Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


2011 - 2020 / 6048
First pagePrevious page198199200201202203204205206207Next pageLast page
2011.
Glocalization strategies of multinational food giants in India
Saibal K. Pal, Rajan Gupta, 2011, original scientific article

Keywords: management strategies, marketing, consumer behaviour, food industry
Published in RUNG: 02.04.2021; Views: 1893; Downloads: 67
URL Link to full text
This document has many files! More...

2012.
Application of wavelet : an advanced approach of transformation
Mrinal Sharma, Gagandeep Singh, Rajan Gupta, 2014, original scientific article

Keywords: wavelet transform, fourier transform, cognitive radio, Haar, DB3
Published in RUNG: 02.04.2021; Views: 1800; Downloads: 0
This document has many files! More...

2013.
Study and proposal of wearable computer applications
Rajan Gupta, 2014, original scientific article

Keywords: wearable computers, security, technology advancements, monitoring, tracking
Published in RUNG: 02.04.2021; Views: 1923; Downloads: 0
This document has many files! More...

2014.
A survey of communication systems and modulation schemes for spectrum sensing by cognitive radio
Mrinal Sharma, Gagandeep Singh, Rajan Gupta, 2014, original scientific article

Abstract: The growth of wireless applications and spectral limitations are grave anxiety for the military service and for civilian communities. A particular spectrum task force set up by Federal Communications Commission discloses that in many bands spectrum access is a more important problem than physical scarcity of the spectrum. This is in part because present systems use a procedure draw up in the1920s where different frequency bands are allocated to users or service providers, and licenses are needed to operate with those bands. To avail unused spectrum more efficiently in dynamic environments, we desire a communication system that adapts to rapidly changing environmental conditions while ensuring that minimal or at least manageable interference is introduced to existing users. Such a technology is known as cognitive radio (CR) technology. Transform domain communication system (TDCS) and wavelet domain communication system (WDCS) have been reported to have interference avoiding capability under hostile environmental conditions. Conventionally, the Pseudo Random phase vectors in TDCS and WDCS were generated by a maximum length binary Pseudo Random sequence, which allows only a relatively small amount of users in the systems. This paper reports a method of Digital modulations schemes (FSK, PSK, CSK) and communications systems (TDCS,WDCS) for efficient utilization of the spectrum in Cognitive radio.
Keywords: cognitive radio, TDCS, WDCS, spectrum sensing
Published in RUNG: 02.04.2021; Views: 1727; Downloads: 10
URL Link to full text
This document has many files! More...

2015.
A novel lightweight encryption scheme for multimedia data
Rajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, original scientific article

Abstract: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system.
Keywords: chaotic maps, lightweight schemes, multimedia encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1904; Downloads: 10
URL Link to full text
This document has many files! More...

2016.
Efficient and secured video encryption scheme for lightweight devices
Rajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, original scientific article

Abstract: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices.
Keywords: video processing, multimedia encryption, chaotic maps, lightweight device security
Published in RUNG: 01.04.2021; Views: 1970; Downloads: 0
This document has many files! More...

2017.
Design and analysis of new shuffle encryption schemes for multimedia
Rajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article

Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1967; Downloads: 0
This document has many files! More...

2018.
BAT algorithm for improving fuzzy C-means clustering for location allocation of rural kiosks in developing countries under e-governance
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Rural Kiosks are important infrastructural pillar in rural regions for internet and basic technology facility all around the world. They are also known as Tele-centers or Common Service Centers and are majorly used by government to promote Electronic Governance. The major characteristic of setting up of Rural Kiosk is their appropriate location so that people from rural region can avail the services at minimum travel cost and time. There are lot of traditional schemes used by researchers in past for location allocation but this paper proposes the usage of Fuzzy C-Means clustering and BAT algorithm to optimize the location of Rural Kiosk. The meta-heuristic approach has produced better results as compared to normal graph theories in past. The experiment has been conducted on a random data set of 72 village locations from India and their clusters are formed. It is found that using only Fuzzy C-Means clustering to allocate the center and by using it in combination with BAT algorithm produced up to 25% of efficient results. This can drastically help the key stakeholders in allocation of these Rural Kiosks at right places so as to maximize their utility.
Keywords: BAT algorithm, location allocation, rural kiosks, fuzzy C-means, e-governance, tele-centers, common service centers
Published in RUNG: 01.04.2021; Views: 1947; Downloads: 0
This document has many files! More...

2019.
Implementation & analysis of integrated utility system in developing nation like India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Public utility systems are prevalent around the world but are struggling in developing nations like India to work efficiently. Integration of different utilities can be a possible solution on the technology front, so that more requests can be handled with lesser problems. This study provides the implementation design and benefits of an already proposed integration system by the same authors. It is found that Data Storage, Access Time, Transaction Cost, security cost and server’s busy time can become more effective if the implementation of integration system can be put in place. The working prototype is based on three utilities (Gas, Power & Water) of Delhi-NCR, India.
Keywords: information systems, utility system, India, developing nation
Published in RUNG: 01.04.2021; Views: 1969; Downloads: 56
URL Link to full text
This document has many files! More...

2020.
Binary division fuzzy C-means clustering and particle swarm optimization based efficient intrusion detection for e-governance systems
Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: With the rapid rise of technology, many unusual and unwanted patterns have been observed in the communication network andrespective systems. This may be attributed to the increase of external threats that cause many security concerns. Such anomalies and unusual behavior lead to a strong need of studying and designing the Intrusion Detection Systems and Clustering. Currently,a variety of clustering methods and their combinations are used to develop an efficient intrusion detection system, but some metrics like low detection rate and high false alarm rate make these models unsatisfactory. The problem of local minima for clustering technique makes their search ability less efficient. An evolutionary technique called particle swarm optimization algorithm, that is based on swarm intelligence, shows a high global maxima search capability. In this paper, these two techniques have been combined to present a novel approach called fuzzy based particle swarm algorithm for the implementation of intrusion detection system. The experiment was conducted on a new data set called Kyoto data set with more number of anomalies. The obtained results were compared with two traditional clustering techniques based on K-Means and Fuzzy C-Means. It was observed that the proposed algorithm outperformed the other two traditional methods on the basis of the Detection Rate and False Alarm rate. In past some researchers have presented the combination of Fuzzy Based Particle Swarm Optimization algorithm to improve the intrusion detection rate,but this rate has been further improved because the algorithm performance depends on the termination condition and the fitness function value which are new in the proposed algorithm. Moreover, cluster numbers have been considered differently in the past, whereas the proposed algorithm works only on binary clustering.
Keywords: intrusion detection, fuzzy C-means clustering, particle swarm optimization, detection rate, e-governance
Published in RUNG: 01.04.2021; Views: 1923; Downloads: 0
This document has many files! More...

Search done in 0.49 sec.
Back to top