Nidhi Chandra

Work place: Department of Computer Science and Engineering, Noida, Utter Pradesh, India

E-mail: srivastavanidhi8@gmail.com

Website:

Research Interests: Computer Architecture and Organization, Natural Language Processing, Computer Science & Information Technology

Biography

Nidhi Chandra has more than 7 years of experience in academics and industry. She received her M.Tech from CDAC NOIDA, affiliated from GGSIPU, Delhi. Presently she is working as Assistant Professor at Amity University Noida. She has worked with Tata Unisys and CDAC Noida. Her research interests include Network security, Natural Language Processing and Semantic Web Based Application.

Author Articles
An Ingenious Wireless Home Security System and Protocol based upon Multi-hop 802.15.4 standard, Magnetic contact and PIR sensor

By Ulya Sabeel Nidhi Chandra Shivraj Dagadi

DOI: https://doi.org/10.5815/ijmecs.2013.07.06, Pub. Date: 8 Jul. 2013

Security is the major part of home automation systems for the people. With the development of network and automatic control technology, a home security monitoring and alarming system becomes more and more practicable today. In this paper we have proposed simple, low cost, low power consumption and a novel method for implementing the home security using Zigbee (802.15.4) standard and also a security protocol for detecting and localizing identity based attacks in the system. We have named our scheme as Wireless Home Security System (WHSS) and protocol as Wireless Home Security Protocol (WHSP). It consists of many sensor nodes deployed in the rooms as well as the doors/ windows of the house together with the zigbee modules which act as end devices that monitor continuously and send the security status of each room to the coordinator node connected to a PC which acts as the master. The communication in this case is multi-hop which provides unlimited range. Here we have used the XBEE Pro series1 (XBP24-AWI-001) radios for RF communication, DYP-ME003 PIR sensor, and Contact Door / window sensor based on magnetic reed switch (ORD221).The hardware implementation has been tested for validation successfully. The software has been implemented using C#. Also the performance of our proposed security protocol has been analysed using NS2 and is found to be satisfactory.

[...] Read more.
ERPWS: An Energy Efficient Routing Protocol for Conductive Sensor based Water Level Monitoring and Control System using Zigbee and 74HC14 Inverter

By Saima Maqbool Nidhi Chandra Shivraj Dagadi

DOI: https://doi.org/10.5815/ijmecs.2013.06.05, Pub. Date: 8 Jun. 2013

In this paper we have shown how to use conductive sensor, Zigbee and 74HC14 Inverter to monitor the water level and to control the working of pump. This project is designed to automatically fill the over head tank when it gets empty and monitor the water level in it. The motor is switched ON when the water level in the overhead tank drops below a pre fixed low level (on point) and puts off the motor when water level rises up to pre fixed high level (off point).The motor is also switched off during the following conditions: when the sump water is exhausted before filling overhead tank, pump running dry, mains voltage fluctuations. We also introduce an energy efficient routing protocol for Wireless Sensor Networks (ERPWS) for Conductive Sensor based Water Level Monitoring and Control System using Zigbee (XBEE 802.15.4) in terms of energy consumptions, the packet loss ratio, network lifetime and the average delivery delay. The XBEE used here is XBEE Pro Series 1(XBP24-AWI-001) and IC used is 74HC14 Hex Inverting Schmitt trigger. Simulation results have been obtained by using NS2 simulator. The evaluation results show that the energy consumption of routing using ERPWS is significantly lower than LEACH and traditional routing protocols.

[...] Read more.
Domain Based Ontology and Automated Text Categorization Based on Improved Term Frequency – Inverse Document Frequency

By Sukanya Ray Nidhi Chandra

DOI: https://doi.org/10.5815/ijmecs.2012.04.04, Pub. Date: 8 Apr. 2012

In recent years there has been a massive growth in textual information in textual information especially in the internet. People now tend to read more e-books than hard copies of the books. While searching for some topic especially some new topic in the internet it will be easier if someone knows the pre-requisites and post- requisites of that topic. It will be easier for someone searching a new topic. Often the topics are found without any proper title and it becomes difficult later on to find which document was for which topic. A text categorization method can provide solution to this problem. In this paper domain based ontology is created so that users can relate to different topics of a domain and an automated text categorization technique is proposed that will categorize the uncategorized documents. The proposed idea is based on Term Frequency – Inverse Document Frequency (tf -idf) method and a dependency graph is also provided in the domain based ontology so that the users can visualize the relations among the terms.

[...] Read more.
A Technique to Choose the Proper Vector Space Models of Semantics in Case of Automatic Text Categorization

By Sukanya Ray Nidhi Chandra

DOI: https://doi.org/10.5815/ijmecs.2012.04.05, Pub. Date: 8 Apr. 2012

Vides a proper solution to this limitation. There are broadly three main categories of Vector Space Model: term-document, word-content and pair-pattern matrices. The main aim of this paper is to discuss broadly the three main categories of VSM for semantic analysis of texts and make proper selection for automatic categorizing. The scenario taken up here is categorization of research papers for organizing a national or an international conference based on the proposed methodology. Computers do not understand human language and this makes it difficult when human wants the computer to do some specific task like categorization according to human need. Vector Space Model (VSM) for semantic analysis of texts and make proper selection of one of the three main categories for automatic categorizing of research papers for organizing a national or an international conference based on the proposed methodology.

[...] Read more.
A Technique for Image Encryption with Combination of Pixel Rearrangement Scheme Based On Sorting Group-Wise Of RGB Values and Explosive Inter-Pixel Displacement

By Amnesh Goel Nidhi Chandra

DOI: https://doi.org/10.5815/ijigsp.2012.02.03, Pub. Date: 8 Mar. 2012

Encryption is used to prevent data from unauthorized access and with the appalling headway in network technology seen in the past decade; it has become the need of time to encrypt the images before sending over open network. Though researchers has proposed contrastive methods to encrypt images but correlation between pixels RGB value play a imperative part to guess for original image. So, here we introduce a new image encryption method which first rearranges the pixels within image on basis of RGB values and then forward intervening image for encryption. Experimentally it has shown that pixel rearrangement is enough from image encryption point of view but to send image over open network; inter-pixel displacement algorithm is applied to dispense more armament to image before transmission.

[...] Read more.
Other Articles