Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Krishna Asawa is active.

Publication


Featured researches published by Krishna Asawa.


Journal of intelligent systems | 2015

EMIA: Emotion Model for Intelligent Agent

Shikha Jain; Krishna Asawa

Abstract Emotions play a significant role in human cognitive processes such as attention, motivation, learning, memory, and decision making. Many researchers have worked in the field of incorporating emotions in a cognitive agent. However, each model has its own merits and demerits. Moreover, most studies on emotion focus on steady-state emotions than emotion switching. Thus, in this article, a domain-independent computational model of emotions for intelligent agent is proposed that have modules for emotion elicitation, emotion regulation, and emotion transition. The model is built on some well-known psychological theories such as appraisal theories of emotions, emotion regulation theory, and multistore human memory model. The design of the model is using the concept of fuzzy logic to handle uncertain and subjective information. The main focus is on primary emotions as suggested by Ekman; however, simultaneous elicitation of multiple emotions (called secondary emotion) is also supported by the model.


Archive | 2015

EmET: Emotion Elicitation and Emotion Transition Model

Shikha Jain; Krishna Asawa

Emotion is an important part of human cognition. In one or other way, emotion influences various cognition processes. For the past few decades, researchers are working for the integration of emotions and cognition. In this paper, we are proposing a model for emotion elicitation and emotion transition. The model is based upon the well known appraisal theory of emotions and targets five primary emotions. Since emotions are continuous in nature, they keep on changing either due to another event that occurred in sequence (known as emotion transition) or due to time lapse (called emotion decay). Simultaneous emotion elicitation is also supported by the model. The design of model is using concept of linguistic variables and if-then rules.


International Journal of Synthetic Emotions | 2015

Emotional Computer: Design Challenges and Opportunities

Shikha Jain; Krishna Asawa

Extensive studies established the existence of a close interaction between emotion and cognition with remarkable influence of the emotion on all sorts of cognitive process. Consequently, technologies that emulate human intelligent behavior cannot be thought completely intelligent without incorporating interference of emotional component in the rational reasoning processes. Recently, several researchers have been started working in the field of emotion modeling to cater the need of interactive computer applications that demand human-like interaction with the computer. However, due to the absence of structured guidelines, the most challenging task for the researcher is to understand and select the most appropriate definitions, theories and processes governing the human psychology to design the intended model. The objective of the present article is to review the background scenario and necessary studies for designing emotion model for a computer machine so that it could generate appropriate synthetic emotions while interacting with the external environmental factors.


Computers & Security | 2017

Modeling and analyses of IP spoofing attack in 6LoWPAN network

Monali Mavani; Krishna Asawa

Abstract 6LoWPAN (modified version of IPv6 for low power devices) inherits security threats from its predecessor protocols, IPv4 and IPv6. IP spoofing is one such classic attack. There are vulnerabilities in 6LoWPAN and associated routing protocol, which open up new spoofing paths to the attacker. This study aims at profiling the feasibility to carry IPv6 spoofing attack on the 6LoWPAN network. Two new different attack paths are identified, which associate wrong IPv6 address with the MAC address of a node. These two paths use spoofed RPL and 6LoWPAN-ND messages to perform the IPv6 spoofing attack in an unsecured wireless medium. Probability of attack success is analyzed using the radio propagation environment parameters which affect the correct reception of a signal. It is shown that the success of an attack is highly dependent on the signal path loss. To perform the systematic mathematical analysis, attack tree model is used and attack is simulated in cooja simulator as well as performed in real experimental network. Our mathematical and simulated analysis show that path loss exponent, which represents distance based path loss, affects the probability of attack success. Attack feasibility analysis is done to find the cost to the attacker with respect to energy and memory consumption. It is observed that attacker code can be accommodated in memory constrained devices, and uses less energy to perform the attack, which manifests its feasibility.


International Journal of Interactive Multimedia and Artificial Intelligence | 2015

GPGPU Implementation of a Genetic Algorithm for Stereo Refinement

Shikha Jain; Krishna Asawa

During the last decade, the general-purpose computing on graphics processing units Graphics (GPGPU) has turned out to be a useful tool for speeding up many scientific calculations. Computer vision is known to be one of the fields with more penetration of these new techniques. This paper explores the advantages of using GPGPU implementation to speedup a genetic algorithm used for stereo refinement. The main contribution of this paper is analyzing which genetic operators take advantage of a parallel approach and the description of an efficient state- of-the-art implementation for each one. As a result, speed-ups close to x80 can be achieved, demonstrating to be the only way of achieving close to real-time performance.


