or reactive defense mechanisms, intrusion detection systems, routing protocols to detect and prevent resource consumption and byzantine attacks.
A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure... more A mobile ad-hoc network (MANET) is a wireless network that does not depend on any fixed structure (i.e., routing facilities, such as wired networks and access points), and whose mobile nodes must cooperate among themselves to regulate connectivity and routing. Attacks where adversaries have full control of a number of authenticated devices and behave randomly to disrupt the network are stated as Byzantine attacks. While in resource consumption attack, an attacker tries to consume or waste away resources such as bandwidth, computational power, and battery power of other nodes present in the network. In this context, preventing or detecting malicious nodes launching byzantine and resource consumption attacks is of mere concern. The objective of this paper is to utilize a hybrid mechanism, referred to as Cooperative Bait Detection Scheme, which is based on DSR routing protocol to detect the byzantine and resource consumption attacks.