scispace - formally typeset
Search or ask a question
Institution

ABES Engineering College

About: ABES Engineering College is a based out in . It is known for research contribution in the topics: Computer science & Routing protocol. The organization has 576 authors who have published 621 publications receiving 2165 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: In this paper, the authors proposed an outlier detection algorithm based on shared nearest neighbors (SCA-SNN) algorithm, which uses the number of nearest neighbors of a data point to detect outliers.
Abstract: Intrusion detection is crucial in computer network security issues; therefore, this work is aimed at maximizing network security protection and its improvement by proposing various preventive techniques. Outlier detection and semisupervised clustering algorithms based on shared nearest neighbors are proposed in this work to address intrusion detection by converting it into a problem of mining outliers using the network behavior dataset. The algorithm uses shared nearest neighbors as similarity, judges whether it is an outlier according to the number of nearest neighbors of a data point, and performs semisupervised clustering on the dataset where outliers are deleted. In the process of semisupervised clustering, vast prior knowledge is added, and the dataset is clustered according to the principle of graph segmentation. The novelty of the proposed algorithm lies in outlier detection while effectively avoiding the dependence on parameters, thus eliminating the influence of outliers on clustering. This article uses real datasets: lypmphography and glass for simulation purposes. The simulation results show that the algorithm proposed in this paper can effectively detect outliers and has a good clustering effect. Furthermore, the experimentation reveals that the outlier detection-based SCA-SNN algorithm has the best practical effect on the dataset without outliers, clearly validating the clustering performance of the outlier detection-based SCA-SNN algorithm. Furthermore, compared to the other state-of-the-art anomaly detection method, it was revealed that the anomaly detection technology based on outlier mining does not require a training process. Thus, they overcome the current anomaly detection problems caused due to incomplete normal patterns in training samples.

30 citations

Proceedings ArticleDOI
08 Sep 2014
TL;DR: An algorithm which is based on CHT and Local Maxima concept, finding one or several maxima considering different accumulators simultaneously and mapping the found parameters corresponding to the maxima back to the original image is key concept of proposed algorithm.
Abstract: Detecting circular objects over digital images have received considerable attention from industries for applications such as detection of pellets in pelletization plant, target detection, inspection of manufactured products etc. Several algorithms were proposed in past few years to detect circular features. One powerful approach for circle detection is the Circular Hough Transform and its variants. This article presents an algorithm which is based on CHT and Local Maxima concept. Finding one or several maxima considering different accumulators simultaneously and mapping the found parameters corresponding to the maxima back to the original image is key concept of proposed algorithm. Experiments were performed on real industrial images to validate the efficiency of proposed algorithm regarding good accuracy of detection.

29 citations

Book ChapterDOI
01 Jan 2019
TL;DR: This chapter is an effort to define a simulated model and framework for the subjective quality of stress into quantitative parameters and mathematically analyzing it with help of popular machine learning tools and applied methods.
Abstract: Machines are getting intelligent day by day. Modern science has gifted us many boons but simultaneously the mental, physical and spiritual disorders have surprisingly disturbed smile, peace and definite attitude and lifestyle of individual and all human beings. The stress has been the biggest challenge against mankind like nuclear weapons, global warming, and epidemics. It leads towards tension, frustration, and depression and ultimately in extreme cases towards the suicide or murder of innocents. The happiness index, safety of individual, living parameters have drastically challenged us and India specially has pathetic situation among global quality of life (QoL) index. This chapter is an effort to define a simulated model and framework for the subjective quality of stress into quantitative parameters and mathematically analyzing it with help of popular machine learning tools and applied methods. Using machine intelligence, authors are trying to establish a framework which may work as an expert system and may help the individual to grow self as better human being.

29 citations

Proceedings ArticleDOI
01 Feb 2016
TL;DR: Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily.
Abstract: Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different digital mediums. Steganography is of many types such as image steganography, text steganography, audio/video steganography etc. Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily. Some of the techniques of text steganography has been discussed along with characteristics and working.

29 citations

Journal ArticleDOI
TL;DR: This paper proposes some of these insecurities that prevail in the cloud computing environment (Trustworthy Space) and the energy sector for smart grids and relies on the Multi-Criteria Decision Making (MCDM) tool, Analytic Hierarchy Process (AHP) to determine how these inSecurities affect smart grids.

29 citations


Authors

Showing all 576 results

NameH-indexPapersCitations
Santosh Kumar80119629391
Mohit Bansal4930411145
Devendra Kumar452826232
Kamal Sharma341384884
Pradeep Kumar Singh222341720
Sandeep Kumar Singh20541229
Sachin Kumar161181007
Himanshu Verma1362447
Rohit Rastogi1382374
Vikash Singh1334445
Pankaj Sharma13194809
Dharmendra Singh1159372
Girdhari Singh1166545
Virendra Kumar Yadav1026254
Shyam Singh Rajput1029207
Network Information
Related Institutions (5)
Amrita Vishwa Vidyapeetham
11K papers, 76.1K citations

80% related

Amity University
12.7K papers, 86K citations

79% related

Malaviya National Institute of Technology, Jaipur
8.5K papers, 55.1K citations

78% related

National Institute of Technology, Karnataka
7K papers, 70.3K citations

78% related

National Institute of Technology, Durgapur
5.7K papers, 63.4K citations

78% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202217
2021198
2020139
201954
201849
201730