Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


21 - 30 / 50
First pagePrevious page12345Next pageLast page
21.
Effective inclusion of citizens through e-governance services : case study of direct benefit transfer in India
Rajan Gupta, Saibal K. Pal, 2020, published scientific conference contribution

Abstract: Traditional Government of any country does not include citizens as a part of the system leading to low trust levels. To eradicate this practice, E-Governance has been introduced which helps in efficient and transparent functioning of the government. The transformation from traditional governance to E-Governance is important and has been studied in the paper through the Case of Direct Benefit Transfer (DBT) in India. Before the implementation of DBT, India was suffering from malpractices like delay in funds transfer, pilferage practices in government departments, act of corruption by government officials, fake identity of users claiming the amount, and mental/physical harassment to the citizens, for the various types of funds transfer and social welfare schemes. But after effective roll out of DBT, there was a reduction of approximately USD 20 Billion reported on fake accounts in seven years cumulatively across multiple schemes in India. This has led to a good economic growth of the country and has also improved the trust level of citizens on the government of India. It has also led to increase in enrolment of girl child in schools or higher education, reduction of grievances of pensioners, and reduction of false claims. Other nations can learn from this case of effective inclusion of citizens.
Keywords: direct benefit transfer, e-governance, India, social welfare schemes, fraud accounts, money leakage, fake profile
Published in RUNG: 02.04.2021; Views: 1818; Downloads: 58
URL Link to full text
This document has many files! More...

22.
Technology applications for health safety decision making under COVID-19 pandemic management
Rajan Gupta, Saibal K. Pal, Aayush Khattar, King Baliyan, 2020, published scientific conference contribution

Abstract: A lot of new technological applications are emerging to combat the deadly novel coronavirus. This research study gives an overview of different applications that are developed by Government Institutions, Private Firms, and Individual Citizens across the world. The applications are reviewed based on their widespread use, effectiveness, availability to the broader audience, cost to implement it, concerns regarding the privacy and information collected by these apps and systems. The major eight areas of technology applications covered in this study are Contact Tracing, Social Distancing & Mask Detection, Live-feeds based Dashboards, Information Searching, Big Data and Robotics, Web-based Disease Surveillance Tools, Patient-level Information, Doctor-Patient interaction, and Informatory Chatbots. More than 100 apps were collected for this research survey to conclude the different categories in which technology is being used for decision making. This study will be useful for various health administrators, professionals, researchers, and academicians.
Keywords: COVID-19, coronavirus, technology applications, contact tracing, social distancing, chatbots, data lakes
Published in RUNG: 02.04.2021; Views: 2123; Downloads: 77
URL Link to full text
This document has many files! More...

23.
ReCAP with Rajan Gupta
2019, interview

Keywords: Certified Analytics Professional, INFORMS, CAP, Analytics Certification
Published in RUNG: 02.04.2021; Views: 1600; Downloads: 10
URL Link to full text
This document has many files! More...

24.
Glocalization strategies of multinational food giants in India
Saibal K. Pal, Rajan Gupta, 2011, original scientific article

Keywords: management strategies, marketing, consumer behaviour, food industry
Published in RUNG: 02.04.2021; Views: 1813; Downloads: 67
URL Link to full text
This document has many files! More...

25.
Application of wavelet : an advanced approach of transformation
Mrinal Sharma, Gagandeep Singh, Rajan Gupta, 2014, original scientific article

Keywords: wavelet transform, fourier transform, cognitive radio, Haar, DB3
Published in RUNG: 02.04.2021; Views: 1707; Downloads: 0
This document has many files! More...

26.
Study and proposal of wearable computer applications
Rajan Gupta, 2014, original scientific article

Keywords: wearable computers, security, technology advancements, monitoring, tracking
Published in RUNG: 02.04.2021; Views: 1821; Downloads: 0
This document has many files! More...

27.
A survey of communication systems and modulation schemes for spectrum sensing by cognitive radio
Mrinal Sharma, Gagandeep Singh, Rajan Gupta, 2014, original scientific article

Abstract: The growth of wireless applications and spectral limitations are grave anxiety for the military service and for civilian communities. A particular spectrum task force set up by Federal Communications Commission discloses that in many bands spectrum access is a more important problem than physical scarcity of the spectrum. This is in part because present systems use a procedure draw up in the1920s where different frequency bands are allocated to users or service providers, and licenses are needed to operate with those bands. To avail unused spectrum more efficiently in dynamic environments, we desire a communication system that adapts to rapidly changing environmental conditions while ensuring that minimal or at least manageable interference is introduced to existing users. Such a technology is known as cognitive radio (CR) technology. Transform domain communication system (TDCS) and wavelet domain communication system (WDCS) have been reported to have interference avoiding capability under hostile environmental conditions. Conventionally, the Pseudo Random phase vectors in TDCS and WDCS were generated by a maximum length binary Pseudo Random sequence, which allows only a relatively small amount of users in the systems. This paper reports a method of Digital modulations schemes (FSK, PSK, CSK) and communications systems (TDCS,WDCS) for efficient utilization of the spectrum in Cognitive radio.
Keywords: cognitive radio, TDCS, WDCS, spectrum sensing
Published in RUNG: 02.04.2021; Views: 1653; Downloads: 10
URL Link to full text
This document has many files! More...

28.
A novel lightweight encryption scheme for multimedia data
Rajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, original scientific article

Abstract: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system.
Keywords: chaotic maps, lightweight schemes, multimedia encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1817; Downloads: 10
URL Link to full text
This document has many files! More...

29.
Efficient and secured video encryption scheme for lightweight devices
Rajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, original scientific article

Abstract: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices.
Keywords: video processing, multimedia encryption, chaotic maps, lightweight device security
Published in RUNG: 01.04.2021; Views: 1858; Downloads: 0
This document has many files! More...

30.
Design and analysis of new shuffle encryption schemes for multimedia
Rajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article

Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1868; Downloads: 0
This document has many files! More...

Search done in 0.06 sec.
Back to top