Yudhvir Singh | GJUniversity of Science and Technology, Hisar, India(125001) (original) (raw)

Papers by Yudhvir Singh

Research paper thumbnail of Performance Investigation of OLSR and AODV Routing Protocols for 3 D FANET Environment using NS3

Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wirel... more Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wireless communication. Flying ad-hoc network (FANET) is a special class of MANET that provides the communication among small flying drone called UAVs (unmanned aerial vehicle) enable with camera, sensor and communication system. FANET has wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its special features have several challenges and issues those need to be considered. Routing in FANETs is one such issue because all the information exchanging process is done by the Routing protocol. In this experiment, the performance of OLSR and AODV routing protocols are analyzed for 3 D FANET environment by utilizing Gauss Markov Mobility Model. We have investigated the performance of protocols by varying group of UAVs and number of packets. Gauss Markov Mobility model has been used to produced 3 D cube area with dimension 1700x1700x1500 me...

Research paper thumbnail of Improving Software Quality through Effective Defect Management Process: A Review

With the development of modern information science and technology, complexity of software system ... more With the development of modern information science and technology, complexity of software system is higher than ever before. With the software‟s scale and complexity improving, people are paying more attention on software‟s quality and functional reliability. Software Process Improvement based on an effective Defect Management Process (DMP) is one method of improving software quality. Software Industry is seriously deficient on effective DMP. The understanding of DMP is still in initial stage. Therefore, earnest study of software DMP in software engineering and correctly using it during software development seems to be the demand of time. This paper basically covers each aspect of DMP in detail. The paper deeply study and analyze the theory, technology, methodology and tools of defect management system. Firstly, the paper describes the role and necessity of DMP in the software development. Secondly, it explains the phases, stages and importance of good defect management process.

Research paper thumbnail of A survey on security integration in distributed cloud environment

2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)

Distributed Cloud system provides the sharing resources, services, data, platform and hardware in... more Distributed Cloud system provides the sharing resources, services, data, platform and hardware in an integrated global environment. This communication of personal and private information in public domain suffers from various security challenges. In this paper, an exploration of various security aspects of cloud environment is presented. The paper explores the features of cloud system and provided the security framework by defining the integrated security aspects with each layer. Later on, different cloud platforms are discussed along with security support provided by them. The paper identified various security issues and suggested various security policies and methods to provide the secure communication. The paper has identified the security requirements and also presented the relative security solutions.

Research paper thumbnail of Analysis of Security Protocols in Wireless Sensor Network

Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited c... more Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.

Research paper thumbnail of Integrating – VPN and IDS – An approach to Networks Security

The Internet and recent global cyber terrorism have fundamentally changed the way organizations a... more The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points i...

Research paper thumbnail of A Review on Machine Learning Applications in Medical Tourism

People who travel for medical reasons are referred to as medical tourists and seeking medical car... more People who travel for medical reasons are referred to as medical tourists and seeking medical care in a country other than their own. The key goal of medical tourism is to contribute low-cost special medical services for patients who need surgical and other types of specific treatment in cooperation with the tourism industry. Several international and domestic tourists prefer Maharashtra, Kerala, Karnataka, Goa and Gujarat for medical services and tourism. The nature, importance and difficulties in medical tourism in India are discussed in this paper. The popularity of medical tourism is growing world wide therefore needs computer science techniques to solve the problems risen in this field utilizing the massive amount of data produced by online platforms. Various machine learning algorithms and applications are discussed in this paper and also described the ML algorithms applied in medical tourism.

Research paper thumbnail of Attacks on Wireless Sensor Network: A Survey

Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common i... more Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattende d environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited i n computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained en vironment. With a widespread growth in the potential applicati ons of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and is sues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Net work in this paper.

Research paper thumbnail of An optimal energy-throughput efficient cross-layer solution using naked mole rat algorithm for wireless underground sensor networks

Materials Today: Proceedings

Research paper thumbnail of An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks

Mathematics

Nature-inspired algorithms serve as the backbone of modern computing technology, and over the pas... more Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborho...

Research paper thumbnail of Trust-adaptive Fuzzy-Statistical Protocol for Optimizing the Communication in Attacked Network

Research paper thumbnail of Enhanced media independent handover for vertical handover decision in MANET

International Journal of Intelligent Enterprise

Research paper thumbnail of Bisection Based Heuristic Technique to Resolve Sink Mobility in WSNs

International Journal of Computer Sciences and Engineering

Research paper thumbnail of A Comparative Evaluation of “m-ACO” Technique for Test Suite Prioritization

Indian Journal of Science and Technology, 2016

Research paper thumbnail of Experimental Analysis of m-ACO Technique for Regression Testing

Indian Journal of Science and Technology, 2016

Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for t... more Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for test case prioritization has been performed on two well known software testing problems namely "Triangle Classification Problem" and "Quadratic Equation Problem". Apart from these two problems, m-ACO has been experimentally evaluated using open source software JFreeChart. Methods: m-ACO finds the optimized solution to test suite prioritization by modifying the phenomenon used by natural ants to reach to its food source and select the food. This paper attempts to experimentally and comparatively evaluate the proposed m-ACO technique for test case prioritization against some contemporary meta-heuristic techniques using two well known software testing problems and open source problem. Performance evaluation has been measured using two metrics namely APFD (Average Percentage of Faults Detected) and PTR (Percentage of Test Suite Required for Complete Fault Coverage). Findings: The proposed technique m-ACO proves its efficiency on both the parameters. m-ACO achieves higher fault detection rate with minimized test suite as comparative to other meta-heuristic techniques for test case prioritization. Improvements: The proposed technique m-ACO basically works by modifying the food source searching and selection pattern of the real ants. Real ants grab every type food source it comes across; while modified ants evaluate the food fitness and uniqueness before selection. This phenomenon enhances the quality and diversity of deposited food source.

Research paper thumbnail of The New Approach to provide Trusted Platform in MANET

International Journal of Security, Privacy and Trust Management, 2012

In distributed operation, we uses different key management schemes, authentication and many trust... more In distributed operation, we uses different key management schemes, authentication and many trust models, but in wireless medium having reliability problem, hidden terminal problem etc. To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform. At last this paper give the comparisons of ACTP model with other existing trust model.

Research paper thumbnail of Feature and Future of Visual Cryptography Based Schemes

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013

Research paper thumbnail of An Empirical Literature Study of Various Test Case Prioritization Techniques

Software Engineering and Technology, 2014

Research paper thumbnail of Memory Virtualization Technique for Efficient Access of Data Resources in Cloud Environment

International Journal of Computer Applications, Aug 20, 2014

Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers.

Research paper thumbnail of Test case prioritization: An approach based on modified ant colony optimization (m-ACO)

2015 International Conference on Computer, Communication and Control (IC4), 2015

Research paper thumbnail of Mobility Analysis of Blackhole Node Attacks in Mobile Adhoc Networks

Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the... more Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the network dynamically establish routing among themselves to form their own network on the fly. This characteristic makes more MANET more vulnerable to attacks especially routing based attacked. There is a need for investigating the performance of attacks with respect to mobility. In this paper, we have investigated blackhole node attack in mobile adhoc networks. Blackhole node attack is the attack in which all traffic is redirected to a specific node, which may not forward any traffic to all other nodes. Here the test-bed is created and developed the system using AODV as a base routing protocol on the network simulator. Various network performance parameters i.e. throughput, packet delivery ratio, collisions etc. are analyzed before and after attack. On implementation of blackhole node attack the performance of the network reduces, on increasing mobility the performance of MANETs decreases sharply i.e. PDR decreases sharply, Number of collisions increases and Energy consumption increases in significance amount.

Research paper thumbnail of Performance Investigation of OLSR and AODV Routing Protocols for 3 D FANET Environment using NS3

Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wirel... more Flying Ad Hoc Network is the most suitable and most emerging research topic in the field of wireless communication. Flying ad-hoc network (FANET) is a special class of MANET that provides the communication among small flying drone called UAVs (unmanned aerial vehicle) enable with camera, sensor and communication system. FANET has wide area of applications like reconnaissance and surveillance for military and civil purposes. FANETs along with its special features have several challenges and issues those need to be considered. Routing in FANETs is one such issue because all the information exchanging process is done by the Routing protocol. In this experiment, the performance of OLSR and AODV routing protocols are analyzed for 3 D FANET environment by utilizing Gauss Markov Mobility Model. We have investigated the performance of protocols by varying group of UAVs and number of packets. Gauss Markov Mobility model has been used to produced 3 D cube area with dimension 1700x1700x1500 me...

Research paper thumbnail of Improving Software Quality through Effective Defect Management Process: A Review

With the development of modern information science and technology, complexity of software system ... more With the development of modern information science and technology, complexity of software system is higher than ever before. With the software‟s scale and complexity improving, people are paying more attention on software‟s quality and functional reliability. Software Process Improvement based on an effective Defect Management Process (DMP) is one method of improving software quality. Software Industry is seriously deficient on effective DMP. The understanding of DMP is still in initial stage. Therefore, earnest study of software DMP in software engineering and correctly using it during software development seems to be the demand of time. This paper basically covers each aspect of DMP in detail. The paper deeply study and analyze the theory, technology, methodology and tools of defect management system. Firstly, the paper describes the role and necessity of DMP in the software development. Secondly, it explains the phases, stages and importance of good defect management process.

Research paper thumbnail of A survey on security integration in distributed cloud environment

2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC)

Distributed Cloud system provides the sharing resources, services, data, platform and hardware in... more Distributed Cloud system provides the sharing resources, services, data, platform and hardware in an integrated global environment. This communication of personal and private information in public domain suffers from various security challenges. In this paper, an exploration of various security aspects of cloud environment is presented. The paper explores the features of cloud system and provided the security framework by defining the integrated security aspects with each layer. Later on, different cloud platforms are discussed along with security support provided by them. The paper identified various security issues and suggested various security policies and methods to provide the secure communication. The paper has identified the security requirements and also presented the relative security solutions.

Research paper thumbnail of Analysis of Security Protocols in Wireless Sensor Network

Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited c... more Wireless Sensor Networks(WSNs) consists of low power, low-cost smart devices which have limited computing resources. With a widespread growth of the applications of WSN, the security mechanisms are also be a rising big issue. A lot of realworld applications have been already deployed and many of them will be based on wireless sensor networks. These applications include geographical monitoring, medical care, manufacturing, transportation, military operations, environmental monitoring, industrial machine monitoring, and surveillance systems. This paper discusses typical constraints, security goals, threat models and typical attacks on sensor networks and their defensive techniques or countermeasures relevant to the sensor networks, including security methods. The most critical area prone to attack is nearby the base station as the data is more aggregated, that should be kept secure using a number of defensive techniques as stated.

Research paper thumbnail of Integrating – VPN and IDS – An approach to Networks Security

The Internet and recent global cyber terrorism have fundamentally changed the way organizations a... more The Internet and recent global cyber terrorism have fundamentally changed the way organizations approach security. Recent worm and virus incidents such as Code Red, Nimda, and the Slammer worm have heightened security awareness. Also, numerous other threats have emerged recently that are particularly troublesome. Hence some solution must be provided to encounter the new generation of complex threats. Building up this solution requires the Integration of different security devices. Also system administrators, under the burden of rapidly increasing network activity, need the ability to rapidly understand what is happening on their networks. Hence Correlation of security events provide Security Engineers a better understanding of what is happening for enhanced security situational awareness. Visualization leverages human cognitive abilities and promotes quick mental connections between events that otherwise may be obscured in the volume of IDS alert messages. Keeping all these points i...

Research paper thumbnail of A Review on Machine Learning Applications in Medical Tourism

People who travel for medical reasons are referred to as medical tourists and seeking medical car... more People who travel for medical reasons are referred to as medical tourists and seeking medical care in a country other than their own. The key goal of medical tourism is to contribute low-cost special medical services for patients who need surgical and other types of specific treatment in cooperation with the tourism industry. Several international and domestic tourists prefer Maharashtra, Kerala, Karnataka, Goa and Gujarat for medical services and tourism. The nature, importance and difficulties in medical tourism in India are discussed in this paper. The popularity of medical tourism is growing world wide therefore needs computer science techniques to solve the problems risen in this field utilizing the massive amount of data produced by online platforms. Various machine learning algorithms and applications are discussed in this paper and also described the ML algorithms applied in medical tourism.

Research paper thumbnail of Attacks on Wireless Sensor Network: A Survey

Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common i... more Security is a crucial service in wireless sensor ne tworks that is becoming increasingly common in WSNs because wireless sensor nodes are typically deployed in an unattende d environment, leaving them open to possible hostile network attack. Because wireless sensor nodes are limited i n computing power, data storage and communication capabilities, any user authentication protocol must be designed to operate efficiently in a resource constrained en vironment. With a widespread growth in the potential applicati ons of WSN, the need for reliable security mechanisms for them has increased manifold. Security protocols in WSNs, unlike the traditional mechanisms, need special efforts and is sues to be addressed. The set of challenges in sensor networks are diverse, we focus on attacks on Wireless Sensor Net work in this paper.

Research paper thumbnail of An optimal energy-throughput efficient cross-layer solution using naked mole rat algorithm for wireless underground sensor networks

Materials Today: Proceedings

Research paper thumbnail of An Enhanced Naked Mole Rat Algorithm for Optimal Cross-Layer Solution for Wireless Underground Sensor Networks

Mathematics

Nature-inspired algorithms serve as the backbone of modern computing technology, and over the pas... more Nature-inspired algorithms serve as the backbone of modern computing technology, and over the past three decades, the field has grown enormously. Many applications were solved by such algorithms and are replacing the traditional classical optimization processes. A recent naked mole-rat algorithm (NMRA) was proposed based on the mating patterns of naked mole-rats. This algorithm proved its worth in terms of competitiveness and application to various domains of research. The aim was to propose an algorithm based on NMRA, named enhanced NMRA (ENMRA), by mitigating the problems that this algorithm suffers from: slow convergence, poor exploration, and local optima stagnation. To enhance the exploration capabilities of basic NMRA, grey wolf optimization (GWO)-based search equations were employed. Exploitation was improved using population division methods based on local neighborhood search (LNS) and differential evolution (DE) equations. To avoid the local stagnation problem, a neighborho...

Research paper thumbnail of Trust-adaptive Fuzzy-Statistical Protocol for Optimizing the Communication in Attacked Network

Research paper thumbnail of Enhanced media independent handover for vertical handover decision in MANET

International Journal of Intelligent Enterprise

Research paper thumbnail of Bisection Based Heuristic Technique to Resolve Sink Mobility in WSNs

International Journal of Computer Sciences and Engineering

Research paper thumbnail of A Comparative Evaluation of “m-ACO” Technique for Test Suite Prioritization

Indian Journal of Science and Technology, 2016

Research paper thumbnail of Experimental Analysis of m-ACO Technique for Regression Testing

Indian Journal of Science and Technology, 2016

Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for t... more Objectives: Experimental evaluation of "m-ACO" (Modified Ant Colony Optimization) technique for test case prioritization has been performed on two well known software testing problems namely "Triangle Classification Problem" and "Quadratic Equation Problem". Apart from these two problems, m-ACO has been experimentally evaluated using open source software JFreeChart. Methods: m-ACO finds the optimized solution to test suite prioritization by modifying the phenomenon used by natural ants to reach to its food source and select the food. This paper attempts to experimentally and comparatively evaluate the proposed m-ACO technique for test case prioritization against some contemporary meta-heuristic techniques using two well known software testing problems and open source problem. Performance evaluation has been measured using two metrics namely APFD (Average Percentage of Faults Detected) and PTR (Percentage of Test Suite Required for Complete Fault Coverage). Findings: The proposed technique m-ACO proves its efficiency on both the parameters. m-ACO achieves higher fault detection rate with minimized test suite as comparative to other meta-heuristic techniques for test case prioritization. Improvements: The proposed technique m-ACO basically works by modifying the food source searching and selection pattern of the real ants. Real ants grab every type food source it comes across; while modified ants evaluate the food fitness and uniqueness before selection. This phenomenon enhances the quality and diversity of deposited food source.

Research paper thumbnail of The New Approach to provide Trusted Platform in MANET

International Journal of Security, Privacy and Trust Management, 2012

In distributed operation, we uses different key management schemes, authentication and many trust... more In distributed operation, we uses different key management schemes, authentication and many trust models, but in wireless medium having reliability problem, hidden terminal problem etc. To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform. At last this paper give the comparisons of ACTP model with other existing trust model.

Research paper thumbnail of Feature and Future of Visual Cryptography Based Schemes

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2013

Research paper thumbnail of An Empirical Literature Study of Various Test Case Prioritization Techniques

Software Engineering and Technology, 2014

Research paper thumbnail of Memory Virtualization Technique for Efficient Access of Data Resources in Cloud Environment

International Journal of Computer Applications, Aug 20, 2014

Working in cloud environment and accessing its services is fascinating task. It is one of modern ... more Working in cloud environment and accessing its services is fascinating task. It is one of modern technological areas to work upon it for development of nation and increase economy rate. The paper deals with improving desktop cloud computing services with the help of technique called Memory Virtualization. Since virtualization is efficient to extent scalability of typical desktop-as-a-service and make it suitable for Wide Area Network (WAN's) environments. Desktop-as-a-Service (DaaS) in cloud computing means that user can access its own desktop services as well as services of other desktops located on remote servers.

Research paper thumbnail of Test case prioritization: An approach based on modified ant colony optimization (m-ACO)

2015 International Conference on Computer, Communication and Control (IC4), 2015

Research paper thumbnail of Mobility Analysis of Blackhole Node Attacks in Mobile Adhoc Networks

Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the... more Mobile ad hoc network is also called infrastructureless networking, since the mobile nodes in the network dynamically establish routing among themselves to form their own network on the fly. This characteristic makes more MANET more vulnerable to attacks especially routing based attacked. There is a need for investigating the performance of attacks with respect to mobility. In this paper, we have investigated blackhole node attack in mobile adhoc networks. Blackhole node attack is the attack in which all traffic is redirected to a specific node, which may not forward any traffic to all other nodes. Here the test-bed is created and developed the system using AODV as a base routing protocol on the network simulator. Various network performance parameters i.e. throughput, packet delivery ratio, collisions etc. are analyzed before and after attack. On implementation of blackhole node attack the performance of the network reduces, on increasing mobility the performance of MANETs decreases sharply i.e. PDR decreases sharply, Number of collisions increases and Energy consumption increases in significance amount.