Chandu Vaidya - Academia.edu (original) (raw)

Papers by Chandu Vaidya

Research paper thumbnail of Flood prediction using machine learning

Nucleation and Atmospheric Aerosols, 2023

Research paper thumbnail of Wearable obstacle sensing system using internet of things and computer vision

ADVANCES IN MATERIAL SCIENCE AND MANUFACTURING ENGINEERING

Research paper thumbnail of Concrete survey and analysis on portfolio optimization techniques

ADVANCES IN MATERIAL SCIENCE AND MANUFACTURING ENGINEERING

Research paper thumbnail of Hand Sign Language Detection - Using Deep Neural Network

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Sarcasm Detection Analysis – Comparative Analysis

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Decentralized File Sharing

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Auto Detection of Personal Protective Equipment on Human

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocol

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

Wireless networks are an ideal research direction in the areas of sensors and pervasive computing... more Wireless networks are an ideal research direction in the areas of sensors and pervasive computing. Wireless ad-hoc sensor networks are a new platform in the fields of remote sensing, data collection, analysis, problem solving, and various research studies. They contain nodes that act as transmitters and receivers, and are vulnerable to various attacks and incur various types of loss. Resource exhaustion attacks, once considered just a routing problem, now fall into a new group called "vampire attacks." A resource exhaustion or vampire attack drains a node's batteries, rendering them useless. Vampire attacks are not specific protocols and are hard to spot. This paper examines the identification and protection of resource exhaustion attacks at the routing protocol layer using the PLGP protocols (Parno, Luk, Gaustad, and Perrig). This white paper focuses primarily on detecting and preventing vampire attacks. The proposed method is used to prevent network node exhaustion. ...

Research paper thumbnail of Implementation & Comparative Analysis of an Election Algorithm

A distributed system is a collection of processors interconnected by a communication network in w... more A distributed system is a collection of processors interconnected by a communication network in which each processor has its own local memory and other peripherals and the communication between them is done by message passing over the communication network. Distributed systems require that there should be a coordinator node in the entire system that will perform coordination activity which is needed for the smooth running of other nodes in the system. The paper presented here tells about the Bully Algorithm which gives us the idea about the way in which the modification works when routing of the algorithm goes. Here in this paper we use the AODV (Adhoc on Demand Distance Vector) Routing protocol in comparison with RIP (Routing Information Protocol) for the routing purpose.

Research paper thumbnail of nd Year)

Given paper contain proposed approached for task scheduling which is done on a group of computers... more Given paper contain proposed approached for task scheduling which is done on a group of computers. Analysis of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e very fast. The paper contain dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI[4] [10]is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knoppix & MOSIX platform(Middleware) are used to show the results. Prime number calculation code is used to show parallel architecture like SIMD computer. Cluster com...

Research paper thumbnail of International Journal on Recent and Innovation Trends in Computing and Communication Data Security in Cloud Computing

Abstract-Cloud computing is the computing model that allow for obtaining resources such as softwa... more Abstract-Cloud computing is the computing model that allow for obtaining resources such as software on cloud, hardware and services over the internet. The clients stores their data on cloud for data security, for ease of accessing and integrity are prime related. In this paper, the problem of ensuring data integrity and security of data storage provided on cloud from the client while storing data over cloud. To ensuring correctness of data, it assumes that authentication required for uploading and retrieving of data over cloud and these task of allowing by a trusted party (TP) used for exposing risk of cloud storage services on behalf of the cloud client to verify data integrity stored in the cloud. This paper focuses on the data security, we proposed erasure correcting method in the file distribution to the cloud and the client authentication provides the redundancies and guarantees data dependability. By using RSA encryption technique and by calculating hash value with distributed...

Research paper thumbnail of Statistical Approach for Load Distribution in Decentralized Cloud Computing

HELIX

In this era of developing technologies, one of the most promising is cloud computing that has bee... more In this era of developing technologies, one of the most promising is cloud computing that has been functioning since years and used by individuals and large enterprises to provide different kind of services to the world. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for pro-visioning hardware and allows enterprises to start from the small scale and increase resources only when there is a rise in service demand. One of the trends in cloud computing is the use of decentralized cloud, where resources are shared between multiple servers instead of one central server. The use of decentralized cloud can reduce task complexity and work efficiency per server by utilizing small amount of resources from various servers. With this emerging trend in decentralized cloud, various methodologies were introduced to implement it. One of the most important methodology that plays a vital role in decentralized cloud is Load distribution. Load distribution can be achieved in various ways and hence different approaches can lead to better ways to distribute load in cloud servers. So by researching various methodologies used in cloud computing, a similar but new load distribution algorithm can be implemented which will be based on current statistics of the server nodes by comparing statistics the resultant best node can be chosen to dispatch the file which is to be uploaded.

Research paper thumbnail of An Approach for Load Balancing using Process Migration in Parallel System

IJCA Proceedings on National Conference on Recent Trends in Computing, Dec 5, 2012

... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “E... more ... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “ELISA: An Estimated Load Information Scheduling Algorithm for Distributed Computing Systems,” Int'l J. Computers and Math. with Applications, vol. 37, no. 8, pp. 57-85, Apr. 1999. ...

Research paper thumbnail of Data Leakage Detection and Security Using Cloud Computing

The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud p... more The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud provider must verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will present in an unauthorized place (e.g., on the internet or someone’s laptop). In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively approaches the security and performance issues. In DROPS methodology, we have to select the file and then store the particular file in the cloud account. In order to provide security we are going to implement DROPS concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate each fragments for one time in cloud. Keywords—Data leakage, cloud security, fragmentation, replication, performance.

Research paper thumbnail of An Approach for Process Migration using Task Scheduling

Given paper contain proposed approached for task scheduling which is done on a group of computers... more Given paper contain proposed approached for task scheduling which is done on a group of computers. Analysis of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e very fast. The paper contain dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI[4] [10]is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knoppix & MOSIX platform(Middleware) are used to show the results. Prime number calculation code is used to show parallel architecture like SIMD computer. Cluster com...

Research paper thumbnail of A Statistical Approach for Load balancing on Cluster Computing

Given paper contain proposed approached for task scheduling to achieve load balancing which is do... more Given paper contain proposed approached for task scheduling to achieve load balancing which is done on a group of computers. The processor idles due to large set of data, on the multiprocessor computer. Consideration of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e. very fast. The paper contains dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. We are taking CPU and MEMORY parameter in this approach. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knopp...

Research paper thumbnail of A Mode Switched Based Routing Protocol for Multiple Sink in Wireless Sensor Networks

Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms fo... more Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime), a proper balance between communication and signal/data processing capabilities must be found. A Wireless Sensor Network (WSN) consists of enormous amount of sensor nodes. These sensor nodes sense the changes in physical parameters from the sensing range and forward the information to the sink nodes or the base station. The wireless sensor network consists of small limited energy sensors which are connected to one or more sinks. The maximum energy consumption takes place in communicating the data from the nodes to the sink. Multiple sink WSN has an edge over the single sink WSN where very less energy is utilized in sending the data to the sink, as the number of hops is reduced. If the energy consumed by a node is balanced betw...

Research paper thumbnail of Performance Enhancing in Real Time Operating System by Using HYBRID Algorithm

The Real Time Operating System (RTOS) supports applications that meet deadlines, in addition to p... more The Real Time Operating System (RTOS) supports applications that meet deadlines, in addition to provides logically correct it’s outcome. In multitasking operating system for the applications request to meeting of time deadlines and functioning in proper real time constraints, To meet the real-time constraints ; in Real time system for scheduling the task, different scheduling algorithms used. Most of the real-time systems are designed using priority based preemptive scheduling algorithm, worst case execution time estimates to guarantee the execution of high priority tasks. The hybrid Algorithm schedules the process on single processor when it is preemptive. The advantage of the proposed algorithm is that it automatically switches between the EDF and ACO scheduling algorithm and overcome the limitation of both the previously discussed algorithms in paper. Keywords—Earliest Deadline First (EDF), Ant Colony Optimization (ACO), Real-Time Operating System (RTOS), Fixed Priority (FP), Rat...

Research paper thumbnail of Data Leakage Detection and Dependable Storage Service In Cloud Computing

International Journal For Science Technology And Engineering, 2016

The field of cloud computing enables users to remotely store their data and enjoy the on-demand h... more The field of cloud computing enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing user’s physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. The owner of the data is called as distributors and the trusted third parties are called as agents. Sometimes the data loss also occurs. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc. are leaked out. When this information is leaked out, then the companies are at serious risk. Most probably data are being leaked f...

Research paper thumbnail of An Approach for Load Balancing using Process Migration in Parallel System

... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “E... more ... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “ELISA: An Estimated Load Information Scheduling Algorithm for Distributed Computing Systems,” Int'l J. Computers and Math. with Applications, vol. 37, no. 8, pp. 57-85, Apr. 1999. ...

Research paper thumbnail of Flood prediction using machine learning

Nucleation and Atmospheric Aerosols, 2023

Research paper thumbnail of Wearable obstacle sensing system using internet of things and computer vision

ADVANCES IN MATERIAL SCIENCE AND MANUFACTURING ENGINEERING

Research paper thumbnail of Concrete survey and analysis on portfolio optimization techniques

ADVANCES IN MATERIAL SCIENCE AND MANUFACTURING ENGINEERING

Research paper thumbnail of Hand Sign Language Detection - Using Deep Neural Network

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Sarcasm Detection Analysis – Comparative Analysis

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Decentralized File Sharing

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Auto Detection of Personal Protective Equipment on Human

2023 IEEE International Students' Conference on Electrical, Electronics and Computer Science (SCEECS)

Research paper thumbnail of Detection of Vampire Attacks in Ad-Hoc Wireless Sensor Network using PLGP protocol

International Journal of Scientific Research in Computer Science, Engineering and Information Technology

Wireless networks are an ideal research direction in the areas of sensors and pervasive computing... more Wireless networks are an ideal research direction in the areas of sensors and pervasive computing. Wireless ad-hoc sensor networks are a new platform in the fields of remote sensing, data collection, analysis, problem solving, and various research studies. They contain nodes that act as transmitters and receivers, and are vulnerable to various attacks and incur various types of loss. Resource exhaustion attacks, once considered just a routing problem, now fall into a new group called "vampire attacks." A resource exhaustion or vampire attack drains a node's batteries, rendering them useless. Vampire attacks are not specific protocols and are hard to spot. This paper examines the identification and protection of resource exhaustion attacks at the routing protocol layer using the PLGP protocols (Parno, Luk, Gaustad, and Perrig). This white paper focuses primarily on detecting and preventing vampire attacks. The proposed method is used to prevent network node exhaustion. ...

Research paper thumbnail of Implementation & Comparative Analysis of an Election Algorithm

A distributed system is a collection of processors interconnected by a communication network in w... more A distributed system is a collection of processors interconnected by a communication network in which each processor has its own local memory and other peripherals and the communication between them is done by message passing over the communication network. Distributed systems require that there should be a coordinator node in the entire system that will perform coordination activity which is needed for the smooth running of other nodes in the system. The paper presented here tells about the Bully Algorithm which gives us the idea about the way in which the modification works when routing of the algorithm goes. Here in this paper we use the AODV (Adhoc on Demand Distance Vector) Routing protocol in comparison with RIP (Routing Information Protocol) for the routing purpose.

Research paper thumbnail of nd Year)

Given paper contain proposed approached for task scheduling which is done on a group of computers... more Given paper contain proposed approached for task scheduling which is done on a group of computers. Analysis of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e very fast. The paper contain dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI[4] [10]is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knoppix & MOSIX platform(Middleware) are used to show the results. Prime number calculation code is used to show parallel architecture like SIMD computer. Cluster com...

Research paper thumbnail of International Journal on Recent and Innovation Trends in Computing and Communication Data Security in Cloud Computing

Abstract-Cloud computing is the computing model that allow for obtaining resources such as softwa... more Abstract-Cloud computing is the computing model that allow for obtaining resources such as software on cloud, hardware and services over the internet. The clients stores their data on cloud for data security, for ease of accessing and integrity are prime related. In this paper, the problem of ensuring data integrity and security of data storage provided on cloud from the client while storing data over cloud. To ensuring correctness of data, it assumes that authentication required for uploading and retrieving of data over cloud and these task of allowing by a trusted party (TP) used for exposing risk of cloud storage services on behalf of the cloud client to verify data integrity stored in the cloud. This paper focuses on the data security, we proposed erasure correcting method in the file distribution to the cloud and the client authentication provides the redundancies and guarantees data dependability. By using RSA encryption technique and by calculating hash value with distributed...

Research paper thumbnail of Statistical Approach for Load Distribution in Decentralized Cloud Computing

HELIX

In this era of developing technologies, one of the most promising is cloud computing that has bee... more In this era of developing technologies, one of the most promising is cloud computing that has been functioning since years and used by individuals and large enterprises to provide different kind of services to the world. Cloud computing is attractive to business owners as it eliminates the requirement for users to plan ahead for pro-visioning hardware and allows enterprises to start from the small scale and increase resources only when there is a rise in service demand. One of the trends in cloud computing is the use of decentralized cloud, where resources are shared between multiple servers instead of one central server. The use of decentralized cloud can reduce task complexity and work efficiency per server by utilizing small amount of resources from various servers. With this emerging trend in decentralized cloud, various methodologies were introduced to implement it. One of the most important methodology that plays a vital role in decentralized cloud is Load distribution. Load distribution can be achieved in various ways and hence different approaches can lead to better ways to distribute load in cloud servers. So by researching various methodologies used in cloud computing, a similar but new load distribution algorithm can be implemented which will be based on current statistics of the server nodes by comparing statistics the resultant best node can be chosen to dispatch the file which is to be uploaded.

Research paper thumbnail of An Approach for Load Balancing using Process Migration in Parallel System

IJCA Proceedings on National Conference on Recent Trends in Computing, Dec 5, 2012

... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “E... more ... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “ELISA: An Estimated Load Information Scheduling Algorithm for Distributed Computing Systems,” Int'l J. Computers and Math. with Applications, vol. 37, no. 8, pp. 57-85, Apr. 1999. ...

Research paper thumbnail of Data Leakage Detection and Security Using Cloud Computing

The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud p... more The data owner will store the data in the cloud. Every user must registered in the cloud. Cloud provider must verify the authorized user. If someone try to access the account, data will get leaked. This leaked data will present in an unauthorized place (e.g., on the internet or someone’s laptop). In this paper, we propose Division and Replication of Data in the Cloud for Optimal Performance and Security (DROPS) that collectively approaches the security and performance issues. In DROPS methodology, we have to select the file and then store the particular file in the cloud account. In order to provide security we are going to implement DROPS concepts. Now we divide the file into various fragments based on the threshold value. Each and every fragments are stored in the node using T-Coloring. After the placement of fragments in node, it is necessary to replicate each fragments for one time in cloud. Keywords—Data leakage, cloud security, fragmentation, replication, performance.

Research paper thumbnail of An Approach for Process Migration using Task Scheduling

Given paper contain proposed approached for task scheduling which is done on a group of computers... more Given paper contain proposed approached for task scheduling which is done on a group of computers. Analysis of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e very fast. The paper contain dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI[4] [10]is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knoppix & MOSIX platform(Middleware) are used to show the results. Prime number calculation code is used to show parallel architecture like SIMD computer. Cluster com...

Research paper thumbnail of A Statistical Approach for Load balancing on Cluster Computing

Given paper contain proposed approached for task scheduling to achieve load balancing which is do... more Given paper contain proposed approached for task scheduling to achieve load balancing which is done on a group of computers. The processor idles due to large set of data, on the multiprocessor computer. Consideration of process data part by dividing them into number of fixed part & merge into single set that as good as previous original data set. Parallelism an approach for doing jobs in amount of time i.e. very fast. The paper contains dynamic approach for process migration using thread level paradigm. Creating a thread of process into number of task, that leads to reduce total execution time of process. An algorithm is used to calculate PCB for decision purpose to achieve load balancing. We are taking CPU and MEMORY parameter in this approach. Fair share approach is considered to allocating task to every processor using preemption strategy. The MPI is used for process communication. This system has defined to reduce total execution time on onboard & between board times. Open knopp...

Research paper thumbnail of A Mode Switched Based Routing Protocol for Multiple Sink in Wireless Sensor Networks

Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms fo... more Wireless sensor networks (WSNs) enable new applications and require non-conventional paradigms for protocol design due to several constraints. Owing to the requirement for low device complexity together with low energy consumption (i.e., long network lifetime), a proper balance between communication and signal/data processing capabilities must be found. A Wireless Sensor Network (WSN) consists of enormous amount of sensor nodes. These sensor nodes sense the changes in physical parameters from the sensing range and forward the information to the sink nodes or the base station. The wireless sensor network consists of small limited energy sensors which are connected to one or more sinks. The maximum energy consumption takes place in communicating the data from the nodes to the sink. Multiple sink WSN has an edge over the single sink WSN where very less energy is utilized in sending the data to the sink, as the number of hops is reduced. If the energy consumed by a node is balanced betw...

Research paper thumbnail of Performance Enhancing in Real Time Operating System by Using HYBRID Algorithm

The Real Time Operating System (RTOS) supports applications that meet deadlines, in addition to p... more The Real Time Operating System (RTOS) supports applications that meet deadlines, in addition to provides logically correct it’s outcome. In multitasking operating system for the applications request to meeting of time deadlines and functioning in proper real time constraints, To meet the real-time constraints ; in Real time system for scheduling the task, different scheduling algorithms used. Most of the real-time systems are designed using priority based preemptive scheduling algorithm, worst case execution time estimates to guarantee the execution of high priority tasks. The hybrid Algorithm schedules the process on single processor when it is preemptive. The advantage of the proposed algorithm is that it automatically switches between the EDF and ACO scheduling algorithm and overcome the limitation of both the previously discussed algorithms in paper. Keywords—Earliest Deadline First (EDF), Ant Colony Optimization (ACO), Real-Time Operating System (RTOS), Fixed Priority (FP), Rat...

Research paper thumbnail of Data Leakage Detection and Dependable Storage Service In Cloud Computing

International Journal For Science Technology And Engineering, 2016

The field of cloud computing enables users to remotely store their data and enjoy the on-demand h... more The field of cloud computing enables users to remotely store their data and enjoy the on-demand high quality cloud applications without the burden of local hardware and software management. Though the benefits are clear, such a service is also relinquishing user’s physical possession of their outsourced data, which inevitably poses new security risks towards the correctness of the data in cloud. A data distributor has given sensitive data to a set of supposedly trusted agents. Sometimes data is leaked and found in unauthorized place e.g., on the web or on somebody's laptop. The owner of the data is called as distributors and the trusted third parties are called as agents. Sometimes the data loss also occurs. Data leakage happens every day when confidential business information such as customer or patient data, company secrets, budget information etc. are leaked out. When this information is leaked out, then the companies are at serious risk. Most probably data are being leaked f...

Research paper thumbnail of An Approach for Load Balancing using Process Migration in Parallel System

... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “E... more ... 6 [8] Amith R. Mamidala Rahul Kumar Debraj De DK ... [15] L. Anand, D. Ghose, and V. Mani, “ELISA: An Estimated Load Information Scheduling Algorithm for Distributed Computing Systems,” Int'l J. Computers and Math. with Applications, vol. 37, no. 8, pp. 57-85, Apr. 1999. ...