- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Advanced Malware Detection Techniques
- Sustainable Supply Chain Management
- Network Security and Intrusion Detection
- User Authentication and Security Systems
- Quantum Mechanics and Applications
- Privacy-Preserving Technologies in Data
- Digital and Cyber Forensics
- Supply Chain and Inventory Management
- Anomaly Detection Techniques and Applications
- Spam and Phishing Detection
- Quantum-Dot Cellular Automata
- Quality and Supply Management
- Information and Cyber Security
- Adversarial Robustness in Machine Learning
- Internet Traffic Analysis and Secure E-voting
- Speech Recognition and Synthesis
- Service and Product Innovation
- Product Development and Customization
- Privacy, Security, and Data Protection
- Recycling and Waste Management Techniques
- COVID-19 Digital Contact Tracing
- Sustainable Industrial Ecology
- Topic Modeling
Tata Consultancy Services (India)
2016-2024
University of Siena
2024
Penn State Milton S. Hershey Medical Center
2024
Durham University
2017-2020
International Institute of Information Technology, Hyderabad
2019
International Institute of Information Technology
2017
Harvard University
2015
Indian Institute of Information Technology Allahabad
2013-2014
Indian Institute of Management Kozhikode
2010-2013
University of Maryland, College Park
2006-2010
Purpose This study tries to identify important criteria and sub-criteria for the evaluation of suppliers effective management supply chain sustainability risks (SCSR). also demonstrates application analytic hierarchy process (AHP) method in a specific case company that is managing short food facing difficulty ranking on three dimensions sustainability. Design/methodology/approach Literature reviews expert opinions are used assess each sustainability, followed by pairwise comparison as per...
Additive Manufacturing (AM) technology presents a very optimistic case for its application mass customisation. Even though theoretically suitable, practically several critical barriers inhibit implementation. Thus, this paper attempts to identify those and also understand the dynamic interaction among them. The were identified by detailed literature review validated expert opinions. Interpretative Structural Modelling (ISM) was applied determine mutual influences barriers. It able ascertain...
This research paper explores the emerging potential of IoT technology as an enabler for manufacturers seeking to exploit opportunities new production, business and operating models. Following analysis extant literature exploration four in-depth cases, presents dominant pathways servitizing model through implementation. first finding is extended in cross-case analysis, a categorization cases into pathways, comparing different levels supplier integration information exchange. Using this data...
This paper aims to address the constraints faced in incorporating smallholders sustainable palm oil production. There exists literature that acknowledges need for production of but none has proposed a solution beyond 'Roundtable on Sustainable Palm Oil' (RSPO) certification. In current business scenario, several organizations are struggling procure RSPO certified even after committing huge resources. RSPO, though good first step, major process and capacity resulting long processing times,...
Ransomware is one of the rising malwares in crimeware family. It encrypts user files and demands extortion money. From perspective an enterprise it very crucial to detect stop a ransomware attack. A well studied technique monitor file system behavior for suspicious activity. In this work we will show gap existing state art describe dynamic which learns new while under
Data poisoning is a type of adversarial attack on training data where an attacker manipulates fraction to degrade the performance machine learning model. There are several known defensive mechanisms for handling offline attacks, however measures online learning, points arrive sequentially, have not garnered similar interest. In this work, we propose defense mechanism minimize degradation caused by poisoned learner's model in setup. Our proposed method utilizes influence function which...
Contact tracing is a very powerful method to implement and enforce social distancing avoid spreading of infectious diseases. The traditional approach contact time consuming, manpower intensive, dangerous prone error due fatigue or lack skill. Due this there an emergence mobile based applications for tracing. These primarily utilize combination GPS absolute location Bluetooth relative remitted from user's smartphone infer various insights. have eased the task tracing; however, they also...
Abstract This paper addresses the problem of delivering continuously deteriorating agri-fresh produce from a wholesaler to number retailers, within specific time windows. The prime objective is decide routes in such way that overall cost incurred transportation, deterioration and penalty minimised. To model these conflicting objectives mathematical modelling approach proposed. Vehicle Routing Problem with Time Windows (VRPTW) Non-deterministic Polynomial-time hard (NP-hard) problem, without...
Quantum coherence has recently emerged as a key candidate for use resource in various quantum information processing tasks. Therefore, it is of utmost importance to explore the possibility creating greater number coherent states from an existing pair. In other words, we start with initial incoherent pair and induce via cloning. More specifically, genuinely state that remains change basis make at end. This process known broadcasting cloning, which can either be optimal or nonoptimal....
A number of markets, geographically separated, with different demand characteristics for products that share a common component, are analyzed. This component can either be manufactured locally in each the markets or transported between to fulfill demand. However, final assemblies localized respective markets. The decision making challenge is whether manufacture centrally locally. To formulate underlying setting, newsvendor modeling based approach considered. developed model solved using...
This paper presents an artificial immune system (AIS) based goal programming approach for a multi-attribute e-procurement system. Current trends reveal that procurers are now concerned with various attributes of supplier selection, rather than negotiating only on cost. The scenario considered in this pertains to the procurement homogenous item large quantity. In these circumstances, forced incorporate bids, dynamics pricing, related business requirements and multiple criteria bid evaluation....
Abstract In this paper a mathematical model for the batch sequencing problem in multistage supply chain is developed by taking into account three practically important objectives, viz. minimization of lead time, blocking time and due date violation. Attribute dependent operation sequence setup different dates, lot sizes batches variable losses to interaction among several stages like waiting, idling, are also considered model. The combinatorial nature complete enumeration all its...
Requirement engineering is the important phase in software development. Here, we gather all requirements of which proposed for An agile methodology produces high quality and takes less time comparison to traditional methods. Agile was discovered managing development process environment where requirement could be changed during process. methodology. In this paper, are providing a hybrid approach with help JAD prioritization helped by viewpoint.
Flexible distribution of data in the form quantum bits (qubits) amongst spatially separated entities is an essential component envisioned scalable computing architectures. Since qubits cannot be copied, this operation moving can relatively costly terms resources. Moreover, implementation gates requires precise and extensive classical control computation too. Accordingly, we consider problem dynamically permuting groups qubits, i.e., qubit packets using reconfigurable switches which routing...
In this paper, we present a quantum multicasting network, called generalized connector (n-GQC), which can be used to multicast information from n inputs outputs. This network is recursively constructed using n/2-GQCs and consists of O(n log <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">2</sup> n) gates. The key component the n-GQC another an n-quantum concentrator (n-QC). also × route arbitrary states on any m its top outputs, for m, 1 ¿ n....
Application of classification technique in healthcare is challenging because high dimensional medical data and its dynamic nature. The research work here focused on the study various approaches for transformation large into smaller datasets effective manner so that accurate could be performed. Data clustering a machine learning approach which divides dataset partitions having higher intra partition similarity within it dissimilarity among different partitions. Many algorithm exists varying...
Any persistent untagged, untapped and unclassified data can be termed as dark data. It has two common traits: first, it is not possible to determine its worth, second, in most of the scenarios inadequately protected. Previous work existing solutions are restricted cater single node system. Moreover, they perform specialized processing selected content, for example, logs. Further, there total negligence stakeholders minimal focus on getting generated within enterprise. From perspective an...
Obtaining high-quality labeled dataset for training a cybersecurity language model is challenging due to sensitive content, proprietary information, and shortage of skilled annotators. To address this issue, we turn pre-trained models (PLMs) but fine-tuning them can be costly in terms time, storage, data as complexity grows. Previous research introduced lightweight adapter modules which only small set parameters are updated each new task during training. In our work, concentrate on enhancing...