jaydeep gheewala | SCET - Academia.edu (original) (raw)
Uploads
Papers by jaydeep gheewala
Abstract—The Internet and web applications are playing very important role in our today‘s modern ... more Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then ...
2018 International Conference on Inventive Research in Computing Applications (ICIRCA)
At present online network has made sudden living of human being needy on it. Roughly sudden lot c... more At present online network has made sudden living of human being needy on it. Roughly sudden lot can be worn for discovering constructive in rank from sudden online network. Suggestion structures are commonly famous as assist individuals to suggestion substance of attention. Sudden main things of district is to solve issues for finding proper recommend artefacts for individuals. Suggestions methods normally three varieties comfortable pedestaled, mixture suggestions in addition to mutual sieving. Sudden troubles we can develop sudden feature of suggestions by formulating latest schemes, which container worn explore perform in district.
Procedia Computer Science
In this paper we evaluate the performance of LTE-Downlink System with different Transmit diversit... more In this paper we evaluate the performance of LTE-Downlink System with different Transmit diversity and Spatial multiplexing MIMO modes in LTE-downlink. Here we analysis performance on BLER-Block Error Rate and Data Throughput vs SNR-Signal to Noise Ratio. Two Transmit Diversity schemes Space Frequency Block Codes (SFBC) and Frequency Switched Transmit Diversity (FSTD) and two Spatial Multiplexing with different antenns are used. The performance of LTE compared with four MIMO and SISO modes in terms of Throughput and BLER. Also we used the ITU defined Pedestrian channel type B for evaluation. Index Terms LTE-Downlink, MIMO modes. Throughput, Block Error Rate ______________________________________________________________________________________________________
The Internet and web applications are playing very important role in our today‘s modern day life.... more The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then take adva...
2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)
The large amount of increase in information available over the internet has created a greatest ch... more The large amount of increase in information available over the internet has created a greatest challenge in searching useful information. As a result an intelligent approach such as recommendation system is used that can recommend everything from movies, books, music, restaurant, news and jokes that can efficiently retrieve useful information from web. CF is primary approach of any RS. But only CF cannot provide enough scalability and accuracy. In our work we present a model that combines RS method such as CF with big data technique such as association rule mining. The main focus of this paper is to provide a scalable and robust recommendation system that can provide good accuracy. In our work, we have proposed to conduct a personalized movie recommendation by considering user's past behavior.
2015 IEEE International Advance Computing Conference (IACC), 2015
Wireless Sensor Networks (WSNs) comprise of constrained measure of assets, have unlimited applica... more Wireless Sensor Networks (WSNs) comprise of constrained measure of assets, have unlimited applications like battlefield observation, target tracking, environment observing and so forth. As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So to make message transmission more secure and reliable adaptation of dynamic key is very important for secure key management. Because of the limitations of WSNs like limited memory, battery life and processing power, use of cluster-based wireless sensor network reduces system delay and vitality utilization. For the same cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using dynamic key management scheme. In this context, An Efficient Session Key Management Scheme for Cluster Based Mobile Sensor network (ESKM) is the scheme which provides an improved session key by updating periodically within cluster, hence avoids the different type of attack from malicious nodes. Still it has some issues like it is not scalable and CHs are static in each round. So we can improve the ESKM by dynamically electing CH for each round and reduce the energy consumption by transmitting messages via CH. Thus we can improve the ESKM and make it using Efficient in terms of energy consumption.
SSRN Electronic Journal
Video synopsis is an activity-based video summarization method and the main goal is to present as... more Video synopsis is an activity-based video summarization method and the main goal is to present as many activities as possible simultaneously in the shortest time period. Nowadays, a huge amount of the multimedia dictionary makes the perusing, recovery, and conveyance of video content exceptionally moderate and even troublesome undertakings. Visual data like images and videos are easily accessible nowadays and play a critical role in many real-time applications like surveillance. but Accident detection may be a tougher task at the instant. Numbers of researches on accident detection have expanded over the past a long time. This study proposes the latest approaches in accident detection and video synopsis. We analyze existing processes in accident detection, video synopsis, and advance deep learning techniques. At last, we present the encouraging research directions on this subject.
Abstract—The Internet and web applications are playing very important role in our today‘s modern ... more Abstract—The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then ...
2018 International Conference on Inventive Research in Computing Applications (ICIRCA)
At present online network has made sudden living of human being needy on it. Roughly sudden lot c... more At present online network has made sudden living of human being needy on it. Roughly sudden lot can be worn for discovering constructive in rank from sudden online network. Suggestion structures are commonly famous as assist individuals to suggestion substance of attention. Sudden main things of district is to solve issues for finding proper recommend artefacts for individuals. Suggestions methods normally three varieties comfortable pedestaled, mixture suggestions in addition to mutual sieving. Sudden troubles we can develop sudden feature of suggestions by formulating latest schemes, which container worn explore perform in district.
Procedia Computer Science
In this paper we evaluate the performance of LTE-Downlink System with different Transmit diversit... more In this paper we evaluate the performance of LTE-Downlink System with different Transmit diversity and Spatial multiplexing MIMO modes in LTE-downlink. Here we analysis performance on BLER-Block Error Rate and Data Throughput vs SNR-Signal to Noise Ratio. Two Transmit Diversity schemes Space Frequency Block Codes (SFBC) and Frequency Switched Transmit Diversity (FSTD) and two Spatial Multiplexing with different antenns are used. The performance of LTE compared with four MIMO and SISO modes in terms of Throughput and BLER. Also we used the ITU defined Pedestrian channel type B for evaluation. Index Terms LTE-Downlink, MIMO modes. Throughput, Block Error Rate ______________________________________________________________________________________________________
The Internet and web applications are playing very important role in our today‘s modern day life.... more The Internet and web applications are playing very important role in our today‘s modern day life. Several activities of our daily life like browsing, online shopping and booking of travel tickets are becoming easier by the use of web applications. Most of the web applications use the database as a back-end to store critical information such as user credentials, financial and payment information, company statistics etc. An SQL injection attack targets web applications that are database-driven. This is done by including portions of SQL statements in a web form entry field in an attempt to get the website to pass a newly formed rogue SQL command to the database. Multiple client side and server side vulnerabilities like SQL injection and cross site scripting are discovered and exploited by malicious users. The principle of basic SQL injection is to take advantage of insecure code on a system connected to the internet in order to pass commands directly to a database and to then take adva...
2017 International Conference on Innovative Mechanisms for Industry Applications (ICIMIA)
The large amount of increase in information available over the internet has created a greatest ch... more The large amount of increase in information available over the internet has created a greatest challenge in searching useful information. As a result an intelligent approach such as recommendation system is used that can recommend everything from movies, books, music, restaurant, news and jokes that can efficiently retrieve useful information from web. CF is primary approach of any RS. But only CF cannot provide enough scalability and accuracy. In our work we present a model that combines RS method such as CF with big data technique such as association rule mining. The main focus of this paper is to provide a scalable and robust recommendation system that can provide good accuracy. In our work, we have proposed to conduct a personalized movie recommendation by considering user's past behavior.
2015 IEEE International Advance Computing Conference (IACC), 2015
Wireless Sensor Networks (WSNs) comprise of constrained measure of assets, have unlimited applica... more Wireless Sensor Networks (WSNs) comprise of constrained measure of assets, have unlimited applications like battlefield observation, target tracking, environment observing and so forth. As sensor nodes are deployed in hostile or remote environment and unattended by human, they are prone to different kind of attacks. So to make message transmission more secure and reliable adaptation of dynamic key is very important for secure key management. Because of the limitations of WSNs like limited memory, battery life and processing power, use of cluster-based wireless sensor network reduces system delay and vitality utilization. For the same cluster based protocol for sensor networks, achieves energy efficient and scalable routing. Whereas storage issue in sensor network, can be reduced by using dynamic key management scheme. In this context, An Efficient Session Key Management Scheme for Cluster Based Mobile Sensor network (ESKM) is the scheme which provides an improved session key by updating periodically within cluster, hence avoids the different type of attack from malicious nodes. Still it has some issues like it is not scalable and CHs are static in each round. So we can improve the ESKM by dynamically electing CH for each round and reduce the energy consumption by transmitting messages via CH. Thus we can improve the ESKM and make it using Efficient in terms of energy consumption.
SSRN Electronic Journal
Video synopsis is an activity-based video summarization method and the main goal is to present as... more Video synopsis is an activity-based video summarization method and the main goal is to present as many activities as possible simultaneously in the shortest time period. Nowadays, a huge amount of the multimedia dictionary makes the perusing, recovery, and conveyance of video content exceptionally moderate and even troublesome undertakings. Visual data like images and videos are easily accessible nowadays and play a critical role in many real-time applications like surveillance. but Accident detection may be a tougher task at the instant. Numbers of researches on accident detection have expanded over the past a long time. This study proposes the latest approaches in accident detection and video synopsis. We analyze existing processes in accident detection, video synopsis, and advance deep learning techniques. At last, we present the encouraging research directions on this subject.