Chandrashekhar Dhote

Chandrashekhar Dhote
Prof. Ram Meghe Institute of Technology & Research · Computer Science and Engineering

PhD

About

43
Publications
8,529
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
276
Citations
Introduction
Chandrashekhar Dhote currently works at the Computer Science and Engineering, Prof. Ram Meghe Institute of Technology & Research. Chandrashekhar does research in Computer Security and Reliability, Distributed Computing and Computer Communications (Networks). Their current project is 'Use of Data Mining in Environmental systems'.

Publications

Publications (43)
Conference Paper
In Security-as-a-service model the emphasis is on security being provided as a cloud service; i.e. security delivered through the cloud in place of any on-premise security implementations. In this paper we discuss Intelligent Transparent Email Security-as-a-service (IntEmailSec-aas) provided as a cloud service. The IntEmailSec-aas for email securit...
Chapter
Data security is a major concern in cloud computing. It must satisfy three goals of security in computing—integrity, confidentiality, and availability. User or cloud service provider (CSP) can perform operations on cloud data without performing decryption by using homomorphic encryption. Many algorithms are available for homomorphic encryption. The...
Article
In the Proposed research work, an attempt has been done to explore the possibility for performance enhancement of the classical microstrip patch antenna loaded by ellipsoidal dielectric lens. In order to accomplish that, an inset-fed microstrip patch antenna was chosen working with frequency band 4- 8 GHz (C band). Ellipsoidal dielectric lens was f...
Chapter
In Security-as-a-service model the objective is to provide security as one of the cloud services. In this model the security is provided from the cloud in place of traditional on-premise implementation. The objective of this initiative is to provide Anti-Malware functionality as a cloud service. This paper provides implementation framework for Anti...
Article
Full-text available
In Security-as-a-service model the focus is on security delivered as cloud services; i.e. security provided through the cloud instead of on premise security solutions. Identity and Access Management (IAM) focuses on authentication, authorization, administration of Identities and audit. Its primary concern is verification of identity of entity and g...
Article
Full-text available
Cloud computing is a broad and diverse phenomenon. Users are allowed to store large amount of data on cloud storage for future use. The various security issues related to data security, privacy, confidentiality, integrity and authentication needs to be addressed. Most of the cloud service provider stores the data in plaintext format and user need t...
Conference Paper
Security-as-a-Service model delivers security as a commodity in form of a cloud service. The security is provided as one of cloud services in place of on-premise security solutions. The initiative proposed here is to provide encryption and decryption as a cloud service in an intelligent and transparent manner. The users can exercise the service by...
Conference Paper
Due increase in the usage of cloud based systems there is an increase in the amount of information on the cloud and as a result there is need for confidentiality. Most common method used for authentication is textual password. But these passwords are susceptible to shoulder surfing, dictionary attack, eavesdropping. Generally the passwords tend to...
Conference Paper
Relay transmission can enhance coverage and throughput, whereas it can be vulnerable to eavesdropping attacks due to the additional transmission of the source message at the relay. Thus, whether or not one should use relay transmission for secure communication is an interesting and important problem. In this paper, we consider the transmission of a...
Article
Clustering is an unsupervised technique, which partitions the entire input space into regions. These initial partitions have a great impact on the resulting clusters. In this paper, a new Multi Stage Genetic Clustering (MSGC) scheme for multiobjective optimization in data clustering is proposed, which can automatically partition the data into an ap...
Article
Clustering techniques are aimed to partition the entire input space into disconnected sets where the members of each set are highly connected. K-harmonic means (KHM) is a well-known data clustering technique, but it runs into local optima. A two stage genetic clustering method using KHM (TSGKHM) is proposed in this research, which can automatically...
Conference Paper
With the advent of ever increasing data availability on internet, mining and converting the information into knowledge is becoming extremely important and challenging task for researchers in data mining community. Mining of association rules is considered as an important research direction of data mining. XML is being extensively and pre-dominantly...
Conference Paper
This article presents a new Unification Matching Scheme (UMS) for information retrieval using the genetic algorithm. The selection of appropriate matching functions contributes to the performance of the information retrieval system. The proposed UMS executes the Unification function on three classical matching functions for different threshold valu...
Article
Data is growing at an enormous rate and mining this data is becoming a herculean task. Association Rule mining is one of the important algorithms used in data mining and mining frequent itemset is a crucial step in this process which consumes most of the processing time. Parallelizing the algorithm at various levels of computation will not only spe...
Conference Paper
Mining frequent itemset is an important step in association rule mining process. In this paper we are applying a parallel approach in the pre-processing step itself to make the dataset favorable for mining frequent itemsets and hence improve the speed and computation power. Due to data explosion, it is necessary to develop a system that can handle...
Conference Paper
This article presents a novel information retrieval algorithms using genetic algorithm to increase the performance of information retrieval system. The novel matching functions called Overall Matching Function (OMF) and Virtual Center based Matching Function (VCF) are proposed for improving the retrieval performance. Overall Matching Function gives...
Conference Paper
Clustering is the process of organising data into meaningful groups, and these groups are called clusters. It is a way of grouping data samples together that is similar in some way, according to some criteria that you pick. Swarm intelligence (SI) is a collective behavior of social systems like insects such as ants (ant colony optimization, ACO), f...
Conference Paper
In this paper, we propose a method of genetic algorithm (GA) for information retrieval (IR) based on Singular Value Decomposition and Principal Component Analysis. The main difficulty in GA based IR system is processing of high dimensional input strings, as affects the performance in terms of retrieval time. In proposed work, we tried to reduce the...
Conference Paper
Clustering is unsupervised learning method to extract hidden patterns and disciplines. Swarm intelligence deals with natural and artificial systems composed of many individuals that coordinate using decentralized control and self-organization. In this paper, we propose a new Swarm Intelligence based hybrid method for data clustering. The main diffi...
Article
Full-text available
Cities represent the social cultural economic development. For the sustainable urban development physical, economical, social, cultural, and environment plays equally important role. The current planning process focus more on land use, infrastructure and transportation network, the development is mechanical with less regards for the rich layers of...
Article
In this paper we present the various elementary traversal approaches for mining association rules. We start with a formal definition of association rule and its basic algorithm. We then discuss the association rule mining algorithms from several perspectives such as breadth first approach, depth first approach and Hybrid approach. Comparison of the...
Chapter
A data warehouse can be seen as a set of materialized views defined over remote base relation. When the query is posed, it is evaluated locally using the materialized view without accessing the original database. The paper proposes clustering based dynamic materialized view selection algorithm. The base of the paper is to propose similarity functio...
Chapter
Proceedings of the 3rd International Conference on Computer Technology and Development (ICCTD 2011) held in Chengdu, China during November 25–27, 2011. The aim objective of ICCTD 2011 is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and de...
Conference Paper
Text Mining is the discovery by computer of new, previously unknown information, by automatically extracting information from different written resources. A key element is the linking together of the extracted information together to form new facts or new hypotheses to be explored further by more conventional means of experimentation.
Conference Paper
Mobile ad hoc networks (MaNeT) play an important role in connecting devices in pervasive environments. Each node in MaNet can act as source and router. In this paper, we propose a hybrid routing protocol with Unicast Reply(HRP-UR) which combines the merits of both proactive and reactive approach. Like proactive approach, it maintains routing table...
Article
Full-text available
MaNet has emerged as one of the most focused and thrustresearch areas in the field of wireless networks and mobilecomputing. In ad hoc mobile networks, routes are mainly multihop because of the limited radio propagation range and topologychanges frequently and unpredictably since each network hostmoves randomly. Therefore, routing is an integral pa...
Article
This study presents the critical survey of the methodologies to select materialized view in more efficient way. In this study, we are summarizing all these methodologies with critical analysis. Advanced solutions are particularly focusing the evolutionary optimization methods. We have analyzed and compartmentalized the available literature on the b...
Conference Paper
Everyday an enormous amount of data is retrieved and transmitted. To avoid the chaos, Data mining and warehousing is used. A Data Warehouse is a set of materialized views defined over remote source relations. These materialized views must be maintained in response to actual relation updates in the remote sources. During the initial design and evolu...

Network

Cited By

Projects

Projects (2)