Dinesh Goyal
Gyanvihar University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dinesh Goyal.
international conference on contemporary computing | 2016
Yojna Arora; Dinesh Goyal
In the current scenario, data is considered to be the biggest assets. One who has maximum relevant data is considered to be rich in the information industry. But only the collection of data is not enough, it needs to be analyzed. This huge amount of data which is termed ass Big Data cannot be analyzed by traditional tools and techniques, rather it requires more advanced Techniques which can make data retrieval, management and storage much faster are required. In this paper an introduction to big data is explained along with a detailed comparative study of various Big Data techniques which have already been implemented. At the end various issues which still exist are enlisted.
IOSR Journal of Computer Engineering | 2014
Pramod Kumar; Dinesh Goyal
Audio streaming has been a major application, which has become popular in past few years especially amongst youth both in professional and personal lives. Various organizations to develop and deploy their own cloud, and their meeting most of them are in the same cloud, holding a variety of audio codecs to be used for real-time streaming. The concept of cloud computing has been proposed from the device to the cloud computing power, storage, and security unloading resource requirements. Internet audio applications such as real-time streaming is expected to be ubiquitous in the cloud users, they often encounter a diverse range of wireless access technology, wireless networks, roaming and in their closed position and support the work of the deployment. FLAC, MP3 and WAV streams are used for real-time streaming. In this paper, we analyze the various quality parameters, FLAC, MP3 and WAV format audio streams in different environmental conditions, they deliver quality performance
Archive | 2018
Amit Kumar Gupta; Narendra Singh Yadav; Dinesh Goyal
Modern computer system is organized with multi-core processing system. The scheduling of processes in multiprocessing may turn into more complex task. In multi-core processing system, there are two or more cores embedded into a single chip. This architecture provides more efficiency in terms of throughput than single processor architecture. Previously, most of the work has been done in creating new scheduling algorithms for multi-core processing system, but small consideration has been given to merge user priority and system priority. In this paper, researcher has proposed Smart Job First Dynamic Round Robin Algorithm with smart Time Quantum (SJFDRR) in multi-core processing system in which a smart priority factor (SPF) is calculated for each process. The process which has lowest value of SPF is scheduled first. The time quantum is calculated dynamically for each processor. By this algorithm the average waiting time and average turnaround time and context switch is significantly decreases which lead to increase in performance of the system.
Archive | 2018
Jyoti Prabha; Dinesh Goyal; Savita Shivani; Amit Sanghi
As in MANETs the infrastructure is not present they are more vulnerable for attack which encourages the attacker nodes to become part of the network. A lot of efficient protocols have been proposed in this field. All of these routing protocols depend only in the conviction and supportive environment. Conjunct Black hole attack is a network layer attack in which the malicious node makes use of routing protocol to pretend that it has the shortest path for the destination. In our research work we proposed a protocol, using RSA algorithm to eliminate Conjunct Black hole attack, even comparison with the DSR protocol is shows by the effects of the performance metrics in terms of delay and throughput of the network in the AD Hoc network environment.
Journal of Statistics and Management Systems | 2018
Pankaj Dadheech; Dinesh Goyal; Sumit Srivastava; C. M. Choudhary
Abstract The web is being used more and more by users of mobile devices. In addition, it is increasingly possible to track the user’s location, which provides immense opportunities in geospatial data and its management. Due to the use of location information in services for each mobile device, a large size of spatial data makes it difficult to process spatial queries efficiently and, therefore, we need a lightweight and scalable approach to process large amounts of stored data in distributed file systems. For the most part, all SNSs (social network services) focus on connecting the user account with their location information, such as check-in services, which helps them collect information about user activities and ratings. Of location, but also increases the load of data on their servers. . In this article we propose an indexing technique in combination with efficient processing of Boolean top-k spatial queries where location data is compressed to save space and the Boolean query helps filter results so that unrelated data is not processed, what helps to save space and faster processing of queries.
computational intelligence | 2017
Jyoti Prabha Singh; Dinesh Goyal; Savita Shiwani; Vishal Gaur
Mobile Ad hoc Network is setup through different individual moving nodes that are the self assertive in the spots without any system foundation. In this kind of network the nodes come in the mobility scope of each other for the communication. Due to lack of infrastructure, impulsive changing topology or open medium, ad hoc network is more vulnerable for attack and provide vulnerabilities for the attacker to become a part of it. To prevent security of mobile ad hoc network various security measures are designed for the riddance of different types of attack. Gray Hole is one type of Denial of Service attack (DOS) that airs a great threat to the ad hoc network environment. For the elimination of Gray Hole, we have proposed a packet update scheme and even advise the elimination scheme by discovering all the malicious nodes. The different performance measurements for network parameters are considered such as throughput and delay.
International Journal of Multimedia Data Engineering and Management | 2017
Amit Kumar Gupta; Narendra Singh Yadav; Dinesh Goyal
Multilevel feedback queue scheduling MLFQ algorithm is based on the concept of several queues in which a process moves. In earlier scenarios there are three queues defined for scheduling. The two higher level queues are running on Round Robin scheduling and last level queue is running on FCFS First Come First Serve. A fix time quantum is defined for RR scheduling and scheduling of process depends upon the arrival time in ready queue. Previously a lot of work has been done in MLFQ. In our propose algorithm Smart Job First Multilevel feedback queue SJFMLFQ with smart time quantum STQ, the processes are arranged in ascending order of their CPU execution time and calculate a Smart Priority Factor SPF on which processes are scheduled in queue. The process which has lowest SPF value will schedule first and the process which has highest SF value will schedule last in queue. Then a smart time quantum STQ is calculated for each queue. As a result, we found decreasing in turnaround time, average waiting time and increasing throughput as compared to the previous approaches and hence increase in the overall performance.
International Journal of Advanced Computer Science and Applications | 2016
Manoj Kumar Ramaiya; Suresh Gyan; Dinesh Goyal; Naveen Hemrajani
The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc. Both techniques provides the sufficient degree of security but are vulnerable to intruder’s attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to pre-processing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.
IJCA Proceedings on International Conference on Computer Communication and Networks CSI-COMNET-2011 | 2012
Lalit Kishor; Dinesh Goyal; Rajendra Singh; Praveen Sharma
Archive | 2013
Lalit Kishor; Dinesh Goyal; Suresh Gyan