Atul Mishra
YMCA University of Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Atul Mishra.
ieee international conference on cloud computing technology and science | 2014
Mayanka Katyal; Atul Mishra
Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloudcomputing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to the end users in most efficient manner so that the trem endous capabilities of cloud are utilized effectively and efficiently. In this paper we discuss a selective algorithm for allocation of cloud resources to end -users on-demand basis. This algorithm is based on min -min and max-min algorithms. These are two c onventional task scheduling algorithm. The selective algorithm uses certain heuristics to select between the two algorithms so that overall makespan of tasks on the machines is minimized. The tasks are scheduled on machines in either space shared or timeshared manner. We evaluate our provisioning heuristics using a cloud simulator, called CloudSim. We also compared our approach to the statistics obtained when provisioning of resources was done in First -Cum-FirstServe(FCFS) manner. The experimental result s show that overall makespan of tasks on given set of VMs minimizes significantly in different scenarios.
International Journal of Computer Applications | 2013
Madhulika; Abhay Bansal; Amandeep; Madhurima; Amr A. Nagy; Gamal M. Abdel-hamid; Ahmed E. Abdalla; K. Prabhu; V. Murali Bhaskaran; Veena Garg; Atul Srivastava; Atul Mishra; Suchitra Khoje; Shrikant Bodhe; Daniel Cleland; Chi Shen; Parikshit Kishor Singh; Surekha Bhanot; Hare Krishna Mohanta; Mohammad Sadeq Garshasbi; Mehdi Effatparvar
Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodology. Edge detection is a basic and important subject in computer vision and image processing In this Paper we discuss several Digital Image Processing Techniques applied in edge feature extraction. Firstly, Linear filtering of Image is done is used to remove noises from the image collected. Secondly, some edge detection operators such as Sobel, Log edge detection, canny edge detection are analyzed and then according to the simulation results, the advantages and disadvantages of these edge detection operators are compared. It is shown that the canny operator can obtain better edge feature. Finally, Edge detection is applied to identify neurons in Brain. After this the Neurons are classified and feature vector will be calculated. KeywordsFilters, Sobel, Canny, Log, Distortion, Edge Detection Introduction (Heading 1)
International Journal of Computer Applications | 2014
Ashish Kumar Srivastava; Atul Mishra; Shraddha Upadhyay
on limited energy within an Ad-hoc network requires a strong communication channel. In this paper, we are trying to propose a new routing protocol which is based on Energy consumption for mobile ad-hoc networks. Since MANET is an infrastructure less network, so the nodes form the network from which they do the communication and message passing. Each nodes itself act as router. Energy is consumed in sending or receiving the packets between the nodes. Here we are measuring the Energy consumption in different states and adding a new Energy consumption field in Routing Table as well. Energy consumption based Routing (ECBR) protocol is thus a new benchmark in which the routing will consider the energy consumption for selecting the path. Doing so will reduce the chances of network failure. We show that mechanism is stable, counter-active, reliable and fair. KeywordsQoS, MANET, Routing.
International Journal of Computer Applications | 2012
Atul Mishra; Atul Sharma; Ashok Madan
Client/Server based network management models involve the transmission of large amount of management data towards the centralized management station for processing. The staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of such management applications. In this sense, use of mobile agents offer many possibilities for designing the next generation of distributed network management systems. This paper discusses various mobile agent based network management models, the key advantages of mobile agents in the distributed network management systems and presents a mathematical model for the purpose of comparing client/server vs. mobile agent paradigms in terms of responsiveness and traffic generated around management station. Further, the existing mobile agent based systems follow arbitrary itinerary wherein it is susceptible to travel on the links which might incur high bandwidth utilization & greater roundtrip time. In this work a minimum spanning tree is constructed for the network represented as undirected graph. The itinerary obtained thereof is followed by the MA agents resulting in reduced bandwidth utilization and shorter roundtrip time.
International Journal of Computer Applications | 2013
Anish Saini; Atul Mishra; A.K.Sharma
Network management system leads to centralized system based on SNMP or CMIP management protocol, which does not solve the problem of scalability and flexibility. So a distributed paradigm is followed to make the system decentralized to perform management functions when network start growing significantly. Several distributed management architectures including mobile agent technology, have been recently proposed to answer the scalability limitations of centralized models and the flexibility problems of different network models. Mobile agents decentralize processing and control thereby reducing the management traffic around the management station and distribute processing load. This paper discusses and analyzes the role of mobile agent and compares the network parameters for different models.
international conference on contemporary computing | 2014
Mayanka Katyal; Atul Mishra
Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many organizations have migrated to cloud. The progressive use of cloud resources in the entire IT sector urged the need for better management of cloud infrastructure. Cloud infrastructure needs most efficient management techniques to cater to increasingly growing demands of users. Cloud computing has evolved tremendously and is still constantly undergoing changes. This paper gives the overview of cloud orchestration software along with their features.
International Journal of Computer Applications | 2013
Veena Garg; Atul Srivastava; Atul Mishra
Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning. On the other hand Software’s are commonly distributed with all information in the code itself, for example java byte codes. Byte codes are easy to reverse engineer. Any rival company may get the algorithms and techniques used in the product. Therefore a protection is needed to keep information secret. In both the cases obfuscation seem to be promising solution to the problem. Obfuscation makes code less understandable without changing its functionality. In this paper we have proposed an obfuscator that converts source code of a mobile agent into unintelligible code. Whole paper mainly focuses on obfuscating mobile agents whereas the technique can be used for any software obfuscation.
international conference on communication systems and network technologies | 2012
Atul Mishra; A.K.Sharma
Current management models based on client/server suffer from scalability and flexibility problems. Furthermore, the staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of the management applications. In this sense, use of mobile agents offer many possibilities for designing the next generation of distributed network management systems by reducing the management traffic around the management station and distribute processing load.. This paper discusses various mobile agent based network management models, the key advantages of mobile agents in the distributed network management systems and presents a mathematical model for the purpose of comparing client/server vs. mobile agent paradigms in terms of responsiveness and traffic generated around management station.
arXiv: Distributed, Parallel, and Cluster Computing | 2014
Mayanka Katyal; Atul Mishra
foundations of computer science | 2014
Chetan Kaushik; Atul Mishra