Devesh Kumar Srivastava
Manipal University Jaipur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Devesh Kumar Srivastava.
international conference on contemporary computing | 2014
Ankit Shrivastava; Devesh Kumar Srivastava
A literature survey of some techniques used to extract features of a fingerprint as well as matching them with the database is specified in this paper. Some of the surveyed research papers have used traditional procedures such as identification techniques and verification techniques, whereas the other articles have used novel methods. To design and develop a fingerprint feature extraction method and to match them using pixel details, first of all fingerprints of good quality are acquired using a high resolution scanner. Image enhancement and thinning could be done. Finally features are extracted and estimated. These estimated features are used to match with the template database using pixel based matching algorithm. The features are unique, which allow a single feature to be suitably matched with high possibility against a large database of features.
Archive | 2016
Jeril Kuriakose; V. Amruth; R Jaya Krishna; Devesh Kumar Srivastava
Sensor networks is an evolving technology and a hot exploration subject among scientists due to their tractability and individuality of network substructures, such as base stations, wireless access points, and moveable nodes. Sensor networks are widely used for solicitations, such as construction, traffic observation, and territory monitoring and several other scenarios. Wireless sensor network (WSN) makes a network malleable enough to go over concrete structures and it also evades lot of cabling. The primary encounters faced in WSN are security, and the hiatus in security leads to other constrains in energy efficiency, network life, and communication overhead. The hiatus in safekeeping the network is mostly because deficiency of the overriding of wave propagation, and computing constraints. In this paper, we have deliberated about numerous diversities of attacks in WSN, and their aftermath to the network.
Archive | 2018
Ashish Kumar; Monika Saini; Devesh Kumar Srivastava
The main concentration of the present study is to carry out the profit analysis of a computing machine using the concepts of priority to software rejuvenation over hardware component’s preventive maintenance and hardware repair. For this purpose, a stochastic model is designed which comprises of two identical units. Cold standby redundancy technique is used in the development of the model. A single repair facility remains available with the system to do all repair activities, and he takes the system for preventive maintenance after a specific period of time. All repair and maintenance are perfect. The random variables are all Weibull-distributed. Using semi-Markov processes, Laplace transformation, and regenerative point technique recurrence relations and numerical results are obtained for various measures of system effectiveness.
Iet Image Processing | 2018
Vijay Kumar Sharma; Devesh Kumar Srivastava; Pratistha Mathur
Steganography is used for secret or covert communication. A graph wavelet transform-based steganography using graph signal processing (GSP) is presented, which results in better visual quality stego image as well as extracted secret image. In the proposed scheme, graph wavelet transforms of both the cover image and transformed secret image (using Arnold cat map) are taken followed by alpha blending operation. The GSP-based inverse wavelet transform is performed on the resulting image, to get the stego image. Here, the use of GSP increases the inter-pixel correlation that results in better visual quality stego and extracted secret image as shown in simulation results. Simulation results show that the proposed scheme is more robust than other existing steganography techniques.
Advances in intelligent systems and computing | 2017
Devesh Kumar Srivastava; Priyanka Nair
In early 1960s, intricacy of software systems led to a call for the emergence of the concept of Software Reuse. Rather than building software applications from genesis, software reuse consents creating software systems from existing software. Efficient software reuse programs implemented by the firms may increase their productivity and value, thereby giving the organizations headway. Several reuse metric and models reign the software industry. Reuse assessment commit to high quality and economic system development. Despite its commencement as a potent vision, software reuse has botched to become a part of the typical software engineering practice. The paper is an attempt to articulate the notion of software reuse and the concerning issues. Reusability facet has been conferred analogous to OO paradigm and agile development. Here the concept of reuse has been addressed as a combination of artifacts as well as individual components.
international conference on information and communication technology | 2016
Manjeet Gupta; Devesh Kumar Srivastava; Durg Singh Chauhan
Recent years have been advanced in cloud computing technology. Virtualization supports cloud computing to virtualize the resources to provide software-as-a-service, infrastructure-as-a-service and platform-as-a-service mainly. Many Virtual Machines are used in computing which gives flexibility, agility and scalability to the cloud resources that allow manipulating their Virtual Machines. Virtualized computing provides the virtual machines to client to access the resources at remote locations. Virtualization gives the features of resource utilization, isolation among hardware, operating system and software. Virtualization gives the features of multitenancy for simultaneously access of Virtual Machines, which machines are allocated in single physical machine. Virtual machine can be created, copied and migrated. This flexibility leads to security challenges. This paper presents an analysis report of the current security vulnerabilities in virtualization.
Archive | 2016
Ankit Shrivastava; Devesh Kumar Srivastava
This paper presents a review study on binarization of gray images. Binarization is a technique by which an image is converted into bits. It is an important step in most document image analysis systems. Since a digital image is a set of pixels. Many binarization techniques have a definite intensity value for each pixel. A gray image is just an image which has each pixel of same intensity. That means there is not much difference in color or value information of pixels. Usually, a picture in black and white is considered as gray image in which black has least intensity and white have highest.
2013 IEEE International Conference in MOOC, Innovation and Technology in Education (MITE) | 2013
Devesh Kumar Srivastava; Rishi Mathur
College and Universities are experiencing significant growth in students enrollment that is why it is very important to innovate new trends, technologies which shape students, faculties to be fresh, energetic during the whole day. Innovation is an important ingredient of development. Changes are occurring at pace faster than ever. The information is available for everyone instantaneously and thus focus of students is shifting from traditional classroom teaching to being self-informed via internet. This calls for a change both in the content which is being taught and in the methodology of the teaching. In this paper we will discuss, some of the existing innovative methods like playing games software based on Android and its algorithms which are being used to express the most pressing needs of the world through the methodologies which seem lucid but prove highly effective in keeping the students engaged. We will then discuss how these methods can be further modified in order to make them most efficient and propose teaching methodologies for android development and algorithms.
Archive | 2018
Priyanka Dahiya; Devesh Kumar Srivastava
With the rising of enormous size in any field be in astronomy, health or education. Storage, analysis, and processing of big data are not only the big issue but security of these huge data is now big concern in the field of academia and industry. Network intrusion detection systems detect and stop network behaviors that interrupt or threaten network security. Supervised learning methods for intrusion detection are not so effective in detection of attacks of big data. Unsupervised models are mainly used for the detection of events or attributes that occur together. A new parallel K-medoid clustering method and k-nearest neighbor classification techniques are proposed for intrusion detection for huge amount of data. We have used NSL-KDD and UNSW-NB-15 datasets for experimental work. The results are compared with the proposed method. Experiments are performed in Hadoop environment and the performance is evaluated using accuracy, precision and confusion matrix.
Archive | 2018
Nitin Arora; Devesh Kumar Srivastava; Roheet Bhatnagar
Traditionally, software was developed by writing a main method which invoked many subroutines. Each subroutine was programmed as a specific part of the program based on the given requirements and function partitions. Software engineers called for enhanced software quality, timely, at reduced costs and hence adopted the use of reusable components. This work intends at designing and augmenting generic software components for admission management system domain using OOPs methods. The analysis of major admission management system functions, data and behaviors has been taken herewith. Also, pattern-based domain engineering was conducted so as to identify the structure points thereby factoring out generically reusable components.