Conference Presentations by JAYANT SHEKHAR
As we know that digitization is one of boon of 21 st century technologies. With the massstorage o... more As we know that digitization is one of boon of 21 st century technologies. With the massstorage of digital information and development of internet based technologies like cloud computing, researcher interest has been increased in Big Data and its security. The term Big Data refers to the huge amount of digital information. Actually, Big Data is not a fully new technology; but it is the expansion of data mining technique. In this paper, we propose an agent based security model for cloud big data.The main objective of this security model is to facilitate the IT companies in term of data protection; those are using Cloud Big Data for the analyzing purpose.
Papers by JAYANT SHEKHAR
International Journal of Engineering Development and Research, May 1, 2015
Regression testing is an essential part of the software development method. It is a testing that ... more Regression testing is an essential part of the software development method. It is a testing that is performed to increase confidence in the knowledge that newly introduced software features do not obstruct the existing features. Test case prioritization plays a vital role in it. In this paper we have proposed a new technique for test case prioritization which is the result of some modifications made in additional fault-exposing-potential (FEP) prioritization.

Data Representation in Big data via succinct data structures
GBAMS Vidushi, Dec 30, 2017
Data Representation in memory is one of the tasks in Big data. Data representation includes sever... more Data Representation in memory is one of the tasks in Big data. Data representation includes several types of tree data structures through the system can access accurate and efficient data in big data. Succinct data structures can play important role in data representation while data in big-data is processed in main memory. Data representation is a very complex problem in Big Data.We proposed some solution of problems of data representation in Big data. Data processing in big data can be utilized to take a decision on data mining. We know the function and rules for query processing. We have to either change the method of processor we can change the way of representation. In this paper, different kind of tree data structures is presented for data representation in main memory of computer system for big data by using succinct data structures. Here we first compare all data structures by the table. Each method has different space and time complexity. We know that Big data information services increasing day by day. So space complexity of succinct data structures is becoming very popular in practice in this era.
International Journal of Computer Science, 2000
Format string attacks cause serious security problems in the field of software security in comput... more Format string attacks cause serious security problems in the field of software security in computer world. Testing and implementation against to Format String vulnerabilities can avoid result due to working of Format String Bugs. In this paper, we ...
Most people believe that the mainframe platform currently suffers a slow but a certain death. Thi... more Most people believe that the mainframe platform currently suffers a slow but a certain death. This is however a common misconception: The mainframe is very much alive and going strong. This thesis recognizes the mainframe platform's superior qualities, and deals with one of the platform's new driving forces: Server consolidation based on the z/VM operating system and Linux. Some effort is first made to provide a basic understanding of the IBM mainframe architecture in order to establish common ground. A concise, yet theoretically and practically balanced, description of z/VM based virtualization follows. This provides amongst other things insight into how resources (processors resources in particular) can be shared.

Data Representation in Big data via Succinct Data Structures
International journal of engineering science and technology, Jan 31, 2018
Data Representation in memory is one of the tasks in Big data. Data representation includes sever... more Data Representation in memory is one of the tasks in Big data. Data representation includes several types of tree data structures through the system can access accurate and efficient data in big data. Succinct data structures can play important role in data representation while data in big-data is processed in main memory. Data representation is a very complex problem in Big Data.We proposed some solution of problems of data representation in Big data. Data processing in big data can be utilized to take a decision on data mining. We know the function and rules for query processing. We have to either change the method of processor we can change the way of representation. In this paper, different kind of tree data structures is presented for data representation in main memory of computer system for big data by using succinct data structures. Here we first compare all data structures by the table. Each method has different space and time complexity. We know that Big data information services increasing day by day. So space complexity of succinct data structures is becoming very popular in practice in this era.
Finite state machine based approach to prevent format string attacks
ACM Sigsoft Software Engineering Notes, Sep 30, 2011
Analysis of Digital Forensic Tools and Investigation Process
Springer eBooks, 2011
... 239242 (2009) 3. Simson, L., Garfinkel: Digital forensics research: The next 10 years. Digit... more ... 239242 (2009) 3. Simson, L., Garfinkel: Digital forensics research: The next 10 years. DigitalForensic Research Workshop in Science Direct, digital investigation 7, 6473 (2010) http//doi:0.1016/j.diin 4. Olsson, J., Boldt, M.: Computer forensic timeline visualization tool. ...
Classification of SQL Injection Attacks
Automated classroom monitoring with iot and virtuino app
International journal of scientific research in science, engineering and technology, 2019

International Journal of Engineering Development and Research, May 1, 2015
In this paper, an approach is proposed which uses CT scan images of lungs for the effective diagn... more In this paper, an approach is proposed which uses CT scan images of lungs for the effective diagnosis of lung cancer at a prior stage thus increases the survival rate of patient. The most common sign of lung cancer is the pulmonary nodule. The most crucial and important aspect of image processing is the effective identification of lung cancer nodules. This system first preprocesses the image in dicom format (DCM) for removal of noise and segmentation of the region of interest. Feature vector is then defined by extracting the structural and textural features. In this paper, support vector machine(SVM) classifier is applied to detect lung cancer as well as its severity(whether stage 1 or stage 2)as this algorithm achieves a accuracy of 95.12% which helps to reduce the mortality rate of this deadly disease by taking the remedial actions by patients.
IJPCCEM, Oct 30, 2016
E-Learning is most widely used technology by the many of the users. The Object Management Group (... more E-Learning is most widely used technology by the many of the users. The Object Management Group (OMG) proposes the Advanced Model Driven Architecture (AMDA), which enhances mobility of uses by permitting the same model to be acknowledged on various stages. To improve the performance of the proposed work we adopt the LMSGENERATOR, a multi-target Learning administration framework generator with a model-driven procedure focused around MDA methodology coupled with part approach. Taking into account generative programming, from client determinations (abstract models) and the fancied advances, programming blocks will be created and amassed to deliver a complete arrangement adjusted to zone and clients' necessities. This paper concentrates on the change guidelines actualized in the LMSGENERATOR centers.
A coalesce model for secure database
Abstract With the increasing dependency of organizations on Database Systems for their daily tran... more Abstract With the increasing dependency of organizations on Database Systems for their daily transactions, the vulnerability of the system to security breaches has also increased. In spite of the various schemes available to protect the database at various levels, a need for ...

A Comparative Study of Multilayer Feed-forward Neural Network and Radial Basis Function Neural Network Models for Speech Recognition
International journal of scientific research in science, engineering and technology, Aug 30, 2016
The most common way of human-to-human communication is speech. As speech provides the easiest and... more The most common way of human-to-human communication is speech. As speech provides the easiest and most natural way of interaction, it becomes the need of human-to-machine communication as well. Automatic speech recognition (ASR) is the technology to enable machines to understand process and recognize speech. Due to its applicability in various application domains, ASR becomes one of the most fascinating areas of pattern recognition. In this paper, we are analyzing the performances of multilayer feed-forward neural network and Radial basis function neural network models for the recognition of speech signals. The work is conducted in four stages: speech signal acquisition & pre-processing, feature pattern vector creation, implementation & training of selected neural network models and comparative analysis of the performances of selected neural networks. Proposed work is conducted with 10 speech samples of English alphabets .Digital signal processing operations are applied on signals to convert them and make them appropriate for further processing. Five feature pattern vectors are created to be used for training and testing of the network models. Performance of selected neutral network models is measured and analyzed for the created feature pattern vectors. Results indicate that feed-forward neural network model performs better than the Radial basis function neural network for all the test pattern vectors.

Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a frame... more Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, ondemand network access to a shared pool of computing resources. Load balancing is one of the main challenges in cloud computin g which is required to distribute the dynamic workload across multiple nodes to ensure that no single node is overwhelmed. It helps in optimal utilization of resources and hence in enhancing the performance of the system. The goal of load balancing is to minim ize the resource consumption which will further reduce energy consumption and carbon emission rate that is the dire need of cloud computing.”Cloud computing” is a term, which involves virtualization, distributed computing, networking, software and web ser vices. A cloud consists of several elements such as clients, data enter and distributed servers. It includes fault tolerance, high availability, Scalability, flexibility, reduced overhead for users, reduced cost of ownership,...

