Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Atul Mishra is active.

Publication


Featured researches published by Atul Mishra.


ieee international conference on cloud computing technology and science | 2014

Application of Selective Algorithm for Effective Resource Provisioning In Cloud Computing Environment

Mayanka Katyal; Atul Mishra

Modern day continued demand for resource hungry services and applications in IT sector has led to development of Cloud computing. Cloudcomputing environment involves high cost infrastructure on one hand and need high scale computational resources on the other hand. These resources need to be provisioned (allocation and scheduling) to the end users in most efficient manner so that the trem endous capabilities of cloud are utilized effectively and efficiently. In this paper we discuss a selective algorithm for allocation of cloud resources to end -users on-demand basis. This algorithm is based on min -min and max-min algorithms. These are two c onventional task scheduling algorithm. The selective algorithm uses certain heuristics to select between the two algorithms so that overall makespan of tasks on the machines is minimized. The tasks are scheduled on machines in either space shared or timeshared manner. We evaluate our provisioning heuristics using a cloud simulator, called CloudSim. We also compared our approach to the statistics obtained when provisioning of resources was done in First -Cum-FirstServe(FCFS) manner. The experimental result s show that overall makespan of tasks on given set of VMs minimizes significantly in different scenarios.


International Journal of Computer Applications | 2013

Implementing Edge Detection for Detecting Neurons from Brain to Identify Emotions

Madhulika; Abhay Bansal; Amandeep; Madhurima; Amr A. Nagy; Gamal M. Abdel-hamid; Ahmed E. Abdalla; K. Prabhu; V. Murali Bhaskaran; Veena Garg; Atul Srivastava; Atul Mishra; Suchitra Khoje; Shrikant Bodhe; Daniel Cleland; Chi Shen; Parikshit Kishor Singh; Surekha Bhanot; Hare Krishna Mohanta; Mohammad Sadeq Garshasbi; Mehdi Effatparvar

Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodology. Edge detection is a basic and important subject in computer vision and image processing In this Paper we discuss several Digital Image Processing Techniques applied in edge feature extraction. Firstly, Linear filtering of Image is done is used to remove noises from the image collected. Secondly, some edge detection operators such as Sobel, Log edge detection, canny edge detection are analyzed and then according to the simulation results, the advantages and disadvantages of these edge detection operators are compared. It is shown that the canny operator can obtain better edge feature. Finally, Edge detection is applied to identify neurons in Brain. After this the Neurons are classified and feature vector will be calculated. KeywordsFilters, Sobel, Canny, Log, Distortion, Edge Detection Introduction (Heading 1)


International Journal of Computer Applications | 2014

A Conceptual Overview of Energy Consumption based Routing protocol - ECBR

Ashish Kumar Srivastava; Atul Mishra; Shraddha Upadhyay

on limited energy within an Ad-hoc network requires a strong communication channel. In this paper, we are trying to propose a new routing protocol which is based on Energy consumption for mobile ad-hoc networks. Since MANET is an infrastructure less network, so the nodes form the network from which they do the communication and message passing. Each nodes itself act as router. Energy is consumed in sending or receiving the packets between the nodes. Here we are measuring the Energy consumption in different states and adding a new Energy consumption field in Routing Table as well. Energy consumption based Routing (ECBR) protocol is thus a new benchmark in which the routing will consider the energy consumption for selecting the path. Doing so will reduce the chances of network failure. We show that mechanism is stable, counter-active, reliable and fair. KeywordsQoS, MANET, Routing.


International Journal of Computer Applications | 2012

An Analysis of Management Cost for Mobile Agent Based Network Management Model

Atul Mishra; Atul Sharma; Ashok Madan

Client/Server based network management models involve the transmission of large amount of management data towards the centralized management station for processing. The staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of such management applications. In this sense, use of mobile agents offer many possibilities for designing the next generation of distributed network management systems. This paper discusses various mobile agent based network management models, the key advantages of mobile agents in the distributed network management systems and presents a mathematical model for the purpose of comparing client/server vs. mobile agent paradigms in terms of responsiveness and traffic generated around management station. Further, the existing mobile agent based systems follow arbitrary itinerary wherein it is susceptible to travel on the links which might incur high bandwidth utilization & greater roundtrip time. In this work a minimum spanning tree is constructed for the network represented as undirected graph. The itinerary obtained thereof is followed by the MA agents resulting in reduced bandwidth utilization and shorter roundtrip time.


International Journal of Computer Applications | 2013

Distributed Network Management Architectures: A Review

Anish Saini; Atul Mishra; A.K.Sharma

Network management system leads to centralized system based on SNMP or CMIP management protocol, which does not solve the problem of scalability and flexibility. So a distributed paradigm is followed to make the system decentralized to perform management functions when network start growing significantly. Several distributed management architectures including mobile agent technology, have been recently proposed to answer the scalability limitations of centralized models and the flexibility problems of different network models. Mobile agents decentralize processing and control thereby reducing the management traffic around the management station and distribute processing load. This paper discusses and analyzes the role of mobile agent and compares the network parameters for different models.


international conference on contemporary computing | 2014

Orchestration of cloud computing virtual resources

Mayanka Katyal; Atul Mishra

Cloud computing is a hotly debated and researched topic amongst all group of users ranging from industry to academia. It has highly raised the expectations of small, medium and large enterprises beyond measure. Many organizations have migrated to cloud. The progressive use of cloud resources in the entire IT sector urged the need for better management of cloud infrastructure. Cloud infrastructure needs most efficient management techniques to cater to increasingly growing demands of users. Cloud computing has evolved tremendously and is still constantly undergoing changes. This paper gives the overview of cloud orchestration software along with their features.


International Journal of Computer Applications | 2013

Obscuring Mobile Agents by Source Code Obfuscation

Veena Garg; Atul Srivastava; Atul Mishra

Security and performance are most essential and prime challenges for networking phenomenon. Computation on the remote host is generally done through links. Thus security is needed when the code is on the way to the destination host. A program travelling over the link is extremely venerable to be forged for malfunctioning. On the other hand Software’s are commonly distributed with all information in the code itself, for example java byte codes. Byte codes are easy to reverse engineer. Any rival company may get the algorithms and techniques used in the product. Therefore a protection is needed to keep information secret. In both the cases obfuscation seem to be promising solution to the problem. Obfuscation makes code less understandable without changing its functionality. In this paper we have proposed an obfuscator that converts source code of a mobile agent into unintelligible code. Whole paper mainly focuses on obfuscating mobile agents whereas the technique can be used for any software obfuscation.


international conference on communication systems and network technologies | 2012

Application of Mobile Agent in Distributed Network Management

Atul Mishra; A.K.Sharma

Current management models based on client/server suffer from scalability and flexibility problems. Furthermore, the staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of the management applications. In this sense, use of mobile agents offer many possibilities for designing the next generation of distributed network management systems by reducing the management traffic around the management station and distribute processing load.. This paper discusses various mobile agent based network management models, the key advantages of mobile agents in the distributed network management systems and presents a mathematical model for the purpose of comparing client/server vs. mobile agent paradigms in terms of responsiveness and traffic generated around management station.


arXiv: Distributed, Parallel, and Cluster Computing | 2014

A Comparative Study of Load Balancing Algorithms in Cloud Computing Environment.

Mayanka Katyal; Atul Mishra


foundations of computer science | 2014

A SCALABLE, LEXICON BASED TECHNIQUE FOR SENTIMENT ANALYSIS

Chetan Kaushik; Atul Mishra

Collaboration


Dive into the Atul Mishra's collaboration.

Top Co-Authors

Avatar

Mayanka Katyal

YMCA University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

A.K.Sharma

YMCA University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Atul Sharma

Indian Institute of Technology Bombay

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hare Krishna Mohanta

Birla Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar

Parikshit Kishor Singh

Birla Institute of Technology and Science

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Suchitra Khoje

Symbiosis International University

View shared research outputs
Top Co-Authors

Avatar

Surekha Bhanot

Birla Institute of Technology and Science

View shared research outputs
Researchain Logo
Decentralizing Knowledge