IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media ... more IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media access control layer, which restrict the data rate to 250 kbps. This alliance took low level PHY and MAC layers as the base for the development of the network protocol, security and application for the Zigbee. To solve the Problem of reduce cost and power consumption to make this technology easily available for common crowd. This system shows the total working details of the network, i.e., wireless voice communication. This work has been done to reduce the cost of entire production of such devices that contributes in home automation system and similar projects. The main objective of the research was to transfer voice over low-power micro-controller such as 8-bit micro-controller by the implementation of Zigbee.
European Journal of Molecular & Clinical Medicine, Nov 1, 2020
Diabetes mellitus is one of the major non-communicable diseases which have great impact on human ... more Diabetes mellitus is one of the major non-communicable diseases which have great impact on human life today. A huge amount of data is generated including a wide variety of the Electronic Medical Record (EMR), pharmacy reports, and laboratory reports, among other data related to patients. Big data analytics can be applied to this data to generate useful patterns and relation between different factors which affects diabetes. The results obtained from this analysis shows relation between different attributes which can be used to improve healthcare system. In this paper the analysis of the diabetes dataset is done using Hadoop framework, which is a distributive framework and can be used to analysis large amount of data. The dataset is taken from PIMA Indian Database, which includes different factors that affect diabetes like age, blood pressure, BMI (Body-Mass Index), skin thickness etc. Results produced by the analysis of data are projects on Power BI.
Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of... more Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of time , at the same time attacks on them have also increased as the data is in nuclear form (even though encoded), in these techniques. In last decade Visual Cr y ptography has evolved as an entity which divides the data into different shares and then embedding is done. This technique increases th e overhead of mu ltip le security and multiple output cover objects. In this paper we true to reduce this over head up to some extent by using GIF as cover image and reduce commun ication overhead.
Journal of Discrete Mathematical Sciences and Cryptography, Nov 17, 2021
Abstract Software defined networking is an emerging network architecture that separates the contr... more Abstract Software defined networking is an emerging network architecture that separates the control plane from the data plane of network devices and places the control plane on one or more control servers capable of managing the rules traffic forwarding of all communication devices under your domain. This article describes the architecture, different modules, and event sequences of the HyPASS for real-time protection from address-forged attacks with proactive host discovery and address validation. Such attacks cause the wastage of network bandwidth, processing power, and network resources available to the user. We performed the latency, throughput, and attack prevention tests using POX & RYU controllers on the Mininet network simulator with and without HyPASS. The system performance is analyzed for accuracy and efficiency in four different SDN scenarios categorized as fully OpenFlow enabled and Hybrid. The proposed system discovers all the live hosts in the network, updates Host Table at the handshaking between controller and OpenFlow switches. Experiments show that the system prevented all the address-forged attacks by validating the source address in different SDN environments. It achieves a 99.99% filtering accuracy level in a fully OpenFlow-enabled setup.
Journal of Discrete Mathematical Sciences and Cryptography, Nov 17, 2021
Abstract Before selecting any algorithm to be used for encryption in multimedia application syste... more Abstract Before selecting any algorithm to be used for encryption in multimedia application systems, a thorough analysis of the application must be performed to determine what level of security is required for it to work securely. As a result, after determining the necessary security levels, a careful algorithm selection must be made. The algorithm chosen will have an effect on the speed of the coder-decoder-codec. As a result, it is critical to do so before deciding on an encryption method. The algorithms used in this paper improve the overall efficiency of video encoding scheme and it takes less time comparatively with exiting algorithm approach and experiment result show it take less computation time. Proposed algorithm implemented on MATLAB platform and, performance of the proposed algorithms in order to meet the requirement of real-time MPEG decoding, we have optimized the video frame (I Frame, B Frame) with video adaptation capabilities which provide the facility to run the video in any platform. The proposed algorithms are expected to be widely used in the future to provide security for video-on-demand applications and pay-per-view programs. It can be extended to use it as non-MPEG compression schemes such as H.263 for video-conferencing applications.
International journal of cloud applications and computing, Nov 4, 2022
Cloud computing resource privacy is important and it becomes stronger when image-based security i... more Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.
IOP Conference Series: Materials Science and Engineering, 2021
Watermarking has been used frequently to authenticate the accuracy and security of the image and ... more Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be...
Journal of Discrete Mathematical Sciences and Cryptography, 2021
Abstract Before selecting any algorithm to be used for encryption in multimedia application syste... more Abstract Before selecting any algorithm to be used for encryption in multimedia application systems, a thorough analysis of the application must be performed to determine what level of security is required for it to work securely. As a result, after determining the necessary security levels, a careful algorithm selection must be made. The algorithm chosen will have an effect on the speed of the coder-decoder-codec. As a result, it is critical to do so before deciding on an encryption method. The algorithms used in this paper improve the overall efficiency of video encoding scheme and it takes less time comparatively with exiting algorithm approach and experiment result show it take less computation time. Proposed algorithm implemented on MATLAB platform and, performance of the proposed algorithms in order to meet the requirement of real-time MPEG decoding, we have optimized the video frame (I Frame, B Frame) with video adaptation capabilities which provide the facility to run the video in any platform. The proposed algorithms are expected to be widely used in the future to provide security for video-on-demand applications and pay-per-view programs. It can be extended to use it as non-MPEG compression schemes such as H.263 for video-conferencing applications.
IOP Conference Series: Materials Science and Engineering, 2021
Watermarking has been used frequently to authenticate the accuracy and security of the image and ... more Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be...
International Journal of Cloud Applications and Computing
Due to the growth of the internet and internet-based software applications, cloud data center dem... more Due to the growth of the internet and internet-based software applications, cloud data center demand has increased. Cloud data centers have thousands of servers that are 24×7 working for users; it is the strong witness of enormous energy consumption for the operation of the cloud data center. However, server utilization is not remaining the same all the time, so, from an economic feasibility point of view, energy management is an essential activity for cloud resource management. Some well-known energy management techniques for cloud data centers generally used are dynamic voltage and frequency scaling (DVFS), dynamic power management (DPM), and task scheduling-based techniques. The present work is based on an analytical approach to integrating resource provisioning with sophisticated task scheduling; the authors estimate energy utilization by cloud data centers using iDR cloud simulator. The work is intended to optimize power consumption in the cloud data center.
IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media ... more IEEE standard 802.15.4 defines two layers for low rate WPANs, which are physical layer and media access control layer, which restrict the data rate to 250 kbps. This alliance took low level PHY and MAC layers as the base for the development of the network protocol, security and application for the Zigbee. To solve the Problem of reduce cost and power consumption to make this technology easily available for common crowd. This system shows the total working details of the network, i.e., wireless voice communication. This work has been done to reduce the cost of entire production of such devices that contributes in home automation system and similar projects. The main objective of the research was to transfer voice over low-power micro-controller such as 8-bit micro-controller by the implementation of Zigbee.
European Journal of Molecular & Clinical Medicine, Nov 1, 2020
Diabetes mellitus is one of the major non-communicable diseases which have great impact on human ... more Diabetes mellitus is one of the major non-communicable diseases which have great impact on human life today. A huge amount of data is generated including a wide variety of the Electronic Medical Record (EMR), pharmacy reports, and laboratory reports, among other data related to patients. Big data analytics can be applied to this data to generate useful patterns and relation between different factors which affects diabetes. The results obtained from this analysis shows relation between different attributes which can be used to improve healthcare system. In this paper the analysis of the diabetes dataset is done using Hadoop framework, which is a distributive framework and can be used to analysis large amount of data. The dataset is taken from PIMA Indian Database, which includes different factors that affect diabetes like age, blood pressure, BMI (Body-Mass Index), skin thickness etc. Results produced by the analysis of data are projects on Power BI.
Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of... more Cryptography, Steganography, Watermarking and many other techniques have evolved over a period of time , at the same time attacks on them have also increased as the data is in nuclear form (even though encoded), in these techniques. In last decade Visual Cr y ptography has evolved as an entity which divides the data into different shares and then embedding is done. This technique increases th e overhead of mu ltip le security and multiple output cover objects. In this paper we true to reduce this over head up to some extent by using GIF as cover image and reduce commun ication overhead.
Journal of Discrete Mathematical Sciences and Cryptography, Nov 17, 2021
Abstract Software defined networking is an emerging network architecture that separates the contr... more Abstract Software defined networking is an emerging network architecture that separates the control plane from the data plane of network devices and places the control plane on one or more control servers capable of managing the rules traffic forwarding of all communication devices under your domain. This article describes the architecture, different modules, and event sequences of the HyPASS for real-time protection from address-forged attacks with proactive host discovery and address validation. Such attacks cause the wastage of network bandwidth, processing power, and network resources available to the user. We performed the latency, throughput, and attack prevention tests using POX & RYU controllers on the Mininet network simulator with and without HyPASS. The system performance is analyzed for accuracy and efficiency in four different SDN scenarios categorized as fully OpenFlow enabled and Hybrid. The proposed system discovers all the live hosts in the network, updates Host Table at the handshaking between controller and OpenFlow switches. Experiments show that the system prevented all the address-forged attacks by validating the source address in different SDN environments. It achieves a 99.99% filtering accuracy level in a fully OpenFlow-enabled setup.
Journal of Discrete Mathematical Sciences and Cryptography, Nov 17, 2021
Abstract Before selecting any algorithm to be used for encryption in multimedia application syste... more Abstract Before selecting any algorithm to be used for encryption in multimedia application systems, a thorough analysis of the application must be performed to determine what level of security is required for it to work securely. As a result, after determining the necessary security levels, a careful algorithm selection must be made. The algorithm chosen will have an effect on the speed of the coder-decoder-codec. As a result, it is critical to do so before deciding on an encryption method. The algorithms used in this paper improve the overall efficiency of video encoding scheme and it takes less time comparatively with exiting algorithm approach and experiment result show it take less computation time. Proposed algorithm implemented on MATLAB platform and, performance of the proposed algorithms in order to meet the requirement of real-time MPEG decoding, we have optimized the video frame (I Frame, B Frame) with video adaptation capabilities which provide the facility to run the video in any platform. The proposed algorithms are expected to be widely used in the future to provide security for video-on-demand applications and pay-per-view programs. It can be extended to use it as non-MPEG compression schemes such as H.263 for video-conferencing applications.
International journal of cloud applications and computing, Nov 4, 2022
Cloud computing resource privacy is important and it becomes stronger when image-based security i... more Cloud computing resource privacy is important and it becomes stronger when image-based security is applied. Most cloud service providers provision resources for images to the end users. Numerous encryption strategies are applied to safeguard information of the image while empowering visual component extractions. The work uses wavelet domain technique, visual cryptography, and Arnold transformation. This scheme provides additional security features to the secret share image at the trusted authority side for copyright protection of digital images. The proposed technique is robust against some selected attacks like scaling, blurring, etc. This technique protects the copyright of digital data over the cloud. It is a need and necessary to protect and prevent the illegal copying, redistribution, and copyright infringement of multimedia. This research work aims at increasing robustness and security of the digital image copyright scheme. The proposed scheme is a hybrid authentication framework that will perform better in the watermarking system of security using simulation over MATLAB.
IOP Conference Series: Materials Science and Engineering, 2021
Watermarking has been used frequently to authenticate the accuracy and security of the image and ... more Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be...
Journal of Discrete Mathematical Sciences and Cryptography, 2021
Abstract Before selecting any algorithm to be used for encryption in multimedia application syste... more Abstract Before selecting any algorithm to be used for encryption in multimedia application systems, a thorough analysis of the application must be performed to determine what level of security is required for it to work securely. As a result, after determining the necessary security levels, a careful algorithm selection must be made. The algorithm chosen will have an effect on the speed of the coder-decoder-codec. As a result, it is critical to do so before deciding on an encryption method. The algorithms used in this paper improve the overall efficiency of video encoding scheme and it takes less time comparatively with exiting algorithm approach and experiment result show it take less computation time. Proposed algorithm implemented on MATLAB platform and, performance of the proposed algorithms in order to meet the requirement of real-time MPEG decoding, we have optimized the video frame (I Frame, B Frame) with video adaptation capabilities which provide the facility to run the video in any platform. The proposed algorithms are expected to be widely used in the future to provide security for video-on-demand applications and pay-per-view programs. It can be extended to use it as non-MPEG compression schemes such as H.263 for video-conferencing applications.
IOP Conference Series: Materials Science and Engineering, 2021
Watermarking has been used frequently to authenticate the accuracy and security of the image and ... more Watermarking has been used frequently to authenticate the accuracy and security of the image and video files. In the world of computer technology, several watermarking strategies have developed during the past 20 years. Integrate a picture of identity that is not always concealed, such that no detail is not possible to delete. A monitoring code can also be used to deter unauthorized recording equipment. Another application is the watermark copyright control, which works at stopping the creator of the image from stealing photos unlawfully. A watermark is a promising option for the copyright transcendence of multi-media files, as embedded messages are still included. Due to the limits of fidelity, a watermark may be implemented in a small multimedia data space. There is no proof that Automated Watermarking technologies will fulfil the ultimate purpose of the cleaners of all sorts of copyright security operations to gather knowledge from the data they obtain. Relevant situations may be...
International Journal of Cloud Applications and Computing
Due to the growth of the internet and internet-based software applications, cloud data center dem... more Due to the growth of the internet and internet-based software applications, cloud data center demand has increased. Cloud data centers have thousands of servers that are 24×7 working for users; it is the strong witness of enormous energy consumption for the operation of the cloud data center. However, server utilization is not remaining the same all the time, so, from an economic feasibility point of view, energy management is an essential activity for cloud resource management. Some well-known energy management techniques for cloud data centers generally used are dynamic voltage and frequency scaling (DVFS), dynamic power management (DPM), and task scheduling-based techniques. The present work is based on an analytical approach to integrating resource provisioning with sophisticated task scheduling; the authors estimate energy utilization by cloud data centers using iDR cloud simulator. The work is intended to optimize power consumption in the cloud data center.
Uploads
Papers by Dr. Gajanand Sharma