
Jyoti ChaudharyThe Technological Institute of Textile and Sciences Bhiwani (Haryana)
Jyoti Chaudhary
Ph.D. MTech.
About
60
Publications
1,636
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
22
Citations
Introduction
Skills and Expertise
Education
September 2014 - November 2018
Publications
Publications (60)
Testing is finished on each piece of software after it has been created to find blunders that are then fixed. Notwithstanding, completely testing non-paltry software is a truly troublesome errand. It is essential to test the software with basic test cases accordingly. Subsequently, the objective of test case determination is to diminish how much un...
Face Detection is one of the active research areas in computer vision for various contexts like access control, immigration, education, banking and healthcare. This paper mainly focuses on Face detection technology which can be used to stop crimes using computer vision i.e., machine learning or deep learning algorithms. Further, this paper will dis...
The information and communication advancements have revolutionized the way we organize our lives, our economies, industries, and institutions. These incredible advancements have indeed boosted the quality of our lives. At the same time, these have led to diverse challenges including the problem of management of huge amount of hazardous waste and wa...
As the amount of information on the internet rises, recommender systems have shown to be a successful strategy for overcoming information overload. The importance of RS cannot be overstated, given their widespread use in many web applications and their capacity to solve several problems associated with over-choice. People have unlimited options bec...
The term cloud computing seems to originate from computer network diagrams that represent the internet as a cloud. While cloud computing services have numerous potential benefits, there are also potentially significant privacy and security considerations that should be accounted for before collecting, processing, sharing, or storing institutional o...
Internet works with clients to convey and share snippets of data. Because of the tremendous measure of data, it has turned into a major test to observe what we need that best meets our inclinations. This issue is alluded to as over-burden. RS have arisen as a Web personalization instrument that helps online clients by lightening the data over-burde...
Software development associations spend extensive part of their financial plan and time in testing related exercises. The adequacy of the verification and validation process relies on the number of errors found and corrected before releasing the software to the customer side by means of testing procedure. Mutation testing is a fault-based programmi...
Mutation Testing is a white-box, unit testing technique widely used for the software quality assurance. This technique athough powerful, but is computationally expensive and this expense has barred mutation testing from becoming a popular software testing technique. However the recent engineering advancements have provided us with a number of ways...
Mutation Testing is utilized as fault based testing to overcome constraints of other testing approaches yet it is recognized as costly process. In mutation testing, a good test case is one that kills one or more mutants, by delivering different mutant yield from the original program. In order to select or generate a good test case an optimization a...
Automated Test Data Generation (ATDG) is an activity that in the course of software testing automatically generates test data for the software under test (SUT). It usually makes the testing more efficient and cost effective. Test Data Generation (TDG) is crucial for software testing because test data is one of the key factors for determining the qu...
A class of wireless network is represented by Delay Tolerant Networks (DTNs) that experience regular and long-lasting partitions due to light distribution of nodes in the network topology. In DTN, store-carry-forward mechanism is used for packets routing. In this paper, for performance evaluation three popular routing protocols are used namely, Epi...
Delay-Tolerant Networks also called disruption tolerant networks (DTNs), represent a moderately new networking classic exemplar that concede inter-connection between devices that current networking technology cannot give up. The primary goal in such networks is to get the information from a source to the destination. In this routing of packets is p...
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier like image, video and audio files. it does not replace cryptography but rather boots the security using its obscurity features. When we work on a network the security requirements of a user as well as a network increases. There are number of av...
Steganography is the science that involves communicating secret data in an appropriate multimedia carrier like image, video and audio files. it does not replace cryptography but rather boots the security using its obscurity features. When we work on a network the security requirements of a user as well as a network increases. There are number of av...
Mutation Testing is a white-box, unit testing technique widely used for the software quality assurance. This technique although powerful but is computationally expensive and this expense has barred mutation testing from becoming a popular software testing technique. However, the recent engineering advancements have provided us with a number of ways...
Mutation Testing actually gives the internal structural analysis of a software system based on the data and operator feasibility. One of such metric that represents the module reliability and responsibility is its cost analysis. This cost analysis can be performed under identification of relevant operator and expression identification. In this work...
The main work of any sensor network is to transfer the accurate data to the destination. The collusion attack biased the nodes to change the reading of the sensor nodes. It leads to inaccurate readings. This paper describes a technique that handles the collusion attack by discarding the biased nodes. The technique determines the reliability factor...
Mutation Testing is a white box software testing technique, that involves modifying a program's source code or byte code in order to test sections of the code that are seldom or never accessed during normal tests execution. Mutation testing improves the quality& reliability of the software but still it is an exhaustive and computationally expensive...
Sensor network consists of very small sensors with general purpose computing elements to cooperatively monitor physical or environmental conditions, such as humidity, pressure, noise level etc. They have a great potential for long term applications and also have the ability to transform human lives in various aspects. However, there have been resou...
Mutation Testing is white box testing technique that analyze the code under different values, bounds and constraints. It also analyzes the data values associated to different operators and evaluates their significance over the code. Further this operator-based analysis helps in identifying the scope and limitations along with the relevancy, robustn...
Steganography in multimedia object improves the information security during communication. An analysis approach with effective frame selection, partial information storage per frame and referenced mask based embedding is suggested to improve the steganograhy process in video objects. Three step process is espoused to amend the security of video obj...
Quality of a software system depends on testing approaches adopted to analyze the software product. Testing process itself depends on two main vectors called test sequence generation and test data generation. Test sequence generation is about to identify the order in which the particular test cases will be executed and the test data defines the var...
Job checkpointing is a common technique for providing fault tolerance in grid computing environment. The effectiveness of checkpointing depends on the selection of the number of checkpoint interval and the duration of checkpoint interval. Fluctuating checkpointing interval can delay job execution. In this paper, a new fault-tolerant job scheduling...
Steganography has been in use since the presence of secret messages and this use has gained popularity as the internet became well-liked. Text steganography is a sub part of steganography that hides the message behind other cover text file. Moreover, hiding the text behind HTML coding of web pages makes the detection of steganography impractical as...
Computational grids are used to execute the jobs. Therefore, users submit their jobs to the Grid Scheduler (GS) along with their necessities These necessities may include the deadline of job, resources required, proposal needed. In case of fault free, results of executing the job are returned to the user after completion of the job. If the grid res...
Grid computing is a distributed computing model that provides access to the geographically distributed heterogeneous resources. These computational grid systems are highly unreliable in nature because of which they need fault tolerance to be an integral part of the system to increase reliability. Commonly utilized techniques for providing fault tol...
Association rule mining is one of the most important and well researched techniques of data mining and was first introduced by Agrawal in 1993. It aims to find out interesting correlations, frequent pattern, casual structures or associations among sets of items in the transaction databases or other data repositories. Association rules are widely us...