Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Parvinder Singh is active.

Publication


Featured researches published by Parvinder Singh.


Human-centric Computing and Information Sciences | 2014

An effective implementation of security based algorithmic approach in mobile adhoc networks

Rajinder Singh; Parvinder Singh; Manoj Duhan

Mobile Ad-hoc Network one of the prominent area for the researchers and practitioners in assorted domains including security, routing, addressing and many others. A Mobile Ad-hoc Network (MANET) refers to an autonomous group or cluster of mobile users that communicate over relatively bandwidth constrained wireless links. Mobile ad hoc network refers to the moving node rather than any fixed infrastructure, act as a mobile router. These mobile routers are responsible for the network mobility. The history of mobile network begin after the invention of 802.11 or WiFi they are mostly used for connecting among themselves and for connecting to the internet via any fixed infrastructure. Vehicles like car, buses and trains equipped with router acts as nested Mobile Ad-hoc Network. Vehicles today consists many embedded devices like build in routers, electronic devices like Sensors PDAs build in GPS, providing internet connection to it gives, information and infotainment to the users. These advances in MANET helps the vehicle to communicate with each other, at the time of emergency like accident, or during climatic changes like snow fall, and at the time of road block, this information will be informed to the nearby vehicles. Now days technologies rising to provide efficiency to MANET users like providing enough storage space, as we all know the cloud computing is the next generation computing paradigm many researches are conducting experiments on Mobile Ad-hoc Network to provide the cloud service securely. This paper attempts to propose and implement the security based algorithmic approach in the mobile adhoc networks.


International Journal of Computer Applications | 2013

A New Approach to Design Programmable Secure Network Interface Card

Darshana Hooda; Parvinder Singh

In this paper, Secure Network Interface Card (SNIC) Architecture is proposed, to provide secure video communication without extra overhead on host processor of receiver. PROM based security model is developed & its integration with Network Interface is described. The approach adopted here to design SNIC, is based on remote reference passing. In this approach PROM is integrated to NIC to serve as security buffer where data values are to be placed at memory locations using some mathematical mapping which establishes relation between location reference and data. Sender generates respective location reference(at receiver’s security buffer) corresponding to the each data byte of video stream. For reference creation, respective reverse mathematical mapping is used. In this, security is achieved at MAC layer at receivers end. General Terms Security


International Journal of Computer Applications | 2015

Fraud Detection by Monitoring Customer Behavior and Activities

Parvinder Singh; Mandeep Singh

With the enhancement in technology e-banking like credit Card, Debit Card, Mobile Banking and Internet Banking is the popular medium to transfer the money from one account to another. E-Banking is gaining popularity day by day, which increases the online transaction with the increase in online shopping, online bill payment like electricity, Insurance Premium and other charges, online recharges and online reservation of railways, bus etc., so the fraud cases related to this are also increasing and it puts a great burden on the economy, affecting both customers and financial bodies. It not only costs money, but also a great amount of time to restore the harm done. The purpose is to prevent the customer from online transaction by using specific technique i.e. based on Data Mining and Artificial Intelligence technique. The risk score is calculated by Bayesian Learning Approach to analyze whether the transaction is genuine or fraudulent based on the two parameters: Customer Spending Behaviour and Geographical Locations. The customer than spending behaviour that can be identified by KMEAN clustering algorithm and in geographical location the current geographical location is compared with the previous location. If risk score is greater 0.5 then transaction is considered to be fraudulent transactions and then the security mechanism authenticates the user by entering the 4 digit random number that appears on the screen and the genuine user enters the code in a correct manner.


International Journal of Computer Applications | 2012

A Comprehensive Survey of Video Encryption Algorithms

Darshana Hooda; Parvinder Singh

Encryption is the widely used technique to offer security for video communication and considerable numbers of video encryption algorithms have been proposed. The paper explores the literature for already proposed video encryption algorithms with the focus on the working principle of already proposed video encryption schemes. This study is aimed to give readers a quick overview about various video encryption algorithms proposed so far.


International Journal of Computer Applications | 2013

SBHCS: Spike based Histogram Comparison Steganalysis Technique

Sonam Chhikara; Parvinder Singh

is the art of secretly transferring of data and steganalysis is the art of detecting that hidden data embedded in cover media. In the past years many powerful and robust methods of steganography and steganalysis have been reported in the literature. In this present work, a Steganalysis technique for Histogram-Shifting Based Data Hiding is designed to detect hidden data by using spike generation and template matching. The proposed work analyzes the characteristics of histogram changes during data hiding procedure, and then uses these features to distinguish between stego and original image.The presented work perform the steganalysis in four steps: First, an input image is filtered by using perwitt operator for edge detection. Second, the spike image is divided into 8x8 blocks and then histogram is generated for each block. Third, histogram of each block of stego-image and original image is compared by using 5 similarity measures (norm distance, cosine distance, Euclidean distance, Chi-squared distance, Entropy distance). Fourth, Neural Network (NN) is trained as a classifier to discriminate stego image from original image. Experimental results indicate that the proposed steganalysis method is better than the method proposed by Der-Chyuan Lou et. al.(1) and can effectively detect stego image at low bit rates.


CSI Transactions on ICT | 2013

Self adjustable security technique based on remote reference passing for digital multimedia services

Darshana Hooda; Parvinder Singh

In this paper, we have proposed parameterized security technique based on remote reference passing (RRP). RRP intrinsically works on the principle of transmitting the information or data in the form of reference at receiver side. RRP is most suitable technique to address security needs of video services while accessed/played through constrained devices because of its low power design and negligible delay during decryption process, one of stringent requirement of video transmission. Proposed technique has potential to offer varying level of perceptual encryption which makes it suitable to support different multimedia service with different security needs. This technique offer confidentiality and authentication for secure communication and further, same is also suitable for entertainment video services to facilitate pay TV, video on demand or pay per view. This technique encrypts the raw video in RGB 24 bit color space which makes its integration possible with different video codec.


Archive | 2018

Histogram of Oriented Gradients for Image Mosaicing

Ridhi Arora; Parvinder Singh

Image Stitching can be defined as a process of combining multiple input images or some of their features into a single image without introducing distortion or loss of information. The aim of stitching is to integrate all the imperative information from multiple source images to create a fused mosaic. Therefore, the newly generated image should contain a full description of the scenery than any of its individual source images and is more suitable for human visual and machine perception. With the recent rapid developments in the domain of imaging technologies, mosaicing has become a reality in wide fields such as remote sensing, medical imaging, machine vision, and the military applications. Image Stitching therefore provides an effective way by reducing huge volume of information by extracting only the useful information from the source images and blending them into a high-resolution image called mosaic.


International journal of engineering research and technology | 2016

Optimizing Image Stitching for Panoramic View

Ridhi Arora; Parvinder Singh

: Image Stitching or mosaicing is an important aspect of research in the field of computer vision. It involves various techniques of joining images together to form a mosaic of high resolution. Stitching images generally require complete overlap in order to generate high resolution panoramas. As these panoramas become increasingly popular, there arises a need for the software to create mosaics. These mosaics are used for variety of applications like in digital maps and satellite photos. In recent years various techniques have been generated to do stitching in order to obtain data from images. Such techniques which have been used to successfully combine images are discussed in this paper.


