Entity

Time filter

Source Type

Pune, India

Avhad K.,GHRCOEM | Limkar S.,AISSMS IOIT | Kulkarni A.,GHRCOEM
Advances in Intelligent Systems and Computing | Year: 2014

Opportunistic networks are wireless networks that have sporadic network connectivity, thus rendering the existence of instantaneous end-to-end paths from a source to a destination difficult. Hence, in such networks, message delivery relies heavily on the store-and-forward paradigm to route messages. However, limited knowledge of the contact times between the nodes poses a big challenge to effective forwarding of messages. This paper describes probability and priority based approach for routing in opportunistic networks, rendering traditional routing protocols unable to deliver messages between hosts. This approach minimizes the copies of the messages in the network and ensures successful delivery of messages. © Springer International Publishing Switzerland 2014. Source


Kadam M.,GHRCEM | Limkar S.,AISSMS IOIT
Advances in Intelligent Systems and Computing | Year: 2014

Recently the method called DMV (detecting malicious vehicle) for VANET is presented by many researchers in order to efficiently detect and isolate the malicious vehicle from the VANET in order to reduce the information leakage. This method is purely based on the concept of certificate authority, clustering, while lists monitoring etc. However as per the performances observed during the practical studies, these methods efficiently reduces the packet drops, however consumes more time for its processing and affecting other performance parameters like end to end delay, throughput and jitter which is the most vital for any kinds of wireless communications. Therefore to overcome these issues we have proposed method called Detection and Prevention of Misbehave/Malicious Vehicles D&PMV [1]. In our previous work we have observed that this method not affecting the performances of throughput, end to end delay and jitter. Therefore this method becomes efficient and more secured as compared to DMV. The architecture of both methods presented along with their algorithms for performance investigation. This paper emphasis on the discussion and analysis over both the methods in order to show that our proposed method gives much better performance as compared to existing methods. © Springer International Publishing Switzerland 2014. Source


Kumbhar H.,SVPMs COE | Kulkarni R.,WIT | Limkar S.,AISSMS IOIT
Advances in Intelligent Systems and Computing | Year: 2014

In recent years web applications allows users to interact or collaborate with each other in a social media dialogue, in contrast to websites where very few users view the static content that was created for them. A rapidly growing trend in web applications is the development of user interfaces through Rich Internet Applications. Among other capabilities, RIAs offer high interactivity and native multimedia support, giving them a major advantage over legacy web systems. In this paper we propose a model which converts legacy web application into web 2.0 application. Conversion to the Web2.0 is twofold, i.e. automatic as well as manual. Our proposal focuses on the user interface adaptation of existing web 1.0 applications (Legacy) to Web 2.0 and add new RIA features with some good enhancement in legacy web system by web assessment. © Springer International Publishing Switzerland 2014. Source


Sayed A.,SAOE | Sardeshmukh M.,SAOE | Limkar S.,AISSMS IOIT
Advances in Intelligent Systems and Computing | Year: 2014

There are various Iris recognition and identification schemes known to produce exceptional results with very less errors and at times no errors at all but are patented. Many prominent researchers have given their schemes for either recognition of an Iris from an image and then identifying it from a set of available database so as to know who it belongs to. The Gabor filter is a preferred algorithm for feature extraction of Iris image but it has certain limitations, hence Principal Component Analysis (PCA) is used to overcome the limitations of the Gabor filter and provide a solution which achieves better results which are encouraging and provide a better solution to Gabor filters for Off Gaze images. © Springer International Publishing Switzerland 2014. Source


Sayed A.,SAOE | Sardeshmukh M.,SAOE | Limkar S.,AISSMS IOIT
Advances in Intelligent Systems and Computing | Year: 2014

This paper explores the optimisation technique of Damped Least Square Method also known as the Levenberg-Marquardt (LM) Algorithm for Iris recognition. The motive behind it is to show that even though there are many algorithms available which act as an alternative to the LM algorithm such as the simple gradient decent and other conjugate gradient methods be it the vanilla gradient decent or the Gauss Newton iteration, the LM algorithm outperforms these optimisation techniques due to the addressing of the problem by the algorithm as the Non-linear Least Square Minimisation. The results are promising and provide an insight into Iris recognition which are distinct pattern of individuals and are unique in case of every eye. © Springer International Publishing Switzerland 2014. Source

Discover hidden collaborations