2018 International Conference on Computing, Power and Communication Technologies (GUCON), 2018
Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior o... more Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior of animals. PSO is widely growing and accepted among researchers to find the optimum solution in very large space with low computational complexity. There are various controlled parameters in PSO,and inertia weight (IW) is one of them. An appropriate strategy for varying inertia weight improves the PSOperformance. Recent research works related to varying inertia weight strategy considered small values of w, generally between 0 and 1.The aim of this research paper is to investigate existing varying inertia weight strategy, their effect on PSO performance and to design the new variant of IW for better performance. The same strategy have been implemented in two different proposed inertia weight variants of PSO, namely Modified Simple Random Inertia Weight (MSRIW), and Modified Oscillating Inertia Weight (MOIW). We compared the performance of proposed variants with different existing inertia weight variants of PSO. The proposed strategy is better than existing in term of convergence speed. Further this strategy can be implemented for task scheduling in cloud computing for better performance.
Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid de... more Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid development of cloud computing the user's dependence on the cloud has increased and hence user request per unit time is increases. Now scheduling and serving the user requests is a major challenge. Particle swarm optimization as a heuristic algorithm is the most suitable algorithm in such scenario to serve user requests for the most appropriate resources. Author written this research paper in continuation with previous research paper called Modified particle swarm optimization (MPSO) in which author controlled the inertia weight in PSO to find the best cost. This research paper investigates the effect of acceleration coefficient to achieve the best cost. The implementation results of PSO with different acceleration coefficient are produced and compared. Author has use MATLab to test the effect of acceleration coefficient on fitness value and also implemented in CloudSim simulator to te...
2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018
Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizin... more Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizing energy consumption in wireless SDN is now essential and challenging. In this paper, we propose the concept of layer heads using which the energy consumption is optimized. We further reduce the energy consumption using the optimal number of energy spaces and topology type. The proposed approach is tested with varied topologies and the results show that the energy levels are conserved in software-defined wireless sensor networks (SDWSN).
Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrast... more Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrastructure, platform, and software as an amenity to users which are effortlessly available via the internet. It has a large number of users and has to deal with a large number of task executions which needs a suitable task scheduling algorithm. Virtualization and parallelism are the core components of cloud computing for optimization of resource utilization and to increase system performance. Virtualization is used to provide IT infrastructure on demand. To take more advantages of virtualization, parallel processing plays an important role to improve the system performance. But it is important to understand the mutual effect of parallel processing and virtualization on system performance. This research helps to better understand the effect of virtualization and parallel processing. In this paper, we studied the effect of parallelization and virtualization for the scheduling of tasks to opti...
This paper defines social engineering and explains how one can use the human mind for capturing u... more This paper defines social engineering and explains how one can use the human mind for capturing useful information about organizations or individuals. It also provides recommendations on how to defend and protect against attackers using social engineering techniqu es. Social engineering is a non-technical method of intrusion hacker’s use that relies heavily on human interacti on and often involves tricking people into breaking normal security procedure. Since there is neither hardware nor software available to protect an enterprise or individual against social engineering, it is essential that good practices be implemented. The overall purpose of this survey is to highlight the different social engineering attac ks and how they can prevented.
Digital image compression deals with methods for reducing the total number of bits required to re... more Digital image compression deals with methods for reducing the total number of bits required to represent an image. This can be achieved by eliminating various types of redundancy that exist in the image dataset. Lossless image compression techniques preserve the information so that exact reconstruction of the image is possible from the compressed data. Major lossless or error free compression methods like Huffman, arithmetic and Lempel-Ziv coding do not achieve great compression ratio. It is necessary to preprocess the images in order to reduce the amount of correlation among neighboring pixels, to improve compression ratio further. Keeping this in view this works intend to focus on a comparative investigation of various lossless image compressions in spatial domain techniques and proposed an algorithm which achieves more compression ratio. The proposed algorithm is divided into two phases. In first phase the color image is divided into RGB plane and where each plane is divided into...
1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ----------------... more 1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key Sharing various schemes have been proposed. The third party auditing scheme will be failed, if the third party’s security is compromised or of the third party will be malicious. To solve this problem, we will work on to design new modal for key sharing and key mana...
