Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2018 ( 10 )

2017 ( 9 )

2016 ( 18 )

2015 ( 62 )

Custom range...

Search Results: 1 - 10 of 1998 matches for " Poonam Yadav "
All listed articles are free for downloading (OA Articles)
Page 1 /1998
Display every page Item
Face Prediction Model for an Automatic Age-invariant Face Recognition System
Poonam Yadav
Computer Science , 2015,
Abstract: Automated face recognition and identification softwares are becoming part of our daily life; it finds its abode not only with Facebook's auto photo tagging, Apple's iPhoto, Google's Picasa, Microsoft's Kinect, but also in Homeland Security Department's dedicated biometric face detection systems. Most of these automatic face identification systems fail where the effects of aging come into the picture. Little work exists in the literature on the subject of face prediction that accounts for aging, which is a vital part of the computer face recognition systems. In recent years, individual face components' (e.g. eyes, nose, mouth) features based matching algorithms have emerged, but these approaches are still not efficient. Therefore, in this work we describe a Face Prediction Model (FPM), which predicts human face aging or growth related image variation using Principle Component Analysis (PCA) and Artificial Neural Network (ANN) learning techniques. The FPM captures the facial changes, which occur with human aging and predicts the facial image with a few years of gap with an acceptable accuracy of face matching from 76 to 86%.
Performance Evolution of Intrusion Detection system on MANET Using Genetic Evolution
Kirti Singh,Poonam Yadav
International Journal of Computers & Technology , 2012,
Abstract: Mobile ad hoc networks (MANETs) are one of the best ever growing areas of research. By providing communications in the absence of fixed infrastructure MANETs are an attractive technology. However this edibility introduces new security threats. The traditional way of protecting networks is not directly applicable to MANETs. Many conventional security solutions are ineffective and inefficient for the highly dynamic and resource-constrained environments where MANET use might be expected. In this paper we solving security issue in Mobile Adhoc Network using Evolutionary Computation that will be discover complex properties of mobile ad hoc networks and evolve intrusion detection programs suitable for this new environment. Programs evolved using Grammatical Evolution techniques which is part of Evolutionary Computation, will be able to detect specific routing attacks on mobile ad hoc networks.
Poonam Tomar,Shweta Yadav
Journal of Global Research in Computer Science , 2012,
Abstract: Ad hoc networks are mobile networks that can be formed spontaneously without the requirement of a centralized access point or an existing infrastructure. There are several unique characteristics of an Ad hoc network that differentiates it from other classes of networks. Most of the TCP variants have been designed in the context of wired networks and the reason of poor performance of TCP is due to ignoring the properties of wireless Ad hoc networks. For TCP to adapt itself to Ad hoc environments, several improvements have been proposed that helps to differentiate between different types of losses. This is because in mobile Ad hoc network losses are not always due to congestion .In this paper we are presenting a new enhanced mechanism for TCP corruption control. This scheme will use the congestion control mechanism while the network is congested and vary the congestion window to hold the packet sending rate while the wireless link is corrupted Further the drop rate is calculated. A comparative study of Enhanced Reliable TCP is carried out with other TCP variants like TCP Tahoe and TCP New Reno on the basis of various parameters. ERTCP is implemented and all the implementations and simulations are performed on QualNet 5.0 simulator.
Vehicle Classification using Novel EDGE Detection Technique
Poonam Yadav,Prof. Mandeep Kaur
International Journal of Computer Science and Communication Networks , 2012,
Abstract: Vehicle Class is an important parameter inroad traffic management. With the help of vehicleclassification the computation of percentage of state-aidstreets, highways becomes simpler and it is also used inautomated toll bridges. In this paper we classify the vehiclesinto three main broad categories: A) Light vehicle B) MediumVehicle C) Heavy Vehicle. Firstly, the image pre-processingis done with the gray-scale conversion and filtering of theimage. Then with the help of fuzzy logic based novel edgedetection technique we detect the edges to get the shape andsize of the vehicle and classify the vehicle
International Journal of Engineering Science and Technology , 2012,
Abstract: The document retrieval is one of the fast growing and complex research area in the field of information retrieval. In this paper, we proposed an ontology-based method for document retrieval. The ontology defined in our proposed approach gives extra freedom to choose between the documents and thus give an accurate retrieval ofthe documents. The results and analysis of our proposed method showed expected results and a comparative analysis was subjected for analyzing the proposed method with an existing algorithm. The F-measure comparison showed the performance improvement of the proposed method with respect to the existing method.
The ′dark bronchus′ sign: HRCT diagnosis of Pneumocystis carinii pneumonia
Yadav Poonam,Seith Ashu,Sood Rita
Annals of Thoracic Medicine , 2007,
Abstract: We report the importance of the ′dark bronchus′ sign in the diagnosis of uniform, diffuse ground glass opacification on high resolution computerized tomography (HRCT). This sign is useful to identify diffuse ground glass opacity on HRCT in cases of Pneumocystis carinii pneumonia who may present with a normal or equivocal chest radiograph in the early course of disease.
A Fuzzy Based Approach to Detect Black hole Attack
Poonam Yadav,Rakesh Kumar Gill,Naveen Kumar
International Journal of Soft Computing & Engineering , 2012,
Abstract: A Wireless network is a dynamic network with large no. of nodes. As the traffic increases over the network such type of network suffers from the problems like congestion and packet loss. But in case of Mobile network there is one more problem regarding the life of the network. A network can be affected from some Black hole attack over the network As a result some loss of information occur over the communication. The packet loss is acceptable up to some threshold value but as there is more packet loss we need some solution for this. The same solution is presented in this paper. Here we are presenting a fuzzy based decision to check a node is infected by Black hole attack or node. The proposed system will identify the attack over the node as well as provide the solution to reduce the data loss over the network
An Optimized Parametric Approach for Improving Handover in WiMax
Naveen Kumar,Parmender Balyan,Poonam Yadav
International Journal of Soft Computing & Engineering , 2012,
Abstract: WiMAX network is one of the high speed networks that provide the high level security and reliability over the network. One of the common problems in WiMax network is the handover mechanism. Most of the chances of data loss and intrusion are during the handover process. To get the better efficiency and throughput an efficient handover mechanism is required. This paper proposes an optimized handover scheme for mobile WiMAX networks that tries to minimize packet loss during handover. With the help of simulation we will show that this scheme is more efficient then traditional handover. The proposed approach is the parametric approach where some parameters are used as the decision factor to elect the nearby base station.
Effect of Trichoderma koningiopsis on Chickpea Rhizosphere Activities under Different Fertilization Regimes  [PDF]
Ashmita Tandon, Touseef Fatima, Anshu Gautam, Udit Yadav, Suchi Srivastava, Poonam C. Singh
Open Journal of Soil Science (OJSS) , 2018, DOI: 10.4236/ojss.2018.810020
Abstract: Interaction of plant growth promoting microorganisms (PGPMs) with plants involves interplay at physical, physiological and molecular levels. Proliferation and root colonization of PGPMs manipulate the rhizosphere to optimize plant functions. This benefits plant by nutrient enrichment and induction of plant vigor and defense system. The present work aims to decipher the rhizosphere modulations promoted under different fertilization regimes by an organic acid producing Trichoderma koningiopsis strain (NBRI-PR5). Chickpea was selected as the host plant for the study since it responds well to the application of in/organic fertilizers and PGPMs. Microbial communities associated with the rhizosphere were studied by determining culturable population of heterogeneous microflora, and rhizosphere functions were studied by determining the soil enzyme activities and HPLC profiles of organic acids in root exudates. Application of NBRI-PR5 induced changes in rhizosphere in consent with the amendments. The changes observed in microbial populations were found to be associated with the rhizosphere enzymes. The inhibitory effect of chemical fertilizers on rhizosphere microflora was evident from least bacterial CFU observed in the NPK treatments. No detection of alkaline phosphatase enzyme in all the treatments with NBRI-PR5, with organic or inorganic amendments evidently represents the acidified rhizosphere. Similarly, an opposite trend in DHA and protease enzyme activities in the rhizosphere of FYM and FYM+PR5 treated plants showed that NBRI-PR5 had reframed microbial activities to facilitate nutrient uptake in plants rather than fix in the microbes. It is concluded from the study that NBRI-PR5 fatefully modulates rhizosphere activities, specific to different fertilization regimes by varying the enzyme activities to maximize the utilization of available nutrients.
Namrata Singh,Poonam Singh,Akanksha Yadav,Pratibha Patel
International Journal of Advanced Technology & Engineering Research , 2012,
Abstract: This paper depicts the electricity billing system named “electricity with tariff indicator”. It is easily accessible by the consumer, in which any consumer can buy a memory card (which is an EEPROM IC) with a pass-word stored inside using a MC program. Different ranges of memory card are easily available. The Fe-male symbolizes the memory card. The smart card is protected from other user. This is done when the con-sumer inserts a female (prepaid card) into male (card reader) which is connected to the kit. The stored into is read by the male and the info is deleted from the EEPROM IC with the aid of a microcontroller pro-gram. To avoid any inconvenience of the deletion of whole amount it is equipped with an alarm sound, which is another add on of our project In this scheme, each consumer is provided with a memory card (female); with password and the re-quired number of units pre-entered by the service pro-vider and a microcontroller based system is installed at each consumer premises. The microcontroller based system is activated only after insertion of prepaid card and ensures the authentication and keeps track on con-sumption of energy, and cuts down the supply if either authentication fails or consumption expires. In this scheme the Electronic Energy meters are employed for measuring energy which will output a fixed num-ber of pulses per unit of Energy which can be counted to estimate the units consumed.
Page 1 /1998
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.