Vivek Kumar Sehgal
Jaypee University of Information Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Vivek Kumar Sehgal.
world congress on information and communication technologies | 2011
Pardeep Kumar; Nitin; Vivek Kumar Sehgal; Kinjal Shah; Shiv Shankar Prasad Shukla; Durg Singh Chauhan
In todays fastest growing IT industry Cloud Computing is gaining much more popularity because the Cloud providers feel that it is very easy to manage the data in the cloud environment rather than normal web-sites in form of simple web pages. Every day the data seeking is being done by many users immensely. Here due to immense number of users seeking the data on daily basis there is a serious security concerns to the cloud providers as well as the data providers who put their data on the cloud computing environment. This paper provides solution of the security issues of cloud computing with the help of Hidden Markov Model based Clustering using data mining Techniques which can be very fruitful technique to detect any kind of intrusion detection in the network.
The Journal of Supercomputing | 2010
Vivek Kumar Sehgal; Durg Singh Chauhan
Packet-switched networks-on-chips (NoCs) are efficient communication architectures for future multiprocessors system-on-chip (MP-SoC) platforms. However the run-time management of their communication, especially flow control from individual intellectual property (IP) in an NoC which contains large number of IPs, is a challenging task. This paper proposes a state space model for NoC with state observer controller in its feedback path. It is seen that controlling the input and output flow rates alone is not sufficient to stabilize the network, but it is also important to monitor the intermediate flow rates from the on-chip routers. This is possible through a state space model for the NoC. The state observer observes the flow rates from each on-chip router which are then treated as state space variables. These variables can be controlled by the poles placement in the feedback controller. The proposed mathematical model can also observe the required intermediate flow rates which cannot be measured directly (reduced state observer). With these observed states we can attach a state controller. With this controller the network can be stabilized by controlling the flow rates at the intermediate level.
european symposium on computer modeling and simulation | 2010
Vivek Kumar Sehgal; Nitesh Panda; Nipun Rai Handa; Shubhrangshu Naval; Vipul Goel
This paper presents automated billing of energy meter. It is just like postpaid mobile connection. In the proposed work, the front end is user friendly and one can work on this software with minimum knowledge of computers and can read the meter by sitting in the office. This is useful for billing purpose in electricity board authority. A GSM modem is connected to the energy meter. Each modem will be having its own sim (ususal mobile phone sim). A PC is connected to other modem, which contains the data base. The module is designed such that user can have the complete usage details about the energy meter. Just like postpaid mobile connections, one can know our due bill instantly and can even pay for it. The SIM card used is implemented in energy meter and it sends a message to the user about the due bill. A LCD is used in the hardware module for the user interface. The LCD displays the current usage and units consumed. After the usage of each unit the amount and total units will be incremented whenever user wants to know his/her bill he/she can message a given code to sim card attached to the meter and can know his/her present bill. The user can pay the amount just by knowing the given code which is fed in the meter.
ieee region 10 conference | 2008
Vivek Kumar Sehgal; Nitin; Durg Singh Chauhan; Rohit Sharma
This paper proposed a portable wireless data acquisition system for temperature in real time process dynamics. Process variables (like temperature, pressure, flow, level) vary with time in certain applications and this variation should be recorded so that a control action can take place at a defined set point. This paper proposes an 8 bit embedded platform for a sensor having a network interface using the 802.15.4, ZigBee protocol, that is specially designed for the sensors network. The ZigBee protocol is a wireless technology developed as an open global standard to address the unique needs of low-cost, low-power, wireless sensors network. This wireless data logger senses and monitors the variations in the local temperature thereby transmits the data within the range to an assigned embedded processor based server. Received temperature is displayed on a local liquid crystal display (LCD) on assigned server and simultaneously on a computer.
annual acis international conference on computer and information science | 2008
D.S. Chauhan; Vivek Kumar Sehgal; A. Mahanot; P. Singh; S. Ahuja; Utkarsh Shrivastava; M. Rana; V. Punjabi; S. Vinay; Nakul Sharma
Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along with being user friendly is required. This is where Image Based Authentication (IBA) comes into play. IBA encapsulates Kerberos Protocol, Version 5, and provides clients a completely unique and secured authentication tool to work on. This paper is a comprehensive study on the subject of using images as the password set and the implementation of Jaypee University of Information Technology (JUIT) IBA system called as JUIT-IBA. This tool provides a secure channel of communication between the communicating entities. The assortment of image set as clients password aims at thwarting Brute Force attacks, Shoulder attack, and Tempest attack at the client side while the attacks at the server side can be averted by putting into practice Kerberos protocol. It also describes how our system works along with the evaluation of its performances in different computing environments.
computational intelligence communication systems and networks | 2012
Vivek Kumar Sehgal; Mudit Singhal; Bhart Mangla; Sudeep Singh; Shivangi Kulshrestha
GSM based security system are much more stout then an ordinary security system. The ordinary systems are simply based on the concept of sensors. They sound an alarm on detecting movement. This system of technology has now lost its appeal as it has become a common sighting in metros where these alarms go off unnecessarily. We proposed with GSM techniques and a better decision making process is built to make our vehicle more secure. It is a unique wireless home/car security device that gives instant alerts on your mobile phone the moment a security breach is detected. It is designed to alert you wirelessly through a call burglar alarm system intercepts an intrusion. proposed an 8 bit embedded controller inter model. The control mechanism is based on DTMF tones generated by mobile phone when the number keys are pressed.
european symposium on computer modeling and simulation | 2010
Vivek Kumar Sehgal; Samruddh Dhope; Prince Goel; Japinder Singh Chaudhry; Prince Sood
Safety and comfort of road users is fast becoming a matter of grave concern. The number of accidents on roads has shot up greatly with the increase in vehicle traffic, so has the race to build a safer and much more reliable system for traffic control and management. Traffic management rides on an extremely balanced equation. A change in timing of Traffic lights has adverse effects on traffic. A change applied too early may lead to congestion on other roads and a change too late may wreak havoc, long traffic jams, instance of road rage, accidents etc. The ideal automated traffic signal is yet to be built. This report presents an adaptive traffic control system where the traffic load is continuously measured by sensors connected to a micro controller-based system. The traffic lights of an area are interconnected with a communication network through which traffic load and synchronization information is exchanged. As a result, the duration of each traffic light cycle changes dynamically. This means that the timing of the traffic light changes according to the load, the side with the greatest load is given time wise priority.
Ingénierie Des Systèmes D'information | 2015
Vivek Kumar Sehgal; Anubhav Patrick; Ashutosh Soni; Lucky Rajput
Human security is becoming a grave concern with each passing day. Daily we hear news regarding gruesome and heinous crimes against elders, women and children. Accidents and industrial mishaps have become commonplace. Computers and gadgets have progressed a lot during past decades but little has been done to tackle the challenging yet immensely important field of physical security of people. With the advent of pervasive computing, Internet of Things (IoT), the omnipresent cloud computing and its extension fog computing, it has now become possible to provide a security cover to people and thwart any transgression against them. In this paper, we will be providing a security framework incorporating pervasive and wearable computing, IoT, cloud and fog computing to safeguard individuals and preclude any mishap.
International Journal of Data Mining & Knowledge Management Process | 2012
Pardeep Kumar; Nitin; Vivek Kumar Sehgal; Durg Singh Chauhan
In today’s business scenario, we percept major changes in how managers use computerized support in making decisions. As more number of decision-makers use computerized support in decision making, decision support systems (DSS) is developing from its starting as a personal support tool and is becoming the common resource in an organization. DSS serve the management, operations, and planning levels of an organization and help to make decisions, which may be rapidly changing and not easily specified in advance. Data mining has a vital role to extract important information to help in decision making of a decision support system. It has been the active field of research in the last two-three decades. Integration of data mining and decision support systems (DSS) can lead to the improved performance and can enable the tackling of new types of problems. Artificial Intelligence methods are improving the quality of decision support, and have become embedded in many applications ranges from ant locking automobile brakes to these days interactive search engines. It provides various machine learning techniques to support data mining. The classification is one of the main and valuable tasks of data mining. Several types of classification algorithms have been suggested, tested and compared to determine the future trends based on unseen data. There has been no single algorithm found to be superior over all others for all data sets. Various issues such as predictive accuracy, training time to build the model, robustness and scalability must be considered and can have tradeoffs, further complex the quest for an overall superior method. The objective of this paper is to compare various classification algorithms that have been frequently used in data mining for decision support systems. Three decision trees based algorithms, one artificial neural network, one statistical, one support vector machines with and without adaboost and one clustering algorithm are tested and compared on four datasets from different domains in terms of predictive accuracy, error rate, classification index, comprehensibility and training time. Experimental results demonstrate that Genetic Algorithm (GA) and support vector machines based algorithms are better in terms of predictive accuracy. Former shows highest comprehensibility but is slower than later. From the decision tree based algorithms, QUEST produces trees with lesser breadth and depth showing more comprehensibility. This research work shows that GA based algorithm is more powerful algorithm and shall be the first choice of organizations for their decision support systems. SVM without adaboost shall be the first choice in context of speed and predictive accuracy. Adaboost improves the accuracy of SVM but on the cost of large training time.
software engineering, artificial intelligence, networking and parallel/distributed computing | 2007
Nitin; Vivek Kumar Sehgal; Nakul Sharma; Kunal Krishna; Abhishek Bhatia
In this paper, we proposed two different path-length algorithms and routing-tag algorithm for fault-tolerant hybrid irregular multi-stage interconnection networks (MINs) called as Hybrid Zeta Networks-2 (HZTN) [1,2,3]. In HZTN, 50% of requests are accepted at minimum path-length of 2 in contrast with the regular Augmented Shuffle-Exchange Network (ASEN) [4], Extra-stage Cube Network (ESC) [5], Augmented Baseline Network (ABN) [6], and Benes Network (BN) [7]. They all are having constant path length on all the routes, which makes delay encountered to the same delay along all the paths, thus increasing average latency. Furthermore, the fault-tolerance and reparability of HZTN is evaluated. In addition to this adaptive fault-tolerant routing algorithm for the same have been proposed. This adaptive fault-tolerant routing is provided by exploiting the inherent redundancy of the irregular topology, which does not lead to blocking of request.