- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Data Stream Mining Techniques
- Network Security and Intrusion Detection
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Mobile Ad Hoc Networks
- Big Data and Business Intelligence
- Cooperative Communication and Network Coding
- Advanced Data Storage Technologies
- Opportunistic and Delay-Tolerant Networks
- Complex Network Analysis Techniques
- Energy Efficient Wireless Sensor Networks
- Security and Verification in Computing
- Market Dynamics and Volatility
- Digital Marketing and Social Media
- Chaos-based Image/Signal Encryption
- Engineering Technology and Methodologies
- Advanced Data Processing Techniques
- Digital Transformation in Industry
- Opinion Dynamics and Social Influence
- Genetics, Bioinformatics, and Biomedical Research
- Privacy-Preserving Technologies in Data
Amity University
2024
Amity University
2024
Nanyang Technological University
2023
Ministry of External Affairs
2023
Jamia Millia Islamia
2015-2021
Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years. In order to move ahead with in field of data management enable processing such data, we need benchmark datasets freely available which are publicly accessible. Google May 2011 released a trace cluster 11k machines referred as "Google Cluster Trace". This contains cell information about 29 days. paper provides analysis resource usage...
The behavior of peoples' request for a post on online social media is stochastic process that makes post's ranking highly skewed in nature. We mean peoples interest can grow/decay exponentially or linearly. Considering this nature the evolutionary interest, paper presents Growth-based Popularity Predictor (GPP) model predicting and web-contents. Three different kinds web-based real datasets namely Movielens, Facebook-wall-post Digg are used to evaluate performance proposed model. This...
Management of data in education sector particularly management for big universities with several employees, departments and students is a very challenging task. There are also problems such as lack proper funds manpower universities. Education can easily effectively take advantage cloud computing skills data. It enhance the learning experience whole add entirely new dimensions to way which imbibed. Several benefits Cloud monetary benefits, environmental remote access university database be...
In the last 2 decades, managers have increasingly used multi-criteria decision-making techniques like analytic hierarchy process (AHP) owing to its many advantages. Additionally, capabilities of are enhanced with use Fuzzy logic. The purpose this research was assess efficacy FAHP strategy in hospital setting. research, we Analytic Hierarchy Process conduct a comprehensive literature review, omitting consideration temporal considerations favor focus on input and output criteria, finding that...
Cloud environment is usually associated with non-homogeneity and dynamicity in terms of resource usage access at all levels. The study this heterogeneous non-uniform behavior therefore an important problem. Google cluster trace which a production released by November 2014 serves as example high scale environment. This paper deals statistical analysis trace. Since the size very huge therefore, Hive HadoopDistributed File System (HDFS) based platform for querying big data, has been used. was...
This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. is an active research area whereby many security frameworks have been proposed for isolating VMs, but still channels commercial clouds exist. Discussion detail (with examples and expressions) has done as to how information flow leads the methods used detection. In this various scenarios are discussed where efforts made detect all possible counter attacks. Among basic four areas...
This project integrates TensorFlow, homomorphic encryption, and blockchain for secure data analytics. Prioritizing user privacy integrity, the solution adeptly processes inputs, conducts TensorFlow predictions, employs encryption. Our findings emphasize effectiveness of this integrated system, offering a seamless approach. Interpretations reveal potential decentralized analytics, particularly in handling sensitive data. Implications underscore reliability our safeguarding within machine...
Enormous swings price changes for crude oil can have a significant impact on the economy and international politics. The ability to estimate prices accurately is crucial making decisions in variety of industries, including energy, finance, policy. This study investigates use machine learning time series analysis oil. Our main goal Prophet forecasting model with Random Forest Regressor make predictions about future using previous data. By taking advantage elements seasonality, past trends,...
This research introduces a new way of doing things by combining Decentralized Autonomous Cryptocurrency Portfolio Management system with Blockchain-Powered Market Analytics Platform. The main goal is to change how we handle cryptocurrency portfolios, giving users up-to-the-minute insights into the market. Moreover, study aims establish strong and secure financial environment in world cryptocurrencies. unique blend usher whole approach, catering changing requirements ever-shifting scenario....
The surge in web APIs has revolutionized software development but navigating their abundance remains a challenge. While existing recommendation systems consider popularity and diversity, they lack temporal dimension for anticipating future trends. This research introduces novel approach by integrating dynamics into API recommendations. Utilizing Long Short-Term Memory (LSTM) time series forecasting, this model goes beyond static awareness, providing developers with forward-looking insights....
This work is focused on attacks confidentiality that require time synchronization. manuscript proposes a detection framework for covert channel perspective in cloud security. problem interpreted as binary classification and the algorithm proposed based certain features emerged after data analysis of Google cluster trace forms base analyzing attack free data. approach can be generalized to study flow other systems fault detection. The does not make assumptions pertaining distribution whole...
Abstract Contemporary research work in the field of Wireless Ad-hoc Networks (WANETs) are focused on most important issue performance, minimize congestion network. A number proposals have come up with innovative query transmission approaches order to scale down congestion, route latency and energy consumption feasible extent. It has been shown experimentally that these mainly checking propagation using broadcast repealing technique which unfortunately paves way additional routing overhead....
Recent research shows that colluded malware in different VMs sharing a single physical host may use resource as channel to leak critical information. Covert channels employ time or storage characteristics transmit confidential information attackers leaving no trail.These were not meant for communication and hence control mechanisms do exist. This means these remain undetected by traditional security measures employed firewalls etc network. The comprehensive survey address the issue...