Hiren Mer | Gujarat Technological University (original) (raw)

Papers by Hiren Mer

Research paper thumbnail of Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis

Abstract: The project includes implementation of gateway antivirus with open source methodologies... more Abstract: The project includes implementation of gateway antivirus with open source methodologies along with benchmark testing and performance improvement. The gateway antivirus solution implementation would include antivirus protection at HTTP, FTP, SMTP & POP3 protocols at the gateway level. Benchmark testing with various attack scenarios would be included along with performance analysis for the improvement of gateway level antivirus solutions in various deployment scenarios.

Research paper thumbnail of E-Health Diagnosis System using IoT and Machine Learning

International Journal of Computer Sciences and Engineering, 2019

Research paper thumbnail of Parallel and Context Based Search in Cloud using Multi Agent System

Network and Complex Systems, 2015

Cloud Computing is one of the fast growing Technology. Cloud computing support large scale infras... more Cloud Computing is one of the fast growing Technology. Cloud computing support large scale infrastructure used to increase high performance of computing. This technology support agents and with the help of integration of the agents that is Multi Agent System (MAS) which is capable of intelligent behavior. They run in an environment where they communicate with each other using message passing technique. Each agent has its own set of behavior and they run independent of each other. When a message arrives each agent shows their own behavior and hence an agent shows their coordination. The use of MAS in cloud computing help us for searching context with better performance. The JADE is a platform which supports agent. This paper discusses about Cloud computing models and architectures, information retrieving technique and the use of MAS that improve the performance of big data search from Distributed File System (DFS) which is difficult to achieve using single agent or thread.

Research paper thumbnail of Grayhole Attack Prevention Using a Cooperative Mechanism Based On Hybrid Defense Architecture in MANET

Journal of Engineering Computers & Applied Sciences, 2015

In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication ... more In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malicious nodes, this necessity may lead to serious security concerns; for example, such nodes may disturb the routing process. In this contexts, preventing or detecting malicious nodes launching gray hole or collaborative blackhole attacks is a challenge in mobile adhoc network. In this paper attempts to resolve this issue by designing a routing mechanism in which MD5 (Message Digest 5) technique is used. This method will help in achieving the stated goal. In proposed work we will try to achieve packet delivery ratio and routing overhead will be considered and choosen as performance metrics

Research paper thumbnail of Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview

Communications in Computer and Information Science, 2021

Following the inconsistencies encountered on the Indian terrain, the concept of autonomous vehicl... more Following the inconsistencies encountered on the Indian terrain, the concept of autonomous vehicles has practically vanished from the Indian market. One major cause for the failure of self-driven vehicles in India is the collision occurring due to some common factors including poor lane-markings, deficiency of sign-boards, and most importantly – violation of traffic-rules by human drivers. Apart from the lack of markings, the lack of traffic-sense in human drivers is a major threat to autonomous driving in India; as no machine is capable enough to respond to the fluctuating mindset of a human being. In order to combat this challenge, a novel approach is presented that relies on the inter-vehicular communication strategy for avoiding critical collisions on the Indian roads. A unique application of machine learning technology to collision avoidance is outlined within this work.

Research paper thumbnail of A Survey on Various Algorithms of Sequential Frequent Pattern Mining and Uncertain Data Mining

Data uncertainty can be seen in many real-world applications like environmental monitoring system... more Data uncertainty can be seen in many real-world applications like environmental monitoring system and mobile tracking. Due to this it is very important task to uncover hidden information by mining sequential patterns from inaccurate data such as sensor readings and GPS trajectories. In the real-world applications there is huge amount of uncertainty present, like in sensor networks, moving object tracking and also in itemset mining for uncertain databases. It is also used in mining sequential patterns from inaccurate data, such as sensor networks and GPS tracking system, is important for finding hidden information in such applications. We focus on literature survey of mining sequential pattern from uncertain databases. Keywords— Sequential Pattern mining, Uncertain Data, Algorithms.

Research paper thumbnail of An Effective Approach to Mine Frequent Sequential Pattern over Uncertain dataset

In recent years, due to the wide applications of uncertain data, mining frequent itemsets over un... more In recent years, due to the wide applications of uncertain data, mining frequent itemsets over uncertain databases has attracted much attention. In uncertain databases, the support of an itemset is a random variable instead of a fixed occurrence counting of this itemset. There are several application in which the data mining on uncertain data is useful like sensor network monitoring, moving object search etc. In this paper we are focusing on mining frequent sequential pattern using SeqU-PrefixSpan algorithm. Using this algorithm we can find the frequent sequential pattern from an uncertain database. We are proposing one incremental approach for this algorithm, which will also find the patterns and reduce the time of execution by dividing the data into parts. Data input will be in parts which are done randomly. Due to this the execution time will be less as compared to existing algorithm. Keywords— Sequential pattern mining, uncertain data

Research paper thumbnail of A Review: TCP Variants with MANET

International Journal of Computer Applications, Jan 17, 2017

TCP-Transmission Control Protocol is a connection oriented and reliable transport layer protocol ... more TCP-Transmission Control Protocol is a connection oriented and reliable transport layer protocol of TCP/IP protocol suite. TCP provided process-to-process, stream and full duplex communication. TCP also provides flow control, error correction and congestion control. Congestion is the traffic jam of the packets in the network. It occurs when the load in the network is higher than of its capacity to handle. This paper explains basic congestion control mechanisms used by TCP. This paper also discuss some of the possibilities of future research work in TCP congestion control. This all TCP variants have been proposed to improve TCP congestion control mechanisms. This paper explores some of the most widely used TCP variants conceptually.

Research paper thumbnail of A Survey Of Various Qos-Based Task Scheduling Algorithm In Cloud Computing Environment

Cloud computing is a new terminology which is achieved by Distributed, Parallel and Grid computin... more Cloud computing is a new terminology which is achieved by Distributed, Parallel and Grid computing. Cloud computing is a new design pattern for large, distributed data centers. Cloud computing offers end consumers an ―a pay as go‖ model – a powerful shift for computing towards a utility model like the electrical system, the telephone system, or more recently the Internet. Cloud computing provides different types of resources like hardware and software as services via internet. Task scheduling is the key role in cloud computing. Tasks require minimum completion time, better performance, utilization of resources and quick response time for which cloud uses the concepts of the virtualization. For task allocation cloud provides virtual machine which is scalable but scheduling them is a major problem. In this paper we study different types of task scheduling algorithms with QoS facility and issues related to them in cloud computing. These scheduling algorithms focus on resource managemen...

Research paper thumbnail of Gateway Antivirus Implementation using Open Source along with Performance Testing and Improvement Analysis

Abstract: The project includes implementation of gateway antivirus with open source methodologies... more Abstract: The project includes implementation of gateway antivirus with open source methodologies along with benchmark testing and performance improvement. The gateway antivirus solution implementation would include antivirus protection at HTTP, FTP, SMTP & POP3 protocols at the gateway level. Benchmark testing with various attack scenarios would be included along with performance analysis for the improvement of gateway level antivirus solutions in various deployment scenarios.

Research paper thumbnail of E-Health Diagnosis System using IoT and Machine Learning

International Journal of Computer Sciences and Engineering, 2019

Research paper thumbnail of Parallel and Context Based Search in Cloud using Multi Agent System

Network and Complex Systems, 2015

Cloud Computing is one of the fast growing Technology. Cloud computing support large scale infras... more Cloud Computing is one of the fast growing Technology. Cloud computing support large scale infrastructure used to increase high performance of computing. This technology support agents and with the help of integration of the agents that is Multi Agent System (MAS) which is capable of intelligent behavior. They run in an environment where they communicate with each other using message passing technique. Each agent has its own set of behavior and they run independent of each other. When a message arrives each agent shows their own behavior and hence an agent shows their coordination. The use of MAS in cloud computing help us for searching context with better performance. The JADE is a platform which supports agent. This paper discusses about Cloud computing models and architectures, information retrieving technique and the use of MAS that improve the performance of big data search from Distributed File System (DFS) which is difficult to achieve using single agent or thread.

Research paper thumbnail of Grayhole Attack Prevention Using a Cooperative Mechanism Based On Hybrid Defense Architecture in MANET

Journal of Engineering Computers & Applied Sciences, 2015

In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication ... more In mobile ad hoc networks (MANETs), a primary requirement for the establishment of communication among nodes is that nodes should cooperate with each other. In the presence of malicious nodes, this necessity may lead to serious security concerns; for example, such nodes may disturb the routing process. In this contexts, preventing or detecting malicious nodes launching gray hole or collaborative blackhole attacks is a challenge in mobile adhoc network. In this paper attempts to resolve this issue by designing a routing mechanism in which MD5 (Message Digest 5) technique is used. This method will help in achieving the stated goal. In proposed work we will try to achieve packet delivery ratio and routing overhead will be considered and choosen as performance metrics

Research paper thumbnail of Inter-Vehicular Communication for Intelligent Collision Avoidance Using Machine Learning: An Overview

Communications in Computer and Information Science, 2021

Following the inconsistencies encountered on the Indian terrain, the concept of autonomous vehicl... more Following the inconsistencies encountered on the Indian terrain, the concept of autonomous vehicles has practically vanished from the Indian market. One major cause for the failure of self-driven vehicles in India is the collision occurring due to some common factors including poor lane-markings, deficiency of sign-boards, and most importantly – violation of traffic-rules by human drivers. Apart from the lack of markings, the lack of traffic-sense in human drivers is a major threat to autonomous driving in India; as no machine is capable enough to respond to the fluctuating mindset of a human being. In order to combat this challenge, a novel approach is presented that relies on the inter-vehicular communication strategy for avoiding critical collisions on the Indian roads. A unique application of machine learning technology to collision avoidance is outlined within this work.

Research paper thumbnail of A Survey on Various Algorithms of Sequential Frequent Pattern Mining and Uncertain Data Mining

Data uncertainty can be seen in many real-world applications like environmental monitoring system... more Data uncertainty can be seen in many real-world applications like environmental monitoring system and mobile tracking. Due to this it is very important task to uncover hidden information by mining sequential patterns from inaccurate data such as sensor readings and GPS trajectories. In the real-world applications there is huge amount of uncertainty present, like in sensor networks, moving object tracking and also in itemset mining for uncertain databases. It is also used in mining sequential patterns from inaccurate data, such as sensor networks and GPS tracking system, is important for finding hidden information in such applications. We focus on literature survey of mining sequential pattern from uncertain databases. Keywords— Sequential Pattern mining, Uncertain Data, Algorithms.

Research paper thumbnail of An Effective Approach to Mine Frequent Sequential Pattern over Uncertain dataset

In recent years, due to the wide applications of uncertain data, mining frequent itemsets over un... more In recent years, due to the wide applications of uncertain data, mining frequent itemsets over uncertain databases has attracted much attention. In uncertain databases, the support of an itemset is a random variable instead of a fixed occurrence counting of this itemset. There are several application in which the data mining on uncertain data is useful like sensor network monitoring, moving object search etc. In this paper we are focusing on mining frequent sequential pattern using SeqU-PrefixSpan algorithm. Using this algorithm we can find the frequent sequential pattern from an uncertain database. We are proposing one incremental approach for this algorithm, which will also find the patterns and reduce the time of execution by dividing the data into parts. Data input will be in parts which are done randomly. Due to this the execution time will be less as compared to existing algorithm. Keywords— Sequential pattern mining, uncertain data

Research paper thumbnail of A Review: TCP Variants with MANET

International Journal of Computer Applications, Jan 17, 2017

TCP-Transmission Control Protocol is a connection oriented and reliable transport layer protocol ... more TCP-Transmission Control Protocol is a connection oriented and reliable transport layer protocol of TCP/IP protocol suite. TCP provided process-to-process, stream and full duplex communication. TCP also provides flow control, error correction and congestion control. Congestion is the traffic jam of the packets in the network. It occurs when the load in the network is higher than of its capacity to handle. This paper explains basic congestion control mechanisms used by TCP. This paper also discuss some of the possibilities of future research work in TCP congestion control. This all TCP variants have been proposed to improve TCP congestion control mechanisms. This paper explores some of the most widely used TCP variants conceptually.

Research paper thumbnail of A Survey Of Various Qos-Based Task Scheduling Algorithm In Cloud Computing Environment

Cloud computing is a new terminology which is achieved by Distributed, Parallel and Grid computin... more Cloud computing is a new terminology which is achieved by Distributed, Parallel and Grid computing. Cloud computing is a new design pattern for large, distributed data centers. Cloud computing offers end consumers an ―a pay as go‖ model – a powerful shift for computing towards a utility model like the electrical system, the telephone system, or more recently the Internet. Cloud computing provides different types of resources like hardware and software as services via internet. Task scheduling is the key role in cloud computing. Tasks require minimum completion time, better performance, utilization of resources and quick response time for which cloud uses the concepts of the virtualization. For task allocation cloud provides virtual machine which is scalable but scheduling them is a major problem. In this paper we study different types of task scheduling algorithms with QoS facility and issues related to them in cloud computing. These scheduling algorithms focus on resource managemen...