Entity

Time filter

Source Type

Meerut, India

Aggarwal A.,JPIET
Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014 | Year: 2014

In recent year's availability of economical image capturing devices in low cost products like mobile phones has led a significant attention of researchers to the problem of recognizing text in images. Recognition of scene text is a challenging problem compared to the recognition of printed documents. In this work a novel approach is proposed to recognize text in complex background natural scene, word formation from recognized text, spelling checking and word translation into user defined language and finally overlay translated word onto the image. The proposed approach is robust to different kinds of text appearances, including font size, font style, color, and background. Combining the respective strengths of different complementary techniques and overcoming their shortcomings, the proposed method uses efficient character detection and localization technique and multiclass classifier to recognize the text accurately. The proposed approach successfully recognizes text on natural scene images and does not depend on a particular alphabet, text background. It works with a wide variety in size of characters and can handle up to 20 degree skewness efficiently. © 2014 IEEE. Source


Basavala S.R.,University | Agarrwal A.,JPIET
Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012 | Year: 2012

In the recent day's web applications usage is increasing by banking, financial institutes and health or hospital management systems such as online or net banking and mobile banking, e-commerce applications, news feeds, inpatient and outpatient information etc. All these online applications require support for security properties like authentication, authorization, data confidentiality, and sensitive information leakage. The most widely accepted common method of authentication for an online application is to use a combination of alphanumeric with special characters usernames and passwords. Net or online applications should support a strong password (such as a combination of Alphanumeric with special characters). In the past recent studies reveal that the end users today have on an average approximately 10 to 15 passwords to protect their online accounts to do their actual transactions. In general, a common web (internet) user having one password may be easy to remember, but controlling many passwords for different web or internet applications is time-consuming task and a security threat. Usually passwords are not secured at all as they can be guessable or somebody (a malicious user) can be stolen. To overcome this, passwords need to be stronger authentication solutions. © 2012 IEEE. Source


Tyagi S.,JPIET | Kumar N.,Thapar University
Journal of Network and Computer Applications | Year: 2013

In recent years, Wireless Sensor Networks (WSNs) have emerged as a new powerful technology used in many applications such as military operations, surveillance system, Intelligent Transport Systems (ITS) etc. These networks consist of many Sensor Nodes (SNs), which are not only used for monitoring but also capturing the required data from the environment. Most of the research proposals on WSNs have been developed keeping in view of minimization of energy during the process of extracting the essential data from the environment where SNs are deployed. The primary reason for this is the fact that the SNs are operated on battery which discharges quickly after each operation. It has been found in literature that clustering is the most common technique used for energy aware routing in WSNs. The most popular protocol for clustering in WSNs is Low Energy Adaptive Clustering Hierarchy (LEACH) which is based on adaptive clustering technique. This paper provides the taxonomy of various clustering and routing techniques in WSNs based upon metrics such as power management, energy management, network lifetime, optimal cluster head selection, multihop data transmission etc. A comprehensive discussion is provided in the text highlighting the relative advantages and disadvantages of many of the prominent proposals in this category which helps the designers to select a particular proposal based upon its merits over the others. © 2012 Elsevier Ltd. Source


Goyal M.K.,Sharda University | Aggarwal A.,JPIET | Gupta P.,ABES | Kumar P.,University
Proceedings of 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing, PDGC 2012 | Year: 2012

Trust Models are used to enhance secure and reliable scheduling in Distributed, Grid and Cloud environment. Trust models that are being proposed or implemented in Distributed and Grid environment, does not fully fit in cloud computing environment. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, a scheduling is done for better allocation of resources and further enhance the QOS of services been provided to the users. In this paper, an approach for managing trust in Cloud IaaS is proposed. © 2012 IEEE. Source


Kumar N.,Thapar University | Tyagi S.,JPIET | Deng D.-J.,National Changhua University of Education
Journal of Network and Computer Applications | Year: 2014

Wireless sensor networks (WSNs) consist of many sensor nodes (SNs) which may be deployed at different geographical locations to perform multiple tasks such as monitoring, data aggregation, and data processing. During all these operations, energy of the SNs continuously depleted which results in the creation of energy holes in some regions. As SNs are battery operated and it is difficult to replace the battery of the SNs each time, so energy conservation is a paramount concern to increase the lifetime of the WSNs. It has been proved in the literature that clustering of SNs can be used for energy saving during various operations in WSNs. Keeping in view of the above issues, in this paper, we propose a new learning automata-based energy efficient heterogeneous selective clustering (LA-EEHSC) scheme for WSNs. Automaton is assumed to be located on each SN with two types of SNs, namely, normal and advanced are considered in the proposed scheme. Based upon the weighted election probability (WEP) of each group of SNs, Cluster Heads (CHs) are selected among the group of SNs by the automaton. Automaton at each SN receives reward or penalty from the environment based upon WEP of different SNs. An efficient learning automata-based energy efficient clustering algorithm is also proposed. Finally, first node die (FND) and last node alive (LNA) are selected as the key parameters for the measurement of lifetime of network field. Using these parameters, we have evaluated the performance of the proposed scheme in different network scenarios in comparison with the well-known existing protocols such as LEACH, LEACH-SC and SEP. The results obtained show that proposed scheme yields 5.89% improvement in lifetime and 21.14% improvement in stability in comparison to LEACH, LEACH-SC, and SEP. © 2014 Elsevier Ltd. Source

Discover hidden collaborations