Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Vrijendra Singh is active.

Publication


Featured researches published by Vrijendra Singh.


international conference on industrial informatics | 2003

Classification using single neuron

Ram N. Yadav; Vrijendra Singh; Prem Kumar Kalra

Since the neuron is the basic information processing unit of the brain, the ANN have played a great role in the study of the brain. Because of the complexity and less understanding about the biological neurons, many scientists and researchers have given various architecture for it. Experimental studies in the area of neuroscience has proven that the response of a biological neuron appears random and the predicted results can be obtained in many ways. We have presented some new models of the artificial neuron that can be used to solve the various bench-mark problems in a very simple and systematic manner.


International Journal of Bank Marketing | 2015

Selection of appropriate electronic banking channel alternative

Vaibhav Mishra; Vrijendra Singh

Purpose – The purpose of this paper is to examine the important criteria responsible for the adoption of different electronic banking channel (EBC) alternatives in Indian perspective. It also evaluates the intensity of the various criteria, namely demographics, technological factors, service components and intention to use in determining the overall priorities of EBC. Design/methodology/approach – Data were collected from 110 respondents using pairwise comparison-based survey instrument. The collective data was analyzed using analytical hierarchy process and priorities of different EBC were computed. Findings – ATM was found out to be the most preferred EBC alternative, followed by internet banking (IB) and mobile banking. Awareness, self-efficacy, ease of use, usefulness and security were the criteria responsible for making ATM, the most preferred channel. Practical implications – This paper imparts a better understanding of customers’ preferences among different EBC alternatives. It also explores the re...


international conference on computer and communication technology | 2014

Mobile WiMAX network security threats and solutions: A survey

Vinod Kumar Jatav; Vrijendra Singh

IEEE 802.16 based WiMAX is an emerging wireless Internet technology. Salient features of WiMAX such as high speed internet facility over a long distance, quality of service, scalability, security, and mobility proves it better than Wi-Fi Internet access. Security is a vital requirement to prevent WiMAX network from the various attacks and to increase the reliability. This survey paper presents the threats associated with the layers in WiMAX along with possible solutions. The paper reviews the physical layer threats i.e. scrambling and jamming, MAC layer threats i.e. user authentication and data confidentiality, routing layer threats i.e. black-hole attack and other miscellaneous attacks e.g. Man-in-the-Middle (MITM), Denial of Service (DoS) and Bandwidth Spoofing. The paper observes that jamming attack and eavesdropping of management messages are the most destructive attacks for WiMAX network.


International Journal of Logistics Systems and Management | 2011

Technology as a driver for competitiveness to Indian ready-made garments' supply chains

Arpita Khare; Vipul Sehgal; Dhawal Dhal; Sulabh Agarwal; Vrijendra Singh

The current business dynamics have led to the adoption of technology for various business strategies. The inter-play of factors like globalisation, technology, outsourcing, supplier collaborations and customer relationships are fuelling the drive towards efficiencies. In this light, the paper makes an attempt to identify the driving factors for adopting technology for making supply chains competitive. It explores the adoption of Information Technology (IT) in Indian clothing retail supply chains, the information accessibility prevalent in the Indian supply chains. Primary research was conducted on the various ready-made clothing/garment retailers and the IT use levels were identified in the supply chain.


Multimedia Tools and Applications | 2014

A framework for background modelling and shadow suppression for moving object detection in complex wavelet domain

Anand Singh Jalal; Vrijendra Singh

This paper describes a simple, robust and efficient framework for background subtraction and cast shadow suppression in complex wavelet domain. A background subtraction approach exploiting noise resilience capability of wavelet domain combined with local spatial coherence and median filter in the training stage is proposed. A novel shadow suppression scheme based on directional coefficients of Daubechies complex wavelet transform is introduced. The effectiveness of the proposed approach is demonstrated via qualitative and quantitative evaluation measures on both indoor and outdoor video sequences. The experimental results show that the proposed approach outperforms state-of-the-art methods.


advances in computing and communications | 2011

A Robust Background Subtraction Approach Based on Daubechies Complex Wavelet Transform

Anand Singh Jalal; Vrijendra Singh

This paper describes a simple and robust approach for background subtraction in Daubechies complex wavelet domain. A background subtraction approach exploiting noise resilience capability of wavelet domain combined with local spatial coherence and median filter in the training stage is proposed. The effectiveness of the proposed approach is demonstrated via qualitative and quantitative evaluation measures on both indoor and outdoor video sequences. The experimental results illustrate that the proposed approach outperforms state-of-the-art methods.


International Journal of Electronic Business | 2014

Factors affecting the adoption or acceptance of internet banking services: a review and analysis of past research

Vaibhav Mishra; Vrijendra Singh

Extensive review of literature shows that there is scarcity of facts related to retaining the old customers of internet banking and acquisition of new customers. This study is conducted to examine the trend of internet banking usage, its attributes and various factors affecting its adoption. The aim of this paper is to present the managers view along with the customers view in internet banking and services to reduce the gap between customers perceptions and managers perceptions regarding factors affecting adoption of internet banking. This paper provides an insight into the key factors such as security, reliability, accessibility, availability, and cost, etc. used by researchers that should be kept in mind by customers before selecting particular internet banking services. These findings will be useful for new researchers who want to explore new dimensions in this field along with reducing the cost of customer acquisition, provide better service quality and higher customer retention rate.


International Journal of Multimedia Intelligence and Security | 2011

Robust object tracking under appearance change conditions based on Daubechies complex wavelet transform

Anand Singh Jalal; Vrijendra Singh

In this paper, we propose a new robust algorithm for object tracking. The algorithm exploits the properties of Daubechies complex wavelet transform to track region of interest (ROI). One of the problems of using color or a similar feature for tracking is that it is sensitive to the illumination or appearance changes, so algorithms based on these features fail in presence of illumination variation or change in appearance, pose or in the presence of noise. In the proposed method, the object is represented in Daubechies complex wavelet domain to minimise the effect of frame to frame variations and noise. The reference object in the initial frame is modelled by a feature vector in terms of the coefficients of Daubechies complex wavelet transform. We investigate a similarity measure in complex wavelet domain, which makes it possible to exploit spatial information in the feature space, improving the robustness of the tracking process. An online adaptation scheme is used to update the reference object template and make the proposed tracker more robust against sudden illumination change and dramatic variation in the appearance model. The proposed tracking algorithm yields better results even in noisy video with significant variations in object’s pose and illumination.


Archive | 2014

Algorithm for Gunshot Detection Using Mel-Frequency Cepstrum Coefficients (MFCC)

Preetam Suman; Subhdeep Karan; Vrijendra Singh; R. Maringanti

Protection of forests and wildlife needs efficient, reliable, and real-time detection of events such as gunshots, wood cutting, distress call of animals, etc. In this paper, we propose a gunshot detection technique through acoustic signal pattern recognition utilizing Mel-Frequency Cepstrum Coefficients (MFCC). In this work, MFCC is used to extract the features of gunshots from prerecorded analog sound files. Training of the system for gunshot detection has been done using a three layer Artificial Neural Networks (ANN) using extracted parameters of acoustic signals. For the creation of the database, 150 prerecorded gunshots have been used. From the database, 80 gunshot sound samples have been used for the training of the system. Testing has been done with the remaining 70 samples in the presence of noise. The algorithm has also been tested successfully using actual gunshot in noisy environment. Efficiency of algorithm is 95 % without noise and that decreases to 85 % in the presence of noise.


MIS REVIEW:An International Journal | 2013

Securing DNA Information through Public Key Cryptography

Shiv P. N. Tripathi; Manas Jaiswal; Vrijendra Singh

This research work emerged as a new concept to provide robust security to the huge volume of information residing in DNA. In present scenario, security is being managed through symmetric key cryptography only. A new initiative has been taken to increase the robustness of DNA security. In this paper we are integrating public key cryptography inside traditional DNA security algorithm. The additional security is provided through a new algorithm as proposed, which takes advantage of residue theorem and traditional RSA algorithm. The main security concept is based on complexity in factorization and high versatility of choosing parameters/ variables. Basically, DNA is encrypted through symmetric key cryptography and the key used to encrypt the data symmetrically is itself encrypted asymmetrically through proposed modified RSA algorithm. Through example, it is further illustrated in this paper that this is not only one of the optimized algorithms to provide a tradeoff between security and computational speed but also adds some sort of defense strategy against various attacks in a layered approach.

Collaboration


Dive into the Vrijendra Singh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vaibhav Mishra

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Prem Kumar Kalra

Indian Institute of Technology Kanpur

View shared research outputs
Top Co-Authors

Avatar

Arti Gupta

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Anjali Gautam

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Rashmi Tripathi

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Swarnima Singh Gautam

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Vinod Kumar Jatav

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Devki Gaurav Pal

Indian Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Gaurav Kumar

Indian Institute of Information Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge