scispace - formally typeset
Search or ask a question

Showing papers by "Chandigarh University published in 2015"


Journal ArticleDOI
TL;DR: In this article, the authors proposed options for the improvement in current waste management practices in Chandigarh, which could also be adopted by other cities in developing world to reduce the adverse impact of municipal solid waste on environment and human health.

82 citations


Journal ArticleDOI
TL;DR: A protocol referred to as distance-based residual energy-efficient stable election protocol (DRESEP) that is nearly optimal for event-driven information gathering applications in sensor networks is proposed and dual-hop communication between CHs and base station is introduced to achieve energy minimization.
Abstract: Wireless sensor networks (WSNs) comprise nodes with restricted battery power that are deployed to observe some physical event within the sensor field. Information gathering is typical, but an important operation in several applications of WSNs. It is important to control the sensor network for longer period of time in an energy-efficient manner for gathering information. Hence, it is perpetually fascinating to design protocols that are energy efficient, have prolonged lifetime and can support event-driven applications. This paper proposes a protocol referred to as distance-based residual energy-efficient stable election protocol (DRESEP) that is nearly optimal for event-driven information gathering applications in sensor networks. The key idea of DRESEP is moving gathered information from sensor nodes to cluster head (CH) depending upon perceived changes. Dual-hop communication between CHs and base station is introduced to achieve energy minimization. Further, the results demonstrate that the proposed algorithm significantly outperforms existing algorithms in terms of energy optimization and system lifetime.

60 citations


Journal ArticleDOI
TL;DR: Fractal lossy compression for Non ROI image and Context tree weighting lossless for ROI part of an image have been proposed for the efficient compression and compared with other such as Integer wavelet transform and Scalable RBC.

55 citations


Journal ArticleDOI
TL;DR: An approach of creating a dictionary of critical terms specifying severity using two different feature selection methods, namely- info gain and Chi square and classification of bug reports are performed using Naive Bayes Multinomial (NBM) and K-nearest neighbor (KNN) algorithms.

48 citations


Journal ArticleDOI
TL;DR: This paper looks into the performance of Inter Satellite Optical Wireless Communication system link using DWDM multiplexing technique for long distance transmission and demonstrates a comparative analysis of RZ (Return to zero) and NRZ (Non-return tozero) modulation formats by varying the levels of input power.

42 citations


Journal ArticleDOI
TL;DR: A hybrid backbone based clustering algorithm for VANETs is proposed and results show that the proposed algorithm exhibits comparable cluster stability in urban scenarios.

30 citations


Journal ArticleDOI
TL;DR: A learning automata-assisted distributive intrusion detection system is designed based on clustering that yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.
Abstract: In recent years, vehicular cloud computing (VCC) has emerged as a new technology which is being used in wide range of applications in the area of multimedia-based healthcare applications. In VCC, vehicles act as the intelligent machines which can be used to collect and transfer the healthcare data to the local, or global sites for storage, and computation purposes, as vehicles are having comparatively limited storage and computation power for handling the multimedia files. However, due to the dynamic changes in topology, and lack of centralized monitoring points, this information can be altered, or misused. These security breaches can result in disastrous consequences such as-loss of life or financial frauds. Therefore, to address these issues, a learning automata-assisted distributive intrusion detection system is designed based on clustering. Although there exist a number of applications where the proposed scheme can be applied but, we have taken multimedia-based healthcare application for illustration of the proposed scheme. In the proposed scheme, learning automata (LA) are assumed to be stationed on the vehicles which take clustering decisions intelligently and select one of the members of the group as a cluster-head. The cluster-heads then assist in efficient storage and dissemination of information through a cloud-based infrastructure. To secure the proposed scheme from malicious activities, standard cryptographic technique is used in which the auotmaton learns from the environment and takes adaptive decisions for identification of any malicious activity in the network. A reward and penalty is given by the stochastic environment where an automaton performs its actions so that it updates its action probability vector after getting the reinforcement signal from the environment. The proposed scheme was evaluated using extensive simulations on ns-2 with SUMO. The results obtained indicate that the proposed scheme yields an improvement of 10 % in detection rate of malicious nodes when compared with the existing schemes.

29 citations


Journal ArticleDOI
TL;DR: Results indicate that SMC gives higher accuracy for spelling mistakes identification and correction for the commonly confused words as compared to other spelling correction algorithms.

26 citations


Journal ArticleDOI
01 Oct 2015-Optik
TL;DR: A detailed study of some of the techniques like RoF-PON networks, orthogonal frequency division multiplexing (OFDM), optical millimeter wave generation, Dense wave length division multipleXing (DWDM) has been done, suggesting the future scope of these technologies in the field of RoF communication systems.

25 citations


Journal Article
TL;DR: Collected data allow the authors to affirm that the treatment with oral low dose SKA drugs is efficacious per se and highly efficacious in association with targeted phototherapy.
Abstract: The current treatments for Vitiligo are not completely satisfactory in terms of clinical, aesthetic and compliance results for patients. Recently, combination therapies had been introduced with positive results. In this paper the combination between systemic oral treatment with Low Dose Cytokines in association with other topical treatments was evaluated. Positive results were obtained both with Low Dose Cytokines alone or in association with microphototherapy with positive percentage of skin repigmentation varying between 74% and 90%. Collected data allow the authors to affirm that the treatment with oral low dose SKA drugs is efficacious per se and highly efficacious in association with targeted phototherapy.

22 citations


Proceedings ArticleDOI
01 Sep 2015
TL;DR: The paper not only presents the concept of vehicular cloud but also provides a brief overview on the applications, security issues, threats and security solution for the VCC.
Abstract: Vehicular networking has a significant advantages in the today era. It provides desirable features and some specific applications such as efficient traffic management, road safety and infotainment. The vehicle consists of comparatively more communication systems such as on-board computing device, storage and computing power, GPS etc. to provide Intelligent Transportation System (ITS). The new hybrid technology known as Vehicular Cloud Computing (VCC) has great impact on the ITS by using the resources of vehicles such as GPS, storage, internet and computing power for instant decision making and sharing information on the cloud. Moreover, the paper not only present the concept of vehicular cloud but also provide a brief overview on the applications, security issues, threats and security solution for the VCC.

Proceedings ArticleDOI
12 Jun 2015
TL;DR: This paper discussed some recent congestion control techniques of 2013, 2014 and 2015 and basically four layers discussed in WSN, namely, physical layer, MAC layer, network layer and application layer.
Abstract: Wireless sensor network (WSN) is the vast area of research in the field of networking. A number of challenges are faced by such type of battery operated networks. In WSN, the sensors are attached to the hardware motes devices. These sensors are responsible to sense the certain events happening in the near surrounding. This sensed data is communicated with the radio/antenna attached to the sensor nodes via wireless medium. There are basically four layers discussed in WSN, namely, physical layer, MAC layer, network layer and application layer. In our paper, we discussed some recent congestion control techniques of 2013, 2014 and 2015 also.


Proceedings ArticleDOI
01 Sep 2015
TL;DR: A system which generates HamNoSys based on ISL corresponding to words based on signs used in India, which covers all basic words used in daily routine and results are very encouraging.
Abstract: Sign language is used by the deaf and dumb people as their mother tongue. Sign Language helps to bridge the gap between hearing-impaired people and hearing people. Research work on Indian sign language is very limited. The main reason behind lack of Research is that there is no proper grammar of ISL and sign language is not same throughout the world. This paper presents a system which generates HamNoSys based on ISL corresponding to words. This system covers all basic words used in daily routine. HamNoSys corresponding to 100 words are generated. These notations are generated according to signs used in India. SiGML file is generated corresponding to HamNoSys notations and given as an input to JA SIGML URL APP to verify the HamNoSys. Accuracy of the animated signs is tested with the help of “Indian Sign Language Dictionary” and results are very encouraging.

Journal ArticleDOI
TL;DR: The paper presents a formal review on evolution of the image processing techniques for tumor detection, comparison of the existing techniques to obtain the one which gives the best results for detection and classification of tumor.
Abstract: The paper presents a formal review on evolution of the image processing techniques for tumor detection, comparison of the existing techniques to obtain the one which gives the best results for detection and classification of tumor. The scope of the propounded technique is semblance of the gaps by giving effectual results in identifying the tumor.

