Institute of Technology and Management

Gurgaon, India

Institute of Technology and Management

Gurgaon, India
Time filter
Source Type

Sharma S.,Institute of Technology and Management | Kushwah R.S.,Institute of Technology and Management
Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2017 | Year: 2017

Wireless Sensor network (WSN) is one of the most attractive fields for researchers. This paper studies about optimization techniques such as Weighted Compressive Data Aggregation (WCDA), Cluster-based Weighted Compressive Data Aggregation (CWCDA) & Ant Colony Optimization (ACO). WCDA & CWCDA are analyzed and discussed. WCDA & CWCDA algorithm is used for reducing energy consumption in WSN model. The simulation results of WCDA & CWCDA algorithms are shown in this paper in terms of sum of energy, percentage of dead nodes and packets send to base station nodes. Issues of WCDA & CWCDA algorithms are discussed and a required solution is proposed. Final simulation results of WCDA & CWCDA shows consumption of energy is minimized as compared to other approaches. © 2017 IEEE.

Jain V.,Institute of Technology and Management | Kushwah R.S.,Institute of Technology and Management
Proceedings of the International Conference on Inventive Communication and Computational Technologies, ICICCT 2017 | Year: 2017

Named Data Networking is a new data centric kind of communication network. This paper shows the study about NDN network and applies this architecture over Vehicular ad-hoc networks so that performance of network improves and communication becomes faster. At the end of simulation results are discussed in the form of packet delivery ratio, throughput, good put, routing overhead and various network parameters. Finally problems are elaborated as security issues, redundancy issue problem are discussed, and a suitable solution is proposed with using trust function. Thus security of the network is increased and the redundancy issue is also resolved up to some extent. © 2017 IEEE.

Alkuhlani A.M.I.,SRTM University | Thorat S.B.,Institute of Technology and Management
Proceedings - International Conference on Global Trends in Signal Processing, Information Computing and Communication, ICGTSPICC 2016 | Year: 2017

The Internet of Things or 'IoT' described as a highly interconnected network of heterogeneous devices where all kinds of communications with any type of devices seem to be possible, preserving the location privacy of sensors always been a concern specifically in critical and strategic areas, Analyzing the traffic of the packets allow the eavesdropper to derive the location of sensitive, important nodes, and then the attacker can control or destroy these node, which can be a threat to the whole network. While investigating location privacy protocols we have noticed a tradeoff between location-privacy and energy consumption in which affecting the performance and lifetime of the network. In this paper, we proposed a secure strategy for preserving the privacy of the source node location with routing modification of energy-Awareness load balancing (ELB) protocol with random path selection in multipath routing fashion to provide path diversity with best energy consumption, each packet is forwarded randomly in a different direction. In addition, to get maximum privacy protection we initialize pre-defined tunnels of M intermediate hops for hiding the original path of the packet, Therefore, protecting source node location from backtracing by the attackers. © 2016 IEEE.

Verma R.K.,International Medical University | Tripathi P.,Institute of Technology and Management | Pandey A.K.,Institute of Technology and Management
International Journal of Pharmacy and Pharmaceutical Sciences | Year: 2014

Prediabetes is an intermediate stage between normal glycemia and clinical diabetes. Individual with prediabetes condition are more prone to diabetes and its associated cardiovascular disorder. Early intervention of prediabetes subjects reduces the development of diabetes and cardiovascular disease. Pioglitazone, a thiazolidinedione (TZD) insulin sensitizer, is known to reduce risk of atherosclerosis in prediabetic and diabetic subjects. Various preclinical and clinical studies have been shown the protective effect of Pioglitazone on atherosclerosis in prediabetic and type 2 diabetic patients. Neutralization of cardiovascular risk factor associated with insulin resistance was turn out to be more important than its effect on blood glucose in spite of its controversy of bladder cancer.

Upadhyay S.,Sarvottam Institute of Technology and Management | Chaurasia B.K.,Institute of Technology and Management
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST | Year: 2012

A mobile ad hoc network (MANET) consists of a collection of wireless mobile nodes that forms a temporary network without having any fixed infrastructure or centralized administration. MANET is infrastructure-less, lack of centralized monitoring and dynamic changing network topology. MANET is highly vulnerable to attack due to open error prone shared wireless medium. In this paper, we proposed an algorithm for avoiding and preventing the wormhole attacks in MANET using statistical analysis approach. Simulation and results show that efficacy of proposed algorithm and the proposed heuristics provides better security and performance than conventional AODV in the presence of wormhole attack. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2012.

Akashe S.,Institute of Technology and Management | Sharma S.,Thapar University
Journal of Computational and Theoretical Nanoscience | Year: 2013

This Paper aims to reduce the read time as well as to increase the SNM and stability of the SRAM cell during read operation. A different 7T cell with single bit line is proposed to increase the SNM and stability within the memory core. A 4 × 4 array is constructed using single ended 7T cell to show the feasibility of the proposed SRAM cell. A 16 Bit SRAM operating at 1 v supply voltage is demonstrated in 45 nm CMOS process. Its total power consumption is reduced by more than 90% of the conventional design. This 7T cell has lower leakage current due to single bit line and transmission gate at feedback. As a result it is suitable for low power consumption application especially battery operated gadgets. Copyright © 2013 American Scientific Publishers All rights reserved.

Khandelwal S.,Institute of Technology and Management | Akashe S.,Institute of Technology and Management | Sharma S.,Thapar University
Journal of Computational and Theoretical Nanoscience | Year: 2012

In low power design, it is difficult to suppress leakage current. In memory, leakage power reduction during data-retention in SRAM standby is often addressed by reducing the supply voltage. Each SRAM cell has a minimum supply voltage parameter called the data-retention voltage (DRV), above which the stored bit can be retained reliably. As supply voltage is lowered, leakage power reduces. This paper models the DRV of SRAM module, and analyzes the SRAM cell stability when VDD approaches DRV. DRV of the 4 KB SRAM module in a 0.13 mm technology ranges between 60 and 390 mv. Copyright © 2012 American Scientific Publishers.

Arora M.,JSS Academy of Technical Education | Biswas R.,Institute of Technology and Management
Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 | Year: 2010

In this paper, we have we have introduced a new intelligent soft-computing method of neutrosophic search with ranks and a new neutrosophic rank sets for neutrosophic relational data model (NRDM). Essentially the data and documents on the Web are heterogeneous; inconsistency is unavoidable in Web mining. Using the presentation and reasoning method of our data model, it is easier to capture imperfect information on the Web which will provide more potentially valued-added information. In Bio-informatics there is a proliferation of data sources. Each research group and each new experimental technique seems to generate yet another source of valuable data. But these data can be incomplete and imprecise, and even inconsistent. We could not simply throw away one data in favor of other data. So now we can represent and extract useful information from these data as a challenge. Thus it is a kind of an intelligent search for match in order to answer imprecise queries of the lay users. Our method, being an intelligent soft-computing method, will support the users to make and find the answers to their queries without iteratively refining them by trial and error. This important issue of closeness cannot be addressed with the crisp mathematics. That is why we have used the Neutrosophic tools. Neutrosophic-search method could be easily incorporated in the existing commercial query languages of DBMS to serve the lay users better. So in this Paper Authors are suggesting NRDM and Rank Sets to solve the imprecise query based on Rank Neutrosophic search which is a combination - Neutrosophic Proximity search and α-Neutrosophic-equality Search. © 2010 IEEE.

Khandelwal S.,Institute of Technology and Management | Akashe S.,Institute of Technology and Management
Journal of Computational and Theoretical Nanoscience | Year: 2013

Low power design is the industry buzzword these days in present chip design technologies. CMOS technology continues to drive the reduction in switching delay and power while improving area density. However, the transistor miniaturization also introduces many new challenges in Very Large Integrated (VLSI) circuit design, such as sensitivity to process variations and increasing transistor leakage. This paper focus is to reduce leakage power consumption of an 8 kbit SRAM by employing techniques like power gating. The main technique used in power gating is the use of sleep transistor. In our design we have chosen a stack-based implementation. In this paper, leakage power is measured by simulating a 1 Kb SRAM array. Leakage power is measured when each SRAM cell holds a logical '1' or '0'. Simulations were done in CADENCE using 45 nm Technology. Leakage power of 10T SRAM cell (Sleepy) = 155.4 nW. Leakage power of 6T SRAM cell (Sleepy) = 375.3 nW. Copyright © 2013 American Scientific Publishers.

More G.,Institute of Technology and Management
Communications in Computer and Information Science | Year: 2011

This paper presents the universal algorithm for the generation of cyclic code for an n bit binary word. As well as it also provides the algorithm for decrypting the code generated. It is important for the built in self test (BIST) and for memory ROM testing. They are extensively used for encoding and decoding communication channel burst errors. © 2011 Springer-Verlag.

Loading Institute of Technology and Management collaborators
Loading Institute of Technology and Management collaborators