Gwalior, India

Atal Bihari Vajpayee Indian Institute of Information Technology and Management, Gwalior , commonly known as the Indian Institute of Information Technology and Management, Gwalior or ABV-IIITM is a university located in Gwalior, Madhya Pradesh, India, and one of India's Institutes of Information Technology. Established in 1997 and named for Atal Bihari Vajpayee, the institute obtained the status of Deemed University in 2001 and was recognized as an Institute of National Importance. The university campus is spread over 160 acres in the foothills of the Gwalior Fort. Wikipedia.


Time filter

Source Type

Das A.,University of Calcutta | Bhattacharya M.,Indian Institute of Information Technology and Management Gwalior
Neural Computing and Applications | Year: 2011

We present a non-linear 2-D/2-D affine registration technique for MR and CT modality images of section of human brain. Automatic registration is achieved by maximization of a similarity metric, which is the correlation function of two images. The proposed method has been implemented by choosing a realistic, practical transformation and optimization techniques. Correlation-based similarity metric should be maximal when two images are perfectly aligned. Since similarity metric is a non-convex function and contains many local optima, choice of search strategy for optimization is important in registration problem. Many optimization schemes are existing, most of which are local and require a starting point. In present study we have implemented genetic algorithm and particle swarm optimization technique to overcome this problem. A comparative study shows the superiority and robustness of swarm methodology over genetic approach. © 2010 Springer-Verlag London Limited.


Kala R.,Indian Institute of Information Technology and Management Gwalior | Shukla A.,Indian Institute of Information Technology and Management Gwalior | Tiwari R.,Indian Institute of Information Technology and Management Gwalior
Neurocomputing | Year: 2011

Path Planning is a classical problem in the field of robotics. The problem is to find a path of the robot given the various obstacles. The problem has attracted the attention of numerous researchers due to the associated complexities, uncertainties and real time nature. In this paper we propose a new algorithm for solving the problem of path planning in a static environment. The algorithm makes use of an algorithm developed earlier by the authors called Multi-Neuron Heuristic Search (MNHS). This algorithm is a modified A* algorithm that performs better than normal A* when heuristics are prone to sharp changes. This algorithm has been implemented in a hierarchical manner, where each generation of the algorithm gives a more detailed path that has a higher reaching probability. The map used for this purpose is based on a probabilistic approach where we measure the probability of collision with obstacle while traveling inside the cell. As we decompose the cells, the cell size reduces and the probability starts to touch 0 or 1 depending upon the presence or absence of obstacles in the cell. In this approach, it is not compulsory to run the entire algorithm. We may rather break after a certain degree of certainty has been achieved. We tested the algorithm in numerous situations with varying degrees of complexities. The algorithm was able to give an optimal path in all the situations given. The standard A* algorithm failed to give results within time in most of the situations presented. © 2011 Elsevier B.V.


Smitha K.K.,College of Engineering, Trivandrum | Chitharanjan K.,Indian Institute of Information Technology and Management Gwalior | Thomas T.,College of Engineering, Trivandrum
Procedia Engineering | Year: 2012

The overwhelming success and the rapid growth of the Internet changes our lives; the way we interact, learn and work. Now a days most of the organizations including government deliver their services through internet. E- governance is the application of information and communication technologies to exchange information between government and the citizens, government and business organizations and between government organizations. Cloud computing is a new way of accepting and providing services over internet. Cloud based e-governance system provides many benefits to Government like reduced cost, distributed storage of data, availability of resources at lower cost,manages security, scalability, accountability and modifiability. This paper gives a survey on clod based E-Governance system. © 2012 Published by Elsevier Ltd.


Pandey B.,Indian Institute of Information Technology and Management Gwalior | Kumar R.,University of Hyderabad
2013 IEEE Conference on Information and Communication Technologies, ICT 2013 | Year: 2013

In this paper, we study the effect of using digitally controlled impedance IO Standard in memory interface design in terms of power consumption. In this work, we achieved 50% dynamic power reduction at 1.5V output driver voltage, 35.2% dynamic power reduction at 1.8V output driver voltage in comparison to 2.5V output driver voltage in DCI based IO standard implementation on input or output port in target design. Target device XC6VLX75TFF484-1 is a Virtex-6 FPGA of -1 speed grade and 484 pins is used for implementation of this design. Target Design is RAM-UART memory interface. XPower 13.4 is used for power analysis of our low power memory interface design. ISim is simulator to generate waveform. Planahead is used for design, synthesis and implementation. © 2013 IEEE.


Bharti K.K.,Indian Institute of Information Technology and Management Gwalior | Singh P.K.,Indian Institute of Information Technology and Management Gwalior
Expert Systems with Applications | Year: 2015

High dimensionality of the feature space is one of the major concerns owing to computational complexity and accuracy consideration in the text clustering. Therefore, various dimension reduction methods have been introduced in the literature to select an informative subset (or sublist) of features. As each dimension reduction method uses a different strategy (aspect) to select a subset of features, it results in different feature sublists for the same dataset. Hence, a hybrid approach, which encompasses different aspects of feature relevance altogether for feature subset selection, receives considerable attention. Traditionally, union or intersection is used to merge feature sublists selected with different methods. The union approach selects all features and the intersection approach selects only common features from considered features sublists, which leads to increase the total number of features and loses some important features, respectively. Therefore, to take the advantage of one method and lessen the drawbacks of other, a novel integration approach namely modified union is proposed. This approach applies union on selected top ranked features and applies intersection on remaining features sublists. Hence, it ensures selection of top ranked as well as common features without increasing dimensions in the feature space much. In this study, feature selection methods term variance (TV) and document frequency (DF) are used for features' relevance score computation. Next, a feature extraction method principal component analysis (PCA) is applied to further reduce dimensions in the feature space without losing much information. The effectiveness of the proposed method is tested on three benchmark datasets namely Reuters-21,578, Classic4, and WebKB. The obtained results are compared with TV, DF, and variants of the proposed hybrid dimension reduction method. The experimental studies clearly demonstrate that our proposed method improves clustering accuracy compared to the competitive methods. © 2014 Elsevier Ltd. All rights reserved.


