Nagresh Kumar - Academia.edu (original) (raw)

Papers by Nagresh Kumar

Research paper thumbnail of A Comprehensive Investigation of Workflow Scheduling in Cloud Computing Environment

Ambient Communications and Computer Systems

Research paper thumbnail of Inertia Weight Controlled PSO for Task Scheduling in Cloud Computing

2018 International Conference on Computing, Power and Communication Technologies (GUCON), 2018

Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior o... more Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior of animals. PSO is widely growing and accepted among researchers to find the optimum solution in very large space with low computational complexity. There are various controlled parameters in PSO,and inertia weight (IW) is one of them. An appropriate strategy for varying inertia weight improves the PSOperformance. Recent research works related to varying inertia weight strategy considered small values of w, generally between 0 and 1.The aim of this research paper is to investigate existing varying inertia weight strategy, their effect on PSO performance and to design the new variant of IW for better performance. The same strategy have been implemented in two different proposed inertia weight variants of PSO, namely Modified Simple Random Inertia Weight (MSRIW), and Modified Oscillating Inertia Weight (MOIW). We compared the performance of proposed variants with different existing inertia weight variants of PSO. The proposed strategy is better than existing in term of convergence speed. Further this strategy can be implemented for task scheduling in cloud computing for better performance.

Research paper thumbnail of Effect of Acceleration Coefficient on Particle Swarm optimization for Task Scheduling in Cloud Computing

EAI Endorsed Trans. Cloud Syst., 2021

Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid de... more Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid development of cloud computing the user's dependence on the cloud has increased and hence user request per unit time is increases. Now scheduling and serving the user requests is a major challenge. Particle swarm optimization as a heuristic algorithm is the most suitable algorithm in such scenario to serve user requests for the most appropriate resources. Author written this research paper in continuation with previous research paper called Modified particle swarm optimization (MPSO) in which author controlled the inertia weight in PSO to find the best cost. This research paper investigates the effect of acceleration coefficient to achieve the best cost. The implementation results of PSO with different acceleration coefficient are produced and compared. Author has use MATLab to test the effect of acceleration coefficient on fitness value and also implemented in CloudSim simulator to te...

Research paper thumbnail of An Energy-efficient algorithm using layer heads for Software-Defined Wireless Sensor Networks

2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018

Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizin... more Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizing energy consumption in wireless SDN is now essential and challenging. In this paper, we propose the concept of layer heads using which the energy consumption is optimized. We further reduce the energy consumption using the optimal number of energy spaces and topology type. The proposed approach is tested with varied topologies and the results show that the energy levels are conserved in software-defined wireless sensor networks (SDWSN).

Research paper thumbnail of Impact Of Parallelism And Virtualization On Task Scheduling In Cloud Environment

Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrast... more Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrastructure, platform, and software as an amenity to users which are effortlessly available via the internet. It has a large number of users and has to deal with a large number of task executions which needs a suitable task scheduling algorithm. Virtualization and parallelism are the core components of cloud computing for optimization of resource utilization and to increase system performance. Virtualization is used to provide IT infrastructure on demand. To take more advantages of virtualization, parallel processing plays an important role to improve the system performance. But it is important to understand the mutual effect of parallel processing and virtualization on system performance. This research helps to better understand the effect of virtualization and parallel processing. In this paper, we studied the effect of parallelization and virtualization for the scheduling of tasks to opti...

Research paper thumbnail of Social Engineering Threats and Awareness: A Survey

This paper defines social engineering and explains how one can use the human mind for capturing u... more This paper defines social engineering and explains how one can use the human mind for capturing useful information about organizations or individuals. It also provides recommendations on how to defend and protect against attackers using social engineering techniqu es. Social engineering is a non-technical method of intrusion hacker’s use that relies heavily on human interacti on and often involves tricking people into breaking normal security procedure. Since there is neither hardware nor software available to protect an enterprise or individual against social engineering, it is essential that good practices be implemented. The overall purpose of this survey is to highlight the different social engineering attac ks and how they can prevented.

Research paper thumbnail of Spatial Domain Lossless Image Data Compression

Digital image compression deals with methods for reducing the total number of bits required to re... more Digital image compression deals with methods for reducing the total number of bits required to represent an image. This can be achieved by eliminating various types of redundancy that exist in the image dataset. Lossless image compression techniques preserve the information so that exact reconstruction of the image is possible from the compressed data. Major lossless or error free compression methods like Huffman, arithmetic and Lempel-Ziv coding do not achieve great compression ratio. It is necessary to preprocess the images in order to reduce the amount of correlation among neighboring pixels, to improve compression ratio further. Keeping this in view this works intend to focus on a comparative investigation of various lossless image compressions in spatial domain techniques and proposed an algorithm which achieves more compression ratio. The proposed algorithm is divided into two phases. In first phase the color image is divided into RGB plane and where each plane is divided into...

