Yudhvir Singh | GJUniversity of Science and Technology, Hisar, India(125001) (original) (raw)
Papers by Yudhvir Singh
Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wirel... more Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wireless communication. Flying ad-hoc network (FANET) is a special class of MANET that provides the communication among small flying drone called UAVs (unmanned aerial vehicle) enable with camera, sensor and communication system. FANET has wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its special features have several challenges and issues those need to be considered. Routing in FANETs is one such issue because all the information exchanging process is done by the Routing protocol. In this experiment, the performance of OLSR and AODV routing protocols are analyzed for 3 D FANET environment by utilizing Gauss Markov Mobility Model. We have investigated the performance of protocols by varying group of UAVs and number of packets. Gauss Markov Mobility model has been used to produced 3 D cube area with dimension 1700x1700x1500 me...
With the development of modern information science and technology, complexity of software system ... more With the development of modern information science and technology, complexity of software system is higher than ever before. With the software‟s scale and complexity improving, people are paying more attention on software‟s quality and functional reliability. Software Process Improvement based on an effective Defect Management Process (DMP) is one method of improving software quality. Software Industry is seriously deficient on effective DMP. The understanding of DMP is still in initial stage. Therefore, earnest study of software DMP in software engineering and correctly using it during software development seems to be the demand of time. This paper basically covers each aspect of DMP in detail. The paper deeply study and analyze the theory, technology, methodology and tools of defect management system. Firstly, the paper describes the role and necessity of DMP in the software development. Secondly, it explains the phases, stages and importance of good defect management process.
2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
Distributed Cloud system provides the sharing resources, services, data, platform and hardware in... more Distributed Cloud system provides the sharing resources, services, data, platform and hardware in an integrated global environment. This communication of personal and private information in public domain suffers from various security challenges. In this paper, an exploration of various security aspects of cloud environment is presented. The paper explores the features of cloud system and provided the security framework by defining the integrated security aspects with each layer. Later on, different cloud platforms are discussed along with security support provided by them. The paper identified various security issues and suggested various security policies and methods to provide the secure communication. The paper has identified the security requirements and also presented the relative security solutions.
Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited c... more Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.
The Internet and recent global cyber terrorism have fundamentally changed the way organizations a... more The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points i...
People who travel for medical reasons are referred to as medical tourists and seeking medical car... more People who travel for medical reasons are referred to as medical tourists and seeking medical care in a country other than their own. The key goal of medical tourism is to contribute low-cost special medical services for patients who need surgical and other types of specific treatment in cooperation with the tourism industry. Several international and domestic tourists prefer Maharashtra, Kerala, Karnataka, Goa and Gujarat for medical services and tourism. The nature, importance and difficulties in medical tourism in India are discussed in this paper. The popularity of medical tourism is growing world wide therefore needs computer science techniques to solve the problems risen in this field utilizing the massive amount of data produced by online platforms. Various machine learning algorithms and applications are discussed in this paper and also described the ML algorithms applied in medical tourism.
Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common i... more Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattende d environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited i n computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained en vironment. With a widespread growth in the potential applicati ons of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and is sues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Net work in this paper.
Materials Today: Proceedings
Mathematics
Nature-inspired algorithms serve as the backbone of modern computing technology, and over the pas... more Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborho...
International Journal of Intelligent Enterprise
International Journal of Computer Sciences and Engineering
Indian Journal of Science and Technology, 2016
Indian Journal of Science and Technology, 2016
Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for t... more Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for test case prioritization has been performed on two well known software testing problems namely "Triangle Classification Problem" and "Quadratic Equation Problem". Apart from these two problems, m-ACO has been experimentally evaluated using open source software JFreeChart. Methods: m-ACO finds the optimized solution to test suite prioritization by modifying the phenomenon used by natural ants to reach to its food source and select the food. This paper attempts to experimentally and comparatively evaluate the proposed m-ACO technique for test case prioritization against some contemporary meta-heuristic techniques using two well known software testing problems and open source problem. Performance evaluation has been measured using two metrics namely APFD (Average Percentage of Faults Detected) and PTR (Percentage of Test Suite Required for Complete Fault Coverage). Findings: The proposed technique m-ACO proves its efficiency on both the parameters. m-ACO achieves higher fault detection rate with minimized test suite as comparative to other meta-heuristic techniques for test case prioritization. Improvements: The proposed technique m-ACO basically works by modifying the food source searching and selection pattern of the real ants. Real ants grab every type food source it comes across; while modified ants evaluate the food fitness and uniqueness before selection. This phenomenon enhances the quality and diversity of deposited food source.
International Journal of Security, Privacy and Trust Management, 2012
In distributed operation, we uses different key management schemes, authentication and many trust... more In distributed operation, we uses different key management schemes, authentication and many trust models, but in wireless medium having reliability problem, hidden terminal problem etc. To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform. At last this paper give the comparisons of ACTP model with other existing trust model.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
Software Engineering and Technology, 2014
International Journal of Computer Applications, Aug 20, 2014
Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers.
2015 International Conference on Computer, Communication and Control (IC4), 2015
Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the... more Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the network dynamically establish routing among themselves to form their own network on the fly. This characteristic makes more MANET more vulnerable to attacks especially routing based attacked. There is a need for investigating the performance of attacks with respect to mobility. In this paper, we have investigated blackhole node attack in mobile adhoc networks. Blackhole node attack is the attack in which all traffic is redirected to a specific node, which may not forward any traffic to all other nodes. Here the test-bed is created and developed the system using AODV as a base routing protocol on the network simulator. Various network performance parameters i.e. throughput, packet delivery ratio, collisions etc. are analyzed before and after attack. On implementation of blackhole node attack the performance of the network reduces, on increasing mobility the performance of MANETs decreases sharply i.e. PDR decreases sharply, Number of collisions increases and Energy consumption increases in significance amount.
Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wirel... more Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wireless communication. Flying ad-hoc network (FANET) is a special class of MANET that provides the communication among small flying drone called UAVs (unmanned aerial vehicle) enable with camera, sensor and communication system. FANET has wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its special features have several challenges and issues those need to be considered. Routing in FANETs is one such issue because all the information exchanging process is done by the Routing protocol. In this experiment, the performance of OLSR and AODV routing protocols are analyzed for 3 D FANET environment by utilizing Gauss Markov Mobility Model. We have investigated the performance of protocols by varying group of UAVs and number of packets. Gauss Markov Mobility model has been used to produced 3 D cube area with dimension 1700x1700x1500 me...
With the development of modern information science and technology, complexity of software system ... more With the development of modern information science and technology, complexity of software system is higher than ever before. With the software‟s scale and complexity improving, people are paying more attention on software‟s quality and functional reliability. Software Process Improvement based on an effective Defect Management Process (DMP) is one method of improving software quality. Software Industry is seriously deficient on effective DMP. The understanding of DMP is still in initial stage. Therefore, earnest study of software DMP in software engineering and correctly using it during software development seems to be the demand of time. This paper basically covers each aspect of DMP in detail. The paper deeply study and analyze the theory, technology, methodology and tools of defect management system. Firstly, the paper describes the role and necessity of DMP in the software development. Secondly, it explains the phases, stages and importance of good defect management process.
2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)
Distributed Cloud system provides the sharing resources, services, data, platform and hardware in... more Distributed Cloud system provides the sharing resources, services, data, platform and hardware in an integrated global environment. This communication of personal and private information in public domain suffers from various security challenges. In this paper, an exploration of various security aspects of cloud environment is presented. The paper explores the features of cloud system and provided the security framework by defining the integrated security aspects with each layer. Later on, different cloud platforms are discussed along with security support provided by them. The paper identified various security issues and suggested various security policies and methods to provide the secure communication. The paper has identified the security requirements and also presented the relative security solutions.
Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited c... more Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.
The Internet and recent global cyber terrorism have fundamentally changed the way organizations a... more The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points i...
People who travel for medical reasons are referred to as medical tourists and seeking medical car... more People who travel for medical reasons are referred to as medical tourists and seeking medical care in a country other than their own. The key goal of medical tourism is to contribute low-cost special medical services for patients who need surgical and other types of specific treatment in cooperation with the tourism industry. Several international and domestic tourists prefer Maharashtra, Kerala, Karnataka, Goa and Gujarat for medical services and tourism. The nature, importance and difficulties in medical tourism in India are discussed in this paper. The popularity of medical tourism is growing world wide therefore needs computer science techniques to solve the problems risen in this field utilizing the massive amount of data produced by online platforms. Various machine learning algorithms and applications are discussed in this paper and also described the ML algorithms applied in medical tourism.
Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common i... more Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattende d environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited i n computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained en vironment. With a widespread growth in the potential applicati ons of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and is sues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Net work in this paper.
Materials Today: Proceedings
Mathematics
Nature-inspired algorithms serve as the backbone of modern computing technology, and over the pas... more Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborho...
International Journal of Intelligent Enterprise
International Journal of Computer Sciences and Engineering
Indian Journal of Science and Technology, 2016
Indian Journal of Science and Technology, 2016
Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for t... more Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for test case prioritization has been performed on two well known software testing problems namely "Triangle Classification Problem" and "Quadratic Equation Problem". Apart from these two problems, m-ACO has been experimentally evaluated using open source software JFreeChart. Methods: m-ACO finds the optimized solution to test suite prioritization by modifying the phenomenon used by natural ants to reach to its food source and select the food. This paper attempts to experimentally and comparatively evaluate the proposed m-ACO technique for test case prioritization against some contemporary meta-heuristic techniques using two well known software testing problems and open source problem. Performance evaluation has been measured using two metrics namely APFD (Average Percentage of Faults Detected) and PTR (Percentage of Test Suite Required for Complete Fault Coverage). Findings: The proposed technique m-ACO proves its efficiency on both the parameters. m-ACO achieves higher fault detection rate with minimized test suite as comparative to other meta-heuristic techniques for test case prioritization. Improvements: The proposed technique m-ACO basically works by modifying the food source searching and selection pattern of the real ants. Real ants grab every type food source it comes across; while modified ants evaluate the food fitness and uniqueness before selection. This phenomenon enhances the quality and diversity of deposited food source.
International Journal of Security, Privacy and Trust Management, 2012
In distributed operation, we uses different key management schemes, authentication and many trust... more In distributed operation, we uses different key management schemes, authentication and many trust models, but in wireless medium having reliability problem, hidden terminal problem etc. To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform. At last this paper give the comparisons of ACTP model with other existing trust model.
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013
Software Engineering and Technology, 2014
International Journal of Computer Applications, Aug 20, 2014
Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers.
2015 International Conference on Computer, Communication and Control (IC4), 2015
Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the... more Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the network dynamically establish routing among themselves to form their own network on the fly. This characteristic makes more MANET more vulnerable to attacks especially routing based attacked. There is a need for investigating the performance of attacks with respect to mobility. In this paper, we have investigated blackhole node attack in mobile adhoc networks. Blackhole node attack is the attack in which all traffic is redirected to a specific node, which may not forward any traffic to all other nodes. Here the test-bed is created and developed the system using AODV as a base routing protocol on the network simulator. Various network performance parameters i.e. throughput, packet delivery ratio, collisions etc. are analyzed before and after attack. On implementation of blackhole node attack the performance of the network reduces, on increasing mobility the performance of MANETs decreases sharply i.e. PDR decreases sharply, Number of collisions increases and Energy consumption increases in significance amount.