Dr. Vishal Garg | Kurukshetra University (original) (raw)
Papers by Dr. Vishal Garg
International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013, 2013
Tracking of mobile node in WSNs (Wireless Sensor Networks) is an active topic of research and man... more Tracking of mobile node in WSNs (Wireless Sensor Networks) is an active topic of research and many techniques in WSNs have been proposed. Among the proposed techniques, the popular approach is RSS (Received Signal Strength) and is useful in estimating the distance because it is simple and no extra hardware is required. In this paper, a method that uses RSSI approach is presented to locate the position of mobile node (node that is moving in WSN in Static 2D and Dynamic 2D environment and are not aware of its position in the network) among the other Positioned Nodes or Anchor Nodes in the network. The distance between mobile node and the Anchor Node is estimated by measuring the RSSI (received signal strength indicator). Anchor Nodes are positioned at the vertices of square and mobile node is moving randomly inside the square. The goal is to track the location of mobile node by applying Heron's Formula on the triangles formed inside the square.
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-1 Issue-2, , 2012
In this we propose a new method to reduce noise in digital image. Image corrupted by Gaussian Noi... more In this we propose a new method to reduce noise in digital image. Image corrupted by Gaussian Noise is still a classical problem. In images to reduce the noise or to improve the quality of image peak signal to noise ratio (PSNR) is compared. Higher the PSNR better the quality of the image.In this paper we explain the method curvelet Transformation using log gabor filter Experimental results show that our method gives comparatively higher peak signal to noise ratio (PSNR), are much more efficient and have less visual artifacts compared to other methods.
IJCEM International Journal of Computational Engineering & Management, Vol. 13, July 2011, 2011
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environmen... more Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environment due to the error-prone nature of wireless links and the high mobility of mobile devices. The Internet Engineering Task Force (IETF), the body responsible for guiding the evolution of the Internet, provides the definition as given below: A mobile ad hoc network (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a stand-alone fashion, or may be connected to the larger Internet. QoS is usually defined as a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. The network is expected to guarantee a set of measurable pre-specified service attributes to the users in terms of end-to-end performance, such as delay, bandwidth, probability of packet loss, delay variance (jitter), etc.
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-3,, 2019
Cloud computing gives part of advantages to endeavors to offload their information and software s... more Cloud computing gives part of advantages to
endeavors to offload their information and software services to
cloud administrations by saving them lot of money that must be
spent on foundation setup cost. Despite that, while offloading the
information privacy and protection is a vital concern.
Correspondingly for example when the emergency clinics and
medicinal services association transfer their patient's subtleties to
cloud and when the information is included, it will influence the
protection of the patients. So privacy is a vital concern while
offloading the information to cloud. Most of solutions for privacy
depend on encryption and information to be offloaded is encoded
and put away in cloud. Lots of encryption techniques like
cryptography, symmetric key etc. methods are used for encrypting
the information before uploading to cloud. However, the reaction
in this encryption system is that, the encrypted information isn't
structure preserving and it is not suitable for ranking or
searching. To solve the complications of this searching and
ranking due to disordering a homomorphism encryption based
mechanism is proposed but this solution also suffers from the
problem of integrity attacks on result. So this paper discussed the
enhancement of the homomorphism encryption based mechanism
by solving the integrity problems effectively.
Springer:Communications in Computer and Information Science, 2019
Abstract. MCC integrates cloud computing services into the mobile environment that helps users to... more Abstract. MCC integrates cloud computing services into the mobile environment that helps users to improve performance by utilizing battery life and
storage of devices. When mobile data is stored on cloud rather than in mobile
phone storage then less memory and less battery will be consumed by mobile
phone and it will helps to increases the performance of data transmission but at
same time it violates security of data. As data is transmitted from mobile to
cloud at the mean time there are lots of attackers presented in open environment
that may access or harm the data. To overcome this kind of hazards it is
necessary to propose a mechanism that provides secure data transmission in
MCC. In this paper an attempt has been made to perform assessment on different
security threats and their prevention models with different scenarios. This paper
is divided into six sections. Section 1 presents introduction of mobile cloud
computing (mcc), Sect. 2 covers deployment models of mcc, in Sect. 3 service
models of mcc has been discussed, Sect. 4 presents different kinds of attacks in
mcc environment, in Sect. 5 covers related work of different research papers that
presents security issues and detection techniques in mcc, in Sect. 6 conclusion of
paper has been discussed.
International Journal of Innovative Technology and Exploring Engineering, 2019
Mobile cloud computing is a rapidly evolving technology these days and it faces major problems of... more Mobile cloud computing is a rapidly evolving technology these days and it faces major problems of load imbalance due to the high demand for mobile applications. There are many techniques to solve the problem, but the user can improve load by using a more optimized solution. This research deals with the VM allocation and migration by means of location awareness. The research paper also presents a user authentication and server load management system to reduce the overload of the server. A captcha based authentication mechanism is also presented for user verification. The concept of Feedback is also introduced for the mobile servers. This concept makes the selection of mobile server for the job list. ANN (Artificial neural network) is used for location awareness judgment. ANN is a machine learning approach, which is used to minimize the human effort and also minimize the processing time to allocate job to an accurate server with minimum SLA violation. MBFD (Mobile best fit decreasing) algorithm is used for the VM allocation and selection policy. This research has considered SLA (Service level agreement) violation and energy consumption to compute the performance of the work with an aim of reducing energy consumption with maximized resource efficiency. The proposed work model is also compared with the work presented by Xiong in the same area.
https://ieeexplore.ieee.org/document/8748761, 2018
MCC (Mobile cloud computing) is a growing technology which obtained enhanced popularity due to th... more MCC (Mobile cloud computing) is a growing technology which obtained enhanced popularity due to the production and large-scale compilation of personal individual data. Nevertheless, novel security problems occur while MCC provides big data analysis with management services. MCC combines the cloud computing into the smart phone environment and hence overcome the barrier such as battery life, storage and bandwidth. In this paper, we are providing the survey of MCC that is useful to the reader to understand the definition, general overview. The advantages, challenges, and security issues are discussed. The communication protocol named as end to end along with their two types viz. TCP/IP (Transmission control protocol/internet protocol) with UDP (User datagram protocol) protocols are presented along with their properties, limitations and challenges. The concept of load balancing used in MCC is also discussed. At the last, the results analysis is given on the basis of two parameters named as energy consumption and resource utilization for different load condition.
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- , 2013
Wireless Sensor Network is a type of wireless network which consists of a collection of tiny devi... more Wireless Sensor Network is a type of wireless network which consists of a collection of tiny device called sensor node. Wireless Sensor Network is one of the rapidly developing areas. Applications of Wireless Sensor Network includes remote environmental monitoring, target tracking, etc. Various algorithms are proposed in 2D for location tracking which provides accuracy but in the real world, we require all the three planes for correct estimation and more accuracy in localization. The 2D works on flat terrain but we need to position WSN in harsh terrain also, so we need an algorithm in 3D that provide better accuracy and decrease the error of estimation and provide a real world view also. The goal of our survey is to present the localization techniques of node.
AIP Conference Proceedings 2760, 020019, 2023
Cloud computing is a promising new technology that is revolutionizing the old Internet computing ... more Cloud computing is a promising new technology that is revolutionizing the old Internet computing paradigm and the entire IT sector. Customers and many firms, such as Apple, Google, Facebook, and Amazon, are increasingly adopting mobile cloud computing technology. Because of the rapid advancements in wireless access technologies, cloud computing is expected to grow in the mobile environment. These mobile apps are based on mobile cloud computing principles and methodologies. Users can store their data remotely and access high-quality on-demand cloud apps in the Mobile Cloud environment, eliminating the need to purchase and maintain local hardware and software. These data security vulnerabilities can be remedied with sound data processing. While storing data on the cloud, the cloud service provider can secure the data by using encryption and decryption techniques. This paper suggested encryption and decryption methods for safeguarding data in the cloud. Due to the encrypted format, confidential data cannot be accessed by an unauthorized person or machine.
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 1,, 2021
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environme... more Traditional internet QoS protocols like RSVP cannot be easily
migrated to the wireless environment due to the error-prone
nature of wireless links and the high mobility of mobile devices.
The Internet Engineering Task Force (IETF), the body
responsible for guiding the evolution of the Internet, provides the
definition as given below: A mobile ad hoc network (MANET) is
an autonomous system of mobile routers (and associated hosts)
connected by wireless links. The routers are free to move
randomly and organize themselves arbitrarily; thus, the network’s
wireless topology may change rapidly and unpredictably. Such a
network may operate in a stand-alone fashion, or may be
connected to the larger Internet. QoS is usually defined as a set
of service requirements that needs to be met by the network
while transporting a packet stream from a source to its
destination. The network is expected to guarantee a set of
measurable pre-specified service attributes to the users in terms
of end-to-end performance, such as delay, bandwidth, probability
of packet loss, delay variance (jitter), etc
Processes: MDPI, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
International Journal of Cooperative Information Systems, Vol. 32, No. 01n02, 2250002 , 2023
This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optim... more This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optimization algorithm based on mobile cloud computing to protect data from any assault. Mobile users who use protected mobile cloud computing (Mobi-Cloud) must trust the cloud service provider to keep the data sent from their mobile devices safe when mobile users express strong reservations about storing personal information in the public cloud. The Greedy Chemical Reaction Optimization (G-CRO) algorithm reduces critical limitations by determining the offloading end with motion at run time, i.e., the task's operating time, CPU usage, memory utilization, and energy usage. The experimental results show that the proposed method performs better in terms of file uploading time, file downloading time, memory usage in file uploading, memory usage in file downloading, encryption time, decryption time, memory usage on file encryption, memory usage on file decryption, security levels, and key generation time. Compared to the Proxy Re-Encryption (PRE) algorithm, the suggested method consumes less time for key creation (26.04).
International Journal of Advanced Research in Computer and Communication Engineering Vol. 2, Issue 6, June 2013, 2013
Tracking of mobile node in WSNs (Wireless Sensor Networks) is an active topic of research and man... more Tracking of mobile node in WSNs (Wireless Sensor Networks) is an active topic of research and many techniques in WSNs have been proposed. Among the proposed techniques, the popular approach is RSS (Received Signal Strength) and is useful in estimating the distance because it is simple and no extra hardware is required. In this paper, a method that uses RSSI approach is presented to locate the position of mobile node (node that is moving in WSN in Static 2D and Dynamic 2D environment and are not aware of its position in the network) among the other Positioned Nodes or Anchor Nodes in the network. The distance between mobile node and the Anchor Node is estimated by measuring the RSSI (received signal strength indicator). Anchor Nodes are positioned at the vertices of square and mobile node is moving randomly inside the square. The goal is to track the location of mobile node by applying Heron's Formula on the triangles formed inside the square.
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878 (Online), Volume-1 Issue-2, , 2012
In this we propose a new method to reduce noise in digital image. Image corrupted by Gaussian Noi... more In this we propose a new method to reduce noise in digital image. Image corrupted by Gaussian Noise is still a classical problem. In images to reduce the noise or to improve the quality of image peak signal to noise ratio (PSNR) is compared. Higher the PSNR better the quality of the image.In this paper we explain the method curvelet Transformation using log gabor filter Experimental results show that our method gives comparatively higher peak signal to noise ratio (PSNR), are much more efficient and have less visual artifacts compared to other methods.
IJCEM International Journal of Computational Engineering & Management, Vol. 13, July 2011, 2011
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environmen... more Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environment due to the error-prone nature of wireless links and the high mobility of mobile devices. The Internet Engineering Task Force (IETF), the body responsible for guiding the evolution of the Internet, provides the definition as given below: A mobile ad hoc network (MANET) is an autonomous system of mobile routers (and associated hosts) connected by wireless links. The routers are free to move randomly and organize themselves arbitrarily; thus, the network's wireless topology may change rapidly and unpredictably. Such a network may operate in a stand-alone fashion, or may be connected to the larger Internet. QoS is usually defined as a set of service requirements that needs to be met by the network while transporting a packet stream from a source to its destination. The network is expected to guarantee a set of measurable pre-specified service attributes to the users in terms of end-to-end performance, such as delay, bandwidth, probability of packet loss, delay variance (jitter), etc.
