Institution
Ajay Kumar Garg Engineering College
About: Ajay Kumar Garg Engineering College is a based out in . It is known for research contribution in the topics: Search engine indexing & Computer science. The organization has 216 authors who have published 300 publications receiving 1623 citations.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Through the entire review process, it has been observed that the combination of Conditional Random Field (CRF) with Fully Convolutional Neural Network (FCNN) and CRF with DeepMedic or Ensemble are more effective for the segmentation of tumor from the brain MRI images.
213 citations
••
TL;DR: The simulation model of an artificial neural network (ANN) based maximum power point tracking controller has been developed and the accuracy of the ANN tracker has been validated by employing different test data sets.
200 citations
••
TL;DR: A security analysis on the proposed authentication protocol, including the automatic encryption protocol tool ProVerif, BAN logic, and informal security analysis, proved that the protocol is secure and proved the efficiency of the scheme and achieved higher security standards.
Abstract: Currently, the popularity of the Internet of Things (IoT) has brought about an increase in the amount of data, so multi-server distributed cloud computing has been widely used in various applications that have brought convenience to our daily lives. At the same time, the development of the fifth generation (5G) of mobile communication technology has gradually become the main driving force for the popularization of the IoT. Because the 5G network is a heterogeneous network with multiple servers and small cells, the mutual authentication protocol under multiple servers is also applicable to the 5G network environment. However, much of the data will have serious storage and security issues during transmission. Aiming at the security issues in a multi-server (M-S) architecture, in 2018, Wu et al. proposed an authentication protocol in a distributed cloud environment. They claimed that their protocol is secure and resistant to various known types of attacks. However, we found that their protocol does not guarantee perfect forward secrecy (PFS) and suffers from privileged insider (PI) attacks. Such attacks will cause data to be out of sync. Therefore, we improved Wu et al. ’s protocol and proposed an improvement in the 5G network environment. Finally, we performed a security analysis on the proposed protocol, including the automatic encryption protocol tool ProVerif, BAN logic, and informal security analysis, which proved that our protocol is secure. Compared with similar existing schemes, we have proved the efficiency of the scheme and achieved higher security standards.
85 citations
••
01 Feb 2020TL;DR: This study compares multiple state‐of‐the‐art approaches such as convolutional neural networks (CNNs), long short‐term memories (LSTMs), ensemble methods, and attention mechanisms and concludes that CNN + bidirectional LSTM ensembled network with attention mechanism achieved the highest accuracy.
Abstract: With the ever increase in social media usage, it has become necessary to combat the spread of false information and decrease the reliance of information retrieval from such sources. Social...
78 citations
••
08 Apr 2011TL;DR: This work proposes a new system for providing parking information and guidance using image processing, which includes counting the number of parked vehicles, and identifying the stalls available.
Abstract: Car parking lots are an important object class in many traffic and civilian applications With the problems of increasing urban traffic congestion and the ever increasing shortage of space, these car parking lots are needed to be well equipped with automatic parking Information and Guidance systems Goals of intelligent parking lot management include counting the number of parked cars, and identifying the available location This work proposes a new system for providing parking information and guidance using image processing The proposed system includes counting the number of parked vehicles, and identifying the stalls available The system detects cars through images instead of using electronic sensors embedded on the floor A camera is installed at the entry point of the parking lot It will capture image sequences Setting image of a car as reference image, the captured images are sequentially matched using image matching For this purpose edge detection has been carried out using Prewitt edge detection operator and according to percentage of matching guidance and information is provided to the incoming driver
58 citations
Authors
Showing all 216 results
Name | H-index | Papers | Citations |
---|---|---|---|
Jatinder Kumar | 27 | 75 | 1768 |
Praveen C. Pandey | 15 | 90 | 650 |
Namrata Gangil | 10 | 27 | 295 |
Anurag Tiwari | 10 | 22 | 309 |
Sunita Yadav | 9 | 28 | 717 |
Reema Aswani | 9 | 17 | 419 |
Sachin Kumar | 9 | 54 | 269 |
Pallab Kumar Biswas | 9 | 29 | 266 |
Charu Agarwal | 8 | 13 | 379 |
Rajesh Prasad | 8 | 52 | 218 |
Kirti Tyagi | 7 | 20 | 191 |
Vikas Goel | 7 | 33 | 128 |
Rupali Bhardwaj | 7 | 27 | 146 |
Pallavi Choudekar | 7 | 41 | 170 |
Sukhwinder Singh Dhillon | 7 | 18 | 192 |