About
26
Publications
5,248
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
85
Citations
Introduction
Skills and Expertise
Publications
Publications (26)
In today’s world, steganography is achieved through various different factors like LSB replacement, DCT, etc., in various forms. In which the embedding of the data was used to be successful but at the cost of degrading the quality of the file behind which a secret message was embedded. Earlier techniques used were only for a particular subdomain li...
Detecting the road condition is a very important task nowadays. There is an alarming increase in the number of vehicles so a number of accidents also have increased in turn. This paper shows a unique way to detect the potholes using an Arduino-based sensing module and android smartphone. It also does an important task of finding the appropriate way...
Cloud computing is the best way for storing and computing data over an internet. Data can be shared in the form of texts, images, audio, and video. Sharing data securely over internet is a key issue. Cloud computing faces serious issues like security, integrity, and confidentiality of data. The most popular existing techniques for achieving data se...
“Sa_Re_Ga_Ma_Pa_Da_Ni_Sa” is the soul of Indian Music. As we play these 7 nodes at different frequency, different length, and at different reparations on one or more nodes, we will listen n number of feelings, expressions, and emotions. As musician can create such number of tones manually and get famous, all world remember such tone forever. As fre...
Hyper connectivity is what the world's reality is today. The day is not far away where clients, consumers, and suppliers " go online " to work, play, or consume ; no we live in a realm where one and all is just interconnected to each other and with Internet. This new age carries with it an acceleration of formulation and disruption. It is a domain...
The development of education and college expansion and consolidation in the Educational Management System has made the Course Scheduling System complex, and therefore it has become necessary to design one for development, and reuse. A Course Timetabling Problem (CTP) is an NP-hard combinatorial optimization problem which lacks analytical solution m...
In real world, wireless medium is widely used among various military agents and companies. It provides various challenging features such as
Its faster accessibility among wide set of users, but it is fragile by intentional interference attacks from internal adversary. These attacks can be easily launched by sending continuous radio signals or sever...
Topology control mechanism plays a vital role while designing wireless sensor network and mobile ad-hoc control. Topology control mechanism should create topology with lower transmission power, sparser connectivity, with smaller node degree. Proposed paper presents analysis of different topology control mechanisms at present. Energy conservation is...
There are various Iris recognition and identification schemes known to produce exceptional results with very less errors and at times no errors at all but are patented. Many prominent researchers have given their schemes for either recognition of an Iris from an image and then identifying it from a set of available database so as to know who it bel...
In recent years web applications allows users to interact or collaborate with each other in a social media dialogue, in contrast to websites where very few users view the static content that was created for them. A rapidly growing trend in web applications is the development of user interfaces through Rich Internet Applications. Among other capabil...
Most widely use of mobile communication devices and the technical improvements of location techniques are fostering the development of new applications that use the physical position of users to offer location-based services for business, social, or informational purposes. Since the development of location-based services, privacy-preserving has gai...
In the last few years there has been significant growth in the wireless communications. Security issues are prime concern in wireless communication networks. In this paper analyzed and observed the performance one of the most challenging attack i.e Black hole attacks in WiMAX-WLAN interface network. Black hole attack is very important for NGN (Next...
There has been a lot of related work for detecting distributed denial of service attacks (DDoS) targeted on TCP and IP Layer. But these techniques cannot handle attacks which are mainly based on application layer. The severity of application layer DDoS attack has become a major threat to network operators nowadays. In this paper we introduce a new...
We propose an access control model that works like three factor authentication for getting access to our system. This system takes time and location into account to specify access control policies. We also discuss implementation techniques for location and time based policy specifications and the integration of these policies in standalone applicat...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure.Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate...
A novel improved VPN (Virtual Private Network) system based on SSL (Secure Socket Layer) protocol is discussed to overwhelm the defect of traditional SSL VPN. The concept, critical technique and working process of the geo-secured SSL based VPN are presented in details because they are very important to meet enhanced security requirement which is or...
This paper presents simulation of WiMAX based system under jamming. The performance of the system was found out to greatly differ with the use of different jamming signals, allowing central areas to be identified, where system development should be focused on. In addition, from the basic theory point of view, rather surprising results were also fou...
IPv6 is coming, whether we like it or not. It isn't a matter of new features or "killer applications," although those may come with time. Rather, it is the rapid depletion of the remaining IPv4 addresses that is leaving IPv6 as the only feasible alternative for the continued growth of networks beyond the next few years. Governments and service prov...
Future generation networks will be characterized by variable and high data rates, quality of services, seamless mobility both within a network and between networks of different technologies and service providers. An important aspect of components in a global next generation network is standardization to allow vendor independence and interoperabilit...
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate...
We are moving towards an era where location information will benecessary for access control. The use of location information can beused for enhancing the security of an application, for criticalapplications, such as the military. A formal model for location-basedaccess control is needed that increases the security of the applicationand ensures that...
IPv6 was developed to replace and improve the existing Internet Protocol (IP), the IPv4 in many ways. Among the improved areas are addressing space, routing efficiency, header format, auto-configuration, Quality-of-Service (QoS), security and mobility. Although IPv6 promises enhancements to IPv4 standards, its deployment is rather slow in India. Th...