Srivastava A.,Indian Institute of Information Technology and Management Gwalior | Tyagi N.,Indian Institute of Information Technology and Management Gwalior | Singh R.K.,ITM University
Materials Chemistry and Physics | Year: 2011

Ab-initio self-consistent study has been performed to analyze the stability of lead nanowires in its six stable configurations like linear, zigzag, triangular, ladder, square and dumbbell. In the present study, the lowest energy structures have been analyzed under the revised Perdew-Burke-Ernzerhof (revPBE) parameterization of generalized gradient approximation (GGA) potential. The two-atom zigzag shaped atomic configuration with highest binding energy and lowest total energy has been confirmed as the most stable structure out of the six atomic configurations. The electronic band structure and density of states have been discussed in detail with a remarkable observation in case of three-atom triangular lead nanowire having a very small band gap while other configurations are found to be metallic. Bulk modulus, pressure derivatives and lattice parameters for different lead nanowires have also been computed and discussed. © 2011 Elsevier B.V. All rights reserved.


Srivastava A.,Indian Institute of Information Technology and Management Gwalior | Chandiramouli R.,SASTRA University
Superlattices and Microstructures | Year: 2015

The band structure and electronic transport properties of InSe nanosheet with substitution impurity are studied using density functional theory. The nanostructures of InSe nanosheet exhibit metallic nature. The effect of substitution due to sulfur, tellurium and gallium influences the band structure. The density of states spectrum envisions the density of charges across the InSe nanosheet. The peak amplitudes are observed near the Fermi level and along the valence band in InSe nanosheet. The electron density provides the visualization of density of electrons across InSe nanosheet. The electron density is found to be more on selenium sites than on indium sites. The electronic transport property of InSe nanosheet molecular device is discussed in terms of transmission spectrum, an increase in transmission is observed on moving toward Fermi level along the valence band. The transmission pathways provide the visualization of transmission of electrons along InSe nanosheet. The results of the present work provide insight to tune the band structure of InSe nanosheet with substitution impurity and enhance the electronic transport property of InSe nanosheet. © 2014 Elsevier Ltd. All rights reserved.


Kumar N.,Ajou University | Borm J.-H.,Ajou University | Kumar A.,Indian Institute of Information Technology and Management Gwalior
Computers and Operations Research | Year: 2012

In this paper, the reliability analysis of waste clean-up manipulator has been performed using Real Coded Genetic Algorithms and Fuzzy Lambda Tau Methodology. The optimal values of mean time between failures and mean time to repair are obtained using genetic algorithms. Petri Net tool is applied to represent the interactions among the working components of the system. To enhance the relevance of the reliability study, triangular fuzzy numbers are developed from the computed data, using possibility theory. The use of fuzzy arithmetic in the Petri Net model increases the flexibility for application to various systems and conditions. Various reliability parameters (failure rate, repair time, mean time between failures, expected no. of failures, reliability and availability) are computed using Fuzzy Lambda Tau Methodology. Sensitivity analysis has also been performed and the effects on system mean time between failures are addressed. The adopted methodology improves the shortcomings/drawbacks of the existing probabilistic approaches and gives a better understanding of the system behavior through its graphical representation. © 2011 Elsevier Ltd.


James A.P.,Indian Institute of Information Technology and Management Gwalior | Francis L.R.V.J.,Indian Institute of Information Technology and Management Gwalior | Kumar D.S.,Indian Institute of Information Technology and Management Gwalior
IEEE Transactions on Very Large Scale Integration (VLSI) Systems | Year: 2014

We report a resistance-based threshold logic family useful for mimicking brain-like large variable logic functions in VLSI. A universal boolean logic cell based on an analog resistive divider and threshold logic circuit is presented. The resistive divider is implemented using memristors, and provides output voltage as a summation of weighted product of input voltages. The output of the resistive divider is converted into a binary value by a threshold operation implemented by CMOS inverter and/or Opamp. A universal cell structure is presented to decrease the overall implementation complexity and number of components. When the number of input variables becomes very high, the proposed cell offers advantages of smaller area and design simplicity in comparison with CMOS-based logic circuits. © 1993-2012 IEEE.


Singh P.K.,Indian Institute of Information Technology and Management Gwalior | Sharma G.,Indian Institute of Information Technology and Management Gwalior
Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012 | Year: 2012

Interest in the area of Mobile Ad-hoc Network (MANET) is growing since last few years because of its practical applications and requirement of communication in mobile devices. However, in comparison to wired network or infrastructure-based wireless network, MANET is particularly vulnerable to security attacks due to its fundamental characteristics, e.g., the open medium, dynamic network topology, autonomous terminal, lack of centralized monitoring and management. The black hole attack is one of such security risks. In this attack, a malicious node falsely advertise shortest path to the destination node with an intension to disrupt the communication. In this paper, we propose a solution to the black hole attack in one of the most prominent routing algorithm, ad-hoc on demand distance vector (AODV) routing, for the MANETs. The proposed method uses promiscuous mode to detect malicious node (black hole) and propagates the information of malicious node to all the other nodes in the network. The simulation results show the efficacy of the proposed method as throughput of the network does not deteriorate in presence of the back holes. © 2012 IEEE.

Loading Indian Institute of Information Technology and Management Gwalior collaborators
Loading Indian Institute of Information Technology and Management Gwalior collaborators