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-3,, 2019
Cloud computing gives part of advantages to endeavors to offload their information and software s... more Cloud computing gives part of advantages to
endeavors to offload their information and software services to
cloud administrations by saving them lot of money that must be
spent on foundation setup cost. Despite that, while offloading the
information privacy and protection is a vital concern.
Correspondingly for example when the emergency clinics and
medicinal services association transfer their patient's subtleties to
cloud and when the information is included, it will influence the
protection of the patients. So privacy is a vital concern while
offloading the information to cloud. Most of solutions for privacy
depend on encryption and information to be offloaded is encoded
and put away in cloud. Lots of encryption techniques like
cryptography, symmetric key etc. methods are used for encrypting
the information before uploading to cloud. However, the reaction
in this encryption system is that, the encrypted information isn't
structure preserving and it is not suitable for ranking or
searching. To solve the complications of this searching and
ranking due to disordering a homomorphism encryption based
mechanism is proposed but this solution also suffers from the
problem of integrity attacks on result. So this paper discussed the
enhancement of the homomorphism encryption based mechanism
by solving the integrity problems effectively.
Springer:Communications in Computer and Information Science, 2019
Abstract. MCC integrates cloud computing services into the mobile environment that helps users to... more Abstract. MCC integrates cloud computing services into the mobile environment that helps users to improve performance by utilizing battery life and
storage of devices. When mobile data is stored on cloud rather than in mobile
phone storage then less memory and less battery will be consumed by mobile
phone and it will helps to increases the performance of data transmission but at
same time it violates security of data. As data is transmitted from mobile to
cloud at the mean time there are lots of attackers presented in open environment
that may access or harm the data. To overcome this kind of hazards it is
necessary to propose a mechanism that provides secure data transmission in
MCC. In this paper an attempt has been made to perform assessment on different
security threats and their prevention models with different scenarios. This paper
is divided into six sections. Section 1 presents introduction of mobile cloud
computing (mcc), Sect. 2 covers deployment models of mcc, in Sect. 3 service
models of mcc has been discussed, Sect. 4 presents different kinds of attacks in
mcc environment, in Sect. 5 covers related work of different research papers that
presents security issues and detection techniques in mcc, in Sect. 6 conclusion of
paper has been discussed.
International Journal of Innovative Technology and Exploring Engineering, 2019
Mobile cloud computing is a rapidly evolving technology these days and it faces major problems of... more Mobile cloud computing is a rapidly evolving technology these days and it faces major problems of load imbalance due to the high demand for mobile applications. There are many techniques to solve the problem, but the user can improve load by using a more optimized solution. This research deals with the VM allocation and migration by means of location awareness. The research paper also presents a user authentication and server load management system to reduce the overload of the server. A captcha based authentication mechanism is also presented for user verification. The concept of Feedback is also introduced for the mobile servers. This concept makes the selection of mobile server for the job list. ANN (Artificial neural network) is used for location awareness judgment. ANN is a machine learning approach, which is used to minimize the human effort and also minimize the processing time to allocate job to an accurate server with minimum SLA violation. MBFD (Mobile best fit decreasing) algorithm is used for the VM allocation and selection policy. This research has considered SLA (Service level agreement) violation and energy consumption to compute the performance of the work with an aim of reducing energy consumption with maximized resource efficiency. The proposed work model is also compared with the work presented by Xiong in the same area.
https://ieeexplore.ieee.org/document/8748761, 2018
MCC (Mobile cloud computing) is a growing technology which obtained enhanced popularity due to th... more MCC (Mobile cloud computing) is a growing technology which obtained enhanced popularity due to the production and large-scale compilation of personal individual data. Nevertheless, novel security problems occur while MCC provides big data analysis with management services. MCC combines the cloud computing into the smart phone environment and hence overcome the barrier such as battery life, storage and bandwidth. In this paper, we are providing the survey of MCC that is useful to the reader to understand the definition, general overview. The advantages, challenges, and security issues are discussed. The communication protocol named as end to end along with their two types viz. TCP/IP (Transmission control protocol/internet protocol) with UDP (User datagram protocol) protocols are presented along with their properties, limitations and challenges. The concept of load balancing used in MCC is also discussed. At the last, the results analysis is given on the basis of two parameters named as energy consumption and resource utilization for different load condition.
International Journal of Engineering Trends and Technology (IJETT) - Volume4Issue4- , 2013
Wireless Sensor Network is a type of wireless network which consists of a collection of tiny devi... more Wireless Sensor Network is a type of wireless network which consists of a collection of tiny device called sensor node. Wireless Sensor Network is one of the rapidly developing areas. Applications of Wireless Sensor Network includes remote environmental monitoring, target tracking, etc. Various algorithms are proposed in 2D for location tracking which provides accuracy but in the real world, we require all the three planes for correct estimation and more accuracy in localization. The 2D works on flat terrain but we need to position WSN in harsh terrain also, so we need an algorithm in 3D that provide better accuracy and decrease the error of estimation and provide a real world view also. The goal of our survey is to present the localization techniques of node.
AIP Conference Proceedings 2760, 020019, 2023
Cloud computing is a promising new technology that is revolutionizing the old Internet computing ... more Cloud computing is a promising new technology that is revolutionizing the old Internet computing paradigm and the entire IT sector. Customers and many firms, such as Apple, Google, Facebook, and Amazon, are increasingly adopting mobile cloud computing technology. Because of the rapid advancements in wireless access technologies, cloud computing is expected to grow in the mobile environment. These mobile apps are based on mobile cloud computing principles and methodologies. Users can store their data remotely and access high-quality on-demand cloud apps in the Mobile Cloud environment, eliminating the need to purchase and maintain local hardware and software. These data security vulnerabilities can be remedied with sound data processing. While storing data on the cloud, the cloud service provider can secure the data by using encryption and decryption techniques. This paper suggested encryption and decryption methods for safeguarding data in the cloud. Due to the encrypted format, confidential data cannot be accessed by an unauthorized person or machine.
(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 12, No. 1,, 2021
Traditional internet QoS protocols like RSVP cannot be easily migrated to the wireless environme... more Traditional internet QoS protocols like RSVP cannot be easily
migrated to the wireless environment due to the error-prone
nature of wireless links and the high mobility of mobile devices.
The Internet Engineering Task Force (IETF), the body
responsible for guiding the evolution of the Internet, provides the
definition as given below: A mobile ad hoc network (MANET) is
an autonomous system of mobile routers (and associated hosts)
connected by wireless links. The routers are free to move
randomly and organize themselves arbitrarily; thus, the network’s
wireless topology may change rapidly and unpredictably. Such a
network may operate in a stand-alone fashion, or may be
connected to the larger Internet. QoS is usually defined as a set
of service requirements that needs to be met by the network
while transporting a packet stream from a source to its
destination. The network is expected to guarantee a set of
measurable pre-specified service attributes to the users in terms
of end-to-end performance, such as delay, bandwidth, probability
of packet loss, delay variance (jitter), etc
Processes: MDPI, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
International Journal of Cooperative Information Systems, Vol. 32, No. 01n02, 2250002 , 2023
This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optim... more This paper uses the chaotic fuzzy encryption (CFE) technique and a greedy chemical reaction optimization algorithm based on mobile cloud computing to protect data from any assault. Mobile users who use protected mobile cloud computing (Mobi-Cloud) must trust the cloud service provider to keep the data sent from their mobile devices safe when mobile users express strong reservations about storing personal information in the public cloud. The Greedy Chemical Reaction Optimization (G-CRO) algorithm reduces critical limitations by determining the offloading end with motion at run time, i.e., the task's operating time, CPU usage, memory utilization, and energy usage. The experimental results show that the proposed method performs better in terms of file uploading time, file downloading time, memory usage in file uploading, memory usage in file downloading, encryption time, decryption time, memory usage on file encryption, memory usage on file decryption, security levels, and key generation time. Compared to the Proxy Re-Encryption (PRE) algorithm, the suggested method consumes less time for key creation (26.04).