Vinay Nassa - Academia.edu (original) (raw)
Papers by Vinay Nassa
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
The Imaging Science Journal
Mathematical Problems in Engineering
During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the... more During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the visibility barrier, distortion, and blurring instigated by raindrops. So, it is essential to eradicate it from the rainy images for ensuring the reliability of outdoor vision system. To achieve this, several rain removal studies have been performed in recent days. In this view, this paper presents a new Faster Region Convolutional Neural Network (Faster RCNN) with Optimal Densely Connected Networks (DenseNet)-based rain removal technique called FRCNN-ODN. The presented involves weighted mean filtering (WMF) is applied as a denoising technique, which helps to boost the quality of the input image. In addition, Faster RCNN technique is used for rain detection that comprises region proposal network (RPN) and Fast RCNN model. The RPN generates high quality region proposals that are exploited by the Faster RCNN to detect rain drops. Also, the DenseNet model is utilized as a baseline network t...
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Apr 28, 2022
International Journal of Information Technology
Sustainable Energy Technologies and Assessments
International Journal of Global Warming
Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices d... more Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices designed for emergency use. There is source preparation with regards to a potential disconnection whilst occurrence of a path breakage. The source will commence with discovery of the path and evade complete disconnection. When there is a decrease in the availability of links, there may be path breakage. Breakages of links because of energy drain and node mobility are managed by reactive MANET routing protocols. Also, multi-hop communication can be more efficient in terms of the routing protocols for large area networks. The Ad hoc On-Demand Multipath Distance Vector protocol (AOMDV) is modified by this study in a way that link availability estimates lead to route handoff. An optimal AOMDV route can be detected by the novel Bat Algorithm hybridization with Harmony Search (BAT-HS) algorithm depending on rate of bit error, velocity, neighbouring node’s queuing delay, and link quality. In thi...
Future Trends in 5G and 6G, 2021
Mobile Radio Communications and 5G Networks, 2022
Proceedings of the Conference on Broad Exposure to Science and Technology 2021 (BEST 2021), 2022
Multidisciplinary Approach to Modern Digital Steganography, 2021
Protected stored data as well as transfer in this virtual environment have been a significant thi... more Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.
International Journal of Computer Applications, 2012
International Journal of Computer Applications, 2014
To improve the effectiveness and QoS of service in a sensor network there are number of communica... more To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is Leader Selection Architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces. In this paper, an improved approach is defined to perform the selection of Leader. This leader selection architecture approach is defined under multiple parameters including the energy, connectivity analysis and the balancing over the network. The improvement is also performed to generate the safe communication over the network controlled by the leader node. The obtained results show that the work has improved the network communication as well as network life.
International Journal of Computer Applications, 2014
The growth in high data rate mobile data transmission in recent years is due to the tremendous ac... more The growth in high data rate mobile data transmission in recent years is due to the tremendous achievements in Digital Communication especially Digital Modulation Techniques starting from Second Generation system (2G) in early 80's to today 4G (LTE-Advanced). To achieve the goal towards Shannon's Channel Capacity, a no. of modulation techniques are developed during these years. With the tremendous growth in the Very Large Scale Integrated Circuits (VLSI), a no. of digital modulation techniques is easier to implement in convenient manner. Orthogonal Frequency Division Multiplexing (OFDM), one of the latest techniques became feasible and economical due to the high processing speed. OFDM in combination with other techniques like Space Time Block Code (STBC)Phase shift key (PSK) and Quadrature Amplitude Modulation (QAM) give better performances in case of Multi-input Multi-output System (MIMO). This paper presents (STBC) technique for multiple transmission antennae (OFDM) system. Generally in Multiinput Multi-output (MIMO) system code selection across the space and time is difficult to get minimum Bit Error (BER) to achieve maximum output. In adaptive White Gaussian (AWGN) fading channels, STBC is best breakthrough to reduce the BER and obtain maximum output. Like AWGN fading channel the analysis is done for OFDM system using STBC at transmitter end. Various modulation techniques like Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation are implemented using mentioned techniques. The Bit Error Rate (BER) versus different Signal to Noise (SNR) ratio are studies for above modulation techniques.
ijstm.com
... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-1... more ... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-123506, vinay_nassa@rediffmail.com ... This is because in the AODV and DSR protocols, the route discovery packets are carried in clear text. ...
Journal of Food Quality
The growing need for access to safer food items is increasing, and hence, there is a need for a b... more The growing need for access to safer food items is increasing, and hence, there is a need for a better supply chain management system in the food industry is increasing. The increased complexity of the existing systems tends to introduce more issues to the stakeholders, and also, the cost of product traceability is quite high. Hence, the industry is looking for effective solutions in relation to drug traceability, and the application of Blockchain technology enables the stakeholders in the food and beverage (F&B) sector to track the movement of goods, supported in gathering the required details so that the contaminated products can be identified and recalled without much delay and lesser recall costs to protect the lives of the individuals. The tampered food items are increasing and are impacting the supply chain process, brand name of the companies, and claim assurance. They create an adverse impact on the health of the individuals and cause higher economic loss to the health-care ...
Software Defined Networking for Ad Hoc Networks
Software Defined Networking for Ad Hoc Networks
An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. I... more An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. In Latin, "Ad-hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
The Imaging Science Journal
Mathematical Problems in Engineering
During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the... more During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the visibility barrier, distortion, and blurring instigated by raindrops. So, it is essential to eradicate it from the rainy images for ensuring the reliability of outdoor vision system. To achieve this, several rain removal studies have been performed in recent days. In this view, this paper presents a new Faster Region Convolutional Neural Network (Faster RCNN) with Optimal Densely Connected Networks (DenseNet)-based rain removal technique called FRCNN-ODN. The presented involves weighted mean filtering (WMF) is applied as a denoising technique, which helps to boost the quality of the input image. In addition, Faster RCNN technique is used for rain detection that comprises region proposal network (RPN) and Fast RCNN model. The RPN generates high quality region proposals that are exploited by the Faster RCNN to detect rain drops. Also, the DenseNet model is utilized as a baseline network t...
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Apr 28, 2022
International Journal of Information Technology
Sustainable Energy Technologies and Assessments
International Journal of Global Warming
Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices d... more Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices designed for emergency use. There is source preparation with regards to a potential disconnection whilst occurrence of a path breakage. The source will commence with discovery of the path and evade complete disconnection. When there is a decrease in the availability of links, there may be path breakage. Breakages of links because of energy drain and node mobility are managed by reactive MANET routing protocols. Also, multi-hop communication can be more efficient in terms of the routing protocols for large area networks. The Ad hoc On-Demand Multipath Distance Vector protocol (AOMDV) is modified by this study in a way that link availability estimates lead to route handoff. An optimal AOMDV route can be detected by the novel Bat Algorithm hybridization with Harmony Search (BAT-HS) algorithm depending on rate of bit error, velocity, neighbouring node’s queuing delay, and link quality. In thi...
Future Trends in 5G and 6G, 2021
Mobile Radio Communications and 5G Networks, 2022
Proceedings of the Conference on Broad Exposure to Science and Technology 2021 (BEST 2021), 2022
Multidisciplinary Approach to Modern Digital Steganography, 2021
Protected stored data as well as transfer in this virtual environment have been a significant thi... more Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.
International Journal of Computer Applications, 2012
International Journal of Computer Applications, 2014
To improve the effectiveness and QoS of service in a sensor network there are number of communica... more To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is Leader Selection Architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces. In this paper, an improved approach is defined to perform the selection of Leader. This leader selection architecture approach is defined under multiple parameters including the energy, connectivity analysis and the balancing over the network. The improvement is also performed to generate the safe communication over the network controlled by the leader node. The obtained results show that the work has improved the network communication as well as network life.
International Journal of Computer Applications, 2014
The growth in high data rate mobile data transmission in recent years is due to the tremendous ac... more The growth in high data rate mobile data transmission in recent years is due to the tremendous achievements in Digital Communication especially Digital Modulation Techniques starting from Second Generation system (2G) in early 80's to today 4G (LTE-Advanced). To achieve the goal towards Shannon's Channel Capacity, a no. of modulation techniques are developed during these years. With the tremendous growth in the Very Large Scale Integrated Circuits (VLSI), a no. of digital modulation techniques is easier to implement in convenient manner. Orthogonal Frequency Division Multiplexing (OFDM), one of the latest techniques became feasible and economical due to the high processing speed. OFDM in combination with other techniques like Space Time Block Code (STBC)Phase shift key (PSK) and Quadrature Amplitude Modulation (QAM) give better performances in case of Multi-input Multi-output System (MIMO). This paper presents (STBC) technique for multiple transmission antennae (OFDM) system. Generally in Multiinput Multi-output (MIMO) system code selection across the space and time is difficult to get minimum Bit Error (BER) to achieve maximum output. In adaptive White Gaussian (AWGN) fading channels, STBC is best breakthrough to reduce the BER and obtain maximum output. Like AWGN fading channel the analysis is done for OFDM system using STBC at transmitter end. Various modulation techniques like Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation are implemented using mentioned techniques. The Bit Error Rate (BER) versus different Signal to Noise (SNR) ratio are studies for above modulation techniques.
ijstm.com
... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-1... more ... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-123506, vinay_nassa@rediffmail.com ... This is because in the AODV and DSR protocols, the route discovery packets are carried in clear text. ...
Journal of Food Quality
The growing need for access to safer food items is increasing, and hence, there is a need for a b... more The growing need for access to safer food items is increasing, and hence, there is a need for a better supply chain management system in the food industry is increasing. The increased complexity of the existing systems tends to introduce more issues to the stakeholders, and also, the cost of product traceability is quite high. Hence, the industry is looking for effective solutions in relation to drug traceability, and the application of Blockchain technology enables the stakeholders in the food and beverage (F&B) sector to track the movement of goods, supported in gathering the required details so that the contaminated products can be identified and recalled without much delay and lesser recall costs to protect the lives of the individuals. The tampered food items are increasing and are impacting the supply chain process, brand name of the companies, and claim assurance. They create an adverse impact on the health of the individuals and cause higher economic loss to the health-care ...
Software Defined Networking for Ad Hoc Networks
Software Defined Networking for Ad Hoc Networks
An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. I... more An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. In Latin, "Ad-hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.