<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/461" />
  <subtitle />
  <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/461</id>
  <updated>2026-04-27T18:59:16Z</updated>
  <dc:date>2026-04-27T18:59:16Z</dc:date>
  <entry>
    <title>A Survey on Latest Wireless Technologies</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2283" />
    <author>
      <name>Mewada, K.M.</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2283</id>
    <updated>2025-01-06T09:36:03Z</updated>
    <published>2016-02-01T00:00:00Z</published>
    <summary type="text">Title: A Survey on Latest Wireless Technologies
Authors: Mewada, K.M.
Abstract: Wireless communication is among technology’s biggest contributions to mankind. Wireless communication&#xD;
involves the transmission of information over a distance without the help of wires, cables, or any other forms of electrical conductors. The transmitted distance can be anywhere between a few meters (for example, a television’s remote control) and thousands of kilometers (for example, radio communication). It is used as an advantage for working professionals in remote areas to remain in touch with their main headquarters. Moreover, it is wireless so it can be easily accessible without cables and wires. It is cheaper to install and maintain.</summary>
    <dc:date>2016-02-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>A hybrid watermarking scheme with CS theory for security of multimedia data</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2263" />
    <author>
      <name>Thank, Rohit</name>
    </author>
    <author>
      <name>Dwivedi, Vedvyas</name>
    </author>
    <author>
      <name>Borisagar, Komal</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2263</id>
    <updated>2025-01-02T07:14:45Z</updated>
    <published>2019-10-01T00:00:00Z</published>
    <summary type="text">Title: A hybrid watermarking scheme with CS theory for security of multimedia data
Authors: Thank, Rohit; Dwivedi, Vedvyas; Borisagar, Komal
Abstract: A hybrid watermarking scheme for multimedia data such as digital image, digital video is proposed in this paper. The scheme utilizes various image processing transforms and Compressive Sensing (CS) to achieved fragility and security for multimedia data. The compressive sensing is applied on the singular value of wavelet coefficients of watermark image to get the CS measurements. These CS measurements are embedded with embedding factor into the hybrid coefficients (high frequency curvelet coefficients of DT coefficients) of the host medium. In the proposed scheme, host medium may be digital image or video. The generated watermarked data have different security layers such as four levels from CS such as knowledge of transform basis matrix, measurement matrix, orthogonal matrices, information of wavelet basis matrix and one level from watermarking such as embedding factor. The scheme offers fragility and security to multimedia data against various standard watermarking attacks such as signal processing attacks, geometric attacks, and compression attacks. This scheme can be provided high payload capacity and used for host multimedia authentication. A comparison of proposed scheme with existed schemes shows that the proposed scheme performed faster and better than existed schemes available in the literature.</summary>
    <dc:date>2019-10-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2262" />
    <author>
      <name>Borisagar, Komal</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2262</id>
    <updated>2025-01-02T07:14:18Z</updated>
    <published>2019-04-01T00:00:00Z</published>
    <summary type="text">Title: Secure transmission and integrity verification of color radiological images using fast discrete curvelet transform and compressive sensing
Authors: Borisagar, Komal
Abstract: Rapid growth in digitization and globalization has influenced the medical field immensely. The radiological pictures are frequently shared comprehensively among specialists, medicinal experts, radiologists, analysts, and patients themselves by means of wired or remote media for purposes, for example, common accessibility and enhancing the diagnostic results. This paper proposes a hybrid and high capacity image hiding technique for secure transmission and integrity of color radiological images. The Compressive Sensing (CS) theory is used to encrypt the color secret image before embedding them into high frequency Fast Discrete Curvelet Transform (FDCuT) coefficients of color radiological images. The simulations gave a PSNR of 63.96 dB, which demonstrates better performance in terms of imperceptibility of stego color radiological image. Further, expansive payload limit is permitted when contrasted with many existing strategies.</summary>
    <dc:date>2019-04-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Efficacy of Decentralized CSS clustering model over TWDP fading Scenario</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2199" />
    <author>
      <name>Dobaria, Anki D.</name>
    </author>
    <author>
      <name>Vora, Vishal S.</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2199</id>
    <updated>2025-01-01T11:07:53Z</updated>
    <published>2023-01-01T00:00:00Z</published>
    <summary type="text">Title: Efficacy of Decentralized CSS clustering model over TWDP fading Scenario
Authors: Dobaria, Anki D.; Vora, Vishal S.
Abstract: Cognitive Radio technology, which lowers spectrum scarcity, is a rapidly growing wireless communication technology. CR technology detects spectrum holes or unlicensed spectrums which primary users are not using and assigns it to secondary users. The dependability of the spectrum-sensing approach is significantly impacted from two of the most critical aspects, namely fading channels and neighboring wireless users. Users of non-cooperative spectrum sensing devices face numerous difficulties, including multipath fading, masked terminals, and shadowing. This problem can be solved using a cooperative- spectrum-sensing technique. For the user, CSS enables them to detect the spectrum by using a common receiver. It has also been divided into distributed CSS and centralized CSS. This article compares both ideas by using a set of rules to find out whether a licensed user exists or not. This thought was previously used to the conventional fading channels, such as the Rician, Rayleigh and the nakagami-m models. This work focused on D-CSS using clustering approach over TWDP fading channel using two-phase hard decision algorithms with the help of OR rule as well as AND rule. The evaluation of the proposed approaches clearly depicted that the sack of achieve a detection-probability of greater than 0.8; the values SNR varies between -14 dB to -8 dB. For all two-phase hard decision algorithms using proposed approach and CSS techniques, the detection probability is essentially identical while the value of signal to noise ratio is between -12 dB to -8dB. Throughout this work, we assess performance of cluster-based cooperative spectrum-sensing over TWDP channel with the previous findings of AWGN, Rayleigh, and wei-bull fading channels. The obtained simulation results show that OR-AND decision scheme enhanced the performance of the detector for the considered range of signal to noise ratios.</summary>
    <dc:date>2023-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

