Kānpur, India
Kānpur, India
Time filter
Source Type

Mishra P.K.,Krishna Institute of Technology | Singh R.,H.B.T.I. | Yadav V.,Krishna Institute of Technology
Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016 | Year: 2016

To rank various reliability measures of Mobile Agent based Systems, a complete framework has been proposed in this research paper which are dominant pointers of the MAS reliability. Identification of a set of reliability measures and their ranking criteria is the basis of our research. No related appropriate applied data is found in literature; hence each measure's score for each ranking criterion is stimulated through expert opinion aggregation using fuzzy multilevel procedure. The proposed approach has been compared with existing practices. By setting up and practice of ranking of frequently used reliability measures of each component of Mobile Agent based Systems, a reliable quantitative estimate of MAS reliability can be done. With the known ranks of reliability measures, an organization using them will be more relaxed and assured while measuring reliability of Mobile Agent based Systems. © 2016 IEEE.

Dwivedi D.K.,Mmm University Of Technology | Pathak H.P.,Mmm University Of Technology | Shukla N.,Mmm University Of Technology | Kumar A.,H.B.T.I.
Journal of Ovonic Research | Year: 2014

Thin films of a-Se75-xTe25Sbx were prepared by vacuum evaporation technique in a base pressure of 10-6 Torr on to well cleaned glass substrate. a-Se75-xTe25Sbx thin films were annealed at different temperatures below their crystallization temperatures for 2h. The structural analysis of the films has been investigated using X-ray diffraction technique. The x-ray pattern indicates that the as- prepared films are amorphous in nature but it shows some polycrystalline structure in amorphous phases after annealing. The optical band gap of as prepared and annealed films as a function of photon energy in the wavelength range 400-1100 nm has been studied. It has been found that the optical band gap decreases with increasing annealing temperatures in the present system.

Awasthi V.,Csjmuniversity | Raj K.,HBTI
Proceedings of the 2013 3rd IEEE International Advance Computing Conference, IACC 2013 | Year: 2013

Signed digit (SD) number systems provide the possibility of constant-time addition, where interdigit carry propagation is eliminated. In this paper, two classes of parallel adder are surveyed with an asynchronous adder based on their delay, area and power characteristics. With the development of high speed processors, a tradeoff is always required between area and execution time to yield the most suitable implementation with low power consumption. In this paper, we proposed an optimum high speed fast adder algorithm by using signed and hybrid signed digit algorithms. This modified parallel hybrid signed digit (MPHSD) adder has high speed and less area as compare to conventional adders like ripple carry adder and carry lookahead adder. The MPHSD adder require few more configuration logic blocks (CLB's) because of redundant logic to optimize execution time with area and power. A relative merits and demerits is also evaluated by performing a detailed analysis in terms of its cost and performance. © 2013 IEEE.

Dutta M.K.,GCET | Gupta P.,Indian Institute of Technology Kanpur | Pathak V.K.,HBTI
Journal of Computers | Year: 2010

This paper proposes an efficient watermark generation method for audio copyright protection and digital right management. It proposes a method of generating pseudorandom sequences based on iris image templates. These biometric generated sequences (bio-keys) are found to be unique for distinct identification purposes. These bio-keys are used as the watermark for audio signals. The correlation of the extracted bio-key with a database of 150 bio-keys reveals that the best correlation is 1 while the next best correlation is less than 0.4 under no attack condition. Even under serious signal processing attacks, the bio-keys have distinctly been identified and mapped in a database. Experimental results of listening evaluation and robustness tests have confirmed that the use of bio-keys maintains good perceptual property and offers strong resistance to the typical signal processing attacks. © 2010 ACADEMY PUBLISHER.

Dutta M.K.,Galgotias University | Pathak V.K.,HBTI | Gupta P.,Indian Institute of Technology Kanpur
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2010

This paper proposes an efficient watermarking algorithm which embeds watermark data adaptively in the audio signal. The algorithm embeds the watermark in the host audio signal in such a way that the degree of embedding (DOE) is adaptive in nature and is chosen in a justified manner according to the localized content of the audio. The watermark embedding regions are selectively chosen in the high energy regions of the audio signal which make the embedding process robust to synchronization attacks. Synchronization codes are added along with the watermark in the wavelet domain and hence the embedded data can be subjected to self synchronization and the synchronization code can be used as a check to combat false alarm that results from data modification due to watermark embedding. The watermark is embedded by quantization of the singular value decompositions in the wavelet domain which makes the process perceptually transparent. The experimental results suggest that the proposed algorithm maintains a good perceptual quality of the audio signal and maintains good robustness against signal processing attacks. Comparative analysis indicates that the proposed algorithm of adaptive DOE has superior performance in comparison to existing uniform DOE. © 2010 Springer-Verlag Berlin Heidelberg.

Verma M.,HBTI | Kaushik V.D.,HBTI | Rao C.V.,NRSA
Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012 | Year: 2012

This paper presents an efficient image fusion algorithm which is based on curvelet transform. It makes use of different characteristics of the same geographical area obtained from more than one image, to obtain a more informative image. Experiments have been carried out to fuse monochromatic PAN (PANchromatic) satellite image with a multispectral LISS (Linear Imaging and Self Scanning) III image and it has been found that the fused image contains much richer information in both the spatial and spectral domain simultaneously. © 2012 IEEE.

Kaushal P.,Sant Longowal Institute of Engineering And Technology | Kumar V.,HBTI | Sharma H.K.,Sant Longowal Institute of Engineering And Technology
Journal of Food Science and Technology | Year: 2013

Tubers are important sources of carbohydrates as an energy source and are used as staple foods in tropical and subtropical countries. They are generally processed into various forms before consumption. Processing makes them digestible and palatable, extends the shelf life and reduces post-harvest losses. Taro (Colocasia esculenta) is a tropical tuber crop largely produced for its underground corms contain 70–80 % starch and the corms of Colocasia antiquorum contain anthocyanins such as cyanidin-3-glucoside, pelargonidin-3-glucoside and cyanidin-3-chemnoside which were reported to have antioxidative and anti-inflammatory properties. Taro consumption has been affected by the presence of acridity factors, which cause sharp irritation and burning sensation in the throat and mouth on ingestion. Taro is rich in gums (mucilage) and small sizes of starch granules makes it a highly digestible which is used for the preparation of various foods. The present paper deals with reviewing the nutritional, antinutritional and utilization of Taro into the various food products. © 2013, Association of Food Scientists & Technologists (India).

Sharma B.K.,Shobhit University | Agarwal R.P.,Shobhit University | Singh R.,HBTI
Advances in Intelligent and Soft Computing | Year: 2012

Software watermarking is the process of hiding information in a program or source code to protect the piracy of the software. Software piracy is a great threat for software industry because of every country losing millions of dollars every year. To protect the software piracy of the software's, variety of prevention techniques have been developed for copyright protection of software codes using both hardware and software. But, unfortunately no single technique is currently strong enough to protect the piracy of software codes. However, through a combination of techniques software developers are using for better protection of their software codes. In this paper, we have explained various static and dynamic techniques of software watermarking. In static watermarking techniques, the watermarks are stored in the source code, either in data section or code section where as in dynamic watermarking techniques the watermarks are generated during program execution. In this paper we have proposed a combination of static software watermarking techniques for structural programming by equation reordering and function dependency oriented sequencing (FDOS). In this method we embed the watermark in source code by a nested procedure wherein we firstly interchange the safe operands of mathematical equation and secondly impose an ordering on the mutual independent functions by introducing bogus dependency. © 2012 Springer India Pvt. Ltd.

Indurkar A.,Maharashtra Institute of Technology | Patil B.,Maharashtra Institute of Technology | Pathak V.K.,HBTI
Proceedings - IEEE International Conference on Information Processing, ICIP 2015 | Year: 2015

When dealing with the reliability of a network, it is important to maintain the network components physically connected. When all the components are connected but then also the end user is not getting the service, this means that there is performance degradation. Such performance failure of a network occurs due to the imbalance of QoS parameters such as delay, jitters, throughput, etc. It is important to detect such failure and find the counter measures for it. A service-level agreement (SLA) is an agreement between two or more parties, where one is the customer and the others are service providers. Every service provider provides certain service contract or SLA to the customer that defines all the aspects of the service in terms of scope, quality, and responsibilities. The deterioration of SLA can also lead to performance failure. In a network, all the services should offer QoS guaranties that are resilient to failure too. The QoS connection requires that the existing routing mechanism should compute a path that satisfies QoS constraints. If all nodes and links are working fine but the performance of a network degrades, then too it is a network failure. Such type of failure is called as performance failure. Performance failure can be caused due to congestion, insufficient bandwidth, large delay in packet transmission, etc. These factors must be taken into account while detecting the network failure. Our notion is to detect such performance failure and provide a path that satisfies the QoS constraints without hampering the service provided to the end user. © 2015 IEEE.

Kohli N.,HBTI
Proceedings of the 2014 IEEE International Conference on MOOCs, Innovation and Technology in Education, IEEE MITE 2014 | Year: 2014

Accreditation can be referred to as the procedure followed for official recognition or quality assurance. It provides the opportunity of promoting excellence in the field of education. It can be stated as the process in which the quality of an educational institution or a particular educational programme is evaluated so as to formally recognize it if it meets certain standards. As per the exponential growth in the number of engineering colleges in India, the process of accreditation is becoming a necessity in order to maintain the standard of education in the engineering institutes. © 2014 IEEE.

Loading HBTI collaborators
Loading HBTI collaborators