Mohd Atif Kaleem | Aligarh Muslim University (original) (raw)

Uploads

Papers by Mohd Atif Kaleem

Research paper thumbnail of Real Time Job Scheduling in Distributed System Using Artificial Intelligence Technique

4th International Conference on “Computing for Sustainable Global Development, 2017

Due to the festinated flourish of distributed system and the rapid growth of job generation, the ... more Due to the festinated flourish of distributed system and the rapid growth of job generation, the complexity of resource utilization is proportionally increases day by day, the response time of entire make span ,execution time of entire make span is also increases, number of factor that affect the entire distributed system. So in this situation a good job scheduler is required, this scheduler monitor the job generation rates and also assigned the generated job properly to the computing nodes, most important task of good scheduler are to minimized the make span and minimized the waiting time, minimized the execution time. after this practice a several complex problem is justified like routing of jobs from one computing nodes to another computing node, recourse allocation , job migration, job loss ,etc .after the justification of such types of problems resource utilization is automatically increase, and throughput and response time in that proportion is improve several types of job scheduler is also exit and all the existent scheduler have different mechanism for job scheduling , performance and working principle of existing job scheduler are different to each others, in this paper we are going to proposed heuristic based real time job scheduler, at the end of this article performance of the existing scheduler and proposed scheduler are compared.

Research paper thumbnail of Strengthening of Homomorphic Encryption Scheme for Cloud Environment Using Particle Optimization Algorithm

2021 Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT), 2021

The cloud computing is amongst the most trending fields with several lines of research possibilit... more The cloud computing is amongst the most trending fields with several lines of research possibilities, driven by cost-benefits offered by cloud adoption to businesses around the globe. Cloud adoption is more pressing than ever before, especially in the current context of global health emergency caused by pandemic outbreaks of Covid-19, where in “WFH - Work from Home” is the new normal and businesses require “Any-Time, Any-Where” access to IT. However, one of the major barriers to cloud adoption viz “Security of Data” continues to be a cause of concern. In this study, authors have attempted to address this concern by studying encryption techniques available in the literature and generally adopted by the Cloud Service Providers, identifying attributes and aspects that may be enhanced further, for strengthening of solution in used for security of Data in Motion. Through this study, authors have proposed a methodology for addressing key allocation and key management issues by way of optimization and opened a new dimension of research possibilities in future.

Research paper thumbnail of Mobile Ad-Hoc Networks: AODV Routing Protocol Perspective

In current years, an enormous research has been observed going on in the research field of Mobile... more In current years, an enormous research has been observed going on in the research field of Mobile Ad-Hoc Network (MANET). Despite of restricted assets in Mobile Ad Hoc Networks, to structure a proficient and consistent routing protocol is still a tough task. A more intelligent routing approach is required to proficiently use the restricted assets. Moreover the routing algorithms designed for conventional wired networks such as distance vector or link-state, does not level well in without wired situation. Routing approach in Mobile Ad Hoc Networks is a difficult work and has received a great amount of attention from area researchers and quality controller now a day. In this research paper tries to provide a general idea of the existing Mobile Ad Hoc Networks routing protocols their functionality and characteristics. Further, the protocols comparison is given depend upon the MANET routing information and methodologies on the basis of their routing decisions. This research will help the researchers and industry personnel to obtain an overview of the existing routing protocols and propose which one routing protocols could perform improved results with respect to unstable network situation.

Research paper thumbnail of Load Balancing In Distributed Network by Simulated Annealing Method

Grid computing is a type of distributed computing that involves synchronizing and sharing computi... more Grid computing is a type of distributed computing that involves synchronizing and sharing computing, application, knowledge storage or network resources across dynamic and geologically extended organizations. The goal of grid task programming is to realize high system throughput and to match the applying desire with the available computing resources. This is often matching of resources in very non-deterministically shared heterogeneous environment. The complexness of programming downside will amplify with the dimensions of the grid and becomes extremely troublesome to resolve effectively. To get smart ways to resolve this downside a brand new space of analysis is enforced. This paper is predicated on developed heuristic techniques that are based on simulated annealing or close to best possible solution for grids. During this paper, we have a tendency to introduce a task programming algorithmic rule for grid computing. The algorithmic rule is predicated on simulated tempering methodology. The paper shows the way to seek for the most effective tasks programming for grid computing. During the previous few decades, load balancing in distributed computer system has been a rising analysis space. To seek out associate optimum programming incorporating load balancing for a particular application capital punishment in a very dynamic, unpredictable atmosphere may be a difficult problem. It's as a result of the advanced nature of the tasks that changes during execution, and unpredictability of the procedure environment. This paper addresses the on top of above mentioned problems by presenting a simulated tempering (SA) approach an associate optimizer. The projected algorithmic program is evaluated in terms of create setting up and resource utilization.

Research paper thumbnail of Neuro-Fuzzy Technique for Software Effort Estimation

One of the most important tasks of a software development life cycle is to estimate software time... more One of the most important tasks of a software development life cycle is to estimate software time and effort. Accuracy in effort estimation is still a great challenge in the software industry. Conventional models like the Constructive Cost Model (COCOMO) are quite helpful but they are unable to manage the unsure nature of the software projects particularly within the early part of the development criterion. There has been considerable work exhausted in this area using neural networks and conjointly some work done using fuzzy logic. These models offer additional exactitude however they " re heavily obsessed on the scale of the training set. The aim of this paper is to develop and evaluate a neuro-fuzzy model to estimate software development effort. Our proposed work is compared with neural network approach and fuzzy logic approach based on the value of MMRE (Mean of Magnitude of Relative Error) .The projected Neuro-fuzzy model was found to have lower MMRE value.

Research paper thumbnail of Commonly Used Simulation Tools for Cloud Computing Research

Cloud computing delivers computing resources as services rather than products over a network. As ... more Cloud computing delivers computing resources as services rather than products over a network. As an emerging trend, it is quite necessary to evaluate working performances and security issues that cloud computing deals with. This paper is a review of existing results on modeling and simulation technology which are powerful tools to deal with security issues [32]. Reiteriating the basic concepts and security issues that cloud computing confronts and thereby, reviewing the currently available modeling and simulation technology. Furthermore, elucidating the two types of existing cloud computing simulators, i.e, Simulators based on software and next, simulators based on both software and hardware. Recapitulating with the comparision of existing cloud computing simulators.

Books by Mohd Atif Kaleem

Research paper thumbnail of Current Trends in Cloud Computing Systems

An Open-Access eBook by HCTL Open, Jun 22, 2016

Cloud computing that is an ever more important trend, is a virtual technology that uses the onlin... more Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes into the market environment to fulfil the elastic demand. In today's competitive conditions, the service strength, elasticity, options and flexibility created available from this scalable technology are quite tempting that makes the cloud computing to progressively becoming a underlying element of the organization computing environment. This chapter presents a review associated with ongoing state of Cloud Computing. It provides a conversation of this evolution means of cloud computing, attributes of Cloud, current technologies acquired in cloud computing. This chapter also provides a comparative study of cloud computing systems and their challenges.

Research paper thumbnail of Real Time Job Scheduling in Distributed System Using Artificial Intelligence Technique

4th International Conference on “Computing for Sustainable Global Development, 2017

Due to the festinated flourish of distributed system and the rapid growth of job generation, the ... more Due to the festinated flourish of distributed system and the rapid growth of job generation, the complexity of resource utilization is proportionally increases day by day, the response time of entire make span ,execution time of entire make span is also increases, number of factor that affect the entire distributed system. So in this situation a good job scheduler is required, this scheduler monitor the job generation rates and also assigned the generated job properly to the computing nodes, most important task of good scheduler are to minimized the make span and minimized the waiting time, minimized the execution time. after this practice a several complex problem is justified like routing of jobs from one computing nodes to another computing node, recourse allocation , job migration, job loss ,etc .after the justification of such types of problems resource utilization is automatically increase, and throughput and response time in that proportion is improve several types of job scheduler is also exit and all the existent scheduler have different mechanism for job scheduling , performance and working principle of existing job scheduler are different to each others, in this paper we are going to proposed heuristic based real time job scheduler, at the end of this article performance of the existing scheduler and proposed scheduler are compared.

Research paper thumbnail of Strengthening of Homomorphic Encryption Scheme for Cloud Environment Using Particle Optimization Algorithm

2021 Fourth International Conference on Computational Intelligence and Communication Technologies (CCICT), 2021

The cloud computing is amongst the most trending fields with several lines of research possibilit... more The cloud computing is amongst the most trending fields with several lines of research possibilities, driven by cost-benefits offered by cloud adoption to businesses around the globe. Cloud adoption is more pressing than ever before, especially in the current context of global health emergency caused by pandemic outbreaks of Covid-19, where in “WFH - Work from Home” is the new normal and businesses require “Any-Time, Any-Where” access to IT. However, one of the major barriers to cloud adoption viz “Security of Data” continues to be a cause of concern. In this study, authors have attempted to address this concern by studying encryption techniques available in the literature and generally adopted by the Cloud Service Providers, identifying attributes and aspects that may be enhanced further, for strengthening of solution in used for security of Data in Motion. Through this study, authors have proposed a methodology for addressing key allocation and key management issues by way of optimization and opened a new dimension of research possibilities in future.

