Madhurima Hooda
Amity University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Madhurima Hooda.
Archive | 2016
Chandrika Sikka; Saru Dhir; Madhurima Hooda
In the recent years, agile development has received increasing interest in software development organization. Agile adoption has lead to increase in productivity and has better outcome than the traditional software development methods. However, agile adoption also come with challenges which can adversely affect the project. In this paper, the challenges of agile implementation and its solutions are discussed.
Archive | 2016
Saurabh Mishra; Saru Dhir; Madhurima Hooda
In the current technological era, use of computers becomes an essential part of our lives. But this part is also affected by a new breed of security known as cyber security. It is a global issue that arises by different organisations. This paper presents the global cyber security scenario, cyber security and its practices, and firms who are major stakeholders in the cyber security. At the end counter measures of cyber crimes, its average rate is calculated in India during the years 2009–2013.
Archive | 2019
Saurabh Mishra; Madhurima Hooda; Saru Dhir; Alisha Sharma
A mobile application can enable a user to get control on an infrared or IR sensor device, remotely and also along with detecting and notifying of any movement that should happen around the sensor via GPRS. To further improve this thought, we interfaced the mobile technology with hardware. The focus is placed on getting the control of the secured zones, by monitoring the human movement IR sensors alongside some other movement that might happen in the fringe of the sensor. The use of this thought can be extremely very much expected in the circumstances that are exceedingly secure and in which, not withstanding manual security, electronic and mobile security efforts to establish safety are likewise needed. These spots could be banking sector, money midsections, criminal prisons, atomic establishments, confidential and very secret exploration zones, and so forth. The paper implements an intrusion detection system iCop and also presents the testing results showing expected output and actual output. Also, the risk factors and their corresponding mitigation plan are discussed.
Archive | 2018
Abhishek Madaan; Madhulika Bhatia; Madhurima Hooda
Fractal image compression can be implemented in many ways, such as IFS, affine transformations, and HV partitioning. Quadtree decomposition and Huffman encoding are used to improve compression. The work shows the existing methods like quadtree decomposition which is used to subdivide the original fractal image into unoverlapped blocks with a certain value of threshold. It also helps to improve compression ratio and peak signal-to-noise ratio. Huffman encoding is used with quadtree to decrease the number of bits required per symbol. The paper also involves the implementation of selective encryption using chaos on fractal images. A lot of data is being transferred every day, and that is why there is always a need of cryptography. Selective encryption is preferred over other encryption algorithms because it does not require to encrypt the whole image, i.e., image is only partially encrypted. Security analysis of proposed algorithm is also done in this paper which shows that this algorithm would be safe from any attack. MATLAB is used as a tool to implement the two algorithms.
Archive | 2017
Madhulika Bhatia; Madhulika Pandey; Neeraj Kumar; Madhurima Hooda; Akriti
The fundamental feature of Computer vision involves consolidating image processing, pattern recognition and classification procedures. Extricating data from a digital picture relies on upon first distinguishing essential objects or dividing the picture into homogenous sectors or objects termed as segmentation and afterward allotting out these sectors or objects to specific classes termed as classification procedure. The term homogeneous may allude to the shade of the region or an object, however it additionally may utilize different characteristics, for example, composition and shape. This study concentrates on implementing image segmentation and classification on six different fish species using the watershed and the nearest neighbor classifier (kNN) algorithm.
Indian journal of science and technology | 2018
Akriti Sood; Madhurima Hooda; Saru Dhirn; Madhulika Bhatia
Archive | 2018
Surbhi Agarwal; Madhulika Bhatia; Madhurima Hooda
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017
Madhurima Hooda; Shashwat Pathak; Madhulika; Babita Yadav
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017
Madhurima Hooda; Aashie Roy Saxena; Madhulika; Babita Yadav
2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017
Madhurima Hooda; Madhulika Bhatia; Babita Yadav