Amarjit Malhotra | Netaji Subhas Institute of Technology (original) (raw)

Uploads

Papers by Amarjit Malhotra

Research paper thumbnail of ANN-Based Handwritten Digit Recognition and Equation Solver

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey and Comparison of Modified Chord Protocol to Enhance Data Search Efficiency

Peer to Peer networks [1] have replaced client server and hierarchical architecture for sharing d... more Peer to Peer networks [1] have replaced client server and hierarchical architecture for sharing data in large systems. They promise to alleviate from challenges of scalability and fault tolerance associated with the pre-existing architectures but at the cost of latency incurred in searching data stored in the network. Chord is considered as the most popular P2P protocol used to share data in large networks. In this paper, the ways of enabling efficient data search in P2P networks based on Chord protocol is investigated. A survey is conducted and a tabulated comparison is presented of different methods use to modify finger-table of Chord protocol to enhance the search efficiency.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Machine Learning Based Human Activity Recognition in Video Surveillance

International Journal of Next-Generation Computing, 2021

In the current time there is a massive shift of technology from analog to digital. According to p... more In the current time there is a massive shift of technology from analog to digital. According to previous facts, three quarters of world data was in analog form. But now, approximately it is preserved in digital form. Due to this rapid growth of technology there is a massive growth of image data being generated by surveillance cameras. Automated anomaly detection has become necessary in order to detect the presence of any kind of dangerous activities such as robbery, road accidents and many more. Recently, machine Learning approaches have achieved the state of the art results in many tasks related to the automated anomaly detection process. The objective of this paper is to propose one such efficient method for anomaly detection. The proposed approach works with multiple instance learning with I3D feature extractor and crop augmented images. The obtained AUC prove the proposed approach to be superior of previous models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Management and Applied Sciences www.ijetmas

The population of India has reached 130 crore and is still increasing. There lays a serious probl... more The population of India has reached 130 crore and is still increasing. There lays a serious problem ahead us in near future. Traditional methods will fail to supply food and the supply will be same but demand will keep increasing. It is high time to equip farmers with modern technology which will increase quality and quantity of yield. The main objective of this paper is to automate the irrigation process helping farmers and the nation as a whole. Intruder attacks on fields are responsible for thrashing of huge amount of crops. Also, It is seen that people often forget to water their plants, let it be due to forgetfulness or due to the reason that they are away from home. The human involvement is minimized with the use of temperature and soil moisture sensor. The real time readings of sensors are used by the microcontroller, which automates the whole irrigation process.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Efficient Bootstrapping Method for Content Addressable Networks

A peer-to-peer (P2P) network demands an efficient bootstrapping mechanism that works in fault tol... more A peer-to-peer (P2P) network demands an efficient bootstrapping mechanism that works in fault tolerant conditions. The foremost aim of this paper is to find a new bootstrapping mechanism, and then implement it in a scalable 2-Dimensional Content Addressable Network (CAN) [1]. The new bootstrapping method that has been proposed is a modification of the Random Local Probing method [3]. It has been compared against a standard bootstrapping method using Peer Caching with Rendezvous Servers to test its effectiveness. Both methods are implemented for a CAN and then compared in relation to average bootstrapping times. The experimental results demonstrate that there are significant improvements in the proposed method as compared to the traditional one.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Technique of Using Digital Signature and Network Clustering to Prevent from Wormhole Attack

Ad hoc networks is defined as a collection of more than two nodes that form network without gatin... more Ad hoc networks is defined as a collection of more than two nodes that form network without gating help from any existing network infrastructure or any other network. All the node include in the network acts both as host and router. Such a network provides high transmission and device portability form that enable to node connect network and communicate between other nodes in the same network. It allows the devices to maintain connections with the network as well as easily adding and removing devices in the network. Private network are having contempt to different types of attacks, out of them wormhole attack is mostly viewed in computer network. This attack, when launched during route discovery phase can make it wrong route information into the wide network, it change the route of data transfer between two different node over the computer network by this nature of wormhole attack done a miss guide to the sender and receiver node. In this paper we propose an advanced technique which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Location-Aware Data Distribution in P2P Mobile Cloud

Big organizations have large volumes of common data that are shared among its members. The use of... more Big organizations have large volumes of common data that are shared among its members. The use of private clouds for data storage using dedicated storage servers burdens the organizations with extra cost. The unused storage capacity of the participating users can be harnessed for storage purpose by forming P2P network without the aid of any centralized administration. With the advent of powerful mobile phones, tablets and laptops, even office work is now shifting on these mobile devices. We propose MDC (Mobile Data Cloud) for data distribution on mobile users using location-aware Chord-based overlay mechanism. Simulation results demonstrate that our proposed scheme outperforms the state-of-the-art Hb_Chord and WILCO prototypes in terms of query access time for all network sizes and query rates. The query failure is below 10% in both static and mobile environment for large network sizes of about 3000 m2 × 3000m2. The simulation results of the proposed protocol in dynamic environment ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Integer multiplication ranking method for cloud services selection

Journal of Ambient Intelligence and Humanized Computing

Several popular cloud service providers such as Microsoft, Amazon, Google and others are competin... more Several popular cloud service providers such as Microsoft, Amazon, Google and others are competing to provide fast, reliable and efficient cloud services to the customers. Cloud computing has changed the cyber world by offering infrastructure and application services with rental charges. The decision making problem arises when selection has to be done amongst a wide range of available cloud service providers. Analytical Hierarchy Process (AHP) is a decision making method for selection amongst different options with multiple criteria. Different types of ranking methods are used in AHP which have great influence on the priorities assigned to these options. In this work, we propose an efficient and simplified ranking method named as Integer Multiplication (IM) to select the best Cloud service among the available services as per the user’s preference for different criteria and past experiences with the cloud service providers. The proposed method helps in making quick decisions as per customer’s preferences. We have demonstrated the applicability of this mechanism using a case study and also through simulated results. The results verify that the efficient and simplified proposed ranking method—“Integer Multiplication” gives accurate results for cloud service selection with reduced calculations and hence time saving in cloud service selection.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Best fit power weighted difference method for fog node selection in smart cities

IET Commun., 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data storage and range queries in ubiquitous mobile data cloud

Journal of Ambient Intelligence and Humanized Computing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Quote Prediction with LSTM Greedy Search Decoder

Intelligent Sustainable Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of EMCloud: A hierarchical volunteer cloud with explicit mobile devices

International Journal of Communication Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Resource allocation in multi-hop Mobile Ad hoc cloud

2014 Recent Advances in Engineering and Computational Sciences (RAECS), 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detection of malicious route in wireless adhoc networks

2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wormhole attack prevention using clustering and digital signatures in reactive routing

Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperativ... more Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperative algorithms, lack of centralized monitoring and resource constraints, ad hoc networks are vulnerable to many kinds of attacks, among which wormhole attack is chosen as the topic of discussion. This attack, when launched during route discovery phase can percolate wrong route/topology information into the network thereby, defeating the purpose of routing algorithms. In this paper we propose a novel technique based on clustering and digital signatures for prevention against wormhole attacks without use of special hardware, time synchronisation or dependency on time or hop difference between colluding nodes to identify attacked routes. We employ independent algorithms to form clusters and to implement intra-cluster and inter-cluster routing of data packets. Simulation Results show that the method achieved high level of efficiency in isolating wormhole nodes in the network.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of ANN-Based Handwritten Digit Recognition and Equation Solver

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Survey and Comparison of Modified Chord Protocol to Enhance Data Search Efficiency

Peer to Peer networks [1] have replaced client server and hierarchical architecture for sharing d... more Peer to Peer networks [1] have replaced client server and hierarchical architecture for sharing data in large systems. They promise to alleviate from challenges of scalability and fault tolerance associated with the pre-existing architectures but at the cost of latency incurred in searching data stored in the network. Chord is considered as the most popular P2P protocol used to share data in large networks. In this paper, the ways of enabling efficient data search in P2P networks based on Chord protocol is investigated. A survey is conducted and a tabulated comparison is presented of different methods use to modify finger-table of Chord protocol to enhance the search efficiency.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Machine Learning Based Human Activity Recognition in Video Surveillance

International Journal of Next-Generation Computing, 2021

In the current time there is a massive shift of technology from analog to digital. According to p... more In the current time there is a massive shift of technology from analog to digital. According to previous facts, three quarters of world data was in analog form. But now, approximately it is preserved in digital form. Due to this rapid growth of technology there is a massive growth of image data being generated by surveillance cameras. Automated anomaly detection has become necessary in order to detect the presence of any kind of dangerous activities such as robbery, road accidents and many more. Recently, machine Learning approaches have achieved the state of the art results in many tasks related to the automated anomaly detection process. The objective of this paper is to propose one such efficient method for anomaly detection. The proposed approach works with multiple instance learning with I3D feature extractor and crop augmented images. The obtained AUC prove the proposed approach to be superior of previous models.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Management and Applied Sciences www.ijetmas

The population of India has reached 130 crore and is still increasing. There lays a serious probl... more The population of India has reached 130 crore and is still increasing. There lays a serious problem ahead us in near future. Traditional methods will fail to supply food and the supply will be same but demand will keep increasing. It is high time to equip farmers with modern technology which will increase quality and quantity of yield. The main objective of this paper is to automate the irrigation process helping farmers and the nation as a whole. Intruder attacks on fields are responsible for thrashing of huge amount of crops. Also, It is seen that people often forget to water their plants, let it be due to forgetfulness or due to the reason that they are away from home. The human involvement is minimized with the use of temperature and soil moisture sensor. The real time readings of sensors are used by the microcontroller, which automates the whole irrigation process.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Efficient Bootstrapping Method for Content Addressable Networks

A peer-to-peer (P2P) network demands an efficient bootstrapping mechanism that works in fault tol... more A peer-to-peer (P2P) network demands an efficient bootstrapping mechanism that works in fault tolerant conditions. The foremost aim of this paper is to find a new bootstrapping mechanism, and then implement it in a scalable 2-Dimensional Content Addressable Network (CAN) [1]. The new bootstrapping method that has been proposed is a modification of the Random Local Probing method [3]. It has been compared against a standard bootstrapping method using Peer Caching with Rendezvous Servers to test its effectiveness. Both methods are implemented for a CAN and then compared in relation to average bootstrapping times. The experimental results demonstrate that there are significant improvements in the proposed method as compared to the traditional one.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Technique of Using Digital Signature and Network Clustering to Prevent from Wormhole Attack

Ad hoc networks is defined as a collection of more than two nodes that form network without gatin... more Ad hoc networks is defined as a collection of more than two nodes that form network without gating help from any existing network infrastructure or any other network. All the node include in the network acts both as host and router. Such a network provides high transmission and device portability form that enable to node connect network and communicate between other nodes in the same network. It allows the devices to maintain connections with the network as well as easily adding and removing devices in the network. Private network are having contempt to different types of attacks, out of them wormhole attack is mostly viewed in computer network. This attack, when launched during route discovery phase can make it wrong route information into the wide network, it change the route of data transfer between two different node over the computer network by this nature of wormhole attack done a miss guide to the sender and receiver node. In this paper we propose an advanced technique which ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Location-Aware Data Distribution in P2P Mobile Cloud

Big organizations have large volumes of common data that are shared among its members. The use of... more Big organizations have large volumes of common data that are shared among its members. The use of private clouds for data storage using dedicated storage servers burdens the organizations with extra cost. The unused storage capacity of the participating users can be harnessed for storage purpose by forming P2P network without the aid of any centralized administration. With the advent of powerful mobile phones, tablets and laptops, even office work is now shifting on these mobile devices. We propose MDC (Mobile Data Cloud) for data distribution on mobile users using location-aware Chord-based overlay mechanism. Simulation results demonstrate that our proposed scheme outperforms the state-of-the-art Hb_Chord and WILCO prototypes in terms of query access time for all network sizes and query rates. The query failure is below 10% in both static and mobile environment for large network sizes of about 3000 m2 × 3000m2. The simulation results of the proposed protocol in dynamic environment ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Integer multiplication ranking method for cloud services selection

Journal of Ambient Intelligence and Humanized Computing

Several popular cloud service providers such as Microsoft, Amazon, Google and others are competin... more Several popular cloud service providers such as Microsoft, Amazon, Google and others are competing to provide fast, reliable and efficient cloud services to the customers. Cloud computing has changed the cyber world by offering infrastructure and application services with rental charges. The decision making problem arises when selection has to be done amongst a wide range of available cloud service providers. Analytical Hierarchy Process (AHP) is a decision making method for selection amongst different options with multiple criteria. Different types of ranking methods are used in AHP which have great influence on the priorities assigned to these options. In this work, we propose an efficient and simplified ranking method named as Integer Multiplication (IM) to select the best Cloud service among the available services as per the user’s preference for different criteria and past experiences with the cloud service providers. The proposed method helps in making quick decisions as per customer’s preferences. We have demonstrated the applicability of this mechanism using a case study and also through simulated results. The results verify that the efficient and simplified proposed ranking method—“Integer Multiplication” gives accurate results for cloud service selection with reduced calculations and hence time saving in cloud service selection.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Best fit power weighted difference method for fog node selection in smart cities

IET Commun., 2020

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Data storage and range queries in ubiquitous mobile data cloud

Journal of Ambient Intelligence and Humanized Computing

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Quote Prediction with LSTM Greedy Search Decoder

Intelligent Sustainable Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of EMCloud: A hierarchical volunteer cloud with explicit mobile devices

International Journal of Communication Systems

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Resource allocation in multi-hop Mobile Ad hoc cloud

2014 Recent Advances in Engineering and Computational Sciences (RAECS), 2014

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Detection of malicious route in wireless adhoc networks

2012 IEEE International Conference on Computational Intelligence and Computing Research, 2012

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Wormhole attack prevention using clustering and digital signatures in reactive routing

Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperativ... more Owing to features of open medium, absence of infrastructure, dynamic network topology, cooperative algorithms, lack of centralized monitoring and resource constraints, ad hoc networks are vulnerable to many kinds of attacks, among which wormhole attack is chosen as the topic of discussion. This attack, when launched during route discovery phase can percolate wrong route/topology information into the network thereby, defeating the purpose of routing algorithms. In this paper we propose a novel technique based on clustering and digital signatures for prevention against wormhole attacks without use of special hardware, time synchronisation or dependency on time or hop difference between colluding nodes to identify attacked routes. We employ independent algorithms to form clusters and to implement intra-cluster and inter-cluster routing of data packets. Simulation Results show that the method achieved high level of efficiency in isolating wormhole nodes in the network.

Bookmarks Related papers MentionsView impact