Shuchi Sethi

ORCID: 0000-0003-1757-955X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Data Stream Mining Techniques
  • Network Security and Intrusion Detection
  • Cloud Data Security Solutions
  • Advanced Malware Detection Techniques
  • Mobile Ad Hoc Networks
  • Big Data and Business Intelligence
  • Cooperative Communication and Network Coding
  • Advanced Data Storage Technologies
  • Opportunistic and Delay-Tolerant Networks
  • Complex Network Analysis Techniques
  • Energy Efficient Wireless Sensor Networks
  • Security and Verification in Computing
  • Market Dynamics and Volatility
  • Digital Marketing and Social Media
  • Chaos-based Image/Signal Encryption
  • Engineering Technology and Methodologies
  • Advanced Data Processing Techniques
  • Digital Transformation in Industry
  • Opinion Dynamics and Social Influence
  • Genetics, Bioinformatics, and Biomedical Research
  • Privacy-Preserving Technologies in Data

Amity University
2024

Amity University
2024

Nanyang Technological University
2023

Ministry of External Affairs
2023

Jamia Millia Islamia
2015-2021

Cloud computing has gained interest amongst commercial organizations, research communities, developers and other individuals during the past few years. In order to move ahead with in field of data management enable processing such data, we need benchmark datasets freely available which are publicly accessible. Google May 2011 released a trace cluster 11k machines referred as "Google Cluster Trace". This contains cell information about 29 days. paper provides analysis resource usage...

10.1109/cse-euc-dcabes.2016.271 article EN 2016-08-01

The behavior of peoples' request for a post on online social media is stochastic process that makes post's ranking highly skewed in nature. We mean peoples interest can grow/decay exponentially or linearly. Considering this nature the evolutionary interest, paper presents Growth-based Popularity Predictor (GPP) model predicting and web-contents. Three different kinds web-based real datasets namely Movielens, Facebook-wall-post Digg are used to evaluate performance proposed model. This...

10.1109/access.2020.2976134 article EN cc-by IEEE Access 2020-01-01

Management of data in education sector particularly management for big universities with several employees, departments and students is a very challenging task. There are also problems such as lack proper funds manpower universities. Education can easily effectively take advantage cloud computing skills data. It enhance the learning experience whole add entirely new dimensions to way which imbibed. Several benefits Cloud monetary benefits, environmental remote access university database be...

10.48550/arxiv.1501.07056 preprint EN other-oa arXiv (Cornell University) 2015-01-01

In the last 2 decades, managers have increasingly used multi-criteria decision-making techniques like analytic hierarchy process (AHP) owing to its many advantages. Additionally, capabilities of are enhanced with use Fuzzy logic. The purpose this research was assess efficacy FAHP strategy in hospital setting. research, we Analytic Hierarchy Process conduct a comprehensive literature review, omitting consideration temporal considerations favor focus on input and output criteria, finding that...

10.1109/inocon57975.2023.10101089 article EN 2023-03-03

10.23919/indiacom61295.2024.10498419 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2024-02-28

Cloud environment is usually associated with non-homogeneity and dynamicity in terms of resource usage access at all levels. The study this heterogeneous non-uniform behavior therefore an important problem. Google cluster trace which a production released by November 2014 serves as example high scale environment. This paper deals statistical analysis trace. Since the size very huge therefore, Hive HadoopDistributed File System (HDFS) based platform for querying big data, has been used. was...

10.17485/ijst/2015/v8i35/72419 article EN Indian Journal of Science and Technology 2015-12-18

This paper discusses covert channel attacks in VMM, with emphasis on some of its important detection techniques. is an active research area whereby many security frameworks have been proposed for isolating VMs, but still channels commercial clouds exist. Discussion detail (with examples and expressions) has done as to how information flow leads the methods used detection. In this various scenarios are discussed where efforts made detect all possible counter attacks. Among basic four areas...

10.1049/cp.2013.2305 article EN 2013-01-01

This project integrates TensorFlow, homomorphic encryption, and blockchain for secure data analytics. Prioritizing user privacy integrity, the solution adeptly processes inputs, conducts TensorFlow predictions, employs encryption. Our findings emphasize effectiveness of this integrated system, offering a seamless approach. Interpretations reveal potential decentralized analytics, particularly in handling sensitive data. Implications underscore reliability our safeguarding within machine...

10.23919/indiacom61295.2024.10498904 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2024-02-28

Enormous swings price changes for crude oil can have a significant impact on the economy and international politics. The ability to estimate prices accurately is crucial making decisions in variety of industries, including energy, finance, policy. This study investigates use machine learning time series analysis oil. Our main goal Prophet forecasting model with Random Forest Regressor make predictions about future using previous data. By taking advantage elements seasonality, past trends,...

10.23919/indiacom61295.2024.10498837 article EN 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom) 2024-02-28

This research introduces a new way of doing things by combining Decentralized Autonomous Cryptocurrency Portfolio Management system with Blockchain-Powered Market Analytics Platform. The main goal is to change how we handle cryptocurrency portfolios, giving users up-to-the-minute insights into the market. Moreover, study aims establish strong and secure financial environment in world cryptocurrencies. unique blend usher whole approach, catering changing requirements ever-shifting scenario....

10.1109/icrito61523.2024.10522333 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2024-03-14

The surge in web APIs has revolutionized software development but navigating their abundance remains a challenge. While existing recommendation systems consider popularity and diversity, they lack temporal dimension for anticipating future trends. This research introduces novel approach by integrating dynamics into API recommendations. Utilizing Long Short-Term Memory (LSTM) time series forecasting, this model goes beyond static awareness, providing developers with forward-looking insights....

10.1109/icrito61523.2024.10522417 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2024-03-14

10.1504/ijcvr.2024.10066616 article EN International Journal of Computational Vision and Robotics 2024-01-01

This work is focused on attacks confidentiality that require time synchronization. manuscript proposes a detection framework for covert channel perspective in cloud security. problem interpreted as binary classification and the algorithm proposed based certain features emerged after data analysis of Google cluster trace forms base analyzing attack free data. approach can be generalized to study flow other systems fault detection. The does not make assumptions pertaining distribution whole...

10.48550/arxiv.1501.04473 preprint EN other-oa arXiv (Cornell University) 2015-01-01

Abstract Contemporary research work in the field of Wireless Ad-hoc Networks (WANETs) are focused on most important issue performance, minimize congestion network. A number proposals have come up with innovative query transmission approaches order to scale down congestion, route latency and energy consumption feasible extent. It has been shown experimentally that these mainly checking propagation using broadcast repealing technique which unfortunately paves way additional routing overhead....

10.21203/rs.3.rs-357531/v1 preprint EN cc-by Research Square (Research Square) 2021-04-13

Recent research shows that colluded malware in different VMs sharing a single physical host may use resource as channel to leak critical information. Covert channels employ time or storage characteristics transmit confidential information attackers leaving no trail.These were not meant for communication and hence control mechanisms do exist. This means these remain undetected by traditional security measures employed firewalls etc network. The comprehensive survey address the issue...

10.48550/arxiv.1504.03539 preprint EN other-oa arXiv (Cornell University) 2015-01-01
Coming Soon ...