somesh dewangan - Academia.edu (original) (raw)

Papers by somesh dewangan

Research paper thumbnail of Automated Facial Feature Points Extraction

Ijcer, Oct 30, 2012

This paper proposes the extraction of geometric and texture feature of face automatically from fr... more This paper proposes the extraction of geometric and texture feature of face automatically from front view. For extracting the geometric feature cumulative histogram approach is used and co-occurrence matrices are used to extract the texture feature of face. From the input image, face location is detected using the viola-Jones algorithm, from the structure of human face, 4 relevant regions such as left eye, right eye, nose and mouth regions are cropped named as object. For extracting the geometric feature histogram of each Object is computed and its cumulative histogram values are employed by varying different threshold values to create a new filtered binary image of each Object, then the corner end-point of each object (binary image) is detected using the linear search technique. For extracting the texture feature co-occurrence matrices of each object is determined, using this matrix, angular second moment, entropy, maximum probability of occurrence pixels, inverse difference, inverse difference moment , mean, contrast of each object is detected.

Research paper thumbnail of A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

International Journal of Advanced Research in Computer Science and Electronics Engineering, Sep 28, 2013

Cloud computing is a prospering technology that most organizations are considering for adoption a... more Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. We identify threats and security attributes applicable in cloud computing. We also select a framework suitable for identifying information security metrics. Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. The cloud provider is responsible for the environment, so organizations can make use of resources for short periods of time without having to maintain the environment when it is not being used. While cloud computing models are attractive because of their flexibility and cost effectiveness, certain challenges must be addressed in order to provide a viable option to traditional data services. First and foremost is the issue of security. The externalized aspect of outsourcing can make it harder to maintain data integrity and privacy, support data and service availability, demonstrate compliance, and secure highly available access to applications and information. In short, cloud computing can present an added level of risk. This paper discusses security, threats and availability-related challenges in cloud computing environments.

Research paper thumbnail of Survey and Performance Analysis of Routing Protocols in MANET

A Mobile Ad-hoc Network (MANET) consists of several mobile wireless nodes. It is infrastructure-l... more A Mobile Ad-hoc Network (MANET) consists of several mobile wireless nodes. It is infrastructure-less, self organized and self configurable network in which the mobile nodes move arbitrarily. A routing protocol establishes correct and efficient route between mobile nodes and find the routes to facilitate communication within the network. Route should be discovered and maintained with minimum overhead and bandwidth consumption. Here topology based routing protocols, both proactive and reactive protocols have been considered for study. The performance of routing protocols (DSDV, AODV, OLSR, DSR, TORA, ZRP) is analyzed in terms of their packet delivery ratio, throughput, end-to-end delay, bandwidth, control overhead and energy consumption. We analyze the solution of routing in MANET and evaluate its performance using Network Simulator-2 (NS-2) under different network parameters.

Research paper thumbnail of Comparative Study: Detection of Shadow and Its Removal

Research paper thumbnail of Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

IOSR Journal of Computer Engineering, 2014

Public key cryptography is typically used in the field of mathematical, which consist of factors ... more Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in public key cryptography, factors decomposition problems RSA cryptography is generally used, but in the field of hardware and high-performance computing technology RSA has encountered some difficulties. To overcome such type of difficulties the elliptic curve discrete logarithm is introduced, which provides advantages, whose public key is short, network bandwidth is small and ability to defend against to attack is strong. This paper presents the design principles of elliptic curve public key cryptography, Authentication, Encryption and Decryption with shorter key of RSA.

Research paper thumbnail of Using The Genetic Algorithm, Security Enhancement of Aircraft Landing Control System

ijetae.com

This paper presents a new approach for enhancing the security on the aircraft system during landi... more This paper presents a new approach for enhancing the security on the aircraft system during landing phase. There are some dangerous conditions like gusts and downbursts which may occur rarely in service life of aircraft, though, aircraft must be tested for these dangerous conditions. This flight control system is capable of providing the failure identification and detection during landing. In this research a trajectory optimization has being undertaken using Genetic Algorithm.

Research paper thumbnail of Security Enhancement of Dynamic System Using PID Controller and Optimization Algorithm

International Journal, 2012

Research paper thumbnail of Automated Facial Feature Points Extraction

IJCER, 2012

This paper proposes the extraction of geometric and texture feature of face automatically from fr... more This paper proposes the extraction of geometric and texture feature of face automatically from front view. For extracting the geometric feature cumulative histogram approach is used and co-occurrence matrices are used to extract the texture feature of face. From the input image, face location is detected using the viola-Jones algorithm, from the structure of human face, 4 relevant regions such as left eye, right eye, nose and mouth regions are cropped named as object. For extracting the geometric feature histogram of each Object is computed and its cumulative histogram values are employed by varying different threshold values to create a new filtered binary image of each Object, then the corner end-point of each object (binary image) is detected using the linear search technique. For extracting the texture feature co-occurrence matrices of each object is determined, using this matrix, angular second moment, entropy, maximum probability of occurrence pixels, inverse difference, inverse difference moment , mean, contrast of each object is detected.

Research paper thumbnail of QUALITY AWARE TRANSACTION PROCESSING FRAMEWORK FOR MOBILE COMPUTING

indusedu.org

The existing transaction models do not sufficiently capture the complexity and the execution requ... more The existing transaction models do not sufficiently capture the complexity and the execution requirements of mobile and Internet applications since most of the existing models are developed with a database-centric view. Besides, it is also assumed that transaction components are to be executed over applications that are cooperatively developed. Another problem with current transaction models proposed in mobile systems is that they assume an infrastructure based mobile network and require the mobile support station (MSS). New transaction models are needed to address application/workflow frameworks that capture the collaborative yet independent, mobile and heterogeneous nature of application components. In contrast to the weak transaction model proposed in most research works, we propose a multi-state transaction model that can adapt between the strongest and the weakest transaction model. A high quality transaction service can gracefully degrade to the low quality transaction service according to predefined QoS contracts. By systematically relaxing ACID properties, our techniques improve the availability and responsiveness of transaction services.

Research paper thumbnail of STUDY AND ANALYSIS OF INDIGENOUS RISK IMPACT SCREEN (IRIS) IN ALCOHOL PRESENCE USING TEXTURAL FEATURES

ijareeie.com

Many features can be used as a biometric trait like, fingerprint, gait, hand, palm, iris, face, s... more Many features can be used as a biometric trait like, fingerprint, gait, hand, palm, iris, face, signature and so on, but With the cost of eye-scanning technology coming down and the need for more secure systems going up, it's time to take a close look at iris recognition. The iris of every individual is unique and remains unchanged with time. The study of effect of alcohol on the iris is a challenging task. The pupil of the eyes gives noticeable change in the presence of alcohol. There were very few literatures found in this field, though many researches had been done over iris recognition but the study over alcoholic eyes is limited to few numbers. The present work deals with the study of psychometric features of iris as a screening instrument for determining the presence of alcohol. this paper uses the textural features of an eye image for analysis of alcoholic eyes and it is found that textural features gives appropriate results. The algorithm used is the textural based property algorithm. The output of the work will give the differentiation between an alcoholic and non-alcoholic subject and thus protecting a secure organization from various threats.

Research paper thumbnail of Using Geometrical Features Study and Analysis of Indigenous Risk Impact Screen (IRIS) in Alcohol Presence

ijetae.com

Biometrics is the science of recognizing the identity of a person based on the physical or behavi... more Biometrics is the science of recognizing the identity of a person based on the physical or behavioral attributes of the individual such as face, fingerprint, voice, iris and so on. These features are termed as a biometric trait. Among them fingerprints have had a long and successful history in forensics, but with the cost of eye-scanning technology coming down and the need for more secure systems going up, the iris recognition has achieved a lot of importance and success as well. The iris of every individual is unique and remains unchanged with time. The study of effect of alcohol on the iris is a challenging task. The pupil of the eyes gives noticeable change in the presence of alcohol. There were very few literatures found in this field, though many researches had been done over iris recognition but the study over alcoholic eyes is limited to few numbers. The present work deals with the study of psychometric features of iris as a screening instrument for determining the presence of alcohol. this paper uses the geometrical features of an eye image for analysis of alcoholic eyes and it is found that geometrical features gives appropriate results. The algorithm used is the textural based property algorithm, with the use of a filter named 'homomorphic butter worth filter'. The output of the work will give the differentiation between an alcoholic and non-alcoholic subject and thus protecting a secure organization from various threats.

Research paper thumbnail of Modified Genetic Algorithm for DNA Sequence Assembly by Shotgun and Hybridization Sequencing Techniques

International Journal of …

Since the advent of rapid DNA sequencing methods in 1976, scientists have had the problem of infe... more Since the advent of rapid DNA sequencing methods in 1976, scientists have had the problem of inferring DNA sequences from sequenced fragments. Shotgun sequencing is a well-established biological and computational method used in practice. Many conventional algorithms for shotgun sequencing are based on the notion of pair wise fragment overlap. While shotgun sequencing infers a DNA sequence given the sequences of overlapping fragments, a recent and complementary method, called sequencing by hybridization (SBH), infers a DNA sequence given the set of oligomers that represents all sub words of some fixed length, k. In this paper, we propose a new computer algorithm for DNA sequence assembly that combines in a novel way the techniques of both shotgun and SBH methods. Based on our preliminary investigations, the algorithm promises-to be very fast and practical for DNA sequence assembly [1].

Research paper thumbnail of Top-K Peer Selection Algorithm for Load Balancing

One of main problems in load balancing is to find the appropriate nodes to transfer the extra loa... more One of main problems in load balancing is to find the appropriate nodes to transfer the extra load. Previous approaches need to maintain metadata information about load and other information periodically in P2P system even if there are no overloaded nodes. Most importantly, they could not find out the best available peers, which satisfy the requirement of the overloaded node.

Research paper thumbnail of DNA sequencing by Hybridization and Shotgun sequencing

International …, 2012

DNA sequencing includes several methods and technologies that are used for determining the order ... more DNA sequencing includes several methods and technologies that are used for determining the order of the nucleotide bases adenine, guanine, cytosine, and thymine in a molecule of DNA.

Research paper thumbnail of Automated Facial Feature Points Extraction

Ijcer, Oct 30, 2012

This paper proposes the extraction of geometric and texture feature of face automatically from fr... more This paper proposes the extraction of geometric and texture feature of face automatically from front view. For extracting the geometric feature cumulative histogram approach is used and co-occurrence matrices are used to extract the texture feature of face. From the input image, face location is detected using the viola-Jones algorithm, from the structure of human face, 4 relevant regions such as left eye, right eye, nose and mouth regions are cropped named as object. For extracting the geometric feature histogram of each Object is computed and its cumulative histogram values are employed by varying different threshold values to create a new filtered binary image of each Object, then the corner end-point of each object (binary image) is detected using the linear search technique. For extracting the texture feature co-occurrence matrices of each object is determined, using this matrix, angular second moment, entropy, maximum probability of occurrence pixels, inverse difference, inverse difference moment , mean, contrast of each object is detected.

Research paper thumbnail of A Valued Analysis of Information Security, Threats and Solutions for Cloud Computing

International Journal of Advanced Research in Computer Science and Electronics Engineering, Sep 28, 2013

Cloud computing is a prospering technology that most organizations are considering for adoption a... more Cloud computing is a prospering technology that most organizations are considering for adoption as a cost effective strategy for managing IT. However, organizations also still consider the technology to be associated with many business risks that are not yet resolved. Such issues include security, privacy as well as legal and regulatory risks. We identify threats and security attributes applicable in cloud computing. We also select a framework suitable for identifying information security metrics. Cloud computing has become an increasingly popular means of delivering valuable, IT-enabled business services. Adopting cloud technology can be an affordable way to get access to a dynamically scalable, virtualized computing environment. The cloud provider is responsible for the environment, so organizations can make use of resources for short periods of time without having to maintain the environment when it is not being used. While cloud computing models are attractive because of their flexibility and cost effectiveness, certain challenges must be addressed in order to provide a viable option to traditional data services. First and foremost is the issue of security. The externalized aspect of outsourcing can make it harder to maintain data integrity and privacy, support data and service availability, demonstrate compliance, and secure highly available access to applications and information. In short, cloud computing can present an added level of risk. This paper discusses security, threats and availability-related challenges in cloud computing environments.

Research paper thumbnail of Survey and Performance Analysis of Routing Protocols in MANET

A Mobile Ad-hoc Network (MANET) consists of several mobile wireless nodes. It is infrastructure-l... more A Mobile Ad-hoc Network (MANET) consists of several mobile wireless nodes. It is infrastructure-less, self organized and self configurable network in which the mobile nodes move arbitrarily. A routing protocol establishes correct and efficient route between mobile nodes and find the routes to facilitate communication within the network. Route should be discovered and maintained with minimum overhead and bandwidth consumption. Here topology based routing protocols, both proactive and reactive protocols have been considered for study. The performance of routing protocols (DSDV, AODV, OLSR, DSR, TORA, ZRP) is analyzed in terms of their packet delivery ratio, throughput, end-to-end delay, bandwidth, control overhead and energy consumption. We analyze the solution of routing in MANET and evaluate its performance using Network Simulator-2 (NS-2) under different network parameters.

Research paper thumbnail of Comparative Study: Detection of Shadow and Its Removal

Research paper thumbnail of Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption

IOSR Journal of Computer Engineering, 2014

Public key cryptography is typically used in the field of mathematical, which consist of factors ... more Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in public key cryptography, factors decomposition problems RSA cryptography is generally used, but in the field of hardware and high-performance computing technology RSA has encountered some difficulties. To overcome such type of difficulties the elliptic curve discrete logarithm is introduced, which provides advantages, whose public key is short, network bandwidth is small and ability to defend against to attack is strong. This paper presents the design principles of elliptic curve public key cryptography, Authentication, Encryption and Decryption with shorter key of RSA.

Research paper thumbnail of Using The Genetic Algorithm, Security Enhancement of Aircraft Landing Control System

ijetae.com

This paper presents a new approach for enhancing the security on the aircraft system during landi... more This paper presents a new approach for enhancing the security on the aircraft system during landing phase. There are some dangerous conditions like gusts and downbursts which may occur rarely in service life of aircraft, though, aircraft must be tested for these dangerous conditions. This flight control system is capable of providing the failure identification and detection during landing. In this research a trajectory optimization has being undertaken using Genetic Algorithm.

Research paper thumbnail of Security Enhancement of Dynamic System Using PID Controller and Optimization Algorithm

International Journal, 2012

Research paper thumbnail of Automated Facial Feature Points Extraction

IJCER, 2012

This paper proposes the extraction of geometric and texture feature of face automatically from fr... more This paper proposes the extraction of geometric and texture feature of face automatically from front view. For extracting the geometric feature cumulative histogram approach is used and co-occurrence matrices are used to extract the texture feature of face. From the input image, face location is detected using the viola-Jones algorithm, from the structure of human face, 4 relevant regions such as left eye, right eye, nose and mouth regions are cropped named as object. For extracting the geometric feature histogram of each Object is computed and its cumulative histogram values are employed by varying different threshold values to create a new filtered binary image of each Object, then the corner end-point of each object (binary image) is detected using the linear search technique. For extracting the texture feature co-occurrence matrices of each object is determined, using this matrix, angular second moment, entropy, maximum probability of occurrence pixels, inverse difference, inverse difference moment , mean, contrast of each object is detected.

Research paper thumbnail of QUALITY AWARE TRANSACTION PROCESSING FRAMEWORK FOR MOBILE COMPUTING

indusedu.org

The existing transaction models do not sufficiently capture the complexity and the execution requ... more The existing transaction models do not sufficiently capture the complexity and the execution requirements of mobile and Internet applications since most of the existing models are developed with a database-centric view. Besides, it is also assumed that transaction components are to be executed over applications that are cooperatively developed. Another problem with current transaction models proposed in mobile systems is that they assume an infrastructure based mobile network and require the mobile support station (MSS). New transaction models are needed to address application/workflow frameworks that capture the collaborative yet independent, mobile and heterogeneous nature of application components. In contrast to the weak transaction model proposed in most research works, we propose a multi-state transaction model that can adapt between the strongest and the weakest transaction model. A high quality transaction service can gracefully degrade to the low quality transaction service according to predefined QoS contracts. By systematically relaxing ACID properties, our techniques improve the availability and responsiveness of transaction services.

Research paper thumbnail of STUDY AND ANALYSIS OF INDIGENOUS RISK IMPACT SCREEN (IRIS) IN ALCOHOL PRESENCE USING TEXTURAL FEATURES

ijareeie.com

Many features can be used as a biometric trait like, fingerprint, gait, hand, palm, iris, face, s... more Many features can be used as a biometric trait like, fingerprint, gait, hand, palm, iris, face, signature and so on, but With the cost of eye-scanning technology coming down and the need for more secure systems going up, it's time to take a close look at iris recognition. The iris of every individual is unique and remains unchanged with time. The study of effect of alcohol on the iris is a challenging task. The pupil of the eyes gives noticeable change in the presence of alcohol. There were very few literatures found in this field, though many researches had been done over iris recognition but the study over alcoholic eyes is limited to few numbers. The present work deals with the study of psychometric features of iris as a screening instrument for determining the presence of alcohol. this paper uses the textural features of an eye image for analysis of alcoholic eyes and it is found that textural features gives appropriate results. The algorithm used is the textural based property algorithm. The output of the work will give the differentiation between an alcoholic and non-alcoholic subject and thus protecting a secure organization from various threats.

Research paper thumbnail of Using Geometrical Features Study and Analysis of Indigenous Risk Impact Screen (IRIS) in Alcohol Presence

ijetae.com

Biometrics is the science of recognizing the identity of a person based on the physical or behavi... more Biometrics is the science of recognizing the identity of a person based on the physical or behavioral attributes of the individual such as face, fingerprint, voice, iris and so on. These features are termed as a biometric trait. Among them fingerprints have had a long and successful history in forensics, but with the cost of eye-scanning technology coming down and the need for more secure systems going up, the iris recognition has achieved a lot of importance and success as well. The iris of every individual is unique and remains unchanged with time. The study of effect of alcohol on the iris is a challenging task. The pupil of the eyes gives noticeable change in the presence of alcohol. There were very few literatures found in this field, though many researches had been done over iris recognition but the study over alcoholic eyes is limited to few numbers. The present work deals with the study of psychometric features of iris as a screening instrument for determining the presence of alcohol. this paper uses the geometrical features of an eye image for analysis of alcoholic eyes and it is found that geometrical features gives appropriate results. The algorithm used is the textural based property algorithm, with the use of a filter named 'homomorphic butter worth filter'. The output of the work will give the differentiation between an alcoholic and non-alcoholic subject and thus protecting a secure organization from various threats.

Research paper thumbnail of Modified Genetic Algorithm for DNA Sequence Assembly by Shotgun and Hybridization Sequencing Techniques

International Journal of …

Since the advent of rapid DNA sequencing methods in 1976, scientists have had the problem of infe... more Since the advent of rapid DNA sequencing methods in 1976, scientists have had the problem of inferring DNA sequences from sequenced fragments. Shotgun sequencing is a well-established biological and computational method used in practice. Many conventional algorithms for shotgun sequencing are based on the notion of pair wise fragment overlap. While shotgun sequencing infers a DNA sequence given the sequences of overlapping fragments, a recent and complementary method, called sequencing by hybridization (SBH), infers a DNA sequence given the set of oligomers that represents all sub words of some fixed length, k. In this paper, we propose a new computer algorithm for DNA sequence assembly that combines in a novel way the techniques of both shotgun and SBH methods. Based on our preliminary investigations, the algorithm promises-to be very fast and practical for DNA sequence assembly [1].

Research paper thumbnail of Top-K Peer Selection Algorithm for Load Balancing

One of main problems in load balancing is to find the appropriate nodes to transfer the extra loa... more One of main problems in load balancing is to find the appropriate nodes to transfer the extra load. Previous approaches need to maintain metadata information about load and other information periodically in P2P system even if there are no overloaded nodes. Most importantly, they could not find out the best available peers, which satisfy the requirement of the overloaded node.

Research paper thumbnail of DNA sequencing by Hybridization and Shotgun sequencing

International …, 2012

DNA sequencing includes several methods and technologies that are used for determining the order ... more DNA sequencing includes several methods and technologies that are used for determining the order of the nucleotide bases adenine, guanine, cytosine, and thymine in a molecule of DNA.