Academic Positions

  • Present Dec'16

    Pro Vice-Chancellor

    CT University, Ludhiana

  • Dec'16 Mar'16

    Pro Vice-Chancellor

    RIMT University, Mandi Gobindgarh

  • Mar'16 Jun'09

    Professor cum Campus Director

    RIMT Institutes, Mandi Gobindgarh

  • Jun'09 Jan'09

    Professor cum Vice Principal

    RIMT- IET , Mandi Gobindgarh

  • Jan'09 Sep'03

    Assistant Professor cum Vice Principal

    RIMT- IET, Mandi Gobindgarh

  • Aug'03 Jun'01

    Assistant Professor cum HOD (Computer Applications)

    RIMT- IMCT, Mandi Gobindgarh

  • May'01 Jul'96

    Lecturer in Department of Computer Science & Engineering

    BBSB Engineering College, Fatehgarh Sahib

  • Jul'96 Jun'94

    Technical Support Engineer in industry

Education & Training

  • Ph.D. 2009

    Ph.D. in Computer Science & Engg. (Parallel Processing)

    Punjab Technical University, Jalandhar

  • M.E.2000

    M.E (Computer Science)

    Thapar Institute of Engineering & Technology, Patiala

  • B.E.1994

    B.E (Computer Technology)

    Nagpur University

Honors & Awards

  • 2016
    Academic Leadership in Technical & Professional Education Award
    image
    Academic Leadership in Technical & Professional Education awarded by Entrepreneurship Skill Development Association.
  • 2015
    " ELSEVIER Reviewer Recognition "
    image
    In recognition of the review made for the JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, "Certificate of Reviewing" was awarded on June, 2015.
  • 2014
    Best Educational Administrator of the year
    image
    Best Educational Administrator of the year by Punjab Commerce & Management Association (PCMA) during the 10th International Conference on Business, Management & Economics with the theme “Managing Global Business in Turbulent Times” at Chandigarh University, Gharuan.
  • 2010
    PUNJAB RATAN (Punjab State Intellectuals’ Honour)
    image
    Conferred with PUNJAB RATAN (Punjab State Intellectuals’ Honour) by All India Conference of Intellectuals at India International Centre Annexe, New Delhi on Dec. 26, 2010 for recognition of the distinguished services rendered to the society at large.
Crafted with by Happy Pengwyn Design Studio

Ph.D scholars guided

Research Projects Supervised

  • image

    Scalable Model Based Clustering for higher Dimensional Outliers Detection & Analysis

    Candidate: Kamal Malik (PTU Jal., 2011)

  • image

    On Design and analysis of secure routing model in Mobile Adhoc Network

    Candidate: Ishu Gupta (PTU Jal., 2011)

  • image

    An Intelligent System for Defending against DDOS Attacks in Cloud Computing

    Candidate: Sunanda (PTU Jal., 2012)

  • image

    Exploring ground water possibility in case based recommendation system using nature inspired techniques

    Candidate: Sheetal Kundra (PTU Jal., 2011)

  • image

    Suppression of Speckle Noise from ultra sound kidney images

    Candidate: Monika Pathak (PTU Jal., 2012)

  • image

    Performance Enhancement of Coherent Optical Communication System

    Candidate: Monika Mehra (PTU Jal., 2011)

Crafted with by Happy Pengwyn Design Studio

Filter by type:

Sort by year:

A Robust Scalable Model Using Hybrid Approach for the Detection of the Projected Outliers

Harsh Sadawarti, G.S. Kalra, Kamal Malik
International Journal Research Journal of Applied Sciences, Engineering and Technology 12(6): 642-649, 2016 ; ISSN: 2040-7459; e-ISSN: 2040-7467

Abstract

The abnormal and anomalous observations even in the advanced technological era proves to be the biggest jolt to the concerned industry. To reduce and eliminate the outliers from the massive data streams...

Performance Enhancement of Dual Polarization Coherent Optical systems with and without Inline Dispersion Compensation

Harsh Sadawarti, Monika Mehra, Dr. M.L.Singh
International Journal INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY (IJESRT); 5(4): April, 2016, ISSN: 2277-9655

Abstract

We study and compare the performance of 112Gb/s Dual polarization coherent optical system for single channel coherent system with different modulation techniques,DP- QPSK(Dual Polarization Quadrature phase shift keying), DP-16QAM(Dual Polarization 16 qadrature amplitude Modulation) using numerical simulations with inline DCF(dispersion compensation fiber) and without inline DCF( but with DSP module for dispersion compensation)using SSMF(standard single mode fiber) for the effect of fiber nonlinearities. Inline dispersion post compensation system was explored to mitigate the impact of transmission impairments. Results obtained shows that the performance of DP-QPSK coherent systems with inline dispersion post compensation is better than the electronic dispersion compensation using DSP module as with DCF they have more tolerance to fiber nonlinearities than those with electronic dispersion compensation but for DP-16QAM coherent system the performance with electronic dispersion compensation is better than with inline dispersion compensation.

Quantification of the Projected Outliers Using the Distance Based and Gaussian Mixture Model

Harsh Sadawarti, Kamal Malik
Conference Paper Presented in the conference Shannon-2016 in Lovely Professional University on 9th, April,2016

Abstract

Performance Analysis of 100 Channels DWDM System Using Raman-EDFA Hybrid Optical Amplifier With SOA Booster

Harsh Sadawarti, Kirandeep Kaur
International JournalInternational Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 11, November 2015

Abstract

We investigated the performance of Raman-EDFA hybrid optical amplifier using SOA booster for 100 channels DWDM transmission system with each channel having data rate of 10 Gbps at reduced channel spacing of 0.2 nm.....

An Effective Pruning based outlier detection method to quantify the outliers

Harsh Sadawarti, Kamal Malik, G.S Kalra
International JournalResearch Journal of Applied Sciences, Engineering and Technology 9(4): 257-261, 2015 ISSN: 2040-7459; e-ISSN: 2040-7467 Maxwell Scientific Organization, 2015. (Scopus Indexed).

Abstract

Outliers are the data objects that do not conform to the normal behaviour and usually deviates from the remaining data objects may be due to some outlying property ....

A Mixture Model Of Hubness and PCA For Detection Of Projected Outliers

Harsh Sadawarti, Kamal Malik
International JournalInternational Journal of Information Technology, Modelling and Computing (IJITMC) Vol. 3, No.1/2/3/4, November 2015.

Abstract

With the Advancement of time and technology, Outlier Mining methodologies help to sift through the large amount of interesting data patterns and winnows the malicious data entering in any field of concern...

Fault Tolerant Routing in Irregular Modified Shuffle Network

Harsh Sadawarti, Nirlaip Kaur, Kanwarpreet Kaur
International Journal International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 5, May 2015

Abstract

Interconnection networks (IN) play very important role in various parallel processing applications. The connectivity pattern used in interconnection networks greatly determines the performance of the system. Multistage Interconnection Network is also an IN. The interconnection pattern used also determines the fault tolerance of the network. This paper introduces a new irregular fault tolerant multistage interconnection network named Irregular Modified Shuffle Network (IMSN). IMSN is analyzed in terms of fault tolerance and it has been observed that IMSN provides more alternate paths than existing networks such as Improved Four Tree Network (IFTN), Modified Alpha Network (MALN) and New Irregular Augmented Shuffle Network (NIASN).

Gain Analysis of Hybrid Optical Amplifier for 100 Channels DWDM System at Bit Rate of 10 Gbps

Harsh Sadawarti, Kirandeep Kaur
Conference Paper 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), Proceedings of 2015 RAECS UIET Panjab University Chandigarh 21-22nd December 2015 ; Pages: 1 - 5, DOI: 10.1109/RAECS.2015.7453387

Abstract

Abstract—Hybrid amplification based on Raman-EDFA optical amplifier in combination with Semiconductor optical amplifier (SOA) booster .....

Comparative Analysis of Outlier detection Techniques

Harsh Sadawarti, Kamal Malik, Kalra G.S.
International JournalInternational Journal of Computer Applications (0975 – 8887) Volume 97– No.8, July 2014.

Abstract

Data Mining simply refers to the extraction of very interesting patterns of the data from the massive data sets. Outlier detection is one of the important aspects of data mining which actually finds out the observations that are deviating from the common expected behavior...

Detection of Outliers from Higher Dimensional Data Using Self- Organizing Maps

Harsh Sadawarti, Kamal Malik, Kalra G.S.
Conference Paper8th International Conference on Advanced Computing and Communication Technologies (ICACCTT-20l4) ISBN: 978-93 84935-00-9 on 15th,Nov,2014.

Abstract

Outlier detection for higher dimensional stream data is a new and an emerging concept. To detect the higher dimensional outliers i.e. the projected outliers is itself a very challenging task...

Implementation of DYMO routing protocol

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal Journal of Information Technology, Modeling and Computing (IJITMC), ISSN: 2320-7493, 1(2): 49-57, May 2013

Abstract

Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the nodes are free to move randomly within the network and share information dynamically. To achieve an efficient routing various protocols have been developed so far which vary in their nature and have their own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols against different parameters. Finally a comparison has been presented between all of them.

Review of Mobility Models in Mobile Ad hoc Networks

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal Journal of Information Technology and Computer Science (IJITCS), ISSN: 2074-9015, 5(6), May 2013

Abstract

A mobile ad-hoc network (MANET) is basically called as a network without any central administration or fixed infrastructure. It consists of a number of mobile nodes that use to send data packets through a wireless medium. There is always a need of a good routing protocol in order to establish the connection between mobile nodes since they possess the property of dynamic changing topology. Further, in all the existing routing protocols, mobility of a node has always been one of the important characteristics in determining the overall performance of the ad hoc network. Thus, it is essential to know about various mobility models and their effect on the routing protocols. In this paper, we have made an attempt to compare different mobility models and provide an overview of their current research status. The main focus is on Random Mobility Models and Group Mobility Models. Firstly, we present a survey of the characteristics, drawbacks and research challenges of mobility modeling. At the last we present simulation results that illustrate the importance of choosing a mobility model in the simulation of an ad hoc network protocol. Also, we illustrate how the performance results of an ad hoc network protocol drastically change as a result of changing the mobility model simulated.

MINs PERFORMANCE FOR PARALLEL PROCESSING image

Harsh Sadawarti
Book Aberdeen University Press Services (17 August 2008) ISBN-10: 0615176968 ISBN-13: 978-0615176963
image

MINs PERFORMANCE FOR PARALLEL PROCESSING

The Performance of a system depends directly on the time required to perform an operation and number of these operations that can be performed concurrently. High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required for communication in parallel processing systems. Multistage interconnection networks provide a compromise between shared bus and crossbar networks.

Protecting Copyright Multimedia Files by Means of Digital Watermarking: A Review

Harsh Sadawarti, G.S. Kalra
Conference Paper 5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011]

Abstract

Digital information is easy to transfer and store but this property of digital information becomes harmful to itself as it can be easily copied and distributed on the internet. Thus, number of efforts are going on to protect the copyright of the owner like Steganography, digital signatures etc. But digital watermarking comes out to be most effective tool among these. It can be applied on text, image, audio and video files in number of ways which are effective for any specific application.

Blind Digital Image Watermarking Robust Against Histogram Equalization

Harsh Sadawarti, Kalra G.S.
Journal Paper Journal of Computer Science 8 (8): 1272-1280, 2012, ISSN 1549-3636

Abstract

Piracy in the presence of internet and computers proves to be a biggest damage to the industry. Easy editing and copying of images yields a great damage to the owner as original images can be distributed through internet very easily. To reduce the piracy and duplicity of the digital multimedia files, digital watermarking technique is dominating over the other available techniques. There are certain methods or attacks which are used to damage the watermark. One of the major attacks is histogram equalization and reducing the number of histogram equalized levels. Thus, there is a need to develop a method so that the watermark can be protected after histogram equalization.

Computation of Pheromone values in the AntNet Algorithm

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Computer Network and Information Security (IJCNIS), ISSN: 2074-9104, 4(9): 47-54, August 2012

Abstract

In this paper, we discuss the basic routing technique of ants and study the change in pheromone values at each node. Also the optimal paths can then be computed based on the shortest cumulative pheromone count between source and destination nodes. AntNet is a distributed multi-agent system inspired by the stigmergy model of communication observed in ant colonies. The ants or control packets collect information about the network conditions and are used to update and maintain the routing tables. Ants based routing is gaining more popularity because of its adaptive and dynamic nature. A number of Swarm Intelligence based, more specially Ant Colony Optimization (ACO) based routing algorithms are proposed by researchers. A version of ant routing protocol called AntNet has been implemented to work within the network simulator ns-2. Routing tables and Pheromone tables have been computed for each node in the network. On the basis of these tables we have tried to compute the shortest and most optimal path between source node and destination node.

Effect of mobility parameters on the performance of AODV routing protocol

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Mobile & Network Technology (IJNMT), ISSN: 2229-9114, 3(1) :14-20, January 2012

Abstract

Routing in an ad hoc network is always a challenging task because of the free and random movement of nodes. This high node mobility sometimes results in route failures and decreased network performance. Itfurther degrades the overall performance of the routing protocol. In this study we have analyzed the effect of two node mobility parameters, i.e. varying speed and number of nodes, on the throughput of Ad hoc on-demandDistance Vector Routing Protocol. The performance is experimentally tested and compared using ns2 simulator.The simulation results are graphically shown and explained.

MANET Routing Protocols Based on Ant Colony Optimization

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Modeling and Optimization, Vol. 2, No. 1, February 2012

Abstract

Apart from tremendous research being done all around the globe, still ad hoc networks are a big challenge for the researchers. Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power energy. Somehow, Swarm Intelligence based techniques such as ant colony optimization (ACO) algorithms have shown to be a good technique for developing routing algorithms for ad hoc networks. ACO based routing is an efficient routing scheme based on the behaviour of foraging ants. The collective behaviour of ants helps to find the shortest path from the nest to a food source, by deposition of a chemical substance called pheromone on the visited nodes. This mechanism from collective intelligence is applied to the ad hoc network by researchers. In this paper, we have brought some characteristics as well as performance analysis of the proposed ACO based ad hoc routing protocols and compare them with the well-known ad hoc routing protocols. The results presented in the last also help the researchers to understand the differences among various ACO based routing algorithms and to choose appropriate protocol for their research work. Our study shows how this approach has significantly improved the performance of the ad hoc networks.

A Review of Routing Protocols for Mobile Ad Hoc Network

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal WSEAS TRANSACTIONS on COMMUNICATIONS, ISSN: 1109-2742, Issue 11, Volume 10, November 2011

Abstract

A number of routing protocols has been proposed in recent years for possible use of Mobile Ad Hoc Networks in various application areas such as military, govt. etc. In this paper we have presented a comprehensive review of these protocols with a particular focus on their security aspects. Further we have presented a comparison of some of the existing Routing Protocols of MANETs. The base criteria for comparison is routing methodologies and the information used to make routing decisions. All the protocols have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability, with respect to which the analyses of secure versions of proposed protocols are discussed.

