About
46
Publications
20,692
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
86
Citations
Introduction
Skills and Expertise
Additional affiliations
Education
March 2013 - December 2016
Publications
Publications (46)
Abstract: For years’ data has been a critical part of the technology and data has been perceived with the growth in technology and the population. This data is often referred to as NoSQL and unstructured data. Over the period of time, it is growing in complexity for traditional database management systems to manage some enormous databases in a virt...
The purpose of this article is to analyze subjective self‑evaluation of thermal and respiratory discomfort experienced by workers in the
foundry industry. Materials and Methods: One hundred and sixty‑one workers aged 18–55 years participated in this study. Discomfort due
to high temperatures, hot work, skin rashes, cramps, fatigue, weakness, respir...
In public health surveillance and classification of health care data, social media act as an alternative source to
find useful information. The massive amount of data generated over extended duration has set huge pressure on
writing act as well as on capacity. The overall cost of the data is very high. Data science tools and useful
techniques he...
Nowadays, there is a big trend in e-commerce websites where a large volume of valuable consumer sentiment data
increases at an astonishing rate. Analyzing, summarizing, and explaining these big data (sentiments) quickly and
efficiently is critical for data scientists. Many works exist in the public domain, such as hospitality, movies, hotel,
electr...
When there exists a massive growth of abnormal cells inside the human brain, it is called as Brain Tumour. One of the major challenges in Content Based Image Retrieval (CBIR) is the semantic gap, which is extraction of the information between the human evaluator and Magnetic Resonance Imaging (MRI) machines. In the present scenario, the radiologist...
To check out the health of the patient, digital images are generated every single day and are used by the radiologist for extracting out the details and anomalies. The complicated part is to figure out the disease in those images. By the manual diagnosis of the images through the radiologists, the doctors can get to know exact scenario of the abnor...
Cloud computing is a resource that includes computer resources, such as storage, servers, applications, networks, and other resources that may be used on-demand and access to the network for minimal efficiency. This user can keep your data and use and pay for multiple services accordingly. The key element is safety and how we keep our cloud data. I...
Education is critical to a country's economic development. Nowadays, classroom instruction is evolving, and students are increasingly drawn to technology. Therefore, in this rapidly evolving world, we must consider the latest innovations that will aid society in improving its teaching and learning processes. Cloud Computing is one such popular tech...
In today's world, vehicles are more focused to be automated and self-driving cars are the revolution in the automobile industry but when we compare the different architectures such as the Nvidia Model and Segnet Approach. We did not find any great open source solution for the deployment. There are hundreds of models present in the market to develop...
With the invention of smart devices, particularly mobile phones, the need for computing applications and mobile internet increased at leaps and bounds rate. Due to the huge demand for smartphones all over the world, the need to address the demands and managing the explosive growth of mobile traffic has also been raised. In fact, it became the prime...
Humans communicate mainly by vision and sound; therefore, a man-machine interface would be more intuitive if it made greater use of vision and audio recognition. Another advantage is that the user not only can communicate from a distance, but need have no physical contact with the computer. However, unlike audio commands, a visual system would be p...
With the development of image editing tools, manipulations of images has become a very easy task. Copy-move forgery is one such image manipulation, where some regions in the image is copied and pasted to another region in the same image. The objective of copy-move forgery may be to conceal some unwanted features, or to add some local features which...
Image manipulation has become a much simpler task with the advent of image editing software. Motion copy is such a manipulation process that copies and pastes certain sections into the image in the same image. It would hide some unwanted tasks or add other non-existent local features to copy a movable trick. A comprehensive investigation was conduc...
Hand gesture recognition is a simplest and innovative way to connect with computer ,since interactions with the computer can be increased through multi dimensional use of hand gestures .hand gesture recognition is one of the active region of research in computer vision. When user doesn't have technical knowledge about the system then human computer...
Fog computing, a relatively new phenomenon generally seen as an extension of cloud computing is also known as edge computing. Its unique features such as low latency, geo-distribution and scalability, mobility and location sensitivity along with many advantages have brought to fore new security and privacy challenges that have not yet been studied...
3D printing technology with the ability to covert digital bits into physical atoms has the potential to revolutionize the way manufacturing is viewed by the world today. Its impact on almost all aspects of human life is catching the fancy of industry giants. This technology which is tool less, more energy efficient, customization friendly, democrat...
Agile Development Methodologies have ascended in the earlier decade as an elective method for managing the work and movement of programming advancement improvement gatherings, with innumerable itemizing the determination and usage of advancement systems. The authorities of these methods make extensive cases with respect to the benefits of their usa...
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, where the management of the data and services may not be fully trustworthy. This unique paradigm brings about many new security challenges, which have not been well understo...
big data is what most industries are working with for growing their businesses and making timely decisions to win the competitive data oriented market. Huge size and complexity of data have made people move their data to the cloud since cloud providers claim the automatic scalability of resources for applications to prevent demand unmet and resourc...
Abstract Recognizing the value of big data in any organization an in age which reach to huge amount of data. That cannot be handled by the traditional computing techniques to sort, collect and analyze their business intelligence, by which can’t properly recognized the need to add big data capabilities to their own efforts. The complex data volumes...
cloud computing is the widely adopted technology which comes into mind when talking about elasticity and limitless scalability. Most of the heaving tasks and complex calculations which require big machines are directed to the cloud services for cost minimization, and on demand resource provisioning. But if we are leveraging the Big data as-a-servic...
Cloud computing is a big technological advancement now days and everyone in the industry are either intentionally or unintentionally using it to some extent. Since Cloud Computing is in its growing phase hence it has some pros and cons, like it is helping the IT departments in efforts deduction and C level managers from paying the upfront cash all...
As Cloud Computing is an advanced technology with better functionality offered internet services on rent base with many advantages such as scalability, flexibility, integration, and cost reduction. In addition it provides an advance virtual storage for organizations to deploy their applications to perform various operations. Despite many compelling...
We are in the twenty-first centuries also known as the digital era, where each and every thing generates a data whether it's a mobile phone, signals, day to day purchasing and many more. This rapidly increases in amount of data; Big data has become a current and future frontier for researchers. In big data analysis, the computation is done on massi...
A key technology towards enabling the use of Software as a Service (SaaS) in the cloud computing is Web 2.0. As growing rate of using web based applications its vulnerabilities are also being discovered and disclosed at an alarming rate. Cloud computing systems are facing a web based and network attacks. This type of attacks are used to exploit the...
As Cloud Computing is an advanced technology with better functionality offered internet services on rent base with many advantages such as scalability, flexibility, integration, and cost reduction. In addition it provides an advance virtual storage for organizations to deploy their applications for perform the operations. With respect of all benefi...
A key technology towards enabling the use of Software as a Service (SaaS) in the cloud computing is Web 2.0 which relieves the users form tasks such as installation and maintenance. Web based applications are recently considered as the fastest service to provide on-line information. It has been used widely all around. As growing rate of using web b...
As cloud computing technology has many advantages but cloud security or cloud software security threats and attacks at various levels are also a big concern of all the organizations. Those systems are connected to the internet in the cloud network can be effected by different types of attacks and one of the prominent attack is DoS (denial of servic...
Software testing is an important part of software engineering life cycle. Testing requires resources that are often not readily available, contributing to an inefficient testing process. Running large test suites of test cases can consume considerable time and resources, often precluding their use in an interactive setting. Software testing in the...
Autonomic computing automates the process through which the user can provision resources on demand. By minimizing user involvement, automation speeds up the process and reduces the possibility of human error. Cloud Computing describes a variety of computing concepts that involve a large number of computers connected through a real-time communicatio...
Cloud computing is an emerging technology which involves a variety of computing concepts & computers connected through a real-time communication network. It offers cost-effective, scalable on-demand services to consumers with greater flexibility and lesser infrastructure investment. With the new technology lots of security and privacy issues also c...
In Universities/Institutions are realizing that achieving better results in the organization a transparent system is required for providing satisfaction of their students/management in day to day operations. In Education System, it is not easy to collate, agglutinate and transform the student’s data necessary for creating standardizes the system. T...
The government has been focusing on inclusive growth and has launched several schemes at different levels to facilitate the same. However, monitoring the execution of these schemes and understanding clearly if the targeted citizens actually have got benefited, would demand for substantial granularity of information and doing away with information b...
ICT has been developing very rapidly nowadays. Therefore, in order to balance it, the whole educational system should be reformed and ICT should be integrated into educational activities. The influence of ICT, especially internet cannot be ignored in our students' lives. In this case, the widely use of internet access has been an unavoidable policy...
Cloud computing is a network based technology that uses the internet and remote server focuses on sharing computations or resources for maintaining data and applications. Cloud Computing works as "Pay-as-you-go " model is most appealing factor. One of the most important aspect refers to security: while some cloud computing security issues are inher...
The subscribers base of mobile phones is increasing globally with a rapid
rate.The sale of mobile phones has exceeded those of personal computers.India
is the second largest telecommunication network in the world in terms of number
of wireless connections after China.Telecom companies are ready to tap a large
unexplored market in India with lucrati...
The Pitman shorthand language (PSL) is a recording medium practiced in all organizations, where English is the transaction medium. It has the practical advantage of high speed of recording, more than 120–200 words per minute, because of which it is universally acknowledged. This recording medium has its continued existence in spite of considerable...
Questions
Question (1)
CloudSim is a simulation tool for cloud computing but i m not getting that where i insert my encryption coding for simulation.
Please help me regarding this if possible provide any example also