Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Dr. Chander Prabha
  • New Delhi, Delhi, India
Ad-hoc networks are utilized to setupwirelesscommunicationsintoday’senvironment for more advanced infrastructure. It has become more essential for large places to centralize the main point to authorize and authenticate with the changing... more
Ad-hoc networks are utilized to setupwirelesscommunicationsintoday’senvironment for more advanced infrastructure. It has become more essential for large places to centralize the main point to authorize and authenticate with the changing nature of network topology. There are number of attacks that can be used to manipulate the routing in an ad-hoc network. The protocol, named Authentication Routing Dynamic (ARD) for Ad-hoc networks, uses encrypting mechanisms to defeat all identified attacks. This ARD mechanism detects and protects malicious actions by third parties and peers. It also presentssecurity, message reliability and non-repudiation to routing in ad-hoc networks. It isan important issue in any wireless network. Many protocols are being designed for providing security in ad-hoc network to protect the data or network from various threads and attacks. Security is being provided by Elliptic Curve Routing Algorithm (ECRA) which consumes less energy and provides greater security o...
PurposeThis paper seeks to understand how users know when to stop searching for more information when the information space is so saturated that there is no certainty that the relevant information has been... more
PurposeThis paper seeks to understand how users know when to stop searching for more information when the information space is so saturated that there is no certainty that the relevant information has been identified.Design/methodology/approachFaculty, undergraduate and graduate students participated in focus group interviews to investigate what leads them to satisfice their information needs.FindingsAcademic library users describe both qualitative and quantitative criteria, which lead them to make rational choices determining when “enough” information satisfices their need. The situational context of both the participants' specific information need and their role in academic society affects every stage of their search – from the selection of the first resource, to ongoing search strategies, to decisions on how much information is enough.Originality/valueThese findings broaden the scope of earlier user research, which tends to focus on the more static views of habitual informati...
Bio-gas is a form of energy produced when organic materials such as animal excrement or products that are left over from agriculture are fermented easily and at low cost. The advantage of bio-gas is that it replaces other energy sources... more
Bio-gas is a form of energy produced when organic materials such as animal excrement or products that are left over from agriculture are fermented easily and at low cost. The advantage of bio-gas is that it replaces other energy sources like charcoal, firewood, electricity, liquid petroleum gas and oil. In our present study an attempt has been made to produce Biogas from Bio Methanation of water hyacinths and cow dung and testing the performance of gas and diesel using high speed diesel engine.
Chlorophytum borivilianum (Liliaceae), commonly known as Safed musli is a traditional, rare and endangered Indian medicinal herb having many therapeutic applications in Ayurvedic, Unani, Homeopathic and Allopathic systems of medicine. Its... more
Chlorophytum borivilianum (Liliaceae), commonly known as Safed musli is a traditional, rare and endangered Indian medicinal herb having many therapeutic applications in Ayurvedic, Unani, Homeopathic and Allopathic systems of medicine. Its storage roots are widely used to cure various sex related diseases because they contain steroidal and triterpenoidal saponins, sapogenins and fructans. It is a rich source of several alkaloids, steroids, phenols, vitamins, proteins, carbohydrate, potassium, calcium, magnesium, resins, and mucilage and also contains high quantity of simple sugars. The present communication deals with the isolation, identification and antimicrobial treatment of those microorganisms which damage the germplasm of medically valuable herb. The planting materials i.e., the fleshy roots bearing shoot buds were stored in perforated polythene bags filled with sand. During storage the tubers were infected with pathogens and almost 20% of germplasm was damaged. The infected fi...
Machine learning and deep learning are one of the most sought-after areas in computer science which are finding tremendous applications ranging from elementary education to genetic and space engineering. The applications of machine... more
Machine learning and deep learning are one of the most sought-after areas in computer science which are finding tremendous applications ranging from elementary education to genetic and space engineering. The applications of machine learning techniques for the development of smart cities have already been started; however, still in their infancy stage. A major challenge for Smart City developments is effective waste management by following proper planning and implementation for linking different regions such as residential buildings, hotels, industrial and commercial establishments, the transport sector, healthcare institutes, tourism spots, public places, and several others. Smart City experts perform an important role for evaluation and formulation of an efficient waste management scheme which can be easily integrated with the overall development plan for the complete city. In this work, we have offered an automated classification model for urban waste into multiple categories usin...
Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The... more
Steganography is the technique of hiding secret information within any media like text, images, audio/video and protocol based network. Steganography is an important area of research in recent years involving a number of applications. The modern secure image steganography presents a challenging task of transferring the embedded information to the destination without being detected. Transform domain methods hide messages in insensitive areas of the cover image which makes them more robust to attacks. DCT/DWT is used to transform cover image from spatial domain to frequency domain. The secret image or information is then embedded into the frequency domain coefficients. This paper proposed a novel technique for data hiding and compares it with DCT, DWT and hybrid transform domain technique for embedding secret image into cover image. The algorithms are compared for Signal to Noise Ratio (SNR) which is a measure of the difference between the cover image and the stego image.
The holter is the device used for the purpose of heart rate computation from the patient’s body and deployed on the patient’s body. The proposed model has been designed for the authentication level security between the cloud based... more
The holter is the device used for the purpose of heart rate computation from the patient’s body and deployed on the patient’s body. The proposed model has been designed for the authentication level security between the cloud based healthcare record management service and the wearable body sensor deployed on the patient body (Also called holter). The proposed model uses the strong authentication keys encrypted using the double layered encryption architecture, which is specifically designed for the proposed model. The proposed model adds the two-level security for the transmission security, which uses the secure initial setup phase and key exchange model at the second level. The proposed model has been tested for the transmission delay added by the encryption, decryption and key exchange process. The proposed model adds the minimum possible delay in the time-based periodic authentication mechanisms. The proposed model performance has been evaluated in detail using the various performa...
In the current decade, wireless sensor networks are emerging as a peculiar multi-disciplinary research area. Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target... more
In the current decade, wireless sensor networks are emerging as a peculiar multi-disciplinary research area. Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, lower sensing ranges result in dense networks, which bring the necessity to achieve an efficient medium access control protocol subject to power constraints. As medium access control has a significant effect on the energy consumption, energy efficiency is one of the fundamental research theme in the design of medium access control (MAC) protocols for wireless sensor networks. Sensor networks are expected to be deployed in an adhoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from...
In the current decade, wireless sensor networks are emerging as a peculiar multi-disciplinary research area. Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target... more
In the current decade, wireless sensor networks are emerging as a peculiar multi-disciplinary research area. Wireless sensor networks are appealing to researchers due to their wide range of application potential in areas such as target detection and tracking, environmental monitoring, industrial process monitoring, and tactical systems. However, lower sensing ranges result in dense networks, which bring the necessity to achieve an efficient medium access control protocol subject to power constraints. As medium access control has a significant effect on the energy consumption, energy efficiency is one of the fundamental research theme in the design of medium access control (MAC) protocols for wireless sensor networks. Sensor networks are expected to be deployed in an adhoc fashion, with nodes remaining largely inactive for long time, but becoming suddenly active when something is detected. These characteristics of sensor networks and applications motivate a MAC that is different from...
An important application of speech processing is speaker recognition, which automatically recognizes the person speaking in an audio recording, basis of which is speaker-specific information included in its speech features. It involves... more
An important application of speech processing is speaker recognition, which automatically recognizes the person speaking in an audio recording, basis of which is speaker-specific information included in its speech features. It involves speaker verification and speaker identification. This paper presents an efficient method based on discrete wavelet transform and optimized variance spectral flux to enhance the enactment of speaker identification system. An effective feature extraction technique uses Daubechies 40 (db40) wavelet to compress and de-noised the speech signal by its decomposition into approximations and details coefficients at level 1. The approximation coefficients contain 99.9% of speech information as compared to detailed coefficients. So, the optimized variance spectral flux is applied on wavelet approximation coefficients which efficiently extract the frequency contents of the speech signal and gives unique features. The distance between extracted features has been o...
MANET is a network where mobile works as node and it is wireless, infrastructure-less network in which nodes can move freely and can change their positions also. It is wireless, so it needs more security than the wired network. We are... more
MANET is a network where mobile works as node and it is wireless, infrastructure-less network in which nodes can move freely and can change their positions also. It is wireless, so it needs more security than the wired network. We are using Enhanced CBDS technique here, so that we can save our network from Resource consumption and Byzantine attacks. Resource consumption attack can be detected by adding new security checks to the algorithms. If the battery and bandwidth usage of any node are not going as per optimised usage thresholds set. Byzantine Attack we will be detected as if acknowledgement is not received by source in desired time. Adding alarm packet in the CBDS technique is the Enhanced CBDS technique. It shows better results than the CBDS technique Enhanced CBDS technique is better than 2 ACK, BFTR and DSR on the basis of various parameters like packet delivery ratio, end to end delay, and throughput. Keywords: MANET, MANET attacks, Security in MANET, Passive attacks in MA...
Research Interests:
A novel endoglucanase active on 1,3-1,4-β--glucans was purified to apparent homogeneity from submerged cultures of the moderately thermophilic aerobic fungus Talaromyces emersonii CBS 814.70. The enzyme is a single subunit glycoprotein... more
A novel endoglucanase active on 1,3-1,4-β--glucans was purified to apparent homogeneity from submerged cultures of the moderately thermophilic aerobic fungus Talaromyces emersonii CBS 814.70. The enzyme is a single subunit glycoprotein with M r and pI values of 40.7 ± ...
Research Interests:
— Opportunistic network (OppN's) is a type of multi-hop Ad Hoc network and comes under the category of delay tolerant networks. These networks experience frequent and long lasting partitions due to the absence of topology of nodes. The... more
— Opportunistic network (OppN's) is a type of multi-hop Ad Hoc network and comes under the category of delay tolerant networks. These networks experience frequent and long lasting partitions due to the absence of topology of nodes. The opportunistic network has attracted increasing attention recently. Opportunistic network uses human mobility concept and related wireless contacts between mobile devices to forward data. Designing algorithms and protocols for such networks is challenging as the research is either based on the knowledge of social relations, mobility or communication. Numerous routing protocols have tackled the challenging problem of routing in opportunistic networks. Keeping this in mind, the aim of this paper is to analyze the proposed ERON routing algorithm that support forwarding of data in topology-less environment and to compare with studied algorithms in terms of their performances based on various metrics. The obtained results illustrates that the proposed method (ERON) gives better performance than the previous studied algorithms.
Research Interests:
The problem of overhead and intermittent connectivity between nodes are the issues in opportunistic networks. In enhanced routing protocol in opportunistic networks (ERON) we proposed a new routing algorithm that uses social information... more
The problem of overhead and intermittent connectivity between nodes are the issues in opportunistic networks. In enhanced routing protocol in opportunistic networks (ERON) we proposed a new routing algorithm that uses social information and Ant Colony optimization. The social information plays a decisive aspect in reducing the overhead because it rely upon the connectivity of nodes. The appropriate selection of forwarding node based on social information is critical for improving the efficiency of routing protocol in opportunistic networks. The frequent disconnection problem is overcome by optimizing the social information with Ant Colony Optimization method which depend on the topology of opportunistic network. The proposed protocol/ algorithm is evaluated thoroughly via analysis and simulation in order to assess their performance in analogy with other social based routing protocols in opportunistic network with respect to Throughput, Overhead Ratio and Average Buffer Time Occupancy under various parameters settings with consideration of scalability of network.
Research Interests:
The role of opportunistic networks can be crucial in data transmission. Here message forwarding depends solely on node cooperation. Opportunistic networks use store-and-carry forward mechanism. The frequent disconnection of nodes is very... more
The role of opportunistic networks can be crucial in data transmission. Here message forwarding depends solely on node cooperation. Opportunistic networks use store-and-carry forward mechanism. The frequent disconnection of nodes is very common in these networks because of dynamic nature of mobile nodes. Therefore use of suitable routing protocol is very important in message delivery. In this paper, three social context aware routing protocols that support message forwarding in opportunistic networks i.e. HiBop, Propicman and CAOR are analysed in terms of performance metrics viz. delivery probability, overhead ratio, number of hops and delay. The results show that CAOR outperform the other two protocols in all these aspects. The delivery probability of CAOR is higher whereas the overhead ratio, number of hops and delay are less than those for HiBop and Propicman routing protocols.
Research Interests:
With the emergence of Artificial Intelligence of Things (AIoT), many daily activities have been influenced by the usage of intelligent systems. Many modern applications support a smart environment. A large-scale system may comprise... more
With the emergence of Artificial Intelligence of Things (AIoT), many daily activities have been influenced by the usage of intelligent systems. Many modern applications support a smart environment. A large-scale system may comprise individual IoT systems. The overall system is controlled by Artificial Intelligence, and it serves as the brain that takes decisions. To make effective use of the information stemming from these data using efficient and intelligent data processing techniques is essential that can be analyzed with AI for decision-making or problem-solving. IoT can promote the learning and intelligence of AI; contrarily, AI can multiply the value of IoT. AIoT systems make use of key technologies like deep learning, machine learning, natural language processing, voice recognition, and image analysis. In practice, while deploying AIoT for smart environments, it might come across many challenges. Apart from this, there are other concerns such as security, performance, reliability, efficiency, complexity, accuracy, scalability, and robustness related to the growing state-of-the-art AIoT systems applications for smart environments. All these above concerns are discussed in this chapter along with practical examples.
Microbial α -amylases with extensive commercial applications in various sectors occupy a quarter of the world enzyme market. Studies were carried out with a bacterial strain producing extracellular α-amylase isolated from rhizospheric... more
Microbial α -amylases with extensive commercial applications in various sectors occupy a quarter of the world enzyme market. Studies were carried out with a bacterial strain producing extracellular α-amylase isolated from rhizospheric soil of Euphorbia hirta. The isolate was gram positive motile rod with terminal spore. It exhibited >98% similarity with the reference strains in the GenBank. The phylogenetic tree constructed on the basis of 16S rRNA gene sequences revealed that it clustered with the closest members of Bacillus subtilis and identified as Bacillus subtilis KC3. Furthermore, the effect of incubation period, temperature, pH and different carbon and nitrogen sources of the medium was optimized. The maximum enzyme production was found after 48h (22.92 U/ml) at 40°C and pH 7. The optimal temperature and pH for enzyme activity were 50°C and 6.5 respectively. Barley starch (27.27 U/ml) was observed to be the best inducer followed by corn starch (24.30 U/ml) and maltose (19...
Before the COVID-19 coronavirus, there were the deadliest diseases, various epidemics, and pandemics in which millions of human races have been killed untimely. It’s a new public health crisis that has been spreading across the world and... more
Before the COVID-19 coronavirus, there were the deadliest diseases, various epidemics, and pandemics in which millions of human races have been killed untimely. It’s a new public health crisis that has been spreading across the world and is threatening. Due to coronavirus, there is a restriction on travel, visa, and large-scale quarantine. An epidemic is a widespread disease in one community at a particular tie whereas a pandemic is spread across continents at the same pace. The rate of infection and death increases is called a pandemic. In 1852 third Cholera in which approximately one million people across the world were killed. From 1889-to 1890 Flu was caused by the influenza virus H3N8 subtype in Russia and spread in North Hemisphere and killing about one million people. From 1910-to 1911 Sixth cholera outbreak in India and disseminated to Eastern Europe, the Middle East, Russia, North Africa and killing about 8 lac people. In 1918 there was Spanish Flu affected over 500 million...

And 11 more

— Opportunistic network (OppN's) is a type of multi-hop Ad Hoc network and comes under the category of delay tolerant networks. These networks experience frequent and long lasting partitions due to the absence of topology of nodes. The... more
— Opportunistic network (OppN's) is a type of multi-hop Ad Hoc network and comes under the category of delay tolerant networks. These networks experience frequent and long lasting partitions due to the absence of topology of nodes. The opportunistic network has attracted increasing attention recently. Opportunistic network uses human mobility concept and related wireless contacts between mobile devices to forward data. Designing algorithms and protocols for such networks is challenging as the research is either based on the knowledge of social relations, mobility or communication. Numerous routing protocols have tackled the challenging problem of routing in opportunistic networks. Keeping this in mind, the aim of this paper is to analyze the proposed ERON routing algorithm that support forwarding of data in topology-less environment and to compare with studied algorithms in terms of their performances based on various metrics. The obtained results illustrates that the proposed method (ERON) gives better performance than the previous studied algorithms.
Research Interests: