Zenodo (CERN European Organization for Nuclear Research), May 6, 2023
The printing and scanning industry has made significant technological advancements, but unfortuna... more The printing and scanning industry has made significant technological advancements, but unfortunately, this has also led to a rise in counterfeiting. Counterfeit currency can negatively impact the economy and reduce the value of genuine money. Therefore, detecting fake currency is crucial. Traditional methods have relied on hardware and image processing techniques, which can be inefficient and timeconsuming. To address this issue, we have proposed a new approach that uses a deep convolutional neural network to detect counterfeit currency. Our method analyzes currency images and can efficiently identify fake currency in real time. We trained a transfer learned convolutional neural network using a dataset of two thousand currency notes to learn the feature map of genuine currency. Once the feature map is learned, the network is able to identify counterfeit currency quickly and accurately. Our proposed approach is highly effective and significantly reduces the time required to identify fake currency among the 500 notes in our dataset. I.
Intelligent Autonomous Six Legged Robot Operate On Uneven Surfaces
This paper presents design and development of an intelligent robot that easily operates on uneven... more This paper presents design and development of an intelligent robot that easily operates on uneven surfaces with six-legged arms. The system design depicts the “Intelligent Robot” that supports voice activation system as well as operates through the keyboard. Legged robots are appropriate to stroll on troublesome landscapes to the detriment of requiring complex control frameworks to walk even on level surfaces. Be that as it may, essentially strolling on a level surface does not merit utilizing a legged robot. It ought to be expected that strolling on an unexpected landscape is the run of the mill circumstance for a legged robot. In view of this commence, we have built up a vigorous controller for a six-legged robot that enables it to stroll over troublesome landscapes in a self-sufficient route; with a constrained utilization of tactile data (no vision is included). This walk controller can be driven by an upper level which requires not be worried about the subtle elements of foot a...
Network coding has been recently applied to wireless networks to increase throughput. Back-pressu... more Network coding has been recently applied to wireless networks to increase throughput. Back-pressure type algorithms based on the algorithmby Tassiulas and Ephremides have recently receivedmuch attention for jointly routing and scheduling over multi-hopwireless networks. we explore the performance of backpressure routing and scheduling for TCP flows over wireless networks. TCP and backpressure are not compatible due to a mismatch between the congestion control mechanism of TCP and the queue size based routing and scheduling of the backpressure framework. We decouple the routing and scheduling components of the algorithm by designing a probabilistic routing table that is used to route packets to per-destination queues. The scheduling decisions in the case of wireless networks are made using counters called shadow queues.
Computer Science and Information Technologies, 2020
Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing pro... more Cloud Computing makes immense use of internet to store a huge amount of data. Cloud computing provides high quality service with low cost and scalability with less requirement of hardware and software management. Security plays a vital role in cloud as data is handled by third party hence security is the biggest concern to matter. This proposed mechanism focuses on the security issues on the cloud. As the file is stored at a particular location which might get affected due to attack and will lost the data. So, in this proposed work instead of storing a complete file at a particular location, the file is divided into fragments and each fragment is stored at various locations. Fragments are more secured by providing the hash key to each fragment. This mechanism will not reveal all the information regarding a particular file even after successful attack. Here, the replication of fragments is also generated with strong authentication process using key generation. The auto update of a fr...
As the popularity of mobile device and wireless networks significantly increased over the past ye... more As the popularity of mobile device and wireless networks significantly increased over the past years. Wireless ad-hoc networks has now become one of the most vibrant and active field of communication and networks. Due to different challenges, the special features of MANET bring this technology great opportunistic together. In this study, the existing approach is AODV routing protocol without any detection mechanism. But proposed approach is AODV routing protocol with detection mechanism. The implemented mechanism detects malicious node that launch the proper attack in virtual link attack. The goal of virtual link attack is, to create virtual symmetric link between two nodes, which may leads to data packet loss. In order to combat this problem I implemented the mechanism for avoiding this attack.
Data Transfer Between Two PC’s Using Intrabody Communication System
Intrabody Communication (IBC) is a method that uses the human body as a transmission medium for t... more Intrabody Communication (IBC) is a method that uses the human body as a transmission medium for transmission of electrical signals, providing an efficient channel to connect devices within body sensor networks (BSN) or under personal area network (PAN), and presenting notorious advantages in comparison with usual wireless RF standards such as Bluetooth and Zigbee. For instance, these standards were intended to operate at distances of several tens of meters, causing electromagnetic energy to be radiated into the environment, thus increasing power consumption. In contrast, IBC is based on near-field coupling, in such a way that the popular of the signal is confined through the surface of the body, without much energy being radiated into the air. This feature makes IBC suitable for use with low frequencies and low power signals, thus decreasing consumption, allowing miniaturization, and mitigating external interferences. These advantages have led researchers to progress IBC electronic ...
Uploads
Papers by Rahul Jiwane