2018 International Conference on Computing, Power and Communication Technologies (GUCON), 2018
Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior o... more Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior of animals. PSO is widely growing and accepted among researchers to find the optimum solution in very large space with low computational complexity. There are various controlled parameters in PSO,and inertia weight (IW) is one of them. An appropriate strategy for varying inertia weight improves the PSOperformance. Recent research works related to varying inertia weight strategy considered small values of w, generally between 0 and 1.The aim of this research paper is to investigate existing varying inertia weight strategy, their effect on PSO performance and to design the new variant of IW for better performance. The same strategy have been implemented in two different proposed inertia weight variants of PSO, namely Modified Simple Random Inertia Weight (MSRIW), and Modified Oscillating Inertia Weight (MOIW). We compared the performance of proposed variants with different existing inertia weight variants of PSO. The proposed strategy is better than existing in term of convergence speed. Further this strategy can be implemented for task scheduling in cloud computing for better performance.
Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid de... more Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid development of cloud computing the user's dependence on the cloud has increased and hence user request per unit time is increases. Now scheduling and serving the user requests is a major challenge. Particle swarm optimization as a heuristic algorithm is the most suitable algorithm in such scenario to serve user requests for the most appropriate resources. Author written this research paper in continuation with previous research paper called Modified particle swarm optimization (MPSO) in which author controlled the inertia weight in PSO to find the best cost. This research paper investigates the effect of acceleration coefficient to achieve the best cost. The implementation results of PSO with different acceleration coefficient are produced and compared. Author has use MATLab to test the effect of acceleration coefficient on fitness value and also implemented in CloudSim simulator to te...
2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018
Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizin... more Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizing energy consumption in wireless SDN is now essential and challenging. In this paper, we propose the concept of layer heads using which the energy consumption is optimized. We further reduce the energy consumption using the optimal number of energy spaces and topology type. The proposed approach is tested with varied topologies and the results show that the energy levels are conserved in software-defined wireless sensor networks (SDWSN).
Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrast... more Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrastructure, platform, and software as an amenity to users which are effortlessly available via the internet. It has a large number of users and has to deal with a large number of task executions which needs a suitable task scheduling algorithm. Virtualization and parallelism are the core components of cloud computing for optimization of resource utilization and to increase system performance. Virtualization is used to provide IT infrastructure on demand. To take more advantages of virtualization, parallel processing plays an important role to improve the system performance. But it is important to understand the mutual effect of parallel processing and virtualization on system performance. This research helps to better understand the effect of virtualization and parallel processing. In this paper, we studied the effect of parallelization and virtualization for the scheduling of tasks to opti...
This paper defines social engineering and explains how one can use the human mind for capturing u... more This paper defines social engineering and explains how one can use the human mind for capturing useful information about organizations or individuals. It also provides recommendations on how to defend and protect against attackers using social engineering techniqu es. Social engineering is a non-technical method of intrusion hacker’s use that relies heavily on human interacti on and often involves tricking people into breaking normal security procedure. Since there is neither hardware nor software available to protect an enterprise or individual against social engineering, it is essential that good practices be implemented. The overall purpose of this survey is to highlight the different social engineering attac ks and how they can prevented.
Digital image compression deals with methods for reducing the total number of bits required to re... more Digital image compression deals with methods for reducing the total number of bits required to represent an image. This can be achieved by eliminating various types of redundancy that exist in the image dataset. Lossless image compression techniques preserve the information so that exact reconstruction of the image is possible from the compressed data. Major lossless or error free compression methods like Huffman, arithmetic and Lempel-Ziv coding do not achieve great compression ratio. It is necessary to preprocess the images in order to reduce the amount of correlation among neighboring pixels, to improve compression ratio further. Keeping this in view this works intend to focus on a comparative investigation of various lossless image compressions in spatial domain techniques and proposed an algorithm which achieves more compression ratio. The proposed algorithm is divided into two phases. In first phase the color image is divided into RGB plane and where each plane is divided into...
1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ----------------... more 1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key Sharing various schemes have been proposed. The third party auditing scheme will be failed, if the third party’s security is compromised or of the third party will be malicious. To solve this problem, we will work on to design new modal for key sharing and key mana...
Uploads
Papers by Nagresh Kumar