ABV IIITM Gwalior
ABV IIITM Gwalior
Swarnakar P.,ABV IIITM Gwalior |
Kumar A.,ABV IIITM Gwalior |
Tyagi H.,ABV IIITM Gwalior
International Journal of Information Technology and Management | Year: 2017
Social networks are the frequently used service which over the past few years, have grown by leaps and bounds. In this study, a survey of engineering students has been conducted to find out the most relevant socio-demographic and webographic factors that are considered by users while sending/accepting friend requests. An extensive survey has been conducted and the responses were used to determine the influence of various factors in friend request attributes. Based on the collected responses, logistic regression and artificial neural network models have been developed for predicting the users' friend request attributes. A comparative performance analysis of these models to predict the friend request attributes has also been done. The results indicate that neural network model outperformed the logistic regression model when data are nonlinear. The study also shows that among all the factors, users' gender, photographs, hometown, age, and shared interests are the most significant factors. Copyright © 2017 Inderscience Enterprises Ltd.
Sharma M.K.,GNIT Greater Noida |
Maurya R.,Gameloft India Pvt. Ltd. |
Shukla A.S.,ABV IIITM Gwalior |
Gupta P.R.,CDAC Noida
Communications in Computer and Information Science | Year: 2012
In this paper we have discussed the method to detect skin identification. This method includes three main steps: First segmentation based on the pixel values, in which when the particular pixel values lies in the range it is skin area. Second is the post processing stage in which some area which is not the skin color but counted as a skin area is eliminated and some which is not counted as skin is added as possible. Third the segmented area is masked with original image (input image) and Finally Euclidean Distance is applied to find out Color difference between the segmented skin and mean of reference image based on threshold values classify the skin is infected or not. © 2012 Springer-Verlag.
Arya K.V.,ABV IIITM Gwalior
Lecture Notes in Electrical Engineering | Year: 2014
Intrusion Detection Systems (IDSs) are an indispensable part of a network infrastructure where inordinate attacks such as Distributed Denial-of-Service (DDoS) and metasploits have posed a major problem to the public and private computer networks. IDS assist the network administrators to monitor activities like gaining unauthorized access, session hijacking etc. These unlawful activities can result in losses to an enterprise, both in terms of money and resources. In this paper we detect and prevent one of the commonly occurring server attacks and follow it up with a fatal attack that can fully immobilize and destroy a server. We study and analyze the responses of the intrusion detection server when the network is exploited and the security of the network is compromised. Several dissimilar exploits are made on various Linux distributions hence, assisting the network administrators relying on the IDS to take appropriate action. © 2014 Springer.
Rishiwal V.,Rohilkhand University |
Lamba S.,ABV IIITM Gwalior |
Yadav M.,Glocal University |
Yadav M.,Galgotias University
Proceedings - 2015 2nd IEEE International Conference on Advances in Computing and Communication Engineering, ICACCE 2015 | Year: 2015
A directional antenna can provide a more stable path by increasing the coverage range and reducing the no of hops. It can also solves many problems like channel interference and spatial reuse. In Mobile Adhoc Networks (MANETs), the research about directional antennas has been restricted mostly to medium access control. To determine the efficacy of the MANET routing protocols with directional antennas, it is necessary to assess the impact of directional antennas on the performance of routing protocols. In this paper, an attempt has been made to cross couple the MAC and routing layer in order to enable the DSR protocol with directional antenna. To check the scope of this approach it has been compared with the traditional DSR with omni-directional antenna. Simulation results have been generated with NS-2 version 2.29. Simulation results of the paper shows that it can deliver more number of packets with less hop count and less end to end delay as compare to traditional approach of DSR. This approach also faces less energy loss as compare to DSR with omni-directional antenna support. © 2015 IEEE.
Jain P.,ABV IIITM Gwalior |
Singh P.K.,ABV IIITM Gwalior |
Abraham A.,VSB - Technical University of Ostrava
Proceedings of the 2011 7th International Conference on Next Generation Web Services Practices, NWeSP 2011 | Year: 2011
This paper describes a novel approach for the network security based on the combination of biological intrusion detection and self-healing concepts. The presented approach integrates an artificial immune intrusion detection system for network security inspired by idiotypic networks. The IDS detects and analyzes the malicious activities in the network and their effects to trigger the self-healing system. It means the detection of the damage caused by malicious activities is used to start the self-healing mechanism. It is an automated system and enhances the fault repair and system recovery. © 2011 IEEE.
Shukla A.,ABV IIITM Gwalior |
Tiwari R.,ABV IIITM Gwalior |
Kala R.,ABV IIITM Gwalior
Studies in Computational Intelligence | Year: 2010
One of the most exciting aspects of life is its evolutionary nature where the individuals keep improving along with generations. Genetic Algorithms are an inspiration from this natural evolution and find themselves as powerful optimizing agents for solving numerous real life applications. These algorithms can model complex problems and return the optimal solution in an iterative manner. This chapter presents the manner in which we model and solve the problem using this evolutionary technique. The role of the various parameters and optimal parameter setting as per the problem requirements would be discussed. The chapter would present mutation, selection, crossover and other genetic operators. Evolution forms the base for most of the complex systems that are designed to evolve with time. In this chapter we hence first study the basic concepts and then take an inspiration towards evolving systems. At the same time we present the limitations of evolution that marks a threshold to massive potential of problem solving that these algorithms have. © 2010 Springer-Verlag Berlin Heidelberg.
Yadav K.K.,ABV IIITM Gwalior |
Tapaswi S.,ABV IIITM Gwalior
Wireless Personal Communications | Year: 2015
This paper deals with the security of wireless networks such as Google Wi-Fi. We have considered the rogue mobile access points which impersonate legitimate roadside access points to attract users to connect to them. Since these rogue access points are mobile, they are able to make connection with the users for a long time which favors them to make attack on users and steal the important information. Since the rogue access is in moving state, it will communicate to different–different access point based on received signal strength so if the user want to detect the access point, it will have very less time to detect it because after some time till it get response from the access point the vehicle will have been moved to other location and connect to another access point. We have proposed an algorithm which is based on two parameters—one is the speed of vehicle and other is received signal strength. Our algorithm state that the rate of change in the value of received signal strength will be proportional to the speed of the vehicle. This algorithm does not require any extra hardware such as the GPS system and also does not require any modification to existing network. © 2014, Springer Science+Business Media New York.
Tapaswi S.,ABV IIITM Gwalior |
Gupta A.S.,ABV IIITM Gwalior
Proceedings - 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, CyberC 2013 | Year: 2013
With the introduction of new and new services in the market every day, the internet is growing rapidly. The network traffic generated by these network protocols and applications needs to be categorised which is an important task of network management. Among these, p2p has the largest share of the bandwidth. This great demand in the bandwidth has increased the importance of network traffic engineering. So, in order to meet the current demand and develop new architectures which help in improving the network performance, a broad understanding of the network traffic properties is required. The flow based methods classify p2p and non-p2p traffic using the characteristics of flows on the internet. In this paper, Naïve Bayes estimator is used to categorize the traffic into p2p and non-p2p. Our results show that with the right set of features and good training data, high level of accuracy is achievable with the simplest of Naïve Bayes estimator. © 2013 IEEE.
Dagar A.,ABV IIITM Gwalior |
Trivedi A.,ABV IIITM Gwalior
Proceedings on 2012 1st International Conference on Emerging Technology Trends in Electronics, Communication and Networking, ET2ECN 2012 | Year: 2012
Multiple-input multiple-output (MIMO) in wireless systems are capable of meeting the increasing demand of higher data rates. When combined with beamforming and user scheduling, these systems provide high diversity order. In this paper, a MIMO wireless system is considered where users are served in downlink transmission by a single base station (BS) according to their pre-defined data transfer rate (DTR). Here, an approach used by BS for joint scheduling and beamforming in conjunction with superposition coding (JSB-SC) is explained. For the case, when the available DTR for a user is much higher than its demand, JSB-SC allows another user to share the same transmission link without affecting their performance and efficiently utilizes the available resource under the total power constraint. The simulation results show that JSB-SC outperforms JSB in terms of lesser power wastage and increased number of scheduled users with guaranteed DTR. © 2012 IEEE.
Rajput S.S.,ABV IIITM Gwalior |
Kumar V.,ABES Engineering College |
Paul S.K.,ABV IIITM Gwalior
2014 International Conference on Signal Processing and Integrated Networks, SPIN 2014 | Year: 2014
With growing internet using demands, the need of services at various scales of Quality of Service (QoS) has made appropriate classification of these types of services mandatory. Therefore, the Differentiated Services Architecture has been proposed for service differentiation at various scales of services. DiffServ network is based on traffic classification mechanism. To measure the measurement of network performance of queue mechanism at router is a very crucial and important task. A number of queue algorithms have been proposed to reduce the routing problems in DiffServ network where priority of packets is a major concern for evaluating the network performance. This paper focuses on queue mechanism at edge router which has to select the higher priority packets enter first into the network. The aim of this work is to minimize the number of drop packets at the edge router. The paper considers performance (in terms of no. of packet drop, average end to end delay) comparison of Random Early Detection algorithm (RED) and Virtual Output Queue (VOQ) algorithm in different network conditions using Network Simulator-2. © 2014 IEEE.