Ratish Agarwal - Academia.edu (original) (raw)
Papers by Ratish Agarwal
Lecture notes in networks and systems, 2023
Apple Academic Press eBooks, Jul 18, 2023
Wireless Personal Communications
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
Research Square (Research Square), Dec 7, 2022
The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.
Lecture notes in electrical engineering, 2022
Design Engineering, Sep 17, 2021
Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless net... more Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless networks independently & interactively with no well before telecommunications infrastructure. Routing is indeed a big problem with MANET because of features such as transitory architecture as well as the lack of centralized authority. A novel multi-way routing technique is proposed in this work using a simulated annealing methodology. In such a competitive dynamic actual network setting, the recommended metaheuristic strategy can obtain bigger and more reciprocating benefits. As a result, the proposed routing technique is an excellent way for resolving the conflicting MANET routing challenge. The proposed methodology responds best to the fluctuation of different network circumstances, according to simulations. The overall energy level, available bandwidth, packet drop frequency, and traffic loading are all increased with the proposed methodology when compared and evaluated over the present systems.
Wireless Communications and Mobile Computing
Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed ... more Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed in ubiquity in current a long time. Spreading this kind of data undermines societal cohesiveness and well by cultivating political division and doubt in government. Since of the sheer volume of news being disseminated through social media, human confirmation has ended up incomprehensible, driving to the improvement and arrangement of robotized strategies for the recognizable proof of wrong news. Fake news publishers use a variety of stylistic techniques to boost the popularity of their works, one of which is to arouse the readers’ emotions. Due to this, text analytics’ sentiment analysis, which determines the polarity and intensity of feelings conveyed in a text, is now being utilized in false news detection methods, as either the system’s foundation or as a supplementary component. This assessment analyzes the full explanation of false news identification. The study also emphasizes char...
Design Engineering, Aug 7, 2021
Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer... more Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer Science, UIT Rgpv, Bhopal, India ________________________________________________________________________________________________________ Abstract Water marking plays a very important role in the field of network security and authentication of data. The need and requirement of online transaction of data is increasing day by day in internet so we need a authentication and security of our data and digital water marking is the solution of that problem .Digital water marking illustrate methods and technologies that hide the data in the form of text, images ,audio and video. In this paper we present various method for security and authentication of data for preventing unauthorized access and discussed about these technologies, application, types and its characteristics.
International Journal of Computer & Organization Trends, Apr 25, 2015
2nd International Conference on Data, Engineering and Applications (IDEA), 2020
The opinions of others is very important in our decision making. Twitter plays an important role ... more The opinions of others is very important in our decision making. Twitter plays an important role on sharing user's opinion on a variety of topics, wo mining these twitter data is a very difficult task because its unstructured nature. Location plays an important role in finding opinions towards any topic because the opinions of users may vary from location to location so its very important to find opinion based on location which give in-depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals with opinions or emotions of subjective elements in the textual documents. In this paper, we can take twitter data because on twitter a huge opinions are shared. In these, we can fetching a realtime data from Twitter by using flume and store these data into HDFS which is a storage component of Hadoop. Hadoop is an best open source solution for storing and processing a large amount of data. We can integrate Apache pig and hive with Hadoop and analyze the opinion on the basis of location because opinions are changes from location to location.
Security is the most important aspect of any infrastructure. Infrastructure may be of private org... more Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have been developed and proposed of researcher to ensure the security of critical infrastructure. This paper surveys the existing techniques for critical infrastructure protection. SCADA is defined as Supervisory Control and Data Acquisition. SCADA is considering as critical infrastructure. This paper also provides some important techniques for protection of SCADA.
Nowadays, with evolution of the new technology cloud computing play a vital role for the business... more Nowadays, with evolution of the new technology cloud computing play a vital role for the business organization. Cloud computing provides the ability to utilize scalable, distributed environment via internet on demand and pay as per use. Today’s cloud computing place centralized, universal trust in all the cloud nodes. However there may be negative impact on the nodes that are compromised and leads to various attacks. To address these issues, a number of research papers have been presented by authors. In this paper are given a review of these papers. More precisely are try to find out the limitation of existing technique and try to overcome them.
Wireless Communication, 2011
In a large ad hoc network, flat routing schemes produce an excessive amount of information that c... more In a large ad hoc network, flat routing schemes produce an excessive amount of information that can saturate the network. Cluster-based routing is a solution to limit the amount of routing information that propagates inside the network. Clustering is a technique to group the network nodes into a number of overlapping clusters. During the cluster formation phase, the ordinary nodes select best from dominating nodes as the clusterhead. Dominating nodes are potential nodes to become Clusterheads. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. The proposed work calculates trustworthiness of the nodes based on all previous transactions and takes it in to account while electing Clusterheads.
Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business, 2021
This chapter provides an overview of the e-commerce business model, the history of e-commerce, th... more This chapter provides an overview of the e-commerce business model, the history of e-commerce, the scope of e-commerce, the difference between e-commerce and traditional commerce, issues related to e-commerce, electronic data interchange, value chain, and supply chain, and the pros and cons and limitations of e-commerce.
Wireless Personal Communications, 2021
FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficien... more FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficient use of the capabilities of drones and UAVs (unmanned ariel vehicles) in several military and rescue applications. Drones have high mobility in 3D (3 dimensional) environment and low battery power, which produce various problems such as small journey time and infertile routing. The optimal routing for communication will assist to resolve these problems and provide the energy efficient and secure data transmission over FANET. Hence, in this paper, we proposed a whale optimization algorithm based optimized link state routing (WOA-OLSR) over FANET to provide optimal routing for energy efficient and secure FANET. The efficiency of OLSR is enhanced by using WOA and evaluated performance shows the better efficiency of WOA-OLSR in terms of some parameters such as a packet delivery ratio, end to end delay, energy utilization, throughput, and time complexity against the previous approaches OLSR, MP-OLSR, P-OLSR, ML-OLSR-FIFO and ML-OLSR-PMS.
International Journal of Computer Sciences and Engineering, 2019
Sentimental analysis determines the views of the user from the social media. It is used to classi... more Sentimental analysis determines the views of the user from the social media. It is used to classify the content of the text into neutral, negative and positive classes. Various researchers have used different methods to train and classify twitter dataset with different results. Particularly when time is taken as constraint in some applications like airline and sales, the algorithm plays a major role. In this paper an optimization based machine learning algorithm is proposed to classify the twitter data. The process was done in three stages. In the first stage data is collected and preprocessed, in the second stage the data is optimized by extracting necessary features and in the third stage the updated training set is classified into different classes by applying different machine learning algorithms. Each algorithm gives different results. It is observed that the proposed method i.e., sequential minimal optimization with decision tree gives good accuracy of 89.47% compared to other machine learning algorithms.
Advances in Information Security, Privacy, and Ethics
Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry a... more Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and conver...
Lecture notes in networks and systems, 2023
Apple Academic Press eBooks, Jul 18, 2023
Wireless Personal Communications
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
Research Square (Research Square), Dec 7, 2022
The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.
Lecture notes in electrical engineering, 2022
Design Engineering, Sep 17, 2021
Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless net... more Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless networks independently & interactively with no well before telecommunications infrastructure. Routing is indeed a big problem with MANET because of features such as transitory architecture as well as the lack of centralized authority. A novel multi-way routing technique is proposed in this work using a simulated annealing methodology. In such a competitive dynamic actual network setting, the recommended metaheuristic strategy can obtain bigger and more reciprocating benefits. As a result, the proposed routing technique is an excellent way for resolving the conflicting MANET routing challenge. The proposed methodology responds best to the fluctuation of different network circumstances, according to simulations. The overall energy level, available bandwidth, packet drop frequency, and traffic loading are all increased with the proposed methodology when compared and evaluated over the present systems.
Wireless Communications and Mobile Computing
Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed ... more Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed in ubiquity in current a long time. Spreading this kind of data undermines societal cohesiveness and well by cultivating political division and doubt in government. Since of the sheer volume of news being disseminated through social media, human confirmation has ended up incomprehensible, driving to the improvement and arrangement of robotized strategies for the recognizable proof of wrong news. Fake news publishers use a variety of stylistic techniques to boost the popularity of their works, one of which is to arouse the readers’ emotions. Due to this, text analytics’ sentiment analysis, which determines the polarity and intensity of feelings conveyed in a text, is now being utilized in false news detection methods, as either the system’s foundation or as a supplementary component. This assessment analyzes the full explanation of false news identification. The study also emphasizes char...
Design Engineering, Aug 7, 2021
Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer... more Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer Science, UIT Rgpv, Bhopal, India ________________________________________________________________________________________________________ Abstract Water marking plays a very important role in the field of network security and authentication of data. The need and requirement of online transaction of data is increasing day by day in internet so we need a authentication and security of our data and digital water marking is the solution of that problem .Digital water marking illustrate methods and technologies that hide the data in the form of text, images ,audio and video. In this paper we present various method for security and authentication of data for preventing unauthorized access and discussed about these technologies, application, types and its characteristics.
International Journal of Computer & Organization Trends, Apr 25, 2015
2nd International Conference on Data, Engineering and Applications (IDEA), 2020
The opinions of others is very important in our decision making. Twitter plays an important role ... more The opinions of others is very important in our decision making. Twitter plays an important role on sharing user's opinion on a variety of topics, wo mining these twitter data is a very difficult task because its unstructured nature. Location plays an important role in finding opinions towards any topic because the opinions of users may vary from location to location so its very important to find opinion based on location which give in-depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals with opinions or emotions of subjective elements in the textual documents. In this paper, we can take twitter data because on twitter a huge opinions are shared. In these, we can fetching a realtime data from Twitter by using flume and store these data into HDFS which is a storage component of Hadoop. Hadoop is an best open source solution for storing and processing a large amount of data. We can integrate Apache pig and hive with Hadoop and analyze the opinion on the basis of location because opinions are changes from location to location.
Security is the most important aspect of any infrastructure. Infrastructure may be of private org... more Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have been developed and proposed of researcher to ensure the security of critical infrastructure. This paper surveys the existing techniques for critical infrastructure protection. SCADA is defined as Supervisory Control and Data Acquisition. SCADA is considering as critical infrastructure. This paper also provides some important techniques for protection of SCADA.
Nowadays, with evolution of the new technology cloud computing play a vital role for the business... more Nowadays, with evolution of the new technology cloud computing play a vital role for the business organization. Cloud computing provides the ability to utilize scalable, distributed environment via internet on demand and pay as per use. Today’s cloud computing place centralized, universal trust in all the cloud nodes. However there may be negative impact on the nodes that are compromised and leads to various attacks. To address these issues, a number of research papers have been presented by authors. In this paper are given a review of these papers. More precisely are try to find out the limitation of existing technique and try to overcome them.
Wireless Communication, 2011
In a large ad hoc network, flat routing schemes produce an excessive amount of information that c... more In a large ad hoc network, flat routing schemes produce an excessive amount of information that can saturate the network. Cluster-based routing is a solution to limit the amount of routing information that propagates inside the network. Clustering is a technique to group the network nodes into a number of overlapping clusters. During the cluster formation phase, the ordinary nodes select best from dominating nodes as the clusterhead. Dominating nodes are potential nodes to become Clusterheads. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. The proposed work calculates trustworthiness of the nodes based on all previous transactions and takes it in to account while electing Clusterheads.
Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business, 2021
This chapter provides an overview of the e-commerce business model, the history of e-commerce, th... more This chapter provides an overview of the e-commerce business model, the history of e-commerce, the scope of e-commerce, the difference between e-commerce and traditional commerce, issues related to e-commerce, electronic data interchange, value chain, and supply chain, and the pros and cons and limitations of e-commerce.
Wireless Personal Communications, 2021
FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficien... more FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficient use of the capabilities of drones and UAVs (unmanned ariel vehicles) in several military and rescue applications. Drones have high mobility in 3D (3 dimensional) environment and low battery power, which produce various problems such as small journey time and infertile routing. The optimal routing for communication will assist to resolve these problems and provide the energy efficient and secure data transmission over FANET. Hence, in this paper, we proposed a whale optimization algorithm based optimized link state routing (WOA-OLSR) over FANET to provide optimal routing for energy efficient and secure FANET. The efficiency of OLSR is enhanced by using WOA and evaluated performance shows the better efficiency of WOA-OLSR in terms of some parameters such as a packet delivery ratio, end to end delay, energy utilization, throughput, and time complexity against the previous approaches OLSR, MP-OLSR, P-OLSR, ML-OLSR-FIFO and ML-OLSR-PMS.
International Journal of Computer Sciences and Engineering, 2019
Sentimental analysis determines the views of the user from the social media. It is used to classi... more Sentimental analysis determines the views of the user from the social media. It is used to classify the content of the text into neutral, negative and positive classes. Various researchers have used different methods to train and classify twitter dataset with different results. Particularly when time is taken as constraint in some applications like airline and sales, the algorithm plays a major role. In this paper an optimization based machine learning algorithm is proposed to classify the twitter data. The process was done in three stages. In the first stage data is collected and preprocessed, in the second stage the data is optimized by extracting necessary features and in the third stage the updated training set is classified into different classes by applying different machine learning algorithms. Each algorithm gives different results. It is observed that the proposed method i.e., sequential minimal optimization with decision tree gives good accuracy of 89.47% compared to other machine learning algorithms.
Advances in Information Security, Privacy, and Ethics
Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry a... more Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and conver...