Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gaurav Raj is active.

Publication


Featured researches published by Gaurav Raj.


international conference system modeling advancement research trends | 2016

Blur image detection using Laplacian operator and Open-CV

Raghav Bansal; Gaurav Raj; Tanupriya Choudhury

With the increased usage of digital cameras and picture clicking devices, the number of digital images increases rapidly, which in return demand for image quality assessment in terms of blur. Based on the edge type and sharpness analysis using Laplacian operator, an effective representation of blur image detection scheme is proposed in this paper, which can determine that whether the image is blurred or not, and what is the extent of blur through Variance of Laplacian. In this project a simple, reliable and fast algorithm for image noise estimation is presented. Images taken for the testing is assumed to be corrupted by additive zero mean Gaussian noise. To exclude structures or details from contributive to the noise variance estimation, an easy edge detection algorithm inculcating first-order gradients is applied first. Then a Laplacian operator followed by an averaging over the whole image will provide very accurate noise variance estimation. There is only one parameter which is self-determined and adaptive to the image contents. Simulation results show that the proposed algorithm performs well for different types of images over a large range of noise variances. Performance comparisons against alternative approaches are also provided. Results obtain through screenshots of the experiments demonstrate the effectiveness of the proposed scheme.


international conference cloud system and big data engineering | 2016

Application and scope analysis of Augmented Reality in marketing using image processing technique

Shivnarayan Rajappa; Gaurav Raj

The main aim of the research paper is to understand the concept and applications of Augmented Reality (AR). It involves understanding the process of creation of an AR image, the hardware and software requirements for the process of making such an image. The paper also focuses on the ways in which the technology is used by firms and advertisers to give customers a better user experience. AR is a growing field with a lot of scope in the future, the paper also gives an insight on what is in store for AR in the near future.


Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference - | 2014

A novel high adaptive fault tolerance model in real time cloud computing

Parveen Kumar; Gaurav Raj; Anjandeep Kaur Rai

Now-a-days, cloud computing is being used in a variety of fields, whether it is storage, computation, education etc. It has emerged from a larger number of technologies like utility computing, grid computing, cluster computing etc. It offers a number of advantages like on-demand access, resource pool, device independence etc. Also, it suffers from various cons like security, workflow management, fault tolerance. Here, a novel model (HAFTRC) has been proposed, which is providing high adaptive fault tolerance in real time cloud computing. The model is based on computing the reliabilities of the virtual machines on the basis of the cloudlets, mips, ram and bandwidth etc. Whosoever virtual machine has the highest reliability is chosen as the winning virtual machine. If at the end, there are two virtual machines, whose reliabilities comes out to be same, then the winning machine is chosen base on the priority that is assigned to them.


international conference on information technology | 2016

An analysis of ICON aircraft log through sentiment analysis using SVM and Naive Bayes classification

Harshit Sinha; Rahul Bagga; Gaurav Raj

A more of work has been made to check the content of the social websites, especially the posts or the views of the users; their sentiment analysis has to be done. The main aim is to analyze the sentiments and then to compare those views with the main topics and other platforms. There are enormous amount of the posts given by the users on the social websites. But some of the people are interested in knowing the influence and the relations among those posts. Many of the researchers find the influence of the post on these social websites. But, we cannot find the influence of these posts without knowing the sentiments of the posts. Here we have discussed various methodologies for the sentiment analysis. Online reviews are important for the developers to improve their products and can compete in the market properly. There are several dimensions which help us to know the sentiment of the reviews on the websites. These analyses are also used to find some patterns and draw the conclusions. Hence we can find the favorable and as well as unfavorable parts of the posts. These reviews are important to analyze but there are a very few techniques to determine the sentiment of the reviews [2]. For example, one has given the approach to know the multidimensional rating from various reviews. From the vast amount of reviews on the internet based on different areas, it is very important to know about the different sentiments of the people.


