Manoj Chaudhary

Learn More
Character segmentation and recognition are imperative steps in the vehicle license plate recognition (VLPR) system. The skewed license plate affects badly on the accurate character segmentation and recognition. To solve the problem, an efficient approach for skew correction of license plate is proposed based on wavelet transform and principal component(More)
Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The(More)
In a vehicle license plate identification system, locating the license plate in the image or video of a vehicle is an important step before final recognition. In the proposed method care has been taken up to extract license plate of motorcycle (size of plate is small and double row plate), car (single as well as double row type), transport vehicle such as(More)
The emergence of extremely powerful mobile communication devices in recent times has triggered off the development of many exploitative technologies that attempt at leveraging the ever increasing processing, storage and communicating capacities of these devices. One of the most developing area of network is opportunistic network. It provides communication(More)
Many web applications available today make use of some way of session to be able to communicate between the server and client. Unfortunately, it is possible for an attacker to exploit session in order to impersonate another user at a web application. The session hijacking is the most common type of attack in the infrastructure type of network. The(More)
In today’s world the computer networks where the packets are sent over the network form client to server for getting the services and server to client to provide the services. As the packets are moving in the network there are vulnerable to numerous types of attacks can be done on the packets . Either it is wireless network or wired network, one of the most(More)
This paper presents an approach for delay optimization in Vehicular ad hoc networks using Ant Colony Optimization and WIMAX technology. Several techniques have previously been proposed for optimizing the load and making routes more scalable to avoid collision for end to end communication between vehicles on highways to ensure that vehicles perform safety(More)
  • 1