International Journal of Interactive Multimedia and Artificial Intelligence | 2014

Recognition of Emotions using Energy Based Bimodal Information Fusion and Correlation

Krishna Asawa; Priyanka Manchanda

Multi-sensor information fusion is a rapidly developing research area which forms the backbone of numerous essential technologies such as intelligent robotic control, sensor networks, video and image processing and many more. In this paper, we have developed a novel technique to analyze and correlate human emotions expressed in voice tone & facial expression. Audio and video streams captured to populate audio and video bimodal data sets to sense the expressed emotions in voice tone and facial expression respectively. An energy based mapping is being done to overcome the inherent heterogeneity of the recorded bi-modal signal. The fusion process uses sampled and mapped energy signal of both modalities�s data stream and further recognize the overall emotional component using Support Vector Machine (SVM) classifier with the accuracy 93.06%.


international conference on cloud computing | 2017

Experimental study of IP spoofing attack in 6LoWPAN network

Monali Mavani; Krishna Asawa

6L0WPAN is a communication protocol for Internet of Things. 6LoWPAN is IPv6 protocol modified for low power and lossy personal area networks. 6LoWPAN inherits threats from its predecessors IPv4 and IPv6. IP spoofing is a known attack prevalent in IPv4 and IPv6 networks but there are new vulnerabilities which creates new paths, leading to the attack. This study performs the experimental study to check the feasibility of performing IP spoofing attack on 6LoWPAN Network. Intruder misuses 6LoWPAN control messages which results into wrong IPv6-MAC binding in router. Attack is also simulated in cooja simulator. Simulated results are analyzed for finding cost to the attacker in terms of energy and memory consumption.


Expert Systems With Applications | 2016

Programming an expressive autonomous agent

Shikha Jain; Krishna Asawa

Proposed integration of emotion dynamics in rational agent.Modified the life cycle of an autonomous agent to percept-appraise-elicit-act.Redefined syntax, semantics & deliberation cycle of 2APL to incorporate emotions. Emotions are the integral part of human cognitive processes. To make an artificial agent more human-like, agent programming languages should be able to model the emotion based artificial agent. To address the need of incorporation of emotions in agent programming languages, recently, extension of 2APL with emotions is proposed by the researchers. However, they were unable to program complex emotion dynamics, due to integration complexities associated with advanced emotive models. They have modified 2APL by designing E-rules, coping rules, and an interface-Affect Engine. The Affect Engine establishes a link between the modified 2APL and a rather simpler emotion model, ALMA. Here, we propose the programming constructs for integrating an advanced yet rule based emotion model, EMIA, in line with the 2APL. The fusion of both has been carried out by redefining the syntax, semantics and deliberation cycle of the 2APL. These redefinitions lead to the required transformation in the dialect cycle; from the sense-interpret-act to percept-appraisal-elicitation-act. The proposed novel programming constructs and pragmatics enable flexible and adaptive emotional behavioral modeling for an expressive autonomous agent with domain independent emotion elicitation, emotion regulation and emotion transition processes. The simulation results show high believability in the emotions expressed by the agent while responding to the real life scenarios.


Central European Journal of Computer Science | 2014

Building a 256-bit hash function on a stronger MD variant

Harshvardhan Tiwari; Krishna Asawa

Cryptographic hash functions are important cryptographic techniques and are used widely in many cryptographic applications and protocols. All the MD4 design based hash functions such as MD5, SHA-1, RIPEMD-160 and FORK-256 are built on Merkle-Damgård iterative method. Recent differential and generic attacks against these popular hash functions have shown weaknesses of both specific hash functions and their underlying Merkle-Damgård construction. In this paper we propose a hash function follows design principle of NewFORK-256 and based on HAIFA construction. Its compression function takes three inputs and generates a single output of 256-bit length. An extra input to a compression function is a 64-bit counter (number of bits hashed so far). HAIFA construction shows strong resistance against major generic and other cryptanalytic attacks. The security of proposed hash function against generic attacks, differential attack, birthday attack and statistical attack was analyzed in detail. It is shown that the proposed hash function has high sensitivity to an input message and is secure against different cryptanalytic attacks.


world congress on information and communication technologies | 2012

Therapeutic video tagging model

Hima Bindu Maringanti; Krishna Asawa; Naman Agarwal; Radhika Agarwal

The present work aims to develop a model to categorize and tag videos according to the emotion elicited by them on the viewer by video content analysis. Recommend videos according to the current emotional state of the user in order to prevent him/her from entering into an extreme emotional state.

Collaboration


Dive into the Krishna Asawa's collaboration.

Top Co-Authors

Avatar

Harshvardhan Tiwari

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Shikha Jain

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Dhanalekshmi Gopinathan

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Hima Bindu Maringanti

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Monali Mavani

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Vikrant Verma

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Akanksha Bhardwaj

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ankit Agrawal

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ankit Luthra

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Bhavesh Kumar

Jaypee Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge