Vinay Nassa - Academia.edu (original) (raw)

Papers by Vinay Nassa

Research paper thumbnail of Evaluation of Block-chain Transaction Accuracy using Neural Network Model

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Research paper thumbnail of Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

The Imaging Science Journal

Research paper thumbnail of A Novel Faster RCNN with ODN-Based Rain Removal Technique

Mathematical Problems in Engineering

During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the... more During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the visibility barrier, distortion, and blurring instigated by raindrops. So, it is essential to eradicate it from the rainy images for ensuring the reliability of outdoor vision system. To achieve this, several rain removal studies have been performed in recent days. In this view, this paper presents a new Faster Region Convolutional Neural Network (Faster RCNN) with Optimal Densely Connected Networks (DenseNet)-based rain removal technique called FRCNN-ODN. The presented involves weighted mean filtering (WMF) is applied as a denoising technique, which helps to boost the quality of the input image. In addition, Faster RCNN technique is used for rain detection that comprises region proposal network (RPN) and Fast RCNN model. The RPN generates high quality region proposals that are exploited by the Faster RCNN to detect rain drops. Also, the DenseNet model is utilized as a baseline network t...

Research paper thumbnail of An Inventory System Utilizing Neural Network in The Prediction of Machine Learning Techniques

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Apr 28, 2022

Research paper thumbnail of Maximum likelihood based estimation with quasi oppositional chemical reaction optimization algorithm for speech signal enhancement

International Journal of Information Technology

Research paper thumbnail of Artificial intelligence with attention based BiLSTM for energy storage system in hybrid renewable energy sources

Sustainable Energy Technologies and Assessments

Research paper thumbnail of IoT-based early forest fire detection using MLP and AROC method

International Journal of Global Warming

Research paper thumbnail of An Enhanced Ad hoc On-Demand Multipath Distance Vector Routing using Hybrid Bat Algorithm

Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices d... more Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices designed for emergency use. There is source preparation with regards to a potential disconnection whilst occurrence of a path breakage. The source will commence with discovery of the path and evade complete disconnection. When there is a decrease in the availability of links, there may be path breakage. Breakages of links because of energy drain and node mobility are managed by reactive MANET routing protocols. Also, multi-hop communication can be more efficient in terms of the routing protocols for large area networks. The Ad hoc On-Demand Multipath Distance Vector protocol (AOMDV) is modified by this study in a way that link availability estimates lead to route handoff. An optimal AOMDV route can be detected by the novel Bat Algorithm hybridization with Harmony Search (BAT-HS) algorithm depending on rate of bit error, velocity, neighbouring node’s queuing delay, and link quality. In thi...

Research paper thumbnail of A Systematic Review of 5G Opportunities, Architecture and Challenges

Future Trends in 5G and 6G, 2021

Research paper thumbnail of Modeling and Analysis of Positive Feedback Adiabatic Logic CMOS-Based 2:1 Mux and Full Adder and Its Power Dissipation Consideration

Mobile Radio Communications and 5G Networks, 2022

Research paper thumbnail of Feasibility Analysis of Financial Aspect in Determining Optimal Last Mile Warehouse Location Using P-Median Method

Proceedings of the Conference on Broad Exposure to Science and Technology 2021 (BEST 2021), 2022

Research paper thumbnail of An Integration of Keyless Encryption, Steganography, and Artificial Intelligence for the Secure Transmission of Stego Images

Multidisciplinary Approach to Modern Digital Steganography, 2021

Protected stored data as well as transfer in this virtual environment have been a significant thi... more Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.

Research paper thumbnail of ATMA: Android Travel Mate Application

International Journal of Computer Applications, 2012

Research paper thumbnail of An Improved Leader Selection Approach for Improving Network QoS

International Journal of Computer Applications, 2014

To improve the effectiveness and QoS of service in a sensor network there are number of communica... more To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is Leader Selection Architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces. In this paper, an improved approach is defined to perform the selection of Leader. This leader selection architecture approach is defined under multiple parameters including the energy, connectivity analysis and the balancing over the network. The improvement is also performed to generate the safe communication over the network controlled by the leader node. The obtained results show that the work has improved the network communication as well as network life.

Research paper thumbnail of Space Time Block Code Analysis for MIMO-OFDM System

International Journal of Computer Applications, 2014

The growth in high data rate mobile data transmission in recent years is due to the tremendous ac... more The growth in high data rate mobile data transmission in recent years is due to the tremendous achievements in Digital Communication especially Digital Modulation Techniques starting from Second Generation system (2G) in early 80's to today 4G (LTE-Advanced). To achieve the goal towards Shannon's Channel Capacity, a no. of modulation techniques are developed during these years. With the tremendous growth in the Very Large Scale Integrated Circuits (VLSI), a no. of digital modulation techniques is easier to implement in convenient manner. Orthogonal Frequency Division Multiplexing (OFDM), one of the latest techniques became feasible and economical due to the high processing speed. OFDM in combination with other techniques like Space Time Block Code (STBC)Phase shift key (PSK) and Quadrature Amplitude Modulation (QAM) give better performances in case of Multi-input Multi-output System (MIMO). This paper presents (STBC) technique for multiple transmission antennae (OFDM) system. Generally in Multiinput Multi-output (MIMO) system code selection across the space and time is difficult to get minimum Bit Error (BER) to achieve maximum output. In adaptive White Gaussian (AWGN) fading channels, STBC is best breakthrough to reduce the BER and obtain maximum output. Like AWGN fading channel the analysis is done for OFDM system using STBC at transmitter end. Various modulation techniques like Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation are implemented using mentioned techniques. The Bit Error Rate (BER) versus different Signal to Noise (SNR) ratio are studies for above modulation techniques.

Research paper thumbnail of Security Vulnerabilities in Mobile Ad Hoc Networks

ijstm.com

... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-1... more ... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-123506, vinay_nassa@rediffmail.com ... This is because in the AODV and DSR protocols, the route discovery packets are carried in clear text. ...

Research paper thumbnail of A Comparative Analysis of Blockchain in Enhancing the Drug Traceability in Edible Foods Using Multiple Regression Analysis

Journal of Food Quality

The growing need for access to safer food items is increasing, and hence, there is a need for a b... more The growing need for access to safer food items is increasing, and hence, there is a need for a better supply chain management system in the food industry is increasing. The increased complexity of the existing systems tends to introduce more issues to the stakeholders, and also, the cost of product traceability is quite high. Hence, the industry is looking for effective solutions in relation to drug traceability, and the application of Blockchain technology enables the stakeholders in the food and beverage (F&B) sector to track the movement of goods, supported in gathering the required details so that the contaminated products can be identified and recalled without much delay and lesser recall costs to protect the lives of the individuals. The tampered food items are increasing and are impacting the supply chain process, brand name of the companies, and claim assurance. They create an adverse impact on the health of the individuals and cause higher economic loss to the health-care ...

Research paper thumbnail of Modern Technique for Interactive Communication in LEACH-Based Ad Hoc Wireless Sensor Network

Software Defined Networking for Ad Hoc Networks

Research paper thumbnail of Software-Defined Networking-Based Ad hoc Networks Routing Protocols

Software Defined Networking for Ad Hoc Networks

Research paper thumbnail of Energy Conservation in Wireless Sensor Network

An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. I... more An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. In Latin, "Ad-hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.

Research paper thumbnail of Evaluation of Block-chain Transaction Accuracy using Neural Network Model

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)

Research paper thumbnail of Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

The Imaging Science Journal

Research paper thumbnail of A Novel Faster RCNN with ODN-Based Rain Removal Technique

Mathematical Problems in Engineering

During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the... more During rainy times, the impact of outdoor vision systems gets considerably decreased owing to the visibility barrier, distortion, and blurring instigated by raindrops. So, it is essential to eradicate it from the rainy images for ensuring the reliability of outdoor vision system. To achieve this, several rain removal studies have been performed in recent days. In this view, this paper presents a new Faster Region Convolutional Neural Network (Faster RCNN) with Optimal Densely Connected Networks (DenseNet)-based rain removal technique called FRCNN-ODN. The presented involves weighted mean filtering (WMF) is applied as a denoising technique, which helps to boost the quality of the input image. In addition, Faster RCNN technique is used for rain detection that comprises region proposal network (RPN) and Fast RCNN model. The RPN generates high quality region proposals that are exploited by the Faster RCNN to detect rain drops. Also, the DenseNet model is utilized as a baseline network t...

Research paper thumbnail of An Inventory System Utilizing Neural Network in The Prediction of Machine Learning Techniques

2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), Apr 28, 2022

Research paper thumbnail of Maximum likelihood based estimation with quasi oppositional chemical reaction optimization algorithm for speech signal enhancement

International Journal of Information Technology

Research paper thumbnail of Artificial intelligence with attention based BiLSTM for energy storage system in hybrid renewable energy sources

Sustainable Energy Technologies and Assessments

Research paper thumbnail of IoT-based early forest fire detection using MLP and AROC method

International Journal of Global Warming

Research paper thumbnail of An Enhanced Ad hoc On-Demand Multipath Distance Vector Routing using Hybrid Bat Algorithm

Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices d... more Mobile Ad-hoc Networks (MANETs) are multi-hop ad hoc networks of mobile battery-charged devices designed for emergency use. There is source preparation with regards to a potential disconnection whilst occurrence of a path breakage. The source will commence with discovery of the path and evade complete disconnection. When there is a decrease in the availability of links, there may be path breakage. Breakages of links because of energy drain and node mobility are managed by reactive MANET routing protocols. Also, multi-hop communication can be more efficient in terms of the routing protocols for large area networks. The Ad hoc On-Demand Multipath Distance Vector protocol (AOMDV) is modified by this study in a way that link availability estimates lead to route handoff. An optimal AOMDV route can be detected by the novel Bat Algorithm hybridization with Harmony Search (BAT-HS) algorithm depending on rate of bit error, velocity, neighbouring node’s queuing delay, and link quality. In thi...

Research paper thumbnail of A Systematic Review of 5G Opportunities, Architecture and Challenges

Future Trends in 5G and 6G, 2021

Research paper thumbnail of Modeling and Analysis of Positive Feedback Adiabatic Logic CMOS-Based 2:1 Mux and Full Adder and Its Power Dissipation Consideration

Mobile Radio Communications and 5G Networks, 2022

Research paper thumbnail of Feasibility Analysis of Financial Aspect in Determining Optimal Last Mile Warehouse Location Using P-Median Method

Proceedings of the Conference on Broad Exposure to Science and Technology 2021 (BEST 2021), 2022

Research paper thumbnail of An Integration of Keyless Encryption, Steganography, and Artificial Intelligence for the Secure Transmission of Stego Images

Multidisciplinary Approach to Modern Digital Steganography, 2021

Protected stored data as well as transfer in this virtual environment have been a significant thi... more Protected stored data as well as transfer in this virtual environment have been a significant thing since this world wide web has been used for information exchange. The need for data security rises as the level of personal data exchanged on the web is becoming more susceptible. To protect information from malicious use as well as alteration, services like confidential information but also data integrity have been needed. So many traditional cryptographic methods have been proposed by numerous studies throughout recent times to maintain multimedia data communicated over public networks. The chapter proposes a novel keyless picture encryption algorithm focused on a chaotic map. Almost every picture element is encoded by shuffling pixel values, which would be measured by an adapted cat map. In this suggested technique, steganography is used to transfer keyless encrypted information using a cover picture with encrypted information inserted in picture, audio, and video files.

Research paper thumbnail of ATMA: Android Travel Mate Application

International Journal of Computer Applications, 2012

Research paper thumbnail of An Improved Leader Selection Approach for Improving Network QoS

International Journal of Computer Applications, 2014

To improve the effectiveness and QoS of service in a sensor network there are number of communica... more To improve the effectiveness and QoS of service in a sensor network there are number of communication and localization architectures followed by sensor network. One of such architecture is Leader Selection Architecture. This architecture restrict the communication to short distances so that the energy consumption of a node is reduces. In this paper, an improved approach is defined to perform the selection of Leader. This leader selection architecture approach is defined under multiple parameters including the energy, connectivity analysis and the balancing over the network. The improvement is also performed to generate the safe communication over the network controlled by the leader node. The obtained results show that the work has improved the network communication as well as network life.

Research paper thumbnail of Space Time Block Code Analysis for MIMO-OFDM System

International Journal of Computer Applications, 2014

The growth in high data rate mobile data transmission in recent years is due to the tremendous ac... more The growth in high data rate mobile data transmission in recent years is due to the tremendous achievements in Digital Communication especially Digital Modulation Techniques starting from Second Generation system (2G) in early 80's to today 4G (LTE-Advanced). To achieve the goal towards Shannon's Channel Capacity, a no. of modulation techniques are developed during these years. With the tremendous growth in the Very Large Scale Integrated Circuits (VLSI), a no. of digital modulation techniques is easier to implement in convenient manner. Orthogonal Frequency Division Multiplexing (OFDM), one of the latest techniques became feasible and economical due to the high processing speed. OFDM in combination with other techniques like Space Time Block Code (STBC)Phase shift key (PSK) and Quadrature Amplitude Modulation (QAM) give better performances in case of Multi-input Multi-output System (MIMO). This paper presents (STBC) technique for multiple transmission antennae (OFDM) system. Generally in Multiinput Multi-output (MIMO) system code selection across the space and time is difficult to get minimum Bit Error (BER) to achieve maximum output. In adaptive White Gaussian (AWGN) fading channels, STBC is best breakthrough to reduce the BER and obtain maximum output. Like AWGN fading channel the analysis is done for OFDM system using STBC at transmitter end. Various modulation techniques like Binary Phase Shift Key (BPSK) and Quadrature Amplitude Modulation are implemented using mentioned techniques. The Bit Error Rate (BER) versus different Signal to Noise (SNR) ratio are studies for above modulation techniques.

Research paper thumbnail of Security Vulnerabilities in Mobile Ad Hoc Networks

ijstm.com

... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-1... more ... Vinay Kumar Nassa Associate Prof (Deptt of ECE) Dronacharya College of Engineering, Gurgaon-123506, vinay_nassa@rediffmail.com ... This is because in the AODV and DSR protocols, the route discovery packets are carried in clear text. ...

Research paper thumbnail of A Comparative Analysis of Blockchain in Enhancing the Drug Traceability in Edible Foods Using Multiple Regression Analysis

Journal of Food Quality

The growing need for access to safer food items is increasing, and hence, there is a need for a b... more The growing need for access to safer food items is increasing, and hence, there is a need for a better supply chain management system in the food industry is increasing. The increased complexity of the existing systems tends to introduce more issues to the stakeholders, and also, the cost of product traceability is quite high. Hence, the industry is looking for effective solutions in relation to drug traceability, and the application of Blockchain technology enables the stakeholders in the food and beverage (F&B) sector to track the movement of goods, supported in gathering the required details so that the contaminated products can be identified and recalled without much delay and lesser recall costs to protect the lives of the individuals. The tampered food items are increasing and are impacting the supply chain process, brand name of the companies, and claim assurance. They create an adverse impact on the health of the individuals and cause higher economic loss to the health-care ...

Research paper thumbnail of Modern Technique for Interactive Communication in LEACH-Based Ad Hoc Wireless Sensor Network

Software Defined Networking for Ad Hoc Networks

Research paper thumbnail of Software-Defined Networking-Based Ad hoc Networks Routing Protocols

Software Defined Networking for Ad Hoc Networks

Research paper thumbnail of Energy Conservation in Wireless Sensor Network

An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. I... more An ad-hoc network is a local area network (LAN) that is built spontaneously as devices connect. Instead of relying on a base station to coordinate the flow of messages to each node in the network, the individual network nodes forward packets to and from each other. In Latin, "Ad-hoc" is actually a Latin phrase that means "for this purpose." It is often used to describe solutions that are developed on-the-fly for a specific purpose. In computer networking, an ad hoc network refers to a network connection established for a single session and does not require a router or a wireless base station.