scispace - formally typeset
Search or ask a question
Institution

YMCA University of Science and Technology

EducationFaridabad, India
About: YMCA University of Science and Technology is a education organization based out in Faridabad, India. It is known for research contribution in the topics: Web crawler & Web page. The organization has 299 authors who have published 568 publications receiving 4547 citations.


Papers
More filters
Journal ArticleDOI
TL;DR: An image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images and can resist statistical, differential and brute-force search attacks.
Abstract: As the systems are enabling us to transmit large chunks of data, both in the form of texts and images, there is a need to explore algorithms which can provide a higher security without increasing the time complexity significantly. This paper proposes an image encryption scheme which uses intertwining chaotic maps and RC4 stream cipher to encrypt/decrypt the images. The scheme employs chaotic map for the confusion stage and for generation of key for the RC4 cipher. The RC4 cipher uses this key to generate random sequences which are used to implement an efficient diffusion process. The algorithm is implemented in MATLAB-2016b and various performance metrics are used to evaluate its efficacy. The proposed scheme provides highly scrambled encrypted images and can resist statistical, differential and brute-force search attacks. The peak signal-to-noise ratio values are quite similar to other schemes, the entropy values are close to ideal. In addition, the scheme is very much practical since having lowest time complexity then its counterparts.

20 citations

Journal ArticleDOI
TL;DR: The illustrated methodology in the paper is equally useful for comparison and ranking of a set of institutes and the methodology may not be equally suitable based on type and size of institute and the geographical ...
Abstract: Purpose – The paper aims to discuss current Technical Education scenarios in India. It proposes modelling the factors affecting quality in a technical institute and then applying a suitable technique for assessment, comparison and ranking. Design/methodology/approach – The paper chose graph theoretic approach for quantification of quality-enabled model. Further, the paper has validated the approach by taking examples of institutions and applying the methodology. Findings – The paper provides a systematic methodology to build a quality model for quantification of various factors in a technical institute. The qualitative effect represented in form of a single numerical index is a novel method for such representations. The illustrated methodology in the paper is equally useful for comparison and ranking of a set of institutes. Research limitations/implications – Because of the chosen factors in the approach, the methodology may not be equally suitable based on type and size of institute and the geographical ...

19 citations

Proceedings ArticleDOI
13 May 2013
TL;DR: To preventing malicious node attack, this paper presents PPN (Prime Product Number) scheme for detection and removal of malicious node.
Abstract: A mobile adhoc network is an autonomous network that consists of nodes which communicate with each other with wireless channel. Due to its dynamic nature and mobility of nodes, mobile adhoc networks are more vulnerable to security attack than conventional wired and wireless networks. One of the principal routing protocols AODV used in MANETs. The security of AODV protocol is influence by malicious node attack. In this attack, a malicious node injects a faked route reply claiming to have the shortest and freshest route to the destination. However, when the data packets arrive, the malicious node discards them. To preventing malicious node attack, this paper presents PPN (Prime Product Number) scheme for detection and removal of malicious node.

19 citations

Journal ArticleDOI
TL;DR: In this article, the authors focused on optimisation of WEDM process parameters for machining of Nimonic-90, a nickel-based alloy possessing creep resistance and high rupture strength at high temperature.
Abstract: The present research work is focused on optimisation of WEDM process parameters for machining of Nimonic-90. It is a nickel-based alloy possessing creep resistance and high rupture strength at high temperature (up to 950°C). Genetic algorithm (GA) and response surface methodology (RSM) incorporated with each other to optimise the process parameters. Four input process parameters viz. discharge current (Ip), pulse-off time (Toff), pulse-on time (Ton), and servo voltage (SV) have been investigated and modelled for surface roughness (SR) utilising RSM. In present experimentation, quadratic model has been suggested for surface roughness. Pulse-on time is most significant effect on surface roughness as compared to other parameters. Finally, genetic algorithm, a popular evolutionary approach is used to optimise the process parameters. Using SEM micrographs and micro-hardness profile, effect of discharge energy on surface morphology has been examined.

19 citations

Journal ArticleDOI
28 Feb 2014
TL;DR: In this paper, the authors discuss a selective algorithm for allocation of cloud resources to end-users on-demand basis, which is based on min-min and max-min algorithms.
Abstract: Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloudcomputing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to the end users in most efficient manner so that the trem endous capabilities of cloud are utilized effectively and efficiently. In this paper we discuss a selective algorithm for allocation of cloud resources to end -users on-demand basis. This algorithm is based on min -min and max-min algorithms. These are two c onventional task scheduling algorithm. The selective algorithm uses certain heuristics to select between the two algorithms so that overall makespan of tasks on the machines is minimized. The tasks are scheduled on machines in either space shared or timeshared manner. We evaluate our provisioning heuristics using a cloud simulator, called CloudSim. We also compared our approach to the statistics obtained when provisioning of resources was done in First -Cum-FirstServe(FCFS) manner. The experimental result s show that overall makespan of tasks on given set of VMs minimizes significantly in different scenarios.

19 citations


Authors

Showing all 322 results

NameH-indexPapersCitations
Bharat Bhushan116127662506
Vikas Kumar8985939185
Dinesh Kumar69133324342
M K Arti21491179
Tilak Raj20681541
Parmod Kumar1948895
O.P. Mishra18461242
Neeraj Sharma18961063
Sandeep Grover18821251
Gurpreet Singh171071158
Vinod Chhokar1555526
Rahul Sindhwani1441498
Vineet Jain1434495
Arvind Kumar14118934
Rajesh Attri1341665
Network Information
Related Institutions (5)
Amity University
12.7K papers, 86K citations

86% related

Motilal Nehru National Institute of Technology Allahabad
5K papers, 61.8K citations

84% related

Thapar University
8.5K papers, 130.3K citations

83% related

National Institute of Technology, Durgapur
5.7K papers, 63.4K citations

83% related

National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

82% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202319
202220
20215
202021
201947
2018104