scispace - formally typeset
Search or ask a question
Author

Vidyasagar Potdar

Bio: Vidyasagar Potdar is an academic researcher from Curtin University. The author has contributed to research in topics: Spambot & Smart grid. The author has an hindex of 31, co-authored 158 publications receiving 3406 citations. Previous affiliations of Vidyasagar Potdar include Symbiosis International University & National University of Sciences and Technology.


Papers
More filters
Proceedings ArticleDOI
19 Dec 2005
TL;DR: This paper presents a detailed survey of existing and newly proposed steganographic and watermarking techniques and classify the techniques based on different domains in which data is embedded.
Abstract: Watermarking, which belong to the information hiding field, has seen a lot of research interest. There is a lot of work begin conducted in different branches in this field. Steganography is used for secret communication, whereas watermarking is used for content protection, copyright management, content authentication and tamper detection. In this paper we present a detailed survey of existing and newly proposed steganographic and watermarking techniques. We classify the techniques based on different domains in which data is embedded. We limit the survey to images only.

574 citations

Proceedings ArticleDOI
26 May 2009
TL;DR: This paper analyses commercially (and research prototypes) available wireless sensor nodes based on these parameters and outlines research directions in this area.
Abstract: Wireless Sensor Networks (WSN), an element of pervasive computing, are presently being used on a large scale to monitor real-time environmental status. However these sensors operate under extreme energy constraints and are designed by keeping an application in mind. Designing a new wireless sensor node is extremely challenging task and involves assessing a number of different parameters required by the target application, which includes range, antenna type, target technology, components, memory, storage, power, life time, security, computational capability, communication technology, power, size, programming interface and applications. This paper analyses commercially (and research prototypes) available wireless sensor nodes based on these parameters and outlines research directions in this area.

251 citations

Journal ArticleDOI
21 Sep 2018-Energies
TL;DR: In this article, the authors systematically examined the literature on prosumer community based smart grid by reviewing relevant literature published from 2009 to 2018 in reputed energy and technology journals and specifically focused on two dimensions namely prosumers community groups and prosumer relationships.
Abstract: Smart grids are robust, self-healing networks that allow bidirectional propagation of energy and information within the utility grid This introduces a new type of energy user who consumes, produces, stores and shares energy with other grid users Such a user is called a “prosumer” Prosumers’ participation in the smart grid is critical for the sustainability and long-term efficiency of the energy sharing process Thus, prosumer management has attracted increasing attention among researchers in recent years This paper systematically examines the literature on prosumer community based smart grid by reviewing relevant literature published from 2009 to 2018 in reputed energy and technology journals We specifically focus on two dimensions namely prosumer community groups and prosumer relationships Based on the evaluated literature, we present eight propositions and thoroughly describe several future research directions

141 citations

Proceedings ArticleDOI
13 Apr 2010
TL;DR: A hybrid based architecture for emotion detection is proposed and the SVM algorithm is used for validating the proposed architecture and achieves a prediction accuracy of 96.43% on web blog data.
Abstract: Emotions are part and parcel of human life and among other things, highly influence decision making. Computers have been used for decision making for quite some time now but have traditionally relied on factual information. Recently, interest has been growing among researchers to find ways of detecting subjective information used in blogs and other online social media. This paper presents emotion theories that provide a basis for emotion models. It shows how these models have been used by discussing computational approaches to emotion detection. We propose a hybrid based architecture for emotion detection. The SVM algorithm is used for validating the proposed architecture and achieves a prediction accuracy of 96.43% on web blog data.

103 citations

Proceedings ArticleDOI
26 Jun 2004
TL;DR: This paper presents a steganographic algorithm, which is an information hiding technique which allows secret communication, to cover and recover hidden information within the spatial domain of the image, which has low computational complexity and high information hiding capacity.
Abstract: Security, privacy, anti-virus, trusted computing, intrusion detection and information protection are major concerns in today's industrial informatics They are regarded as critical components for industrial based IT solutions (Zincheng, N et al,2003) Most industrial software systems rely on the third party vendors to provide the safeguards This approach in turn brings up a major issue regarding the trust of the third parties We often see that in one industrial system, there may be several other parties' trustees in order to provide all the security needs, in this paper, we describe an approach that can provide security and information protection through steganography, without a need for third party trustees We present a steganographic algorithm, which is an information hiding technique which allows secret communication, to cover and recover hidden information within the spatial domain of the image It has low computational complexity and high information hiding capacity The principle behind the algorithm is to embed information by modifying the grey level values of the grey scale image pixels We demonstrate this method by giving examples as proof of the concepts

102 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Journal Article
TL;DR: Prospect Theory led cognitive psychology in a new direction that began to uncover other human biases in thinking that are probably not learned but are part of the authors' brain’s wiring.
Abstract: In 1974 an article appeared in Science magazine with the dry-sounding title “Judgment Under Uncertainty: Heuristics and Biases” by a pair of psychologists who were not well known outside their discipline of decision theory. In it Amos Tversky and Daniel Kahneman introduced the world to Prospect Theory, which mapped out how humans actually behave when faced with decisions about gains and losses, in contrast to how economists assumed that people behave. Prospect Theory turned Economics on its head by demonstrating through a series of ingenious experiments that people are much more concerned with losses than they are with gains, and that framing a choice from one perspective or the other will result in decisions that are exactly the opposite of each other, even if the outcomes are monetarily the same. Prospect Theory led cognitive psychology in a new direction that began to uncover other human biases in thinking that are probably not learned but are part of our brain’s wiring.

4,351 citations

01 Jan 2003

3,093 citations

Journal ArticleDOI
TL;DR: This paper provides a state-of-the-art review and analysis of the different existing methods of steganography along with some common standards and guidelines drawn from the literature and some recommendations and advocates for the object-oriented embedding mechanism.

1,572 citations