Loading...
Thumbnail Image

Thesis

Browse

Search Results

Now showing 1 - 3 of 3
  • ThesisItemOpen Access
    Analysis of Techniques to Retrieve Big Database
    (Punjab Agricultural University, Ludhiana, 2019) Puri, Shivani; Jain, Lokesh
    In today’s world there are large amount of data which need to be processed with big databases. From the past years, there is plethora of organisations that has adopted many types of non-relational database. The goal of this research is to implement techniques to retrieve big database for the big datasets and investigate the performance of the big database techniques on CPU utilization and high-performance computing software enabling switching the SQL database with NoSQL database. In this research mainly concerns on the new technology of NoSQL database i.e. MongoDB, HadoopDB. Performance comparison of two big data techniques is carried out. The result found that Aggregation technique consumes less execution time than MapReduce technique and more efficient with MongoDB database where as MapReduce technique has less efficient with HadoopDB. Aggregation technique also produces fine relevant information results with less CPU utilization. The result also shows that MongoDB has capability to switch SQL databases as compare to HadoopDB.
  • ThesisItemOpen Access
    Analysis of image forgery detection algorithms
    (Punjab Agricultural University, Ludhiana, 2019) Priyanka; Derminder Singh
    Digital images are a momentous part of today’s digital communication. It is very easy to manipulate digital images for hiding some useful information by image rendering tools such as Adobe Photoshop, Microsoft Paint etc. The common image forgery which is easy to carry out is copy-move in which some part of an image is copied and pasted on another part of the same image to hide the important information. This study proposes an algorithm to spot the copy-move forgery based on exact match block based technique. The design of interface and development of algorithm have been implemented using GNU Octave 4.2.2 as an IDE and Octave as a programming language. The algorithm works by matching the regions in image that are equivalent by matching the small blocks of size b×b. The program is tested for 45 images of mixed image file formats by considering block sizes 2, 4, 6, 8, 10, 12, 14, and 16. It is observed from the experimental results that the proposed algorithm can detect copy-move image forgery in TIF, BMP and PNG image formats only. Results reveal that as the block size increases, execution time (time taken by CPU to display output) also increases but the number of detected forged images increases till block size 10 and attains saturation thereafter. Consequently block size should be set to 10 for getting good results in terms of less execution time.
  • ThesisItemOpen Access
    Deployment of private cloud in campus wide network
    (Punjab Agricultural University, Ludhiana, 2019) Marken, Kunj; Jain, Lokesh
    Cloud computing in the last few years has emerged as a modern computing paradigm with its establishment. This is becoming quite popular due to the reduction in cost, scalability and improvements in the IT industry. Virtualization technology has great contribution in field of computing platform. Cloud computing allows you to use services and resources online. It is used to build and maintain the necessary infrastructure for computing resources. For deploying the cloud in an organization as a private, there are various open source platforms and OpenStack retained by the comparative study. The paper describes development of private cloud on OpenStack software by installing CentOS7 operating system for cloud deployment. Different services are installed such as web server, webmail server, FTP and SSH for communication between users within the private cloud. The results depict that hardware utilization of physical machine increases after deploying virtualization. In cloud without virtualization, hardware resources are not used efficiently because of number of users is limited but in cloud with virtualization hardware resources are utilized at maximum and used by more concurrent users. The aim of paper is to present the importance of virtualization and give the best solution for providing services in private organization.