Proceedings ArticleDOI
08 Oct 2015
TL;DR: The proposed scheme uses additional operation such as one-way hash function and concatenation to secure the network against various attacks i.e. spoofing attack, man-in-the-middle attack, replay attack etc.
Abstract: In recent years, Vehicular Cloud Computing (VCC) has emerged as new technology to provide uninterrupted information to the vehicles from anywhere, anytime. The VCC provides two types of services such as safety related messages and non-safety related messages to the users. The vehicles have less computational power, storage etc. so that the vehicles collect information and send these information to the local or vehicular cloud for computation or storage purposes. But due to the dynamic nature, rapid topology changes and open communication medium, the information can be altered so that it leads to misguiding users, wrong information sharing etc. In the proposed scheme, Elliptic Curve Cryptography used for secure communication in the network that also ensures the security requirements such as confidentiality, integrity, privacy etc. The proposed scheme ensures the mutual authentication of both sender and receiver that wants to communicate. The scheme uses additional operation such as one-way hash function and concatenation to secure the network against various attacks i.e. spoofing attack, man-in-the-middle attack, replay attack etc. The effectiveness of the proposed scheme is evaluated using the different metrics such as packet delivery ratio, throughput and end-to-end delay and it is found better where it is not applied.

Proceedings ArticleDOI
12 Mar 2015
TL;DR: In this article, stability and dynamic response analysis of DC-DC buck converter in Continuous Conduction Mode is done through transfer function approach and different methods to improve the performance of the converter are analyzed.
Abstract: In this paper stability and dynamic response analysis of DC-DC buck converter in Continuous Conduction Mode is done through transfer function approach. Also different methods to improve the performance of the converter are analyzed. The transfer function is derived via mathematical modeling of DC-DC buck converter while considering the parasitic effects. Phase margin and gain margin are obtained by plotting the bode plot in the Control toolbox of MATLAB which defines the stability of the system. Step response and impulse response curves are plotted that defines the dynamic behavior of the system. To maintain a healthy balance between the stability and transient behavior improvement a type 3 loop compensation network is proposed since both are indirectly proportional.

Journal ArticleDOI
TL;DR: A hybrid approach for detection of malicious applications is proposed by scanning with different antivirus softwares and comparing all and a close look at permissions that are granted during installation period is taken.

Proceedings ArticleDOI
13 Jul 2015
TL;DR: This research study aims to look at current empirical evidence regarding challenges faced in a particular GSD context and mitigation strategies to deal with these challenges both from the perspectives of literature and industry and to develop a framework that helps to mitigate these GSD challenges.
Abstract: Global software development (GSD) is becoming a common practice in today's world and it has brought significant changes to software development industries. Majority of the software development companies are adopting Global Software Development (GSD) to get benefits like reduced development cost, better quality product and access to skilled labor etc. However along with various benefits many challenges related to communication, coordination and control are also involved in globally distributed projects as compared to co-located projects. Mitigation of these Global Software Development challenges by themselves is not an easy task. Agile Software Development can be beneficial with respect to GSD as it emphasize on customer collaboration, interaction between individuals, continuous requirement gathering, delivering of the software with in time and budget constraints etc. There are also certain differences accompanied with the benefits of merger between agile and Global software development like communication, cultural and time zone differences, trust and knowledge management. This research study aims to look at current empirical evidence regarding challenges faced in a particular GSD context and mitigation strategies to deal with these challenges both from the perspectives of literature and industry and to develop a framework that helps to mitigate these GSD challenges.

Journal ArticleDOI
TL;DR: In this paper, the synthesis of Zn 1−x O (x = 0.00, 0.15, and 0.20) nanoparticles has been carried out by sol-gel route.
Abstract: In present research communication, the synthesis of Zn 1−x Mg x O (x = 0.00, 0.05, 0.10, 0.15, and 0.20) nanoparticles has been carried out by sol–gel route. X-ray diffraction (XRD) patterns reveal the hexagonal structure of ZnO without the formation of any extra phase. Transmission electron microscopy (TEM) study indicates the spherical shape of nanoparticles, having an average particle size of 17 nm for undoped nanoparticles. The particle size has been found to be decreasing with the increase in Mg-doping concentration. High-resolution transmission electron microscopy (HRTEM) predicts the well crystalline nature of nanoparticles without any segregated extra phase or impurity, in agreement with energy dispersive spectroscopy (EDS). Electron spin resonance (ESR) analysis indicates the defects mediated long-range ferromagnetic interaction. Magnetization versus applied magnetic field (M– H) curves registers a decrease in saturation magnetization value with increase of Mg-doping concentration which can be related to decrease of oxygen vacancies in host nanoparticles. The dielectric versus frequency response has been explained by Maxwell–Wagner interfacial model. Improved ferroelectric behavior has been observed with Mg-doping concentration.

Book ChapterDOI
TL;DR: To achieve energy efficiency of a node the algorithm is designed in a way, which includes transmission energy, reception energy and the health of the node, which supports energy efficient transfer of data packet.
Abstract: Delay-Tolerant Networks (DTNs) are intermittently connected mobile wireless networks in which the connectivity between nodes changes frequently due to nodes movement A delay-tolerant network suffers from nodes energy efficiency issues due to frequent mobility and reliable transmission of data packet from source to destination Due to the mobility of the node there are frequent changes in the path Due to which enormous amount of energy is wasted So to conserve the energy of the node energy efficient transmission from one node to another node can be achieved by using the proposed algorithm EADBNHS Connectivity of the network can be determined by Synchronism, Simultaneousness and Discontinuity using EADBNHS EADBNHS is the algorithm devised for energy efficiency in this article To achieve energy efficiency of a node the algorithm is designed in a way, which includes transmission energy, reception energy and the health of the node This algorithm supports energy efficient transfer of data packet; it selects a node on the basis of minimum energy available on the node and on the basis of its connectivity to other nodes With the help of Synchronicity, Simultaneousness and Discontinuity we can easily judge a node’s condition to become the participant node in the path from source to destination

Proceedings ArticleDOI
01 Dec 2015
TL;DR: This paper presents the design of rectangular slit loaded microstrip patch antenna (S-RMPA) operating at resonant frequency 2.4Ghz, which can be used for telemedicine purpose and such antennas are used as textile antennas because of their compact size.
Abstract: This paper presents the design of rectangular slit loaded microstrip patch antenna (S-RMPA) operating at resonant frequency 2.4Ghz, .i.e. ISM Band (industrial scientific and medical), hence this antenna can be used for telemedicine purpose and such antennas are used as textile antennas because of their compact size. The development and utilization of textile antennas has grown rapidly for various applications. The main advantage of textile antennas is that they are designed as clothing elements that are able to transmit or receive wireless signals. RMPAs are well known for high efficiency, low profile, small size, good compatibility, easy to design and fabricate etc. The simulated results of characteristics modes of RMPA are presented in this study. Microstrip line feed is used for impedance matching as it is easy to fabricate, simple to match by controlling the inset position and are simple to model.

Proceedings ArticleDOI
12 Mar 2015
TL;DR: In this article, a user friendly photo voltaic system model has been presented for standalone photovoltaic system for electric power generation, which can be used to provide power to either standalone loads or for connection to the power system grid.
Abstract: Solar power is considered a very promising source for electric power generation The abundance of sunlight over a large area of the earth surface gives rise to several applications of photovoltaic systems Electricity can be generated from sunlight either directly by using the photovoltaic effect, or by using energy from the sun to heat up a working fluid that can be used to power up generators These two technologies are widely used today to provide power to either standalone loads or for connection to the power system grid In this paper a user friendly Photo voltaic system model has been presented for standalone system

Proceedings ArticleDOI
12 Jun 2015
TL;DR: This paper surveys the existing schemes for clone attack detection and shows a comparison of all the existing techniques in the literature.
Abstract: Due to open deployment of sensor nodes in hostile environment and lack of physical shielding, sensor networks are exposed to different types of physical threats including Clone attack where an adversary physically compromises a node, extract all the credentials such as keys, identity and stored codes, make hardware replicas with the captured information and introduce them at specified positions in the network Replica detection has become an important and challenging issue in the field of security This paper surveys the existing schemes for clone attack detection To conclude the paper, a comparison is shown of all the existing techniques in the literature

Journal ArticleDOI
TL;DR: Comparison between the user-user CF and item-item CF results is done to find the optimal approach for this proposed Faculty Recommender system.

Proceedings ArticleDOI
01 Dec 2015
TL;DR: In this paper, a design and implementation of single-band E-shaped Microstrip patch antenna for IEEE 802.11b (2.38GHz ~ 2.455 GHz) frequency band represented is designed and simulated successfully.
Abstract: In this paper, a design and implementation of single-band E-shaped Microstrip patch antenna for IEEE 802.11b (2.38GHz ∼ 2.455 GHz) frequency band represented. An E-shaped patch antenna with substrate thickness of h=2mm, relative permittivity of dielectric substrate is 2.55 and resonate at resonance frequency of fr = 2.4 GHz for Bluetooth applications is designed and simulated successfully [2–3]. The design and simulation of antenna is performed by IE3D (Method of Moment) based full wave electromagnetic simulator. After that, now the same antenna is modelled and analysed using different Artificial Neural Network (ANN) models for parameters estimation having ‘Translm’ function based Multilayer Perceptron (MLP) and Radial Basis Function (RBF) model. An ANN used for analysis is firstly trained by using data set obtained from electromagnetic simulator of antenna using IE3D software. This model has two input parameters: x-coordinate and y- coordinate of probe feed point and has four output parameters: Resonant Frequency(fr) Return Loss (S11 parameter), VSWR (dB) and Input Impedance (Rin in ohm).

Journal Article
TL;DR: Low Dose Medicine (LDM) suggest the use of low-doses of activated signaling molecules in order to restore P.N.E.I. homeostatic conditions and an increasing number of scientific evidences of LDM approach efficacy and safety support LDM-based therapeutic approach for the treatment of many dermatological diseases.
Abstract: Cytokines, hormones and growth factors, also defined with the collective name of “signaling molecules” are key regulating agents of physiological (and also pathological) functions according to the principles of Psycho-Neuro-Endocrine-Immunology (P.N.E.I.). From the latest evidences in the fields of Molecular Biology, P.N.E.I. and nano-concentration, a new medical approach surfaces: the Low Dose Medicine (LDM), a new tool for the study and the design of therapeutic strategies based on immune rebalance interventions. LDM suggest the use of low-doses of activated signaling molecules in order to restore P.N.E.I. homeostatic conditions and an increasing number of scientific evidences of LDM approach efficacy and safety support LDM-based therapeutic approach for the treatment of many dermatological diseases such as Psoriasis Vulgaris, Vitiligo and Atopic Dermatitis.

Book ChapterDOI
10 Aug 2015
TL;DR: An improved data encryption approach based on the Deoxyribonucleic acid that exploits two different techniques: Substitution technique and Central Dogma of Molecular Biology is proposed.
Abstract: Cryptography provides the solution in fields such as banking services, digital certificate, digital signature, message and image encryption etc. In this paper, we propose an improved data encryption approach based on the Deoxyribonucleic acid that exploits two different techniques: Substitution technique and Central Dogma of Molecular Biology. It transforms the message into protein (cipher text) using various complementary rules. Deoxyribonucleic acid provides robust DNA sequence for the substitution technique from approximately 163 million huge DNA database, where Central Dogma of Molecular Biology support the encrypted output of substitution method using transcription and translation technique.

Proceedings ArticleDOI
01 Dec 2015
TL;DR: A technique to automatically segment the optic disc from retinal images of any size is presented and it is shown that this technique preserves the shape of the disc after carefully removing the blood vessels.
Abstract: The diseases related to eye such as glaucoma, retinopathy etc. are mostly detected at the later stages when there is very little scope of treatment. This is because the symptoms presented by these diseases are not significant until the disease at some advanced level. So there is a need of regular and less time consuming diagnosis of the eye. The diagnosis can be done by observing the shape and other characteristics of the different parts of the retinal image; optic disc is the important one. This paper presents a technique to automatically segment the optic disc from retinal images of any size. This technique preserves the shape of the disc after carefully removing the blood vessels. Also, the area of the optic disc is calculated.

Proceedings ArticleDOI
01 May 2015
TL;DR: Design and optimization of digital finite impulse response (FIR) high pass filter are presented and blended BBO shines out with optimum results for a given set of parameters.
Abstract: Digital signal processing (DSP) systems require filters to fulfill their needs for particular frequency characteristics. This paper presents designing and optimization of digital finite impulse response (FIR) high pass filter. Optimization is a process to bring out the best result for an objective function. BBO is the algorithm which is based on the biogeography of organisms in a habitat. The algorithm has certain modified variants such as BBO with chaos, enhanced BBO, blended BBO and BBO with immigration refusal (IR) which are used to optimize the filter and then compared with each other. The works concludes that out of various variants, blended BBO shines out with optimum results for a given set of parameters. The convergence profiles of these variants proved blended BBO as better converging variant of BBO.