Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pramode K. Verma is active.

Publication


Featured researches published by Pramode K. Verma.


ieee pes innovative smart grid technologies conference | 2010

A proposed communications infrastructure for the smart grid

Amit Aggarwal; Swathi Kunta; Pramode K. Verma

This paper explores and fortifies the need for a robust communications infrastructure for the upcoming smart grid and computes the bandwidth requirement for a hypothetical grid infrastructure. It presents the architecture of the current distribution system and shows that even for a medium-sized grid, the latency requirements of messages on the smart grid will require optical fibers as the transmission medium.


Journal of Visual Communication and Image Representation | 2013

SCoBeP: Dense image registration using sparse coding and belief propagation

Nafise Barzigar; Aminmohammad Roozgard; Samuel Cheng; Pramode K. Verma

Image registration as a basic task in image processing was studied widely in the literature. It is an important preprocessing step in different applications such as medical imaging, super resolution, and remote sensing. In this paper we proposed a novel dense registration method based on sparse coding and belief propagation. We used image blocks as features, and then we employed sparse coding to find a set of candidate points. To select optimum matches, belief propagation was subsequently applied on these candidate points. Experimental results show that the proposed approach is able to robustly register scenes and is competitive as compared to optical flow.


Security and Communication Networks | 2009

Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks

Yuhua Chen; Pramode K. Verma; Subhash C. Kak

Optical burst switching (OBS) is the most promising optical switching technology for the future Internet, but it suffers from security vulnerabilities. In this paper, we propose to embed a security framework which incorporates the strengths of classical and the emerging quantum cryptography techniques in the native OBS network architecture, providing a means to make the future Internet secure from the ground up. The proposed embedded security architecture allows the best suited classical and quantum cryptography techniques to be deployed, making it possible to offer robust security. The security of quantum cryptography is based on the inherent randomness in quantum phenomena. The application of quantum techniques to optical networks is ideally suited to the problem because photons, which carry information in optical modality, are quantum objects. Since the well-known BB84 quantum cryptography protocol is susceptible to siphoning attacks on the multiple photons emitted by practical sources, we propose to use a new 3-stage quantum cryptography protocol which is immune to siphoning attacks, as it is based on random rotations of the polarization vector. This would allow multiple photons to be used in the quantum key exchange, and make it feasible to extend quantum cryptography services beyond trusted routers. Copyright


ieee pes innovative smart grid technologies conference | 2011

Predicting user comfort level using machine learning for Smart Grid environments

Bei Li; Siddharth Gangadhar; Samuel Cheng; Pramode K. Verma

Smart Grid with Time-of-Use (TOU) pricing brings new ways of cutting costs for energy consumers and conserving energy. It is done by utilities suggesting the user ways to use devices to lower their energy bills keeping in mind its own benefits in smoothening the peak demand curve. However, as suggested in previous related research, users comfort need must be addressed in order to make the system work efficiently. In this work, we validate the hypothesis that user preferences and habits can be learned and user comfort level for new patterns of device usage can be predicted. We investigate how machine learning algorithms specifically supervised machine learning algorithms can be used to achieve this. We also compare the prediction accuracies of three commonly used supervised learning algorithms, as well as the effect that the number of training samples has on the prediction accuracy. Further more, we analyse how sensitive prediction accuracies yielded by each algorithm are to the number of training samples.


IEEE Communications Magazine | 2008

Secure Optical Burst Switching: Framework and Research Directions

Yuhua Chen; Pramode K. Verma

Optical burst switching has been positioned as a viable means of implementing optical communication efficiently. This article identifies potential threats to security in OBS networks. To alleviate the security threats in OBS networks, a secure Optical Burst Switching (S-OBS) framework is proposed. The S-OBS framework provides two levels of security measures: authentication of burst headers and confidentiality of data bursts. Candidate solutions in each category are examined, and research directions are presented.


international conference on communications | 2013

Multi-photon tolerant secure quantum communication — From theory to practice

Yuhua Chen; Subhash C. Kak; Pramode K. Verma; Gregory Macdonald; Mayssaa El Rifai; Nikhil Punekar

Contemporary implementations of Quantum Key Distribution are based on BB84, first proposed in 1984, and commercially implemented for limited market applications in the early 2000s. A major limitation of BB84 is that it requires no more than a single photon per time slot. But no device can reliably generate single photons with guaranteed periodicity. In this paper, we address the practical issues of realizing quantum cryptography systems. In particular, we address the major shortcomings of quantum cryptography as practiced today - the limitation of requiring a single photon to be used in communication. This not only affects the security of the practical quantum cryptography systems, but also restricts the distance over which secure keys can be sent and their rate. Our approach is not limited to a single photon per time-slot thus making it possible to send keys faster and over longer distances. The paper discusses the innate nature of multi-photon communication protocols as a surrogate for quantum communication while giving it a cryptographic strength that would closely match that of a pure quantum communication system.


international conference on signal processing and communication systems | 2011

Dense image registration using sparse coding and belief propagation

Aminmohammad Roozgard; Nafise Barzigar; Samuel Cheng; Pramode K. Verma

Image registration as a basic task in image processing was studied widely in the literature. It is an important preprocessing step in different applications such as medical imaging, super resolution, and remote sensing. In this paper we proposed a novel dense registration method based on sparse coding and belief propagation. We used image blocks as features, and then we employed sparse coding to find a set of candidate points. To select optimum matches, belief propagation was subsequently applied on these candidate points. Experimental results show that the proposed approach is able to robustly register scenes and is competitive as compared to optical flow.


Computer Communications | 2007

Refined assured forwarding framework for differentiated services architecture

Mostafa H. Dahshan; Pramode K. Verma

This paper presents a new refined assured forwarding (RAF) framework for improving the performance of DiffServ architecture where heterogeneous traffic flows share the same aggregate class. The new framework requires minimal modification to existing DiffServ routers by adding a second layer of classification of flows based on their average packet sizes and using Weighted Fair Queueing for flow scheduling. The efficiency of the new architecture in enhancing the performance of DiffServ is demonstrated by simulation results for delay, packet delivery, throughput, and packet loss, under different traffic scenarios.


IEEE Transactions on Intelligent Transportation Systems | 2012

Vehicle Identification Via Sparse Representation

Shuang Wang; Lijuan Cui; Dianchao Liu; Robert C. Huck; Pramode K. Verma; James J. Sluss; Samuel Cheng

In this paper, we propose a system using video cameras to perform vehicle identification. We tackle this problem by reconstructing an input by using multiple linear regression models and compressed sensing, which provide new ways to deal with three crucial issues in vehicle identification, namely, feature extraction, online vehicle identification database buildup , and robustness to occlusions and misalignment. The results show the capability of the proposed approach.


2011 Fifth IEEE International Conference on Advanced Telecommunication Systems and Networks (ANTS) | 2011

A QKD protocol with a two-way quantum channel

Farnaz Zamani; Pramode K. Verma

Quantum key distribution (QKD) provides unconditional physical layer security for the distribution of encryption keys between legitimate parties. This paper presents a quantum key distribution protocol over a two-way quantum channel. This protocol does not require any classical communication channel for key sifting and key reconciliation. Utilizing the proposed protocol, one can reduce the overhead in the classical channel and increase the speed with which keys can be exchanged. Absence of a classical communication channel reduces operational overhead.

Collaboration


Dive into the Pramode K. Verma's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ling Wang

University of Oklahoma

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge