chandra P sahu | SRM UNIVERSITY (original) (raw)
Papers by chandra P sahu
ABSTRACT Today, approximately all the internet users have login accounts for internet sites and t... more ABSTRACT Today, approximately all the internet users have login accounts for internet sites and these sites require only the registration by human users but unfortunately some automated computer programs to enter these sites and use their resources through false ...
2013 3rd IEEE International Advance Computing Conference (IACC), 2013
ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses co... more ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses conservative approach to determine and control network state. But this conservation scheme is not good in all conditions and it can unnecessarily reduce the size of congestion window. This paper proposes improved TCP Vegas an improvement over TCP Vegas in Ad hoc network that utilizes round trip time variation of packets at sender side, short term throughput and inter-delay difference at receiver side to measure the network state and then controls congestion window considering the path length and network state. Simulation results show the improvement of 5 to 15 % over Ad hoc TCP Vegas in high mobility and high traffic conditions.
2010 International Conference on Computer and Communication Technology (ICCCT), 2010
Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to no... more Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to nodes mobility and higher vulnerability of the wireless link. This paper proposes a simple end to end approach; in this the hop count of the path and the size of delayed window at ...
This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations,... more This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations, Coordinate Free Geometry, 3D Objects, Camera Models, Visibility, Basic Lighting and Reflection, Basic Ray Tracing, Radiometry and Reflection, Distribution Ray Tracing, Parametric Curves And Surfaces and Animation.
The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing envi... more The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing environment but it fails in low light condition and deteriorates when the background is rapidly changing and it cannot be applied to the video captured by handheld until the frames are stabilized. The proposed work is focused on group detection and people counting in videos where the camera is handheld. We utilize the motion information for each pixel between current and previous frames to prepare a confidence matrix to correctly model background distribution. This work excludes the current distribution of the pixel if the match occurs; in case the pixel is foreground in confidence matrix, reducing the chance of false positive inclusion in background model estimation, and detects around 90% of the foreground pixels. Moreover, the height, width, area of the bounding box of the blobs detected and foreground pixel density are used to distinguish individual and groups, and people counting.
This work contains detailed descryption of circle generation algorithm and discussed mid point ci... more This work contains detailed descryption of circle generation algorithm and discussed mid point circle drawing in computer graphics
This work contains DDA line drawing algorithm and Bresenham's line drawing algorithm in detail.
This document mentions the computer graphics application areas and the companies in the computer ... more This document mentions the computer graphics application areas and the companies in the computer graphics field. It also discusses about the companies involve in Animations.
A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.
A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.
code to extract frames from a video in Matlab
C. P. Sahu , S. K. Dhurandher, “Improved TCP Vegas in Ad hoc Network”, International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010), 19-21 July 2010, Banglore, India, page 394-397, Jul 21, 2010
TCP Vegas is an end to end congestion avoidance approach which utilizes round trip time, to rem... more TCP Vegas is an end to end congestion
avoidance approach which utilizes round trip time, to
remain in congestion avoidance phase, this single
metric solution can cause false detection of
congestion level, which in turn starts reducing the
congestion window. This paper proposes Improved-
TCP Vegas an improvement over TCP Vegas in
MANET. We consider RTT to determine the
throughput and RTHC for optimum utilization of
available bandwidth and STT, IDD for the
congestion level of the network in forward path. The
fuzzy logic control used to blend IDD and STT and
determine the network condition. And then used this
information from receiver for cross verification of
the network condition. Our simulation result shows
the improvement of 15 to 20 % in comparison to TCP
Vegas in high mobility and high traffic conditions.
type of pervasive computing, ambient computing, internet computing, context aware computing, sent... more type of pervasive computing, ambient computing, internet computing, context aware computing, sentient computing, requirement for computational infrastructure.
ubiquitous computing notes.
basic elements of pervasive computing
Lecture notes on mobile computing middleware
C. P. Sahu , M. P. Yadav, M. Rana, R. Srivastava, “A simple delayed acknowledgement scheme”, IEEE ICCCT-2010 , 17-19 Sept. 2010, MNNIT Allahabad, India, page 393-396
The general TCP protocol doesn’t show good performance in ad hoc network due to nodes mobility ... more The general TCP protocol doesn’t show good
performance in ad hoc network due to nodes mobility
and higher vulnerability of the wireless link. This
paper proposes a simple end to end approach; in this
the hop count of the path and the size of delayed
window at receiver end is utilize and also the of CWL
with the RTT variation to control the size of the bursts.
As the number of hop increases chance of congestion
increases, the congestion is not affected by number of
links only but by the length of links as the length
increases the environmental effects also increases. The
simulation result shows 10 to 15 % improvement in
TCP performance over the TCPDCA.
Approximately all the internet users have login accounts for internet sites and these sites requ... more Approximately all the internet users have login
accounts for internet sites and these sites require only the
registration by human users but unfortunately some
automated computer programs to enter these sites and use
their resources through false registration. This paper
introduces a new TIME-VARIENT CAPTCHA. In this
paper we are not focusing on the effective development of
Captcha but targeting a display of Captcha over the
webpage for a fixed time, Captcha replaces itself until the
final Captcha is filled by user. Refresh process just work
with Captcha and don’t affect the web page. So, now,
automated program has to cover one more area to breach
the Captcha: to determine the final entered Captcha.
C. P. Sahu , P. S. Yadav, S. Ahuja, R. Prasad, “Optimistic congestion control to improve the performance of Mobile Ad hoc Network”, IEEE IACC-2013 , AKGEC, Ghaziabad, ISBN: 978-1-4673-4527-9 page 394 - 398
Drafts by chandra P sahu
Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (... more Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (890 MHz to 900 MHz), the region for which they allocated this 10 MHz bandwidth has total area 100km 2 (assume a squared area of 10 km width and 10 km length). We have to find out the ways with which maximum number of customers can be supported to communicate simultaneously. Full duplex voice communication (in GSM) requires 200 kHz uplink and 200 kHz downlink for a single customer. Assume that the company uses 890 to 894.99 MHz for uplink and 895 to 899.99 MHz for down Link, i.e. 5 Mhz uplink and 5 MHz downlink. So the number of channels available = (5 X 10 6)/(200 X 10 3)= 25 i.e. 25 uplink and 25 downlink. Now assume the 2G GSM technology is TDMA(it can also be CDMA). When TDMA is used a 200 KHz channel can be shared between 8 devices (that means it can be subdivided in 8 channels). So the total number of uplink channels available= 25 X 8= 200. Now assume if only one high power antenna is installed by the operator in the middle of square to transmit and receive signals. Only 200 customers can communicate at a time. The question is how can we increase the system capacity (number of channels)? The answer is frequency reuse. Use the following steps to increase system capacity-1. Divide the region in 100 cells of 1 km 2 (Cell area A cell) 2. Install an antenna (base station) in the middle of each region. 3. Transmit and receive signals in the same frequency range.
ABSTRACT Today, approximately all the internet users have login accounts for internet sites and t... more ABSTRACT Today, approximately all the internet users have login accounts for internet sites and these sites require only the registration by human users but unfortunately some automated computer programs to enter these sites and use their resources through false ...
2013 3rd IEEE International Advance Computing Conference (IACC), 2013
ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses co... more ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses conservative approach to determine and control network state. But this conservation scheme is not good in all conditions and it can unnecessarily reduce the size of congestion window. This paper proposes improved TCP Vegas an improvement over TCP Vegas in Ad hoc network that utilizes round trip time variation of packets at sender side, short term throughput and inter-delay difference at receiver side to measure the network state and then controls congestion window considering the path length and network state. Simulation results show the improvement of 5 to 15 % over Ad hoc TCP Vegas in high mobility and high traffic conditions.
2010 International Conference on Computer and Communication Technology (ICCCT), 2010
Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to no... more Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to nodes mobility and higher vulnerability of the wireless link. This paper proposes a simple end to end approach; in this the hop count of the path and the size of delayed window at ...
This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations,... more This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations, Coordinate Free Geometry, 3D Objects, Camera Models, Visibility, Basic Lighting and Reflection, Basic Ray Tracing, Radiometry and Reflection, Distribution Ray Tracing, Parametric Curves And Surfaces and Animation.
The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing envi... more The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing environment but it fails in low light condition and deteriorates when the background is rapidly changing and it cannot be applied to the video captured by handheld until the frames are stabilized. The proposed work is focused on group detection and people counting in videos where the camera is handheld. We utilize the motion information for each pixel between current and previous frames to prepare a confidence matrix to correctly model background distribution. This work excludes the current distribution of the pixel if the match occurs; in case the pixel is foreground in confidence matrix, reducing the chance of false positive inclusion in background model estimation, and detects around 90% of the foreground pixels. Moreover, the height, width, area of the bounding box of the blobs detected and foreground pixel density are used to distinguish individual and groups, and people counting.
This work contains detailed descryption of circle generation algorithm and discussed mid point ci... more This work contains detailed descryption of circle generation algorithm and discussed mid point circle drawing in computer graphics
This work contains DDA line drawing algorithm and Bresenham's line drawing algorithm in detail.
This document mentions the computer graphics application areas and the companies in the computer ... more This document mentions the computer graphics application areas and the companies in the computer graphics field. It also discusses about the companies involve in Animations.
A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.
A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.
code to extract frames from a video in Matlab
C. P. Sahu , S. K. Dhurandher, “Improved TCP Vegas in Ad hoc Network”, International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010), 19-21 July 2010, Banglore, India, page 394-397, Jul 21, 2010
TCP Vegas is an end to end congestion avoidance approach which utilizes round trip time, to rem... more TCP Vegas is an end to end congestion
avoidance approach which utilizes round trip time, to
remain in congestion avoidance phase, this single
metric solution can cause false detection of
congestion level, which in turn starts reducing the
congestion window. This paper proposes Improved-
TCP Vegas an improvement over TCP Vegas in
MANET. We consider RTT to determine the
throughput and RTHC for optimum utilization of
available bandwidth and STT, IDD for the
congestion level of the network in forward path. The
fuzzy logic control used to blend IDD and STT and
determine the network condition. And then used this
information from receiver for cross verification of
the network condition. Our simulation result shows
the improvement of 15 to 20 % in comparison to TCP
Vegas in high mobility and high traffic conditions.
type of pervasive computing, ambient computing, internet computing, context aware computing, sent... more type of pervasive computing, ambient computing, internet computing, context aware computing, sentient computing, requirement for computational infrastructure.
ubiquitous computing notes.
basic elements of pervasive computing
Lecture notes on mobile computing middleware
C. P. Sahu , M. P. Yadav, M. Rana, R. Srivastava, “A simple delayed acknowledgement scheme”, IEEE ICCCT-2010 , 17-19 Sept. 2010, MNNIT Allahabad, India, page 393-396
The general TCP protocol doesn’t show good performance in ad hoc network due to nodes mobility ... more The general TCP protocol doesn’t show good
performance in ad hoc network due to nodes mobility
and higher vulnerability of the wireless link. This
paper proposes a simple end to end approach; in this
the hop count of the path and the size of delayed
window at receiver end is utilize and also the of CWL
with the RTT variation to control the size of the bursts.
As the number of hop increases chance of congestion
increases, the congestion is not affected by number of
links only but by the length of links as the length
increases the environmental effects also increases. The
simulation result shows 10 to 15 % improvement in
TCP performance over the TCPDCA.
Approximately all the internet users have login accounts for internet sites and these sites requ... more Approximately all the internet users have login
accounts for internet sites and these sites require only the
registration by human users but unfortunately some
automated computer programs to enter these sites and use
their resources through false registration. This paper
introduces a new TIME-VARIENT CAPTCHA. In this
paper we are not focusing on the effective development of
Captcha but targeting a display of Captcha over the
webpage for a fixed time, Captcha replaces itself until the
final Captcha is filled by user. Refresh process just work
with Captcha and don’t affect the web page. So, now,
automated program has to cover one more area to breach
the Captcha: to determine the final entered Captcha.
C. P. Sahu , P. S. Yadav, S. Ahuja, R. Prasad, “Optimistic congestion control to improve the performance of Mobile Ad hoc Network”, IEEE IACC-2013 , AKGEC, Ghaziabad, ISBN: 978-1-4673-4527-9 page 394 - 398
Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (... more Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (890 MHz to 900 MHz), the region for which they allocated this 10 MHz bandwidth has total area 100km 2 (assume a squared area of 10 km width and 10 km length). We have to find out the ways with which maximum number of customers can be supported to communicate simultaneously. Full duplex voice communication (in GSM) requires 200 kHz uplink and 200 kHz downlink for a single customer. Assume that the company uses 890 to 894.99 MHz for uplink and 895 to 899.99 MHz for down Link, i.e. 5 Mhz uplink and 5 MHz downlink. So the number of channels available = (5 X 10 6)/(200 X 10 3)= 25 i.e. 25 uplink and 25 downlink. Now assume the 2G GSM technology is TDMA(it can also be CDMA). When TDMA is used a 200 KHz channel can be shared between 8 devices (that means it can be subdivided in 8 channels). So the total number of uplink channels available= 25 X 8= 200. Now assume if only one high power antenna is installed by the operator in the middle of square to transmit and receive signals. Only 200 customers can communicate at a time. The question is how can we increase the system capacity (number of channels)? The answer is frequency reuse. Use the following steps to increase system capacity-1. Divide the region in 100 cells of 1 km 2 (Cell area A cell) 2. Install an antenna (base station) in the middle of each region. 3. Transmit and receive signals in the same frequency range.