J2EE Deaign Pattern (Implementation of MVC in Struts 2.0)
J2EE architecture is complicated technology which including client, presentation, business logic ... more J2EE architecture is complicated technology which including client, presentation, business logic and data persistence layer. In J2EE, it should control the access to data persistence layer seriously to protect important enterprise data and avoid showing database pattern to client directly. The data persistence layer hides behind the business logic layer and provide business interfaces via the business logic layer to communicate with the presentation layer to package the data persistence layer, separates the data persistence layer from the presentation layer. This paper based on the concept of separation of concern and loose coupling middleware technology which is the solution of the dynamic E-business system through analyzing J2EE architecture, MVC design pattern, the component technology of JSP, Servlet and EJB etc. Struts 2.0 is an MVC design pattern based framework which can simplify the software development, improve the software performance and quickly construct the dynamic E-bu...
Improve Time Delay of Packets in 4G Networks Technology to Avoid Congestion in Network Data Traffic
Mobile communication is rapidly growing like a banyan tree. In today time all real world tasks is... more Mobile communication is rapidly growing like a banyan tree. In today time all real world tasks is performed through Internet. Due to this number of Internet users are also increased, so it rises up many problems. A main aspect in these problems is Congestion problem. Congestion is a situation in which network traffic is affected and can’t give quicker response as his attributes. Data is transferred between networks in form of packets in the Internet layers. So packet can be delivered on their destination on time or after time. This is a critical situation that is not acceptable in any form by any one. In this paper we propose a model for “Improving the time delay of packets”, to avoid the network congestion in Internet layers during data transmission.
Efficacy of Some New Herbicides in Wet Seeded Rice (Oryza sativa L.)
Indian Journal of Weed science, 2005
Pyrazosulfuron-ethyl at 25 g ha−1 applied 10 days after sowing (DAS) was found most effective, re... more Pyrazosulfuron-ethyl at 25 g ha−1 applied 10 days after sowing (DAS) was found most effective, recording 85.8% reduction in dry matter of weeds and 54.6% higher grain yield over weedy check. The corresponding increase in grain yield was 45.7, 39.0 and 28,8% with pyrazosulfuron-ethyl at 20 g ha−1 applied 10 DAS, two hand weedings done 20 and 40 DAS, and butachlor+safener at 1.00 kg ha−1 applied 3 DAS, respectively.

Denoising Magnetic Resonance Imaging Using Fuzzy Similarity Based Filter
Proceedings of the 1st International Conference on Smart Innovation, Ergonomics and Applied Human Factors (SEAHF), 2019
Images are very useful source of information which is often degraded due to presence of noise. No... more Images are very useful source of information which is often degraded due to presence of noise. Noise present in the image especially in MRI images hides the important information which is very important to diagnose the disease. So to retain the quality of image we need to remove noise. Hence denoising is very essential to obtain precise images to facilitate the accurate observations. Fuzzy Similarity based Non-Local Means (FSNLM) filter is used to select homogeneous pixels for the estimation of noise-free pixels. Rician noise introduces bias which corrupts MRI images. The bias correction has been proposed for the removal of bias from MRI images which increases contrast and PSNR. The proposed scheme has been tested on simulated data sets and compared with existing method.

Uses of Mobile in Business
This paper presents a framework for evaluating the business value of mobile technology in the con... more This paper presents a framework for evaluating the business value of mobile technology in the context of process transformation. It is argued that evaluating mobile applications must be done in that context. The proposed framework provides a starting point for companies to evaluate technology investment decisions in the context of enabling the enterprise for the next generation eBusiness practices. Third-generation (3G) mobile communication systems are currently one of the key communication technologies in research and development. While the first generation included analog mobile phones and the second generation (2G) included digital mobile phones, the 3G bring us digital multimedia handsets with high data transmission rates, capable of providing much more than basic voice calls. As an increasing number of organizations and individuals are dependent on mobile technologies to perform their tasks, various mobile applications have been rapidly introduced and used in a number of areas ...
Uploads
Conference Presentations by JAYANT SHEKHAR
Papers by JAYANT SHEKHAR