Indian Institute of Information Technology and Management Gwalior

www.iiitm.ac.in
Gwalior, India

Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior , commonly known as the Indian Institute of Information Technology and Management, Gwalior or ABV-IIITM is a university located in Gwalior, Madhya Pradesh, India, and one of India's Institutes of Information Technology. Established in 1997 and named for Atal Bihari Vajpayee, the institute obtained the status of Deemed University in 2001 and was recognized as an Institute of National Importance. The university campus is spread over 160 acres in the foothills of the Gwalior Fort. Wikipedia.


Time filter

Source Type

Vidyadharan D.S.,College of Engineering, Trivandrum | Thampi S.M.,Indian Institute of Information Technology and Management Gwalior
Journal of Intelligent and Fuzzy Systems | Year: 2017

Detecting forged digital image has been an active research area in recent times. Tampering introduces artifacts within images that differentiate tampered images from authentic images. Forgery detection techniques try to identify these artifacts by analyzing differences in the texture properties of the image. In this paper, we propose a multi-texture description based method to detect tampering. Different texture descriptors considered are Local Binary Pattern, Local Phase Quantization, Binary Statistical Image Features and Binary Gabor Pattern. The method captures subtle texture variations at different scales and orientation using Steerable Pyramid Transform (SPT) decomposition of image. The different texture descriptors extracted from each subband image after SPT decomposition is combined to form the multi-texture representation. Then, ReliefF feature selection method is applied on this high dimensional multi-texture representation to generate a compact representation. This compact multi-texture representation is classified using Random Forest classifier. We have evaluated the performance of individual texture descriptors and multiple textures in detecting image forgery. Experimental results show that the compact multi-texture description has improved detection accuracy. © 2017-IOS Press and the authors. All rights reserved.


Soumya T.,College of Engineering, Trivandrum | Thampi S.M.,Indian Institute of Information Technology and Management Gwalior
Journal of Intelligent and Fuzzy Systems | Year: 2017

The night video fusion algorithms integrate the visuals captured by a security surveillance camera, which in turn improve the visual perception. The recent development in night fusion research focused on fusing both illuminated and non-illuminated areas simultaneously however, the natural color of the light area may be lost. Moreover, the contrast of the illuminated regions decreases because of the dark pixels surrounding those regions. Hence, the color and contrast should be improved to obtain the actual color of the illuminated regions. We propose a fuzzy inference system based wavelet fusion to enhance the light regions of a nonuniform illuminated night video surveillance system. To include spatial and temporal variations of the illuminated regions, a spatio-temporal illumination approach is used. A contribution index of the illuminated regions is generated using a fuzzy membership function. Subsequently, the stationary wavelets are used to decompose high-frequency and low-frequency coefficients of both night and day background frames for frame fusion. The contribution index selects the illuminated regions presented in these wavelet coefficients for fusion. Finally, the inverse wavelet transform is applied to reconstruct the illumination enhanced frame. The proposed approach effectively highlights the illuminated regions and provides a better visual perception. © 2017-IOS Press and the authors. All rights reserved.


Das A.,University of Calcutta | Bhattacharya M.,Indian Institute of Information Technology and Management Gwalior
Neural Computing and Applications | Year: 2011

We present a non-linear 2-D/2-D affine registration technique for MR and CT modality images of section of human brain. Automatic registration is achieved by maximization of a similarity metric, which is the correlation function of two images. The proposed method has been implemented by choosing a realistic, practical transformation and optimization techniques. Correlation-based similarity metric should be maximal when two images are perfectly aligned. Since similarity metric is a non-convex function and contains many local optima, choice of search strategy for optimization is important in registration problem. Many optimization schemes are existing, most of which are local and require a starting point. In present study we have implemented genetic algorithm and particle swarm optimization technique to overcome this problem. A comparative study shows the superiority and robustness of swarm methodology over genetic approach. © 2010 Springer-Verlag London Limited.


Smitha K.K.,College of Engineering, Trivandrum | Chitharanjan K.,Indian Institute of Information Technology and Management Gwalior | Thomas T.,College of Engineering, Trivandrum
Procedia Engineering | Year: 2012

The overwhelming success and the rapid growth of the Internet changes our lives; the way we interact, learn and work. Now a days most of the organizations including government deliver their services through internet. E- governance is the application of information and communication technologies to exchange information between government and the citizens, government and business organizations and between government organizations. Cloud computing is a new way of accepting and providing services over internet. Cloud based e-governance system provides many benefits to Government like reduced cost, distributed storage of data, availability of resources at lower cost,manages security, scalability, accountability and modifiability. This paper gives a survey on clod based E-Governance system. © 2012 Published by Elsevier Ltd.


Pandey B.,Indian Institute of Information Technology and Management Gwalior | Kumar R.,University of Hyderabad
2013 IEEE Conference on Information and Communication Technologies, ICT 2013 | Year: 2013

In this paper, we study the effect of using digitally controlled impedance IO Standard in memory interface design in terms of power consumption. In this work, we achieved 50% dynamic power reduction at 1.5V output driver voltage, 35.2% dynamic power reduction at 1.8V output driver voltage in comparison to 2.5V output driver voltage in DCI based IO standard implementation on input or output port in target design. Target device XC6VLX75TFF484-1 is a Virtex-6 FPGA of -1 speed grade and 484 pins is used for implementation of this design. Target Design is RAM-UART memory interface. XPower 13.4 is used for power analysis of our low power memory interface design. ISim is simulator to generate waveform. Planahead is used for design, synthesis and implementation. © 2013 IEEE.


Bharti K.K.,Indian Institute of Information Technology and Management Gwalior | Singh P.K.,Indian Institute of Information Technology and Management Gwalior
Expert Systems with Applications | Year: 2015

High dimensionality of the feature space is one of the major concerns owing to computational complexity and accuracy consideration in the text clustering. Therefore, various dimension reduction methods have been introduced in the literature to select an informative subset (or sublist) of features. As each dimension reduction method uses a different strategy (aspect) to select a subset of features, it results in different feature sublists for the same dataset. Hence, a hybrid approach, which encompasses different aspects of feature relevance altogether for feature subset selection, receives considerable attention. Traditionally, union or intersection is used to merge feature sublists selected with different methods. The union approach selects all features and the intersection approach selects only common features from considered features sublists, which leads to increase the total number of features and loses some important features, respectively. Therefore, to take the advantage of one method and lessen the drawbacks of other, a novel integration approach namely modified union is proposed. This approach applies union on selected top ranked features and applies intersection on remaining features sublists. Hence, it ensures selection of top ranked as well as common features without increasing dimensions in the feature space much. In this study, feature selection methods term variance (TV) and document frequency (DF) are used for features' relevance score computation. Next, a feature extraction method principal component analysis (PCA) is applied to further reduce dimensions in the feature space without losing much information. The effectiveness of the proposed method is tested on three benchmark datasets namely Reuters-21,578, Classic4, and WebKB. The obtained results are compared with TV, DF, and variants of the proposed hybrid dimension reduction method. The experimental studies clearly demonstrate that our proposed method improves clustering accuracy compared to the competitive methods. © 2014 Elsevier Ltd. All rights reserved.


Srivastava A.,Indian Institute of Information Technology and Management Gwalior | Tyagi N.,Indian Institute of Information Technology and Management Gwalior | Singh R.K.,ITM University
Materials Chemistry and Physics | Year: 2011

Ab-initio self-consistent study has been performed to analyze the stability of lead nanowires in its six stable configurations like linear, zigzag, triangular, ladder, square and dumbbell. In the present study, the lowest energy structures have been analyzed under the revised Perdew-Burke-Ernzerhof (revPBE) parameterization of generalized gradient approximation (GGA) potential. The two-atom zigzag shaped atomic configuration with highest binding energy and lowest total energy has been confirmed as the most stable structure out of the six atomic configurations. The electronic band structure and density of states have been discussed in detail with a remarkable observation in case of three-atom triangular lead nanowire having a very small band gap while other configurations are found to be metallic. Bulk modulus, pressure derivatives and lattice parameters for different lead nanowires have also been computed and discussed. © 2011 Elsevier B.V. All rights reserved.


Srivastava A.,Indian Institute of Information Technology and Management Gwalior | Chandiramouli R.,SASTRA University
Superlattices and Microstructures | Year: 2015

The band structure and electronic transport properties of InSe nanosheet with substitution impurity are studied using density functional theory. The nanostructures of InSe nanosheet exhibit metallic nature. The effect of substitution due to sulfur, tellurium and gallium influences the band structure. The density of states spectrum envisions the density of charges across the InSe nanosheet. The peak amplitudes are observed near the Fermi level and along the valence band in InSe nanosheet. The electron density provides the visualization of density of electrons across InSe nanosheet. The electron density is found to be more on selenium sites than on indium sites. The electronic transport property of InSe nanosheet molecular device is discussed in terms of transmission spectrum, an increase in transmission is observed on moving toward Fermi level along the valence band. The transmission pathways provide the visualization of transmission of electrons along InSe nanosheet. The results of the present work provide insight to tune the band structure of InSe nanosheet with substitution impurity and enhance the electronic transport property of InSe nanosheet. © 2014 Elsevier Ltd. All rights reserved.


Kumar N.,Ajou University | Borm J.-H.,Ajou University | Kumar A.,Indian Institute of Information Technology and Management Gwalior
Computers and Operations Research | Year: 2012

In this paper, the reliability analysis of waste clean-up manipulator has been performed using Real Coded Genetic Algorithms and Fuzzy Lambda Tau Methodology. The optimal values of mean time between failures and mean time to repair are obtained using genetic algorithms. Petri Net tool is applied to represent the interactions among the working components of the system. To enhance the relevance of the reliability study, triangular fuzzy numbers are developed from the computed data, using possibility theory. The use of fuzzy arithmetic in the Petri Net model increases the flexibility for application to various systems and conditions. Various reliability parameters (failure rate, repair time, mean time between failures, expected no. of failures, reliability and availability) are computed using Fuzzy Lambda Tau Methodology. Sensitivity analysis has also been performed and the effects on system mean time between failures are addressed. The adopted methodology improves the shortcomings/drawbacks of the existing probabilistic approaches and gives a better understanding of the system behavior through its graphical representation. © 2011 Elsevier Ltd.


Singh P.K.,Indian Institute of Information Technology and Management Gwalior | Sharma G.,Indian Institute of Information Technology and Management Gwalior
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 | Year: 2012

Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes. © 2012 IEEE.

Loading Indian Institute of Information Technology and Management Gwalior collaborators
Loading Indian Institute of Information Technology and Management Gwalior collaborators