Manish Shukla

ORCID: 0000-0003-4867-3530
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Computing Algorithms and Architecture
  • Quantum Information and Cryptography
  • Advanced Malware Detection Techniques
  • Sustainable Supply Chain Management
  • Network Security and Intrusion Detection
  • User Authentication and Security Systems
  • Quantum Mechanics and Applications
  • Privacy-Preserving Technologies in Data
  • Digital and Cyber Forensics
  • Supply Chain and Inventory Management
  • Anomaly Detection Techniques and Applications
  • Spam and Phishing Detection
  • Quantum-Dot Cellular Automata
  • Quality and Supply Management
  • Information and Cyber Security
  • Adversarial Robustness in Machine Learning
  • Internet Traffic Analysis and Secure E-voting
  • Speech Recognition and Synthesis
  • Service and Product Innovation
  • Product Development and Customization
  • Privacy, Security, and Data Protection
  • Recycling and Waste Management Techniques
  • COVID-19 Digital Contact Tracing
  • Sustainable Industrial Ecology
  • Topic Modeling

Tata Consultancy Services (India)
2016-2024

University of Siena
2024

Penn State Milton S. Hershey Medical Center
2024

Durham University
2017-2020

International Institute of Information Technology, Hyderabad
2019

International Institute of Information Technology
2017

Harvard University
2015

Indian Institute of Information Technology Allahabad
2013-2014

Indian Institute of Management Kozhikode
2010-2013

University of Maryland, College Park
2006-2010

Purpose This study tries to identify important criteria and sub-criteria for the evaluation of suppliers effective management supply chain sustainability risks (SCSR). also demonstrates application analytic hierarchy process (AHP) method in a specific case company that is managing short food facing difficulty ranking on three dimensions sustainability. Design/methodology/approach Literature reviews expert opinions are used assess each sustainability, followed by pairwise comparison as per...

10.1108/bfj-05-2024-0532 article EN British Food Journal 2025-02-07

Additive Manufacturing (AM) technology presents a very optimistic case for its application mass customisation. Even though theoretically suitable, practically several critical barriers inhibit implementation. Thus, this paper attempts to identify those and also understand the dynamic interaction among them. The were identified by detailed literature review validated expert opinions. Interpretative Structural Modelling (ISM) was applied determine mutual influences barriers. It able ascertain...

10.1080/09537287.2018.1474395 article EN Production Planning & Control 2018-05-21

This research paper explores the emerging potential of IoT technology as an enabler for manufacturers seeking to exploit opportunities new production, business and operating models. Following analysis extant literature exploration four in-depth cases, presents dominant pathways servitizing model through implementation. first finding is extended in cross-case analysis, a categorization cases into pathways, comparing different levels supplier integration information exchange. Using this data...

10.1080/09537287.2019.1631465 article EN Production Planning & Control 2019-12-03

This paper aims to address the constraints faced in incorporating smallholders sustainable palm oil production. There exists literature that acknowledges need for production of but none has proposed a solution beyond 'Roundtable on Sustainable Palm Oil' (RSPO) certification. In current business scenario, several organizations are struggling procure RSPO certified even after committing huge resources. RSPO, though good first step, major process and capacity resulting long processing times,...

10.1080/09537287.2017.1375145 article EN Production Planning & Control 2017-10-10

Ransomware is one of the rising malwares in crimeware family. It encrypts user files and demands extortion money. From perspective an enterprise it very crucial to detect stop a ransomware attack. A well studied technique monitor file system behavior for suspicious activity. In this work we will show gap existing state art describe dynamic which learns new while under

10.1145/2976749.2989051 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2016-10-24

Data poisoning is a type of adversarial attack on training data where an attacker manipulates fraction to degrade the performance machine learning model. There are several known defensive mechanisms for handling offline attacks, however measures online learning, points arrive sequentially, have not garnered similar interest. In this work, we propose defense mechanism minimize degradation caused by poisoned learner's model in setup. Our proposed method utilizes influence function which...

10.1109/comsnets53615.2022.9668557 preprint EN 2022-01-04

Contact tracing is a very powerful method to implement and enforce social distancing avoid spreading of infectious diseases. The traditional approach contact time consuming, manpower intensive, dangerous prone error due fatigue or lack skill. Due this there an emergence mobile based applications for tracing. These primarily utilize combination GPS absolute location Bluetooth relative remitted from user's smartphone infer various insights. have eased the task tracing; however, they also...

10.48550/arxiv.2004.13328 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Abstract This paper addresses the problem of delivering continuously deteriorating agri-fresh produce from a wholesaler to number retailers, within specific time windows. The prime objective is decide routes in such way that overall cost incurred transportation, deterioration and penalty minimised. To model these conflicting objectives mathematical modelling approach proposed. Vehicle Routing Problem with Time Windows (VRPTW) Non-deterministic Polynomial-time hard (NP-hard) problem, without...

10.1080/12460125.2013.810859 article EN Journal of Decision System 2013-07-17

Quantum coherence has recently emerged as a key candidate for use resource in various quantum information processing tasks. Therefore, it is of utmost importance to explore the possibility creating greater number coherent states from an existing pair. In other words, we start with initial incoherent pair and induce via cloning. More specifically, genuinely state that remains change basis make at end. This process known broadcasting cloning, which can either be optimal or nonoptimal....

10.1103/physreva.96.052319 article EN Physical review. A/Physical review, A 2017-11-14

A number of markets, geographically separated, with different demand characteristics for products that share a common component, are analyzed. This component can either be manufactured locally in each the markets or transported between to fulfill demand. However, final assemblies localized respective markets. The decision making challenge is whether manufacture centrally locally. To formulate underlying setting, newsvendor modeling based approach considered. developed model solved using...

10.3390/a11040054 article EN cc-by Algorithms 2018-04-20

This paper presents an artificial immune system (AIS) based goal programming approach for a multi-attribute e-procurement system. Current trends reveal that procurers are now concerned with various attributes of supplier selection, rather than negotiating only on cost. The scenario considered in this pertains to the procurement homogenous item large quantity. In these circumstances, forced incorporate bids, dynamics pricing, related business requirements and multiple criteria bid evaluation....

10.1080/00207540902922802 article EN International Journal of Production Research 2010-02-12

Abstract In this paper a mathematical model for the batch sequencing problem in multistage supply chain is developed by taking into account three practically important objectives, viz. minimization of lead time, blocking time and due date violation. Attribute dependent operation sequence setup different dates, lot sizes batches variable losses to interaction among several stages like waiting, idling, are also considered model. The combinatorial nature complete enumeration all its...

10.1080/00207540601158807 article EN International Journal of Production Research 2008-05-12

Requirement engineering is the important phase in software development. Here, we gather all requirements of which proposed for An agile methodology produces high quality and takes less time comparison to traditional methods. Agile was discovered managing development process environment where requirement could be changed during process. methodology. In this paper, are providing a hybrid approach with help JAD prioritization helped by viewpoint.

10.1109/icmira.2013.108 article EN 2013-12-01

Flexible distribution of data in the form quantum bits (qubits) amongst spatially separated entities is an essential component envisioned scalable computing architectures. Since qubits cannot be copied, this operation moving can relatively costly terms resources. Moreover, implementation gates requires precise and extensive classical control computation too. Accordingly, we consider problem dynamically permuting groups qubits, i.e., qubit packets using reconfigurable switches which routing...

10.1109/ciss.2007.4298416 article EN 2007-03-01

In this paper, we present a quantum multicasting network, called generalized connector (n-GQC), which can be used to multicast information from n inputs outputs. This network is recursively constructed using n/2-GQCs and consists of O(n log <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> n) gates. The key component the n-GQC another an n-quantum concentrator (n-QC). also × route arbitrary states on any m its top outputs, for m, 1 ¿ n....

10.1109/tc.2010.52 article EN IEEE Transactions on Computers 2010-02-19

Application of classification technique in healthcare is challenging because high dimensional medical data and its dynamic nature. The research work here focused on the study various approaches for transformation large into smaller datasets effective manner so that accurate could be performed. Data clustering a machine learning approach which divides dataset partitions having higher intra partition similarity within it dissimilarity among different partitions. Many algorithm exists varying...

10.1109/sces.2014.6880115 article EN Students Conference on Engineering and Systems 2014-05-01

Any persistent untagged, untapped and unclassified data can be termed as dark data. It has two common traits: first, it is not possible to determine its worth, second, in most of the scenarios inadequately protected. Previous work existing solutions are restricted cater single node system. Moreover, they perform specialized processing selected content, for example, logs. Further, there total negligence stakeholders minimal focus on getting generated within enterprise. From perspective an...

10.1145/2810103.2810131 article EN 2015-10-06

Obtaining high-quality labeled dataset for training a cybersecurity language model is challenging due to sensitive content, proprietary information, and shortage of skilled annotators. To address this issue, we turn pre-trained models (PLMs) but fine-tuning them can be costly in terms time, storage, data as complexity grows. Previous research introduced lightweight adapter modules which only small set parameters are updated each new task during training. In our work, concentrate on enhancing...

10.1145/3605098.3636122 article EN Proceedings of the 37th ACM/SIGAPP Symposium on Applied Computing 2024-04-08
Coming Soon ...