Vijay R. Sonawane

ORCID: 0000-0002-1998-0622
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Cryptography and Data Security
  • Data Management and Algorithms
  • Blockchain Technology Applications and Security
  • Greenhouse Technology and Climate Control
  • Data Mining Algorithms and Applications
  • Mobile Crowdsensing and Crowdsourcing
  • Semantic Web and Ontologies
  • Artificial Intelligence in Healthcare
  • Web Data Mining and Analysis
  • Biometric Identification and Security
  • Customer churn and segmentation
  • Topic Modeling
  • Big Data and Business Intelligence
  • Cloud Data Security Solutions
  • Advanced Data Storage Technologies
  • Advanced Clustering Algorithms Research
  • Advanced Text Analysis Techniques
  • Cloud Computing and Remote Desktop Technologies
  • Privacy-Preserving Technologies in Data
  • Natural Language Processing Techniques
  • Service-Oriented Architecture and Web Services
  • Building Energy and Comfort Optimization

Savitribai Phule Pune University
2018

Koneru Lakshmaiah Education Foundation
2015

Sandip Foundation
2015

The internet, like automated tools, has grown to better our daily lives. Interacting IoT products and cyber-physical systems. Generative Adversarial Network's (GANs') generator discriminator may have different inputs, allowing feedback in supervised models. AI systems use neural networks, adversarial networks analyse network feedback. Cyber-physical production (CPPS) herald intelligent manufacturing . CPPS launch cross-domain attacks since the virtual real worlds are interwoven. This project...

10.1080/00051144.2022.2140391 article EN Automatika 2022-11-11

In this paper, we explore Blockchain technology can be used to build a reliable decentralised authentication system. High security for the bioacoustics signal mechanism is guaranteed by using an optimised number of secured features from rather than conventional biometric authentication, and utilising blockchain model improve robustness multiple checks on data. It allows trustworthy tracking terminal activity. Then, light weighted cryptography (LWC) developed offer protection at each edge...

10.1016/j.measen.2023.100706 article EN cc-by-nc-nd Measurement Sensors 2023-02-07

Android applications often contain vulnerabilities that can be exploited by malicious software, making automated malware detection is crucial. Since software have severe repercussions, a great deal of research and development effort has been put into developing mitigation strategies. Over the past few years, number different approaches tried in an to lessen danger posed software. The proposed approach involves multiple stages, including APK recompilation, feature extraction from manifest...

10.52783/jisem.v10i10s.1408 article EN Journal of Information Systems Engineering & Management 2025-02-13

Now a days people are using smart phones and wish to done the thing very efficiently that rapid increase in number of users internet fast decade had made Internet part parcel life IOT is latest emerging information technology. growing network everyday object from industrial machine consumer goods can share complete task while you busy with other activities. How be use for handling home appliances smartly. Smart apllications provides comfort, convenience user friendly many applinces. The...

10.1109/cicn.2015.177 article EN 2015-12-01

The identification of customer churn is a major issue for large telecom businesses. In order to manage the data current customers as well acquire and new customers, every day, substantial volume gets generated. Therefore, it's crucial identify causes client so that appropriate steps can be taken lower it. Numerous researchers have already discussed their efforts combine static dynamic approaches in reduce big sets, but these systems still many issues when it comes actually identifying churn....

10.17762/ijritcc.v11i7.7828 article EN International Journal on Recent and Innovation Trends in Computing and Communication 2023-09-01

<span>The efficient management of the dynamic XML documents is a complex area research. The changes and size throughout its lifetime are limitless. Change detection an important part version to identify difference between successive versions document. Document content continuously evolving. Users wanted be able query previous versions, in documents, as well retrieve particular document efficiently. In this paper we provide comprehensive comparative analysis various control schemes for...

10.11591/ijece.v5i4.pp840-848 article EN cc-by-nc International Journal of Electrical and Computer Engineering (IJECE) 2015-08-01

A brain tumor develops when abnormal cells in tissue multiply uncontrollably. For radiologists, finding and categorizing tumors manually has become a demanding time-consuming task. When radiologists or other clinical professionals need to extract an infected area from MR picture, they have go through lengthy laborious process. To improve performance simplify the segmentation process, we investigate FCM-predicted picture techniques this study. In addition, classifiers for automating detection...

10.56294/saludcyt2022241 article EN cc-by Salud Ciencia y Tecnología 2022-12-31

More than half the world's people consume rice every day and fulfills over 21% calorific requirement of world population. It is considered whole grain which rich in fiber it contains 80 percent with protein, phosphorus, potassium. There are hundreds different varieties each has a unique shape, texture, flavor that make just right for certain dishes. The quality between various types standards. Therefore, you must select best because not only good consumption but also health. Analyzing sample...

10.47760/ijcsmc.2021.v10i06.008 article EN International Journal of Computer Science and Mobile Computing 2021-06-30

Today with Standardization of XML as an information exchange over web, huge amount is formatted in the document. documents are size. The that has to be transmitted, processed, stored, and queried often larger than other data formats. Also real world applications dynamic nature. versatile applicability different fields maintenance management increasing demand store versions time. However, storage all document may introduce redundancy. Self describing nature creates problem verbosity,<br...

10.11591/ijece.v5i6.pp1472-1479 article EN cc-by-nc International Journal of Electrical and Computer Engineering (IJECE) 2015-12-01

With the unstable growth of Web, there is an ever-Increasing volume data and information published in numerous Web pages. mining aims to develop new techniques effectively extract mine useful knowledge or from these And allows user easily locate desired object huge data. In this paper, we propose simple web site technique by product pages e-commercial site. For are taking benefits hierarchical structure HTML language. First it discovers set descriptions based on measure entropy at each node...

10.1109/dsde.2010.19 article EN 2010-02-01

India's Public Distribution System (PDS) is the largest ration distribution system in world. provides a card to peoples and from that card, they will be able purchase materials like rice, wheat, kerosene, oil. State Government issues different cards yellow saffron white depending on family annual income. The consumer material supplied holders first week of every month by shopkeeper. Ration India not without its defects. shop owner illegally uses prior knowledge there consumer. proposed aids...

10.22214/ijraset.2018.1345 article EN International Journal for Research in Applied Science and Engineering Technology 2018-01-31

Network, Storage, Resources, Application services monitoring is becoming increasingly important for provision of QoS (Quality services) in IT. So to manage the huge data centers servers resources and installed application on it required more human time check every server status by login it. this paper we are introducing new network tool. Using you can your all DC. In providing features like: Manage different platform (Windows Linux), Hardware Inventory like how many Disks, Memory, CPU used...

10.1109/cicn.2015.46 article EN 2015-12-01

Abstract This study appears to be the first use a MATLAB simulator illustrate Particle Swarm Optimization with multiple input–output restrictions. proposed study's overarching objective was make entire process energy efficient, which provides improved performance high accuracy and minimizes operating cost by incorporating energy, ventilation, CO 2 . Further, reduce complexity of system, optimization technique divided into control controlled variables. Meanwhile, define state constraints for...

10.1002/ep.14145 article EN Environmental Progress & Sustainable Energy 2023-04-14
Coming Soon ...