- Welding Techniques and Residual Stresses
- Advanced Welding Techniques Analysis
- Climate variability and models
- Hydrology and Drought Analysis
- Advanced machining processes and optimization
- Web Application Security Vulnerabilities
- Hydrogen embrittlement and corrosion behaviors in metals
- Non-Destructive Testing Techniques
- Network Security and Intrusion Detection
- Advanced Machining and Optimization Techniques
- Advanced Malware Detection Techniques
- Laser and Thermal Forming Techniques
- Arctic and Antarctic ice dynamics
- Internet Traffic Analysis and Secure E-voting
- Statistical Methods and Inference
- Security and Verification in Computing
- Financial Risk and Volatility Modeling
- Image and Video Quality Assessment
- Spam and Phishing Detection
- Microstructure and Mechanical Properties of Steels
- Remote Sensing in Agriculture
- Climate change impacts on agriculture
- Manufacturing Process and Optimization
- Data Management and Algorithms
- Climate change and permafrost
Punjab Engineering College
2023
Indian Institute of Science Education and Research Mohali
2023
Indian Institute of Technology Kharagpur
1979-2022
Centurion University of Technology and Management
2020
University of Delhi
2020
Tata Consultancy Services (India)
2015-2019
Sathyabama Institute of Science and Technology
2019
Tezpur University
2008-2017
Northeastern University
2009-2015
Temple University
2008-2014
Agriculture is the most important sector in Indian economy. India occupies second highest rank farm outputs world. Its contribution to development of economy has immense potential. So agriculture products may play vital role for economic growth. But different kind diseases plant decreases production crops and growth rate farmers. To identify monitor leaf manually by farmers very difficult. This one reasons develop an automatic detection model. The proposed model helps at early stages. Thus,...
HTTP GET flooding attack is considered to be one of the most successful attacks Application Layer Denial Service (App-DoS). Detection such difficult due its non-intrusive nature. This paper presents an effective method for detection App-DoS three different scenarios. The proposed was tested over real-life data-sets, i.e. KDD99, LBNL and our own data-set, has been found perform satisfactorily.
In the present study, machine learning algorithms have been used to predict residual stress during electron beam welding of stainless steel using information input process parameters and natural frequency vibrations. Accelerating voltage, current speed considered as parameters. Both frequencies vibration weld obtained each set are measured experimentally. A number algorithms, namely M5 algorithm-based Model Trees Regression, Random forest, Support Vector Reduced Error Pruning Tree,...
In welding, the concept of optimisation had been used, till date, to serve two specific purposes. To obtain any desired weld attributes, a set required optimal input parameters could be determined utilising principle optimisation. establish an input–output relationship welding process accurately, which might essential automate it, tools for used extensively. These problems were formulated as either single-objective or multi-objectives many-objectives ones. Both traditional and...
A large number of web applications, especially those deployed by companies for e-business operations involve high reliability, efficiency and confidentiality.Such applications are often written in script languages like PHP embedded HTML, allowing establishing connection to databases, retrieving data, putting them the Web.One most common application attacks is SQL Injection.In this an attacker attempts use malicious crafted input strings so that dynamic queries generated different from...
Web is one of the most popular internet services in today's world. In world, web servers and based applications are corporate become targets attackers. A Large number applications, especially those deployed for companies to e-business operation involve high reliability, efficiency confidentiality. Such written script languages like PHP embedded HTML allowing establish connection databases, retrieving data putting them WWW site. order detect known attacks, misuse detection attacks consists...
Predictive insights on extreme and rare events are important across multiple disciplines ranging from hydrology, climate, remote sensing to finance security. Characterizing the dependence of extremes covariates can help in identification plausible causal drivers may even inform predictive modeling. However, despite progress incorporation statistical theory sparse covariate discovery algorithms, has been limited for high-dimensional data where number is large. In this paper, we propose a...
Web-application attacks are considered to be one of the major security concerns a large number applications, especially those deployed in health care, banking and e-business operations. These applications must involve high addition other application requirements such as friendliness, effectiveness efficiency service provided end users. In this paper, we focus on vulnerabilities resulting from generic input validation problems that may cause cross-site scripting (XSS) attacks. We take look at...
This paper presents an effective detection method RDUD for SQL injection attack.RDUD is enhanced version of DUD [1].The comprises a supervised machine learning approach using Support Vector Machine(SVM) to learn and classify query at runtime.Two web profiles -(i) legitimate profile (ii) attack are generated each the web-application software which consists set production rules extracted from dynamic queries.Both during training phase.At runtime matched with accordingly it based on matching...