Analysis of various Swarm-based & Ant-based Algorithms

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
Conference Papers ACM International Conference on Advances in Computing and Artificial Intelligence (ACAI 2011)

Abstract

Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed functioning. These designs provide scalable, flexible and robust, able to adapt quickly changes to changing environments and to continue functioning even when individual elements fail. These properties make swarm intelligence very attractive for mobile ad hoc networks. These algorithms also provide potential advantages for conventional routing algorithms. Ant Colony Optimization is popular among other Swarm Intelligence Techniques.In this paper a detailed comparison of different Ant based algorithms is presented. The comparative results will help the researchers to understand the basic differences among various existing Ant colony based routing algorithms.

Human Protein Function Prediction - A Docking based approach

Harsh Sadawarti, Simardeep Kaur
International Journal IJAEST, ISSN : 2249-913X, Vol. 1 No. 1 September-November 2011

Abstract

Proteins are the most important macromolecules of life. The knowledge of protein function is an important link for the development of drugs, crop development and synthetic bio-chemicals like bio fuels. Different techniques are applied for the protein function prediction. These techniques are based on protein sequence, protein structure, genomic data, protein interaction networks etc. In this paper we will use docking for the prediction of protein function .The docking technique makes the database search faster .By applying docking for the protein function prediction we can easily find the complementary proteins for the target proteins during the drug discovery process which makes this process fast. . Docking technique also helps in classification of enzymes and their mechanisms .By applying docking the virtual screening of the compounds could be done.

Review of Various Routing Protocols for MANETs

Harsh Sadawarti, Anuj K. Gupta
International Journal International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011

Abstract

In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as link-state or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.

Robust Blind Digital Image Watermarking Using DWT and Dual Encryption Technique

Harsh Sadawarti, Talwar Rajneesh, Kalra Gursharanjeet Singh
Conference Paper pp.225-230, 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks, 2011

Abstract

Piracy in the presence of internet and computers proves to be a biggest jolt to the concerned industry. To reduce the piracy and duplicity of the images, digital watermarking technique is having an edge over the other available techniques. In this paper, a blind digital watermarking algorithm is presented which is robust enough to resist the watermark against the attacks. The algorithm exploits the random sequence generated by Arnold and Chaos transformations. Discrete wavelet transformation of third level decomposition is used to convert the image into its frequency domain. The binary watermark is embedded into its HL3 domain. The evaluation of the algorithm is calculated in terms of peak signal to noise ratio and non correlation. The results prove that the algorithm is robust enough to handle the attacks like JPEG, filtering, and different types of noise attacks.

Performance analysis of AODV, DSR & TORA Routing Protocols

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010 ISSN: 1793-8236

Abstract

The field of Mobile Ad hoc Networks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be studied formally as graphs in which the set of edges varies in time. The main method for evaluating the performance of MANETs is simulation. This paper is subjected to the on-demand routing protocols with identical loads and environment conditions and evaluates their relative performance with respect to the two performance metrics: average End-to-End delay and packet delivery ratio. We investigated various simulation scenarios with varying pause times. From the detailed simulation results and analysis, a suitable routing protocol can be chosen for a specified network and goal.

Security aspects in ad hoc network routing

Harsh Sadawarti, Anuj K. Gupta
Conference Paper In proceeding of: International Symposium on Computing Engineering & Technology, at Mandi Gobindgarh, Punjab, India, 01/2010;

Abstract

A mobile ad-hoc network is a self-configuring network of mobile routers, connected by wireless links, which are free to move randomly and organize themselves arbitrarily. These types of networks operate in the absence of any fixed infrastructure which makes them easy to deploy but it becomes difficult to make use of the existing routing techniques for network services. This poses a number of challenges in ensuring the security of the communication. Because of the changing topology special routing protocols have been proposed to face the routing problem in MANETs. The paper contains two major sections: one presenting the secure routing protocol functionality and their comparison, the other presenting threats faced by the ad hoc network environment and provides a classification of various security mechanisms. We attempt to analyze the respective strengths and vulnerabilities of the existing routing protocols and suggest a broad and comprehensive framework that can provide a tangible solution. The paper closes with a conclusion and an outlook on evolving trends in secure ad hoc routing.

Performance Analysis of New Irregular Multistage Interconnection Network

Harsh Sadawarti, P.Kaur
International Journal IJAEST INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES, Vol No. 9, Issue No. 1, 082 - 086

Abstract

In this paper, a new type of MIN, New Irregular Augmented Shuffle Network (NIASN) is proposed. The proposed NIASN and existing IASN, QT, ASEN-2 MINs are analyzed and compared. The proposed network NIASN provides much better Bandwidth, Probability of acceptance, Throughput, Processor Utilization, and Processing Power than existing MINs.

Measuring Testability of aspect oriented programs

Harsh Sadawarti, P.Sharma
Conference Paper International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2010 , ISBN: 978-1-4244-9054-7, Kuala Lumpur

Abstract

Testability design is an effective way to realize the fault detection and isolation. It becomes crucial in the case of Aspect Oriented designs where control flows are generally not hierarchical, but are diffuse and distributed over the whole architecture. In this paper, we concentrate on detecting, pinpointing and suppressing potential testability weaknesses of a UML Aspect-class diagram. The attribute significant from design testability is called “class interaction”: it appears when potentially concurrent client/supplier relationships between classes exist in the system. These interactions point out parts of the design that need to be improved, driving structural modifications or constraints specifications, to reduce the final testing effort. This paper does an extensive review on testability of aspect oriented software, and put forth some relevant information about class-level testability.

An Information Modeling using EHR

Harsh Sadawarti, Kulvinder Singh Mann, Ravikant Verma, Ekta Gupta
International Journal International Journal of Computer Science & Communication, IJCSC Vol 1, No.2, July-Dec. 2010, pp 299-302, ISSN : 0973-7391

Abstract

Designing of Data Exchange Protocol by Integrating Dicom using HLT Standard to develop Data Exchange Gateway to support Secures Data flow

Harsh Sadawarti, Kulvinder Singh Mann, Rupinder Kaur & Ramandeep Kaur
International Journal International Journal of Advanced Engineering Technology, IJAET, Vol 1, Issue II, July-Sep.2010, E-ISSN 0976-3945

Abstract

Health care has become one of the most important services. Hospitals, physicians, insurers, and managed-care firms are networking, merging, and forming integrated organizations to finance and deliver health care. This paper mainly does some research on the problem of secure data flow. Data access is enabled via internet browser technology. Relevant patient and image acquisition information is extracted from the DICOM images and stored into a relational database. Patient information such as radiological findings are transferred from the Radiological Information System (RIS) into the database. Image data is accessed viewer. Since data security mechanisms either by a fast preview tool , a DICOM encryption of sensitive patient data is implemented. The method allows a dynamic selection of the data to be encrypted.

EHR System to support patient care using DSS

Harsh Sadawarti, Kulvinder Singh Mann
Journal Journal of Computer and Information Technology, J. of Comp. and I.T. Vol 1(1), 23-34 (August 2010) , ISSN : 2229-3531

Abstract

A Conceptual Framework for the Assessment of Health Management Information System

Harsh Sadawarti, Karmjeet Kaur Kulvinder Singh Mann
Journal Journal of Computer and Information Technology, J. of Comp. and I.T. Vol 1(1), 99-108(2010)

Abstract

Security Routing Techniques for MANETs

Harsh Sadawarti, Gupta Anuj K.
International Journal International Journal of Computer Theory and Engineering (IJCTE) ISSN: 1793-8201, Article No. 74, 1(4): 456-460, October 2009

Abstract

In this paper we present a survey of various existing secure routing protocols for mobile ad hoc networks (MANETs). A mobile ad-hoc network is a self-configuring network of mobile nodes, connected by wireless links, which act as routers and are free to move randomly and organize themselves arbitrarily. These types of networks operate in the absence of any fixed infrastructure which makes them easy to deploy but it becomes difficult to make use of the existing routing techniques for network services. In order to facilitate communication within the network, a Routing Protocol (RP) is used to discover routes between nodes. The primary goal of such an ad-hoc network RP is correct and efficient route establishment between a pair of nodes so that messages may be delivered in time. The wireless and distributed nature of MANETs poses security a great challenge to system designers. This paper contains two main sections: first section presents a short literature study on various types of security attacks and routing security schemes that have been proposed to prevent and/or detect these attacks and second gives a state-or-the-art review of the existing secure Routing Protocols designed for MANETs with a comparison for typical representatives.

An Efficient Interconnection Augmented Shuffle Network

Harsh Sadawarti, Bansal P.K.
International Journal WSEAS Transaction on Communication, ISSUE 3, Vol-6, Mar 2007, ISNN 1109-2742,pp 486-491

Abstract

The Performance of a system depends directly on the time required to perform an operation and number of these operations that can be performed concurrently. High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required for communication in parallel processing systems. Multistage interconnection networks provide a compromise between shared bus and crossbar networks. In this paper, a new class of Irregular, Fault-tolerant multistage interconnection network named as Irregular Augmented Shuffle Network (IASN) has been proposed. The network has less number of stages as compared to existing irregular networks. Various performance parameters have been analyzed which shows better performance of the proposed network than the existing networks. The reliability of a network is evaluated in terms of MTTF. It has been the IASN has a higher MTTF for upper and lower bound in comparison bound in comparison to networks such as ASEN-2 and ABN and is comparable to FT network.

Fault diagnosis in Multiple-path interconnection Network

Harsh Sadawarti, Bansal P.K.
International Journal GESJ Georgian Electronic Scientific Journal; Computer Sciences & Telecommunication 2006/No.219,pp 146-153

Abstract

Two pass routing scheme is described for communication in a multiprocessor system employing a unique-path multistage interconnection network in the presence of faults in the network. It is capable of tolerating all single faults and many multiple faults in all except the first and last stages of the network. The routing scheme is useful for tolerating both permanent as well as intermittent faults in the network. The hardware over head for implementing the scheme is very small and no time-penalty is paid in the fault-free case.

Fault-tolerant routing in Unique-path Multistage Interconnection Networks

Harsh Sadawarti, Bansal P.K.
Conference Paper IEEE INDICON 2003, NT Kharagpur, Dec 20-22, 2004, pp 427-430

Abstract

Two pass routing scheme is described for communication in a multiprocessor system employing a unique-path multistage interconnection network in the presence of faults in the network. It is capable of tolerating all single faults and many multiple faults in all except the first and last stages of the network. The routing scheme is useful for tolerating both permanent as well as intermittent faults in the network. The hardware over head for implementing the scheme is very small and no time-penalty is paid in the fault-free case.

Crafted with by Happy Pengwyn Design Studio

Teaching History

  • Mar'16 Jun'09

    Professor cum Campus Director, RIMT Institutes, Mandi Gobindgarh

  • Jun'09 Jan'09

    Professor cum Vice Principal, RIMT- IET, Mandi Gobindgarh

  • Jan'09 Sep'03

    Assistant Professor cum Vice Principal, RIMT- IET, Mandi Gobindgarh

  • Aug'03 Jun'01

    Assistant Professor cum HOD (Computer Applications), RIMT- IMCT, Mandi Gobindgarh

  • May'01 Jul'96

    Lecturer in Computer Science Engineering Department, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib (Punjab)

Crafted with by Happy Pengwyn Design Studio

At My Office

You can find me at my office located at CT University, Ferozepur Road, Ludhiana.

I am at my office every day from 9:00 am to 5:00 pm, but you may consider a call to fix an appointment.

Crafted with by Happy Pengwyn Design Studio