Skip to main content

Showing 1–6 of 6 results for author: Silakari, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1311.6877  [pdf

    cs.IT cs.MM

    A Survey: Various Techniques of Image Compression

    Authors: Gaurav Vijayvargiya, Sanjay Silakari, Rajeev Pandey

    Abstract: This paper addresses about various image compression techniques. On the basis of analyzing the various image compression techniques this paper presents a survey of existing research papers. In this paper we analyze different types of existing method of image compression. Compression of an image is significantly different then compression of binary raw data. To solve these use different types of te… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 5 pages

  2. arXiv:0912.2282  [pdf

    cs.DB cs.AI

    Design of Intelligent layer for flexible querying in databases

    Authors: Mrs. Neelu Nihalani, Dr. Sanjay Silakari, Dr. Mahesh Motwani

    Abstract: Computer-based information technologies have been extensively used to help many organizations, private companies, and academic and education institutions manage their processes and information systems hereby become their nervous centre. The explosion of massive data sets created by businesses, science and governments necessitates intelligent and more powerful computing paradigms so that users ca… ▽ More

    Submitted 11 December, 2009; originally announced December 2009.

    Journal ref: IJCSE Volume 1 Issue 2 2009 30-39

  3. arXiv:0912.1014  [pdf

    cs.CR cs.LG

    An ensemble approach for feature selection of Cyber Attack Dataset

    Authors: Shailendra Singh, Sanjay Silakari

    Abstract: Feature selection is an indispensable preprocessing step when mining huge datasets that can significantly improve the overall system performance. Therefore in this paper we focus on a hybrid approach of feature selection. This method falls into two phases. The filter phase select the features with highest information gain and guides the initialization of search process for wrapper phase whose ou… ▽ More

    Submitted 5 December, 2009; originally announced December 2009.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS November 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 2, pp. 297-302, November 2009, USA

  4. arXiv:0911.0787  [pdf

    cs.CR cs.CV cs.NE

    Generalized Discriminant Analysis algorithm for feature reduction in Cyber Attack Detection System

    Authors: Shailendra Singh, Sanjay Silakari

    Abstract: This Generalized Discriminant Analysis (GDA) has provided an extremely powerful approach to extracting non linear features. The network traffic data provided for the design of intrusion detection system always are large with ineffective information, thus we need to remove the worthless information from the original high dimensional database. To improve the generalization ability, we usually gene… ▽ More

    Submitted 4 November, 2009; originally announced November 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 173-180, October 2009, USA

  5. arXiv:0910.1849  [pdf

    cs.CV

    Color Image Clustering using Block Truncation Algorithm

    Authors: Sanjay Silakari, Mahesh Motwani, Manish Maheshwari

    Abstract: With the advancement in image capturing device, the image data been generated at high volume. If images are analyzed properly, they can reveal useful information to the human users. Content based image retrieval address the problem of retrieving images relevant to the user needs from image databases on the basis of low-level visual features that can be derived from the images. Grouping images in… ▽ More

    Submitted 9 October, 2009; originally announced October 2009.

    Comments: " International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp31-35, September 2009"

    Journal ref: S. Silakari, M. Motwani and M. Maheshwari," Color Image Clustering using Block Truncation Algorithm", International Journal of Computer Science Issues, IJCSI, Volume 4, Issue 2, pp31-35, September 2009

  6. arXiv:0907.0678  [pdf

    cs.CR cs.NI

    Design and Analysis of an Attack Resilient and Adaptive Medium access Control Protocol for Computer Networks

    Authors: Piyush Kumar Shukla, Dr. S. Silakari, Dr. Sarita Singh Bhadoria

    Abstract: The challenge of designing an efficient Medium Access Control (MAC) protocol and analyzing it has been an important research topic for over 30 years. This paper focuses on the performance analysis (through simulation) and modification of a well known MAC protocol CSMA/CD. The existing protocol does not consider the wastage of bandwidth due to unutilized periods of the channel. By considering thi… ▽ More

    Submitted 3 July, 2009; originally announced July 2009.

    Comments: 10 pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS May 2009 Issue, Vol. 1, No. 1