Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Abhineet Anand is active.

Publication


Featured researches published by Abhineet Anand.


Archive | 2015

Blind Watermarking Technique for Grey Scale Image Using Block Level Discrete Cosine Transform (DCT)

Ravi Tomar; Jagdish Chandra Patni; Ankur Dumka; Abhineet Anand

This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques.We are embedding blockwise watermark against the noise, filtering and cropping attack. Before embedding the watermark for any host image we must calculate the gain factor. According to our approach gain factor will vary for two different host images . The experimental results show that in addition the invisibility and security, the scheme is also robust against signal processing.


international conference on next generation computing technologies | 2015

Blind watermarking technique for greyscale image using DCT and 1-D Walsh coding

Ravi Tomar; Hitesh Kumar Sharma; Ankur Dumka; Jagdish Chandra Patni; Abhineet Anand

This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques. Watermark is embedded block-wise into the image to protect the ownership against the ltering, cropping and noise attack. Before embedding the watermark we are converting it into Walsh coded watermark [1]. In proposed approach there will be a variation in gain factor two different host images. The experimental results show that the proposed approach ensures invisibility, security and robustness against signal processing.


Archive | 2017

Open Source Big Data Analytics Technique

Ishan Sharma; Rajeev Tiwari; Abhineet Anand

In this mobile computing and business era, a huge amount of data is generated, which is Big Data. Such a large data becomes unmanageable and cannot be used for analytics using traditional methods. A large number of fields and sectors, ranging from economic and business activities, involve with Big Data problems. Big Data analytics is extremely valuable to make decisions for increasing productivity in businesses, which gives us a lot of opportunities to make great progresses in many fields. So, this paper discusses approaches and environments for carrying out analytics for Big Data applications. It revolves around important areas of analytics, Big Data, tools, and data base used. A comparative study is done and tabulated on parameters like Data Base used, real-time analytics, size, etc. Then on open source technology Kibana, Elastic search and JASON Query, a big data analytics experimental setup is done. Analytics is done in many dimensions like domain counts, percentile gross margins, sector-wise count, etc. Their drawn results are recorded and reported in form of graphs.


Archive | 2018

Analysis of Mahout Big Data Clustering Algorithms

Ishan Sharma; Rajeev Tiwari; Hukam Singh Rana; Abhineet Anand

Log data generated from any of the source or communicating devices is huge; to analyze such data we need to categorize them in some clusters. Depending upon clusters, data analytics can be done. Enabling the analytics in data helps in identification of business patterns and behavior of customers. Analyzing such big data is a major task, so distributed computing is used in Hadoop platform and machine learning library Mahout is used. Weighting technique TF-IDF is used for vectorization of data, and clusters are formed using clustering algorithms for doing analysis. Clustering algorithms K-mean, fuzzy K-Mean, LDA, and spectral clustering in Mahout are used and analyzed on basis of execution time, number of clusters, static or dynamic cluster creation.


international conference on next generation computing technologies | 2015

Intelligent custom dictionary based encryption/decryption scheme

Abhineet Anand; Ankur Dumka; Ravi Tomar; Ankit Khare

Message are send through encrypter, no one can read the text without having the encrypted software and key that has been used. If any user intends to send a open massage to many people(family, friends, colleagues, etc.) and if it being read by many people at other end too(public mail server, ICQ, etc.), discussed method will come in to play. Experiences of using encryptors and steganographers for security has led to arise many questions as to why there are so many softwares still very few are used. with discussed methodology the opportunity to explore the world of algorithms, security, Java and encryption to nd out the answers to questions. The learning process is being improved on development of the each term of development and curve steeper than previous work. From the theoretical aspect, many researcher are doing a lot of work in this domain of encryptions decryption and its related areas. A new security protocol has been proposed implemented by encoding it in Java based environment, which prove to be more secure provide reliable transmission from sender to receiver. This implementation uses a unique key generated requested by user for secure transmission over the network.


ieee students conference on electrical, electronics and computer science | 2014

Detecting community structure based on traffic at node in networks

V. K. Sihag; Abhineet Anand; Ravi Tomar; Jagdish Chandra; Rajeev Tiwari; Ankur Dumka; A. S. Poonia

In the study of networks, such as complex network, social network or biological network; number of different characteristics of many nodes are found common. These characteristics includes small-world property, clustering and community structure, among others. In the context of networks, community structure refers to occurrence of groups of nodes in a network that are more densely connected internally, then with the rest of network. This heterogeneity of connection suggests that network has certain natural division within it. Being able to identify their sub-structure within the network can provide inside into how network function and topology affects each others.


international conference on computing for sustainable global development | 2015

Traffic management in MPLS network using GNS simulator using class for different services

Ravi Tomar; Hitesh Kumar; Ankur Dumka; Abhineet Anand


international conference on computing for sustainable global development | 2015

MPLS VPN using IPv4 and IPv6 protocol

Ankur Dumka; Hardwari Lal Mandoria; Kanchan Dumka; Abhineet Anand


International Journal of Engineering and Computer Science | 2017

Internet Banking System & Security Analysis

Rahul Kumar; Abhineet Anand


international conference communication and computing systems | 2016

Cluster analysis for pollution density

Rahul Kumar; Abhineet Anand; Rajeev Tiwari

Collaboration


Dive into the Abhineet Anand's collaboration.

Top Co-Authors

Avatar

Ankur Dumka

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Ravi Tomar

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Rajeev Tiwari

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Jagdish Chandra Patni

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Ankit Khare

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Anubhav Sisodia

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Hardwari Lal Mandoria

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Hitesh Kumar Sharma

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Kanchan Dumka

Uttarakhand Technical University

View shared research outputs
Top Co-Authors

Avatar

Pankaj

University of Petroleum and Energy Studies

View shared research outputs
Researchain Logo
Decentralizing Knowledge