Research paper thumbnail of Parameters Analysis for PSO based Task Scheduling in Cloud Computing

SSRN Electronic Journal, 2019

In today's world of information technology, cloud computing emerges as a new computing paradigm d... more In today's world of information technology, cloud computing emerges as a new computing paradigm due to its economical and operational benefits. Cloud computing is able to perform the process of the enormous amount of data using high computing capacity and distributed services. When a user needs to fluctuate, cloud server capacity scales up and down to fit. It is highly flexible, reduce capital expenditure, robust disaster recovery and can operate from anywhere through the internet. The User can avail these facilities by submitting their computing task to the cloud system. So scheduling tasks to reduce the task completion time is the main purpose of task scheduling algorithm. The objective of this paper is to analyse the various parameters of particle swarm optimization (PSO) algorithm to highlight effectiveness, strength and weakness compare to other evolutionary algorithms. This paper also analyses effective virtualization of cloud infrastructure and suitability of these parameters towards efficient task scheduling in a cloud computing environment.

Research paper thumbnail of A Modified Particle Swarm Optimization for Task Scheduling in Cloud Computing

SSRN Electronic Journal, 2019

Cloud computing emerges as a powerful platform to deliver IT services through internet. Due to ra... more Cloud computing emerges as a powerful platform to deliver IT services through internet. Due to rapid development of cloud computing the user's dependencies on cloud have increased therefore scheduling of task is the key challenge. This research paper focused on scheduling user's requests to best suitable resources in optimal way. We propose a modified particle swarm optimization (MPSO) task scheduling algorithm in order to optimize execution time, transmission time, makespan, transmission cost and load balancing of virtual machines. The MPSO algorithm maintains inertia weight from 0.4 to 0.9 and it plays an important role to achieve best cost. The implementation result of MPSO on CloudSim produces best cost as compared to original PSO.

Research paper thumbnail of Comparative Study of Fully Homomorphic Encryption and Fully Disk Encryption schemes in Cloud Computing

International Journal of Engineering Trends and Technology, 2017

Forest resources in Bosnia and Herzegovina present rich sites of various non-wood forest products... more Forest resources in Bosnia and Herzegovina present rich sites of various non-wood forest products. In the concept of sustainable use of forest resources and assurance the economic, environmental and social effects, non-wood forest products have great importance, especially in the strategic commitments of rural development. However, information on the potentials of non-wood forest products in Bosnia and Herzegovina is very scant, whereas institutional and procedural framework relevant to this sector is underdeveloped. In this paper value chain analysis of non-wood forest products in Bosnia and Herzegovina have been carried out in order to identify the participants in the value chain, their mutual relations, and the analysis of organizational and institutional issues that affect the economic aspects of certain stages of the value chain. Survey method was used for primary data collection in the Federation of Bosnia and Herzegovina, where the relevant information from participants in the chain of non-wood forest products has been obtained. The study included a sample of 156 collectors, who had continuity in the collection and delivery, and 18 companies engaged in purchasing, processing and distribution, which have agreed to participate in the research. For data processing and interpretation of the results classical methods of analysis, synthesis, induction, deduction and comparison, and statistical methods of trend analysis were used. Technique of SWOT analysis was used in order to identify the positive and negative factors, as the basis for defining the strategic direction of non-wood forest products sector development. The obtained results indicate on the presence of numerous problems in the value chain. The share of individual groups of non-wood forest products in the analyzed period is: 50% of berries, 40% of medicinal and aromatic plants and 10% of mushrooms. The average annual growth rate of purchased and processed amounts of medicinal and aromatic plants was 17%, 28% of forest berries, and

Research paper thumbnail of Secure Channel establishment techniques for Homomorphic encryption in Cloud Computing

1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ----------------... more 1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key Sharing various schemes have been proposed. The third party auditing scheme will be failed, if the third party’s security is compromised or of the third party will be malicious. To solve this problem, we will work on to design new modal for key sharing and key mana...

Research paper thumbnail of Unusual event detection in low resolution video for enhancing ATM security

2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015

Research paper thumbnail of A Comprehensive Investigation of Workflow Scheduling in Cloud Computing Environment

Ambient Communications and Computer Systems

Research paper thumbnail of Inertia Weight Controlled PSO for Task Scheduling in Cloud Computing

2018 International Conference on Computing, Power and Communication Technologies (GUCON), 2018

Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior o... more Particle Swarm Optimization (PSO) is a new metaheuristic algorithm based on the social behavior of animals. PSO is widely growing and accepted among researchers to find the optimum solution in very large space with low computational complexity. There are various controlled parameters in PSO,and inertia weight (IW) is one of them. An appropriate strategy for varying inertia weight improves the PSOperformance. Recent research works related to varying inertia weight strategy considered small values of w, generally between 0 and 1.The aim of this research paper is to investigate existing varying inertia weight strategy, their effect on PSO performance and to design the new variant of IW for better performance. The same strategy have been implemented in two different proposed inertia weight variants of PSO, namely Modified Simple Random Inertia Weight (MSRIW), and Modified Oscillating Inertia Weight (MOIW). We compared the performance of proposed variants with different existing inertia weight variants of PSO. The proposed strategy is better than existing in term of convergence speed. Further this strategy can be implemented for task scheduling in cloud computing for better performance.

Research paper thumbnail of Effect of Acceleration Coefficient on Particle Swarm optimization for Task Scheduling in Cloud Computing

EAI Endorsed Trans. Cloud Syst., 2021

Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid de... more Cloud computing emerges as a powerful platform to deliver IT services online. Due to the rapid development of cloud computing the user's dependence on the cloud has increased and hence user request per unit time is increases. Now scheduling and serving the user requests is a major challenge. Particle swarm optimization as a heuristic algorithm is the most suitable algorithm in such scenario to serve user requests for the most appropriate resources. Author written this research paper in continuation with previous research paper called Modified particle swarm optimization (MPSO) in which author controlled the inertia weight in PSO to find the best cost. This research paper investigates the effect of acceleration coefficient to achieve the best cost. The implementation results of PSO with different acceleration coefficient are produced and compared. Author has use MATLab to test the effect of acceleration coefficient on fitness value and also implemented in CloudSim simulator to te...

Research paper thumbnail of An Energy-efficient algorithm using layer heads for Software-Defined Wireless Sensor Networks

2018 International Conference on Recent Trends in Advance Computing (ICRTAC), 2018

Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizin... more Software-defined networks (SDN) is an era which poses a number of challenges on energy. Minimizing energy consumption in wireless SDN is now essential and challenging. In this paper, we propose the concept of layer heads using which the energy consumption is optimized. We further reduce the energy consumption using the optimal number of energy spaces and topology type. The proposed approach is tested with varied topologies and the results show that the energy levels are conserved in software-defined wireless sensor networks (SDWSN).

Research paper thumbnail of Impact Of Parallelism And Virtualization On Task Scheduling In Cloud Environment

Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrast... more Today’s, cloud computing has placed itself in every field of the IT industry. It provides infrastructure, platform, and software as an amenity to users which are effortlessly available via the internet. It has a large number of users and has to deal with a large number of task executions which needs a suitable task scheduling algorithm. Virtualization and parallelism are the core components of cloud computing for optimization of resource utilization and to increase system performance. Virtualization is used to provide IT infrastructure on demand. To take more advantages of virtualization, parallel processing plays an important role to improve the system performance. But it is important to understand the mutual effect of parallel processing and virtualization on system performance. This research helps to better understand the effect of virtualization and parallel processing. In this paper, we studied the effect of parallelization and virtualization for the scheduling of tasks to opti...

Research paper thumbnail of Social Engineering Threats and Awareness: A Survey

This paper defines social engineering and explains how one can use the human mind for capturing u... more This paper defines social engineering and explains how one can use the human mind for capturing useful information about organizations or individuals. It also provides recommendations on how to defend and protect against attackers using social engineering techniqu es. Social engineering is a non-technical method of intrusion hacker’s use that relies heavily on human interacti on and often involves tricking people into breaking normal security procedure. Since there is neither hardware nor software available to protect an enterprise or individual against social engineering, it is essential that good practices be implemented. The overall purpose of this survey is to highlight the different social engineering attac ks and how they can prevented.

Research paper thumbnail of Spatial Domain Lossless Image Data Compression

Digital image compression deals with methods for reducing the total number of bits required to re... more Digital image compression deals with methods for reducing the total number of bits required to represent an image. This can be achieved by eliminating various types of redundancy that exist in the image dataset. Lossless image compression techniques preserve the information so that exact reconstruction of the image is possible from the compressed data. Major lossless or error free compression methods like Huffman, arithmetic and Lempel-Ziv coding do not achieve great compression ratio. It is necessary to preprocess the images in order to reduce the amount of correlation among neighboring pixels, to improve compression ratio further. Keeping this in view this works intend to focus on a comparative investigation of various lossless image compressions in spatial domain techniques and proposed an algorithm which achieves more compression ratio. The proposed algorithm is divided into two phases. In first phase the color image is divided into RGB plane and where each plane is divided into...

Research paper thumbnail of Parameters Analysis for PSO based Task Scheduling in Cloud Computing

SSRN Electronic Journal, 2019

In today's world of information technology, cloud computing emerges as a new computing paradigm d... more In today's world of information technology, cloud computing emerges as a new computing paradigm due to its economical and operational benefits. Cloud computing is able to perform the process of the enormous amount of data using high computing capacity and distributed services. When a user needs to fluctuate, cloud server capacity scales up and down to fit. It is highly flexible, reduce capital expenditure, robust disaster recovery and can operate from anywhere through the internet. The User can avail these facilities by submitting their computing task to the cloud system. So scheduling tasks to reduce the task completion time is the main purpose of task scheduling algorithm. The objective of this paper is to analyse the various parameters of particle swarm optimization (PSO) algorithm to highlight effectiveness, strength and weakness compare to other evolutionary algorithms. This paper also analyses effective virtualization of cloud infrastructure and suitability of these parameters towards efficient task scheduling in a cloud computing environment.

Research paper thumbnail of A Modified Particle Swarm Optimization for Task Scheduling in Cloud Computing

SSRN Electronic Journal, 2019

Cloud computing emerges as a powerful platform to deliver IT services through internet. Due to ra... more Cloud computing emerges as a powerful platform to deliver IT services through internet. Due to rapid development of cloud computing the user's dependencies on cloud have increased therefore scheduling of task is the key challenge. This research paper focused on scheduling user's requests to best suitable resources in optimal way. We propose a modified particle swarm optimization (MPSO) task scheduling algorithm in order to optimize execution time, transmission time, makespan, transmission cost and load balancing of virtual machines. The MPSO algorithm maintains inertia weight from 0.4 to 0.9 and it plays an important role to achieve best cost. The implementation result of MPSO on CloudSim produces best cost as compared to original PSO.

Research paper thumbnail of Comparative Study of Fully Homomorphic Encryption and Fully Disk Encryption schemes in Cloud Computing

International Journal of Engineering Trends and Technology, 2017

Forest resources in Bosnia and Herzegovina present rich sites of various non-wood forest products... more Forest resources in Bosnia and Herzegovina present rich sites of various non-wood forest products. In the concept of sustainable use of forest resources and assurance the economic, environmental and social effects, non-wood forest products have great importance, especially in the strategic commitments of rural development. However, information on the potentials of non-wood forest products in Bosnia and Herzegovina is very scant, whereas institutional and procedural framework relevant to this sector is underdeveloped. In this paper value chain analysis of non-wood forest products in Bosnia and Herzegovina have been carried out in order to identify the participants in the value chain, their mutual relations, and the analysis of organizational and institutional issues that affect the economic aspects of certain stages of the value chain. Survey method was used for primary data collection in the Federation of Bosnia and Herzegovina, where the relevant information from participants in the chain of non-wood forest products has been obtained. The study included a sample of 156 collectors, who had continuity in the collection and delivery, and 18 companies engaged in purchasing, processing and distribution, which have agreed to participate in the research. For data processing and interpretation of the results classical methods of analysis, synthesis, induction, deduction and comparison, and statistical methods of trend analysis were used. Technique of SWOT analysis was used in order to identify the positive and negative factors, as the basis for defining the strategic direction of non-wood forest products sector development. The obtained results indicate on the presence of numerous problems in the value chain. The share of individual groups of non-wood forest products in the analyzed period is: 50% of berries, 40% of medicinal and aromatic plants and 10% of mushrooms. The average annual growth rate of purchased and processed amounts of medicinal and aromatic plants was 17%, 28% of forest berries, and

Research paper thumbnail of Secure Channel establishment techniques for Homomorphic encryption in Cloud Computing

1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ----------------... more 1,2 Meerut Institute of engineering and technology, Meerut, Uttar Pradesh, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract: Cloud computing is a technology or distributed network where user can move their data and any application software on it. But there is some issues in cloud computing, the main one is security because every user store their useful data on the network so they want their data should be protected from any unauthorized access, any changes that is not done on user’s behalf. There are different encryption techniques used for security purpose like FDE and FHE. To solve the problem of Key management, Key Sharing various schemes have been proposed. The third party auditing scheme will be failed, if the third party’s security is compromised or of the third party will be malicious. To solve this problem, we will work on to design new modal for key sharing and key mana...

Research paper thumbnail of Unusual event detection in low resolution video for enhancing ATM security

2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN), 2015