Renu Dhir

Work place: CSE Department, Dr B R ambedkar NIT Jalandhar

E-mail: dhirr@nitj.ac.in

Website:

Research Interests: Pattern Recognition, Image Processing, Speech Recognition

Biography

Dr. Renu Dhir has done Ph.D. from Punjabi University in 2008 and completed her M.Tech. (Computer Science & Engineering) in 1997 from TIET, patiala. She is currently working as associate professor in computer science and engineering department at Dr B R Ambedkar NIT, Jalandhar. Her fields of research are mainly character recognition, pattern recognition and image processing and she has published more than 35 papers in national and international conferences and journals.

Author Articles
An Investigation on the Metric Threshold for Fault- Proneness

By Aarti Geeta Sikka Renu Dhir

DOI: https://doi.org/10.5815/ijeme.2017.03.04, Pub. Date: 8 May 2017

The software quality can be enhanced with the awareness and compassionate about the software faults. We acknowledge the impact of threshold of the object-oriented metrics on fault-proneness. The prediction of fault-prone classes in early stage of the life-cycle assures you to allocate the resources effectively. In this paper, we proposed the logistic regression based statistical method and metric threshold to reduce the false alarm for projects that fall outside the risk range. We presented the threshold effects on public datasets collected from the NASA repository and validated the use of threshold on ivy and jedit datasets. The results concluded that proposed methodology achieves the speculative results with projects having similar characteristic.

[...] Read more.
Security Analysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

By Raman Kumar Harsh Kumar Verma Renu Dhir

DOI: https://doi.org/10.5815/ijcnis.2012.09.08, Pub. Date: 8 Aug. 2012

An efficient threshold signature scheme solves the difficulties of the receiver to proof the approval of the document from the sender as well as detecting if the file has been altered by illegitimate parties. In these days there are plenty of signature schemes such as (t,n) threshold proxy signature scheme. The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a (t,n) threshold proxy signature scheme based on RSA, any t or more proxy signers can cooperatively generate a proxy signature while t-1 or fewer of them can't do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers. Comparison is done on the basis of time complexity, space complexity and communication overhead. We compare the performance of four schemes: Hwang et al., Wen et al., Geng et al. and Fengying et al. with the performance of a scheme that has been proposed by the authors of this article earlier. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks.

[...] Read more.
Other Articles