HCTM Technical Campus

Kaithal, India

HCTM Technical Campus

Kaithal, India
Time filter
Source Type

Garg A.,HCTM Technical Campus | Kumar S.,HCTM Technical Campus | Dutta K.,National Institute of Technology Hamirpur
2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016 | Year: 2017

A JellyFish (JF) attack is particularly harmful against TCP-based mobile ad hoc networks (MANETs) where a malicious node exploits the behaviour of closed loop protocols such as TCP in order to delay, periodically drop or reorder the packets. This attack is carried out on the network layer, but it affects the performance of the transport layer protocol and causes severe degradation in end-To-end throughput in the network. The JellyFish attack is classified as a JF-Reorder attack, JF-Delay Variance attack and JF-Periodic Drop attack. JellyFish attack conforms to all existing routing and forwarding protocol specifications, and therefore it becomes very difficult to detect. In this paper, the main focus is to study and analyse the different techniques and systems proposed by the researchers in the literature in order to countermeasure the different variants of JellyFish attacks for MANETs. © 2016 IEEE.

Kumar S.,HCTM Technical Campus | Dutta K.,National Institute of Technology Hamirpur | Sharma G.,HCTM Technical Campus
2016 4th International Conference on Parallel, Distributed and Grid Computing, PDGC 2016 | Year: 2017

Due to the limited transmission capability of mobile nodes in mobile ad hoc networks (MANETs), the intermediate nodes are used in multi-hop fashion for forwarding the packets for other nodes. However, the multi-hop communication causes a serious problem that a node may act as selfish by refraining from forwarding the packets for other nodes in order to save its energy and computing resources. A selfish node attempts to utilize the network resources for its own benefits, but reluctant to spend its resources for others. Therefore, it is really important to scrutinize and isolate the selfish nodes from the network in order to trim down the risks from such nodes, and improve the security of the network. This paper presents a comparative study of most prominent selfish node detection and mitigation techniques proposed by the researchers in the literature. © 2016 IEEE.

Kumar R.,HCTM Technical Campus | Rani A.,Kurukshetra University | Singh R.M.,Chaudhary Devi Lal University | Tiwari M.K.,Raja Ramanna Center for Advanced Technology | Singh A.K.,Raja Ramanna Center for Advanced Technology
Radiation Physics and Chemistry | Year: 2017

Ll, Lα, Lβ and Lγ1 X-ray fluorescence cross-sections for 74W have been measured at excitation energies of 12, 14, 15 and 16.5 keV using synchrotron radiations. A Peltier cooled Vortex solid state detector (SII Nano Technology, USA) with an energy resolution of 138 eV at 5.96 keV X-rays was employed for analysis. The experimental results were compared with the theoretical estimates of Krause (1979), Campbell (2003) and Puri et al. (1993) and also compared with existing experimental results (Barrea and Bonzi, 2001b) of L XRF cross sections at the excitation energy of 12 and 14 keV. Present results were found to be closer to the Puri's data in comparison to existing experimental results. For the first time, to our knowledge, L XRF cross section for 74W at energies 15 and 16.5 keV are also being reported here. © 2016 Elsevier Ltd

Jangra S.,GTB College | Goel S.,HCTM Technical Campus | Selwal A.,Jammu University
Proceedings of 2015 3rd International Conference on Image Information Processing, ICIIP 2015 | Year: 2015

The most important factor in quality measurement of any technique or system is the efficiency. The hyper spectral images are the complex ones those are taken from the low resolution cameras. These images are often degraded in the acquisition process due to the integrated so many different noises in it. These can include various types of noises as impulse noise, Gaussian noise, deadlines and stripes etc. This paper defines new hybrid image restoration method based on Linear Discriminative Analysis (LDA) and Low Rank Matrix Recovery (LRMR). The proposed approach works in two phase, first it converting an image into number of patches and treating each patch as a separate image, performance can be measured out and that patches induced in LRMR framework In second phase, for further improvement in image quality LDA approach is used. © 2015 IEEE.

Surender J.,HCTM Technical Campus | Arvind S.,ACE Mithapur Ambala | Anil K.,HCTM Technical Campus | Yashwant S.,HCTM Technical Campus
Lecture Notes in Electrical Engineering | Year: 2013

Two checkpointing approaches i.e., coordinated checkpointing and times based checkpointing are widely used in the literature of MDSs. Coordinated checkpointing protocols uses the less checkpoints and domino free but have large coordinated message overheads as processes synchronize by exchanging coordinated message. Time based approach has minimum coordinated messages overheads cost but has high checkpointing cost as it requires large number checkpoints than minimum. Hence coordinated checkpointing approach have minimum checkpointing cost than time based approach but higher coordinated message overheads cost which increases the checkpointing overheads. In this paper, we design an efficient time coordinated checkpointing algorithm which uses time to indirectly coordinate to minimize the number of coordinated message transmitted through the wireless link and reduces the number of checkpoints nearest to the minimum. The algorithm is non-blocking and minimum process. © 2013 Springer Science+Business Media.

Kumar R.,University of Rajasthan | Surender,HCTM Technical Campus
Souvenir of the 2015 IEEE International Advance Computing Conference, IACC 2015 | Year: 2015

Fault tolerant Resource consumption in Desktop grid is a motivational area in research. The present research paper focuses on the dimensions of Fault Tolerant resource usage especially in area of available computational power. Desktop grid resources are accountable for generation of computational power. Alchemi Desktop middleware is useful for collection of computational power on diverse machines in Microsoft window based environment. Failure and Fault in execution side can create serious problem, in addition to a direct impact on computational power in Real Time Environment. In the Environment of faults, control on the available computational power is very necessary in grid middleware. This problem has not been addressed so far. Alchemi Desktop Grid Middle ware provide manual Procedure for control of computational power in Real Time Environment. There is no automated mechanism available for controlling the processing power in alchemi desktop grid. This Research work has proposed, designed & developed automated framework for Alchemi Grid middleware. Framework can take control on available computational power in Real Time Environment at Time of Fault in execution processes. Testing for the framework is done in Real Time environment. Results after test show that framework gives quick response for controlling available computational power. Framework is able to detect defective process machine and correct fault in milliseconds which will cooperative to maintain level of available computational power In Real time Environment. This Research work has tried to eliminate Manual Procedure for controlling computational power by using automated Method for quick action in case of execution side faults. © 2015 IEEE.

Manjeet M.,HCTM Technical Campus | Sathans S.,National Institute of Technology Kurukshetra
Proceedings - 2013 International Conference on Communication Systems and Network Technologies, CSNT 2013 | Year: 2013

This paper presents the design and implementation of fuzzy based controller for the general form of two-link planar robotic manipulator. Also for comparative analysis, the conventional controllers; proportional-derivative (PD), proportional-integral-derivative (PID) and computed torque control are implemented on the same system under same conditions. The comparative analysis of the results demonstrates that the fuzzy logic controller is best among all the controllers and the simulation results confirm that the system can track the desired trajectory. Computer simulation results on a two-link planar robotic manipulator are presented to show tracking capability and effectiveness of the proposed control schemes. The simulations have been carried out using Matlab. © 2013 IEEE.

Kumar A.,HCTM Technical Campus | Kaushik S.K.,HCTM Technical Campus | Sharma R.,HCTM Technical Campus | Raj P.,HCTM Technical Campus
Proceedings: Turing 100 - International Conference on Computing Sciences, ICCS 2012 | Year: 2012

Network simulation is the most predominant evaluation techniques in the area of computer Networks. The simulation models in a reliable and simple way can be developed by researchers using different simulators for evaluating the behavior and performance of protocols for different networks, simulations are a good example between cost and complexity by maintaining the accuracy of the results. This paper gives briefly survey on a performance comparison study of the different network simulators for wireless network. There are many simulators for wireless network, but among them five are the popular simulators these are: Qualnet/GlomoSim, OM-Net++, Ns-2, OPNET modeler and JSim with a real-world test bed. The information about each of the simulator abilities, their internal structure, development environment and their support for wireless network simulation has detailed discussed in this paper. This paper helps to identify one is best option among shown simulator for their best need. Finally, the paper contains survey, comparatively study and conclusion about making the suitable choice of network simulator supporting wireless network based on the numbers of surveys and papers. © 2012 IEEE.

The new heterobimetallic [Mg(II)-Ti(IV)]-μ-oxoisopropoxide was synthesized on treatment of magnesium acetate with titanium(IV) isopropoxide in refluxing decalin in 1:2 molar ratio and characterized by liberated isopropanol, elemental, spectral (IR, 1H and 13C NMR, and mass), thermal analysis, and molecular weight data. The reactions of [Mg(II)-Ti(IV)]-μ-oxoisopropoxide compound with β-diketones in different molar ratios (1:1-1:4) yielded mono to tetra derivatives [{MgO 2Ti2(OPr)6-nLn}] (where n is 1-4 and L = acetylacetonate/benzoylacetonate anion)] of the μ-oxo complex and were characterized by elemental, liberated isopropanol, and spectral analysis (IR and 1H and 13C NMR). These studies revealed interesting facets in support of plausible structures of the parent compound and its β-diketonates. © TÜBITAK.

Kumar R.,HCTM Technical Campus
Bulletin of the Chemical Society of Ethiopia | Year: 2013

New salicylate derivatives of heteronucleic-μ-oxoisopropoxide [SnO 2AlB(OPri)2] have been synthesized by the thermal condensation of μ-oxoisopropoxide and methyl/ethyl/phenyl/phenyl ethyl salicylates in different molar ratios (1:1-1:2) yielding the compounds of the type [SnO2AlB(OPri)2-n(RSAL)n] (where n is 1-2 and RSAL = salicylate anion), respectively. The complexes have been characterized by elemental, spectral (IR, 1H, 13C, 27Al, 119Sn and 11B NMR), thermal and molecular weight measurement. The complexes are hydrolysed by hydrothermally assisted sol-gel technique and gave hydrolyzed product. Thermal studies of these products are made which favor the formation of multicomponent oxides. The studies reveal that salicylate derivatives are polymeric in nature and low susceptible to hydrolysis as compared to parent compound and may prove excellent precursors for the mixed metal oxides. © 2013 Chemical Society of Ethiopia.

Loading HCTM Technical Campus collaborators
Loading HCTM Technical Campus collaborators