Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where C. Jinshong Hwang is active.

Publication


Featured researches published by C. Jinshong Hwang.


Proceedings of SPIE, the International Society for Optical Engineering | 2007

An efficient indexing scheme for binary feature based biometric database

Phalguni Gupta; A. Sana; Hunny Mehrotra; C. Jinshong Hwang

The paper proposes an efficient indexing scheme for binary feature template using B+ tree. In this scheme the input image is decomposed into approximation, vertical, horizontal and diagonal coefficients using the discrete wavelet transform. The binarized approximation coefficient at second level is divided into four quadrants of equal size and Hamming distance (HD) for each quadrant with respect to sample template of all ones is measured. This HD value of each quadrant is used to generate upper and lower range values which are inserted into B+ tree. The nodes of tree at first level contain the lower and upper range values generated from HD of first quadrant. Similarly, lower and upper range values for the three quadrants are stored in the second, third and fourth level respectively. Finally leaf node contains the set of identifiers. At the time of identification, the test image is used to generate HD for four quadrants. Then the B+ tree is traversed based on the value of HD at every node and terminates to leaf nodes with set of identifiers. The feature vector for each identifier is retrieved from the particular bin of secondary memory and matched with test feature template to get top matches. The proposed scheme is implemented on ear biometric database collected at IIT Kanpur. The system is giving an overall accuracy of 95.8% at penetration rate of 34%.


2010 International Workshop on Emerging Techniques and Challenges for Hand-Based Biometrics | 2010

Multispectral Palm Image Fusion for Person Authentication Using Ant Colony Optimization

Dakshina Ranjan Kisku; Phalguni Gupta; Jamuna Kanta Sing; C. Jinshong Hwang

This paper presents an intra-modal fusion environment to integrate multiple raw palm images at low level. Fusion of palmprint instances is performed by wavelet transform and decomposition. To capture the palm characteristics, fused image is convolved with Gabor wavelet transform. The Gabor wavelet feature representation reflects very high dimensional space. To reduce the high dimensionality, ant colony optimization algorithm is applied to select relevant, distinctive and reduced feature set from Gabor responses. Finally, the reduced set of features is trained with support vector machines and accomplished user recognition tasks. For evaluation, CASIA multispectral palmprint database is used. The experimental results reveal that the system is found to be robust and encouraging while variations of classifiers are used. Also a comparative study is presented of the proposed system with a well-known method.


global mobile congress | 2009

A hybrid stable routing protocol for mobile ad hoc networks

Ashwani Kush; Phalguni Gupta; C. Jinshong Hwang

A flat mobile ad hoc network has an inherent scalability limitation in terms of achievable network capacity. It is seen that when the network size increases, per node throughput of an ad hoc network rapidly decreases. This is due to the fact that in large scale networks, flat structure of networks results in long hop paths which are prone to breaks. The break is more of two reasons as break in route and power depletion. The long hop paths can be avoided by using backbone nodes concept working as mobile backbone network (BN). There are some specific backbone power capable nodes functionally more capable than ordinary nodes, and power concept can be used to provide stable routing. In this paper, a hybrid routing protocol for large scale networks with mobile backbone nodes and power factor has been proposed. Finally, the NS-2 network simulator has been used for the realistic simulation of the proposed protocol. The simulation results of the proposed routing protocol for networks of different sizes and mobility speeds show that proposed routing protocol performs better compared to other protocols.


global mobile congress | 2011

Making MANET Energy Efficient

C. Jinshong Hwang; Ashwani Kush; Sunil Taneja

A recent trend in ad hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category, however, use single route and do not utilize multiple alternate paths. This paper proposes a scheme to improve existing on-demand routing protocols by introducing the power aware virtual node scheme in whole scenario. The scheme establishes the multi paths without transmitting any extra control message. It offers quick adaptation to distributed processing, dynamic linking, low processing and memory overhead and loop freedom at all times. This scheme uses the concept of Power awareness among route selection nodes. It is done by checking power status of each node in the topology which insures fast selection of routes with minimal efforts and faster recovery. The scheme is incorporated with the Ad-hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol and the performance has been studied through simulation.


international association of computer science and information technology | 2009

Proposed Protocol for Secured Routing in Ad Hoc Networks

Ashwani Kush; C. Jinshong Hwang

A recent trend in Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Most of the protocols in this category are not incorporating proper security features. The ad hoc environment is accessible to both legitimate network users and malicious attackers. It has been observed that different protocols need different strategies for security. The Hashing approach has been adopted in the proposed scheme of this paper. This scheme can make most of the on demand protocols secure. The study will help in making protocols more robust against attacks and standardize parameters for security in routing protocols. The proposed scheme has been evaluated using NS2 and compared with existing scheme. The study will help in making protocol more robust against attacks and standardizing parameters for security in routing protocols.


future technologies conference | 2016

A palmprint based recognition system for smartphone

Kamlesh Tiwari; C. Jinshong Hwang; Phalguni Gupta

This paper proposes a palmprint based human identification system for smartphone. It presents simple markers to the user for palmprint video acquisition and suggests a strategy to autimatically select the best frame for recognition. Performance of the system has been evaluated by using two popular feature extraction techniques viz. SIFT and ORB. Histogram equalization is used for image enhancement. A palmprint database of 51 users has been collected by using Samsung Galaxy Grand I-9082 smartphone to test the system. Experimental results have shown acceptable system performance by achieving correct recognition rate (CRR) and equal error rate (EER) of 96.07% and 5.5% respectively on the database.


international conference on innovative computing technology | 2015

Performance evaluation of manet using quality of service metrics

C. Jinshong Hwang; Ashwani Kush; Ruchika

An ad hoc network is a collection of mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Several routing protocols have been proposed for ad hoc networks and prominent among them are Ad hoc On Demand Distance Vector Routing (AODV) and Dynamic Source Routing (DSR). Effort has been made to merge software Quality assurance parameters to adhoc networks to achieve desired results. This Paper analyses the performance of AODV and DSR routing protocols for the quality assurance metrics. The performance differentials of AODV and DSR protocols are analyzed using NS-2 simulator and compared in terms of quality assurance metrics applied.


future technologies conference | 2016

Big data analytics on MANET routing standardization using quality assurance metrics

Ashwani Kush; C. Jinshong Hwang; Vishal Dattana

An ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure or centralized administration. Routing in ad-hoc network is a challenging issue. Big data analytics have been suggested for proper evaluation and decision making in routing and placement of ad hoc network nodes. This Paper analyses the performance of AODV and DSR routing protocols for the quality assurance metrics. The performance differentials of AODV and DSR protocols are analyzed using NS-2 which is the main network simulator, NAM (Network Animator) and compared in terms of scales applied on Packet Delivery Ratio (PDR), in different environments specified by varying pause time, speed and number of nodes.


Journal of Signal and Information Processing | 2012

Human Identity Verification Using Multispectral Palmprint Fusion

Dakshina Ranjan Kisku; Ajita Rattani; Phalguni Gupta; Jamuna Kanta Sing; C. Jinshong Hwang


International Journal of Computer Theory and Engineering | 2009

Secured Routing Scheme for Adhoc Networks

Ashwani Kush; Phalguni Gupta; C. Jinshong Hwang

Collaboration


Dive into the C. Jinshong Hwang's collaboration.

Top Co-Authors

Avatar

Phalguni Gupta

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dakshina Ranjan Kisku

National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. Sana

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

Kamlesh Tiwari

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

Ruchika

Kurukshetra University

View shared research outputs
Top Co-Authors

Avatar

Vinay Rishiwal

M. J. P. Rohilkhand University

View shared research outputs
Top Co-Authors

Avatar

Ajita Rattani

University of Missouri–Kansas City

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge