scispace - formally typeset
Search or ask a question
Author

Mayank Dave

Other affiliations: Shiv Nadar University
Bio: Mayank Dave is an academic researcher from National Institute of Technology, Kurukshetra. The author has contributed to research in topics: Wireless sensor network & Digital watermarking. The author has an hindex of 25, co-authored 177 publications receiving 2271 citations. Previous affiliations of Mayank Dave include Shiv Nadar University.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper shows an implementation of nature inspired improved Bat Algorithm to control congestion in Wireless Sensor Networks at transport layer by applying it on the fitness function to obtain an optimum solution.
Abstract: Energy conservation and congestion control are widely researched topics in Wireless Sensor Networks in recent years. The main objective is to develop a model to find the optimized path on the basis of distance between source and destination and the residual energy of the node. This paper shows an implementation of nature inspired improved Bat Algorithm to control congestion in Wireless Sensor Networks at transport layer. The Algorithm has been applied on the fitness function to obtain an optimum solution. Simulation results have shown improvement in parameters like network lifetime and throughput as compared with CODA (Congestion Detection and Avoidance), PSO (Particle Swarm Optimization) algorithm and ACO (Ant Colony Optimization).

14 citations

Book ChapterDOI
18 Aug 2018
TL;DR: The proposed adaptive error control technique for cluster-based UWSN improves the 28% packet delivery ratio by reducing the 8% packet drops, 59% delay and 57% energy consumption when compared to the existing techniques.
Abstract: Underwater Wireless Sensor Networks (UWSNs) are the networks where the sensors are deployed under the water to monitor the aquatic environment. UWSNs are susceptible to adverse environmental conditions making the network prone to errors. Since the underwater environment has a fluctuating nature with respect to temperature, speed, etc., it is necessary to make the network adaptive to frequent changes. In this paper, we propose an adaptive error control technique for cluster-based UWSN. The proposed technique initially makes the cost involved in data transmission adaptive and then makes the transmission error controlled by encoding the data to be transmitted. Thus, the network operation is made efficient by handling the error issue and also by making it adaptive. Simulation results show that the proposed AECT improves the 28% packet delivery ratio by reducing the 8% packet drops, 59% delay and 57% energy consumption when compared to the existing techniques.

14 citations

Journal ArticleDOI
TL;DR: An ant colony algorithm based technique is demonstrated that generates rules to store and then identify the component from software repository for possible reuse and help user in organization and storage of components in repository.
Abstract: Storage and representation of reusable software components in software repositories to facilitate convenient identification and retrieval has been always a concern for software reuse researchers. This paper discusses and demonstrated an ant colony algorithm based technique that generates rules to store and then identify the component from software repository for possible reuse. Proposed technique help user in organization and storage of components in repository and later can help in identifying most appropriate component for given context. In first stage while searching it makes use of keywords, their synonyms and their inter-relationships. Then it makes use of ant colony optimization; initial pheromone of one is assigned to all domain representative terms of components. By updating pheromone for participating terms and non-participating terms iteratively and by calculating the quality of each rule generated, it leads to quality rules to represent and retrieve the reusable components

14 citations

Journal ArticleDOI
01 Sep 2016
TL;DR: A hybrid approach independent of service description models is suggested for automatic classification of Web services to improve classification accuracy and enable the discovery and reusability of the existing services.
Abstract: Web service classification, a task of assigning a category to the service from a predefined set, is a challenging task nowadays as manually organizing and searching services are simply not feasible, given the time constraints or the exponentially growing number of services. In this paper, a hybrid approach independent of service description models is suggested for automatic classification of Web services to improve classification accuracy. The proposed classification approach assists the repository administrator and the users during registration and service retrieval, respectively. It utilizes the semantic as well as syntactic information present within the service description by combining the techniques from machine learning, data mining, logical reasoning, statistical methods and measures of semantic relatedness. The proposed approach applies Omiotis measure of semantic relatedness to transform the service vectors into semantically enriched service vectors which are used by the classification algorithms. Supervised machine learning-based support vector machines and k-Nearest Neighbor classifiers are used to categorize service profiles under different categories. Empirical evaluation and comparison of the proposed approach implemented on OWL-X dataset is presented for enabling the discovery and reusability of the existing services.

13 citations

Proceedings ArticleDOI
01 Jul 2017
TL;DR: An Early Detection and Isolation Policy (EDIP) is proposed to mitigate insider-assisted DDoS attacks and concept of load balancing is used to prevent proxies from getting overloaded.
Abstract: The increased number of cyber attacks makes the availability of services a major security concern. One common type of cyber threat is distributed denial of service (DDoS). A DDoS attack is aimed at disrupting the legitimate users from accessing the services. It is easier for an insider having legitimate access to the system to deceive any security controls resulting in insider attack. This paper proposes an Early Detection and Isolation Policy (EDIP)to mitigate insider-assisted DDoS attacks. EDIP detects insider among all legitimate clients present in the system at proxy level and isolate it from innocent clients by migrating it to attack proxy. Further an effective algorithm for detection and isolation of insider is developed with the aim of maximizing attack isolation while minimizing disruption to benign clients. In addition, concept of load balancing is used to prevent proxies from getting overloaded.

13 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis.
Abstract: Machine Learning is the study of methods for programming computers to learn. Computers are applied to a wide range of tasks, and for most of these it is relatively easy for programmers to design and implement the necessary software. However, there are many tasks for which this is difficult or impossible. These can be divided into four general categories. First, there are problems for which there exist no human experts. For example, in modern automated manufacturing facilities, there is a need to predict machine failures before they occur by analyzing sensor readings. Because the machines are new, there are no human experts who can be interviewed by a programmer to provide the knowledge necessary to build a computer system. A machine learning system can study recorded data and subsequent machine failures and learn prediction rules. Second, there are problems where human experts exist, but where they are unable to explain their expertise. This is the case in many perceptual tasks, such as speech recognition, hand-writing recognition, and natural language understanding. Virtually all humans exhibit expert-level abilities on these tasks, but none of them can describe the detailed steps that they follow as they perform them. Fortunately, humans can provide machines with examples of the inputs and correct outputs for these tasks, so machine learning algorithms can learn to map the inputs to the outputs. Third, there are problems where phenomena are changing rapidly. In finance, for example, people would like to predict the future behavior of the stock market, of consumer purchases, or of exchange rates. These behaviors change frequently, so that even if a programmer could construct a good predictive computer program, it would need to be rewritten frequently. A learning program can relieve the programmer of this burden by constantly modifying and tuning a set of learned prediction rules. Fourth, there are applications that need to be customized for each computer user separately. Consider, for example, a program to filter unwanted electronic mail messages. Different users will need different filters. It is unreasonable to expect each user to program his or her own rules, and it is infeasible to provide every user with a software engineer to keep the rules up-to-date. A machine learning system can learn which mail messages the user rejects and maintain the filtering rules automatically. Machine learning addresses many of the same research questions as the fields of statistics, data mining, and psychology, but with differences of emphasis. Statistics focuses on understanding the phenomena that have generated the data, often with the goal of testing different hypotheses about those phenomena. Data mining seeks to find patterns in the data that are understandable by people. Psychological studies of human learning aspire to understand the mechanisms underlying the various learning behaviors exhibited by people (concept learning, skill acquisition, strategy change, etc.).

13,246 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

Book
01 Jan 2001
TL;DR: This chapter discusses Decision-Theoretic Foundations, Game Theory, Rationality, and Intelligence, and the Decision-Analytic Approach to Games, which aims to clarify the role of rationality in decision-making.
Abstract: Preface 1. Decision-Theoretic Foundations 1.1 Game Theory, Rationality, and Intelligence 1.2 Basic Concepts of Decision Theory 1.3 Axioms 1.4 The Expected-Utility Maximization Theorem 1.5 Equivalent Representations 1.6 Bayesian Conditional-Probability Systems 1.7 Limitations of the Bayesian Model 1.8 Domination 1.9 Proofs of the Domination Theorems Exercises 2. Basic Models 2.1 Games in Extensive Form 2.2 Strategic Form and the Normal Representation 2.3 Equivalence of Strategic-Form Games 2.4 Reduced Normal Representations 2.5 Elimination of Dominated Strategies 2.6 Multiagent Representations 2.7 Common Knowledge 2.8 Bayesian Games 2.9 Modeling Games with Incomplete Information Exercises 3. Equilibria of Strategic-Form Games 3.1 Domination and Ratonalizability 3.2 Nash Equilibrium 3.3 Computing Nash Equilibria 3.4 Significance of Nash Equilibria 3.5 The Focal-Point Effect 3.6 The Decision-Analytic Approach to Games 3.7 Evolution. Resistance. and Risk Dominance 3.8 Two-Person Zero-Sum Games 3.9 Bayesian Equilibria 3.10 Purification of Randomized Strategies in Equilibria 3.11 Auctions 3.12 Proof of Existence of Equilibrium 3.13 Infinite Strategy Sets Exercises 4. Sequential Equilibria of Extensive-Form Games 4.1 Mixed Strategies and Behavioral Strategies 4.2 Equilibria in Behavioral Strategies 4.3 Sequential Rationality at Information States with Positive Probability 4.4 Consistent Beliefs and Sequential Rationality at All Information States 4.5 Computing Sequential Equilibria 4.6 Subgame-Perfect Equilibria 4.7 Games with Perfect Information 4.8 Adding Chance Events with Small Probability 4.9 Forward Induction 4.10 Voting and Binary Agendas 4.11 Technical Proofs Exercises 5. Refinements of Equilibrium in Strategic Form 5.1 Introduction 5.2 Perfect Equilibria 5.3 Existence of Perfect and Sequential Equilibria 5.4 Proper Equilibria 5.5 Persistent Equilibria 5.6 Stable Sets 01 Equilibria 5.7 Generic Properties 5.8 Conclusions Exercises 6. Games with Communication 6.1 Contracts and Correlated Strategies 6.2 Correlated Equilibria 6.3 Bayesian Games with Communication 6.4 Bayesian Collective-Choice Problems and Bayesian Bargaining Problems 6.5 Trading Problems with Linear Utility 6.6 General Participation Constraints for Bayesian Games with Contracts 6.7 Sender-Receiver Games 6.8 Acceptable and Predominant Correlated Equilibria 6.9 Communication in Extensive-Form and Multistage Games Exercises Bibliographic Note 7. Repeated Games 7.1 The Repeated Prisoners Dilemma 7.2 A General Model of Repeated Garnet 7.3 Stationary Equilibria of Repeated Games with Complete State Information and Discounting 7.4 Repeated Games with Standard Information: Examples 7.5 General Feasibility Theorems for Standard Repeated Games 7.6 Finitely Repeated Games and the Role of Initial Doubt 7.7 Imperfect Observability of Moves 7.8 Repeated Wines in Large Decentralized Groups 7.9 Repeated Games with Incomplete Information 7.10 Continuous Time 7.11 Evolutionary Simulation of Repeated Games Exercises 8. Bargaining and Cooperation in Two-Person Games 8.1 Noncooperative Foundations of Cooperative Game Theory 8.2 Two-Person Bargaining Problems and the Nash Bargaining Solution 8.3 Interpersonal Comparisons of Weighted Utility 8.4 Transferable Utility 8.5 Rational Threats 8.6 Other Bargaining Solutions 8.7 An Alternating-Offer Bargaining Game 8.8 An Alternating-Offer Game with Incomplete Information 8.9 A Discrete Alternating-Offer Game 8.10 Renegotiation Exercises 9. Coalitions in Cooperative Games 9.1 Introduction to Coalitional Analysis 9.2 Characteristic Functions with Transferable Utility 9.3 The Core 9.4 The Shapkey Value 9.5 Values with Cooperation Structures 9.6 Other Solution Concepts 9.7 Colational Games with Nontransferable Utility 9.8 Cores without Transferable Utility 9.9 Values without Transferable Utility Exercises Bibliographic Note 10. Cooperation under Uncertainty 10.1 Introduction 10.2 Concepts of Efficiency 10.3 An Example 10.4 Ex Post Inefficiency and Subsequent Oilers 10.5 Computing Incentive-Efficient Mechanisms 10.6 Inscrutability and Durability 10.7 Mechanism Selection by an Informed Principal 10.8 Neutral Bargaining Solutions 10.9 Dynamic Matching Processes with Incomplete Information Exercises Bibliography Index

3,569 citations

01 Jan 1990
TL;DR: An overview of the self-organizing map algorithm, on which the papers in this issue are based, is presented in this article, where the authors present an overview of their work.
Abstract: An overview of the self-organizing map algorithm, on which the papers in this issue are based, is presented in this article.

2,933 citations