Refine your search
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sahu, Vinay
- On Two Noteworthy Hornworts from Eastern and Western Himalaya, India
Abstract Views :275 |
PDF Views:0
Authors
Source
Indian Forester, Vol 137, No 7 (2011), Pagination: 913-915Abstract
no abstract- Diversity of Liverworts and Hornworts in Pithoragarh and its Neighbouring Areas, Western Himalaya of India
Abstract Views :257 |
PDF Views:0
Authors
Vinay Sahu
1,
A. K. Asthana
1
Affiliations
1 Bryology Laboratory, CSIR-National Botanical Research Institute, Lucknow – 226 001, India
1 Bryology Laboratory, CSIR-National Botanical Research Institute, Lucknow – 226 001, India
Source
Indian Forester, Vol 140, No 4 (2014), Pagination: 389-394Abstract
An enumeration of 30 taxa of liverworts belonging to 13 families and single taxon of hornwort of Pithoragarh and its neighbouring areas (Mayawati-Lohaghat) has been made. One liverwort, Lejeunea aquatica Horik. has been recorded as new to India, four liverworts Frullania neurota Taylor, F. companulata Sde., Lejeunea brittoniae (Evans) Grolle,and L. cavifolia (Ehrh.) Lindb. were new to western Himalaya, while 6 liverworts and one hornwort were new to Kumaon Himalaya.Keywords
Liverworts, Pithoragarh, Uttarakhand, India- Diversity in Mosses of Pithoragarh and its Neighbouring Areas, Western Himalaya, India
Abstract Views :139 |
PDF Views:0
Authors
Vinay Sahu
1,
A. K. Asthana
1
Affiliations
1 Bryology Laboratory, CSIR-National Botanical Research Institute, Lucknow, IN
1 Bryology Laboratory, CSIR-National Botanical Research Institute, Lucknow, IN
Source
Indian Forester, Vol 141, No 11 (2015), Pagination: 1183-1193Abstract
Present study provides an account of 72 taxa of mosses belonging to 24 families. During the study five mosses Fissidens polysetulus C. Muell. ex Gangulee & Norkett, Ectropothecium kerstanii Dix. & Herz., Isopterygium serrulatum Fleisch., Weissia edentula Mitt., Rhachithecium perpusillum (Thwait & Mitt.) Broth. are new to western Himalaya, while 10 mosses are new to Kumaon Himalaya.Keywords
Mosses, Taxa, Western Himalaya.- Application of Two Level Securities for Data by Combining Symmetric Key Encryption and Audio Steganography
Abstract Views :143 |
PDF Views:2
Authors
Affiliations
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Software Engineering, Vol 5, No 8 (2013), Pagination: 278-281Abstract
In this paper, the proposed method hides the secret message based on searching about the identical bits between the secret messages and image pixels values. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques some are more complex than others and all of them have respective strong and weak points The first to employ hidden communications techniques -with radio transmissions- were the armies, because of the strategic importance of secure communication and the need to conceal the source as much as possible. Nowadays, new constraints in using strong encryption for messages are added by international laws, so if two peers want to use it, they can resort in hiding the communication into casual looking data. This problem has become more and more important just in these days, with which around thirty of the major - with respect to technology - countries in the world methods are discussed and analyzed based on the ratio between the number of the identical and the non identical bits between the pixel color values and the secret message values This property is used for proposed image encryption and for steganography to increase the security level of the encoded image and to make it less visible.Keywords
Surveillance Information, Segmenting, Object Tracking, Significant Percentage, Auto-Calibration.- Robust Tracking and Object Classification Towards Automated Video Surveillance Recognition
Abstract Views :149 |
PDF Views:3
Authors
Affiliations
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Digital Image Processing, Vol 5, No 7 (2013), Pagination: 347-349Abstract
In this paper, intelligent (smart) surveillance systems, which are now watching the video and providing alerts and content based search capabilities, make the video monitoring and investigation process scalable and effective. The programmed that analyze the video and provide alerts are commonly referred to as video analytics. These are responsible for turning video cameras from a mere data gathering tool into smart surveillance systems for proactive security. Smart surveillance systems have been enabled by the advances in computer vision, video analysis, pattern recognition and multimedia indexing technologies over the past decade. Additional video cameras are necessary to complement the surveillance information, especially for large scale applications. We aim to investigate new techniques and design new intelligent algorithms, which have to make use of partial information from several video sources. One of those is robustness of these techniques to changes in the environment: illumination, size of the objects and many others. Sometimes, additional video cameras are necessary to complement the surveillance information, especially for large scale applications. We aim to investigate new techniques and design new intelligent algorithms, which have to make use of partial information from several video sources. Object tracking data for further scene analysis and understanding.Keywords
Surveillance Information, Segmenting, Object Tracking, Significant Percentage, Auto-Calibration.- A New Technique for Relational Database Protection Using Digital Watermarking
Abstract Views :184 |
PDF Views:2
Authors
Affiliations
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
1 Deptt. of Engineering, Dr. C. V. Raman University, Bilaspur (C.G), IN
2 Dr. C. V. Raman University, Bilaspur (C.G), IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 7 (2013), Pagination: 278-281Abstract
In watermark embedding database is embedded into image. Here first we store binary data of image in one data structure (suppose array) and database content in other array. Then copy content of image and database in third array. Watermarking algorithm which is used to recover a database from updated value. This is a web based watermarking technique, in which if software is stored in server then we can access it from client system. Digital watermarking can be used to embed various types of data, depending on the particular application and intended use. For example, a watermark in a digital movie file might simply identify the name or version of the movie. Alternatively, it might convey copyright or licensing information from the movie's creator. Or it might embed a customer or transaction number that could be used to identify individual payment or transaction data relating to that particular copy of the movie. But the number of bits that can be contained in a watermark itself today is typically modest enough to provide some basic codes or identifiers.Keywords
Binary Data, Transaction Number, Parser, Hybrid Methods, Automatically.- Frullania bolanderi Austin (Marchantiophyta: Jubulaceae), A Rare, Disjunct Liverwort in The Himalaya
Abstract Views :179 |
PDF Views:82
Authors
Affiliations
1 CSIR-National Botanical Research Institute, Rana Pratap Marg, Lucknow 226 001, IN
1 CSIR-National Botanical Research Institute, Rana Pratap Marg, Lucknow 226 001, IN
Source
Current Science, Vol 121, No 10 (2021), Pagination: 1279-1280Abstract
No Abstarct.Keywords
No Keywords.References
- Singh, D. K., Singh, S. K. and Singh, D., Liverworts and Hornworts of India. An Annotated Checklist, Botanical Survey of India, Kolkata, 2016.
- Austin, C. F., Proc. Acad. Nat. Sci. Philadelphia, 1870, 21, 218–234.
- Hong, W. C., Bryologist, 1989, 92(3), 363–367.
- Peters, C. E. and Davidson, P. G., Evansia, 2010, 27(4), 118–120.
- Miller, N. G. and Miller, A. D., J. Torrey Bot. Soc., 1998, 125(2), 1091–116.
- Schuster, R. M., The Hepaticae and Anthocerotae of North America. East of the Hundredth Meridian, Field Museum of Natural History, Chicago, USA, 1992, vol. V, pp. xvii + 854.
- Hattori, S., J. Hattori Bot. Lab., 1981, 49, 147–168.
- Bakalin, V. A. et al., Arctoa, 2006, 14, 143–154.
- Bakalin, V. A., Flora and Phytogeography of Liverworts of Kamchatka and Adjacent Islands (in Russian), KMK, Moscow, Russia, 2009.
- Sofronova, E. V., Arctoa, 2013, 22, 139– 144.
- Ladyzhenskaja, K. I. and Zinovjeva, L. A., Nov. Sist. Nizsh. Rast., 1964, 1, 269–275.
- Schljakov, R. N., Hepaticae of the Northern USSR (in Russian), Nauka, Leningrad, Russia, 1982, vol. 5, p. 196.
- Konstantinova, N. A., Bezgodov, A. G. and Savchenko, A. N., Nov. Sist. Nizsh. Rast., 2010, 44, 322–336.
- Otte, V., Herzogia, 2006, 19, 353–355.
- Frahm, J. P., Bot. Serb., 2012, 36(1), 23– 36.
- Frahm, J. P., Arch. Bryol., 2013, 160, 1– 10.
- Glime, J. M. (ed.), In Bryophyte Ecology, Vol. 1 Physiological Ecology, Michigan Technological University and the International Association of Bryologists, USA, 2017, e-Book.
- Studlar, S. M., Eddy, C. and Spencer, J., Evansia, 2007, 24, 17–21.
- Pohjamo, M., Lakka-Lindberg, S., Ovaskainen, O. and Korpelainen, H., Evol. Biol., 2006, 20, 415–430.
- Lye, K. A., Lindbergia, 2014, 37, 6–21.
- Lewis, L. R. et al., Peer J., 2014, 2, 424; https://doi.org/10.7717/peerj.424
- Boch, S., Berlinger, M., Fischer, M., Knop, E., Nentwig, W., Türke, M. and Prati, D., Oecologia, 2013, 172, 817–822.
- Wilkinson, D. M., Lovas-Kiss, A., Callaghan, D. A. and Green, A. J., Cryptogam. Bryol., 2017, 38(2), 223–228.
- Assessment of bryophyte diversity in selected localities of Assam, North East India: a quantitative approach
Abstract Views :146 |
PDF Views:72
Authors
Affiliations
1 CSIR-National Botanical Research Institute, Lucknow 226 001, India., IN
1 CSIR-National Botanical Research Institute, Lucknow 226 001, India., IN
Source
Current Science, Vol 124, No 7 (2023), Pagination: 848-851Abstract
A study on the quantitative estimation of diversity in 32 selected grids in the bryophyte-rich localities of Assam, North East India has been carried out. Assessment was done in 160 macroplots of 10 m * 10 m, randomly established in the forest and within each macroplot, five microquadrats (10 cm * 10 cm) were placed at different habitats, viz. saxicolous, terricolous and epiphytic. A total of 80 taxa belonging to 29 species of liverworts under 18 genera and 10 families, and about 51 species of mosses belonging to 27 genera and 13 families were assessed. In the study area, Lejeuneaceae and Fissidentaceae as well as Cololejeunea latilobula (Herzog.) Tixier and Entodontopsis tavoyensis (Hook ex Harv.) W. R. Buck & R. R. Ireland were the dominant families and taxa respectively. Four species were new additions to NE India, and seven taxa were reported for the Assam region. The present study elucidates the bryophyte species diversity and the species richness, and evenness of the region, which can further define their importance in the community.Keywords
Bryophytes, Diversity Assessment, Evenness, Quantitative Estimation, Species Richness.References
- Ludwig, J. A. and Reynolds, J. F., Statistical Ecology – A Primer on Methods and Computing, John Wiley, Toronto, Canada, 1988, pp. 107–202.
- Magurran, A., Ecological Diversity and its Measurement, Chapman & Hall, Princeton, New Jersey, 1988, pp. 1–179.
- Gimingham, C. H., Quantitative community analysis and bryophyte ecology on Signy Island. Philos. Trans. R. Soc. London, Ser. B, 1967, 252, 251–259.
- Lee, T. D. and La Roi, G. H., Gradient analysis of bryophytes in Jasper National Park, Alberta. Can. J. Bot., 1979, 57, 914–925.
- Bates, J. W., Quantitative approaches in bryophyte ecology. In Bryophyte Ecology (ed. Smith, A. J. E.), Chapman & Hall, Dordrecht, the Netherlands, 1982, pp. 1–44.
- Krebs, C. J., Overexploited populations can collapse. In The Message of Ecology, Harper & Row, New York, USA, 1988, pp. 1–195.
- Wolf, J. H. D., Diversity patterns and biomass of epiphytic bryophytes and lichens along an altitudinal gradient in the northern Andes. Ann. Mo. Bot. Gard., 1993, 80, 928–960.
- Pharo, E. J. and Beattie, A. J., Bryophyte and lichen diversity: a comparative study. Austral. Ecol., 1997, 22, 151–162.
- Williams, V. L., Witkowski, E. T. F. and Balkwill, K., Application of diversity indices to appraise plant availability in the traditional medicinal markets of Johannesburg, South Africa. Biodivers. Conserv., 2005, 14, 2971–3001.
- Newmaster, S. G., Belland, R. J., Arsenault, A., Vitt, D. H. and Stephens, T. R., The one we left behind: comparing plot sampling and floristic habitat sampling for estimating bryophyte diversity. Divers. Distrib., 2005, 11, 57–72.
- Mandl, N., Lehnert, M., Kessler, M. and Gradstein, S. R., A comparison of alpha and beta diversity patterns of ferns, bryophytes and macrolichens in tropical montane forest of southern Ecuador. Biodivers. Conserv., 2010, 19, 2359–2369.
- Mokany, K., Harwood, T. D., Overton, J. Mc. C., Barker, G. M. and Ferrier, S., Combining alpha and beta diversity models to fill gaps in our knowledge of biodiversity. Ecology, 2011, 14, 1043– 1051.
- Hofmeister, J. et al., Value of old forest attributes related to cryptogam species richness in temperate forests: a quantitative assessment. Ecol. Indic., 2015, 57, 497–504.
- Pande, N., Ecophysiological studies of bryophytes in Nainital Hills. Ph.D. thesis, Kumaun University, Nainital, 1984.
- Tewari, M., Upreti, N., Pandey, P. and Singh, S. P., Epiphytic succession on tree trunks in a mixed oak–cedar forest, Kumaun Himalaya. Vegetatio, 1985, 63, 105–112.
- Awasthi, V., Pande, R. and Pande, N., Bryophyte Diversity on Erythrina arborescens in Nainital. Proc. Natl. Acad. Sci. India Sect. B, 2013, 83, 461–464.
- Bargali, R., Awasthi, V. and Pande, N., Ecological study of bryophytes on Plantanus orientalis L. trees in Nainital (Western Himalaya). Am. J. Plant Sci., 2014, 5, 3880–3888.
- Gupta, R. and Asthana, A. K., Studies on species composition and diversity of acrocarpous mosses at Pachmarhi Wildlife Sanctuary, Madhya Pradesh (India). Indian For., 2018, 144(6), 588–591.
- Singh, D. K., Singh, S. K. and Singh, D., Liverworts and Hornworts of India: An Annotated Checklist, Botanical Survey of India, Kolkata, 2016, pp. 1–439.
- Barukial, J., A Bryofloristic ecological assessment of Assam, India. Indian J. Fundam. Appl. Life Sci., 2011, 1(3), 98–106.
- Magurran, A. E., An index of diversity. In Measuring Biological Diversity, Blackwell Publishing, Victoria, Australia, 2005, pp. 1–215.
- Ellis, L. T. et al., New national and regional bryophyte records. J. Bryol., 2019, 59, 1–18.
- A Comparative Study on Routing Protocols: RIPng, OSPFv3 and EIGRPv6 and their Analysis Using GNS-3
Abstract Views :119 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science, LNCT University, Bhopal, IN
2 Department of Computer Applications, Sarojini Naidu Government Girls Post Graduate (Autonomous), Bhopal, IN
3 Department of Computer Science, UIT, RGPV University, Bhopal, IN
1 Department of Computer Science, LNCT University, Bhopal, IN
2 Department of Computer Applications, Sarojini Naidu Government Girls Post Graduate (Autonomous), Bhopal, IN
3 Department of Computer Science, UIT, RGPV University, Bhopal, IN
Source
International Journal of Advanced Networking and Applications, Vol 15, No 1 (2023), Pagination: 5775-5780Abstract
Routing of data packets is a critical process on the internet, and routing protocols play a vital role in enabling routers to connect to internetworks using Internet protocols. Internet applications use various routing protocols, such as RIPng, OSPFv3, EIGRPv6, etc., each with its own approach to routing packets. This study presents a basic comparative analysis of as RIPng, OSPFv3, EIGRPv6 protocols. RIPng is an IPv6 routing protocol that allows routers to exchange routing information and calculate the shortest path to a destination based on the number of hops required. OSPFv3 is an IPv6 routing protocol that allows routers to exchange routing information and calculate the shortest path to a destination based on the state of the network links and EIGRPv6 is an IPv6 routing protocol that allows routers to exchange routing information and calculate the shortest path to a destination using both distance-vector and link-state algorithms. The paper "A Comparative Study on Routing Protocols: RIPng, OSPFv3 and EIGRPv6 and Their Analysis Using GNS-3" presents a comparative study on the performance of RIPng, OSPFv3, and EIGRPv6, which are the IPv6 routing protocols equivalent to RIP, OSPF, and EIGRP in IPv4 networks.Keywords
Routing Protocol ipv4 and ipv6, RIPng, OSPFv3, EIGRPv6, GNS3.References
- . Roy, A. and T. Deb. Performance comparison of routing protocols in mobile ad hoc networks. in Proceedings of the International Conference on Computing and Communication Systems: I3CS 2016, NEHU, Shillong, India. 2018. Springer.
- . EL KHADIRI, K., et al. Comparative Study Between Dynamic IPv6 Routing Protocols of Distance Vectors and Link States. in 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM). 2018. IEEE.
- . Samaan, S.S., Performance evaluation of RIPng, EIGRPv6 and OSPFv3 for real-time applications. Journal of Engineering, 2018. 24(1): p. 111-122.
- . Wijaya, C. Performance analysis of dynamic routing protocol EIGRP and OSPF in IPv4 and IPv6 network. in 2011 First International Conference on Informatics and Computational Intelligence. 2011. IEEE.
- . Malkin, G. and R. Minnear, Ripng for IPv6. 1997.
- . Gupta, M. and N. Melam, Authentication/confidentiality for OSPFv3. 2006.
- . Emiliano, R. and M. Antunes. Automatic network configuration in virtualized environment using GNS3. in 2015 10th International Conference on Computer Science & Education (ICCSE). 2015. IEEE.
- . Kumari, N., E.B. Sharma, and R. Saini, Comparative Study of RIPng and OSPFV3 with IPV6. International Journal of Advanced Research in Computer Science and Software Engineering, 2016. 6(9).
- . Mansour, M., et al., Performance Analysis and Functionality Comparison of First Hop Redundancy Protocol IPV6. Procedia Computer Science, 2022. 210: p. 19-27.
- .Ashraf, Z. and M. Yousaf, Optimized routing information exchange in hybrid IPv4-IPv6 network using OSPFV3 & EIGRPv6. International Journal Of Advanced Computer Science And Applications, 2017. 8(4).
- .Sahu, R., S. Sharma, and M. Rizvi, ZBLE: zone based leader election energy constrained AOMDV routing protocol. International Journal of Computer Networks and Applications, 2019. 6(3): p. 39-46.
- .Pokhrel, K., et al., Performance analysis of various mobility management protocols for IPv6 based networks. International Journal of Computer Networks and Applications., 2020. 7(3): p. 62-81.
- . Sharma, S.K. and S. Sharma, Improvement over AODV considering QoS support in mobile ad-hoc networks. International Journal of Computer Networks and Applications (IJCNA), 2017. 4(2): p. 47-61.