oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 78 )

2018 ( 133 )

2017 ( 111 )

2016 ( 247 )

Custom range...

Search Results: 1 - 10 of 20977 matches for " Gulshan Kumar "
All listed articles are free for downloading (OA Articles)
Page 1 /20977
Display every page Item
The Use of Multi-Objective Genetic Algorithm Based Approach to Create Ensemble of ANN for Intrusion Detection  [PDF]
Gulshan Kumar, Krishan Kumar
International Journal of Intelligence Science (IJIS) , 2012, DOI: 10.4236/ijis.2012.224016
Abstract: Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In literature, many researchers utilized Artificial Neural Networks (ANN) in supervised learning based intrusion detection successfully. Here, ANN maps the network traffic into predefined classes i.e. normal or specific attack type based upon training from label dataset. However, for ANN-based IDS, detection rate (DR) and false positive rate (FPR) are still needed to be improved. In this study, we propose an ensemble approach, called MANNE, for ANN-based IDS that evolves ANNs by Multi Objective Genetic algorithm to solve the problem. It helps IDS to achieve high DR, less FPR and in turn high intrusion detection capability. The procedure of MANNE is as follows: firstly, a Pareto front consisting of a set of non-dominated ANN solutions is created using MOGA, which formulates the base classifiers. Subsequently, based upon this pool of non-dominated ANN solutions as base classifiers, another Pareto front consisting of a set of non-dominated ensembles is created which exhibits classification tradeoffs. Finally, prediction aggregation is done to get final ensemble prediction from predictions of base classifiers. Experimental results on the KDD CUP 1999 dataset show that our proposed ensemble approach, MANNE, outperforms ANN trained by Back Propagation and its ensembles using bagging & boosting methods in terms of defined performance metrics. We also compared our approach with other well-known methods such as decision tree and its ensembles using bagging & boosting methods.
GROWTH PERFORMANCE AND PRODUCTIVITY OF RUBBER & PLASTIC PRODUCTS INDUSTRY IN PUNJAB
GULSHAN KUMAR
Annals of the University of Petrosani : Economics , 2010,
Abstract: Present study is an endeavour to investigate growth pattern and productivity trends in small scale rubber and plastic products industry of Punjab. The growth of industry has been gauged in terms of variables - number of units, fixed investment, employment and production. Yearly growth rates have been computed to catch year- to- year fluctuations in growth and compound annual growth rates (CAGRs) have been worked out to ascertain the impact of the policies of liberalized regime on growth of this industry. Productivity trends have been sketched in terms of partial factor productivities of labour and capital. In order to understand the strengths and weaknesses of the industry, SWOT analysis has been conducted. The study revealed that the liberalisation has promoted the use of capital intensive and labour saving techniques of production leading to a dismal growth of employment and sluggish growth of number of units.
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review
Gulshan Kumar,Krishan Kumar
Applied Computational Intelligence and Soft Computing , 2012, DOI: 10.1155/2012/850160
Abstract: In supervised learning-based classification, ensembles have been successfully employed to different application domains. In the literature, many researchers have proposed different ensembles by considering different combination methods, training datasets, base classifiers, and many other factors. Artificial-intelligence-(AI-) based techniques play prominent role in development of ensemble for intrusion detection (ID) and have many benefits over other techniques. However, there is no comprehensive review of ensembles in general and AI-based ensembles for ID to examine and understand their current research status to solve the ID problem. Here, an updated review of ensembles and their taxonomies has been presented in general. The paper also presents the updated review of various AI-based ensembles for ID (in particular) during last decade. The related studies of AI-based ensembles are compared by set of evaluation metrics driven from (1) architecture & approach followed; (2) different methods utilized in different phases of ensemble learning; (3) other measures used to evaluate classification performance of the ensembles. The paper also provides the future directions of the research in this area. The paper will help the better understanding of different directions in which research of ensembles has been done in general and specifically: field of intrusion detection systems (IDSs). 1. Introduction The threat of Internet attacks is quite real and frequent so this has increased a need for securing information on any network on the Internet. The objective of information security includes confidentiality, authentication, integrity, availability, and nonrepudiation [1]. The set of activities that violates security objectives is called intrusion. Thus secure information requires the phases that provide (1) protection: automatic protection from intrusions; (2) detection: automatic detection of intrusions; (3) reaction: automatic reaction or alarm when system is intruded; (4) recovery: repair or recovery of loss caused due to intrusion [2]. Out of these phases, the perfect detection of an intrusion is the most important. As only after correct detection of intrusion, correct reaction and recovery phase of information security can be implemented. In the literature, many IDSs have been developed implementing various techniques from different disciplines like statistical techniques, AI techniques, and so forth. Some IDSs have been developed based on single-classification technique while other IDSs (called hybrid/ensemble IDS) implement more-than-one-classfication
FORECASTING EXPORTS OF INDUSTRIAL GOODS FROM PUNJAB - AN APPLICATION OF UNIVARIATE ARIMA MODEL
GULSHAN KUMAR,SANJEEV GUPTA
Annals of the University of Petrosani : Economics , 2010,
Abstract: The present study is an attempt to build a Univariate time series model to forecast the exports of industrial goods from Punjab for ensuing decade till 2020. The study employs Box-Jenkin’s methodology of building ARIMA (Autoregressive Integrated Moving Average) model to achieve various objectives of study. Annual time series data for exports of industrial products have been culled from Directorate of Industries, Punjab for the period 1974-75 to 2007-08. Different selected models were tested by various diagnostic tests to ensure the accuracy of obtained results. The results revealed that during the days to come, exports of industrial products from Punjab are going to experience a sharp decline in growth as compared to past three decades in which growth maintained two digit level. In light of the forecasts, concerted efforts on the part of Government, entrepreneurs, industrialists, farmers and producers are the need of the hour to establish a healthy state economy and its export sector.
An Approach To Provide Security In Mobile Ad-Hoc Networks Using Counter Mode Of Encryption On Mac Layer
Gulshan Kumar,Mritunjay Rai
International Journal of Network Security & Its Applications , 2011,
Abstract: Security in any of the networks became an important issue in this paper we have implemented a securitymechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node todestination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted ‘malicious’. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer
Gulshan Kumar,Mritunjay Rai
Computer Science , 2011, DOI: 10.5121/ijnsa.2011.3413
Abstract: Security in any of the networks became an important issue in this paper we have implemented a security mechanism on Medium Access Control layer by Assured Neighbor based Security Protocol to provide authentication and confidentiality of packets along with High speed transmission for Ad hoc networks. Here we have divided the protocol into two different parts. The first part deals with Routing layer information; in this part we have tried to implement a possible strategy for detecting and isolating the malicious nodes. A trust counter for each node is determined which can be actively increased and decreased depending upon the trust value for the purpose of forwarding the packets from source node to destination node with the help of intermediate nodes. A threshold level is also predetermined to detect the malicious nodes. If the value of the node in trust counter is less than the threshold value then the node is denoted 'malicious'. The second part of our protocol deals with the security in the link layer. For this security reason we have used CTR (Counter) approach for authentication and encryption. We have simulated all our strategies and schemes in NS-2, the result of which gives a conclusion that our proposed protocol i.e. Assured Neighbor based Security Protocol can perform high packet delivery against various intruders and also packet delivery ratio against mobility with low delays and low overheads.
X-ray view on a Class using Conceptual Analysis in Java Environment
Gulshan Kumar,Mritunjay Kumar Rai
International Journal of Computer Science Issues , 2011,
Abstract: Modularity is one of the most important principles in software engineering and a necessity for every practical software. Since the design space of software is generally quite large, it is valuable to provide automatic means to help modularizing it. An automatic technique for software modularization is object- oriented concept analysis (OOCA). X-ray view of the class is one of the aspect of this Object oriented concept analysis. We shall use this concept in a java environment.
IMPACT OF LIBERALIZATION ON FDI STRUCTURE IN INDIA
Dr. Gulshan Kumar,Neerja Dhingra
International Journal of Economics and Research , 2011,
Abstract: Direct investment across national borders is a distinct feature of international economics, which has gained intense attention of all the countries of the world recently. Foreign direct investment (FDI) is deemed to be a growth catalyst since it is usually accompanied by entrepreneurial, managerial and technical skills which are indispensable for economic growth (Humphrey,1960). Foreign direct investment is one of the most strategic and vital tools for developing a country s competitiveness and efforts must be made to garner huge share of FDI in the country (Badar, 2006). Going by this ideology FDI is being sought by most of the developing countries of the world for promoting the cause of economic development. India, without exception, as in case of other developing countries, is eager to prompt her economic growth which compels her to accept and seek assistance of foreign direct investment. The country also became host to massive inflows of FDI during 1990s and 2000s in concert with her efforts to create more favorable settings for it through trade liberalization, market deregulation, privatization of national ownerships and encouragement to regional integration. Actually in the early 1980s, Indian government adopted a liberal policy towards FDI, especially in high technology areas and exports and it was then that FDI friendly environment was created. Again a host of incentives, exemptions and relaxations in the degree of flexibility concerning foreign ownership adopted during 1990s gave a major boost to FDI inflows. In a way eighties were the fore-runners of the liberalization policy of 1990s and so this period is termed as preliberalization period in the study. The period after 1991 is termed as post liberalization period during which not only the quantum of FDI to India escalated but the sectoral composition of FDI also underwent tremendous change
X-ray view on a Class using Conceptual Analysis in Java Environment
Gulshan Kumar,Prof. Mritunjay Kumar Rai
Computer Science , 2011,
Abstract: Modularity is one of the most important principles in software engineering and a necessity for every practical software. Since the design space of software is generally quite large, it is valuable to provide automatic means to help modularizing it. An automatic technique for software modularization is object- oriented concept analysis (OOCA). X-ray view of the class is one of the aspect of this Object oriented concept analysis. We shall use this concept in a java environment.
Major Energy Efficient Routing Schemes in Wireless Sensor Networks: Survey and Idea
Jahangeer Ali,Gulshan Kumar,Dr. Mritunjay Kumar Rai
International Journal of Computers & Technology , 2013,
Abstract: Sensing the environment without human intervention is carried out with Wireless Sensor Networks. Thus WSNs have gained impetus in every field as applicable to various sensing applications. As the sensor nodes are very minute with limited power, memory and controlling mechanism. Thus it is necessary to implement energy efficient routing in sensor nodes such that network lifetime is enhanced. In this paper, we have discussed various existing energy efficient routing schemes and made comparison on various parameters in literature survey. Finally came to conclusion that there is a need of an energy efficient routing protocol which can further extend network lifetime. We propose an idea in which existing; Enhanced Energy Efficient Protocol with Static Clustering (EEEPSC) is modified by placing a fraction of nodes having more energy than normal nodes in the locations where Base Station is far away. And BS is placed within the area of deployed nodes.
Page 1 /20977
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.