21. Effective inclusion of citizens through e-governance services : case study of direct benefit transfer in IndiaRajan Gupta, Saibal K. Pal, 2020, objavljeni znanstveni prispevek na konferenci Opis: Traditional Government of any country does not include citizens as a part of the system leading to low trust levels. To eradicate this practice, E-Governance has been introduced which helps in efficient and transparent functioning of the government. The transformation from traditional governance to E-Governance is important and has been studied in the paper through the Case of Direct Benefit Transfer (DBT) in India. Before the implementation of DBT, India was suffering from malpractices like delay in funds transfer, pilferage practices in government departments, act of corruption by government officials, fake identity of users claiming the amount, and mental/physical harassment to the citizens, for the various types of funds transfer and social welfare schemes. But after effective roll out of DBT, there was a reduction of approximately USD 20 Billion reported on fake accounts in seven years cumulatively across multiple schemes in India. This has led to a good economic growth of the country and has also improved the trust level of citizens on the government of India. It has also led to increase in enrolment of girl child in schools or higher education, reduction of grievances of pensioners, and reduction of false claims. Other nations can learn from this case of effective inclusion of citizens. Ključne besede: direct benefit transfer, e-governance, India, social welfare schemes, fraud accounts, money leakage, fake profile Objavljeno v RUNG: 02.04.2021; Ogledov: 1818; Prenosov: 58 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
22. Technology applications for health safety decision making under COVID-19 pandemic managementRajan Gupta, Saibal K. Pal, Aayush Khattar, King Baliyan, 2020, objavljeni znanstveni prispevek na konferenci Opis: A lot of new technological applications are emerging to combat the deadly novel coronavirus. This research study gives an overview of different applications that are developed by Government Institutions, Private Firms, and Individual Citizens across the world. The applications are reviewed based on their widespread use, effectiveness, availability to the broader audience, cost to implement it, concerns regarding the privacy and information collected by these apps and systems. The major eight areas of technology applications covered in this study are Contact Tracing, Social Distancing & Mask Detection, Live-feeds based Dashboards, Information Searching, Big Data and Robotics, Web-based Disease Surveillance Tools, Patient-level Information, Doctor-Patient interaction, and Informatory Chatbots. More than 100 apps were collected for this research survey to conclude the
different categories in which technology is being used for decision making. This study will be useful for various health
administrators, professionals, researchers, and academicians. Ključne besede: COVID-19, coronavirus, technology applications, contact tracing, social distancing, chatbots, data lakes Objavljeno v RUNG: 02.04.2021; Ogledov: 2122; Prenosov: 76 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
23. |
24. |
25. |
26. |
27. A survey of communication systems and modulation schemes for spectrum sensing by cognitive radioMrinal Sharma, Gagandeep Singh, Rajan Gupta, 2014, izvirni znanstveni članek Opis: The growth of wireless applications and spectral limitations are grave anxiety for the military service and for civilian communities. A particular spectrum task force set up by Federal Communications Commission discloses that in many bands spectrum access is a more important problem than physical scarcity of the
spectrum. This is in part because present systems use a procedure draw up in the1920s where different frequency bands are allocated to users or service providers, and licenses are needed to operate with those bands. To avail unused spectrum more efficiently in dynamic environments, we desire a communication system that
adapts to rapidly changing environmental conditions while ensuring that minimal or at least manageable interference is introduced to existing users. Such a technology is known as cognitive radio (CR) technology. Transform domain communication system (TDCS) and wavelet domain communication system (WDCS) have
been reported to have interference avoiding capability under hostile environmental conditions. Conventionally, the Pseudo Random phase vectors in TDCS and WDCS were generated by a maximum length binary Pseudo Random sequence, which allows only a relatively small amount of users in the systems. This paper reports a method of Digital modulations schemes (FSK, PSK, CSK) and communications systems (TDCS,WDCS) for efficient utilization of the spectrum in Cognitive radio. Ključne besede: cognitive radio, TDCS, WDCS, spectrum sensing Objavljeno v RUNG: 02.04.2021; Ogledov: 1653; Prenosov: 10 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
28. A novel lightweight encryption scheme for multimedia dataRajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, izvirni znanstveni članek Opis: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive
redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system. Ključne besede: chaotic maps, lightweight schemes, multimedia encryption, security analysis Objavljeno v RUNG: 01.04.2021; Ogledov: 1816; Prenosov: 10 Povezava na celotno besedilo Gradivo ima več datotek! Več... |
29. Efficient and secured video encryption scheme for lightweight devicesRajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, izvirni znanstveni članek Opis: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices. Ključne besede: video processing, multimedia encryption, chaotic maps, lightweight device security Objavljeno v RUNG: 01.04.2021; Ogledov: 1857; Prenosov: 0 Gradivo ima več datotek! Več... |
30. Design and analysis of new shuffle encryption schemes for multimediaRajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, izvirni znanstveni članek Opis: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy. Ključne besede: multimedia security, shuffle, S-box, chaotic encryption, security analysis Objavljeno v RUNG: 01.04.2021; Ogledov: 1865; Prenosov: 0 Gradivo ima več datotek! Več... |