Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Munesh Chandra Trivedi is active.

Publication


Featured researches published by Munesh Chandra Trivedi.


international conference on computational intelligence and communication networks | 2013

Mobile Cloud Computing: A Needed Shift from Cloud to Mobile Cloud

Rishabh Sharma; Sanjay Kumar; Munesh Chandra Trivedi

Cloud is the kind of distributed computing which disperses and processes data distributed by virtualized manner. Cloud provides resources and computing infrastructure on demand basis to cloud consumers. The combination of cloud computing into the mobile computing environment is developed as a capable technology for mobile services. In this paper we emphasis on scenarios for availability of cloud resources and services on mobile devices. Further need of mobile cloud computing, real time mobile cloud applications, a comparative analysis on mobile cloud enablement technologies and role of middleware system are discussed as counter part of this research.


international conference on information and communication technology | 2016

Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey

Munesh Chandra Trivedi; Shivani Sharma; Virendra Kumar Yadav

Steganography enables user to hide confidential data in any digital medium such that its existence cannot be concealed by the third party. Several research work is being is conducted to improve steganography algorithms efficiency. Recent trends in computing technology use steganography as an important tool for hiding confidential data. This paper summarizes some of the research work conducted in the field of image steganography in spatial domain along with their advantages and disadvantages. Future research work and experimental results of some techniques is also being discussed. The key goal is to show the powerful impact of steganography in information hiding and image processing domain.


computational intelligence | 2016

Analysis of Different Text Steganography Techniques: A Survey

Shivani Sharma; A. Gupta; Munesh Chandra Trivedi; Virendra Kumar Yadav

Steganography is helping individual to send confidential data between two parties. It enables user to hide data in different digital mediums. Steganography is of many types such as image steganography, text steganography, audio/video steganography etc. Text Steganography is quite difficult than other techniques because of less amount of redundancy and changes can be detected quite easily. Some of the techniques of text steganography has been discussed along with characteristics and working.


Archive | 2016

Gender Classification by Facial Feature Extraction Using Topographic Independent Component Analysis

Shivi Garg; Munesh Chandra Trivedi

Recognition of gender from face image has attracted a huge attention now a days. Many identification systems are being developed to identify a person, as most of the technique for gender classification stand on facial features. In this paper, we presented a gender classification framework consist of a series of phases for determining the gender as the final output. Initially we start by detecting the face from an image using Viola Jones and then extract the facial feature using the Topographic Independent Component Analysis. The features extracted here are used to train the SVM classifier for the classification step. Our experimental result gives the best accuracy in determining the images as of male or female and gives average performance of 96 % correct gender identification on images.


Archive | 2016

DDA: An Approach to Handle DDoS (Ping Flood) Attack

Virendra Kumar Yadav; Munesh Chandra Trivedi; B. M. Mehtre

Distributed denial of service attack (DDoS) is an attempt by malicious hosts to overload website, network, e-mail servers, applications, network resources, bandwidth, etc. Globally DDoS attacks affected four out of ten organizations (around 41 %) over the past few years. Challenges involved in taking counter measures against DDoS attacks are network infrastructure, identifying legitimate traffic from polluted traffic, attacker anonymity, large problem space, nature of attacks, etc. Several approaches proposed in the past few years to combat the problem of DDoS attacks. These approaches suffer for many limitations. Some of the limitations include: implementing filtering at router (firewall enabled) will create bottleneck, additional traffic, no means of sending alert to an innocent host acting as a bot, etc. Ping flood attack is one kind of DDoS attack. In this paper, ping flood attack is analyzed and a new approach, distributed defence approach (DDA) is proposed to mitigate ping flood attack. Distributed defence is applied with the help of routers connected to network when count of PING request crosses a threshold limit or packet size is greater than normal ping packet size. Concept of the proposed approach is to help the end router by putting less load during filtering attack packets, enhancing the speed of processing and informing the innocent host acting as bot simultaneously making the DDoS attack ineffective.


Archive | 2018

Impact Analysis of Contributing Parameters in Audio Watermarking Using DWT and SVD

Ritu Jain; Munesh Chandra Trivedi; Shailesh Tiwari

This paper proposes a non-blind audio watermarking algorithm for copyright protection of audio files which has proved to satisfy the minimum requirements of optimal audio watermarking standards set by International Federation of Photographic Industry (IFPI). The algorithm is set to meet the IFPI requirements as it includes the two powerful mathematical tools: Discrete wavelet transform (DWT) and singular value decomposition (SVD). In this paper, we have also analyzed the contribution of parameters like watermark size and the embedding intensity factor on the algorithm.


computational intelligence | 2016

RMI Approach to Cluster Based Cache Oblivious Peano Curves

Sachin Bagga; Akshay Girdhar; Munesh Chandra Trivedi; Yingzhi Yang

There are number of problems that are so complex/large that it becomes impractical or even in some cases impossible to solve these problems on a single machine. As compared to the serial computation, parallel computation is much result oriented for understanding, simulating of number of complex and real world physical process. The cache oblivious(CO) model helps us in designing the algorithms which are cache alert. Moreover these algorithms will be independent of the given systems cache size. A matrix multiplication based upon the Peano curves helps in designing of the cache oblivious algorithms. The distributed environment is being developed using RMI (Remote Method Invocation). In this setup the Master system will decompose a large size matrix into the smaller (ones depending upon the system available). The slave systems will perform the computations as per the equations based upon space filling Peano curves which are cache oblivious in nature. As a result we are able to reuse the matrix elements again and again which leads to decrease in number of cache misses and increasing the overall execution time of whole cluster. At the master system actual partitioning is done to generate submatrix and the virtual partitioning into size of 3x3 is being done at the slave systems for implementing multiplication based upon Peano curves(PC). PC algorithmic approach provides spatial locality which is a basic requirement for increasing the overall system efficiency.


computational intelligence | 2016

Performance Comparison of AODV, ZRP and AODVDR Routing Protocols in MANET

Anupam Kumar Sharma; Munesh Chandra Trivedi

MANET is a collection of computational devices that creates random topology for communication. The beauty of MANET is that it not required any central controller or base station. The devices used in MANET may be fixed or mobile. MANET is only a network in which devices worked as a host as well as router. The routing protocol used in mobile ad hoc network is broadly classified in three category-proactive, reactive and hybrid routing protocol. In this thesis work performance of AODV, AODVDR and ZRP is compared in the presence of different number of connection, different pause time and different number of communicating devices. In this work, network simulator tool NS2.35 is used for simulation. Simulation result shows the AODVDR is perform better than AODV and ZRP routing protocol.


Archive | 2016

QoS Improvement in MANET Using Particle Swarm Optimization Algorithm

Munesh Chandra Trivedi; Anupam Kumar Sharma

MANET is the type of communication network in which communicating device can move anywhere. Movability of devices plays a key role when we discussed about the performance of any routing protocol used in MANET. Performance of any MANET routing protocol depends on the values of its parameters. What will be the value of these parameters for which the performance of protocol is optimal? In this work the particle swarm optimization technique is used to select the optimal value of parameters of AODV routing protocol to improve the QoS in MANET. Java programming language is used to implement optimization technique and then output value is used as input into the network simulator tool NS2.35 for majoring the performance of AODV. The experimental results show 70.61 % drop in Average End-to-End delay (AE2ED), 34.06 % drop in Network Routing Load (NRL), and slight improvement (1.81 %) in Packet Delivery Ratio (PDR) using optimal combination of value of parameters.


International Journal of Security Technology for Smart Device | 2015

A Comparative Study on Face Detection Techniques for Security Surveillance

Dimple Chawla; Munesh Chandra Trivedi

Automatic Face Recognition and Surveillance helps providing a secure system for next generation. The critical technology used for this purpose is pretty poor, but it is slowly improving. In this paper, we are making a comparison on ADABOOST, PCA, LDA, Elastic Bunch Graph Matching algorithms for face recognition on the basis of origin, success rate, Eigen values, and vector score as output of an image. Further study from above said algorithms, it is clear to state that significant result is least expected to perform well on small sample data.

Collaboration


Dive into the Munesh Chandra Trivedi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

A. Gupta

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar

Akshay Girdhar

Guru Nanak Dev Engineering College

View shared research outputs
Top Co-Authors

Avatar

Sachin Bagga

Guru Nanak Dev Engineering College

View shared research outputs
Top Co-Authors

Avatar

Shivani Sharma

ABES Engineering College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rishabh Sharma

Jaypee Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Ritu Jain

ABES Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge