Payal Kaushal - Academia.edu (original) (raw)

Papers by Payal Kaushal

Research paper thumbnail of A Research Perspective of VANET Applications: A Review

Lecture notes in networks and systems, Sep 29, 2022

Research paper thumbnail of Maintainability Procedure in Component-Based Software

Journal of Computational and Theoretical Nanoscience, 2020

Changes in service requirement of software demands consequent changes in its maintainability. An ... more Changes in service requirement of software demands consequent changes in its maintainability. An important aspect of changes is that it affects various factors in Component Based Software Engineering which is reuse-based approach to define, implement, and integrate different components into system. Variety of Component-based software frameworks for distributed, real-time and embedded systems in Component-oriented programming are existing for specific domains in order to deal with different requirements. Functionalities under component based system affecting multiple factors in a distributed environment. It is therefore more than necessary to consider various quality attributes like reliability, maintainability, interpretability and reusability for determining quality assurance. The article presents an approach to enhance the promptness of system maintainability in case of changes in component based software.

Research paper thumbnail of KAS-IDS: A Machine Learning based Intrusion Detection System

2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021

Research paper thumbnail of Security and privacy in IoT, Cloud and Augmented Reality

2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021

Research paper thumbnail of Analysis of Watermarking in Digital Images by using Compression Technique

International Journal of Engineering Research and, 2015

With increasing use of internet the security of the data is the main concern. To secure data from... more With increasing use of internet the security of the data is the main concern. To secure data from the unauthorized access many techniques are used. Watermarking is one of such technique that is used for providing the security of the data. Digital watermarking is process of insertion of the watermark signal in the host signal. The digital watermarking system should be unappreciable, reliable and stable, etc. Earlier many watermarking techniques like DCT, DWT, and SVD were proposed for designing an efficient watermarking system. it is was observed that the most of the work is done in embedding the watermark in the image but the security of watermark before it is embedded in the image is not considered anywhere. So in this a new method of image watermarking in which the security of the watermark is considered is proposed. The data compression techniques have been used to compress the watermark. Compressing the data will reduce the length and increases the security of the system. In addition to this a key exchange algorithm is also used that will provide additional security to the data.

Research paper thumbnail of A Systematic Review of Swarm Intelligence Algorithms to Perform Routing for VANETs Communication

ECS Transactions

The performance of Vehicular Adhoc Networks (VANETs), the underlying technology for intelligent v... more The performance of Vehicular Adhoc Networks (VANETs), the underlying technology for intelligent vehicles, has shown improvement with the application of swarm-based algorithms for routing. Swarm Intelligence is a self-intelligence group of similar agents functioning on distribution, flexibility, and communication among the agents. The multiple problems occurring in the modern communication systems, including VANETs, have been tried to be resolved by the application of swarm intelligence algorithms viz, Genetic Algorithms (GA), Differential Evolution (DE), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Cuck-oo Search Algorithm (CSA), Glowworm Swarm Optimization (GSO), etc., have been proposed in the literature. This paper provides a comparative analysis of operations of swarm-based algorithms. Points like their operations, basic entities, advantages, disadvantages, and applications are discussed.

Research paper thumbnail of A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN)

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities

Research paper thumbnail of A Review on Digital Image Watermarking

International journal of engineering research and technology, 2015

Image watermarking is an important application of the image processing .Image watermarking is the... more Image watermarking is an important application of the image processing .Image watermarking is the process of inserting the watermarked message in a host document in some multimedia format. Watermarking presents the basic model for embedding and extraction of watermark. It is basically required to protect the information from the unauthorized access. The copyright protection, capacity, security, robustness etc are some of the important factors that are taken in account while the watermarking system is designed. This paper presents study of the digital watermarking process, concept, applications and its contributions in various other fields.

Research paper thumbnail of A Research Perspective of VANET Applications: A Review

Lecture notes in networks and systems, Sep 29, 2022

Research paper thumbnail of Maintainability Procedure in Component-Based Software

Journal of Computational and Theoretical Nanoscience, 2020

Changes in service requirement of software demands consequent changes in its maintainability. An ... more Changes in service requirement of software demands consequent changes in its maintainability. An important aspect of changes is that it affects various factors in Component Based Software Engineering which is reuse-based approach to define, implement, and integrate different components into system. Variety of Component-based software frameworks for distributed, real-time and embedded systems in Component-oriented programming are existing for specific domains in order to deal with different requirements. Functionalities under component based system affecting multiple factors in a distributed environment. It is therefore more than necessary to consider various quality attributes like reliability, maintainability, interpretability and reusability for determining quality assurance. The article presents an approach to enhance the promptness of system maintainability in case of changes in component based software.

Research paper thumbnail of KAS-IDS: A Machine Learning based Intrusion Detection System

2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021

Research paper thumbnail of Security and privacy in IoT, Cloud and Augmented Reality

2021 6th International Conference on Signal Processing, Computing and Control (ISPCC), 2021

Research paper thumbnail of Analysis of Watermarking in Digital Images by using Compression Technique

International Journal of Engineering Research and, 2015

With increasing use of internet the security of the data is the main concern. To secure data from... more With increasing use of internet the security of the data is the main concern. To secure data from the unauthorized access many techniques are used. Watermarking is one of such technique that is used for providing the security of the data. Digital watermarking is process of insertion of the watermark signal in the host signal. The digital watermarking system should be unappreciable, reliable and stable, etc. Earlier many watermarking techniques like DCT, DWT, and SVD were proposed for designing an efficient watermarking system. it is was observed that the most of the work is done in embedding the watermark in the image but the security of watermark before it is embedded in the image is not considered anywhere. So in this a new method of image watermarking in which the security of the watermark is considered is proposed. The data compression techniques have been used to compress the watermark. Compressing the data will reduce the length and increases the security of the system. In addition to this a key exchange algorithm is also used that will provide additional security to the data.

Research paper thumbnail of A Systematic Review of Swarm Intelligence Algorithms to Perform Routing for VANETs Communication

ECS Transactions

The performance of Vehicular Adhoc Networks (VANETs), the underlying technology for intelligent v... more The performance of Vehicular Adhoc Networks (VANETs), the underlying technology for intelligent vehicles, has shown improvement with the application of swarm-based algorithms for routing. Swarm Intelligence is a self-intelligence group of similar agents functioning on distribution, flexibility, and communication among the agents. The multiple problems occurring in the modern communication systems, including VANETs, have been tried to be resolved by the application of swarm intelligence algorithms viz, Genetic Algorithms (GA), Differential Evolution (DE), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Artificial Bee Colony (ABC), Cuck-oo Search Algorithm (CSA), Glowworm Swarm Optimization (GSO), etc., have been proposed in the literature. This paper provides a comparative analysis of operations of swarm-based algorithms. Points like their operations, basic entities, advantages, disadvantages, and applications are discussed.

Research paper thumbnail of A Taxonomy of DDoS Defense Mechanism in Software Defined Networking (SDN)

Robotics and AI for Cybersecurity and Critical Infrastructure in Smart Cities

Research paper thumbnail of A Review on Digital Image Watermarking

International journal of engineering research and technology, 2015

Image watermarking is an important application of the image processing .Image watermarking is the... more Image watermarking is an important application of the image processing .Image watermarking is the process of inserting the watermarked message in a host document in some multimedia format. Watermarking presents the basic model for embedding and extraction of watermark. It is basically required to protect the information from the unauthorized access. The copyright protection, capacity, security, robustness etc are some of the important factors that are taken in account while the watermarking system is designed. This paper presents study of the digital watermarking process, concept, applications and its contributions in various other fields.