Ratish Agarwal - Academia.edu (original) (raw)

Papers by Ratish Agarwal

Research paper thumbnail of Comparative Study on Black Hole Attack in Mobile Ad-Hoc Networks

Lecture notes in networks and systems, 2023

Research paper thumbnail of A Review of Smart Intelligent IoT Network: Technologies and Real-Time Applications

Apple Academic Press eBooks, Jul 18, 2023

Research paper thumbnail of An Extensive Review on QoS Enhancement in MANET Using Meta-Heuristic Algorithms

Wireless Personal Communications

Research paper thumbnail of Enhancing the Privacy Protection in Locations-based Services through Hybrid LSTM

2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)

Research paper thumbnail of IHBO_CA - an Improved Honey Badger Optimization based Communication Approach for Energy Efficient Deployment of Secure Flying Ad-hoc Network (FANET)

Research Square (Research Square), Dec 7, 2022

The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.

Research paper thumbnail of A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Effective network load balancing using the Metaheuristic approach with a multi-channel routing strategy in MANET

Design Engineering, Sep 17, 2021

Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless net... more Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless networks independently & interactively with no well before telecommunications infrastructure. Routing is indeed a big problem with MANET because of features such as transitory architecture as well as the lack of centralized authority. A novel multi-way routing technique is proposed in this work using a simulated annealing methodology. In such a competitive dynamic actual network setting, the recommended metaheuristic strategy can obtain bigger and more reciprocating benefits. As a result, the proposed routing technique is an excellent way for resolving the conflicting MANET routing challenge. The proposed methodology responds best to the fluctuation of different network circumstances, according to simulations. The overall energy level, available bandwidth, packet drop frequency, and traffic loading are all increased with the proposed methodology when compared and evaluated over the present systems.

Research paper thumbnail of Analyzing Machine Learning Enabled Fake News Detection Techniques for Diversified Datasets

Wireless Communications and Mobile Computing

Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed ... more Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed in ubiquity in current a long time. Spreading this kind of data undermines societal cohesiveness and well by cultivating political division and doubt in government. Since of the sheer volume of news being disseminated through social media, human confirmation has ended up incomprehensible, driving to the improvement and arrangement of robotized strategies for the recognizable proof of wrong news. Fake news publishers use a variety of stylistic techniques to boost the popularity of their works, one of which is to arouse the readers’ emotions. Due to this, text analytics’ sentiment analysis, which determines the polarity and intensity of feelings conveyed in a text, is now being utilized in false news detection methods, as either the system’s foundation or as a supplementary component. This assessment analyzes the full explanation of false news identification. The study also emphasizes char...

Research paper thumbnail of A BSA based Communication Strategy for Energy Efficient Flying Ad-hoc Network (FANET)

Design Engineering, Aug 7, 2021

Research paper thumbnail of A Review Paper on Digital Watermarking Techniques for security Application

Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer... more Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer Science, UIT Rgpv, Bhopal, India ________________________________________________________________________________________________________ Abstract Water marking plays a very important role in the field of network security and authentication of data. The need and requirement of online transaction of data is increasing day by day in internet so we need a authentication and security of our data and digital water marking is the solution of that problem .Digital water marking illustrate methods and technologies that hide the data in the form of text, images ,audio and video. In this paper we present various method for security and authentication of data for preventing unauthorized access and discussed about these technologies, application, types and its characteristics.

Research paper thumbnail of Enhancing Information Security Risk Management for Organizations

International Journal of Computer & Organization Trends, Apr 25, 2015

Research paper thumbnail of Location Wise Opinion Mining of Real Time Twitter Data Using Hadoop to reduce Cyber Crimes

2nd International Conference on Data, Engineering and Applications (IDEA), 2020

The opinions of others is very important in our decision making. Twitter plays an important role ... more The opinions of others is very important in our decision making. Twitter plays an important role on sharing user's opinion on a variety of topics, wo mining these twitter data is a very difficult task because its unstructured nature. Location plays an important role in finding opinions towards any topic because the opinions of users may vary from location to location so its very important to find opinion based on location which give in-depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals with opinions or emotions of subjective elements in the textual documents. In this paper, we can take twitter data because on twitter a huge opinions are shared. In these, we can fetching a realtime data from Twitter by using flume and store these data into HDFS which is a storage component of Hadoop. Hadoop is an best open source solution for storing and processing a large amount of data. We can integrate Apache pig and hive with Hadoop and analyze the opinion on the basis of location because opinions are changes from location to location.

Research paper thumbnail of A Review of Cyber Security Techniques for Critical Infrastructure Protection

Security is the most important aspect of any infrastructure. Infrastructure may be of private org... more Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have been developed and proposed of researcher to ensure the security of critical infrastructure. This paper surveys the existing techniques for critical infrastructure protection. SCADA is defined as Supervisory Control and Data Acquisition. SCADA is considering as critical infrastructure. This paper also provides some important techniques for protection of SCADA.

Research paper thumbnail of New Security Paradigm in Cloud Computing

Nowadays, with evolution of the new technology cloud computing play a vital role for the business... more Nowadays, with evolution of the new technology cloud computing play a vital role for the business organization. Cloud computing provides the ability to utilize scalable, distributed environment via internet on demand and pay as per use. Today’s cloud computing place centralized, universal trust in all the cloud nodes. However there may be negative impact on the nodes that are compromised and leads to various attacks. To address these issues, a number of research papers have been presented by authors. In this paper are given a review of these papers. More precisely are try to find out the limitation of existing technique and try to overcome them.

Research paper thumbnail of Reliable Dominating Nodes as Clusterheads for Mobile Ad Hoc Networks

Wireless Communication, 2011

In a large ad hoc network, flat routing schemes produce an excessive amount of information that c... more In a large ad hoc network, flat routing schemes produce an excessive amount of information that can saturate the network. Cluster-based routing is a solution to limit the amount of routing information that propagates inside the network. Clustering is a technique to group the network nodes into a number of overlapping clusters. During the cluster formation phase, the ordinary nodes select best from dominating nodes as the clusterhead. Dominating nodes are potential nodes to become Clusterheads. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. The proposed work calculates trustworthiness of the nodes based on all previous transactions and takes it in to account while electing Clusterheads.

Research paper thumbnail of E-Commerce Business Model

Research paper thumbnail of E-Commerce Business Model

Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business, 2021

This chapter provides an overview of the e-commerce business model, the history of e-commerce, th... more This chapter provides an overview of the e-commerce business model, the history of e-commerce, the scope of e-commerce, the difference between e-commerce and traditional commerce, issues related to e-commerce, electronic data interchange, value chain, and supply chain, and the pros and cons and limitations of e-commerce.

Research paper thumbnail of An Optimized Communication Scheme for Energy Efficient and Secure Flying Ad-hoc Network (FANET)

Wireless Personal Communications, 2021

FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficien... more FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficient use of the capabilities of drones and UAVs (unmanned ariel vehicles) in several military and rescue applications. Drones have high mobility in 3D (3 dimensional) environment and low battery power, which produce various problems such as small journey time and infertile routing. The optimal routing for communication will assist to resolve these problems and provide the energy efficient and secure data transmission over FANET. Hence, in this paper, we proposed a whale optimization algorithm based optimized link state routing (WOA-OLSR) over FANET to provide optimal routing for energy efficient and secure FANET. The efficiency of OLSR is enhanced by using WOA and evaluated performance shows the better efficiency of WOA-OLSR in terms of some parameters such as a packet delivery ratio, end to end delay, energy utilization, throughput, and time complexity against the previous approaches OLSR, MP-OLSR, P-OLSR, ML-OLSR-FIFO and ML-OLSR-PMS.

Research paper thumbnail of An Efficient Approach for Sentiment Analysis Using Regression Analysis Technique

International Journal of Computer Sciences and Engineering, 2019

Sentimental analysis determines the views of the user from the social media. It is used to classi... more Sentimental analysis determines the views of the user from the social media. It is used to classify the content of the text into neutral, negative and positive classes. Various researchers have used different methods to train and classify twitter dataset with different results. Particularly when time is taken as constraint in some applications like airline and sales, the algorithm plays a major role. In this paper an optimization based machine learning algorithm is proposed to classify the twitter data. The process was done in three stages. In the first stage data is collected and preprocessed, in the second stage the data is optimized by extracting necessary features and in the third stage the updated training set is classified into different classes by applying different machine learning algorithms. Each algorithm gives different results. It is observed that the proposed method i.e., sequential minimal optimization with decision tree gives good accuracy of 89.47% compared to other machine learning algorithms.

Research paper thumbnail of Cloud Security Using 2-Factor Image Authentication Technique

Advances in Information Security, Privacy, and Ethics

Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry a... more Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and conver...

Research paper thumbnail of Comparative Study on Black Hole Attack in Mobile Ad-Hoc Networks

Lecture notes in networks and systems, 2023

Research paper thumbnail of A Review of Smart Intelligent IoT Network: Technologies and Real-Time Applications

Apple Academic Press eBooks, Jul 18, 2023

Research paper thumbnail of An Extensive Review on QoS Enhancement in MANET Using Meta-Heuristic Algorithms

Wireless Personal Communications

Research paper thumbnail of Enhancing the Privacy Protection in Locations-based Services through Hybrid LSTM

2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)

Research paper thumbnail of IHBO_CA - an Improved Honey Badger Optimization based Communication Approach for Energy Efficient Deployment of Secure Flying Ad-hoc Network (FANET)

Research Square (Research Square), Dec 7, 2022

The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc... more The speci c features of UAV like energy e ciency, dynamic structure and mobility in Flying Ad-hoc Network (FANET) is good utilized for the selection of UAV in a vast variety of applications like disaster management, rescue management, medical, and military. So, the effectiveness of FANET is reduced by enhancing the packet transmission expenses due uncreative and indecisive communication among UAVs in multidimensional environment. The optimal path selection will support to pro cient message transmission and offer energy competent and protected communication above FANET. Thus, an Improved Honey Badger Optimization based Communication Approach (IHBO_CA) is implemented for optimal path selection among UAVs above FANET. The sinusoidal chaotic map is combined with honey badger algorithm to improve the performance of optimized communication. The IHBO_CA is implemented using MATLAB 2021a platform and outcomes demonstrate the greater effectiveness of IHBO_CA against OLSR, MP-OLSR, ACO, PSO and HBA depending on energy expenditure, overhead, time complexity, packet delivery ratio and delay.

Research paper thumbnail of A Method for Improving Efficiency and Security of FANET Using Chaotic Black Hole Optimization-Based Routing (BHOR) Technique

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Effective network load balancing using the Metaheuristic approach with a multi-channel routing strategy in MANET

Design Engineering, Sep 17, 2021

Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless net... more Mobile Adhoc Network (MANET) is a concept with wireless links that may self-organize wireless networks independently & interactively with no well before telecommunications infrastructure. Routing is indeed a big problem with MANET because of features such as transitory architecture as well as the lack of centralized authority. A novel multi-way routing technique is proposed in this work using a simulated annealing methodology. In such a competitive dynamic actual network setting, the recommended metaheuristic strategy can obtain bigger and more reciprocating benefits. As a result, the proposed routing technique is an excellent way for resolving the conflicting MANET routing challenge. The proposed methodology responds best to the fluctuation of different network circumstances, according to simulations. The overall energy level, available bandwidth, packet drop frequency, and traffic loading are all increased with the proposed methodology when compared and evaluated over the present systems.

Research paper thumbnail of Analyzing Machine Learning Enabled Fake News Detection Techniques for Diversified Datasets

Wireless Communications and Mobile Computing

Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed ... more Fake news, or fabric which appeared to be untrue with point of deceiving the open, has developed in ubiquity in current a long time. Spreading this kind of data undermines societal cohesiveness and well by cultivating political division and doubt in government. Since of the sheer volume of news being disseminated through social media, human confirmation has ended up incomprehensible, driving to the improvement and arrangement of robotized strategies for the recognizable proof of wrong news. Fake news publishers use a variety of stylistic techniques to boost the popularity of their works, one of which is to arouse the readers’ emotions. Due to this, text analytics’ sentiment analysis, which determines the polarity and intensity of feelings conveyed in a text, is now being utilized in false news detection methods, as either the system’s foundation or as a supplementary component. This assessment analyzes the full explanation of false news identification. The study also emphasizes char...

Research paper thumbnail of A BSA based Communication Strategy for Energy Efficient Flying Ad-hoc Network (FANET)

Design Engineering, Aug 7, 2021

Research paper thumbnail of A Review Paper on Digital Watermarking Techniques for security Application

Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer... more Manish Rai, Sachin Goyal, Ratish Agarwal Phd scholar, Asst Prof, Asst Prof Department of Computer Science, UIT Rgpv, Bhopal, India ________________________________________________________________________________________________________ Abstract Water marking plays a very important role in the field of network security and authentication of data. The need and requirement of online transaction of data is increasing day by day in internet so we need a authentication and security of our data and digital water marking is the solution of that problem .Digital water marking illustrate methods and technologies that hide the data in the form of text, images ,audio and video. In this paper we present various method for security and authentication of data for preventing unauthorized access and discussed about these technologies, application, types and its characteristics.

Research paper thumbnail of Enhancing Information Security Risk Management for Organizations

International Journal of Computer & Organization Trends, Apr 25, 2015

Research paper thumbnail of Location Wise Opinion Mining of Real Time Twitter Data Using Hadoop to reduce Cyber Crimes

2nd International Conference on Data, Engineering and Applications (IDEA), 2020

The opinions of others is very important in our decision making. Twitter plays an important role ... more The opinions of others is very important in our decision making. Twitter plays an important role on sharing user's opinion on a variety of topics, wo mining these twitter data is a very difficult task because its unstructured nature. Location plays an important role in finding opinions towards any topic because the opinions of users may vary from location to location so its very important to find opinion based on location which give in-depth knowledge where the topic is highly accepted or rejected. Opinion Mining deals with opinions or emotions of subjective elements in the textual documents. In this paper, we can take twitter data because on twitter a huge opinions are shared. In these, we can fetching a realtime data from Twitter by using flume and store these data into HDFS which is a storage component of Hadoop. Hadoop is an best open source solution for storing and processing a large amount of data. We can integrate Apache pig and hive with Hadoop and analyze the opinion on the basis of location because opinions are changes from location to location.

Research paper thumbnail of A Review of Cyber Security Techniques for Critical Infrastructure Protection

Security is the most important aspect of any infrastructure. Infrastructure may be of private org... more Security is the most important aspect of any infrastructure. Infrastructure may be of private organization or government organization and the economy of the nation depends on this infrastructure. A no. of approaches have been developed and proposed of researcher to ensure the security of critical infrastructure. This paper surveys the existing techniques for critical infrastructure protection. SCADA is defined as Supervisory Control and Data Acquisition. SCADA is considering as critical infrastructure. This paper also provides some important techniques for protection of SCADA.

Research paper thumbnail of New Security Paradigm in Cloud Computing

Nowadays, with evolution of the new technology cloud computing play a vital role for the business... more Nowadays, with evolution of the new technology cloud computing play a vital role for the business organization. Cloud computing provides the ability to utilize scalable, distributed environment via internet on demand and pay as per use. Today’s cloud computing place centralized, universal trust in all the cloud nodes. However there may be negative impact on the nodes that are compromised and leads to various attacks. To address these issues, a number of research papers have been presented by authors. In this paper are given a review of these papers. More precisely are try to find out the limitation of existing technique and try to overcome them.

Research paper thumbnail of Reliable Dominating Nodes as Clusterheads for Mobile Ad Hoc Networks

Wireless Communication, 2011

In a large ad hoc network, flat routing schemes produce an excessive amount of information that c... more In a large ad hoc network, flat routing schemes produce an excessive amount of information that can saturate the network. Cluster-based routing is a solution to limit the amount of routing information that propagates inside the network. Clustering is a technique to group the network nodes into a number of overlapping clusters. During the cluster formation phase, the ordinary nodes select best from dominating nodes as the clusterhead. Dominating nodes are potential nodes to become Clusterheads. The mobile nodes are vulnerable to security attacks, so ensuring the security of the network is essential. To enhance security, it is important to evaluate the trustworthiness of nodes without depending on central authorities. The proposed work calculates trustworthiness of the nodes based on all previous transactions and takes it in to account while electing Clusterheads.

Research paper thumbnail of E-Commerce Business Model

Research paper thumbnail of E-Commerce Business Model

Research Anthology on E-Commerce Adoption, Models, and Applications for Modern Business, 2021

This chapter provides an overview of the e-commerce business model, the history of e-commerce, th... more This chapter provides an overview of the e-commerce business model, the history of e-commerce, the scope of e-commerce, the difference between e-commerce and traditional commerce, issues related to e-commerce, electronic data interchange, value chain, and supply chain, and the pros and cons and limitations of e-commerce.

Research paper thumbnail of An Optimized Communication Scheme for Energy Efficient and Secure Flying Ad-hoc Network (FANET)

Wireless Personal Communications, 2021

FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficien... more FANET (flying ad-hoc network) has provided broad area for research and deployment due to efficient use of the capabilities of drones and UAVs (unmanned ariel vehicles) in several military and rescue applications. Drones have high mobility in 3D (3 dimensional) environment and low battery power, which produce various problems such as small journey time and infertile routing. The optimal routing for communication will assist to resolve these problems and provide the energy efficient and secure data transmission over FANET. Hence, in this paper, we proposed a whale optimization algorithm based optimized link state routing (WOA-OLSR) over FANET to provide optimal routing for energy efficient and secure FANET. The efficiency of OLSR is enhanced by using WOA and evaluated performance shows the better efficiency of WOA-OLSR in terms of some parameters such as a packet delivery ratio, end to end delay, energy utilization, throughput, and time complexity against the previous approaches OLSR, MP-OLSR, P-OLSR, ML-OLSR-FIFO and ML-OLSR-PMS.

Research paper thumbnail of An Efficient Approach for Sentiment Analysis Using Regression Analysis Technique

International Journal of Computer Sciences and Engineering, 2019

Sentimental analysis determines the views of the user from the social media. It is used to classi... more Sentimental analysis determines the views of the user from the social media. It is used to classify the content of the text into neutral, negative and positive classes. Various researchers have used different methods to train and classify twitter dataset with different results. Particularly when time is taken as constraint in some applications like airline and sales, the algorithm plays a major role. In this paper an optimization based machine learning algorithm is proposed to classify the twitter data. The process was done in three stages. In the first stage data is collected and preprocessed, in the second stage the data is optimized by extracting necessary features and in the third stage the updated training set is classified into different classes by applying different machine learning algorithms. Each algorithm gives different results. It is observed that the proposed method i.e., sequential minimal optimization with decision tree gives good accuracy of 89.47% compared to other machine learning algorithms.

Research paper thumbnail of Cloud Security Using 2-Factor Image Authentication Technique

Advances in Information Security, Privacy, and Ethics

Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry a... more Cloud computing is being anticipated as the infrastructural basis of tomorrow's IT industry and continues to be a topic of interest of many new emerging IT firms. Cloud can deliver resources and services to computers and devices through internet. Since Cloud Computing involves outsourcing of sensitive data and critical information the security aspects of cloud need to be dealt carefully. Strong authentication, focusing mainly on user-authentication, acts as a pre-requisite for access control in the cloud environment. In this paper we discuss an efficient authentication mechanism to deal with the security threats that are faced by cloud. The method proposed in this paper prevents the confidential data and information of end users stored in a private cloud from unauthorized access by using a two-factor authentication involving shared image concept in addition with encrypted key authentication.MD5 hashing technique is used which takes binary pixel value of image as input and conver...