chandra P sahu | SRM UNIVERSITY (original) (raw)

Papers by chandra P sahu

Research paper thumbnail of Time-Variant Captcha: Generating Strong Captcha Security by Reducing Time to Automated Computer Programs

ABSTRACT Today, approximately all the internet users have login accounts for internet sites and t... more ABSTRACT Today, approximately all the internet users have login accounts for internet sites and these sites require only the registration by human users but unfortunately some automated computer programs to enter these sites and use their resources through false ...

Research paper thumbnail of Optimistic congestion control to improve the performance of mobile ad hoc network

2013 3rd IEEE International Advance Computing Conference (IACC), 2013

ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses co... more ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses conservative approach to determine and control network state. But this conservation scheme is not good in all conditions and it can unnecessarily reduce the size of congestion window. This paper proposes improved TCP Vegas an improvement over TCP Vegas in Ad hoc network that utilizes round trip time variation of packets at sender side, short term throughput and inter-delay difference at receiver side to measure the network state and then controls congestion window considering the path length and network state. Simulation results show the improvement of 5 to 15 % over Ad hoc TCP Vegas in high mobility and high traffic conditions.

Research paper thumbnail of A simple delayed acknowledgement scheme

2010 International Conference on Computer and Communication Technology (ICCCT), 2010

Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to no... more Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to nodes mobility and higher vulnerability of the wireless link. This paper proposes a simple end to end approach; in this the hop count of the path and the size of delayed window at ...

Research paper thumbnail of Computer Graphics Lecture Notes

This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations,... more This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations, Coordinate Free Geometry, 3D Objects, Camera Models, Visibility, Basic Lighting and Reflection, Basic Ray Tracing, Radiometry and Reflection, Distribution Ray Tracing, Parametric Curves And Surfaces and Animation.

Research paper thumbnail of Crowd Surveillance with the Video Captured by Handheld Devices

The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing envi... more The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing environment but it fails in low light condition and deteriorates when the background is rapidly changing and it cannot be applied to the video captured by handheld until the frames are stabilized. The proposed work is focused on group detection and people counting in videos where the camera is handheld. We utilize the motion information for each pixel between current and previous frames to prepare a confidence matrix to correctly model background distribution. This work excludes the current distribution of the pixel if the match occurs; in case the pixel is foreground in confidence matrix, reducing the chance of false positive inclusion in background model estimation, and detects around 90% of the foreground pixels. Moreover, the height, width, area of the bounding box of the blobs detected and foreground pixel density are used to distinguish individual and groups, and people counting.

Research paper thumbnail of Circle generation Algorithm

This work contains detailed descryption of circle generation algorithm and discussed mid point ci... more This work contains detailed descryption of circle generation algorithm and discussed mid point circle drawing in computer graphics

Research paper thumbnail of Line Drawing Algorithm

This work contains DDA line drawing algorithm and Bresenham's line drawing algorithm in detail.

Research paper thumbnail of Computer Graphics Applications

This document mentions the computer graphics application areas and the companies in the computer ... more This document mentions the computer graphics application areas and the companies in the computer graphics field. It also discusses about the companies involve in Animations.

Research paper thumbnail of Overview of computer graphics concepts

A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.

Research paper thumbnail of Use of computer graphics concepts

A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.

Research paper thumbnail of code to extract frames from a video in Matlab

code to extract frames from a video in Matlab

Research paper thumbnail of Improved TCP Vegas in ad hoc network

C. P. Sahu , S. K. Dhurandher, “Improved TCP Vegas in Ad hoc Network”, International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010), 19-21 July 2010, Banglore, India, page 394-397, Jul 21, 2010

TCP Vegas is an end to end congestion avoidance approach which utilizes round trip time, to rem... more TCP Vegas is an end to end congestion
avoidance approach which utilizes round trip time, to
remain in congestion avoidance phase, this single
metric solution can cause false detection of
congestion level, which in turn starts reducing the
congestion window. This paper proposes Improved-
TCP Vegas an improvement over TCP Vegas in
MANET. We consider RTT to determine the
throughput and RTHC for optimum utilization of
available bandwidth and STT, IDD for the
congestion level of the network in forward path. The
fuzzy logic control used to blend IDD and STT and
determine the network condition. And then used this
information from receiver for cross verification of
the network condition. Our simulation result shows
the improvement of 15 to 20 % in comparison to TCP
Vegas in high mobility and high traffic conditions.

Research paper thumbnail of pervasive computing lecture notes

type of pervasive computing, ambient computing, internet computing, context aware computing, sent... more type of pervasive computing, ambient computing, internet computing, context aware computing, sentient computing, requirement for computational infrastructure.
ubiquitous computing notes.
basic elements of pervasive computing

Research paper thumbnail of Mobile computing middleware lecture notes

Lecture notes on mobile computing middleware

Research paper thumbnail of A simple Delayed Acknowledgement Scheme

C. P. Sahu , M. P. Yadav, M. Rana, R. Srivastava, “A simple delayed acknowledgement scheme”, IEEE ICCCT-2010 , 17-19 Sept. 2010, MNNIT Allahabad, India, page 393-396

The general TCP protocol doesn’t show good performance in ad hoc network due to nodes mobility ... more The general TCP protocol doesn’t show good
performance in ad hoc network due to nodes mobility
and higher vulnerability of the wireless link. This
paper proposes a simple end to end approach; in this
the hop count of the path and the size of delayed
window at receiver end is utilize and also the of CWL
with the RTT variation to control the size of the bursts.
As the number of hop increases chance of congestion
increases, the congestion is not affected by number of
links only but by the length of links as the length
increases the environmental effects also increases. The
simulation result shows 10 to 15 % improvement in
TCP performance over the TCPDCA.

Research paper thumbnail of Time varient captcha

Approximately all the internet users have login accounts for internet sites and these sites requ... more Approximately all the internet users have login
accounts for internet sites and these sites require only the
registration by human users but unfortunately some
automated computer programs to enter these sites and use
their resources through false registration. This paper
introduces a new TIME-VARIENT CAPTCHA. In this
paper we are not focusing on the effective development of
Captcha but targeting a display of Captcha over the
webpage for a fixed time, Captcha replaces itself until the
final Captcha is filled by user. Refresh process just work
with Captcha and don’t affect the web page. So, now,
automated program has to cover one more area to breach
the Captcha: to determine the final entered Captcha.

Research paper thumbnail of Optimistic congestion control to improve the performance of Mobile Ad hoc Network

C. P. Sahu , P. S. Yadav, S. Ahuja, R. Prasad, “Optimistic congestion control to improve the performance of Mobile Ad hoc Network”, IEEE IACC-2013 , AKGEC, Ghaziabad, ISBN: 978-1-4673-4527-9 page 394 - 398

Drafts by chandra P sahu

Research paper thumbnail of A case study: to understand cell, cluster and frequency reuse

Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (... more Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (890 MHz to 900 MHz), the region for which they allocated this 10 MHz bandwidth has total area 100km 2 (assume a squared area of 10 km width and 10 km length). We have to find out the ways with which maximum number of customers can be supported to communicate simultaneously. Full duplex voice communication (in GSM) requires 200 kHz uplink and 200 kHz downlink for a single customer. Assume that the company uses 890 to 894.99 MHz for uplink and 895 to 899.99 MHz for down Link, i.e. 5 Mhz uplink and 5 MHz downlink. So the number of channels available = (5 X 10 6)/(200 X 10 3)= 25 i.e. 25 uplink and 25 downlink. Now assume the 2G GSM technology is TDMA(it can also be CDMA). When TDMA is used a 200 KHz channel can be shared between 8 devices (that means it can be subdivided in 8 channels). So the total number of uplink channels available= 25 X 8= 200. Now assume if only one high power antenna is installed by the operator in the middle of square to transmit and receive signals. Only 200 customers can communicate at a time. The question is how can we increase the system capacity (number of channels)? The answer is frequency reuse. Use the following steps to increase system capacity-1. Divide the region in 100 cells of 1 km 2 (Cell area A cell) 2. Install an antenna (base station) in the middle of each region. 3. Transmit and receive signals in the same frequency range.

Research paper thumbnail of Time-Variant Captcha: Generating Strong Captcha Security by Reducing Time to Automated Computer Programs

ABSTRACT Today, approximately all the internet users have login accounts for internet sites and t... more ABSTRACT Today, approximately all the internet users have login accounts for internet sites and these sites require only the registration by human users but unfortunately some automated computer programs to enter these sites and use their resources through false ...

Research paper thumbnail of Optimistic congestion control to improve the performance of mobile ad hoc network

2013 3rd IEEE International Advance Computing Conference (IACC), 2013

ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses co... more ABSTRACT TCP Vegas for Ad hoc network is an end to end congestion avoidance protocol that uses conservative approach to determine and control network state. But this conservation scheme is not good in all conditions and it can unnecessarily reduce the size of congestion window. This paper proposes improved TCP Vegas an improvement over TCP Vegas in Ad hoc network that utilizes round trip time variation of packets at sender side, short term throughput and inter-delay difference at receiver side to measure the network state and then controls congestion window considering the path length and network state. Simulation results show the improvement of 5 to 15 % over Ad hoc TCP Vegas in high mobility and high traffic conditions.

Research paper thumbnail of A simple delayed acknowledgement scheme

2010 International Conference on Computer and Communication Technology (ICCCT), 2010

Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to no... more Abstract--The general TCP protocol doesn't show good performance in ad hoc network due to nodes mobility and higher vulnerability of the wireless link. This paper proposes a simple end to end approach; in this the hop count of the path and the size of delayed window at ...

Research paper thumbnail of Computer Graphics Lecture Notes

This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations,... more This lecture note covers the following topics: Introduction to Graphics, Curves, Transformations, Coordinate Free Geometry, 3D Objects, Camera Models, Visibility, Basic Lighting and Reflection, Basic Ray Tracing, Radiometry and Reflection, Distribution Ray Tracing, Parametric Curves And Surfaces and Animation.

Research paper thumbnail of Crowd Surveillance with the Video Captured by Handheld Devices

The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing envi... more The Gaussian Mixture Model has been widely used to detect foreground in the rapidly changing environment but it fails in low light condition and deteriorates when the background is rapidly changing and it cannot be applied to the video captured by handheld until the frames are stabilized. The proposed work is focused on group detection and people counting in videos where the camera is handheld. We utilize the motion information for each pixel between current and previous frames to prepare a confidence matrix to correctly model background distribution. This work excludes the current distribution of the pixel if the match occurs; in case the pixel is foreground in confidence matrix, reducing the chance of false positive inclusion in background model estimation, and detects around 90% of the foreground pixels. Moreover, the height, width, area of the bounding box of the blobs detected and foreground pixel density are used to distinguish individual and groups, and people counting.

Research paper thumbnail of Circle generation Algorithm

This work contains detailed descryption of circle generation algorithm and discussed mid point ci... more This work contains detailed descryption of circle generation algorithm and discussed mid point circle drawing in computer graphics

Research paper thumbnail of Line Drawing Algorithm

This work contains DDA line drawing algorithm and Bresenham's line drawing algorithm in detail.

Research paper thumbnail of Computer Graphics Applications

This document mentions the computer graphics application areas and the companies in the computer ... more This document mentions the computer graphics application areas and the companies in the computer graphics field. It also discusses about the companies involve in Animations.

Research paper thumbnail of Overview of computer graphics concepts

A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.

Research paper thumbnail of Use of computer graphics concepts

A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. Thi... more A short overview of usage of computer graphics concepts to generate a 2d image of a 3d world. This presentation includes output primitives to draw 2d image of a car and then adds other features using, transformation, clipping, projection, curves, curved surface, color filling, illumination, shading etc, step by step.

Research paper thumbnail of code to extract frames from a video in Matlab

code to extract frames from a video in Matlab

Research paper thumbnail of Improved TCP Vegas in ad hoc network

C. P. Sahu , S. K. Dhurandher, “Improved TCP Vegas in Ad hoc Network”, International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010), 19-21 July 2010, Banglore, India, page 394-397, Jul 21, 2010

TCP Vegas is an end to end congestion avoidance approach which utilizes round trip time, to rem... more TCP Vegas is an end to end congestion
avoidance approach which utilizes round trip time, to
remain in congestion avoidance phase, this single
metric solution can cause false detection of
congestion level, which in turn starts reducing the
congestion window. This paper proposes Improved-
TCP Vegas an improvement over TCP Vegas in
MANET. We consider RTT to determine the
throughput and RTHC for optimum utilization of
available bandwidth and STT, IDD for the
congestion level of the network in forward path. The
fuzzy logic control used to blend IDD and STT and
determine the network condition. And then used this
information from receiver for cross verification of
the network condition. Our simulation result shows
the improvement of 15 to 20 % in comparison to TCP
Vegas in high mobility and high traffic conditions.

Research paper thumbnail of pervasive computing lecture notes

type of pervasive computing, ambient computing, internet computing, context aware computing, sent... more type of pervasive computing, ambient computing, internet computing, context aware computing, sentient computing, requirement for computational infrastructure.
ubiquitous computing notes.
basic elements of pervasive computing

Research paper thumbnail of Mobile computing middleware lecture notes

Lecture notes on mobile computing middleware

Research paper thumbnail of A simple Delayed Acknowledgement Scheme

C. P. Sahu , M. P. Yadav, M. Rana, R. Srivastava, “A simple delayed acknowledgement scheme”, IEEE ICCCT-2010 , 17-19 Sept. 2010, MNNIT Allahabad, India, page 393-396

The general TCP protocol doesn’t show good performance in ad hoc network due to nodes mobility ... more The general TCP protocol doesn’t show good
performance in ad hoc network due to nodes mobility
and higher vulnerability of the wireless link. This
paper proposes a simple end to end approach; in this
the hop count of the path and the size of delayed
window at receiver end is utilize and also the of CWL
with the RTT variation to control the size of the bursts.
As the number of hop increases chance of congestion
increases, the congestion is not affected by number of
links only but by the length of links as the length
increases the environmental effects also increases. The
simulation result shows 10 to 15 % improvement in
TCP performance over the TCPDCA.

Research paper thumbnail of Time varient captcha

Approximately all the internet users have login accounts for internet sites and these sites requ... more Approximately all the internet users have login
accounts for internet sites and these sites require only the
registration by human users but unfortunately some
automated computer programs to enter these sites and use
their resources through false registration. This paper
introduces a new TIME-VARIENT CAPTCHA. In this
paper we are not focusing on the effective development of
Captcha but targeting a display of Captcha over the
webpage for a fixed time, Captcha replaces itself until the
final Captcha is filled by user. Refresh process just work
with Captcha and don’t affect the web page. So, now,
automated program has to cover one more area to breach
the Captcha: to determine the final entered Captcha.

Research paper thumbnail of Optimistic congestion control to improve the performance of Mobile Ad hoc Network

C. P. Sahu , P. S. Yadav, S. Ahuja, R. Prasad, “Optimistic congestion control to improve the performance of Mobile Ad hoc Network”, IEEE IACC-2013 , AKGEC, Ghaziabad, ISBN: 978-1-4673-4527-9 page 394 - 398

Research paper thumbnail of A case study: to understand cell, cluster and frequency reuse

Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (... more Case Study: To understand cell, cluster, frequency reuse A mobile operator bought a 2G spectrum (890 MHz to 900 MHz), the region for which they allocated this 10 MHz bandwidth has total area 100km 2 (assume a squared area of 10 km width and 10 km length). We have to find out the ways with which maximum number of customers can be supported to communicate simultaneously. Full duplex voice communication (in GSM) requires 200 kHz uplink and 200 kHz downlink for a single customer. Assume that the company uses 890 to 894.99 MHz for uplink and 895 to 899.99 MHz for down Link, i.e. 5 Mhz uplink and 5 MHz downlink. So the number of channels available = (5 X 10 6)/(200 X 10 3)= 25 i.e. 25 uplink and 25 downlink. Now assume the 2G GSM technology is TDMA(it can also be CDMA). When TDMA is used a 200 KHz channel can be shared between 8 devices (that means it can be subdivided in 8 channels). So the total number of uplink channels available= 25 X 8= 200. Now assume if only one high power antenna is installed by the operator in the middle of square to transmit and receive signals. Only 200 customers can communicate at a time. The question is how can we increase the system capacity (number of channels)? The answer is frequency reuse. Use the following steps to increase system capacity-1. Divide the region in 100 cells of 1 km 2 (Cell area A cell) 2. Install an antenna (base station) in the middle of each region. 3. Transmit and receive signals in the same frequency range.