Nidhi Chandra
Guru Gobind Singh Indraprastha University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Nidhi Chandra.
International Journal of Computer Applications | 2012
Amnesh Goel; Sukanya Ray; Nidhi Chandra
The use of Wireless Sensor Network (WSN) has proved to be a very beneficial in the design of adaptive and dynamic traffic light intersection system that will minimize the waiting time of vehicles and also manage the traffic load at the intersection adaptively. In this paper, we propose an adaptive traffic intersection system based on Wireless Sensor Network where the traffic light of one intersection can communicate with the traffic light of the next neighboring intersections and traffic clearance will be prioritized for special vehicles with the help of sensors. General Terms: Wireless Sensor Network.
international conference on advanced computing | 2012
Amnesh Goel; Sukanya Ray; Prateek Agrawal; Nidhi Chandra
With the advancement in the technology, various types of sensors are easily available in the market to detect air pollution with precise reading of different gases in environment but main problem arises in efficient use of sensor network so that it can sustain for a longer time and effective communication strategy for these sensor node to base station so that collected data can process efficiently. For this purpose various methods can be used to install sensors in a polluted area but our propose method mainly focus on longer sustain time period of sensor network, effective processing of collected information and less overhead in routing information between sensor nodes.
international conference on communication systems and network technologies | 2012
Amnesh Goel; Nidhi Chandra
Image Encryption has gain popularity because of need of secure transmission of images over open networks and increased attacks on data flowing over network. Different type of data have different features, that is why for images different techniques were evolved to protect confidential data from unauthorized access. Encryption techniques used for encrypting textual data does not work with images, so separate encryption techniques are required for images. So, we proposed here a new scheme for image encryption which is helpful for end to end secure transmission of digital information on open network using explosive block displacement followed by inter-pixel displacement of RGB values.
International Journal of Computer Applications | 2012
Reji Mathews; Nidhi Chandra
numbers of input devices are available for human interaction with modern computer systems which are operated by hands and a few of them through gestures made using fingers and body movements. The advancements in assistive technology have proposed many concepts for controlling the input and mouse movements by detecting the basic eye movements of a user with the help of the eye tracking systems. We place our focus on the implementation of the computer mouse which is designed to detect the relative position of the cornea with respect to the initially calibrated centre and calculate the attributes like angle and speed at which the movement of mouse cursor has to be initiated. The basic Houghman circle detection algorithm is used to process the incoming video frames to detect the cornea which lies in the centre of the pupil and the position of the cornea is compared with respect to the calibrated centre point with the help of a square grid on which an algorithm is applied to calculate the speed and angle at which the mouse should move with respect to x axis.
international conference on communication systems and network technologies | 2012
Amnesh Goel; Nidhi Chandra
Medical domain has witness a tremendous change in technology with advancement in medical science instruments and other side usage of images has increased in this domain to detect various diseases. On one hand where experience doctors are putting their experience into detail pictorial representation of various parts of body to further diagnose the patient records and on other hand safety of those pictorial images are big concern. So, here we proposed a new model for storage of medical images using inter-pixel image encryption technique and accessing of images from database in secure mode with detail reading of image using proposed zooming technique.
International Journal of Computer Applications | 2013
Nikita Singh; Nidhi Chandra
Security is the latest research which is of essential concern for many researchers. As the data is generated every second both in host and network so it’s necessary to ensure the preservation of their integrity. So, this paper is retrospection of various security measures which are necessary to protect the system from harmful threats/attacks. Machine learning is one of the best technique by which we can apply to get the best results and in turn build an efficient Intrusion Detection System. General Terms Intrusion Detection System
International Journal of Computer Applications | 2013
Pavitra Chauhan; Nidhi Chandra
With the growing advances in the technology the uses of computer systems and the internet is also growing at a rapid rate, and with the increase in their usage vulnerabilities and threats are also increasing tremendously. A large number of approaches have been proposed till now for improving the security of a host system and a network. One of the proposed approach is an Intrusion Detection System (IDS). An IDS works for a system is referred as Host IDS and the one that works for a network is referred as Network IDS. But their functionality is specific to particular host and a network, one does not work as an alternative to another. Thus, an IDS is needed that overcomes the drawbacks of both the systems and combines their advantages to form a Hybrid Intrusion Detection System. An Hybrid IDS captures both host and network data and thereby apply an analysis approach. In order to make these systems robust and effective biologically inspired Artificial Immune System (AIS) approaches can be used that makes the system flexible enough to work in every scenario. This paper provides a review of various IDS and application of various AIS approaches to them.
International Journal of Computer Applications | 2013
Pavitra Chauhan; Nikita Singh; Nidhi Chandra
Various approaches from different fields have been proposed to improve the security of computer system. One such approach is Intrusion detection system monitors computer system in real-time for activities indicating attempted or actual access by unauthorised users. To build an effective intrusion detection system many techniques are available which gathers and analyze information from different areas within a computer system or network and identify various security threats, including both intrusions anomaly i.e. attacks from outside the organization and misuse i.e. attacks from within the organization. Artificial Immune System (AIS) which is inspired by the robust and flexible nature of Human Immune System (HIS) can be incorporated in current Intrusion Detection Systems (IDS) thereby improving their efficiency and performance. This paper gives a review of various artificial immune system approaches that can be used for the development of an Intrusion Detection System.
International Journal of Computer Applications | 2012
Sukanya Ray; Nidhi Chandra
rural areas there is always a lack of medical awareness. People are not aware of many diseases and even if they know the name of the disease or even the symptoms of the disease they are not aware about the prevention methods of the disease. In this paper a prototype model is designed for the social workers or leaders to spread awareness of prevention of various diseases and also the pre-cautions that must be taken so that those diseases do not occur. This prototype model will help social workers to know the reason of the spread or occurrences of various diseases, and what measures can be taken to prevent these diseases from occurring. This will help in spreading a general awareness about various diseases in rural areas where there is no proper medical treatment centre and preventing diseases from occurring is the best solution in those areas.
International Journal of Computer Applications | 2012
Amnesh Goel; Nidhi Chandra
image encryption methods have become very important in the todays scenario because images are widely used for various purposes and transmission of digital image over network has increased drastically. Handling of images demand more security as they contain confidential information in it and the concept of encryption has been used for years. Here we proposing a new enhancement to the algorithm of image encryption proposed earlier where the image slicing is perform followed by shuffling up those slices. In this research compilation, we derive the point or coordinate from the key value on basis of which we bifurcate the image into 4 parts and the Inter-pixel displacement of RGB attributes are applied to each of this part. Similarly this process is continued with a new point coordinates till the predefined number of iterations are donewhose count is again a value derived from the encryption key.