Sarita Singh Bhadauria

Sarita Singh Bhadauria
  • Ph.D in Digital Image Processing
  • Professor at Madhav Institute of Technology & Science Gwalior

About

98
Publications
27,917
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
684
Citations
Introduction
Sarita Singh Bhadauria currently works at the Department of Electronics & Communication Engineering, Madhav Institute of Technology & Science Gwalior. Sarita does research in Electronic Engineering, IMAGE Processing, Adhoc Networks and Software Engineering. Their current project is 'Ph.d thesis in medical imaging..'
Current institution
Madhav Institute of Technology & Science Gwalior
Current position
  • Professor

Publications

Publications (98)
Article
Occurrence of the frequency bands seeks dynamic spectrum allocation for improving the network capacity. Further the upcoming generation in this field is expected to function in the entire unlicensed, licensed and shared spectrum for meeting the widely applicative spectral demands. Accordingly, the wireless radio has to be tuned with their significa...
Article
Full-text available
Detection and segmentation of candidate lung nodules from diagnostic images are vital steps in any image processing-based Computer-Aided Diagnostic (CAD) system for lung cancer. Computed Tomography (CT) is a commonly used modality for lung cancer screening due to the tissue contrast and anatomical resolution. This work aims to investigate the effec...
Article
Full-text available
During the COVID-19 pandemic, huge interstitial lung disease (ILD) lung images have been captured. It is high time to develop the efficient segmentation techniques utilized to separate the anatomical structures and ILD patterns for disease and infection level identification. The effectiveness of disease classification directly depends on the accura...
Chapter
In cognitive radio (CR), spectrum sensing is the fundamental and basic component of wireless communication. Requirement of higher sampling is the essential need for the sensing of wideband ultra-wideband spectrum sensing. In this paper, a comprehensive survey on the compressive sensing is done, and a wideband (ultra) spectrum sensing model has been...
Article
Full-text available
This paper presents an automated approach to perform multiclass classification of four majorly diagnosed Central nervous system brain tumors. The Astrocytoma, Glioblastoma multiforme, Meningioma and Oligodendroglioma are the four types of central nervous system brain tumors types, whose classification is being performed with the aid of this propose...
Chapter
In the modern age, several applications depend on the information collected from the images and its classification. However, due to the poor climatic conditions, the images captured by the camera are degraded in terms of contrast, brightness, color, and sharpness, which create hazy images. Therefore, several techniques have been suggested in the li...
Article
This paper simply presents a state of the art survey among the machine learning based approaches for the Glioma classification. As Glioma classification is a very challenging task in the field of medical science and this task is well addressed and taken by the fraternity of machine learning experts, who are working day and night to devise automated...
Article
This paper presents an efficient and accurate automated system based on the hybrid XGBoost with Random forest (XGBRF) ensemble model in order to classify the Glioma (type of mostly diagnosed brain tumor) into low grade and high grade Glioma. In this approach initially global thresholding is employed on various MRI sequence and their fusion combinat...
Article
Full-text available
Atmospheric conditions induced by suspended particles such as fog, smog, rain, haze etc., severely affect the scene appearance and computer vision applications. In general, existing defogging algorithms use various constraints for fog removal. The efficiency of these algorithms depends on the accurate estimation of the depth models and the perfecti...
Article
Full-text available
This paper is an effort to encapsulate the various developments in the domain of different unsupervised, supervised and half supervised brain anomaly detection approaches or techniques proposed by the researchers working in the domain of the Medical image segmentation and classification. As researchers are constantly working hard in the domain of i...
Article
Full-text available
In this paper design of Microstrip band-reject filters have been presented for different dielectric materials on L-band applications. The various designs have also been compared with different dielectric constants and other performance parameters to check for viability and stability of designs on the considered frequency band. IE3D 14.1 simulation...
Article
In today's world, nothing seems to be impossible, due to the astonishing advancements in science and technology. Now days, many humans are dependent on internet for their daily chores. But, congestion is one of the major issues, which affects the performance of such data networks. Thus, in order to control congestion, various schemes have been deve...
Article
Full-text available
In advanced communication technology the microstrip filter has an important job in terms of selectivity and elimination of the undesired signals. In microwave and RF frequency applications the design of filter is complex task as lumped components cannot be used in this range of frequency. Microstrip filters are always preferred over the lumped filt...
Article
Full-text available
The objective of this paper is to improvise a technique for battery optimization of smartphones. The technique is based on reduction in energy consumed by communication over network. This will be achieved by utilizing cooperative device-to-device communication. The proposed system will allow users with higher battery level to carry traffic of users...
Article
Full-text available
Based on existing work (Testing Tool: “A full featured component based architecture testing tool”); which draws a comprehensive architecture of testing method, and based on their attribute nature shows their relationship or behavior of attributes in terms of object oriented [34]. This research work includes a cse study on “snaker game” for validati...
Article
Full-text available
The Rectenna consisting of Radio Frequency to Direct Current conversion circuit with antenna for the reception of RF signal needs to be designed to realize efficient power transmission with high conversion efficiency. In this paper, main area of work is to design Rectenna using low pass filter circuit with different order of filters. The parameters...
Article
A novel approach for Structure from Motion (SFM) problem has been suggested. A recursive framework has been used to find error in measurement of motion and structure parameters. Using feature correspondence it has been suggested that instead of using a single Extended Kalman Filter (EKF) to estimate the state vector an Interactive Multiple Model (I...
Article
Full-text available
In mobile ad hoc networks, congestion occurs due to limited sources of the network, which leads to packet losses, bandwidth degradation and wastes time and energy on congestion recovery. Various techniques have been developed in attempt to minimize congestion in uniformly distributed networks. In this paper, a load balanced congestion adaptive rout...
Article
Full-text available
In mobile ad hoc networks the congestion is a major issue, which affects the overall performance of the networks. The load balancing in the network alongside the congestion is another major problem in mobile ad hoc network (MANET) routing due to difference in link cost of the route. Most of the existing routing protocols provide solutions to load b...
Article
In this paper, an artificial neural network (ANN) design technique for a stub microstrip band-pass filter is presented. Essential dimensions of the microstrip filter layout are used to get the relationship of the input-outputs for ANN model. This paper presents the design and analysis of stub microstrip band-pass filter at mid-band frequency 1.8 GH...
Conference Paper
Full-text available
In this paper a design technique for a Stepped impedance Micro strip Low-pass filters is presented by using the artificial neural network (ANN) modeling method. Required dimensions of the micro strip filter layout are used to get the input-output relationships in the ANN model. This paper presents the design and analysis of Stepped impedance Micro...
Article
In this research investigate, quality of software using comprehend our architecture testing model [34], with the help of object oriented characteristic relationship, using different software metrics. The objective of 'Design Architectural Testing Tool' is to facilitate a design that may contribute to the comprehensiveness of the software testing to...
Article
Full-text available
In this research investigate, quality of software using comprehend our architecture testing model [34], with the help of object oriented characteristic relationship, using different software metrics. The objective of 'Design Architectural Testing Tool' is to facilitate a design that may contribute to the comprehensiveness of the software testing to...
Chapter
In this paper security concerns in load balanced congestion adaptive routing (LBCAR) algorithm in mobile ad hoc network has been taken care of by using new concept of group signature for secure communication in the network. The performance of network using secure packets in the network has not degraded and has provided security. The proposed algori...
Chapter
Grid computing came into existence as a manner of sharing heavy computational loads among multiple computers to be able to compute highly complex mathematical problems. The grid topology is highly flexible and easily scalable, allowing users to join and leave the grid without the hassle of time and resource-hungry identification procedures, having...
Conference Paper
Various techniques have been developed in attempt to minimize congestion in uniformly distributed networks. In this paper, a new algorithm, load balanced congestion adaptive routing (LBCAR) algorithm has been proposed for randomly distributed networks in which two metrics: traffic load density and life time associated with a routing path, have been...
Article
Full-text available
Method to optimize different orders of digital filter and their comparison results are presented in this paper. An algorithm that operates on a complex continuous search space is constructed. The algorithm developed in this paper is different from the conventional method since here algorithm is applied on the continuous search space parameter inste...
Article
In this research paper we try to realize our architecture testing model [1], with the help of object oriented relationship, using different software metrics. Measurement is key element of any engineering process. Realization architectural testing tool, accomplish through measures, are used to better understand the attributes and relationship betwee...
Article
Full-text available
In this research paper we try to realize our architecture testing model [1], with the help of object oriented relationship, using different software metrics. Measurement is key element of any engineering process. Realization architectural testing tool, accomplish through measures, are used to better understand the attributes and relationship betwee...
Article
Full-text available
In this research paper, design a fault based testing tool based on their properties and it behavior (test cases for fault based testing) for software development. A requirement specification for a FBT is established that would involve studying the feature set offered by existing software testing tools, along with their limitations. The requirement...
Article
Full-text available
days it is very tedious job to keep files for personal as well as commercial computing. There are various type of compressing technique used, but one step ahead from them available technique is described here. Almost every application the backend used is database. That why my technique is dedicated to this type of databases. In this proposed techni...
Article
In this research work, design an Integration based testing tool (IBTT) based on their properties and it behavior (test cases for Integration based testing) for software development. A requirement specification for an IBT is established that would involve studying the feature set offered by existing software testing tools, along with their limitatio...
Article
In this research paper, design a fault based testing tool based on their properties and it behavior (test cases for fault based testing) for software development. A requirement specification for a FBT is established that would involve studying the feature set offered by existing software testing tools, along with their limitations. The requirement...
Article
Object-orientation involving class and object concepts and their properties play an important role in constructing any object-orientated system. In this research work, a comprehensive class diagram is provided that may help in designing a comprehensive software testing tool. A requirement specification for a comprehensive software testing tool is e...
Article
Full-text available
Object-orientation involving class and object concepts and their properties play an important role in constructing any object-orientated system. In this research work, a comprehensive class diagram is provided that may help in designing a comprehensive software testing tool. A requirement specification for a comprehensive software testing tool is e...
Article
Full-text available
In mobile ad hoc networks (MANETs), inefficient resource allocation causes heavy losses to the service providers and results in inadequate user proficiency. For improving and automating the quality of service of MANETs, efficient resource allocation techniques are required. In this paper, we propose an agent based bandwidth reservation technique fo...
Conference Paper
The explosive growth of multimedia data and real time applications have put unexpected load on network and have increased congestion in network, which occurs due to flooding of packets to intermediate node and increase in aggregate demand as compared to the accessible capacity of the resources. In mobile adhoc networks (MANETs) congestion, leads to...
Article
Full-text available
A Congestion control is a key problem in mobile ad-hoc networks. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. Many approaches have been proposed to overcome these difficulties. ideas and show their interrelations. mobile agent based congestion control Technique routing is p...
Article
Object-orientation has rapidly become accepted as the preferred paradigm for large-scale system design. The product created during Software Development effort has to be tested since bugs may get introduced during its development. In this research work we 1) establish a requirement specification for a comprehensive software testing tool. 2) This wil...
Conference Paper
Software process models have been adopted successfully across a broad spectrum of industry applications. Although managers and practitioners alike recognize the need for a more disciplined approach to software, they continue to debate the manner in which discipline is to be applied. This paper is presenting the uses of Object oriented in process de...
Conference Paper
Full-text available
The performance of the routing protocols in mobile Ad hoc networks degrades with increasing traffic load. Many routing protocols for such networks have been proposed so far. Amongst the most popular ones are Ad hoc On-demand Distance Vector (AODV), Destination-Sequenced Distance-Vector Routing protocol (DSDV), Dynamic Source Routing Protocol (DSR)....
Article
Full-text available
Object-orientation has rapidly become accepted as the preferred paradigm for large-scale system design. The product created during Software Development effort has to be tested since bugs may get introduced during its development. In this research work we 1) establish a requirement specification for a comprehensive software testing tool. 2) This wil...
Article
Grid computing came into existence as a manner of sharing heavy computational loads among multiple computers to be able to compute highly complex mathematical problems. The grid topology is highly flexible and easily scalable, allowing users to join and leave the grid without the hassle of time and resource-hungry identification procedures, having...
Conference Paper
Full-text available
Software process models have been adopted successfully across a broad spectrum of industry applications. Although managers and practitioners alike recognize the need for a more disciplined approach to software, they continue to debate the manner in which discipline is to be applied. This paper is presenting the uses of Object oriented in process de...
Article
Full-text available
Digital watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents. Watermarking can be done by using least significant bit (LSB), singular value decomposition (SVD), Discrete Fourier Transform (DFT), Discrete cosine transform (DCT) an...
Article
Full-text available
A mobile ad hoc network (MANET) is a network consisting of a set of wireless mobile nodes that communicate with each other without centralized control or established infrastructure. Routing is a critical task in MANET as the nodes are moving. We compare the performance of two prominent routing protocols in MANET: Ad hoc On-Demand Distance Vector Ro...
Conference Paper
Intensity transformation function based on information extracted from image intensity histogram play a basic role in image processing, in areas such as enhancement. Histogram equalization (HE) is a conventional method for image contract enhancement. Histogram equalization improved the contrast of image by changing the intensity level of the pixel b...
Chapter
In Mobile Ad hoc Networks (MANETs) obstruction occurs due to the packet failure and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we propose to framework and implimentationan agent based congestion control technique for MANETs. In our te...
Chapter
In Mobile Ad hoc Networks (MANETs) congestion occurs due to the packet loss and it can be effectively reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we propose to design and develop an agent based congestion control technique for MANETs. In our technique, the i...
Chapter
This paper gives the performance analysis of Interleave Division Multiple Access (IDMA) with different coding techniques. Convolutional coding and Zigzag coding techniques are used to improve the capacity of a channel.A new multiple access scheme has been introduced which employs the chip level interleaving as the only means of user separation. Cod...
Article
The goal of this paper is to presents Brief Description of literature on Image Based human and machine recognition of faces during 1987 to 2010. Machine recognition of faces has several applications. As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especial...
Article
Ethical issues should go along with development in the age of globalization; same is the case with Information Technology (IT), a sub domain of Technology. IT is growing and developing rapidly with the lightening speed, probably leaving some ethical issues, considerations, principles and legal requirements lagging behind. The future of ethical IT p...
Article
Full-text available
Digital Watermarking offers techniques to hide watermarks into digital content to protect it from illegal copy or reproduction. Existing techniques based on spatial and frequency domain suffer from the problems of low Peak Signal to Noise Ratio (PSNR) of watermark and image quality degradation in varying degree. Earlier technique based on Full Coun...
Article
Full-text available
The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unuti...
Article
Digital watermarking has gained a lot of importance for digital media recently. It deals with hiding secret bits of information with a digital content as a cover. This is very useful for many applications like copyright control, authenticity of documents, captioning, broadcast monitoring etc. Various techniques for watermarking have been proposed b...
Article
In the modern world, digital images can be easily and rapidly transferred over networks. This may give rise to the possibilities of illegal copy or reproduction. Securing digital images while transferring through networks and later extracting it in the original form is a very challenging task. Several advance computation techniques have been develo...
Conference Paper
Full-text available
Mammograms can depict most of the significant changes of breast disease. The primary radiographic signs of cancer are masses (its density, site, shape, borders), spicular lesions and calcification content.These features may be extracted using various detection system .The common are Neural network, wavelet, fuzzy logic, evolutionary approach and fi...
Article
This paper describes the identification of potential problems with ad hoc routing protocol that contribute to the overall performance. Another major factor that contributes to routing protocol performance is when wireless nodes move out of coverage area of the other nodes and thus lose connection, or the opposite, where other wireless nodes join th...
Conference Paper
Full-text available
Optimizing the single FPGA board resource as a simulator in a multi user environment regardless of the physical distance improved by TCP/IP. It is important step for IP and system development to use FPGA and IP core to design and improve flow of multi user data in a high speed communication internet environment and optimal utilization of available...
Conference Paper
The advent of information technology has affected all walks of life. And when we talk the use of information technology in a business environment, we cannot ignore the presence of a data base system as its core. Data base technology has also grown from a simple file system to data navigation system, & over a last two decade a majority of top-&-midd...
Article
This study describes an efficient method and algorithm to make individual faces for animation from possible inputs. Proposed algorithm reconstruct 3D facial model for animation from two projected pictures taken from front and side views or from range data obtained from any available resources. It is based on extracting features on a face in automat...
Article
Full-text available
The major source of communication in present world is digital media. As it is quite easy to manipulate a digital media, it becomes essential to protect the digital information by legitimate means. Digital Watermarking has evolved as one of the latest technologies for digital media protection. Many techniques based on spatial and frequency domain ha...
Article
In this digital world, it has become very important to save a digital product from illegal copy or reproduction. The technique, which has evolved for this, is known as Digital Watermarking. Several techniques based on spatial and frequency domain have been developed. However, none of them are full proof and exhibit all the desirable properties of w...
Article
In the proposed study, 2D photographs image divided into two parts; one part is front view (x, y) and side view (y, z). Necessary condition of this method is that position or coordinate of both images should be equal. We combine both images according to the coordinate then we will get 3D Models (x, y, z) but this 3D model is not accurate in size or...
Article
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These protocols are of significant importance since the wireless communication channel is inherently prone to...
Article
Full-text available
Routing in Mobile Ad Hoc Networks faces many challenges that are not faced in other networks. These involve limited resources, mobility of nodes and dynamic topology. Thus the aim of the routing protocol should be to improve the communication among the nodes in the network. Controlling Delay and Delay Variance plays an impor tant role in the functi...
Article
In this Case Study & report, a face detection method is presented. Face detection is the first step of face Recognition methods. Face detection is a difficult task in Pattern. There are different methods of face detection namely-Knowledge Based Face Detection Methods, Feature Based Face Detection Methods, Template Based Face Detection Methods and A...
Article
Full-text available
In this paper, an expert system is designed using rule-based reasoning to evaluate the probability of cancer. This is developed for features related to mammography to provide support for the clinical decision to perform biopsy of the breast. The system was evaluated using a WBCD dataset and performed with an area under the receiver operating charac...
Article
Full-text available
In Mobile Ad hoc Networks (MANETs) congestion occurs due to the packet loss and it can be successfully reduced by involving congestion control scheme which includes routing algorithm and a flow control at the network layer. In this paper, we propose to agent based congestion control technique for MANETs. In our technique, the information about netw...
Article
Full-text available
We have design an attack scenario in which we have declared some nodes as suspicious nodes by their unfair behavior. They may disobey basic rules of Media Access Control protocols while working as a suspicious node by its behavior in 802.11 x WLAN scenarios. Some Throughputs may increase because of suspicious nodes working as a malicious/attacker n...
Article
Biometric systems have been researched intensively by many organization. It overcomes the conventional security systems by identify ―who you are‖. This paper discusses the current image based biometric systems. It first gives some information about why biometric is needed and what should people look for in biometric systems. Several popular image b...
Article
In this paper, 2D photographs image divided into two parts; one part is front view (x, y) and side view (y, z). Necessary condition of this method is that position or coordinate of both images should be equal. We combine both images according to the coordinate then we will get 3D Models (x, y, z) but this 3D model is not accurate in size or shape....
Article
Face recognition is an example of advanced object recognition. The process is influenced by several factors such as shape, reflectance, pose, occlusion and illumination which make it even more difficult. Today there exist many well known techniques to try to recognize a face. We present to the reader an investigation into individual strengths and w...
Article
Full-text available
In this paper Algorithm for rule-based reasoning is presented. This is developed for mammographic findings to provide support for the clinical decision to perform biopsy of the breast. The system was evaluated using a round-robin sampling scheme and performed with an area under the receiver operating characteristic curve of 0.83, comparable with th...

Network

Cited By