European Scientific Journal, ESJ | 2014

OPTICAL ILLUMINATION WATERMARKING USING DB WAVELET

Parvinder Singh; Meenakshi Chhikara

During the treatment of this paper it is aimed the accurate characterization of natural objects that constitute the natural heritage of this region, as well as the proposals for new monuments. In this article it is conducted a genuine scientific work for the analysis of these monuments and the values associated with them. The basic method that is used in the treatment of this paper has been the one of direct field observations, analyzing these aspects; their physical condition, size, prognosis and photography. The paper has scientific value to researchers in the field of geography and local authorities. The main part in the paper is occupied by the results of the performed work in the following areas: The assessment of the natural conditions of this district, in function ofthe natural monuments. The classification of natural monuments; geomonuments, bio and hidromonuments. The physical analysis of the declared monuments,explaining their current situation and future trend.Their association with different views. Proposals for new natural monuments, for those objects that meet the criteria of being such. All these proposed monuments, are analyzed by the natural aspect, and accompanied by photos. At the end of this paper are given the conclusions, noting that the natural heritage of this district is a national asset. There are given some recommendations such as; their defence is responsibility of the state and of all the public opinion. Their good management requires strong legal measures in order to preserve these values.This article focuses in the azorean third tea period (1878-1879), time to learn and the first move towards tea industry. This time is made up of two periods: First, time to collect and make tea (March to July 1878); Second, time to collect and make tea (April to July 1879). With the hiring of two Chinese tea technicians, Lau-a-Pan (the master) and Lau-a- Teng (the interpreter) by the local agricultural society, locals rapidly acquired two things: how to grow and make tea and the value of his tea. Tea industry brought together first and second generation SPAM members, who, to cope with wine and orange crises, among other products, invested in tea. Industry mainly developed in Saint Michaels‘s Island.Military in Pakistan and Bangladesh has been deeply involved in politics all over the history. Since after the birth of both countries, the strong democratic government has not yet been established, due to the continuous involvement of Military in politics. The current research attempts to evaluate the main causes of Military Intervention in two countries. The utilized information of causes has been taken from books, journals, articles, on line materials and other secondary sources. The findings result with regard to the sources of military interventions in politics are the causes of weak political institution, vested interest of the military, legacy of the British army, political corruption and superiority.The subject of insurance law has been a very trickish and clumsy one to anybody who desires to know about it or conduct any research with regard to same. The general notion of the public against insurance companies is very negative when it comes to the aspect of payment of indemnity by the insurers. Perhaps based on a simple or very trivial excuse, the insurer may repudiate liability either on the basis of non – disclosure or non – possession of insurable interest e.t.c. In most cases, insurers have denied or repudiated indemnities on ground of non – disclosure which in all of the policies are made to be a ―warranty‖ or ―conditions‖ which goes to the root of the contract itself. The common law rule on this is very strict and therefore operates against the claim of the assured whenever the defence is raised by the insurer. However, the Nigerian Insurance Act, appears to have remedied this common law position by making the concept of non – disclosure equitable to both parties to an insurance policy. It is hereby suggested that other jurisdiction should follow suit for the development of insurance law.The need to own assets, whether in the form of long-term tangible or intangible assets, conditions a successful operation of an accounting entity in some cases. The objective of the article is to compare the asset structure defined for public sector accounting entities to the asset structure binding for business entities in compliance with the legislation valid in SR. Further objective of the article is to compare the legislation valid in SR in terms of long-term assets to the legislation defined under IAS/IFRS International Accounting Standards (applicable for businesses) and IPSAS (applicable for public sector entities). Our effort is to point out the differences on the grounds of the given comparisons, and to propose measures aimed at enhancing the legislation on the grounds of the analysis.Mass housing estates of the second half of the 20th century represent a poorly described and appraised topic of recent history. Mainly professionals overlook their garden design related aspect. It seems unbuilt areas within them were neglected by their authors; still, they represent an essential change in the urban structure in the 20th century and the rising significance of elements representing nature in urbanized environments. The present text focuses on housing estates in the Czech Republic that were built between the 1960s and 1989, especially their garden design related and landscape related aspects. First, circumstances of post-war building of mass housing and the role of modernist theories are introduced. Second, the development of forms of public areas in specific conditions of socialist central planning is observed. Our exploration concentrates on significant projects presented in the press of the time as well as housing estates that did not stand out from the average. The results, which we are presenting, are an overview of particular types of public spaces within mass housing estates with their basic characteristics and a definition of the roles of vegetation and other garden design means related to housing. In conclusion, we formulate a general development direction which the relation between landscape and housing took, as we can observe it in the example of housing estates of the second half of the 20th century.Our research is dedicated to the problem of the development of the future doctors’ subject competencies in Medical deontology by means of Cooperative learning structures. In this article we are going to review the findings on the initial level of the future doctors’ subject competencies in Medical deontology in terms of the motivational component within the framework of the experimental part of the investigation. Our main task is to reveal the gaps in the motivational component of the future doctors’ subject competencies in Medical deontology and to suggest Cooperative learning as a technique to improve the deontological education. The initial level of the development of the future doctors’ subject competencies in Medical deontology has been evaluated by us in terms of three components – motivational, cognitive and behavioral the essence of which is represented in criteria and the latter are reflected in indicators. In this article we will review the findings on the motivational component. The initial level of the development of the motivational component of the competencies in Medical deontology has been determined in terms of the professional needs and interests of the medical students, the indicators of which include awareness of a career choice, type of motivation to study at the higher medical educational establishment (“professional” motives, motives of “personal prestige”, “pragmatic” and “educational” motives, external factors), prevailing personality orientation (humanistic, professional, social, business, and antisocial), motivation for communication, self-improvement and selfdevelopment motivation, recognition of the practical significance of the academic course “Deontology in medicine”, an interest in ethical and deontological education.Nowadays, the number of stimuli reaching the consumers is underdrastic growth. At the same time, consumers are not able to or willing toprocess this amount of information. In spite of the educational level,informative campaigns and publications, the consumers‘ level of knowledgeremains low concerning the composition of food products. On the basis of aresearch carried out in 2013, in Hungary and involving 1,150 individuals, wecan state that consumers are not aware of the extent of carbohydrates andenergy contained in their food products. It is the responsibility of consumerprotection to work out a signalling for food products that is easy to beprocessed and can be immediately understood by the consumers. Such aninitiative could be the comprehensive and mandatory introduction of the―traffic light system‖.Agence France-Presse (AFP) is an international French news agency located in Paris. It is the oldest and largest news agency in the world. It is one of four most outstanding agencies together with “Associate Press”, “Reuters” and “Itar-Tass”. Information agencies originated from 1835 when a young French writer and translator Charles-Louis Havas established Agency Havas on the basis of which was established one of the greatest agencies France-Presse. A lot of issues were changed in the strategy of the Agency from the day of its foundation, but in XXI century, the epoch of modern technologies, it faced new challenges and accomplished changes in the sphere of its activities. Top management of Agence France- Presse managed to implement new technologies and become one of the most prestigious agencies in the world.The spectrum of the problems analyzed in the following article is based on the works by Merab Mamardashvili (1930-1990) dedicated to the theme of Europe, talks given in Paris and Barcelona, articles and interviews published in various French newspapers or journals. Mamardashvili clearly realized that the establishment of democratic regime in the society emerging on the ruins of a totalitarian state could create the most complicated problem to the state and culture; that the indigenous peoples of the former Soviet Union (including Georgians) who before October Revolution could not follow the time, modernity, would find themselves in a difficult situation in the process of formation of civil society and its members as citizens. The aspiration toward modernizing the individuals poses many difficulties to the politicians and citizens because we are simultaneously being transformed into free and independent nation, and the members of civil society. The situation is complicated by the fact that this process passes through the fog of post-totalitarian society. Merab Mamardashili’s critical analysis is due to a desire for better future of Georgia, the desire that in the era of globalization Georgian thinking could adequately respond to the challenges of time. In the process of desovietization of thinking and formation of civil society, the views developed by the philosopher Merab Mamardashili about the relationships between the individual and society are still valuable and relevant.The total world population is 7.093 billion of them 1.29 billion do live with absolute poverty [PPP below


INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10) | 2010

Random Time Identity Based Firewall In Mobile Ad hoc Networks

Suman; R. B. Patel; Parvinder Singh

1.25]. Around 4 million of people die cause of starving and malnutrition and 25 million without treatment/year. 100 million is homeless and further 100 million is hidden homeless. Around 200 million is unemployed, of them 75 million that is 13% of the total figure is between the ages of 15 & 24 [IMF-2012]. If dramatic changes are not happened in the world job markets and young jobless is remain stable, its impact would be very devastative for the forthcoming world.This paper analyzes the category of mediation from the point of view of humanisticoriented pedagogy. Mediation is discussed first in its presumably most popular context, that is, in the context of legal procedures, where Polish law is taken as an illustrative material. Against this background, the main functions and principles of legal concept of mediation are presented. Further investigations are devoted to the characterization of humanistic-oriented pedagogy, with emphasis on the main categories of this type of pedagogical inquiry. The very notion of category is also focused on. Finally, the research question concerning the understanding of mediation as a category of humanistic-oriented pedagogy is discussed. It is argued that certain important values underlying the legal concept of mediation are present in the research in pedagogy, but in the latter context, the category of mediation adopts a much broader meaning, for its elements are present in every stage of human development.Screening of oncologic pathology of gastro-intestinal tract by means of multicenter endoscopic examination has shown that phylactic esophagogastroduodenoscopy, сolonofiberscopy can be recommended as an obligatory component during planned examination. Despite all the achievements of modern medicine , the entry of new methods of diagnosis and healing, the disease incidence and death rate due to oncologic diseases has been constantly increasing in the world. It is well-known , that cancer is the second leading reason of death after cardiovascular system diseases death. If to summarize the cancer frequency of all organs of gastro-intestinal tract, it will take the first place (more than 50%), powering past larynx cancer, breast cancer, and prostate cancer1. Therewith disease and death rate are the cancer of approximately all digestive systems 2. Numerous research proves, that disease prognosis mainly depends on oncology diagnose promptness, which gives much meaning to the earlier diagnosis. Unfortunately, 60– 80% patients with for the first time oncology diagnose already have III–IV stages of disease2. Potential causes of such late diagnose are late application of patients, erased clinical performance, and also deficient oncological suspicion of doctors with primary stage of healthcare.

Collaboration


Dive into the Parvinder Singh's collaboration.

Top Co-Authors

Avatar

Darshana Hooda

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Ridhi Arora

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Mandeep Singh

Centre for Development of Advanced Computing

View shared research outputs
Top Co-Authors

Avatar

Manoj Duhan

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Meenakshi Chhikara

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Neha Tuteja

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Rajinder Singh

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Suman

Deenbandhu Chhotu Ram University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge