- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Blockchain Technology Applications and Security
- Cloud Data Security Solutions
- Advanced Database Systems and Queries
- Advanced Malware Detection Techniques
- Caching and Content Delivery
- Data Management and Algorithms
- Cryptography and Data Security
- Antibiotic Resistance in Bacteria
- Cryptographic Implementations and Security
- Antibiotics Pharmacokinetics and Efficacy
- Distributed and Parallel Computing Systems
- Scientific Computing and Data Management
- Graph Theory and Algorithms
- Chaos-based Image/Signal Encryption
- Microwave-Assisted Synthesis and Applications
- Physical Unclonable Functions (PUFs) and Hardware Security
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Data Quality and Management
- Data Stream Mining Techniques
- Advanced Data Storage Technologies
- Nanomaterials for catalytic reactions
- Multicomponent Synthesis of Heterocycles
Augusta University Health
2024
University of Pennsylvania
2024
University of Waterloo
2014-2024
Kadi Sarva Vishwavidyalaya
2020-2023
Microsoft Research (United Kingdom)
2018-2022
Microsoft (United States)
2018-2022
Parul University
2022
Microsoft (Finland)
2019-2020
Victoria Hospital
2017-2019
Western Sydney University
2017-2018
Query optimizers are notorious for inaccurate cost estimates, leading to poor performance. The root of the problem lies in cardinality i.e., size intermediate (and final) results a query plan. These estimates also determine resources consumed modern shared cloud infrastructures. In this paper, we present C ARD L EARNER , machine learning based approach learn models from previous job executions and use them predict cardinalities future jobs. key intuition our is that workloads often recurring...
We observe significant overlaps in the computations performed by user jobs modern shared analytics clusters. Naïvely computing same subexpressions multiple times results wasting cluster resources and longer execution times. Given that these workloads consist of tens thousands jobs, identifying overlapping across is great interest to both operators users. Nevertheless, existing approaches support orders magnitude smaller or employ heuristics with limited effectiveness. In this paper, we focus...
Query processing over big data is ubiquitous in modern clouds, where the system takes care of picking both physical query execution plans and resources needed to run those plans, using a cost-based optimizer. A good cost model, therefore, akin better resource efficiency lower operational costs. Unfortunately, production workloads at Microsoft show that costs are very complex model for systems. In this work, we investigate two key questions: (i) can learn accurate models systems, (ii)...
The existing agriculture system is having several components such as supply chain management, crop insurance, the shipment of goods, and it involves numerous untrusted stakeholders users (farmers, retailers, customers, wholesalers, etc.), agencies (bank, insurance company) regulators (assessor, surveyors). Due to active engrossment middle man (mostly human beings or operated by beings) some key issues are raised transparency, timeliness, traceability, security, immutability resulting in...
Analytics-as-a-service, or analytics job service, is emerging as a new paradigm for data analytics, be it in cloud environment within enterprises. In this setting, users are not required to manage tune their hardware and software infrastructure, they pay only the processing resources consumed per job. However, shared nature of these services across several teams leads significant overlaps partial computations, i.e., parts duplicated multiple jobs, thus generating redundant costs. paper, we...
Cloud computing is a hybrid paradigm which makes use of utility computing, high performance cluster and grid it offers various benefits such as flexibility, expandability, little or almost no capital investment, disaster recovery, moveable work space much more. However, due to constantly increasing number data centers worldwide, the issue energy consumption by these has attracted attention researchers. Resource allocation resource utilization are major criterion in problem efficiency can be...
An ethanolic mixture of molybdenum hexacarbonyl and DBU mediates the reduction nitroarenes to corresponding anilines in excellent yields 15-30 minutes under microwave irradiation.
As the Internet of Things becomes a reality, proliferation wireless devices such as ZigBee nodes has accelerated. Their presence is now wide spread in sensitive areas home automation, industrial control systems, medical and security systems. their popularity increased, so urgency to protect defend these networks. The decentralized nature ad-hoc networks creates unique challenges for maintaining network intrusion detection. RF-fingerprinting provides physical (PHY) layer defense against node...
Workload consolidation is a phase in Cloud datacenter where tasks are allocated among the available hosts such way that minimal number of used and users' need terms service level agreement (SLA) fulfilled. To achieve workload consolidation, divided three groups based on their utilization namely overloaded hosts, underloaded host normal hosts. Detection over or challenging issue. Most existing researchers propose to use threshold values for detection. We believe there scope improvement...
Agriculture plays an essential role in the economies of developing countries such as India and contributes significantly to gross domestic product (GDP). The escalation population has led upsurge food demand. Numerous challenges selection crops, fertilizers, pesticides without considering various parameters like types soil, water requirement, temperature conditions, profitability analysis crops for a particular region may lead degradation quality crop, yield profitability. With advancement...
In this study, a multitask model is proposed to perform simultaneous news category and sentiment classification of diverse dataset comprising 3263 records spanning across eight categories, including environment, health, education, tech, sports, business, lifestyle, science. Leveraging the power Bidirectional Encoder Representations from Transformers (BERT), algorithm demonstrates remarkable results in both tasks. For topic classification, it achieves an accuracy 98% along with balanced...
Introduction: This research article intends to depict the usage of machine learning (ML) techniques in software defined network (SDN) address Distributed Denial Service (DDoS) attack. Due expansion complex operations and configurations, SDN has come out as a propitious model which uses software-based controllers or application programming interfaces (APIs) manage activity an organization connect with basic equipment framework. Unlike traditional systems use dedicated hardware (such switches)...
The widespread adoption of ZigBee devices in critical infrastructure applications has justifiably heightened security concerns. Attack methods exist that allow unauthorized rogue to insert themselves into established networks. Radio Frequency (RF) fingerprinting provides one countermeasure spoofing attacks by identifying hardware their unique RF characteristics. To make such more practical, this paper compares performance a low-cost software defined radio receiver with high-cost using six...
Database administrators (DBAs) were traditionally responsible for optimizing the on-premise database workloads. However, with rise of cloud data services, where providers offer fully managed processing capabilities, role a DBA is completely missing. At same time, query workloads becoming increasingly important reducing total costs operation and making economically viable in cloud. This paper revisits workload optimization context these emerging cloud-based services. We observe that missing...
Right-sizing resource allocation for big-data queries, particularly in serverless environments, is critical improving infrastructure operational efficiency, capacity availability, query performance predictability, and reducing unnecessary wait times. In this paper, we present AutoToken --- a simple effective predictor estimating the peak usage of recurring big data queries. It uses multiple plan identifiers to identify templates learn models with goal over-allocation future instances those...
The Internet has changed business, education, healthcare, banking etc. and it is the main part of technological evolution. provides us a connecting world to perform our day life activities easily. designed in such way that can uniquely identify machine, not person, on network hence there need design system entity identification Internet. Currently Internet, service providers provide identity user with name password store this information centralized server. These servers become honey pot for...
Cloud computing allows users to migrate their calculations distributed environment which will utilize more number of resources complete execution quickly. Virtualization means multiple virtual machines (VM) on single physical machine.During process migration, VM move one machine another. In offline is stopped till the can continue target machine, while in live migration execute without interrupted. Live a during seems be responsive all time from clients' perspective. Data centre, performs...
A series of arylboronates has been synthesized from the reaction 2-(2-, (3-, or (4-(bromomethyl)phenyl)-4,4,5,5-tetramethyl-1,3,2-dioxaborolane 1{1−3} respectively with a range N-, S-, and O-nucleophiles, using microwave-mediated chemistry. For synthesis N- S-substituted boronates, supported base, PS-NMM, was employed, many reactions were complete within 15 min. With mixture tetrabutylammonium bromide, potassium carbonate, sodium hydroxide employed. The resulting aminomethyl, mercaptomethyl,...
A HDAC, kinase inhibitor hybrid, (<italic>Z</italic>)-N1-(3-((1<italic>H</italic>-pyrrol-2-yl)methylene)-2-oxoindolin-5-yl)-N8-hydroxyoctanediamide, <bold>6</bold>, showed impressive anticancer action in a number of biochemical and cell-based assays.