Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ankur Dumka is active.

Publication


Featured researches published by Ankur Dumka.


Archive | 2015

Blind Watermarking Technique for Grey Scale Image Using Block Level Discrete Cosine Transform (DCT)

Ravi Tomar; Jagdish Chandra Patni; Ankur Dumka; Abhineet Anand

This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques.We are embedding blockwise watermark against the noise, filtering and cropping attack. Before embedding the watermark for any host image we must calculate the gain factor. According to our approach gain factor will vary for two different host images . The experimental results show that in addition the invisibility and security, the scheme is also robust against signal processing.


international conference on next generation computing technologies | 2015

Blind watermarking technique for greyscale image using DCT and 1-D Walsh coding

Ravi Tomar; Hitesh Kumar Sharma; Ankur Dumka; Jagdish Chandra Patni; Abhineet Anand

This paper presents a robust watermarking technique to copyright an image. Proposed technique is totally based on DCT and is different from most of the available techniques. Watermark is embedded block-wise into the image to protect the ownership against the ltering, cropping and noise attack. Before embedding the watermark we are converting it into Walsh coded watermark [1]. In proposed approach there will be a variation in gain factor two different host images. The experimental results show that the proposed approach ensures invisibility, security and robustness against signal processing.


Archive | 2015

Multiprotocol Label Switching Feedback Protocol for Per Hop Based Feedback Mechanism in MPLS Network

Ankur Dumka; Hardwari Lal Mandoria

Multiprotocol feedback (MFB) protocol is suggested in this paper which suggest per hop base feedback mechanism in MPLS network including piggy backing in the algorithm, thus reduces the time needed for error detection and correction and also efficient for bandwidth utilization in the MPLS network. This is achieved by including a packet of 7 bit which carry three different types for correction and detection. Thus increases efficiency of MPLS network and also provide efficient method to find the error detection and correction and efficient for bandwidth utilization.


Archive | 2018

RFID Device Based Home Security System to Detect Intruder Trespassing

Sanjana Minocha; Ankur Dumka

Today in the twenty-first century where digitization and standardization of technology have become prominent, multiple organizations use IoT to streamline cost through collaboration and automation. The applications of automation in home appliances are growing with expansion and innovation in technology. But it can also be considered as the utmost need, for crime is growing at an ever-increasing rate. Thefts, property trespassing, illegal intrusions, etc. are a common story in every neighborhood. The methods previously used in security measurements and risk estimate time, manual power and add to external expense. It is, therefore the purpose of this paper to create a security system using IoT which utilizes RFID technology in which keys will be scanned at door knobs for the purpose of automatic door control system at low cost and reduced manual interruption.


Archive | 2018

Review of Sockets for Transfer of Files Between Systems

Pranav Arora; Ankur Dumka

The sole purpose in this research is to brief about the (need for, types of) various networking sockets, their various APIs available, and its deployment pertaining to network programming. Sockets are the apex need in client server applications. When there is a need to read or write any message between server and the client, the socket is the apropos choice. The invention of sockets was done during the production of Unix operating system particularly Berkeley Software Distribution OS. And their growth within the Internet is far from invincible now. This paper brings about need and rudimentary factors of socket programming and ideas behind creating sockets for file transfer between the various systems.


International Journal of Communication Networks and Distributed Systems | 2017

Enhancement to performance of MPLS network through hierarchical MPLS

Ankur Dumka; Hardwari Lal Mandoria

Multiprotocol label switching (MPLS) network is used to remove the overhead of routing table lookup at each router. Within the MPLS network, the routing table lookup is done at the edge routers which match the routing table values with the label table values and attach a label for the MPLS network. But, on comparative analysis, it is being found out that for the smaller and larger networks the time taken in MPLS network becomes more. In this paper, we propose a hierarchical MPLS network algorithm to reduce the time taken by the packets to reach from source to destination in a large MPLS network. It also deals with the small MPLS network and suggests solution for the same.


international conference on next generation computing technologies | 2016

E-COCOMO: An effort estimation model for cleanroom software development approach

Hitesh Kumar Sharma; Ravi Tomar; Jagdish Chandra Patni; Ankur Dumka

The integration of mathematical modelling, proof of correctness and statistical software quality assurance lead to extremely high-quality software. The integration was named as cleanroom software engineering. It proof the correctness of the deliverables of each phase, Instead of the classic analysis, design, code, test, and debug cycle, the cleanroom approach suggests a different point of view. Due to the evolution in development methodology there is a strong need of evolution in estimation models also. In this work we have proposed the new cost estimation model. The evolved model is proposed for the new development methodologies and includes some more factors for estimation used in these new approaches.


international conference on next generation computing technologies | 2015

OpenECOCOMO: The algorithms and implementation of Extended Cost Constructive Model (E-COCOMO)

Hitesh Kumar Sharma; Ravi Tomar; Ankur Dumka; Mahendra Singh Aswal

Traditional software development approaches is obsoleting day by day and the place is being taken by some new evolved approaches like. Cleanroom development approach, Agile development approach etc. due to the evolution in development methodology there is a strong need of evolution in estimation models also. In this work we have proposed an extended version of COCOMO that is E-COCOMO and based on this model a tool has been implemented called OpenECOCOMO. The evolved model is proposed for the new development methodologies and includes some more factors for estimation used in these new approaches.


international conference on next generation computing technologies | 2015

Intelligent custom dictionary based encryption/decryption scheme

Abhineet Anand; Ankur Dumka; Ravi Tomar; Ankit Khare

Message are send through encrypter, no one can read the text without having the encrypted software and key that has been used. If any user intends to send a open massage to many people(family, friends, colleagues, etc.) and if it being read by many people at other end too(public mail server, ICQ, etc.), discussed method will come in to play. Experiences of using encryptors and steganographers for security has led to arise many questions as to why there are so many softwares still very few are used. with discussed methodology the opportunity to explore the world of algorithms, security, Java and encryption to nd out the answers to questions. The learning process is being improved on development of the each term of development and curve steeper than previous work. From the theoretical aspect, many researcher are doing a lot of work in this domain of encryptions decryption and its related areas. A new security protocol has been proposed implemented by encoding it in Java based environment, which prove to be more secure provide reliable transmission from sender to receiver. This implementation uses a unique key generated requested by user for secure transmission over the network.


ieee students conference on electrical, electronics and computer science | 2014

Detecting community structure based on traffic at node in networks

V. K. Sihag; Abhineet Anand; Ravi Tomar; Jagdish Chandra; Rajeev Tiwari; Ankur Dumka; A. S. Poonia

In the study of networks, such as complex network, social network or biological network; number of different characteristics of many nodes are found common. These characteristics includes small-world property, clustering and community structure, among others. In the context of networks, community structure refers to occurrence of groups of nodes in a network that are more densely connected internally, then with the rest of network. This heterogeneity of connection suggests that network has certain natural division within it. Being able to identify their sub-structure within the network can provide inside into how network function and topology affects each others.

Collaboration


Dive into the Ankur Dumka's collaboration.

Top Co-Authors

Avatar

Ravi Tomar

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Hardwari Lal Mandoria

G. B. Pant University of Agriculture and Technology

View shared research outputs
Top Co-Authors

Avatar

Abhineet Anand

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Jagdish Chandra Patni

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Anushree Sah

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Hitesh Kumar Sharma

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Kanchan Dumka

Uttarakhand Technical University

View shared research outputs
Top Co-Authors

Avatar

Rajeev Tiwari

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar

Ravi Shankar

University of Petroleum and Energy Studies

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge