Rakesh Kumar

Work place: Department of CSE Sachdeva Engg. college for Girls, Kharar

E-mail: rakesh77kumar@yahoo.com

Website:

Research Interests: Information Security, Network Architecture, Network Security

Biography

Rakesh Kumar has eleven years experience in academics. He completed his Master Computer Application and MTech (CSE). He is also pursuing Ph.D in computer Science. He is currently the Dean and Head of Department in computer Science & Engineering in Sachdeva Engineering College for Girls, Gharuan, Distt. Mohali. He has published number of papers in International and National journals. He has also published two books i.e. How to Program in c++ and Network Security. He is guiding some of the students in the field of Natural Language Processing.

Author Articles
An Approach for Similarity Matching and Comparison in Content based Image Retrieval System

By Er. Numa Bajaj Er. Jagbir Singh Gill Rakesh Kumar

DOI: https://doi.org/10.5815/ijieeb.2015.05.07, Pub. Date: 8 Sep. 2015

Today, in the age of images and digitization relevant retrieval is quite a topic of research. In past era, the database was having only text or database was low dimensional type. But with every new day thousands of pictures are getting added into the database making it a high dimensional data set. Therefore, from a high dimensional dataset to get a set of relevant images is quite a cumbersome task. Number of approaches for getting relevant retrieval is defined, some includes retrievals only on the basis of color, while some include more than one primitive feature to retrieve the relevant image such as color, shape and texture. In this paper experiment has been performed on the trademark images. Trademark is a very important asset for any organization and increasing trademark images have developed a quick need to organize these images. This paper includes the implementation of HSV model for fast retrieval. Which use color and texture so as to extract feature vector. Experiment takes query image and retrieve twelve most relevant images to the user. Further for performance evaluation parameter used is Precision and Recall.

[...] Read more.
An Efficient Novel Key Management Scheme for Enhancing User Authentication in A WSN

By Harjot Bawa Parminder Singh Rakesh Kumar

DOI: https://doi.org/10.5815/ijcnis.2013.01.07, Pub. Date: 8 Jan. 2013

The Wireless Sensor Networks are energy constrained and are normally low cost and low power devices. These nodes are deployed over a specific area for specific goals. Due to energy and memory constraints, secure communication among these sensors is challenging management issue. In order to ensure security, proper connectivity among nodes and resilience against node capture, we propose a scheme called as Random Pre-Key distribution scheme which takes advantage of the binomial key pattern while creating and distributing keys. The value of keys would develop the number of patterns, which is given by the binomial distribution, which would be helpful in maintaining a key pool which is all though random in nature and following a pattern leads to more probability of network connection links. This paper provides a secured communication in WSNs environment and pairing user authentication has been proposed. We employ the idea of dividing the sensor network field into scattered nodes. Inside the scenario, one of the sensor nodes is selected as a server sensor node which is responsible for delivering the key. The novelty of the proposed scenario lies behind the idea of incorporating the sensor nodes along with the proper user authentications. We calculate the throughput involving a periodic traffic and obtained results from the xgraph utility with the use of Network Simulator. The results of this key scheme are obtained and show that improvement in terms of connectivity.

[...] Read more.
Other Articles