Mayank Kumar Goyal
Jaypee Institute of Information Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mayank Kumar Goyal.
grid computing | 2012
Mayank Kumar Goyal; Alok Aggarwal; Punit Gupta; Prakash Kumar
Trust Models are used to enhance secure and reliable scheduling in Distributed, Grid and Cloud environment. Trust models that are being proposed or implemented in Distributed and Grid environment, does not fully fit in cloud computing environment. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, a scheduling is done for better allocation of resources and further enhance the QOS of services been provided to the users. In this paper, an approach for managing trust in Cloud IaaS is proposed.
ACITY (1) | 2012
Mayank Kumar Goyal; Alok Aggarwal
In recent years Internet has experienced a rapid expansion and also facing increased no. of security threats. However many technological innovations have been proposed for information assurance but still protection of computer systems has been difficult. With the rapid growth of Internet technology, a high level of security is needed for keeping the data resources and equipments secure. In this context intrusion detection (ID) has become an important area of research since building a system with no vulnerabilities has not been technically feasible.
Archive | 2013
Punit Gupta; Mayank Kumar Goyal; Prakash Kumar; Alok Aggarwal
Trust Models are used to enhance secure and reliable scheduling in Distributed, Grid and Cloud environment. Trust models that are being proposed or implemented in Distributed and Grid environment, does not fully fit in cloud computing environment. Since the parameters that have being taken into consideration in these trust models, does not fit in the cloud Infrastructure As A Service, a suitable trust model is proposed based on the existing model that is suitable for trust value management for the cloud IaaS parameters. Based on the above achieved trust values, a scheduling algorithm is also proposed that may further enhance the QOS of services been provided to the users.
grid computing | 2012
Rajiv Kumar; Mayank Kumar Goyal; Pervez Ahmed; Amresh Kumar
Unconstrained offline handwritten numeral recognition is a challenging problem. It is very difficult to find high recognition results using a single classifier. This paper presents a simple profile, combined local & global features and majority voting scheme classifier for unconstrained handwritten numeral recognition. The simple profile feature is computed by using the left, right, top and bottom profile of an image. A feature vector of length 112 is formed by combining all the profiles. The local feature vector is extracted by applying Daubechies wavelet transform on the four images that were obtained by applying the Kirsch operator, and the global features that are obtained by applying the same Daubechies wavelet transform on the original image. A feature vector of length 80 is formed by combining the 64 local and 16 global features. The feature vectors are the intensity of a pixel in the third level approximation component of an image. In this experiment four neural network classifiers: Multilayer feed forward, Pattern recognition, Cascade forward, Function fitting neural network classifiers & two statistical classifiers: Linear discriminant analysis and KNN classifiers are used for classifying these features. A majority voting scheme has been performed with three neural network classifier and KNN classifier. The performance is tested on MNIST dataset. The network was trained on 60,000 and tested on 10,000 numeral samples of which 98.05% test samples are correctly recognized.
grid computing | 2012
Mayank Kumar Goyal; Alok Aggarwal; Neelam Jain
Intrusion detection (ID) has become an important area of research since building a system with no vulnerabilities has not been technically feasible. In this paper, effect of change in rate of genetic algorithm operator on fitness value in composition of signatures for misuse intrusion detection system is presented. The proposed genetic algorithm uses a set of classification rules which are generated from a predefined intrusion behavior. From the results it could be concluded that if crossover performed is not sufficient, there is not sufficient sharing of genes. If we crossover too much, good segments of individuals get split up a lot. This allows some individuals with high fitnesss to be copied directly to the next population.
advances in information technology | 2013
Mayank Kumar Goyal; Yatendra Kumar Verma; Paras Bassi; Paurush Kumar Misra
A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. A number of routing protocols like Dynamic Source Routing and Ad Hoc On-Demand Distance Vector Routing have been implemented. This paper presents the comparative performance analysis of two routing protocols for mobile ad hoc networks. A network simulator has been used for performance evaluation of Ad Hoc On-Demand Distance Vector Routing and Dynamic Source Routing protocol in this paper. To compare the performance of these routing protocols, the simulation results were analyzed using graphs and trace file based on Quality of Service metrics such as throughput, packet delivery fraction, packet loss and average end-to-end delay by varying network size up. The results presented in this paper clearly indicate that the protocols behave differently under different environments.
Archive | 2013
Mayank Kumar Goyal; Yatendra Kumar Verma; Paras Bassi; Paurush Kumar Misra
A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. TCP/IP protocol plays an important role in developing communication systems and providing better and reliable communication capabilities in almost all networking environment. The paper aims to investigate the performance of the TCP congestion control variants in MANET and its behaviour with respect to Dynamic State Routing. TCP optimization in MANETs is a challenging issue because of some unique characteristics of congestion control. The results presented in this paper clearly indicate that the Dynamic State Routing achieves maximum throughput, higher packet delivery ratio and less average end to end delay when TCP congestion control agent used is TCP Vegas.
Archive | 2013
Mayank Kumar Goyal; Punit Gupta; Vinita Chauhan
A mobile ad hoc network is a collection of wireless mobile nodes dynamically forming a temporary network without the use of any existing network infrastructure. This paper presents the comparative performance analysis of Ad hoc On Demand Distance Vector routing for mobile ad hoc networks with different versions of TCP congestion control. A network simulator has been used for performance evaluation of Ad Hoc On-Demand Distance Vector Routing in this paper. To compare the performance of this protocol, the simulation results were analyzed using Quality of Service metrics such as throughput, packet delivery ratio, packet loss and average end to-end delay. The results presented in this paper clearly indicate that the Ad hoc On Demand Distance Vector routing achieves maximum throughput, higher packet delivery ratio and less average end to end delay when TCP congestion control agent used is TCP Vegas.
ACITY (1) | 2012
Mayank Kumar Goyal; Yatendra Kumar Verma; Paras Bassi; Paurush Kumar Misra
Various communication protocols can be used simultaneously in a networking environment. This paper address the question that how much bandwidth is used by Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) when they share the same link in transport layer and which protocol consumes more bandwidth than the other. A set of simple experiments has been conducted to find the effect of constant bit rate UDP traffic on adaptive TCP and vice versa. For that, four types of TCP which are TCP Tahoe, TCP Reno, TCP NewReno and TCP Vegas are used with UDP in variable bandwidth environment. From there, we are going to differentiate them in terms of bandwidth usage and define how it works and describes several effects that occurred when they work together.
ieee international advance computing conference | 2013
Punit Gupta; Mayank Kumar Goyal; Prakash Kumar