Archive | 2016

Analysis of Role-Based Access Control in Software-Defined Networking

Priyanka Kamboj; Gaurav Raj

Lack of interoperability of traditional networking architecture reduces the network’s speed, reliability, and security. Software-defined networking has decoupled control plane and data plane in order to configure the existing architecture. The OpenFlow protocol used for communication in software-defined network has been discussed in this paper [1, 2]. The main aim of the research paper is to implement role-based control model in the software-defined networking environment in order to provide more security [3, 4]. The paper also outlines about the reduction in packet loss and latency using it in software-defined network environment [5, 6].


international conference on next generation computing technologies | 2015

Enhancement of security mechanism for confidential data using AES-128, 192 and 256bit encryption in cloud

Gaurav Raj; Ram Charan Kesireddi; Shruti Gupta

T Cloud computing is facing several issues regarding security. To provide security major companies are using Advance Encryption Standard (AES) encryption technology. AES is using mainly 3 types of encryption keys: 128bit key encryption, 192bit key encryption and 256bit key encryption which are using 10, 12 and 14 iterations respectively. All these are using the plain text block of size 128bit. In proposed architecture, the cloud user will be facilitated with all the 3 encryption techniques 128, 192 and 256bits to choose and based on the size of the data the encryption process can be done. By that they can make easy to store their data by using this three encryption techniques.


international conference on futuristic trends on computational analysis and knowledge management | 2015

Emphasis on testing assimilation using cloud computing for improvised agile SCRUM framework

Gaurav Raj; Komal Yadav; Arunima Jaiswal

In todays era service development demand increasing day by day and clients ever changing requirements which made agile methodology to come in existence due to faster production, flexible, improved quality and moreover it can accommodate changes, faster feedbacks and transparent communication. But now Due to geographical distribution of team members and client, leading IT thinkers thought to strengthen the agile methodology by giving users access an environment that has wide-spread access i.e CLOUD. This combination of agile and cloud provide a positive impact to IT companies. But for achieving Quality, we need to test all functionality so in our work we emphasis on testing assimilation using cloud services in agile environment. Cloud team members can perform testing easily using Test-as-a-Service without increasing the cost of the project and get the results faster. We can also use agile management tools to reduce the problem of communication and for all the updates in the product backlog as well as Sprint backlog list.


Proceedings of the 2015 International Conference on Advanced Research in Computer Science Engineering & Technology (ICARCSET 2015) | 2015

Embedding, Extracting and Matching of Fingerprint Images using Digital Watermarking

Ram Charan Kesireddi; Gaurav Raj

The conventional digital watermarking scheme uses an arbitrary digital pattern as the watermark which has limitations in proving ownership of the watermark. The issue of ownership watermark is addressed. The bio-metric pattern of fingerprint is used to generate the digital watermark that has a stamp of ownership. The generated watermark has been studied for uniqueness and identification and has been used to watermark digital images. Discrete cosine transformation is used for embedding the watermark in the image.


Confluence The Next Generation Information Technology Summit (Confluence), 2014 5th International Conference - | 2014

A pragmatic validation of stylometric techniques using BPA

Pushpendra Kumar Pateriya; Lakshmi; Gaurav Raj

There are many modes of communication, but electronic communication is the most noted one in present. Internet is the backbone for all these communications. In digital forensics, finding out the author of a document is a big qestion, identity of the author, their demographic background, and how they are linked to other documents. So major challenges in digital forensic investigation are author identification of message(s) and non-repudiation. In this paper we used Stylometry based human writing feature extraction as a solution for the author identification problem. Stylometry is not only a way of human writing pattern identification but it can also be used for human gender identification. This paper is oriented to highlight some of the ways to manage such problems like anonymous email messages, email abuse and even for the digital forensics. In this paper, 62 stylistic features have been collected for different users, using C language. 22 samples of 150 words for each user have been taken to train the Neural Network using Back Propagation Algorithm(BPA). In different variations of the experimental setup, 98.312% accuracy have been achieved.


Archive | 2018

An Extensive Review on Verbal-Guided Image Parsing

Pankhuri Agrawal; Tanupriya Choudhury; Praveen Kumar; Gaurav Raj

Verbal-guided image parsing is the window to the coming generation of luxurious ease, when all the remote controls that we need for the array of electronics we own come together at one place, with no need of going through manuals. Basic commands can be given to the program verbally by the user and the same is fulfilled. Electronic devices can be attached to the program which can utilise real-time information and demonstrate the optimisation in a virtual-induced real-time environment.

Collaboration


Dive into the Gaurav Raj's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dheerendra Singh

Chandigarh College of Engineering and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge