Naved Alam | Jamia Hamdard (original) (raw)

Papers by Naved Alam

Research paper thumbnail of Synergistic Integration of Master Data Management and Expert System for Maximizing Knowledge Efficiency and Decision-Making Capabilities

Research paper thumbnail of Gender Differences in Diabetes Care and Management Using AI

CRC Press eBooks, Aug 22, 2023

Research paper thumbnail of IoT based cost-effective smart parking system

COMPUTATIONAL INTELLIGENCE AND NETWORK SECURITY

The number of vehicles on the road has been increasing rapidly, especially in metropolitan cities... more The number of vehicles on the road has been increasing rapidly, especially in metropolitan cities. It's observed finding parking space is a time consuming and hectic task for the drivers, moreover, the environment is also get affected due to the level of fuel burn in the parking lot. Therefore, a practically feasible solution is demanded to find out parking space in small spam of time to save the driver's time and to keep our cities clean. In this paper, a framework is proposed to provide parking space for vehicles by using IoT and some other technologies. Moreover, application based hardware is proposed using microcontrollers, IoT devices and web applications. The proposed design also gives multiple options for the payment to save time and deadlocks in the parking area.

Research paper thumbnail of Prognostic criteria for the management of temporomandibular disorders using arthrocentesis with normal saline and arthrocentesis with normal saline and platelet-rich plasma

Journal of medicine and life, May 1, 2022

Temporomandibular joint disorders (TMDs) are ailments affecting the jaws and allied structures, r... more Temporomandibular joint disorders (TMDs) are ailments affecting the jaws and allied structures, resulting in many pathologies (TMJ hypermobility, internal disc derangement, bone changes, degenerative disorders, and ankylosis). Pain, clicking or crepitus, restricted range of motion, deranged jaw function, and deflected or deviated mouth opening and closing are the commonly observed manifestations in TMDs. Internal derangement refers to an aberrant relation of the articular disc to the condyle and fossa, respectively. Conventional therapies highlight the role of non-invasive conservative treatment strategies, namely joint unloading, anti-inflammatory drugs, and physiotherapy. Current literature has emphasized the use of corticosteroids and platelet-rich plasma (PRP) as treatment strategies in TMDs. This study aimed to evaluate whether intra-articular injection of PRP after normal saline lavage in TMJ minimizes the symptoms of TMDs, as compared to injection of normal saline. Thirty patients with TMD according to research diagnostic criteria (RDC) were selected. One group received arthrocentesis with normal saline, and the other group received arthrocentesis with PRP injection. The patients were assessed for pain, maximum inter-incisal mouth opening, bite force, and TMJ sounds. TMDs treated by PRP injection had slightly better results. More studies are required to substantiate the outcome. Injections of PRP were more effective in reducing the symptoms than arthrocentesis with normal saline.

Research paper thumbnail of Water Accumulation- Navigation & Drainage Controller

Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

In today's time, even in the modern cities, there are not many efficient drainage systems that ca... more In today's time, even in the modern cities, there are not many efficient drainage systems that can clear the accumulated liquid waste on roads and dispose it no time. There are traditional styled drains which often get blocked with impurities/other blockades. Major problem due to this is in the rainy season wherein accumulated rainwater leads to hour-long traffic jams. There is no way a person can pre-plan as to where all he/she can expect water clogging and where not. The proposed concept is to install a device at various places (roads, grounds, pitches, campus etc.) where water and other wastes could be accumulated during drain overflows, rains etc., The device would automate the process of clearing water clogged areas efficiently and quickly. Additionally, the data about water clogged areas can also be accessed on a mobile application enabling the user to check which locations are currently experiencing water clogging or any other drainage issue.s

Research paper thumbnail of Security and Privacy for IoT-based Smart Cities

CRC Press eBooks, Dec 9, 2022

Research paper thumbnail of Semi‐distributed resource allocation and power quantization control algorithm for device‐to‐device network

International Journal of Communication Systems, 2021

The cellular mobile communication network has been widely deployed in large regions to provide co... more The cellular mobile communication network has been widely deployed in large regions to provide connectivity between billions of people. The population of cellular mobile users has been growing since the past decade. Therefore, we need a high capacity cellular system with extraordinary performance to meet the demand of the cellular users. To minimize the traffic load from the evolved Node Base (eNB) station, device‐to‐device (D2D) network must be deployed along with the commercial cellular network. D2D provides the direct connectivity between the proximal users without associating with eNB. This reduces the traffic load from the eNB. In other words, it enhances the capacity of the system. But D2D communication suffers a severe interference by the cellular user. In this paper, we have proposed a solution for the cross‐tier interference faced by the D2D users and eNB under uplink reuse transmission. We have proposed a semi‐distributed resource allocation and power quantization control (SRA–PQC) scheme. The simulation result shows that a better sum rate can be achieved using the proposed scheme.

Research paper thumbnail of Medical Image Fusion in NSST Domain utilizing Laplacian Low Energy and Average Fusion Rule

Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

Digital photography is a very powerful and widely used form of communication. They represent the ... more Digital photography is a very powerful and widely used form of communication. They represent the most complex details of the world around us in a simple, coherent, and easily accessible way. Due to the natural advances in the acquisition of devices such as bio-sensors and remote sensors, large amounts of data are available for further processing and extraction of data. In this proposed research study of Image fusion, The NSST method is applied for the decomposition of two medical Images into Low-Frequency Sub-band and High-Frequency Sub-band. Low pass frequency subbands are combined using an average filter and a modified Low pass sub-band is created. The modified high pass sub-band is created using intermediate high pass sub-bands with local laplacian. The final image is calculated by applying inverse NSST on Modified low pass sub-band and modified high pass sub-bands. Results are calculated that show this methodology Increases image fusion efficiency and able to remove the noise artifacts with increased information transfer rate.

Research paper thumbnail of A novel method for diabetes classification and prediction with Pycaret

Microsystem Technologies

The incredible advances in biotechnology and public healthcare infrastructures have resulted in a... more The incredible advances in biotechnology and public healthcare infrastructures have resulted in a massive output of vital and sensitive healthcare data. Many fascinating trends are discovered using intelligent data analysis approaches for the early identification and prevention of numerous severe illnesses. Diabetes mellitus is a highly hazardous condition since it leads to other deadly diseases such as heart, kidney, and nerve damage. In this research study, a low code Pycaret machine learning technique is used for diabetes categorization, detection, and prediction. On applying Pycaret various classifiers having different accuracies are produced and shown in the result section. After hyper tuning of various classifiers, it is found that the gradient boosting classifier is best further tuned and an accuracy of about 90% is achieved which is the highest among all existing ML classifiers.

Research paper thumbnail of Digital and Technological Solutions for Vietnam Tourism Services Development

Advances in Data and Information Sciences

Research paper thumbnail of Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking In Video

In this era any type of digital media such as image, text, audio and video, all are easily access... more In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is ...

Research paper thumbnail of Internet of Things: A literature review

2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE), 2017

The future we imagine is for automatic devices is to make ease the life of human on this planet. ... more The future we imagine is for automatic devices is to make ease the life of human on this planet. We are entering in a technological era with artificial intelligence, RFID, wireless communication. These devices are communicating, and allowing numerous functions across organizations across the world. In this paper we have conducted a brief survey on Internet of things that will explain about the architecture, issues, and applications.

Research paper thumbnail of Human Emotion Detection Using Deep Learning Neural Network

Lecture notes in networks and systems, Sep 23, 2022

Research paper thumbnail of Applicability of Cellular Automata in Cryptanalysis

International Journal of Applied Metaheuristic Computing, 2017

Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to ... more Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional techniques. However, soft computing techniques like Genetic Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in, in order to put the proposed technique in the perspective. The work also finds the applicability of Cellular Automata in cryptanalysis. A new technique has been proposed and verified for texts of around 1000 words. Each text is encrypted 10 times and then decrypted using the proposed technique. The work has also been compared with that employing Genetic Algorithm. The experiments carrie...

Research paper thumbnail of A Robust Video Watermarking Technique using DWT, DCT, and FFT

Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Appl... more Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Apply DWT on each frame that will convert it into four sub-band frequency ranges as LL, LH, HL, and HH. Apply again DWT on LL sub-band then it will divide as LL1, LH1, HL1, and HH1 sub band of LL band. After applying DWT at 2-level, apply SVD in LL1 Sub-band, DCT in LH1 and FFT in HH1 sub-band of LL band. Same process will be applied on watermark symbol/image. Embed both host frame and watermark image with some scaling factor ‘α’. For watermarked video arrange all the decomposed matrices using inverse technique. Watermarked video will be generated. To proof of ownership watermarking extraction process would be follow. And for proofing robustness and security level of this watermarked technique watermarked video will be compared with original video. And NCC, PSNR, BER value would be calculated. Keywords— dwt, dct, fft, svd, psnr, ncc, ber

Research paper thumbnail of Ber Performance Study of Orthogonal Frequency Division Multiplexing

OFDM efficiently overcomes the problems that plague most wireless channels. Multipath propagation... more OFDM efficiently overcomes the problems that plague most wireless channels. Multipath propagation is a serious hazard that introduces delay spread accounting for multiple copies of the transmitted signal to reach the receiver. This causes energy of one symbol of information to spill onto several successive symbols. This phenomenon is called Inter Symbol Interference (ISI). OFDM reduces ISI through several simultaneous transmissions, thus making it possible to have an increase in the transmission time for each symbol. OFDM moves the equalization operation to the frequency domain instead of time domain as in the case of single carrier systems. OFDM is based on parallel data transmission scheme that reduces that effects of multipath fading and renders complex equalizers unnecessary. In this project will study and identify t h e Orthogonal Frequency Division Multiplexing (OFDM) technology that gives the best BER performance in a multipath fading environment using computer simulation. Or...

Research paper thumbnail of Low Level Laser Therapy for Non-Invasive Dental applications: A Review

International Journal of Engineering Research and

Laser therapy has an excellent track record in medical applications, and it has made its unmatche... more Laser therapy has an excellent track record in medical applications, and it has made its unmatched position by treating several dental problems. Laser devices has successfully improved healthcare in medical field by providing non-invasive and painless ways of treatment. In this paper the systematic review has been conducted for the comparative study of Laser technology using Low Level Laser Therapy in dental applications. For this the database is looked through utilizing Pubmed, IEEE, Science Direct utilizing foreordained inquiry term Low Level Laser Therapy and Laser treatment in dental treatment for the most part centered around laser diode dental treatment. Our clinical comparative study shows that Laser therapy is a painless treatment which may help fast healing in less time as compare to traditional treatment.

Research paper thumbnail of Internet of Things: A Literature Review

IJRIT, 2018

The Internet of Things (IoT) is the internetworking of physical devices (also referred to as &quo... more The Internet of Things (IoT) is the internetworking of physical devices (also referred to as " connected devices "), buildings and other items embedded with electronics, sensors, actuators and network connectivity which enable them to collect and exchange data with each other. The paper discusses the Applications of IOT with the Security Concerns and Vulnerabilities associated with IOT. The paper further discusses the possible solutions to the Security threats.

Research paper thumbnail of Applicability of Cellular Automata in Cryptanalysis

Abstract Cryptanalysis refers to finding the plaintext from the given cipher text. The problem re... more Abstract
Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional techniques. However, soft computing techniques like Genetic Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in, in order to put the proposed technique in the perspective. The work also finds the applicability of Cellular Automata in cryptanalysis. A new technique has been proposed and verified for texts of around 1000 words. Each text is encrypted 10 times and then decrypted using the proposed technique. The work has also been compared with that employing Genetic Algorithm. The experiments carried out prove the veracity of the technique and paves way of Cellular automata in cryptanalysis. The paper also discusses the future scope of the work.

Research paper thumbnail of A Robust Video Watermarking Technique using DWT, DCT, and FFT

—Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. App... more —Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Apply DWT on each frame that will convert it into four sub-band frequency ranges as LL, LH, HL, and HH. Apply again DWT on LL sub-band then it will divide as LL1, LH1, HL1, and HH1 sub band of LL band. After applying DWT at 2-level, apply SVD in LL1 Sub-band, DCT in LH1 and FFT in HH1 sub-band of LL band. Same process will be applied on watermark symbol/image. Embed both host frame and watermark image with some scaling factor 'α'. For watermarked video arrange all the decomposed matrices using inverse technique. Watermarked video will be generated. To proof of ownership watermarking extraction process would be follow. And for proofing robustness and security level of this watermarked technique watermarked video will be compared with original video. And NCC, PSNR, BER value would be calculated. I. INTRODUCTION Internet has become indispensible and thus the security and the privacy issue have come to the fore of the computing fraternity. These issues need to be addressed with utmost urgency and highest level of dedication. Watermarking addresses the privacy and security issues. Watermarking has helped not just in security but also in resolving numerous copyright and privacy issues, which became one of the most contentious issues while the expansion of internet. This proposal explores the state of art introduces a novel technique to tackle the elephant in the room. Watermarking techniques can be segregated on the basis of domain based, document based, Perception based and application based. Domain of watermarking technique is divided in to two parts such as on the basis of spatial domain and other is on the basis of frequency domain. In spatial domain watermarking, watermark is embedded by modifying the pixels value of the host image/ video directly. The main advantages of pixel based methods are that they are conceptually simple and have very low computational complexities and therefore are widely used in video watermarking where real-time performance is a primary concern. However, they also exhibit some major limitations. The need for absolute spatial synchronization leads to high susceptibility to de-synchronization attacks; lack of consideration of the temporal axis results in vulnerability to video processing and multiple frame collusion; and watermark optimization is difficult using only spatial analysis techniques. In frequency domain, the watermark is embedded for the robustness of the watermarking mechanism. There are three main methods of data transmission in frequency domain. as DCT DFT and DWT. The main strength offered by transforming domain techniques is that they can take advantage of special properties of alternate domains to address the limitations of pixel-based methods or to support additional features. Generally, transform domain methods require higher computational time. In transform domain technique, the watermark is embedded distributive in overall domain of an original data. Host video is first converted into frequency domain by transformation techniques. The transformed domain coefficients are then altered to store the watermark information. The inverse transform is finally applied in order to obtain the watermarked video. On the basis of document watermarking can be apply on Image, Text, Audio and Video. According to the human perception watermarking is divided in to two parts visible watermark media and invisible watermark media. Invisible watermark is further are of two types robust watermarking and fragile watermarking. For effective watermarking the watermarking techniques need to be imperceptible (watermark should not degrade the quality of multimedia), robust (after applying attacks quality of multimedia should not be degrade), and secure from various attacks. In Most of the watermarking techniques, the watermark is embedded into the frequency domain instead of the spatial domain for the robustness of the watermarking mechanism. Discrete Cosine Transformation (DCT), Discrete Fourier Transformation (DFT) and Discrete Wavelet Transformation (DWT) are the three main methods of data transformation in this domain. The main strength offered by transforming domain techniques is that they can take advantage of special properties of alternate domains to address the limitations of pixel-based methods or to support additional features.

Research paper thumbnail of Synergistic Integration of Master Data Management and Expert System for Maximizing Knowledge Efficiency and Decision-Making Capabilities

Research paper thumbnail of Gender Differences in Diabetes Care and Management Using AI

CRC Press eBooks, Aug 22, 2023

Research paper thumbnail of IoT based cost-effective smart parking system

COMPUTATIONAL INTELLIGENCE AND NETWORK SECURITY

The number of vehicles on the road has been increasing rapidly, especially in metropolitan cities... more The number of vehicles on the road has been increasing rapidly, especially in metropolitan cities. It's observed finding parking space is a time consuming and hectic task for the drivers, moreover, the environment is also get affected due to the level of fuel burn in the parking lot. Therefore, a practically feasible solution is demanded to find out parking space in small spam of time to save the driver's time and to keep our cities clean. In this paper, a framework is proposed to provide parking space for vehicles by using IoT and some other technologies. Moreover, application based hardware is proposed using microcontrollers, IoT devices and web applications. The proposed design also gives multiple options for the payment to save time and deadlocks in the parking area.

Research paper thumbnail of Prognostic criteria for the management of temporomandibular disorders using arthrocentesis with normal saline and arthrocentesis with normal saline and platelet-rich plasma

Journal of medicine and life, May 1, 2022

Temporomandibular joint disorders (TMDs) are ailments affecting the jaws and allied structures, r... more Temporomandibular joint disorders (TMDs) are ailments affecting the jaws and allied structures, resulting in many pathologies (TMJ hypermobility, internal disc derangement, bone changes, degenerative disorders, and ankylosis). Pain, clicking or crepitus, restricted range of motion, deranged jaw function, and deflected or deviated mouth opening and closing are the commonly observed manifestations in TMDs. Internal derangement refers to an aberrant relation of the articular disc to the condyle and fossa, respectively. Conventional therapies highlight the role of non-invasive conservative treatment strategies, namely joint unloading, anti-inflammatory drugs, and physiotherapy. Current literature has emphasized the use of corticosteroids and platelet-rich plasma (PRP) as treatment strategies in TMDs. This study aimed to evaluate whether intra-articular injection of PRP after normal saline lavage in TMJ minimizes the symptoms of TMDs, as compared to injection of normal saline. Thirty patients with TMD according to research diagnostic criteria (RDC) were selected. One group received arthrocentesis with normal saline, and the other group received arthrocentesis with PRP injection. The patients were assessed for pain, maximum inter-incisal mouth opening, bite force, and TMJ sounds. TMDs treated by PRP injection had slightly better results. More studies are required to substantiate the outcome. Injections of PRP were more effective in reducing the symptoms than arthrocentesis with normal saline.

Research paper thumbnail of Water Accumulation- Navigation & Drainage Controller

Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

In today's time, even in the modern cities, there are not many efficient drainage systems that ca... more In today's time, even in the modern cities, there are not many efficient drainage systems that can clear the accumulated liquid waste on roads and dispose it no time. There are traditional styled drains which often get blocked with impurities/other blockades. Major problem due to this is in the rainy season wherein accumulated rainwater leads to hour-long traffic jams. There is no way a person can pre-plan as to where all he/she can expect water clogging and where not. The proposed concept is to install a device at various places (roads, grounds, pitches, campus etc.) where water and other wastes could be accumulated during drain overflows, rains etc., The device would automate the process of clearing water clogged areas efficiently and quickly. Additionally, the data about water clogged areas can also be accessed on a mobile application enabling the user to check which locations are currently experiencing water clogging or any other drainage issue.s

Research paper thumbnail of Security and Privacy for IoT-based Smart Cities

CRC Press eBooks, Dec 9, 2022

Research paper thumbnail of Semi‐distributed resource allocation and power quantization control algorithm for device‐to‐device network

International Journal of Communication Systems, 2021

The cellular mobile communication network has been widely deployed in large regions to provide co... more The cellular mobile communication network has been widely deployed in large regions to provide connectivity between billions of people. The population of cellular mobile users has been growing since the past decade. Therefore, we need a high capacity cellular system with extraordinary performance to meet the demand of the cellular users. To minimize the traffic load from the evolved Node Base (eNB) station, device‐to‐device (D2D) network must be deployed along with the commercial cellular network. D2D provides the direct connectivity between the proximal users without associating with eNB. This reduces the traffic load from the eNB. In other words, it enhances the capacity of the system. But D2D communication suffers a severe interference by the cellular user. In this paper, we have proposed a solution for the cross‐tier interference faced by the D2D users and eNB under uplink reuse transmission. We have proposed a semi‐distributed resource allocation and power quantization control (SRA–PQC) scheme. The simulation result shows that a better sum rate can be achieved using the proposed scheme.

Research paper thumbnail of Medical Image Fusion in NSST Domain utilizing Laplacian Low Energy and Average Fusion Rule

Proceedings of the 3rd International Conference on ICT for Digital, Smart, and Sustainable Development, ICIDSSD 2022, 24-25 March 2022, New Delhi, India

Digital photography is a very powerful and widely used form of communication. They represent the ... more Digital photography is a very powerful and widely used form of communication. They represent the most complex details of the world around us in a simple, coherent, and easily accessible way. Due to the natural advances in the acquisition of devices such as bio-sensors and remote sensors, large amounts of data are available for further processing and extraction of data. In this proposed research study of Image fusion, The NSST method is applied for the decomposition of two medical Images into Low-Frequency Sub-band and High-Frequency Sub-band. Low pass frequency subbands are combined using an average filter and a modified Low pass sub-band is created. The modified high pass sub-band is created using intermediate high pass sub-bands with local laplacian. The final image is calculated by applying inverse NSST on Modified low pass sub-band and modified high pass sub-bands. Results are calculated that show this methodology Increases image fusion efficiency and able to remove the noise artifacts with increased information transfer rate.

Research paper thumbnail of A novel method for diabetes classification and prediction with Pycaret

Microsystem Technologies

The incredible advances in biotechnology and public healthcare infrastructures have resulted in a... more The incredible advances in biotechnology and public healthcare infrastructures have resulted in a massive output of vital and sensitive healthcare data. Many fascinating trends are discovered using intelligent data analysis approaches for the early identification and prevention of numerous severe illnesses. Diabetes mellitus is a highly hazardous condition since it leads to other deadly diseases such as heart, kidney, and nerve damage. In this research study, a low code Pycaret machine learning technique is used for diabetes categorization, detection, and prediction. On applying Pycaret various classifiers having different accuracies are produced and shown in the result section. After hyper tuning of various classifiers, it is found that the gradient boosting classifier is best further tuned and an accuracy of about 90% is achieved which is the highest among all existing ML classifiers.

Research paper thumbnail of Digital and Technological Solutions for Vietnam Tourism Services Development

Advances in Data and Information Sciences

Research paper thumbnail of Dual Band Watermarking using 2-D DWT and 2-Level SVD for Robust Watermarking In Video

In this era any type of digital media such as image, text, audio and video, all are easily access... more In this era any type of digital media such as image, text, audio and video, all are easily accessible and transferable through the use of high speed internet. As the use of internet increased, the need of security and authenticity also increased. To secure the multimedia data such as image, audio, text and video researcher has developed a watermarking technique which gives a watermark embedding and watermark extraction algorithm, and later it is used for proof of ownership. Here we are proposing a technique on video watermarking using 2D DWT and 2-level SVD technique. In this paper first we are taking a video which is decomposed into number of frames and embedding a watermark image on each frame. First 2-D DWT is applied on each frame. Dwt decompose each frame into low frequency, mid frequency and in high frequency (LL, LH, HL, HH) band then we applied SVD on LL and HL sub-band called it dual band. SVD convert it into three matrices as U1S1V1’ of single matrix. A watermark image is ...

Research paper thumbnail of Internet of Things: A literature review

2017 Recent Developments in Control, Automation & Power Engineering (RDCAPE), 2017

The future we imagine is for automatic devices is to make ease the life of human on this planet. ... more The future we imagine is for automatic devices is to make ease the life of human on this planet. We are entering in a technological era with artificial intelligence, RFID, wireless communication. These devices are communicating, and allowing numerous functions across organizations across the world. In this paper we have conducted a brief survey on Internet of things that will explain about the architecture, issues, and applications.

Research paper thumbnail of Human Emotion Detection Using Deep Learning Neural Network

Lecture notes in networks and systems, Sep 23, 2022

Research paper thumbnail of Applicability of Cellular Automata in Cryptanalysis

International Journal of Applied Metaheuristic Computing, 2017

Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to ... more Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional techniques. However, soft computing techniques like Genetic Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in, in order to put the proposed technique in the perspective. The work also finds the applicability of Cellular Automata in cryptanalysis. A new technique has been proposed and verified for texts of around 1000 words. Each text is encrypted 10 times and then decrypted using the proposed technique. The work has also been compared with that employing Genetic Algorithm. The experiments carrie...

Research paper thumbnail of A Robust Video Watermarking Technique using DWT, DCT, and FFT

Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Appl... more Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Apply DWT on each frame that will convert it into four sub-band frequency ranges as LL, LH, HL, and HH. Apply again DWT on LL sub-band then it will divide as LL1, LH1, HL1, and HH1 sub band of LL band. After applying DWT at 2-level, apply SVD in LL1 Sub-band, DCT in LH1 and FFT in HH1 sub-band of LL band. Same process will be applied on watermark symbol/image. Embed both host frame and watermark image with some scaling factor ‘α’. For watermarked video arrange all the decomposed matrices using inverse technique. Watermarked video will be generated. To proof of ownership watermarking extraction process would be follow. And for proofing robustness and security level of this watermarked technique watermarked video will be compared with original video. And NCC, PSNR, BER value would be calculated. Keywords— dwt, dct, fft, svd, psnr, ncc, ber

Research paper thumbnail of Ber Performance Study of Orthogonal Frequency Division Multiplexing

OFDM efficiently overcomes the problems that plague most wireless channels. Multipath propagation... more OFDM efficiently overcomes the problems that plague most wireless channels. Multipath propagation is a serious hazard that introduces delay spread accounting for multiple copies of the transmitted signal to reach the receiver. This causes energy of one symbol of information to spill onto several successive symbols. This phenomenon is called Inter Symbol Interference (ISI). OFDM reduces ISI through several simultaneous transmissions, thus making it possible to have an increase in the transmission time for each symbol. OFDM moves the equalization operation to the frequency domain instead of time domain as in the case of single carrier systems. OFDM is based on parallel data transmission scheme that reduces that effects of multipath fading and renders complex equalizers unnecessary. In this project will study and identify t h e Orthogonal Frequency Division Multiplexing (OFDM) technology that gives the best BER performance in a multipath fading environment using computer simulation. Or...

Research paper thumbnail of Low Level Laser Therapy for Non-Invasive Dental applications: A Review

International Journal of Engineering Research and

Laser therapy has an excellent track record in medical applications, and it has made its unmatche... more Laser therapy has an excellent track record in medical applications, and it has made its unmatched position by treating several dental problems. Laser devices has successfully improved healthcare in medical field by providing non-invasive and painless ways of treatment. In this paper the systematic review has been conducted for the comparative study of Laser technology using Low Level Laser Therapy in dental applications. For this the database is looked through utilizing Pubmed, IEEE, Science Direct utilizing foreordained inquiry term Low Level Laser Therapy and Laser treatment in dental treatment for the most part centered around laser diode dental treatment. Our clinical comparative study shows that Laser therapy is a painless treatment which may help fast healing in less time as compare to traditional treatment.

Research paper thumbnail of Internet of Things: A Literature Review

IJRIT, 2018

The Internet of Things (IoT) is the internetworking of physical devices (also referred to as &quo... more The Internet of Things (IoT) is the internetworking of physical devices (also referred to as " connected devices "), buildings and other items embedded with electronics, sensors, actuators and network connectivity which enable them to collect and exchange data with each other. The paper discusses the Applications of IOT with the Security Concerns and Vulnerabilities associated with IOT. The paper further discusses the possible solutions to the Security threats.

Research paper thumbnail of Applicability of Cellular Automata in Cryptanalysis

Abstract Cryptanalysis refers to finding the plaintext from the given cipher text. The problem re... more Abstract
Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional techniques. However, soft computing techniques like Genetic Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in, in order to put the proposed technique in the perspective. The work also finds the applicability of Cellular Automata in cryptanalysis. A new technique has been proposed and verified for texts of around 1000 words. Each text is encrypted 10 times and then decrypted using the proposed technique. The work has also been compared with that employing Genetic Algorithm. The experiments carried out prove the veracity of the technique and paves way of Cellular automata in cryptanalysis. The paper also discusses the future scope of the work.

Research paper thumbnail of A Robust Video Watermarking Technique using DWT, DCT, and FFT

—Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. App... more —Proposed technique is based on dwt, dct, fft, and svd. First video is converted into frames. Apply DWT on each frame that will convert it into four sub-band frequency ranges as LL, LH, HL, and HH. Apply again DWT on LL sub-band then it will divide as LL1, LH1, HL1, and HH1 sub band of LL band. After applying DWT at 2-level, apply SVD in LL1 Sub-band, DCT in LH1 and FFT in HH1 sub-band of LL band. Same process will be applied on watermark symbol/image. Embed both host frame and watermark image with some scaling factor 'α'. For watermarked video arrange all the decomposed matrices using inverse technique. Watermarked video will be generated. To proof of ownership watermarking extraction process would be follow. And for proofing robustness and security level of this watermarked technique watermarked video will be compared with original video. And NCC, PSNR, BER value would be calculated. I. INTRODUCTION Internet has become indispensible and thus the security and the privacy issue have come to the fore of the computing fraternity. These issues need to be addressed with utmost urgency and highest level of dedication. Watermarking addresses the privacy and security issues. Watermarking has helped not just in security but also in resolving numerous copyright and privacy issues, which became one of the most contentious issues while the expansion of internet. This proposal explores the state of art introduces a novel technique to tackle the elephant in the room. Watermarking techniques can be segregated on the basis of domain based, document based, Perception based and application based. Domain of watermarking technique is divided in to two parts such as on the basis of spatial domain and other is on the basis of frequency domain. In spatial domain watermarking, watermark is embedded by modifying the pixels value of the host image/ video directly. The main advantages of pixel based methods are that they are conceptually simple and have very low computational complexities and therefore are widely used in video watermarking where real-time performance is a primary concern. However, they also exhibit some major limitations. The need for absolute spatial synchronization leads to high susceptibility to de-synchronization attacks; lack of consideration of the temporal axis results in vulnerability to video processing and multiple frame collusion; and watermark optimization is difficult using only spatial analysis techniques. In frequency domain, the watermark is embedded for the robustness of the watermarking mechanism. There are three main methods of data transmission in frequency domain. as DCT DFT and DWT. The main strength offered by transforming domain techniques is that they can take advantage of special properties of alternate domains to address the limitations of pixel-based methods or to support additional features. Generally, transform domain methods require higher computational time. In transform domain technique, the watermark is embedded distributive in overall domain of an original data. Host video is first converted into frequency domain by transformation techniques. The transformed domain coefficients are then altered to store the watermark information. The inverse transform is finally applied in order to obtain the watermarked video. On the basis of document watermarking can be apply on Image, Text, Audio and Video. According to the human perception watermarking is divided in to two parts visible watermark media and invisible watermark media. Invisible watermark is further are of two types robust watermarking and fragile watermarking. For effective watermarking the watermarking techniques need to be imperceptible (watermark should not degrade the quality of multimedia), robust (after applying attacks quality of multimedia should not be degrade), and secure from various attacks. In Most of the watermarking techniques, the watermark is embedded into the frequency domain instead of the spatial domain for the robustness of the watermarking mechanism. Discrete Cosine Transformation (DCT), Discrete Fourier Transformation (DFT) and Discrete Wavelet Transformation (DWT) are the three main methods of data transformation in this domain. The main strength offered by transforming domain techniques is that they can take advantage of special properties of alternate domains to address the limitations of pixel-based methods or to support additional features.