no code implementations • 21 Dec 2023 • Sahil Nokhwal, Manoj Chandrasekharan, Ankit Chaudhary
Various methods have been proposed to secure access to sensitive information over time, such as the many cryptographic methods in use to facilitate secure communications on the internet.
1 code implementation • 15 Dec 2023 • Sahil Nokhwal, Priyanka Chilakalapudi, Preeti Donekal, Suman Nokhwal, Saurabh Pahune, Ankit Chaudhary
This study examines innovative approaches to expedite the training process of deep neural networks (DNN), with specific emphasis on three state-of-the-art models such as ResNet50, Vision Transformer (ViT), and EfficientNet.
no code implementations • 15 Dec 2023 • Sahil Nokhwal, Suman Nokhwal, Saurabh Pahune, Ankit Chaudhary
In this pioneering research paper, we present a groundbreaking exploration into the synergistic fusion of classical and quantum computing paradigms within the realm of Generative Adversarial Networks (GANs).
no code implementations • 13 Dec 2023 • Sahil Nokhwal, Saurabh Pahune, Ankit Chaudhary
In our currently proposed image steganographic technique, we used the Shuffled Frog Leaping Algorithm (SFLA) to determine the order of pixels by which sensitive information can be placed in the cover image.
no code implementations • 8 Sep 2014 • J. L. Raheja, B. Ajay, Ankit Chaudhary
A sliding window technique is used for defect detection where window moves over the whole image computing a textural energy from the GLCM of the fabric image.
no code implementations • 13 Jun 2014 • Ankit Chaudhary, J. L. Raheja, K. Das, S. Raheja
In this paper, a novel method for fingertip detection and for angle calculation of both hands bent fingers is discussed.
no code implementations • 17 Apr 2013 • Ankit Chaudhary, Jagdish L. Raheja
This paper discusses a vision based health monitoring system which would be very easy in use and deployment.
no code implementations • 17 Apr 2013 • Ankit Chaudhary, Ankur Gupta
In Computer Vision, colour-based spatial techniquesoften assume a static skin colour model.
no code implementations • 13 Mar 2013 • S. Kumar, R. Sehgal, P. Singh, Ankit Chaudhary
In this paper, we are sharing our experience of botnet detection in the private network as well as in public zone by deploying the nepenthes honeypots.
Cryptography and Security
no code implementations • 10 Mar 2013 • Ankit Chaudhary, J. L. Raheja, Karen Das, Sonia Raheja
Hand gestures recognition (HGR) is one of the main areas of research for the engineers, scientists and bioinformatics.
no code implementations • 23 Nov 2012 • Ankit Chaudhary, J. Vasavada, J. L. Raheja, S. Kumar, M. Sharma
The objective of this work is to increase the security level and to improve the storage capacity with compression techniques.