Presently, the Internet of Things (IoT) is playing an important role in data gathering and submit... more Presently, the Internet of Things (IoT) is playing an important role in data gathering and submitting information to different data analysis engines for most of the real-world applications. However, IoT applications have a danger of information theft or manipulation by malicious attacks which lead to a wrong conclusion or result. Therefore, malicious attacks are to be taken care of by using some means like prediction dynamics of malicious objects in IoT. In this manuscript, the behavior of malicious objects in the IoT network is studied with the help of two deterministic models. These models are working like the pre-predator model in IoT networks where prey consists of infected and uninfected nodes, whereas, the predator consists of malicious objects. Besides, the time delay is not much real in the spread of infection in networks due to the chaotic nature of the malicious object's outbursts, and therefore, these models are explored with delay differential equation modeling. Stoc...
3 Abstract: The potential of the internet economy demands newer business models and all-round inf... more 3 Abstract: The potential of the internet economy demands newer business models and all-round information systems. The cross-enterprise business process requires high co-ordination of the customers and the suppliers, taking less time and high outcomes. To exploit this potential of the internet economy, companies are involved in a painstaking process of designing its information systems for future development. A variety
International Journal of Sensors, Wireless Communications and Control
: Security and trsut are the two major issues in current banking systems. There are mainly three ... more : Security and trsut are the two major issues in current banking systems. There are mainly three types of banking which includes traditional banking, online banking, and mobile banking. Appropriate securities in the banking systems must be in place for reliability and trust of the customers. In this paper, we formulate a model that represents a means for detecting and describing the transmission of malicious objects through various individual nodes in banking systems. Proposed model can help in understanding the mechanism by which malicious object spread, to predict the future course of an outbreak and to evaluate the strategies to control. In addition, a trust model for the banking system in online or offline modes is also provided. This depicts how to maintain Trust in the banking system in different scenarios.
International Journal of Ambient Computing and Intelligence
Fog computing is a set of mobile cloudlets which can fulfil the demand of the user who is already... more Fog computing is a set of mobile cloudlets which can fulfil the demand of the user who is already considered a mobile job in this architecture. The main aim of Fog computing is to provide the user with an optimal solution which is quick and cost-efficient. This article focuses on a load balancing mechanism for cloudlets along with keeping the cost-effectiveness as an optimal selection parameter. This article utilizes the Artificial Bee Colony (ABC) in order to prioritize the user demand using a fitness function. This work evaluates quality of service (QoS) parameters such as schedule length runtime (SLR), schedule length vm ratio (SLVMR), energy consumed (EC) and energy consumption ratio (ECR) and shows the effectiveness of proposed work.
International Journal of Information Security and Privacy
To increase the availability of the resources and simultaneously to reduce the energy consumption... more To increase the availability of the resources and simultaneously to reduce the energy consumption of data centers by providing a good level of the service are one of the major challenges in the cloud environment. With the increasing data centers and their size around the world, the focus of the current research is to save the consumption of energy inside data centers. Thus, this article presents an energy-efficient VM placement algorithm for the mapping of virtual machines over physical machines. The idea of the mapping of virtual machines over physical machines is to lessen the count of physical machines used inside the data center. In the proposed algorithm, the problem of VM placement is formulated using a non-dominated sorting genetic algorithm based multi-objective optimization. The objectives are: optimization of the energy consumption, reduction of the level of SLA violation and the minimization of the migration count.
International Journal of Information Security and Privacy
Over the past few years, several software clone detection tools and techniques have been introduc... more Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.
Presently, the Internet of Things (IoT) is playing an important role in data gathering and submit... more Presently, the Internet of Things (IoT) is playing an important role in data gathering and submitting information to different data analysis engines for most of the real-world applications. However, IoT applications have a danger of information theft or manipulation by malicious attacks which lead to a wrong conclusion or result. Therefore, malicious attacks are to be taken care of by using some means like prediction dynamics of malicious objects in IoT. In this manuscript, the behavior of malicious objects in the IoT network is studied with the help of two deterministic models. These models are working like the pre-predator model in IoT networks where prey consists of infected and uninfected nodes, whereas, the predator consists of malicious objects. Besides, the time delay is not much real in the spread of infection in networks due to the chaotic nature of the malicious object's outbursts, and therefore, these models are explored with delay differential equation modeling. Stoc...
3 Abstract: The potential of the internet economy demands newer business models and all-round inf... more 3 Abstract: The potential of the internet economy demands newer business models and all-round information systems. The cross-enterprise business process requires high co-ordination of the customers and the suppliers, taking less time and high outcomes. To exploit this potential of the internet economy, companies are involved in a painstaking process of designing its information systems for future development. A variety
International Journal of Sensors, Wireless Communications and Control
: Security and trsut are the two major issues in current banking systems. There are mainly three ... more : Security and trsut are the two major issues in current banking systems. There are mainly three types of banking which includes traditional banking, online banking, and mobile banking. Appropriate securities in the banking systems must be in place for reliability and trust of the customers. In this paper, we formulate a model that represents a means for detecting and describing the transmission of malicious objects through various individual nodes in banking systems. Proposed model can help in understanding the mechanism by which malicious object spread, to predict the future course of an outbreak and to evaluate the strategies to control. In addition, a trust model for the banking system in online or offline modes is also provided. This depicts how to maintain Trust in the banking system in different scenarios.
International Journal of Ambient Computing and Intelligence
Fog computing is a set of mobile cloudlets which can fulfil the demand of the user who is already... more Fog computing is a set of mobile cloudlets which can fulfil the demand of the user who is already considered a mobile job in this architecture. The main aim of Fog computing is to provide the user with an optimal solution which is quick and cost-efficient. This article focuses on a load balancing mechanism for cloudlets along with keeping the cost-effectiveness as an optimal selection parameter. This article utilizes the Artificial Bee Colony (ABC) in order to prioritize the user demand using a fitness function. This work evaluates quality of service (QoS) parameters such as schedule length runtime (SLR), schedule length vm ratio (SLVMR), energy consumed (EC) and energy consumption ratio (ECR) and shows the effectiveness of proposed work.
International Journal of Information Security and Privacy
To increase the availability of the resources and simultaneously to reduce the energy consumption... more To increase the availability of the resources and simultaneously to reduce the energy consumption of data centers by providing a good level of the service are one of the major challenges in the cloud environment. With the increasing data centers and their size around the world, the focus of the current research is to save the consumption of energy inside data centers. Thus, this article presents an energy-efficient VM placement algorithm for the mapping of virtual machines over physical machines. The idea of the mapping of virtual machines over physical machines is to lessen the count of physical machines used inside the data center. In the proposed algorithm, the problem of VM placement is formulated using a non-dominated sorting genetic algorithm based multi-objective optimization. The objectives are: optimization of the energy consumption, reduction of the level of SLA violation and the minimization of the migration count.
International Journal of Information Security and Privacy
Over the past few years, several software clone detection tools and techniques have been introduc... more Over the past few years, several software clone detection tools and techniques have been introduced by numerous researchers. The software clone detection techniques and tools are based on their numerous attributes and sub-attributes which make them difficult to complete a comparative study. Therefore, the authors propose a mutation operator-based editing taxonomy for generating different software clone types. In addition, a hypothetical scenario is developed using mutation operator-based editing taxonomy and this hypothetical scenario is used to evaluate various software clone detection techniques and tools. Further, the existing evaluation criterion is extended by the hypothetical scenario which is clearly represented by the analysis of results.
Uploads
Papers by Hemraj Saini