Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Mr.Mohd Haroon

Wireless sensor networks (WSNs) have become more and more popular and have been widely used recently. WSNs usually consist of a large number of sensors for different applications of sensing that includes Military, medical, civil, disaster... more
Wireless sensor networks (WSNs) have become more and more popular and have been widely used recently. WSNs usually consist of a large number of sensors for different applications of sensing that includes Military, medical, civil, disaster management, environmental, and commercial
Mobile Ad-hoc networks is a infrastructure less network, all communication devices are attached as per the communication requirement is arrived, by the wireless application protocol devices are attached and share their information, all... more
Mobile Ad-hoc networks is a infrastructure less network, all communication devices are attached as per the communication requirement is arrived, by the wireless application protocol devices are attached and share their information, all wireless devices are communicating by the base station controller, and mobile switching network, some more gateway are also used in this network, in which heterogeneous, and homogeneous communication are possible by the gateway. Mobile ADHOC network are self-managing , self-organization, have dynamic topology, self-configurable, have multi hop In MANET have decentralized control to manage the control operation, every computing nodes of the MANET having controlling characteristic routing in mobile Adhoc network have one of the challenging task, reason being every computing node of the MANET having in dynamic nature. the performance of entire mobile adhoc network is changes as the changing of the network attributes, the power constrain in mobile node is...
C oncrete plays an important role in the construction industry and cement is the main ingredient of concrete which makes the binding in between fine aggregate and coarse aggregate. The production of cement results in emission of many... more
C oncrete plays an important role in the construction industry and cement is the main ingredient of concrete which makes the binding in between fine aggregate and coarse aggregate. The production of cement results in emission of many greenhouse gases in atmosphere, which are responsi­ble for global warming. Hence, the researchers are currently focused on use of waste material having cementitious properties, like GGBS (ground granulated blast furnace slag)  Rice husk ash, which are easily available in market which can be added in cement concrete as partial replacement of cement, without compromising on its strength, stability and durability, which will result in decrease of cement production and reduces global warming, thus reduction in emission in greenhouse gases, in addition to sustain­able management of the waste. The GGBS is a waste product from the iron manufacturing industry, which may be used as partial replacement of cement in concrete due to its inherent cementing propertie...
Pervious concrete is a special high porosity concrete used for flatwork applications that allows water from precipitation and other source to pass through there by reducing the runoff from a site and recharging ground water levels.Since... more
Pervious concrete is a special high porosity concrete used for flatwork applications that allows water from precipitation and other source to pass through there by reducing the runoff from a site and recharging ground water levels.Since authors noticed that less quantum of research is carried out on this topic hence out of motivation this work under consideration is carried out.   Herein the concreter is cast by ordinary Portland cement.  Herein this investigation the cement is replaced by Fly ash in which ordinaryPortland cement has been reduced by introducing fly ash as a compendious agent. Compressive Strength iscarried out on hardened Pervious Concrete. This paper mainly focuses on the Compressive Strength of pervious concrete.To investigate the compressive strength, “Cubes” of size 150 mm x 150 mm x 150 mm are prepared and cured at a regular interval of 3,7,14 and 28 days, the specimens were tested in compression testing machine.  Pervious concrete is made by replacing cement w...
Cloud Computing represents the Internet-based platform for computing. It is the services offered via the internet. It is actually buying of services from the service provider. But because the information is kept at the third party... more
Cloud Computing represents the Internet-based platform for computing. It is the services offered via the internet. It is actually buying of services from the service provider. But because the information is kept at the third party location, these leads to a lot of insecurities in the minds of service owner. Hence, it leads to a lot of security concerns. Since, the data is processed on the cloud, it has to be managed carefully, maintain the integrity and confidentiality of the data is at stake. This paper represents all the security concerns faced during the processing of the data in the cloud. It represents the various approaches proposed by different researchers throughout the globe showing how important is the security issue in cloud computing. This paper also tries to gives the deep impact these researches have in cloud computing paradigm.
The research depict in this paper spotlight on evaluating metrics for use with the dynamic load balancing of parallel system. In this load balancing approach are based on token and is used in union with Clustered Time Warp (CTW). CTW is... more
The research depict in this paper spotlight on evaluating metrics for use with the dynamic load balancing of parallel system. In this load balancing approach are based on token and is used in union with Clustered Time Warp (CTW). CTW is an amalgam bringing together protocol, which makes use of a sequential algorithm inside clusters of Load and Time Warp among the clusters. A three different metrics are defined here, and measure their effectiveness in different simulation environments. One metric measures the processor utilization and next one metrics dealings the difference in virtual times between the clusters, while a third is a combination of these two metrics. In this paper have assessment of the execution time, memory using up and the throughput obtained in three simulation environments by each of these metrics and to the results obtained without load balancing, Our grouping of simulation are VLSI simulations, characterized by a huge number of Load and a short computational gra...
Actually, software products are increasing inside a fast way and they are used in nearly all activities of people life. As a consequence measuring and evaluating the standard of a software product is now crucial task for most companies.... more
Actually, software products are increasing inside a fast way and they are used in nearly all activities of people life. As a consequence measuring and evaluating the standard of a software product is now crucial task for most companies. Several models are anticipated to help different kinds of users having quality issues. This paper analyses our ability to measure software excellent. The analysis is dependent on the representational hypothesis of measurement. We dissect three assumptions on application quality measurement and suggest a higher measurement focus with establishing experimental relational programs (models of what we should measure) in application quality related perform. Actually, software products are increasing in a fast way and are used in almost all activities of human life.
For enterprise application development, cloud computing is going to new-fangled paradigm that meets the needs of today's enterprises and helps them efficiently executing workflows in business and scientific applications. Workflow... more
For enterprise application development, cloud computing is going to new-fangled paradigm that meets the needs of today's enterprises and helps them efficiently executing workflows in business and scientific applications. Workflow applications often require a very intricate runtime environment that is hard to create and maintain. Thus, cloud infrastructure is valued as an implementation platform for positioning technical workflows with features such as on-demand provisioning, scalability, reproducibility and resilience. To schedule multiple workflows in the cloud, we need to design the workflow before scheduling it. Therefore, in this paper we review the diverse work done by researchers for the workflow design as well as workflow scheduling.
WSN is a low-power system and are often used in numerous monitoring uses, such as healthcare, environmental, and systemic health surveillance, in addition to military surveillance. It is important to reduce network resource usage since... more
WSN is a low-power system and are often used in numerous monitoring uses, such as healthcare, environmental, and systemic health surveillance, in addition to military surveillance. It is important to reduce network resource usage since many of these applications need to be installed in locations that are virtually inaccessible to humans. Many protocols for WSN to extend the presence of the network have been established to solve this problem. In the energy efficiency of WSN networks, routing protocols play an important role since they help minimize power usage and response time and provide sensor networks with high data density and service quality. This study also employed a Hopfield neural network and the findings from this study are presented next to each other to enable comparison. This paper also discusses how to easily and accurately capture and handle WSN collisions. Future experiments that require the usage of neural networks and so many fuzzy structures will be able to prevent a crash in these respects.
Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce... more
Security in various E-commerce Applications includes an efficient framework in Information Security especially in Computer Security, Data Security and other online transactions in E-commerce applications. Security in E-Commerce application plays an important role for the secure and scalable transaction which includes various dimensions such as security-integrity, Confidentiality, Non-repudiation, Privacy etc. Hence for the Security of Online Transactions in E-Commerce based application various Security algorithms are implemented. Although these Security algorithms are efficient and provides Security from various attacks but Data Storage during the transactions and Computational time of the algorithms is also important. The existing architecture proposed for the security of online e-transactions in web applications provides security from different attacks and is efficient in terms of computational parameters, but there are certain issues which need to be overcome such as: Security Prevention from different attacks during Online Transactions in Web Mining especially in E-commerce Applications, Increase use of Computational Cost at the Client and Server Side. The Proposed framework provides Security prevention from various attacks especially in IoT. The methodology implemented here works on the basis of authenticating the validity of the User by allocating a challenge value and hope that our proposed framework will be more effective and efficient.
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net... more
In the current internet technology, most of the transactions to banking system are effective through online transaction. Predominantly all these e-transactions are done through e-commerce web sites with the help of credit/debit cards, net banking and lot of other payable apps. So, every online transaction is prone to vulnerable attacks by the fraudulent websites and intruders in the network. As there are many security measures incorporated against security vulnerabilities, network thieves are smart enough to retrieve the passwords and break other security mechanisms. At present situation of digital world, we need to design a secured online transaction system for banking using multilevel encryption of blowfish and AES algorithms incorporated with dual OTP technique. The performance of the proposed methodology is analyzed with respect to number of bytes encrypted per unit time and we conclude that the multilevel encryption provides better security system with faster encryption standards than the ones that are currently in use.
In the vicinity of multi agent device agreement internet protocol is widely used for the status quo of conversation among sellers. In my research I recognition at the running method of CNP. There are distinct areas like genetic algorithm,... more
In the vicinity of multi agent device agreement internet protocol is widely used for the status quo of conversation among sellers. In my research I recognition at the running method of CNP. There are distinct areas like genetic algorithm, multi robotic challenge allocation, reservoir flood manage gadget, structural health tracking, underwater unmanned car system in which CNP works. Although, various algorithms are proposed to improve the performance of CNP and they are actual powerful but there's some region which is untouched for a while. In CNP, there are three tiers of venture allocations. Decrease the failure rate of CNP is the cause of this studies, in doing so ACO is use in biding level. For showing our research we use the prototype of UUV Swarm machine.
In the vicinity of multi agent device agreement internet protocol is widely used for the status quo of conversation among sellers. In my research I recognition at the running method of CNP. There are distinct areas like genetic algorithm,... more
In the vicinity of multi agent device agreement internet protocol is widely used for the status quo of conversation among sellers. In my research I recognition at the running method of CNP. There are distinct areas like genetic algorithm, multi robotic challenge allocation, reservoir flood manage gadget, structural health tracking, underwater unmanned car system in which CNP works. Although, various algorithms are proposed to improve the performance of CNP and they are actual powerful but there's some region which is untouched for a while. In CNP, there are three tiers of venture allocations. Decrease the failure rate of CNP is the cause of this studies, in doing so ACO is use in biding level. For showing our research we use the prototype of UUV Swarm machine.
ABSTRACT As we know that “change is the nature”. In the world of information technology the changes happens rapidly. As the new technologies always changes the world of information representation, the effect is to find out relevant pieces... more
ABSTRACT As we know that “change is the nature”. In the world of information technology the changes happens rapidly. As the new technologies always changes the world of information representation, the effect is to find out relevant pieces of information is quite difficult because of the heavy noise, cluttering with distracted features(like advertisements, links, scrollers etc.) in the whole web page. Information or useful content extraction from the web pages(structured or semi strutured) becomes a critical issue for web users and web miners. The user can be misguided by the noise of the web page. So the information extraction from the web page carries a huge importance. A confusing puzzle for information extraction is to define the noise domain and its removal. In the recent studies we all well known about the wrapper induction, feature extractor, back propagation algorithm of neural network, content extractor, PAT trees, etc. In the paper followed by the abstract we investigate the DOM tree segmentation with class attribute based approach. The class attribute can be used with all HTML elements inside the 'BODY' section of the document. It is used to create different classes of an element, where each class can have its own properties. To evaluate the system performance several experiments done on different commercial, news, entertainment websites. Experiments indicate our method is applicable to extract informative content from web pages of these websites.
In the last decade, the usages of social networks have observed a steady but sharp upswing, due to increased availability and affordability of the internet brought by technological advancements. So, naïve and/or innocent social network... more
In the last decade, the usages of social networks have observed a steady but sharp upswing, due to increased availability and affordability of the internet brought by technological advancements. So, naïve and/or innocent social network users became primary targets of the malignant Users for their illegal activities. Various malicious activities such as theft of identity, propagation of false information, etc. can be prevented by using anomaly detection techniques. This article reviews multiple anomaly detection approaches currently being used in the domain of social networking and presents a detailed comparison of their various aspects. On the network structure basis, anomalies type to be encountered, and the method of anomaly detection, we have categorized the existing approaches. We portrayed anomalies as either attributed or unattributed and as static or dynamic, by studying some predefined approaches to detect these types of anomalies. We found that there are two sub-processes in online social network anomaly detection, one is network features identification and calculation, and the other is observation analysis of these network features.
In the last decade, the usages of social networks have observed a steady but sharp upswing, due to increased availability and affordability of the internet brought by technological advancements. So, naïve and/or innocent social network... more
In the last decade, the usages of social networks have observed a steady but sharp upswing, due to increased availability and affordability of the internet brought by technological advancements. So, naïve and/or innocent social network users became primary targets of the malignant Users for their illegal activities. Various malicious activities such as theft of identity, propagation of false information, etc. can be prevented by using anomaly detection techniques. This article reviews multiple anomaly detection approaches currently being used in the domain of social networking and presents a detailed comparison of their various aspects. On the network structure basis, anomalies type to be encountered, and the method of anomaly detection, we have categorized the existing approaches. We portrayed anomalies as either attributed or unattributed and as static or dynamic, by studying some predefined approaches to detect these types of anomalies. We found that there are two sub-processes in online social network anomaly detection, one is network features identification and calculation, and the other is observation analysis of these network features.
machine learning is very important aspect of artificial intelligence. in this chapter author try to explore the used of machine learning in cyber forensic . for classification and regression of various data used in cyber crime, machine... more
machine learning is very important aspect of artificial intelligence. in this chapter author try to explore the used of machine learning in cyber forensic . for classification and regression of various data used in cyber crime, machine learning technology are very help full to detect the attack using various classification and regression approach.