User profiles for Jitendra Kumar Samriya
Jitendra Kumar SamriyaAssistant Professor, National Institute of Technology Delhi Verified email at nitdelhi.ac.in Cited by 394 |
Network intrusion detection using ACO-DNN model with DVFS based energy optimization in cloud framework
… Author links open overlay panel Jitendra Kumar Samriya a , Rajeev Tiwari b , Xiaochun
Cheng c , Rahul Kumar Singh b , Achyut Shankar d , Manoj Kumar b … Vinoth Kumar …
Cheng c , Rahul Kumar Singh b , Achyut Shankar d , Manoj Kumar b … Vinoth Kumar …
[PDF][PDF] A novel intrusion detection system using hybrid clustering-optimization approach in cloud computing
JK Samriya, N Kumar - Materials Today: Proceedings, 2020 - researchgate.net
In this study, a new hybridization approach for the intrusion detection system is proposed to
improve the overall security of cloud based computing environment. In addition this …
improve the overall security of cloud based computing environment. In addition this …
Secured data offloading using reinforcement learning and Markov decision process in mobile edge computing
Mobile Internet services are developing rapidly for several applications based on computational
ability such as augmented/virtual reality, vehicular networks, etc. The mobile terminals …
ability such as augmented/virtual reality, vehicular networks, etc. The mobile terminals …
Intelligent SLA‐Aware VM Allocation and Energy Minimization Approach with EPO Algorithm for Cloud Computing Environment
JK Samriya, S Chandra Patel… - Mathematical …, 2021 - Wiley Online Library
Cloud computing is the most prominent established framework; it offers access to resources
and services based on large‐scale distributed processing. An intensive management …
and services based on large‐scale distributed processing. An intensive management …
Adversarial ML-based secured cloud architecture for consumer Internet of Things of smart healthcare
The profound era of cloud computing (CC) is revolutionizing Industry 5.0in which users have
online access to network services including better, transparent user management and the …
online access to network services including better, transparent user management and the …
Blockchain and Reinforcement Neural Network for Trusted Cloud-Enabled IoT Network
The rapid integration of Internet of Things (IoT) services and applications across various
sectors is primarily driven by their ability to process real-time data and create intelligent …
sectors is primarily driven by their ability to process real-time data and create intelligent …
[PDF][PDF] A QoS Aware FTOPSIS-WOA based task scheduling algorithm with load balancing technique for the cloud computing environment
JK Samriya, N Kumar - Indian Journal of Science and …, 2020 - pdfs.semanticscholar.org
Objectives: To perform task scheduling with minimising the makespan through implementing
an effective load balancing approach. Methods: In this study, the Fuzzy Topsis algorithm (…
an effective load balancing approach. Methods: In this study, the Fuzzy Topsis algorithm (…
Energy-aware ACO-DNN optimization model for intrusion detection of unmanned aerial vehicle (UAVs)
In modern militaries the Unmanned Aerial Vehicles (UAVs) are used for war fighting and
also for certain civilian applications such as law enforcement, content for news outlets, …
also for certain civilian applications such as law enforcement, content for news outlets, …
Machine Learning Based Network Intrusion Detection Optimization for Cloud Computing Environments
Cloud computing is an emerging choice among businesses all over the world since it provides
flexible and world wide web computer capabilities as a customizable service. Because of …
flexible and world wide web computer capabilities as a customizable service. Because of …
An optimistic approach for task scheduling in cloud computing
M Sharma, M Kumar, JK Samriya - International Journal of Information …, 2022 - Springer
Cloud computing is gaining popularity around the globe over the last decade due to offering
various types of services to end-users. Virtual machines (VM) Configuration is an imperative …
various types of services to end-users. Virtual machines (VM) Configuration is an imperative …