Manu Vardhan

ORCID: 0000-0003-2944-7896
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Distributed and Parallel Computing Systems
  • Cloud Data Security Solutions
  • Distributed systems and fault tolerance
  • Cryptography and Data Security
  • Advanced Data Storage Technologies
  • Gene expression and cancer classification
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Evolutionary Algorithms and Applications
  • Privacy-Preserving Technologies in Data
  • Smart Agriculture and AI
  • Caching and Content Delivery
  • Internet Traffic Analysis and Secure E-voting
  • Peer-to-Peer Network Technologies
  • Topic Modeling
  • Stochastic Gradient Optimization Techniques
  • Software Testing and Debugging Techniques
  • Software Engineering Research
  • Hydrology and Watershed Management Studies
  • Hydrological Forecasting Using AI
  • Software Reliability and Analysis Research
  • Anomaly Detection Techniques and Applications

National Institute of Technology Raipur
2016-2025

Chaitanya Bharathi Institute of Technology
2023

Siddhartha Medical College
2023

National Institute of Technology Warangal
2019

Delhi Technological University
2019

Motilal Nehru National Institute of Technology
2011-2017

Abstract. The alteration in river flow patterns, particularly those that originate the Himalaya, has been caused by increased temperature and rainfall variability brought on climate change. Due to impending intensification of extreme events, as predicted Intergovernmental Panel Climate Change (IPCC) its Sixth Assessment Report, it is more essential than ever predict changes streamflow for future periods. Despite fact some research utilised machine-learning- deep-learning-based models...

10.5194/hess-27-1047-2023 article EN cc-by Hydrology and earth system sciences 2023-03-13

Cloud computing is becoming an increasingly admired paradigm that delivers high-performance resources over the Internet to solve large-scale scientific problems, but still it has various challenges need be addressed execute workflows. The existing research mainly focused on minimizing finishing time (makespan) or minimization of cost while meeting quality service requirements. However, most them do not consider essential characteristic cloud and major issues, such as virtual machines (VMs)...

10.1109/access.2016.2593903 article EN cc-by-nc-nd IEEE Access 2016-01-01

The explosion of the high-dimensional dataset in scientific repository has been encouraging interdisciplinary research on data mining, pattern recognition and bioinformatics. fundamental problem individual Feature Selection (FS) method is extracting informative features for classification model to seek malignant disease at low computational cost. In addition, existing FS approaches overlook fact that a given cardinality, there can be several subsets with similar information. This paper...

10.1142/s1469026819500202 article EN International Journal of Computational Intelligence and Applications 2019-06-28

Named-entity recognition (NER) is one of the primary components in various natural language processing tasks such as relation extraction, information retrieval, question answering, etc. The majority research work deals with flat entities. However, it was observed that entities were often embedded within other Most current state-of-the-art models deal problem embedded/nested entity very complex neural network architectures. In this work, we proposed to solve nested named-entity using...

10.3390/app12030976 article EN cc-by Applied Sciences 2022-01-18

Modern society is prominently dependent on information and communication technology over the last few decades has carried it with more vulnerability to an enormous variety of cyber-attacks. One attacks a Distributed Denial-of-Service (DDoS) that exploits power thousands sometimes hundreds compromised computers attack information-providing services online commercial sites, often resulting in significant downtime financial losses thereby denying legitimate clients. The study DDoS area...

10.1080/1206212x.2020.1720951 article EN International Journal of Computers and Applications 2020-01-30

10.1016/j.fsidi.2021.301176 article EN Forensic Science International Digital Investigation 2021-05-28

10.1007/s41870-021-00767-y article EN International Journal of Information Technology 2022-01-14

Blockchain-based distributed ledger technology (DLT) is transforming the existing operational models of economy, financial transactions and other government machineries so as to allow these operate in a much more secure decentralized manner. This research focuses on providing framework for P2P infrastructure handling e-stamp property registration mechanism along with interface verification document originality. The proposed efficient consensus reduces overhead broadcasting new block by than...

10.4018/ijcac.2019040104 article EN International Journal of Cloud Applications and Computing 2019-03-21

Distributed ledger technology is the driving force behind blockchain and proving its usefulness in various types of transaction processing systems. Fast, secure, reliable efficient transactions are key features based applications. A suitable or optimal size block used by an application dependent on number each block. Block optimization important issue for any as it directly affects performance scalability bottlenecks could prevent higher throughput cause congestion. larger will require...

10.1016/j.procs.2020.04.149 article EN Procedia Computer Science 2020-01-01

In the context of optimal subset selection, hybrid feature selection approaches play a significant role that has been topic substantial number studies because growing need for data mining applications. (FSS) problem; there are two shortcomi ngs to be addressed: At first, finding suitable filter method can reasonably fast and energetically computed large volume data, second, an efficient wrapper strategy discriminate samples over entire search space in considerable amount time. After study...

10.3233/jifs-169936 article EN Journal of Intelligent & Fuzzy Systems 2019-03-26
Coming Soon ...