Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
विवेक पाठक
  • गोरख पांडे हास्टल  - 70 महात्मा गांधी अंतरराष्ट्रीय हिंदी विश्वविद्यालय, वर्धा महाराष्ट्र 442001
  • 7038262508

विवेक पाठक

MGAHV, Peace and Ahimsa Studies, Department Member
  • हरियाणा के खाप पंचायत का सामाजिक अध्ययनedit
  • डॉ राकेश मिश्र (महात्मा गांधी अंतरराष्ट्रीय हिंदी विश्वविद्यालय, वर्धा महाराष्ट्र 442001edit
हरियाणा का भारतीय इतिहास और संस्कृतत में बहुत बड़ा योगदान हैं। हरियाणा में खान.पान की संस्कृतत के क्रतमक विकास की दास्तान यहाॅ के घरेलू पालतु.पशुओं के अलावा गंगा और सि॑धु के विशाल और ऊपजाऊ मैदान मैदान में स्थित होने के कारण तथा वषा॔ की सही... more
हरियाणा का भारतीय इतिहास और संस्कृतत में बहुत बड़ा योगदान हैं। हरियाणा में खान.पान की संस्कृतत के क्रतमक विकास की दास्तान यहाॅ के घरेलू पालतु.पशुओं के अलावा गंगा और सि॑धु के विशाल और ऊपजाऊ मैदान मैदान में स्थित होने के कारण तथा वषा॔ की सही तिस्थित ् मिटटी की अनेक किस्में और विनस्पतिक विविधताओं के कारण वत॔मान हरियाणा में पशु.पालन तथा खेती के अलावा देशी सब्जिया के उत्पादन की उत्तम ब्यवस्था हैं।
Research Interests:
RTI KHAP PANCHAYAT IN HARYANA
Research Interests:
Research Interests:
Research Interests:
... Chopping Of Green Sorghum Vivek P. Pathak 1 and SM Mathur 2 1 Ph.D. Scholar, CRDT, IIT, Delhi 2Associate Professor, Department of Farm Machinery and Power Engineering, College of Technology and Engineering, Udaipur-313 001 Rajasthan,... more
... Chopping Of Green Sorghum Vivek P. Pathak 1 and SM Mathur 2 1 Ph.D. Scholar, CRDT, IIT, Delhi 2Associate Professor, Department of Farm Machinery and Power Engineering, College of Technology and Engineering, Udaipur-313 001 Rajasthan, India; ...
Page 1. Physiological evaluation of different manually operated maize shelling methods YV Mahatale1 and VP Pathak2 1Assistant Professor, Department of Agriculture. Engineering, SPA, College of Agriculture, Ashti, Beed ...
Vertigo and balance disorders are among the most common symptoms encountered in patients who visit ENT outpatient department. This is associated with risk of falling and is compounded in elderly persons with other neurologic deficits and... more
Vertigo and balance disorders are among the most common symptoms encountered in patients who visit ENT outpatient department. This is associated with risk of falling and is compounded in elderly persons with other neurologic deficits and chronic medical problems. BPPV is the most common cause of peripheral vertigo. BPPV is a common vestibular disorder leading to significant morbidity, psychosocial impact, and medical costs. The objective of Epley's maneuver, which is noninvasive, inexpensive, and easily administered, is to move the canaliths out of the canal to the utricle where they no longer affect the canal dynamics. Our study aims to analyze the response to Epley's maneuver in a series of patients with posterior canal BPPV and compares the results with those treated exclusively by medical management alone. Even though many studies have been conducted to prove the efficacy of this maneuver, this study reinforces the validity of Epley's maneuver by comparison with the medical management.
CERA, a continuous erythropoietin receptor activator, has reported effective correction of anaemia in international clinical trials. Objective of this study was to evaluate efficacy and safety of CERA in Indian patients who were on... more
CERA, a continuous erythropoietin receptor activator, has reported effective correction of anaemia in international clinical trials. Objective of this study was to evaluate efficacy and safety of CERA in Indian patients who were on dialysis and has not received erythropoiesis stimulating agent (ESA) therapy in last 8 weeks. In this open label, single arm, prospective, multi-centre study, 189 patients on dialysis, having Haemoglobin (Hb) between 8 - 10 g/dL and not receiving any ESA for last 8 weeks were included at 14 centers across India. CERA was given intravenous (IV) at the dose of 0.6 microg/kg every two weeks. Primary end point of the study was mean change in Hb concentration from baseline to end of the treatment period (TP) of 16 weeks. Mean change of Hb from baseline to end of TP was 2.11 +/- 1.37 g/dL and 2.08 +/- 1.29 g/dL in intent to treat (ITT) and per protocol (PP) population respectively. Mean time to achieve Hb response was 6.10 +/- 3.87 weeks and 6.16 +/- 3.92 weeks...
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers,... more
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers, proving original authorship and ...
Research Interests:
We propose to create and operate businesses on top of online social networks through our Social Farm model. The Social Farm leverages the connectivity and trust relationships available in online social networks to create and operate... more
We propose to create and operate businesses on top of online social networks through our Social Farm model. The Social Farm leverages the connectivity and trust relationships available in online social networks to create and operate businesses using the programming interface provided by online social networks. Our proposal aims to automate the tasks of nding partners, implementing the business workow,
Chylous pleural effusion, or chylothorax, is defined as the accumulation of chyle-containing lymphatic fluid within the pleural space. Chylothorax is usually secondary to disruption of the thoracic duct or derangement of lymphatic flow... more
Chylous pleural effusion, or chylothorax, is defined as the accumulation of chyle-containing lymphatic fluid within the pleural space. Chylothorax is usually secondary to disruption of the thoracic duct or derangement of lymphatic flow within the thorax. Chyle is described classically as ...
Abstract—Counterfeiting is a serious problem impacting cus-tomers and producers in the global economy. We design authenti-cated product labels (APL), a cryptography based practical coun-terfeit detection method. Our solution can be used... more
Abstract—Counterfeiting is a serious problem impacting cus-tomers and producers in the global economy. We design authenti-cated product labels (APL), a cryptography based practical coun-terfeit detection method. Our solution can be used by customers, distributors, and ...
ABSTRACT
Thymoma is a rare neoplasm usually with an indolent growth pattern; however, local invasion and/or dissemination may occur. Twenty percent to 50% of thymomas are asymptomatic. The frequencyof thoracic symptoms is related to compression or... more
Thymoma is a rare neoplasm usually with an indolent growth pattern; however, local invasion and/or dissemination may occur. Twenty percent to 50% of thymomas are asymptomatic. The frequencyof thoracic symptoms is related to compression or invasion ofadjacent ...
Texas Instruments, Dallas, TX, 1Nice, France, 2Nortel Networks, Ottawa, Ontario, Canada ... Advances in optical networking have set the pace for growth in data communication bandwidth and network connectivity. Large-scale integration of... more
Texas Instruments, Dallas, TX, 1Nice, France, 2Nortel Networks, Ottawa, Ontario, Canada ... Advances in optical networking have set the pace for growth in data communication bandwidth and network connectivity. Large-scale integration of Gb/s serial links in CMOS ASICs is ...
The contribution of this paper is two-fold. First, we describe an improved version of a blind steganalysis method previously proposed by Holotyak et al. and compare it to current state-of-the-art blind steganalyzers. The features for the... more
The contribution of this paper is two-fold. First, we describe an improved version of a blind steganalysis method previously proposed by Holotyak et al. and compare it to current state-of-the-art blind steganalyzers. The features for the blind classifier are calculated in the wavelet domain as higher-order absolute moments of the noise residual. This method clearly shows the benefit of calculating the features from the noise residual because it increases the features' sensitivity to embedding, which leads to improved detection results ...
We present geographical secure path routing, an infrastructure free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty no des. Geographic locations of anonymous nodes are authenticated in order to... more
We present geographical secure path routing, an infrastructure free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty no des. Geographic locations of anonymous nodes are authenticated in order to provide location authenticat ion and location privacy simultaneously. Our protocol also authenticates the routing paths taken by individual messages. This provides a basis for ge- ographic security policies. This paper discusses the desig n and attack resistance of the secure geographic routing protocol. The overhead of location authentication is investigated under various scenarios through network simulation. Results show that the presence of malicious nodes increases the routing path length. A data delivery rate of better than 80% is sustained even if 40% of the nodes are malicious.
Research Interests:
This paper proposes a technique for human identification using fusion of ear and iris data. It uses the Haar wavelet technique for feature extraction from ear as well as iris data. Extracted features are fused and used for identification.... more
This paper proposes a technique for human identification using fusion of ear and iris data. It uses the Haar wavelet technique for feature extraction from ear as well as iris data. Extracted features are fused and used for identification. It is found that proposed ...
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers,... more
Web content plays an important role in the contemporary information economy. Even though web content is used to generate advertising revenues for authors, and serves as an important reference and knowledge discovery resource for readers, proving original authorship and ...
Authentication has traditionally been done either in a decentralized manner with human assistance or automatically through a centralized security infrastructure. In the security in-frastructure approach, a central trusted authority takes... more
Authentication has traditionally been done either in a decentralized manner with human assistance or automatically through a centralized security infrastructure. In the security in-frastructure approach, a central trusted authority takes on the responsibility of authenticating ...
Agents are the next significant software abstraction, especially for distributed systems. Agent based systems have been developed in response to the following requirements: - Personalized and customized user interfaces that are pro-active... more
Agents are the next significant software abstraction, especially for distributed systems. Agent based systems have been developed in response to the following requirements: - Personalized and customized user interfaces that are pro-active in assisting the user - Adaptable, fault tolerant distributed systems that solve complex problems - Open systems where components come and go and new components are continually added.
We present the Social Farm architecture for encouraging user contribution through the profit motive. Our solution leverages the connectivity and trust relationships available in online social networks to create and operate businesses... more
We present the Social Farm architecture for encouraging user contribution through the profit motive. Our solution leverages the connectivity and trust relationships available in online social networks to create and operate businesses using the programming interface provided by existing online social networks. Social Farm automates the tasks of finding partners, implementing the business workflow, managing profits and reputation, and managing the day-to-day operations of the business. It encourages contribution and ...
OF THE THESISEncryption Servers: A scalable distributed method for Internetsecurityby Vivek PathakThesis Director: Liviu IftodeA model of IP security based on software encryption has been implemented. The implementationwas done on... more
OF THE THESISEncryption Servers: A scalable distributed method for Internetsecurityby Vivek PathakThesis Director: Liviu IftodeA model of IP security based on software encryption has been implemented. The implementationwas done on Encryption servers, that support encryption and authentication of forwardedIP packets and function as secure gateways to the Internet. A destination based security policywas supported. The feasibility and performance of the implementation on Linux operatingsystem was experimentally ...
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. The existing proposals for sender... more
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. The existing proposals for sender authentication either require infrastructural support or break compatibility with existing email infrastructure. We propose, implement, and evaluate Peer-to-Peer Sender Authentication, an incrementally deployable and backward compatible sender authentication mechanism for email. The ...
We propose to create and operate businesses on top of online social networks through our Social Farm model. The Social Farm leverages the connectivity and trust relationships available in online social networks to create and operate... more
We propose to create and operate businesses on top of online social networks through our Social Farm model. The Social Farm leverages the connectivity and trust relationships available in online social networks to create and operate businesses using the programming interface provided by online social networks. Our proposal aims to automate the tasks of finding partners, implementing the business workflow, managing profits and customer reputation, and managing the day-to-day operations of the business. This paper ...
We present geographical secure path routing, an infrastructure free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty nodes. Geographic locations of anonymous nodes are authenticated in order to... more
We present geographical secure path routing, an infrastructure free geographic routing protocol, that is resilient to disruptions caused by malicious or faulty nodes. Geographic locations of anonymous nodes are authenticated in order to provide location authentication and location privacy simultaneously. Our protocol also authenticates the routing paths taken by individual messages. This provides a basis for geographic security policies. This paper discusses the design and attack resistance of the secure geographic ...
We describe an autonomous Byzantine fault tolerant public key authentication mechanism. It aims to satisfy the authentication requirements of large distributed systems consisting of semi-trusted peers. The distributed trust model does not... more
We describe an autonomous Byzantine fault tolerant public key authentication mechanism. It aims to satisfy the authentication requirements of large distributed systems consisting of semi-trusted peers. The distributed trust model does not demand the existence of predefined trusted parties and provides authentication if more than a threshold of the peers are honest. A voting based public key authentication protocol implements distributed trust and supports dynamic membership over insecure asynchronous networks. This ...
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. Existing proposals for sender... more
The increasing use of email for phishing and unsolicited marketing has reduced the trustworthiness of email as a communication medium. Sender authentication is a known defense against these attacks. Existing proposals for sender authentication either require infrastructural support or break compatibility with existing email infrastructure. We propose, implement, and evaluate social-group key authentication, an incrementally deployable and backward compatible sender authentication mechanism for email. Our solution requires ...
Abstract How does EU research define the basic elements of the political realm? What are the underlying construction presuppositions of the European Union as an object of knowledge? In this article, I will discuss the political ontology... more
Abstract How does EU research define the basic elements of the political realm? What are the underlying construction presuppositions of the European Union as an object of knowledge? In this article, I will discuss the political ontology of the European Union ...
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:

And 17 more

Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
Research Interests:
ckS) n'kZ u ds ew y fl)ka r Buddhist Philosophy-A Present Day Need: A proceedings of NCBP-2016 ISBN: 978-93-5258-743-8 186 ckS) n'kZ u ds ew y fl)ka r foos d ikBd ih-,p-Mh ¼vfga lk ,oa 'kka fr v/;;u 2014½ egkRek xka /kh va rjjk"Vª h;... more
ckS) n'kZ u ds ew y fl)ka r Buddhist Philosophy-A Present Day Need: A proceedings of NCBP-2016 ISBN: 978-93-5258-743-8 186 ckS) n'kZ u ds ew y fl)ka r foos d ikBd ih-,p-Mh ¼vfga lk ,oa 'kka fr v/;;u 2014½ egkRek xka /kh va rjjk"Vª h; fgUnh fo'ofo|ky; o/kkZ vivek.pathak371@gmail.com xkS re cq) dk ew y uke fl)kFkZ FkkA fla gyh] vuq Jq fr] [kkjos y ds vfHkys [k] v'kks d ds fla gklukjks g.k dh frfFk] dS .Vu ds vfHkys [k vkfn ds vk/kkj ij egkRek cq) dh tUe frfFk 563 bZ-iw oZ Lohdkj dh x;h gS A budk tUe 'kkD;oa 'k ds jktk 'kq)ks nudh jkuh egkek;k ds xHkZ ls yq fEcuh es a oS 'kk[k iw f.kZ ek ds fnu gq vk FkkA 'kkD; x.kjkT; dh jkt/kkuh dfiyoLrq ds fudVyq fEcuh es a mudk tUe gq vkA fl)kFkZ ds firk 'kkD;ks a ds jktk 'kq)ks /ku Fks A cq) dks 'kkD; eq fu Hkh dgrs gS a A fl)kFkZ dh ekrk ek;kns oh muds tUe ds dq N ns j ckn ej xbZ FkhA dgk tkrk gS fd fQj ,d _f"k us dgk fd os ;k rks ,d egku jktk cus a xs ] ;k fQj ,d egku lk/kq A yq fEcuh es a ] tks nf{k.k e/; us iky es a gS ] lez kV v'kks d us rhljh 'krkCnh bZ lk iw oZ es a cq) ds tUe dhLè fr es a ,d LrEHk cuok;k FkkA eFkq jk es a vus d ckS) dkyhu ew frZ ;k¡ feyh gS a A tks ekS ;Z dky vkS j dq "kk.k dky es a eFkq jk dh vfr mUur ew frZ dyk dh vew Y; /kjks gj gS a A cq) dh thou&dFkkvks a es a of.kZ r gS fd fl)kFkZ us dfiyoLrq dks Nks M+ us ds i'pkr~ vuks ek unh dks vius ?kks M+ s da Fkd ij ikj fd;k Fkk vkS j ;gha ls vius ifjpkjd Na nd dks fonk dj fn;k FkkA euq "; ftu nq [kks a ls ihMfr gS ] mues a cgq r cM+ k fgLlk ,s ls nq [kks a dk gS ] ftUgs a euq "; us vius vKku] xyr Kku ;k feF;k –f"V;ks a ls iS nk dj fy;k gS a mu nq [kks a dk çgk.k vius lgh Kku }kjk gh lEHko gS ] fdlh ds vk'khokZ n ;k ojnku ls mUgs a nw j ugha fd;k tk ldrkA lR; ;k ;FkkFkZ rk dk Kku gh lE;d Kku gS A vr lR; dh [kks t nq [k eks {k ds fy, ijeko';d gS A [kks t vKkr lR; dh gh dh tk ldrh gS A ;fn lR; fdlh 'kkL=] vkxe ;k mins 'kd }kjk Kkr gks x;k gS rks mldh [kks t] [kks t ugha A vr: cq) us vius iw oZ orhZ yks xks a }kjk ;k ijEijk }kjk crk, lR; dks udkj fn;k vkS j vius fy, u, fljs ls mldh [kks t dhA cq) Lo;a dgha çfrc) ugha gq , vkS j u rks vius f'k";ks a dks mUgks a us dgha cka /kkA mUgks a us dgk fd es jh ckr dks Hkh blfy, pq ipki u eku yks fd mls cq) us dgh gS A ml ij Hkh lUns g djks vkS j fofo/k ijh{kkvks a }kjk mldh ijh{kk djks A thou dh dlkS Vh ij mUgs a ij[kks ] vius vuq Hkoks a ls feyku djks ] ;fn rq Egs a lgh tku iM+ s rks Lohdkj djks ] vU;Fkk Nks M+ nks A ;gh dkj.k Fkk fd mudk /keZ jgL;kMEcjks a ls eq ä] ekuoh; la os nukvks a ls vks rçks r ,oa ân; dks lh/ks Li'kZ djrk FkkAHkxoku cq) çKk o d#.kk dh ew frZ Fks A ;s nks uks a xq .k mues a mRd"kZ dh ijkdk"Bk çkIr dj lejl gks dj fLFkr Fks A bruk gh ugha ] Hkxoku cq) vR;Ur mik; dq 'ky Hkh Fks A mik; dkS 'ky cq) dk ,d fof'k"V xq .k gS vFkkZ r os fofo/k çdkj ds fous ; tuks a dks fofo/k mik;ks a ls lUekxZ ij vk:<+ djus es a vR;Ur çoh.k Fks A os ;g Hkyh Hkk¡ fr tkurs Fks fd fdls fdl mik; ls lUekxZ ij vk:<+ fd;k tk ldrk gS A Qyr: os fous ; tuks a ds fopkj] #fp] v/;k'k;] LoHkko] {kerk vkS j ifjfLFkfr ds vuq :i mins 'k fn;k djrs Fks A Hkxoku
Research Interests:
Research Interests:
Research Interests: