J. P. Gupta
Jaypee Institute of Information Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by J. P. Gupta.
international conference on computer science and information technology | 2010
Manish K Thakur; Vikas Saxena; J. P. Gupta
Rapid growth in sharing information using internet technologies laid the threats of copyright protection for digital multimedia contents. One of the remedy for intellectual property protection is Watermarking. This paper deals with numerous available digital video watermarking techniques and raised the issue of quality and size of watermarked video. Through experimental study, it has been shown that available quality metrics like, Peak signal to noise ratio (PSNR) and Structural similarity index (SSIM) are incapable to deal efficiently to analyze the quality degradation but out of two it has been claimed that SSIM results are more accurate as it is closer to the results obtained during subjective quality analysis. Further, using available video watermarking tools, variation in size of video has been analyzed.
signal processing and communications applications conference | 2007
Vikas Saxena; J. P. Gupta
Image Watermarking with both insensible detection and high robustness capabilities is still a challenging problem for copyright protection up to now. This paper presents a new scheme for watermarking of still image by introducing redundancy in conjunction with low frequency coefficient, in classical middle frequency coefficients exchange scheme to make it collusion attack resistant. Experimental results show the robustness of the proposed scheme against the JPEG compression and other common image manipulations.
international conference on computer engineering and technology | 2010
Gagandeep Kaur; Vikas Saxena; J. P. Gupta
Network Anomaly Detection covers wide area of research. Current best practices for identifying and diagnosing traffic anomalies consist of visualizing traffic from different perspectives and identifying anomalies from prior experience. Different tools have been developed to automatically generate alerts to failures, but to automate the anomaly identification process remains a challenge. Recently, Signal Processing techniques have found applications in Network Intrusion Detection System because of their ability in detecting novel intrusions and attacks, which cannot be achieved by signature-based detection systems. Visualization techniques are ways of creating and handling graphical representations of data. This survey explains the main techniques known in the field of Statistical based and Wavelet based anomaly detection approaches and focuses on the role of data traffic visualization tools in network traffic anomaly detection.
Journal of Information Processing Systems | 2012
Sandeep Kumar Singh; Sangeeta Sabharwal; J. P. Gupta
Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test ma Safety critic Safety critical systems, real time systems, and event-based systems have a complex set of events and their own interdependency, which makes them difficult to test manually. In order to cut down on costs, save time, and increase reliability, the model based testing approach is the best solution. Such an approach does not require applications or codes prior to generating test cases, so it leads to the early detection of faults, which helps in reducing the development time. Several model-based testing approaches have used different UML models but very few works have been reported to show the generation of test cases that use events. Test cases that use events are an apt choice for these types of systems. However, these works have considered events that happen at a user interface level in a system while other events that happen in a system are not considered. Such works have limited applications in testing the GUI of a system. In this paper, a novel model-based testing approach is presented using business events, state events, and control events that have been captured directly from requirement specifications. The proposed approach documents events in event templates and then builds an event-flow model and a fault model for a system. Test coverage criterion and an algorithm are designed using these models to generate event sequence based test scenarios and test cases. Unlike other event based approaches, our approach is able to detect the proposed faults in a system. A prototype tool is developed to automate and evaluate the applicability of the entire process. Results have shown that the proposed approach and supportive tool is able to successfully derive test scenarios and test cases from the requirement specifications of safety critical systems, real time systems, and event based systems
international conference on emerging trends in engineering and technology | 2009
Sandeep Kumar Singh; Sangeeta Sabharwal; J. P. Gupta
Use Case has been one of the popular ways to start Object-Oriented Analysis (OOA). But several problems have been cited with Use Case in the literature. Our previous work has shown that domain requirements can be broken in terms of events. We have documented events derived from requirements as Event Pattern/ Template and proposed an Event Meta-Model. This paper describes a detailed process to show how our basic Event Meta-model and patterns can help us systematically derive the classes, their attributes, methods and relationships. For this, we have worked on elaborating on the details of our Event Pattern/ Templates; defined rules to transform the event templates to class specifications. To validate our process, we applied it on various case studies and successfully generated static model (class diagram) of each case. Hence, events can be an alternative to Use Case as starting point in OOA of requirements.
Archive | 2008
Sandeep Kumar Singh; Sangeeta Sabharwal; J. P. Gupta
Object Oriented Analysis (OOA) of requirements has always been the most difficult, critical and an important step in developing applications using object-oriented paradigm. Identification of types of objects from the requirements is the primary goal of every OOA. Most commonly recommended approach to identify objects is to search for nouns directly from the requirements or indirectly from the Use Cases derived from requirements. Experience has shown that both these approaches are inefficient in their own ways. In this paper, we have proposed a new approach of capturing Object Oriented requirements based on analysis of events and actions occurring in the system and then identify all static and dynamic components of the system from it. Our approach captures requirements in the form of Event Patterns that are templates in our Event-oriented approach analogous to Use Cases in the conventional Object-orientation. These templates are used in finding out object oriented components of the system during the process of OOA. We have also proposed an Event Meta-model that forms the basis of our event based class identification process.
advances in recent technologies in communication and computing | 2009
Sandeep Kumar Singh; Sangeeta Sabharwal; J. P. Gupta
This paper presents, a domain independent tool, developed in JAVA that automates the process of extraction, analysis and classification of events from textual requirements, expressed in English as a Natural Language. A study on various existing event extraction tools shows that they are either domain specific or take events as actions that occur at a particular time. There is no tool which extracts events that represent system behavior and at the same time gives a result that can be reused for application in multiple domains. This tool also assists the analysts in further refining events that are identified or to add some new events relevant to application domain. Tool has been tested on several case studies from different domains and has given very promising results.
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia | 2010
Divakar Yadav; Ashish Kumar Sharma; J. P. Gupta
World Wide Web (WWW) is a huge repository of interlinked hypertext documents known as web pages, spread all over the world on thousands of web servers. User looking to get the required information from WWW uses Search engine interface where they provide their search queries. In response, Search engines use their database to search the relevant documents and produce the result after ranking on the basis of relevance. It generally happens that the entire results produced by search engines may not be relevant to the user. When the users do not get the desired information, they modify the search query again and again till they get the desired information or get tired. The situation becomes more cumbersome when the results produced by the search tools are outdated especially when a bad URL is reported. Owing to the problems faced by users, a survey was being conducted to carry out some quantitative studies that can supplement in better understanding of the users behavior/requirement while using search engine and consequently helping to improve its working.
nature and biologically inspired computing | 2009
Sandeep Kumar Singh; Reetesh Gupta; Sangeeta Sabharwal; J. P. Gupta
Events give important information about the behavior of a system in a summarized form. In the past, events have played an important role in breaking the functional requirements of the system in the “Event Partitioning Approach”. Our previous work has shown that Events can be a starting point in Object-Oriented Analysis of requirements. Every event triggers a Use Case in the system, hence should get a priority in identifying and analyzing requirements over Use Cases. In any system there is plethora of events happening, some are important to be recorded, while others are to be ignored. Moreover, there are various perspectives to define events. Thus, it becomes important to have an automated process that could help not only in extracting events but also analyze and classify them into various types. A study on various existing event extraction tools shows that they are either domain specific or take events as actions that occur at a particular time. There is no tool which extracts events that represent system behavior and at the same time gives a result that can be reused for application in multiple domains. This paper presents, a domain independent tool, developed in JAVA that automates the process of Extraction, Analysis and Classification of Events from Textual Requirements expressed in English as a Natural Language. This tool also assists the analysts in further refining identified events and to add some new events in the application domain. Tool has been tested on several case studies from different domains and has given very promising results.
international conference on contemporary computing | 2010
Sandeep Kumar Singh; Sangeeta Sabharwal; J. P. Gupta
In order to increase quality and productivity of software, weaknesses must be identified in the software development process. Software metrics play a central role in identifying such weaknesses. High complexity of software is also one of the weaknesses. Identifying it in the early analysis stage can reduce cost, time and efforts. In this paper, a model-based approach is proposed to derive software metrics for measuring system complexity. The proposed metric measures the complexity of system on the basis of event flows and their interdependencies. Events taking place in the system are represented using Event Templates. An Event-Flow Model is then constructed from Event Templates and is represented as Event-Flow Graph. The proposed Event-Flow Complexity metric for analysis model is derived from Event-Flow Graph. The metric has also been evaluated in terms of Weyuker’s properties. Results of evaluation show that it satisfies 8 out of 9 Weyuker’s properties.