Academic Positions

  • Present Jul'18

    Vice Chancellor

    CT University, Ludhiana

  • Jul'18 Dec'16

    Pro Vice-Chancellor

    CT University, Ludhiana

  • Dec'16 Mar'16

    Pro Vice-Chancellor

    RIMT University, Mandi Gobindgarh

  • Mar'16 Jun'09

    Professor cum Campus Director

    RIMT Institutes, Mandi Gobindgarh

  • Jun'09 Jan'09

    Professor cum Vice Principal

    RIMT- IET , Mandi Gobindgarh

  • Jan'09 Sep'03

    Assistant Professor cum Vice Principal

    RIMT- IET, Mandi Gobindgarh

  • Aug'03 Jun'01

    Assistant Professor cum HOD (Computer Applications)

    RIMT- IMCT, Mandi Gobindgarh

  • May'01 Jul'96

    Lecturer in Department of Computer Science & Engineering

    BBSB Engineering College, Fatehgarh Sahib

  • Jul'96 Jun'94

    Technical Support Engineer in industry

Education & Training

  • Ph.D. 2009

    Ph.D. in Computer Science & Engg. (Parallel Processing)

    Punjab Technical University, Jalandhar

  • M.E.2000

    M.E (Computer Science)

    Thapar Institute of Engineering & Technology, Patiala

  • B.E.1994

    B.E (Computer Technology)

    Nagpur University

Honors & Awards

  • 2018
    Award of Appreciation
    image
    Award of Appreciation by the Management of CT University, Ludhiana for steadfast commitment towards the establishment of CT University, Ludhiana.
  • 2016
    Academic Leadership in Technical & Professional Education Award
    image
    Academic Leadership in Technical & Professional Education awarded by Entrepreneurship Skill Development Association.
  • 2015
    " ELSEVIER Reviewer Recognition "
    image
    In recognition of the review made for the JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, "Certificate of Reviewing" was awarded on June, 2015.
  • 2014
    Best Educational Administrator of the year
    image
    Best Educational Administrator of the year by Punjab Commerce & Management Association (PCMA) during the 10th International Conference on Business, Management & Economics with the theme “Managing Global Business in Turbulent Times” at Chandigarh University, Gharuan.
  • 2010
    PUNJAB RATAN (Punjab State Intellectuals’ Honour)
    image
    Conferred with PUNJAB RATAN (Punjab State Intellectuals’ Honour) by All India Conference of Intellectuals at India International Centre Annexe, New Delhi on Dec. 26, 2010 for recognition of the distinguished services rendered to the society at large.
Crafted with by Happy Pengwyn Design Studio

Ph.D scholars guided

Research Projects Supervised

  • image

    Scalable Model Based Clustering for higher Dimensional Outliers Detection & Analysis

    Candidate: Kamal Malik (PTU Jal., 2011)

  • image

    On Design and analysis of secure routing model in Mobile Adhoc Network

    Candidate: Ishu Gupta (PTU Jal., 2011)

  • image

    An Intelligent System for Defending against DDOS Attacks in Cloud Computing

    Candidate: Sunanda (PTU Jal., 2012)

  • image

    Exploring ground water possibility in case based recommendation system using nature inspired techniques

    Candidate: Sheetal Kundra (PTU Jal., 2011)

  • image

    Suppression of Speckle Noise from ultra sound kidney images

    Candidate: Monika Pathak (PTU Jal., 2012)

  • image

    Performance Enhancement of Coherent Optical Communication System

    Candidate: Monika Mehra (PTU Jal., 2011)

Crafted with by Happy Pengwyn Design Studio

Filter by type:

Sort by year:

Performance Analysis of coherent optical communication system for higher order dual polarization modulation formats

Harsh Sadawarti, Monika Mehra
International Journal Optik- International Journal for light and Electron Optics volume 135, April 2017, Pages 174-179

Abstract

The ever increasing demand of data traffic due to emerging services and applications has evolved the need of high capacity, high speed and highly spectral efficient optical systems with advanced modulation formats. We compare the performance of single channel coherent optical system for 112 Gb/s with Dual polarization modulation techniques i.e. DP- QPSK(Dual Polarization Quadrature phase shift keying), DP-16QAM(Dual Polarization −16 Quadrature amplitude Modulation) and DP-32QAM(Dual Polarization −32 Quadrature amplitude Modulation) with DSP (Digital Signal Processing)module for SSMF(standard single mode fiber) in terms of tolerance to fiber nonlinearities which is investigated through the effect of power and distance on %EVM and requirement of OSNR using numerical simulations. ned shows that the coherent optical systems with higher order modulation formats are less tolerant to fiber nonlinearities i.e the performance of DP-QPSK coherent systems with DSP module is better than the DP-16QAM and DP-32QAM coherent systems as they are more tolerant to fiber nonlinearities. The results obtained can be used for the design of compensation techniques for fiber nonlinearities in cohResults obtaierent optical systems using higher order modulation formats.

A Robust Scalable Model Using Hybrid Approach for the Detection of the Projected Outliers

Harsh Sadawarti, G.S. Kalra, Kamal Malik
International Journal Research Journal of Applied Sciences, Engineering and Technology 12(6): 642-649, 2016 ; ISSN: 2040-7459; e-ISSN: 2040-7467

Abstract

The abnormal and anomalous observations even in the advanced technological era proves to be the biggest jolt to the concerned industry. To reduce and eliminate the outliers from the massive data streams...

Detection of Projected Outliers from the Higher Dimensional data sets Using Extended Kalman Filter and Fuzzy K-Means

Harsh Sadawarti, Kamal Malik
International Journal Indian Journal of Science and Technology Vol 9(26), DOI: 10.17485/ijst/2016/v9i26/93963, July 2016- A Thomson Reuter Journal

Abstract

Curse of Dimensionality and the attribute relevance is the matter of great concern now these days while dealing with the higher dimensional data sets or Big Data, especially to detect the projected outliers. The objective of this research paper is to construct a Robust and a scalable model to prominently highlight the higher dimensional outliers in an effective and an efficient manner. Methods/Analysis: In order to detect the projected outliers, an algorithm EKFFK-Means with a hybrid approach is constructed using two important methodologies- Extended Kalman Filter (EKF) and Fuzzy K-Means. EKF is used to linearize the higher dimensional data by estimating the current mean and covariance by enhancing the Kalman gain and then fuzzy K-Means confirms the outlying property of each data instance and categorizes them in an effective and an efficient way using the membership label. Findings: A model EKFFK-Means is constructed that further creates 30 clusters from the complete data set to detect the projected outliers and various parameters like accuracy, cluster validity, True positive rate, False positive rate , robustness and cluster quality are calculated. Improvements : This algorithm is further compared with HPStream and CLUStream and is proved better against various parameters.

Features extraction and classification for detection of kidney stone region in ultrasound images

Harsh Sadawarti, Monika Pathak, Sukhdev Singh
International Journal International Journal of Multidisciplinary Research and Development, Online ISSN: 2349-4182 Print ISSN: 2349-5979, May 2016.

Abstract

Region of interest detection in ultrasound image is a challenging task due to heterogeneous texture and presence of speckle noise. The ultrasound scanning is most frequently used tool to examine the patient for abnormities, especially presence of stone, in the kidney. Automatic object detection in ultrasound images is burning research areas and the present research work is in the same direction. We have developed an application, which helps the medical practitioner to identify the stone region in the ultrasound image. It is a semiautomatic system in which practitioner need to select the region, which is analyzed, by the proposed system for presence of stone. The feature extraction is applied on cropped regions, which may contain stone. The various features such as Contrast, Angular second moment, Entropy and Correlation are used. The KNN classifier is used to classification based on training image dataset. The overall accuracy of classification system is around 91%. The confusion matrix is also prepared to analyze the complexity and accuracy of the proposed system.

A Technique to Suppress Speckle in Ultrasound Images using Nonlocal Mean and Cellular Automata

Harsh Sadawarti, Monika Pathak, Sukhdev Singh
International Journal Indian Journal of Science and Technology. ISSN (Print): 0974-6846. ISSN (Online): 0974-5645, April, 2016.

Abstract

Kidney ultrasound imaging is an economical, non invasive, real time diagnosis system which is used to measure abnormalities in the shape, size and location of the kidneys in the body. The presence of speckle noise degrades the visual quality of ultrasound images. The primary objective of the research under taken is to detect the renal stone in ultrasound images. The present research paper discusses an algorithm based on cellular automata and nonlocal mean for suppression of the speckle noise. The cellular automatons are dynamic systems to represent the particular problem in terms of specific pattern. This concept is exploited to distinguish the noise from the object being target. The kidney ultrasound images are denoised to detect presence of renal stone in the image.

Performance Enhancement of Dual Polarization Coherent Optical systems with and without Inline Dispersion Compensation

Harsh Sadawarti, Monika Mehra, Dr. M.L.Singh
International Journal INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY (IJESRT); 5(4): April, 2016, ISSN: 2277-9655

Abstract

We study and compare the performance of 112Gb/s Dual polarization coherent optical system for single channel coherent system with different modulation techniques,DP- QPSK(Dual Polarization Quadrature phase shift keying), DP-16QAM(Dual Polarization 16 qadrature amplitude Modulation) using numerical simulations with inline DCF(dispersion compensation fiber) and without inline DCF( but with DSP module for dispersion compensation)using SSMF(standard single mode fiber) for the effect of fiber nonlinearities. Inline dispersion post compensation system was explored to mitigate the impact of transmission impairments. Results obtained shows that the performance of DP-QPSK coherent systems with inline dispersion post compensation is better than the electronic dispersion compensation using DSP module as with DCF they have more tolerance to fiber nonlinearities than those with electronic dispersion compensation but for DP-16QAM coherent system the performance with electronic dispersion compensation is better than with inline dispersion compensation.

Quantification of the Projected Outliers Using the Distance Based and Gaussian Mixture Model

Harsh Sadawarti, Kamal Malik
Conference Paper Presented in the conference Shannon-2016 in Lovely Professional University on 9th, April,2016

A Survey on Optical Amplifiers

Harsh Sadawarti, Kirandeep Kaur
Conference Paper Proceedings of 3rd International Conference on Advancements in Engineering & Technology (ICAET‐2015) ISBN: 978‐81‐924893‐0‐8

Abstract

An Improved Invisible Watermarking Technique for Gray Scale images Using Arnold Transform and Random Strategies

Harsh Sadawarti, G.S. Kalra, Reeta Chainani
International JournalGADL Journal of Inventions in Computer Science and Communication Technology (JICSCT) Volume 1 – Issue 1, December, 2015

Abstract

We have presented Digital Image watermarking for gray scale images which implemented in frequency domain. In this paper, a binary watermark pattern was constructed from the information content of the image by selecting the minimum value from every block of size and was disordered with the help of Arnold Transform. Peak signal to Noise Ratio and Normalized Cross-correlation are computed to measure image quality. Experimental result shows that the watermarking algorithm is robust against common signal processing attacks and this is also tested against multiple attacks and obtained result reveals the high effectiveness of the method.

Performance Analysis of 100 Channels DWDM System Using Raman-EDFA Hybrid Optical Amplifier With SOA Booster

Harsh Sadawarti, Kirandeep Kaur
International JournalInternational Journal of Innovative Research in Computer and Communication Engineering Vol. 3, Issue 11, November 2015

Abstract

We investigated the performance of Raman-EDFA hybrid optical amplifier using SOA booster for 100 channels DWDM transmission system with each channel having data rate of 10 Gbps at reduced channel spacing of 0.2 nm.....

An Effective Pruning based outlier detection method to quantify the outliers

Harsh Sadawarti, Kamal Malik, G.S Kalra
International JournalResearch Journal of Applied Sciences, Engineering and Technology 9(4): 257-261, 2015 ISSN: 2040-7459; e-ISSN: 2040-7467 Maxwell Scientific Organization, 2015. (Scopus Indexed).

Abstract

Outliers are the data objects that do not conform to the normal behaviour and usually deviates from the remaining data objects may be due to some outlying property ....

A Mixture Model Of Hubness and PCA For Detection Of Projected Outliers

Harsh Sadawarti, Kamal Malik
International JournalInternational Journal of Information Technology, Modelling and Computing (IJITMC) Vol. 3, No.1/2/3/4, November 2015.

Abstract

With the Advancement of time and technology, Outlier Mining methodologies help to sift through the large amount of interesting data patterns and winnows the malicious data entering in any field of concern...

Analysis of Perception Among Customers and E-Customers In Retail

Harsh Sadawarti, Pradeep Singh Guleria
International Journal International Journal of Computer Science Trends and Technology (IJCST) – Volume 3 Issue 4, Jul-Aug 2015ISSN: 2347-8578 www.ijcstjournal.org Page 60.

Abstract

We have been living in an era of rapid integration of IT technologies into business processes and people’s day to day lives. Large volumes of functional and non functional data is being produced everywhere which companies desire to make use of. Data mining techniques and data analytics have become essential in making useful sense of this sea of data for any business to prosper. Taking an example of retail sector, internet users in India have been becoming increasingly aware and receptive towards online retail. Noticing this traditional retailers have been focusing on increasing their online presence and adapting to new marketing strategies thereby utilizing this medium. In this paper we discuss in detail the facets of online retail, e shopping and changing needs of consumers also our research objectives and how we propose to identify the factors influential in affecting consumer perception and their satisfaction rate.

Fault Tolerant Routing in Irregular Modified Shuffle Network

Harsh Sadawarti, Nirlaip Kaur, Kanwarpreet Kaur
International Journal International Journal of Innovative Research in Computer and Communication Engineering (An ISO 3297: 2007 Certified Organization) Vol. 3, Issue 5, May 2015

Abstract

Interconnection networks (IN) play very important role in various parallel processing applications. The connectivity pattern used in interconnection networks greatly determines the performance of the system. Multistage Interconnection Network is also an IN. The interconnection pattern used also determines the fault tolerance of the network. This paper introduces a new irregular fault tolerant multistage interconnection network named Irregular Modified Shuffle Network (IMSN). IMSN is analyzed in terms of fault tolerance and it has been observed that IMSN provides more alternate paths than existing networks such as Improved Four Tree Network (IFTN), Modified Alpha Network (MALN) and New Irregular Augmented Shuffle Network (NIASN).

Gain Analysis of Hybrid Optical Amplifier for 100 Channels DWDM System at Bit Rate of 10 Gbps

Harsh Sadawarti, Kirandeep Kaur
Conference Paper 2nd International Conference on Recent Advances in Engineering & Computational Sciences (RAECS), Proceedings of 2015 RAECS UIET Panjab University Chandigarh 21-22nd December 2015 ; Pages: 1 - 5, DOI: 10.1109/RAECS.2015.7453387

Abstract

Abstract—Hybrid amplification based on Raman-EDFA optical amplifier in combination with Semiconductor optical amplifier (SOA) booster .....

Despeckling of renal calculi in ultrasound images

Harsh Sadawarti, Monika Pathak, Sukhdev Singh
International Journal International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 02 Issue: 05 | Aug-2015 www.irjet.net p-ISSN: 2395-0072.

Abstract

Ultrasound imaging can be used as an initial evaluation method in Urological diagnosis to examine kidney problems. The diagnosis helps doctor to access abnormalities in kidney like abnormality in size and shape of kidneys, presence of swelling, cysts, ulcer and stones. However, the Ultrasound diagnosis is more popular as compare to Computed Tomography (CT) and Magnetic Resonance Imaging (MRI) scanning, but it suffers with speckle noise. The speckle noise is an inherited property of ultrasound images which shows bright particles in the ultrasound images.

A Review on Digital Watermarking For Copyright Protection of Digital Data

Harsh Sadawarti, G.S. Kalra, Reeta Chainani
International Journal International Journal of Innovative Computer Science & Engineering Volume 2 Issue 3; July-August-2015; Page No.01-04.

Abstract

In the present position of global networking, we want to protect our digital contents i.e. audios, videos, pictures and texts from unauthorized copying. For this reason, Digital Image watermarking Techniques have been developed to the copyright protection of digital data from illegal modification and reproduction. It is used in various areas like broadcast monitoring, copyright protection and also for owner identification. This paper highlights the basic model of Digital watermarking including its types and applications and also about various attacks on watermarked images. In this paper we also discussed about two methods i. e spatial domain and frequency domain.

A Fault-Tolerant Irregular Augmented Shuffle Exchange Network 4

Harsh Sadawarti, Sony Bansal
International Journal International Journal of Engineering Technology and Computer Research (IJETCR) Available Online at www.ijetcr.org Volume 3 Issue 2; May-June 2015; Page No. 67-71.

Abstract

Inter-processors communication is one of the key issues of the system performance. The ability of networks to continue operating despite failures at minimum cost are major concerns in determining the overall system performance. In this paper, a new irregular multistage interconnection network is proposed named as Irregular Augmented Shuffle Exchange Network-4 (IASEN-4). The Performance of IASEN-4 is measured over some popular MINs in terms of permutation passable, fault-tolerance and cost effectiveness. It has been observed that IASEN-4 provides much better fault tolerance by providing more paths between any pair of source-destination at lesser cost as compared to other popular networks such as IASEN-3[12], IAON [8] and IASEN-2[11]. Key Words: Multistage Interconnection Networks, Irregular Augmented Shuffle Exchange Network, Irregular Advance Omega Network, Permutation Passable, Cost-Effectiveness.

Performance Analysis Of Irregular Augmented Shuffle Exchange Network-4

Harsh Sadawarti, Sony Bansal
International Journal International Conference on Telecommunication Technology & Management (ICTTM 2015) April 11-12, 2015 Bharti School of Telecommunication Technology & Management, IIT Delhi. Publication Partner (Emerald- ISBN: 9780992680053).

Abstract

The Multistage Interconnection Networks (MINs) are basically a class of high-speed computer networks that usually consist of processing elements (PEs) at one end and memory elements (MEs) at the other end of the network. These PEs and MEs are connected by switching elements (SEs) which are themselves usually connected to each other in stages, hence the name. MINs are typically used as a low-latency interconnection as opposed to traditional packet switching networks because interconnecting processors and linking them efficiently to memory module is not an easy task. Hence, an interconnection network which can provide a desired connectivity and optimum performance is required. This paper presents a new type of such Irregular Multi-Stage Interconnection Network (MIN) named as Irregular Augmented Shuffle Exchange Network-4 (IASEN-4). The study of the existing regular and irregular multistage interconnection networks was carried out and their performance parameters were analyzed followed by the designing of IASEN-4 and computation of its respective performance factors. This proposed network is compared with the existing networks, viz. IASEN-3, IAON and IASEN-2 in terms of Bandwidth, Probability of Acceptance, Processor Utilization, Processing Power and Throughput. In this paper, we have proved that IASEN-4 is much better than the above-mentioned networks by comparing their aforesaid parameters.

A Survey on Multi-Stage Interconnection Networks

Harsh Sadawarti, Sony Bansal, Nirlaip Kaur
International JournalInternational Journal of Computer Science Trends and Technology (IJCST) – Volume 3 Issue 1, Jan-Feb 2015.

Abstract

In this paper variety of fault tolerant multistage interconnection networks that have been proposed in literature are surveyed .Fault tolerant networks are capable of handling requests even in presence of faults although at reduced performance. Various networks which we have surveyed include Augmented Baseline Network (ABN) , Irregular Augmented Baseline Network (IABN), Modified Augmented Baseline Network (MABN), Augmented Shuffle Exchange Network (ASEN-2), Irregular Augmented Shuffle Exchange Network (IASEN), Irregular Augmented Shuffle Network (IASN),Improved Irregular Augmented Shuffle Network(IIASN), New Irregular Augmented Shuffle Network( NIASN), Modified Augmented Shuffle Exchange Network (MASEN), Irregular Augmented Shuffle Exchange Network–3 (IASEN-3), Modified Alpha Network (MALN), Advance Irregular Alpha Multistage Interconnection Network (AIAMIN2), Irregular Advance Omega Network (IAON).

Comparative Analysis of Outlier detection Techniques

Harsh Sadawarti, Kamal Malik, Kalra G.S.
International JournalInternational Journal of Computer Applications (0975 – 8887) Volume 97– No.8, July 2014.

Abstract

Data Mining simply refers to the extraction of very interesting patterns of the data from the massive data sets. Outlier detection is one of the important aspects of data mining which actually finds out the observations that are deviating from the common expected behavior...

Detection of Outliers from Higher Dimensional Data Using Self- Organizing Maps

Harsh Sadawarti, Kamal Malik, Kalra G.S.
Conference Paper8th International Conference on Advanced Computing and Communication Technologies (ICACCTT-20l4) ISBN: 978-93 84935-00-9 on 15th,Nov,2014.

Abstract

Outlier detection for higher dimensional stream data is a new and an emerging concept. To detect the higher dimensional outliers i.e. the projected outliers is itself a very challenging task...

Impact Analysis on the Performance of Zigbee Protocol Under Various Mobility Models

Harsh Sadawarti, Parneet Dhillon
International JournalInternational Journal of Engineering Trends and Technology (IJETT) – Volume 9 Number 11 - Mar 2014

Abstract

Wireless sensor network, IEEE 802.15.4/Zigbee is a specification for a suite of high level communication protocols that interconnects simple low power low processing capability wireless nodes for the transfer of data This paper aims at finding out the suitable mobility model that determines the effective positioning of nodes that gives the best throughput. In this study, the effect of four different mobility models, such as group, random walk, random waypoint and pursue mobility models has evaluated on various IEEE 802.15.4 based zigbee standard network. After the intensive simulations, it has been seen that by using the tree topology for the placement of nodes in the network and by configuring the movement of the nodes according to the group mobility model, network gives the maximum throughput and possess minimum data dropped in the network. So, it has concluded that under the given conditions, group mobility model outperforms other three mobility models.

Highly Spectral Efficient Coherent Optical Systems

Harsh Sadawarti, Monika Mehra
International JournalInternational Journal of Computer Science and Communication Engineering IJCSCE Special issue on “Recent Advances in Engineering & Technology” NCRAET-2013, ISSN 2319-7080

Abstract

Fiber-optic communication systems have revolutionized the telecommunications industry. It has number of advantages over electrical transmission Recently, the interest lies in the increase of spectral efficiency as well as tolerance against dispersion effects and fiber nonlinearities which are today’s the most limiting factors in ultra long haul communication systems. With the new possibilities offered for the high speed digital circuits, coherent systems have attracted a lot of attention during the last years. Coherent detection is a promising technology to increase optical receiver sensitivity, enables supporting of more spectrally efficient modulation formats such as quadrature phase shift keying (QPSK) and quadrature amplitude modulation (QAM) and allows digital signal processing for compensation of transmission impairments.

Kohonen Self Organizing Maps

Harsh Sadawarti, Kamal Malik
Conference Paper International Conference in Ganpati Institute of Engineering and Technology in Dec ,2013

Re-Defining K-Means by Increasing Number of Clusters

Harsh Sadawarti, Priyanka Kohli
International JournalInternational Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 8, August 2013, ISSN: 2277 128X

Abstract

Data Mining is the process of extracting previously unknown but significant information from large databases. It is also termed as the exploration and analysis of large quantities of data in order to discover valid, novel, potentially useful, and ultimately understandable patterns in data. Data and Information or Knowledge has a significant role on human activities. Data mining is the knowledge discovery process by analyzing the large volumes of data from various perspectives and summarizing it into useful information. To analyze, manage and make a decision of such type of huge amount of data we need techniques called the data mining.

TIME AND SPACE INVARIANCE OF VARIOUS NATURE INSPIRED TECHNIQUES

Harsh Sadawarti, Harish Kundra
Conference PaperInternational Conference on Advances in Computing and Communication Technologies held at Pattaya, Thailand on 19th‐20th January, 2013

Implementation of DYMO routing protocol

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal Journal of Information Technology, Modeling and Computing (IJITMC), ISSN: 2320-7493, 1(2): 49-57, May 2013

Abstract

Mobile ad hoc networks communicate without any fixed infrastructure or ant centralized domain. All the nodes are free to move randomly within the network and share information dynamically. To achieve an efficient routing various protocols have been developed so far which vary in their nature and have their own salient properties. In this paper, we have discussed one of the latest protocols i.e. Dynamic Manet on demand (DYMO) routing Protocol, implemented and analysed its performance with other similar protocols against different parameters. Finally a comparison has been presented between all of them.

Review of Mobility Models in Mobile Ad hoc Networks

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal Journal of Information Technology and Computer Science (IJITCS), ISSN: 2074-9015, 5(6), May 2013

Abstract

A mobile ad-hoc network (MANET) is basically called as a network without any central administration or fixed infrastructure. It consists of a number of mobile nodes that use to send data packets through a wireless medium. There is always a need of a good routing protocol in order to establish the connection between mobile nodes since they possess the property of dynamic changing topology. Further, in all the existing routing protocols, mobility of a node has always been one of the important characteristics in determining the overall performance of the ad hoc network. Thus, it is essential to know about various mobility models and their effect on the routing protocols. In this paper, we have made an attempt to compare different mobility models and provide an overview of their current research status. The main focus is on Random Mobility Models and Group Mobility Models. Firstly, we present a survey of the characteristics, drawbacks and research challenges of mobility modeling. At the last we present simulation results that illustrate the importance of choosing a mobility model in the simulation of an ad hoc network protocol. Also, we illustrate how the performance results of an ad hoc network protocol drastically change as a result of changing the mobility model simulated.

MINs PERFORMANCE FOR PARALLEL PROCESSING image

Harsh Sadawarti
Book Aberdeen University Press Services (17 August 2008) ISBN-10: 0615176968 ISBN-13: 978-0615176963
image

MINs PERFORMANCE FOR PARALLEL PROCESSING

The Performance of a system depends directly on the time required to perform an operation and number of these operations that can be performed concurrently. High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required for communication in parallel processing systems. Multistage interconnection networks provide a compromise between shared bus and crossbar networks.

Protecting Copyright Multimedia Files by Means of Digital Watermarking: A Review

Harsh Sadawarti, G.S. Kalra
Conference Paper 5th IEEE International Conference on Advanced Computing & Communication Technologies [ICACCT-2011]

Abstract

Digital information is easy to transfer and store but this property of digital information becomes harmful to itself as it can be easily copied and distributed on the internet. Thus, number of efforts are going on to protect the copyright of the owner like Steganography, digital signatures etc. But digital watermarking comes out to be most effective tool among these. It can be applied on text, image, audio and video files in number of ways which are effective for any specific application.

Blind Digital Image Watermarking Robust Against Histogram Equalization

Harsh Sadawarti, Kalra G.S.
Journal Paper Journal of Computer Science 8 (8): 1272-1280, 2012, ISSN 1549-3636

Abstract

Piracy in the presence of internet and computers proves to be a biggest damage to the industry. Easy editing and copying of images yields a great damage to the owner as original images can be distributed through internet very easily. To reduce the piracy and duplicity of the digital multimedia files, digital watermarking technique is dominating over the other available techniques. There are certain methods or attacks which are used to damage the watermark. One of the major attacks is histogram equalization and reducing the number of histogram equalized levels. Thus, there is a need to develop a method so that the watermark can be protected after histogram equalization.

Computation of Pheromone values in the AntNet Algorithm

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Computer Network and Information Security (IJCNIS), ISSN: 2074-9104, 4(9): 47-54, August 2012

Abstract

In this paper, we discuss the basic routing technique of ants and study the change in pheromone values at each node. Also the optimal paths can then be computed based on the shortest cumulative pheromone count between source and destination nodes. AntNet is a distributed multi-agent system inspired by the stigmergy model of communication observed in ant colonies. The ants or control packets collect information about the network conditions and are used to update and maintain the routing tables. Ants based routing is gaining more popularity because of its adaptive and dynamic nature. A number of Swarm Intelligence based, more specially Ant Colony Optimization (ACO) based routing algorithms are proposed by researchers. A version of ant routing protocol called AntNet has been implemented to work within the network simulator ns-2. Routing tables and Pheromone tables have been computed for each node in the network. On the basis of these tables we have tried to compute the shortest and most optimal path between source node and destination node.

Effect of mobility parameters on the performance of AODV routing protocol

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Mobile & Network Technology (IJNMT), ISSN: 2229-9114, 3(1) :14-20, January 2012

Abstract

Routing in an ad hoc network is always a challenging task because of the free and random movement of nodes. This high node mobility sometimes results in route failures and decreased network performance. Itfurther degrades the overall performance of the routing protocol. In this study we have analyzed the effect of two node mobility parameters, i.e. varying speed and number of nodes, on the throughput of Ad hoc on-demandDistance Vector Routing Protocol. The performance is experimentally tested and compared using ns2 simulator.The simulation results are graphically shown and explained.

MANET Routing Protocols Based on Ant Colony Optimization

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal International Journal of Modeling and Optimization, Vol. 2, No. 1, February 2012

Abstract

Apart from tremendous research being done all around the globe, still ad hoc networks are a big challenge for the researchers. Routing in an ad hoc network is extremely challenging because of its dynamic nature, limited bandwidth and power energy. Somehow, Swarm Intelligence based techniques such as ant colony optimization (ACO) algorithms have shown to be a good technique for developing routing algorithms for ad hoc networks. ACO based routing is an efficient routing scheme based on the behaviour of foraging ants. The collective behaviour of ants helps to find the shortest path from the nest to a food source, by deposition of a chemical substance called pheromone on the visited nodes. This mechanism from collective intelligence is applied to the ad hoc network by researchers. In this paper, we have brought some characteristics as well as performance analysis of the proposed ACO based ad hoc routing protocols and compare them with the well-known ad hoc routing protocols. The results presented in the last also help the researchers to understand the differences among various ACO based routing algorithms and to choose appropriate protocol for their research work. Our study shows how this approach has significantly improved the performance of the ad hoc networks.

A Review of Routing Protocols for Mobile Ad Hoc Network

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal WSEAS TRANSACTIONS on COMMUNICATIONS, ISSN: 1109-2742, Issue 11, Volume 10, November 2011

Abstract

A number of routing protocols has been proposed in recent years for possible use of Mobile Ad Hoc Networks in various application areas such as military, govt. etc. In this paper we have presented a comprehensive review of these protocols with a particular focus on their security aspects. Further we have presented a comparison of some of the existing Routing Protocols of MANETs. The base criteria for comparison is routing methodologies and the information used to make routing decisions. All the protocols have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability, with respect to which the analyses of secure versions of proposed protocols are discussed.

Analysis of various Swarm-based & Ant-based Algorithms

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
Conference Papers ACM International Conference on Advances in Computing and Artificial Intelligence (ACAI 2011)

Abstract

Ant algorithms and swarm intelligence systems have been offered as a novel computational approach that replaces the traditional emphasis on control, preprogramming and centralization with designs featuring autonomy, emergence and distributed functioning. These designs provide scalable, flexible and robust, able to adapt quickly changes to changing environments and to continue functioning even when individual elements fail. These properties make swarm intelligence very attractive for mobile ad hoc networks. These algorithms also provide potential advantages for conventional routing algorithms. Ant Colony Optimization is popular among other Swarm Intelligence Techniques.In this paper a detailed comparison of different Ant based algorithms is presented. The comparative results will help the researchers to understand the basic differences among various existing Ant colony based routing algorithms.

Human Protein Function Prediction - A Docking based approach

Harsh Sadawarti, Simardeep Kaur
International Journal IJAEST, ISSN : 2249-913X, Vol. 1 No. 1 September-November 2011

Abstract

Proteins are the most important macromolecules of life. The knowledge of protein function is an important link for the development of drugs, crop development and synthetic bio-chemicals like bio fuels. Different techniques are applied for the protein function prediction. These techniques are based on protein sequence, protein structure, genomic data, protein interaction networks etc. In this paper we will use docking for the prediction of protein function .The docking technique makes the database search faster .By applying docking for the protein function prediction we can easily find the complementary proteins for the target proteins during the drug discovery process which makes this process fast. . Docking technique also helps in classification of enzymes and their mechanisms .By applying docking the virtual screening of the compounds could be done.

Review of Various Routing Protocols for MANETs

Harsh Sadawarti, Anuj K. Gupta
International Journal International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011

Abstract

In recent years, a vast research has been seen going on in the field of Mobile Ad Hoc Networks (MANETs). Due to limited resources in MANETs, to design an efficient and reliable routing strategy is still a challenge. An intelligent routing strategy is required to efficiently use the limited resources. Also the algorithms designed for traditional wired networks such as link-state or distance vector, does not scale well in wireless environment. Routing in MANETs is a challenging task and has received a tremendous amount of attention from researchers around the world. To overcome this problem a number of routing protocols have been developed and the number is still increasing day by day. It is quite difficult to determine which protocols may perform well under a number of different network scenarios such as network size and topology etc. In this paper we provide an overview of a wide range of the existing routing protocols with a particular focus on their characteristics and functionality. Also, the comparison is provided based on the routing methodologies and information used to make routing decisions. The performance of all the routing protocols is also discussed. Further this study will help the researchers to get an overview of the existing protocols and suggest which protocols may perform better with respect to varying network scenarios.

Analyzed Traffic through Switches in the Design of LANs using OPNET MODELER

Harsh Sadawarti, Ishu Gupta, Dr. S.N. Panda
International Journal International Journal of Marketing and Technology (ISSN: 2249-1058), Volume 1 Issue 4 September 2011.

Abstract

The corporate LAN has evolved from a passive background business component to a highly active, highly visible core asset that enterprises rely on to support day-to-day operations critical to their market success. Today’s network is a strategic instrument that must be accessible anytime from anywhere—simultaneously offering fast, secure, reliable services at scale regardless of location. It has also evolved from traditional client/server data flow support to peer-to-peer flow support, and it must also accommodate an increasing number of devices and services. The main aim of this research paper is to demonstrate the need for implementation of switches in the design of LANs using OPNET-MODELER. The performance of a 16-station LAN using first a simple hub, and then a switch and two hubs is compared. By analyzing the graphs, it is concluded that traffic performance of a network after deploying switches is better.

Algorithms of Partitioning Method in Clustering

Harsh Sadawarti, Kamal Malik
Conference Paper International Conference on Technological and Management Advancements: Issues and Challenges: 2011, held in R.I.M.T, Mandi Gobindgarh in July, 2011.

Robust Blind Digital Image Watermarking Using DWT and Dual Encryption Technique

Harsh Sadawarti, Talwar Rajneesh, Kalra Gursharanjeet Singh
Conference Paper pp.225-230, 2011 Third International Conference on Computational Intelligence, Communication Systems and Networks, 2011

Abstract

Piracy in the presence of internet and computers proves to be a biggest jolt to the concerned industry. To reduce the piracy and duplicity of the images, digital watermarking technique is having an edge over the other available techniques. In this paper, a blind digital watermarking algorithm is presented which is robust enough to resist the watermark against the attacks. The algorithm exploits the random sequence generated by Arnold and Chaos transformations. Discrete wavelet transformation of third level decomposition is used to convert the image into its frequency domain. The binary watermark is embedded into its HL3 domain. The evaluation of the algorithm is calculated in terms of peak signal to noise ratio and non correlation. The results prove that the algorithm is robust enough to handle the attacks like JPEG, filtering, and different types of noise attacks.

Performance analysis of AODV, DSR & TORA Routing Protocols

Harsh Sadawarti, Anuj K. Gupta, Anil K. Verma
International Journal IACSIT International Journal of Engineering and Technology, Vol.2, No.2, April 2010 ISSN: 1793-8236

Abstract

The field of Mobile Ad hoc Networks (MANETs) has gained an important part of the interest of researchers and become very popular in last few years. MANETs can operate without fixed infrastructure and can survive rapid changes in the network topology. They can be studied formally as graphs in which the set of edges varies in time. The main method for evaluating the performance of MANETs is simulation. This paper is subjected to the on-demand routing protocols with identical loads and environment conditions and evaluates their relative performance with respect to the two performance metrics: average End-to-End delay and packet delivery ratio. We investigated various simulation scenarios with varying pause times. From the detailed simulation results and analysis, a suitable routing protocol can be chosen for a specified network and goal.

Security aspects in ad hoc network routing

Harsh Sadawarti, Anuj K. Gupta
Conference Paper In proceeding of: International Symposium on Computing Engineering & Technology, at Mandi Gobindgarh, Punjab, India, 01/2010;

Abstract

A mobile ad-hoc network is a self-configuring network of mobile routers, connected by wireless links, which are free to move randomly and organize themselves arbitrarily. These types of networks operate in the absence of any fixed infrastructure which makes them easy to deploy but it becomes difficult to make use of the existing routing techniques for network services. This poses a number of challenges in ensuring the security of the communication. Because of the changing topology special routing protocols have been proposed to face the routing problem in MANETs. The paper contains two major sections: one presenting the secure routing protocol functionality and their comparison, the other presenting threats faced by the ad hoc network environment and provides a classification of various security mechanisms. We attempt to analyze the respective strengths and vulnerabilities of the existing routing protocols and suggest a broad and comprehensive framework that can provide a tangible solution. The paper closes with a conclusion and an outlook on evolving trends in secure ad hoc routing.

Performance Analysis of New Irregular Multistage Interconnection Network

Harsh Sadawarti, P.Kaur
International Journal IJAEST INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES, Vol No. 9, Issue No. 1, 082 - 086

Abstract

In this paper, a new type of MIN, New Irregular Augmented Shuffle Network (NIASN) is proposed. The proposed NIASN and existing IASN, QT, ASEN-2 MINs are analyzed and compared. The proposed network NIASN provides much better Bandwidth, Probability of acceptance, Throughput, Processor Utilization, and Processing Power than existing MINs.

Measuring Testability of aspect oriented programs

Harsh Sadawarti, P.Sharma
Conference Paper International Conference on Computer Applications and Industrial Electronics (ICCAIE), 2010 , ISBN: 978-1-4244-9054-7, Kuala Lumpur

Abstract

Testability design is an effective way to realize the fault detection and isolation. It becomes crucial in the case of Aspect Oriented designs where control flows are generally not hierarchical, but are diffuse and distributed over the whole architecture. In this paper, we concentrate on detecting, pinpointing and suppressing potential testability weaknesses of a UML Aspect-class diagram. The attribute significant from design testability is called “class interaction”: it appears when potentially concurrent client/supplier relationships between classes exist in the system. These interactions point out parts of the design that need to be improved, driving structural modifications or constraints specifications, to reduce the final testing effort. This paper does an extensive review on testability of aspect oriented software, and put forth some relevant information about class-level testability.

An Information Modeling using EHR

Harsh Sadawarti, Kulvinder Singh Mann, Ravikant Verma, Ekta Gupta
International Journal International Journal of Computer Science & Communication, IJCSC Vol 1, No.2, July-Dec. 2010, pp 299-302, ISSN : 0973-7391

Abstract

Designing of Data Exchange Protocol by Integrating Dicom using HLT Standard to develop Data Exchange Gateway to support Secures Data flow

Harsh Sadawarti, Kulvinder Singh Mann, Rupinder Kaur & Ramandeep Kaur
International Journal International Journal of Advanced Engineering Technology, IJAET, Vol 1, Issue II, July-Sep.2010, E-ISSN 0976-3945

Abstract

Health care has become one of the most important services. Hospitals, physicians, insurers, and managed-care firms are networking, merging, and forming integrated organizations to finance and deliver health care. This paper mainly does some research on the problem of secure data flow. Data access is enabled via internet browser technology. Relevant patient and image acquisition information is extracted from the DICOM images and stored into a relational database. Patient information such as radiological findings are transferred from the Radiological Information System (RIS) into the database. Image data is accessed viewer. Since data security mechanisms either by a fast preview tool , a DICOM encryption of sensitive patient data is implemented. The method allows a dynamic selection of the data to be encrypted.

EHR System to support patient care using DSS

Harsh Sadawarti, Kulvinder Singh Mann
Journal Journal of Computer and Information Technology, J. of Comp. and I.T. Vol 1(1), 23-34 (August 2010) , ISSN : 2229-3531

Abstract

A Conceptual Framework for the Assessment of Health Management Information System

Harsh Sadawarti, Karmjeet Kaur Kulvinder Singh Mann
Journal Journal of Computer and Information Technology, J. of Comp. and I.T. Vol 1(1), 99-108(2010)

Abstract

Security Routing Techniques for MANETs

Harsh Sadawarti, Gupta Anuj K.
International Journal International Journal of Computer Theory and Engineering (IJCTE) ISSN: 1793-8201, Article No. 74, 1(4): 456-460, October 2009

Abstract

In this paper we present a survey of various existing secure routing protocols for mobile ad hoc networks (MANETs). A mobile ad-hoc network is a self-configuring network of mobile nodes, connected by wireless links, which act as routers and are free to move randomly and organize themselves arbitrarily. These types of networks operate in the absence of any fixed infrastructure which makes them easy to deploy but it becomes difficult to make use of the existing routing techniques for network services. In order to facilitate communication within the network, a Routing Protocol (RP) is used to discover routes between nodes. The primary goal of such an ad-hoc network RP is correct and efficient route establishment between a pair of nodes so that messages may be delivered in time. The wireless and distributed nature of MANETs poses security a great challenge to system designers. This paper contains two main sections: first section presents a short literature study on various types of security attacks and routing security schemes that have been proposed to prevent and/or detect these attacks and second gives a state-or-the-art review of the existing secure Routing Protocols designed for MANETs with a comparison for typical representatives.

An Efficient Interconnection Augmented Shuffle Network

Harsh Sadawarti, Bansal P.K.
International Journal WSEAS Transaction on Communication, ISSUE 3, Vol-6, Mar 2007, ISNN 1109-2742,pp 486-491

Abstract

The Performance of a system depends directly on the time required to perform an operation and number of these operations that can be performed concurrently. High performance computing systems can be designed using parallel processing. The effectiveness of these parallel systems rests primarily on the communication network linking processors and memory modules. Hence, an interconnection network that provides the desired connectivity and performance at minimum cost is required for communication in parallel processing systems. Multistage interconnection networks provide a compromise between shared bus and crossbar networks. In this paper, a new class of Irregular, Fault-tolerant multistage interconnection network named as Irregular Augmented Shuffle Network (IASN) has been proposed. The network has less number of stages as compared to existing irregular networks. Various performance parameters have been analyzed which shows better performance of the proposed network than the existing networks. The reliability of a network is evaluated in terms of MTTF. It has been the IASN has a higher MTTF for upper and lower bound in comparison bound in comparison to networks such as ASEN-2 and ABN and is comparable to FT network.

Fault diagnosis in Multiple-path interconnection Network

Harsh Sadawarti, Bansal P.K.
International Journal GESJ Georgian Electronic Scientific Journal; Computer Sciences & Telecommunication 2006/No.219,pp 146-153

Abstract

Two pass routing scheme is described for communication in a multiprocessor system employing a unique-path multistage interconnection network in the presence of faults in the network. It is capable of tolerating all single faults and many multiple faults in all except the first and last stages of the network. The routing scheme is useful for tolerating both permanent as well as intermittent faults in the network. The hardware over head for implementing the scheme is very small and no time-penalty is paid in the fault-free case.

Fault-tolerant routing in Unique-path Multistage Interconnection Networks

Harsh Sadawarti, Bansal P.K.
Conference Paper IEEE INDICON 2003, NT Kharagpur, Dec 20-22, 2004, pp 427-430

Abstract

Two pass routing scheme is described for communication in a multiprocessor system employing a unique-path multistage interconnection network in the presence of faults in the network. It is capable of tolerating all single faults and many multiple faults in all except the first and last stages of the network. The routing scheme is useful for tolerating both permanent as well as intermittent faults in the network. The hardware over head for implementing the scheme is very small and no time-penalty is paid in the fault-free case.

Crafted with by Happy Pengwyn Design Studio

Teaching History

  • Mar'16 Jun'09

    Professor cum Campus Director, RIMT Institutes, Mandi Gobindgarh

  • Jun'09 Jan'09

    Professor cum Vice Principal, RIMT- IET, Mandi Gobindgarh

  • Jan'09 Sep'03

    Assistant Professor cum Vice Principal, RIMT- IET, Mandi Gobindgarh

  • Aug'03 Jun'01

    Assistant Professor cum HOD (Computer Applications), RIMT- IMCT, Mandi Gobindgarh

  • May'01 Jul'96

    Lecturer in Computer Science Engineering Department, Baba Banda Singh Bahadur Engineering College, Fatehgarh Sahib (Punjab)

Crafted with by Happy Pengwyn Design Studio

At My Office

You can find me at my office located at CT University, Ferozepur Road, Ludhiana.

I am at my office every day from 9:00 am to 5:00 pm, but you may consider a call to fix an appointment.

Crafted with by Happy Pengwyn Design Studio