
Mano Paul- Doctor of Philosophy
- Associate Professor at Alliance University
Mano Paul
- Doctor of Philosophy
- Associate Professor at Alliance University
Working in QUBIT
About
44
Publications
3,763
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
178
Citations
Introduction
Doing Research in Quantum, ML and cyber security / social networks
Skills and Expertise
Current institution
Education
June 2012 - December 2018
October 2003 - July 2005
August 1998 - May 2002
Noorul Isalm College of Engineering
Field of study
- Information Technology
Publications
Publications (44)
Intrustion Detection System (IDS) refers to the gear or software that monitors a network or system for malicious activity or policy violations. Periodically, the system records any intrusion action or breach, which frequently modifies the administrator. Cyber Physical System (CPS) is particularly called as networked connected system, in which the s...
Surfing Shoulder Surfing is a secret phrase-based attack which is a serious worry of protection in data security. Alphanumeric passwords are more helpless to attacks like shoulder surfing, dictionary attacks, etc., than graphical passwords. The creation of more muddled, challenging to-break passwords can be made simpler for clients with graphical a...
Suicide can be said as an act of taking one’s own life voluntarily and intentionally. Suicide can be prevented by identifying the condition of the person whether there are any suicidal tendencies and then by reporting it to the dearer or next to the kin. Detection of suicide ideation/tendencies or depression of a person is done by using their speec...
Cloud services in fog network is a platform that inherits software services to a network to handle cloud-specific problems. A significant component of the security paradigm that supports service quality is represented by intrusion detection systems (IDSs). This work develops an optimization environment to mitigate intrusion using RSLO classifier on...
The arbitrary distribution of sensor nodes and irregularity of the routing path led to unordered data, which is complex to handle in a wireless sensor network (WSN). To increase WSN lifetime, data aggregation models are developed to minimize energy consumption or ease the computational burden of nodes. The compressive sensing (CS) provides a new te...
Social media refers to the medium of communication among people to do conversations, share thoughts, create and exchange data and also build a relationship by connecting with the audience, etc. It is a form of internet-based communication platform to share information content and also create web content. Conversations are open dialog in communities...
This work describes a 4-bit Flash ADC with low power consumption. The performance metrics of a Flash ADC depend on the kind of comparator and encoder used. Hence open-loop comparator and mux-based encoder are used to obtain improved performance. Simulation results show that the simulated design consumes 0.265mW of power in 90nm CMOS technology usin...
The Internet of Things (IoT) has appreciably influenced the technology world in the context of interconnectivity, interoperability, and connectivity using smart objects, connected sensors, devices, data, and appliances. The IoT technology has mainly impacted the global economy, and it extends from industry to different application scenarios, like t...
Covids are a gathering of infections having a place with the group of Coronaviridae, which taint the two creatures and people. Human Covids can cause mellow malady like a typical cold, while others cause more extreme sickness, (for example, "MERS-Middle East Respiratory Syndrome and SARS-Severe Acute
The popularity of email spam is increasing rapidly by constantly consuming the resources of both servers and recipients. In this paper, we present a novel email spam filtering protocol namely, ESHIELD that uses big data analytics to defend against spam emails. The protocol is implemented at the receiver end for accurate and rapid filtering in order...
Fog computing is a framework, which expands services of the cloud to network for addressing inherent issues of the cloud. Intrusion Detection Systems (IDSs) represent a major unit of the security model for fog networks for facilitating service quality. This paper devises a hybrid optimization-driven ensemble classifier in a fog computing platform....
Wireless mesh network is an evolving next generation multi-hop broadband wireless technology. Collaborative attacks are more severe at the transport layer of such networks where the transmission control protocol's three-way handshake process is affected with the intention to bring the network down by denying its services. In this paper, we propose...
In this paper, we design and analyse the Circuit for Grover's Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the...
In this paper, we design and analyse the Circuit for Grover's Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the...
In the recent past years prognostics has gained importance in the industry sector as they have reduced maintenance cost and time to a great deal. The term IoT has opened a wide variety of applications with it and there have been very few feeble attempts to integrate it with prognostics. Combining low-cost energy efficient MEMS sensor and IoT in pro...
A new architecture of Carry select adder has been proposed with improved switching energy using parallel prefix adder. The conventional Carry select adder is the use of two Ripple Carry Adder (RCA) and a multiplexer. The findings in this work are the replacement of one RCA block by Brent Kung adder and the other RCA block by excess-1 converter. Sim...
Fog computing is an emerging technology that offers high-quality cloud services by providing high bandwidth, low latency, and efficient computational power and storage capacity. Although cloud computing is an efficient solution so far to store and retrieve the huge data of IoT devices, it is expected to limit its performance due to low latency and...
In this paper, we design and analyze the Circuit for Grover's Quantum Search Algorithm on 2, 3 and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the...
Due to the proliferation of Technologies and social media, identifying an optimal word and its semantics plays an important role in today's literature and sentiment analysis of machine learning has provides an opinion derived mining technique. There is more research work focused on the effectiveness of different words that originated from rule-base...
In this paper, we design and analyse the Circuit for Grover’s Quantum Search Algorithm on 2, 3and 4-qubit systems, in terms of number of gates, representation of state vectors and measurement probability for the state vectors. We designed, examined and simulated the quantum circuit on IBM Q platform using Quantum Programming Studio. We present the...
Cloud services are being looked on as the method for providing access to quantum processing. Here we used a procedure of storage to achieve with reliable metric of cloud. This procedure can improve the reliability of storage of the quantum state in Cloud with a maximum possible probability.
Wireless mesh network is an evolving next generation multi-hop broadband wireless technology. Collaborative attacks are more severe at the transport layer of such networks where the transmission control protocol's three-way handshake process is affected with the intention to bring the network down by denying its services. In this paper, we propose...
Wireless mesh network is an evolving next generation multi-hop broadband wireless technology. Collaborative attacks are more severe at the transport layer of such networks where the transmission control protocol's three-way handshake process is affected with the intention to bring the network down by denying its services. In this paper, we propose...
: Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an al...
: Distributed Denial-of-Service attacks are very hard to be mitigated in wireless network environment. Here in this manuscript, an effective method of flood detection and mitigation architecture is proposed named eShield, which detects and prevent flooding attacks through spoof detection technique. The proposed method uses an architecture and an al...
Vineyard Irrigation consumes large amount of water for sustainability and quality production of grapes. In order to meet the demand of grapes on the growing population across the world, vineyard irrigation has to be improved. Improper tracking of the growth of grapes in vineyard has led to serious problem in quality production of grapes. To address...
In this paper, we propose a hybrid rule-based approach, named as Optimal Email Feature Selection (OEFS) Protocol for selecting optimal features to reduce the searching time in detecting spam emails. The OEFS protocol performs email spam detection in four stages: Feature Selection, Normalization of selected features, Rank Assignment and Optimal Feat...
Character perception is a unique way to diagnostic the unidentifiable character into understandable text. Nowadays, with the increasing urge of getting information digital media has been roped in because of its convenient use. Hence the printed media needs to get into digital format but the printed text needs to get recognized by the computer this...
Vineyard Irrigation consumes large amount of water for sustainability and quality production of grapes. In order to meet the demand of grapes on the growing population across the world, vineyard irrigation has to be improved. Improper tracking of the growth of grapes in vineyard has led to serious problem in quality production of grapes. To address...
Detection of spam emails is a key task since the internet community highly suffers from spam emails as nearly 90% of the incoming emails are spam. In this paper, a Cooperative Vector-based Reactive System (CVRS) has been proposed which filters spam emails in three steps, email classification, similarity detection and cooperative reaction. The CVRS...
In this paper, we propose a novel Collaborative Reputation-based Vector Space Model (CRVSM) for detection of spam email. CRVSM uses a vector space model for representing the feature vectors in multidimensional vector space in order to detect the spam emails in large space. We cluster the emails into five clusters so as to reduce the email spam dete...
The popularity of email spam is increasing rapidly by constantly consuming the resources of both servers and recipients. In this paper, we present a novel email spam filtering protocol namely, ESHIELD that uses big data analytics to defend against spam emails. The protocol is implemented at the receiver end for accurate and rapid filtering in order...
Wireless broadband networks are most vulnerable to denial-of-service attacks where attackers can disrupt legitimate communication between hosts in a network by flooding unwanted traffic between legitimate hosts. Flooding attack at the transport layer affects the TCP's 3-way handshake process, thereby denying the services of TCP. It also denies the...