Research paper thumbnail of Mobile Ad-Hoc Networks: AODV Routing Protocol Perspective

In current years, an enormous research has been observed going on in the research field of Mobile... more In current years, an enormous research has been observed going on in the research field of Mobile Ad-Hoc Network (MANET). Despite of restricted assets in Mobile Ad Hoc Networks, to structure a proficient and consistent routing protocol is still a tough task. A more intelligent routing approach is required to proficiently use the restricted assets. Moreover the routing algorithms designed for conventional wired networks such as distance vector or link-state, does not level well in without wired situation. Routing approach in Mobile Ad Hoc Networks is a difficult work and has received a great amount of attention from area researchers and quality controller now a day. In this research paper tries to provide a general idea of the existing Mobile Ad Hoc Networks routing protocols their functionality and characteristics. Further, the protocols comparison is given depend upon the MANET routing information and methodologies on the basis of their routing decisions. This research will help the researchers and industry personnel to obtain an overview of the existing routing protocols and propose which one routing protocols could perform improved results with respect to unstable network situation.

Research paper thumbnail of Load Balancing In Distributed Network by Simulated Annealing Method

Grid computing is a type of distributed computing that involves synchronizing and sharing computi... more Grid computing is a type of distributed computing that involves synchronizing and sharing computing, application, knowledge storage or network resources across dynamic and geologically extended organizations. The goal of grid task programming is to realize high system throughput and to match the applying desire with the available computing resources. This is often matching of resources in very non-deterministically shared heterogeneous environment. The complexness of programming downside will amplify with the dimensions of the grid and becomes extremely troublesome to resolve effectively. To get smart ways to resolve this downside a brand new space of analysis is enforced. This paper is predicated on developed heuristic techniques that are based on simulated annealing or close to best possible solution for grids. During this paper, we have a tendency to introduce a task programming algorithmic rule for grid computing. The algorithmic rule is predicated on simulated tempering methodology. The paper shows the way to seek for the most effective tasks programming for grid computing. During the previous few decades, load balancing in distributed computer system has been a rising analysis space. To seek out associate optimum programming incorporating load balancing for a particular application capital punishment in a very dynamic, unpredictable atmosphere may be a difficult problem. It's as a result of the advanced nature of the tasks that changes during execution, and unpredictability of the procedure environment. This paper addresses the on top of above mentioned problems by presenting a simulated tempering (SA) approach an associate optimizer. The projected algorithmic program is evaluated in terms of create setting up and resource utilization.

Research paper thumbnail of Neuro-Fuzzy Technique for Software Effort Estimation

One of the most important tasks of a software development life cycle is to estimate software time... more One of the most important tasks of a software development life cycle is to estimate software time and effort. Accuracy in effort estimation is still a great challenge in the software industry. Conventional models like the Constructive Cost Model (COCOMO) are quite helpful but they are unable to manage the unsure nature of the software projects particularly within the early part of the development criterion. There has been considerable work exhausted in this area using neural networks and conjointly some work done using fuzzy logic. These models offer additional exactitude however they " re heavily obsessed on the scale of the training set. The aim of this paper is to develop and evaluate a neuro-fuzzy model to estimate software development effort. Our proposed work is compared with neural network approach and fuzzy logic approach based on the value of MMRE (Mean of Magnitude of Relative Error) .The projected Neuro-fuzzy model was found to have lower MMRE value.

Research paper thumbnail of Commonly Used Simulation Tools for Cloud Computing Research

Cloud computing delivers computing resources as services rather than products over a network. As ... more Cloud computing delivers computing resources as services rather than products over a network. As an emerging trend, it is quite necessary to evaluate working performances and security issues that cloud computing deals with. This paper is a review of existing results on modeling and simulation technology which are powerful tools to deal with security issues [32]. Reiteriating the basic concepts and security issues that cloud computing confronts and thereby, reviewing the currently available modeling and simulation technology. Furthermore, elucidating the two types of existing cloud computing simulators, i.e, Simulators based on software and next, simulators based on both software and hardware. Recapitulating with the comparision of existing cloud computing simulators.

Research paper thumbnail of Current Trends in Cloud Computing Systems

An Open-Access eBook by HCTL Open, Jun 22, 2016

Cloud computing that is an ever more important trend, is a virtual technology that uses the onlin... more Cloud computing that is an ever more important trend, is a virtual technology that uses the online world and central remote servers to own sharing of resources that include infrastructures, software, applications and business processes into the market environment to fulfil the elastic demand. In today's competitive conditions, the service strength, elasticity, options and flexibility created available from this scalable technology are quite tempting that makes the cloud computing to progressively becoming a underlying element of the organization computing environment. This chapter presents a review associated with ongoing state of Cloud Computing. It provides a conversation of this evolution means of cloud computing, attributes of Cloud, current technologies acquired in cloud computing. This chapter also provides a comparative study of cloud computing systems and their challenges.