0000000000139077

AUTHOR

Munesh Chandra Trivedi

showing 3 related works from this author

Special issue on ambient advancements in intelligent computational sciences

2018

Statistics and ProbabilityEngineeringArtificial Intelligencebusiness.industryGeneral EngineeringSystems engineeringbusinessJournal of Intelligent & Fuzzy Systems
researchProduct

Patch-Based Image Denoising Model for Mixed Gaussian Impulse Noise Using L1 Norm

2017

Image denoising is the classes of technique used to free the image form the noise. The noise in the image may be added during the observation process due to the improper setting of the camera lance, low-resolution camera, cheap, and low-quality sensors, etc. Noise in the image may also be added during the image restoration, image transmission through the transmission media. To obtain required information from image, image must be noise free, i.e., high-frequency details must be present in the image. There are number of applications where image denoising is needed such as remote location detection, computer vision, computer graphics, video surveillance, etc. In last two decades, numbers of m…

Mathematical optimizationbusiness.industryComputer scienceGaussianComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONTransmission mediumImpulse (physics)Non-local meansImpulse noiseComputer graphicssymbols.namesakeGaussian noiseComputer Science::Computer Vision and Pattern RecognitionsymbolsComputer visionArtificial intelligencebusinessImage restoration
researchProduct

Securing AODV routing protocol against black hole attack in MANET using outlier detection scheme

2017

Imposing security in MANET is very challenging and hot topic of research science last two decades because of its wide applicability in applications like defense. Number of efforts has been made in this direction. But available security algorithms, methods, models and framework may not completely solve this problem. Motivated from various existing security methods and outlier detection, in this paper novel simple but efficient outlier detection scheme based security algorithm is proposed to protect the Ad hoc on demand distance vector (AODV) reactive routing protocol from Black hole attack in mobile ad hoc environment. Simulation results obtained from network simulator tool evident the simpl…

Routing protocolDistance-vector routing protocolRobustness (computer science)business.industryPacket drop attackAd hoc On-Demand Distance Vector RoutingComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSAnomaly detectionMobile ad hoc networkbusinessComputer networkNetwork simulation2017 4th IEEE Uttar Pradesh Section International Conference on Electrical, Computer and Electronics (UPCON)
researchProduct