oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 30 )

2018 ( 191 )

2017 ( 216 )

2016 ( 331 )

Custom range...

Search Results: 1 - 10 of 200976 matches for " Satya P. Ghrera "
All listed articles are free for downloading (OA Articles)
Page 1 /200976
Display every page Item
Network Community Detection on Metric Space
Suman Saha,Satya P. Ghrera
Computer Science , 2015, DOI: 10.3390/a8030680
Abstract: Community detection in a complex network is an important problem of much interest in recent years. In general, a community detection algorithm chooses an objective function and captures the communities of the network by optimizing the objective function, and then, one uses various heuristics to solve the optimization problem to extract the interesting communities for the user. In this article, we demonstrate the procedure to transform a graph into points of a metric space and develop the methods of community detection with the help of a metric defined for a pair of points. We have also studied and analyzed the community structure of the network therein. The results obtained with our approach are very competitive with most of the well-known algorithms in the literature, and this is justified over the large collection of datasets. On the other hand, it can be observed that time taken by our algorithm is quite less compared to other methods and justifies the theoretical findings.
A Novel Approach For Security Issues In Voip Networks In Virtualization With Ivr
Kinjal Shah,Satya Prakash Ghrera,Alok Thaker
International Journal of Distributed and Parallel Systems , 2012,
Abstract: VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the network. Due to implementation of it the cost effective solution, it can be developed for the intercommunication among the employees of a prestigious organization. The proposed idea has been implemented on the audio streaming area of the VoIP technology. In the audio streaming, the security vulnerabilities are possible on the VoIP server during communication between two parties. In the proposed model, first the VoIP system has been implemented with IVR (Interactive Voice Response) as a case study and with the implementation of the security parameters provided to the asterisk server which works as a VoIP service provider. The asterisk server has been configured with different security parameters like VPN server, Firewall iptable rules, Intrusion Detection and Intrusion Prevention System. Every parameter will be monitored by the system administrator of the VoIP server along with the MySQL database. The system admin will get every update related to the attacks on the server through Mail server attached to the asterisk server. The main beauty of the proposed system is VoIP server alone is configured as a VoIP server, IVR provider, Mail Server with IDS and IPS, VPN server, connection with database server in a single asterisk server inside virtualization environment. The VoIP system is implemented for a Local Area Network inside the university system.
A novel approach for security issues in VoIP networks in Virtualization with IVR
Kinjal Shah,Satya Prakash Ghrera,Alok Thaker
Computer Science , 2012, DOI: 10.5121/ijdps.2012.3319
Abstract: VoIP (Voice over Internet Protocol) is a growing technology during last decade. It provides the audio, video streaming facility on successful implementation in the network. However, it provides the text transport facility over the network. Due to implementation of it the cost effective solution, it can be developed for the intercommunication among the employees of a prestigious organization. The proposed idea has been implemented on the audio streaming area of the VoIP technology. In the audio streaming, the security vulnerabilities are possible on the VoIP server during communication between two parties. In the proposed model, first the VoIP system has been implemented with IVR (Interactive Voice Response) as a case study and with the implementation of the security parameters provided to the asterisk server which works as a VoIP service provider. The asterisk server has been configured with different security parameters like VPN server, Firewall iptable rules, Intrusion Detection and Intrusion Prevention System. Every parameter will be monitored by the system administrator of the VoIP server along with the MySQL database. The system admin will get every update related to the attacks on the server through Mail server attached to the asterisk server. The main beauty of the proposed system is VoIP server alone is configured as a VoIP server, IVR provider, Mail Server with IDS and IPS, VPN server, connection with database server in a single asterisk server inside virtualization environment. The VoIP system is implemented for a Local Area Network inside the university system
Nearest Neighbor search in Complex Network for Community Detection
Suman Saha,S. P. Ghrera
Computer Science , 2015,
Abstract: Nearest neighbor search is a basic computational tool used extensively in almost research domains of computer science specially when dealing with large amount of data. However, the use of nearest neighbor search is restricted for the purpose of algorithmic development by the existence of the notion of nearness among the data points. The recent trend of research is on large, complex networks and their structural analysis, where nodes represent entities and edges represent any kind of relation between entities. Community detection in complex network is an important problem of much interest. In general, a community detection algorithm represents an objective function and captures the communities by optimizing it to extract the interesting communities for the user. In this article, we have studied the nearest neighbor search problem in complex network via the development of a suitable notion of nearness. Initially, we have studied and analyzed the exact nearest neighbor search using metric tree on proposed metric space constructed from complex network. After, the approximate nearest neighbor search problem is studied using locality sensitive hashing. For evaluation of the proposed nearest neighbor search on complex network we applied it in community detection problem. The results obtained using our methods are very competitive with most of the well known algorithms exists in the literature and this is verified on collection of real networks. On the other-hand, it can be observed that time taken by our algorithm is quite less compared to popular methods.
Denial of Service Attack: Analysis of Network Traffic Anormaly using Queuing Theory
Neetu Singh,S. P. Ghrera,Pranay Chaudhuri
Computer Science , 2010,
Abstract: Denial-of-service (DOS) attacks increasingly gained reputation over the past few years. As the Internet becomes more ubiquitous, the threat of the denial-of-service attacks becomes more realistic and important for individuals, businesses, governmental organizations, and even countries. There is intensive need to detect an attack in progress as soon as possible. The efficiency of diagnosing the DOS attack using concepts of queuing theory and performance parameter of the system has been investigated in the present work, as the servers definitely have some mechanisms to store and process the requests. Utilizing this concept of queuing theory, the collection of data patterns were generated. With the performance parameter of the system, the analysis of the data pattern had been made to diagnose the network anomaly. Performance analysis and results show the accuracy of the proposed scheme in detecting anomalies.
An Intelligent Recursive Algorithm for 95% Impulse Noise Removal in Grayscale and Binary Images using Lifting Scheme
Rajesh Siddavatam,Anshul Sood,Syamala Jayasree P,S P Ghrera
Lecture Notes in Engineering and Computer Science , 2011,
Abstract:
Adaptive Channel Estimation in OFDM System Using Cyclic Prefix (Kalman Filter Approach)  [PDF]
P. V. NAGANJANEYULU, K. SATYA PRASAD
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2009, DOI: 10.4236/ijcns.2009.29099
Abstract: OFDM is a promising technique for high data rate transmission and the channel estimation is very important for implementation of OFDM. In this paper, cyclic prefix (CP) can be used as a source of channel information which is originally used to reduce inter symbol interference (ISI). Based on this CP observation, we propose two cross coupled dual Kalman filters to track the channel variations without additional training sequences. One Kalman filter AR parameter estimation and another for fading channel estimation.
Purple seed stain of soybean - its incidence, effect on seed quality andintegrated management
P. SATYA PRASANTH and P.V. PATIL*
Indian Phytopathology , 2012,
Abstract: The purple seed stain infection among the different seed samples collected from different areas of northern Karnataka was ranged between 2.2 to 7.7 and 0.1 to 14.7 per cent during 2003 and 2004, respectively. There was a significant reduction in test weight, oil and protein content, seed germination and seedling vigour index (SVI) in seeds with 76-100 per cent purple seed coat staining. For integrated management of the disease either carbendazim or carbendazim (12%) + mancozeb (63%) seed treatment @2 g/kg seed along with two foliar applications at 15 days interval starting from the initial pod development stage either with thiophanate methyl or carbendazim @ 0.1 per cent were effective in increasing the plant stand and in reducing the seed infection.
Simulation of Heavy Rainfall Events during Retreat Phase of Summer Monsoon Season over Parts of Andhra Pradesh  [PDF]
O. S. R. U. Bhanu Kumar, P. Suneetha, S. Ramalingeswara Rao, M. Satya Kumar
International Journal of Geosciences (IJG) , 2012, DOI: 10.4236/ijg.2012.34074
Abstract: The main aim of this paper is to simulate monsoon heavy rainfall episodes that caused floods across some parts of Andhra Pradesh (AP) state, India during 29th September through 2nd October, 2009. A heavy rainfall quantity of 21 cm was observed near Amaravathi station (16.15°N; 80.5°E) in Guntur district due to a meso-α low pressure system extended from the Bay of Bengal and widespread rainfall episodes were also appeared to many adjoining places in other three districts namely Mahaboob Nagar, Kurnool and Krishna in AP state simultaneously on 29th September. The rainy situation continued till 2nd October and caused floods over above districts of AP state which lead to a death toll of 33 people and heavy crop loss. To quantify the above catastrophic monsoon heavy precipitation events a high resolution (9 km) Weather Research and Forecast (WRF-ARW) model is centered at Amaravathi station to simulate rainfall episodes over the study region. In the present case study the simulated sensitive experiment highlights the dynamical characteristics of the meso-α system interms of circulation changes at different levels. Secondly, the thermodynamical characteristics for the generation of convective activity of this meso-α event in terms of Convective Available Potential Energy (CAPE) and Convective Inhibition Energy (CINE) are also simulated. Dynamical and thermodynamical simulated results support heavy rainfall episodes due to a low pressure system around Amaravathi station. Thus circulation changes, high CAPE and low CINE magnitudes have well defined not only the strength of meso-α system, but also quantum of rain-fall to a tune of 19 cm near Amaravathi station on 29th September. The observed rainfall was 21 cm on 29th September and thus this model underestimates rainfall about 9.5% not only at Amaravathi station, but also at other stations as well. Similar results are noticed over the study region on other three days. In this numerical study heavy rainfall events are better represented by Kain-Fritsch (KF) scheme than Betts-Miller-Janjic (BMJ) and Grell-Deveneyi (GD) schemes. Finally simulated circulation features and rainfall quantities are validated with observed rainfall of the India Meteorological Department (IMD) and satellite derived datasets of KALPANA-1, while CAPE and CINE quantities are checked against available Wyoming University observations. The results are promising.
Secretion of an alkaline protease from a salt- tolerant and alkaliphilic, Streptomyces clavuligerus strain Mit-1
Thumar, Jignasha T.;Singh, Satya P.;
Brazilian Journal of Microbiology , 2007, DOI: 10.1590/S1517-83822007000400033
Abstract: an alkaliphilic and salt- tolerant actinomycete, streptomyces clavuligerus strain mit-1, was isolated from mithapur, the western coast of india. the organism was gram-positive, having filamentous, long thread like structure. the sporulation started after two days of growth and the optimum level of alkaline protease (130 u/ml) was produced during the early stationary phase. the strain could grow and produce protease with 0-10% nacl (w/v), the optimum being 5% nacl (w/v). growth and protease production was optimum at ph 9 with substantial decline at neutral ph. sucrose and gelatin were the best carbon and nitrogen sources respectively, whereas gelatin broth was the preferred medium for protease production. mit-1 produced substantial protease with various amino acids, when employed as the sole nitrogen sources. crude substrates, such as molasses, whey and wheat flour had significant effect on enzyme production. the results are quite valuable, as only few actinomycetes, particularly salt-tolerant alkaliphilic ones, have so far been explored for their enzymatic potential and process optimization.
Page 1 /200976
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.