Durgesh Pant

Learn More
Over the years, the focus has been on protecting network, host, database and standard applications from internal and external threats. The Rapid Application Development (RAD) process makes the web application extremely short and makes it difficult to eliminate the vulnerabilities. Here we study web application risk assessment technique called threat risk(More)
This paper describes a new apple classification system based on machine vision and artificial neural network (ANN), which classifies apple in real time on the basis of physical parameters of apple such as size, color and external defects. A specific hardware subsystem has been developed and described for every stage of input and output. The hardware(More)
The purpose of this paper is to develop Artificial Neural Network (ANN)-based apple classifier. Testing effort is calculated using ANN method. The complete system is divided into two modules. In the first module, input (surface level apple quality parameter) from the different sources is collected by the software developed in Visual Basic through different(More)
Component Based Software Development (CBSD) has gained widespread acceptance as it often results in higher quality software with a significant reduction in development time and costs. A key idea behind CBSD is the extensive reuse and composition of preexisting modules into new software. In this paper we introduce the pliability metric, which is well suited(More)
Security has become ubiquitous in every domain today as newly emerging malware pose an everincreasing perilous threat to systems. Consequently, honeypots are fast emerging as an indispensible forensic tool for the analysis of malicious network traffic. Honeypots can be considered to be traps for hackers and intruders and are generally deployed complimentary(More)
While studying the effectiveness of IT-initiatives in Uttarakhand state, a hill state in the central Himalayan region in India, it was realized that unless technology reaches and benefits the last man, it is way beyond its intended role. The present paper puts forward the concept of Inclusive-IT which can counter the asymmetries cropping up because of the(More)
Mobile ad hoc network (MANET) is a set of wireless mobile computer forming a temporary network with out any wired infrastructure, due to dynamic nature of topology and other constraints transmission routing is a challenging task in MANET. k path splittable routing establish at most k paths between single source and single destination node, this scheme(More)
There have been attempts made by several organizations, nations and states to take leverage of Information Technology’s ever expanding application-spectrum. These deliberate attempts are Information Technology Initiatives or IT-initiatives. As a consequence, the world over, there have been efforts to launch IT Initiatives in almost all the areas of human(More)
For E-HEALTH initiatives in Uttarakhand the proposed EHEALTH service model may allow better sharing of health information among multiple government departments, locally as well as at a distant location. But without coordination of different departments in Uttarakhand we cannot setup good ehealth solutions. Priorities of Uttarakhand government for providing(More)