Hiren Patel

ORCID: 0000-0003-1128-8110
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Blockchain Technology Applications and Security
  • Cloud Data Security Solutions
  • Advanced Database Systems and Queries
  • Advanced Malware Detection Techniques
  • Caching and Content Delivery
  • Data Management and Algorithms
  • Cryptography and Data Security
  • Antibiotic Resistance in Bacteria
  • Cryptographic Implementations and Security
  • Antibiotics Pharmacokinetics and Efficacy
  • Distributed and Parallel Computing Systems
  • Scientific Computing and Data Management
  • Graph Theory and Algorithms
  • Chaos-based Image/Signal Encryption
  • Microwave-Assisted Synthesis and Applications
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Energy Efficient Wireless Sensor Networks
  • Network Security and Intrusion Detection
  • Data Quality and Management
  • Data Stream Mining Techniques
  • Advanced Data Storage Technologies
  • Nanomaterials for catalytic reactions
  • Multicomponent Synthesis of Heterocycles

Augusta University Health
2024

University of Pennsylvania
2024

University of Waterloo
2014-2024

Kadi Sarva Vishwavidyalaya
2020-2023

Microsoft Research (United Kingdom)
2018-2022

Microsoft (United States)
2018-2022

Parul University
2022

Microsoft (Finland)
2019-2020

Victoria Hospital
2017-2019

Western Sydney University
2017-2018

10.1016/j.jksuci.2021.08.005 article EN Journal of King Saud University - Computer and Information Sciences 2021-08-12

Query optimizers are notorious for inaccurate cost estimates, leading to poor performance. The root of the problem lies in cardinality i.e., size intermediate (and final) results a query plan. These estimates also determine resources consumed modern shared cloud infrastructures. In this paper, we present C ARD L EARNER , machine learning based approach learn models from previous job executions and use them predict cardinalities future jobs. key intuition our is that workloads often recurring...

10.14778/3291264.3291267 article EN Proceedings of the VLDB Endowment 2018-11-01

We observe significant overlaps in the computations performed by user jobs modern shared analytics clusters. Naïvely computing same subexpressions multiple times results wasting cluster resources and longer execution times. Given that these workloads consist of tens thousands jobs, identifying overlapping across is great interest to both operators users. Nevertheless, existing approaches support orders magnitude smaller or employ heuristics with limited effectiveness. In this paper, we focus...

10.14778/3192965.3192971 article EN Proceedings of the VLDB Endowment 2018-03-01

10.1016/j.compag.2020.105779 article EN Computers and Electronics in Agriculture 2020-09-18

Query processing over big data is ubiquitous in modern clouds, where the system takes care of picking both physical query execution plans and resources needed to run those plans, using a cost-based optimizer. A good cost model, therefore, akin better resource efficiency lower operational costs. Unfortunately, production workloads at Microsoft show that costs are very complex model for systems. In this work, we investigate two key questions: (i) can learn accurate models systems, (ii)...

10.1145/3318464.3380584 article EN 2020-05-29

The existing agriculture system is having several components such as supply chain management, crop insurance, the shipment of goods, and it involves numerous untrusted stakeholders users (farmers, retailers, customers, wholesalers, etc.), agencies (bank, insurance company) regulators (assessor, surveyors). Due to active engrossment middle man (mostly human beings or operated by beings) some key issues are raised transparency, timeliness, traceability, security, immutability resulting in...

10.1016/j.icte.2021.07.003 article EN cc-by-nc-nd ICT Express 2021-07-28

Analytics-as-a-service, or analytics job service, is emerging as a new paradigm for data analytics, be it in cloud environment within enterprises. In this setting, users are not required to manage tune their hardware and software infrastructure, they pay only the processing resources consumed per job. However, shared nature of these services across several teams leads significant overlaps partial computations, i.e., parts duplicated multiple jobs, thus generating redundant costs. paper, we...

10.1145/3183713.3190656 article EN Proceedings of the 2022 International Conference on Management of Data 2018-05-25

Cloud computing is a hybrid paradigm which makes use of utility computing, high performance cluster and grid it offers various benefits such as flexibility, expandability, little or almost no capital investment, disaster recovery, moveable work space much more. However, due to constantly increasing number data centers worldwide, the issue energy consumption by these has attracted attention researchers. Resource allocation resource utilization are major criterion in problem efficiency can be...

10.1016/j.jksuci.2017.12.001 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2017-12-06

An ethanolic mixture of molybdenum hexacarbonyl and DBU mediates the reduction nitroarenes to corresponding anilines in excellent yields 15-30 minutes under microwave ­irradiation.

10.1055/s-2007-986628 article EN Synlett 2007-09-21

As the Internet of Things becomes a reality, proliferation wireless devices such as ZigBee nodes has accelerated. Their presence is now wide spread in sensitive areas home automation, industrial control systems, medical and security systems. their popularity increased, so urgency to protect defend these networks. The decentralized nature ad-hoc networks creates unique challenges for maintaining network intrusion detection. RF-fingerprinting provides physical (PHY) layer defense against node...

10.1109/cisda.2015.7208645 article EN 2015-05-01

Workload consolidation is a phase in Cloud datacenter where tasks are allocated among the available hosts such way that minimal number of used and users' need terms service level agreement (SLA) fulfilled. To achieve workload consolidation, divided three groups based on their utilization namely overloaded hosts, underloaded host normal hosts. Detection over or challenging issue. Most existing researchers propose to use threshold values for detection. We believe there scope improvement...

10.1016/j.jksuci.2017.11.003 article EN cc-by-nc-nd Journal of King Saud University - Computer and Information Sciences 2017-11-22

Agriculture plays an essential role in the economies of developing countries such as India and contributes significantly to gross domestic product (GDP). The escalation population has led upsurge food demand. Numerous challenges selection crops, fertilizers, pesticides without considering various parameters like types soil, water requirement, temperature conditions, profitability analysis crops for a particular region may lead degradation quality crop, yield profitability. With advancement...

10.12944/carj.11.1.12 article EN Current Agriculture Research Journal 2023-05-10

In this study, a multitask model is proposed to perform simultaneous news category and sentiment classification of diverse dataset comprising 3263 records spanning across eight categories, including environment, health, education, tech, sports, business, lifestyle, science. Leveraging the power Bidirectional Encoder Representations from Transformers (BERT), algorithm demonstrates remarkable results in both tasks. For topic classification, it achieves an accuracy 98% along with balanced...

10.4108/eetsis.5287 article EN cc-by ICST Transactions on Scalable Information Systems 2024-07-11

Introduction: This research article intends to depict the usage of machine learning (ML) techniques in software defined network (SDN) address Distributed Denial Service (DDoS) attack. Due expansion complex operations and configurations, SDN has come out as a propitious model which uses software-based controllers or application programming interfaces (APIs) manage activity an organization connect with basic equipment framework. Unlike traditional systems use dedicated hardware (such switches)...

10.52783/jisem.v10i30s.4828 article EN Journal of Information Systems Engineering & Management 2025-03-29

The widespread adoption of ZigBee devices in critical infrastructure applications has justifiably heightened security concerns. Attack methods exist that allow unauthorized rogue to insert themselves into established networks. Radio Frequency (RF) fingerprinting provides one countermeasure spoofing attacks by identifying hardware their unique RF characteristics. To make such more practical, this paper compares performance a low-cost software defined radio receiver with high-cost using six...

10.1109/milcom.2014.13 article EN 2014-10-01

Database administrators (DBAs) were traditionally responsible for optimizing the on-premise database workloads. However, with rise of cloud data services, where providers offer fully managed processing capabilities, role a DBA is completely missing. At same time, query workloads becoming increasingly important reducing total costs operation and making economically viable in cloud. This paper revisits workload optimization context these emerging cloud-based services. We observe that missing...

10.1145/3357223.3362726 article EN 2019-11-11

Right-sizing resource allocation for big-data queries, particularly in serverless environments, is critical improving infrastructure operational efficiency, capacity availability, query performance predictability, and reducing unnecessary wait times. In this paper, we present AutoToken --- a simple effective predictor estimating the peak usage of recurring big data queries. It uses multiple plan identifiers to identify templates learn models with goal over-allocation future instances those...

10.14778/3415478.3415554 article EN Proceedings of the VLDB Endowment 2020-08-01

The Internet has changed business, education, healthcare, banking etc. and it is the main part of technological evolution. provides us a connecting world to perform our day life activities easily. designed in such way that can uniquely identify machine, not person, on network hence there need design system entity identification Internet. Currently Internet, service providers provide identity user with name password store this information centralized server. These servers become honey pot for...

10.1109/iciss49785.2020.9315899 article EN 2020-12-03

Cloud computing allows users to migrate their calculations distributed environment which will utilize more number of resources complete execution quickly. Virtualization means multiple virtual machines (VM) on single physical machine.During process migration, VM move one machine another. In offline is stopped till the can continue target machine, while in live migration execute without interrupted. Live a during seems be responsive all time from clients' perspective. Data centre, performs...

10.1109/csnt.2015.263 article EN 2015-04-01

A series of arylboronates has been synthesized from the reaction 2-(2-, (3-, or (4-(bromomethyl)phenyl)-4,4,5,5-tetramethyl-1,3,2-dioxaborolane 1{1−3} respectively with a range N-, S-, and O-nucleophiles, using microwave-mediated chemistry. For synthesis N- S-substituted boronates, supported base, PS-NMM, was employed, many reactions were complete within 15 min. With mixture tetrabutylammonium bromide, potassium carbonate, sodium hydroxide employed. The resulting aminomethyl, mercaptomethyl,...

10.1021/co100011g article EN ACS Combinatorial Science 2010-11-10

A HDAC, kinase inhibitor hybrid, (<italic>Z</italic>)-N1-(3-((1<italic>H</italic>-pyrrol-2-yl)methylene)-2-oxoindolin-5-yl)-N8-hydroxyoctanediamide, <bold>6</bold>, showed impressive anticancer action in a number of biochemical and cell-based assays.

10.1039/c4md00211c article EN MedChemComm 2014-01-01
Coming Soon ...