Punjab, India
Punjab, India
Time filter
Source Type

Sharma H.,MRCE | Singh D.,SUSCET
2014 7th International Conference on Contemporary Computing, IC3 2014 | Year: 2014

Business process modeling is used to model processes of an Enterprise. Business process modeling is typically performed by business analysts and managers from the purpose of transformation of business prospective of Enterprises to the IT prospective. To model business perspective, need of high level Process Model has been raised as Business Process Modeling Notation, BPMN, is considered at low level. Our belief is that the sequencing and alignment of business rule can lay down the construction of High level process model. We have explored the nature of business rule in business and developed a Business rule meta-model to represent them. Thereafter, A Process Template is derived from Business rule meta-model and then Process Template is mapped to High level process model. In this paper we have focused on Business rule meta-model and construction of Process Template. From Process Template to High level process model will be the future work. © 2014 IEEE.

Prakash N.,MRCE | Sharma D.K.,MRCE | Prakash D.,Technical University of Denmark | Singh D.,SUSCET
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

The subject of business rules is complex. We propose a 4-dimensional framework to better understand, communicate, and realize such rules in organizations and application systems. Our 4-dimensions are domain, that considers the role of business rules in business; system for properties of business rule management systems; application platform to understand support for business rules applications; and representation for expressing business rules. We derive these from work of the Business Rules Group, namely, the Business Rules Manifesto, Business Motivation Model, and Semantics of Business Vocabulary and business Rules, SBVR. We characterize our research position in terms of this framework. © Springer International Publishing Switzerland 2014.

Raj G.,Punjab Technical University | Singh N.,Lovely Professional University | Singh D.,SUSCET
International Journal of Engineering and Technology | Year: 2013

Million numbers of these users tries to access the data in different type of applications like online shopping etc., which tends to increase the load on a single server. Increase of load on a server results in reduction of throughput and it leads to a strong need of developing and maintaining an efficient system with an appropriate load balancing algorithm that will be used to retrieve the important information with a reasonable response time. The main objective of our study is to propose a load balancing algorithm that can balance the requests coming from different users residing in different locations to retrieve the data from a distributed database environment using some virtualization techniques.

Kaur G.,Punjab Technical University | Singh D.,SUSCET | Kaur S.,SGGSWU
Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 | Year: 2015

A scheme for the feature level fusion of two behavioral biometrics speech and signature using fusion method weighted sum is proposed. Feature reduction is performed using modified feature selection algorithm based on Pollination based optimization which has never been applied to the problem earlier. The modified algorithm is applied to the fusion method to search the feature space for optimal and best feature subset. This optimization is first time used to extract features of speech and signature biometric modalities after fusing. Multimodal offline database of text independent speech and signature has been collected from 40 users. Experimental results have proven that the systems works well sum fusion rule along with modified PBO algorithm has been used. The accuracy of the system is 100%. The FAR and FRR of the system is zero. Also, system's robustness for noisy samples has been analyzed which shows accuracy of 70.0%. The overall time taken by the system is from 4.70 to 5.72 seconds. © 2014 IEEE.

Raj G.,PTU | Sarfaraz M.,Amity University | Singh D.,SUSCET
Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit | Year: 2014

Cloud computing has recently appear as a promising hosting platform that performs an smart usage of a collection of services, applications, information and infrastructure composed of pools of computer resources for storage with the ability to provide users dynamically scalable, shared resources over the Internet and avoid large forthright fixed costs. However along with these advantages, that is storing of data on the clouds including invaluable information which attracts highly skilled blackhat-hackers thus creating a need for the security to be considered for improving client's trust over the information and services in cloud computing as one of the critical issues. In this survey paper, we have reviewed trust and security relation and proposed an Distributed Trust Model as per actors and their role which help us for managing trust over the services provided by any cloud. In our study, we found that as in distributed approach is implemented in our mechanism; it brings better quality of service and client response. © 2014 IEEE.

Arora S.,PTU | Singh S.,PTU | Singh S.,SBSSTC Ferozpur | Sharma B.,SUSCET
Proceedings of 2014 3rd International Conference on Parallel, Distributed and Grid Computing, PDGC 2014 | Year: 2014

In the standard firefly algorithm, every firefly has same parameter settings and its value changes from iteration to iteration. The solutions keeps on changing as the optima are approaching which results that it may fall into local optimum. Furthermore, the underlying strength of the algorithm lies in the attractiveness of less brighter firefly towards the brighter firefly which has an impact on the convergence speed and precision. So to avoid the algorithm to fall into local optimum and reduce the impact of maximum of iteration, a mutated firefly algorithm is proposed in this paper. The proposed algorithm is based on monitoring the movement of fireflies by using different probability for each firefly and then perform mutation on each firefly according to its probability. Simulations are performed to show the performance of proposed algorithm with standard firefly algorithm, based on ten standard benchmark functions. The results reveals that proposed algorithm improves the convergence speed, accurateness and prevent the premature convergence. © 2014 IEEE.

Raj G.,PTU | Singh D.,SUSCET | Bansal A.,Amity University
Proceedings of the 5th International Conference on Confluence 2014: The Next Generation Information Technology Summit | Year: 2014

Software development is not only a single motive process as development but also have to handle number of different issues as like security. For basic software development, we generally use SDLC models for development like web projects, applications, services etc. but in this development process we are not taking care of security issues which are demand of these days. There is no central body who manage all the crucial tasks. The essence of this paper lies in study of security issues as well as importance of security in SDLC models. Moreover, we focused over review in recent development area as we get differentiate in traditional SDLC security issues with SDLC security issues in virtualized scenarios as cloud. Here, we discussed the role of team and their members in feasibility and planning phases for analysis. This study helps in access control, risk assessment and security monitoring. We studied about risk classification for better risk assessment in different phases. © 2014 IEEE.

Chhabra A.,PTU | Singh D.,SUSCET
Conference Proceeding - 2015 International Conference on Advances in Computer Engineering and Applications, ICACEA 2015 | Year: 2015

Supporting quality of service (QoS) in multimedia application like Voice over IP is a key requirement. Wireless Mesh Networking is envisioned as a solution for next networks generation and a key technology for supporting VoIP application. VoIP has become a killer application and is gradually being tested over emerging areas like Wireless mesh networks. There are various challenges for VoIP in WMN. This Paper discusses E-Model which is the most reliable method for evaluating quality of voice recommended by the International Telecommunication Union-Telecommunication. The paper assesses quality of voice in form of Mean Opinion Score and R-Score in Wireless Mesh Scenario. The Paper gives a review of various codec's used in voice transmission. This paper also analyzes affect of variation of number of mesh routers over transmission of voice signal in wireless mesh scenario. © 2015 IEEE.

Batra N.,MRIU | Kumar A.,PTU Jalandhar | Singh D.,SUSCET | Rajotia R.N.,Lingayas GVKS Institute of Technology
Souvenir of the 2014 IEEE International Advance Computing Conference, IACC 2014 | Year: 2014

The World Wide Web consists of millions of interconnected web pages that provide information to the user present in any part of the world. The World Wide Web is expanding and growing in size and the complexity of the web pages. That is why it is necessary to retrieve the best or the web pages that are more relevant in terms of information for the query entered by the user in the search engine. To extract the relevancy of a web page, the search engine requires applying retrieval or a ranking module that applies to a ranking algorithm on the web to fetch the web pages in order of the importance of the information entered by the user in the query. The ranking algorithm is much efficient to rank the surface web, i.e. the web pages that can be indexed by the search engine, as well as the hidden web, i.e. the web pages that cannot be indexed by the search engine. This Paper proposed an algorithm consists of: 1) PageRank Algorithm, 2) Term Weighting Technique, 3) Feedback (Likes/Dislikes) and 4) Visitor Count © 2014 IEEE.

Kaur B.,SUSCET | Kaushal S.,Panjab University
2014 Recent Advances in Engineering and Computational Sciences, RAECS 2014 | Year: 2014

The demand of electronic gadgets such as electronic tablets, mobile phones, GPS devices, and smart computing devices is gaining a lot of popularity these days. The demand for these devices has also increased as these devices have made it easy to perform everyday needs in a mobile and distributed way. With the rise in the requirement of these devices they have become cheap in cost and there has been increase in the demand for communication and networking among wireless devices. In this scenario, the evolution of the Wireless Sensor Networks (WSNs) is fundamentally towards the universality of computing devices. Nowadays sensor nodes are having the capability of sensing and performing data processing in various types of environmental conditions. These sensor nodes are usually available in small size and are cheap in cost. In WSN, the storage capabilities of sensor nodes, their transmission range and processing capabilities are limited. Also, their energy resources are limited. Routing protocols play the crucial role of maintaining the routes in the network, ensuring reliable multi-hop communication in these conditions. This paper presents the analysis of the existing routing protocols to ensure which routing protocol provides a better Quality of Service guarantee. The Quality of Service guaranteed by a routing protocol is analyzed by using different quality of service metrics namely packet delivery ratio, throughput and end to end delay. Also the energy efficiency of the protocols is taken into consideration. © 2014 IEEE.

Loading SUSCET collaborators
Loading SUSCET collaborators