Mrs Ashwini Sheth’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (7)


Research Paper on Robotics-New Era
  • Article

June 2021

·

46,682 Reads

Mrs Ashwini Sheth

·

Mr Sachin Bhosale

·

·

Asst Prof

This paper contains of detailed statistics about the robot's method and system. As one and all knows, how artificial intelligence is rising in the marketplace and the market is receiving totally reliant on artificial intelligence for responsibility the multifaceted tasks. Robotics is a greatest famous division in the arena of manufacturing and sciences where all engineer is taking keen attention to make a robot which could do a certain task and can give appropriate results for the given task. Every engineer is trying to mark a robot through 0% error which is quite impossible as the technology is increasing. We can think about it but still 0% doesn't unkind that it will not have any point of error but it means it will give you the correct answer for every question without any doubt. Show its uses its detailed data how it workings and how it senses working all is signified in this paper which will be enough for getting and good information about robotics and devices along with the system of robots. Anxiety is mounting that robots and artificial intelligence will substitute many professions. To remain pertinent in this changing occupation landscape, the employee of the future is predictable to be advanced, able to spot occasions transform businesses and provide original solutions to encounter global tests. To develop such competences, work integrated learning (WIL) has appeared as an important approach. The resolution of this study is to examine the key factors driving invention among WIL scholars. Unlike prior educations that have been mainly qualitative or based on one lone snapshot, this measureable, longitudinal study actions student competences before and after contribution in a WIL assignment at a business. It then assumes confirmatory issue analysis to associate pre-and post-placement competences.


Research Paper on Cyber Security

June 2021

·

234,960 Reads

·

15 Citations

In the current world that is run by technology and network connections, it is crucial to know what cyber security is and to be able to use it effectively. Systems, important files, data, and other important virtual things are at risk if there is no security to protect it. Whether it is an IT firm not, every company has to be protected equally. With the development of the fresh technology in cyber security, the attackers similarly do not collapse behind. They are consuming better and enhanced hacking techniques and aim the weak points of many businesses out there. Cyber security is essential because military, government, financial, medical and corporate organizations accumulate, practise, and stock unprecedented quantities of data on PCs and other devices. An important quota of that data can be sensitive information, whether that be financial data, intellectual property, personal information, or other various kinds of data for which illegal access or acquaintance could ensure negative concerns.


Research Paper on Cloud Computing

June 2021

·

103,328 Reads

·

11 Citations

Cloud Computing has come of age later Amazons introduce the first of its kind of cloud services in2006. It is particularly suitable to Hong Kong because of the unbelievable amounts of the data that are being processed here daily in several sectors, and there are signs that subscription to cloud services by the local companies will soon be on a skyrocket course, despite a slow start in beginning years. As a research theme, cloud computing now easily tops any schedule of topics in a computer science because of its far-reaching suggestion in many sector in computing, especially a big data which without cloud computing is at the great concept. The current creation of a main cloud R&D centre in Hong Kong by Lenovo (January 2015) attests to this fact. Cloud computing, the life time dream of computing as a utility, has the capacity to convert a huge part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Developers with new invention ideas for new Internet services no longer require the huge capital outlays in hardware to deploy their service or the human expense to operate it. They need not be worried about overprovisioning for a service whose popularity does not meet their predictions, thus wasting costly resources, or under provisioning for one that becomes wildly popular, thus missing potential customers and revenue. In addition to, companies with huge batch-oriented tasks can get results as fastest as their programs can scale, since using 1,000 servers for one hour costs no more than using one server for 1,000 hours. Without paying a premium for large scale, is unprecedented in the history of IT, by this elasticity of resources.


Impact of Internet in Rural Management

April 2021

·

620 Reads

Starting with the trends of internet growth in both urbanized and agricultural areas in India, mainly focusing on the impact of internet in agricultural areas. It has been found that the impact of internet on agricultural areas had lower level of access to the internet as compare to urbanized areas in India. This research has done many analyses to find the effect of some parameters which effects internet development in agricultural area. There are many problems in rural areas related to the internet access, these problems had to be solved to get the better connection of internet to the rural user. This analysis also states the relation between urban internet access through wireless and wired mode. It shows that internet growth in urban is linked with amount of internet users in urban center. It has subscription rate through wired narrowband, broadband and wireless mode. In order to find out the effect of certain limitations that strikes the way out of internet prosperity in rural areas equivalence analysis was carried out. All over the analysis it stated that rural users have less power to the internet access and that's why it has lower level of internet growth in India.


Green Cloud Computing

April 2021

·

3,217 Reads

·

1 Citation

Cloud computing may be a go-ahead field of data and announcement technologies (ICTs), presenting new tests for environmental safeguard. This technologies has a variety of request authority's, since they provide adaptability are dependable and dependable, and offer from top to bottom presentation at fair cost. The cloud computing rebellion is reforming modern networking, and contribution promising environmental Defence forecasts as well as economic and technological advantages. These technologies have the potential to enhance energy efficiency and to scale back carbon footprints and (e-)waste. These topographies can convert cloud computing into green cloud computing. In this survey, we review the most achievements of green cloud computing. First, an outline of cloud computing is given. Then, recent studies and developments are abridged, and environmental issues are exactly addressed. This survey is meant to function up-to-date guidance for research with reference to green cloud computing.


A Survey on Cyber Security

April 2021

·

3,952 Reads

·

3 Citations

Cyber Security plays a crucial role within the field of data technology .Securing the knowledge became one among the most important challenges within the present day. When ever we expect about the cyber security the primary thing that involves our mind is 'cyber crimes' which are increasing rapidly day by day. Various Governments and corporations are taking many measures so as to stop these cyber crimes. Besides various factors cyber security remains a really big concern to several. This paper mostly focuses on user security on the latest technologies which faced the challenges. Besides focuses on latest cyber security techniques, ethics, it as well focuses on the trends changing the face of cyber security.


Era of Cyber Security

April 2021

·

2,447 Reads

Cyber security is an important part of information and communication technology. Securing private information and privacy of a user is becoming challenging day by day. Cyber-crime is increasing day by day. Many big companies and public sectors are taking many certain preventions to protect private information and preventing the cyber-crime. This paper focus on various cyber-crime and its prevention. It also focusses on difficulty face by public sector and private companies.Cyber security constitutes methods which are used to confine unauthorised access to data, networks and devices which safeguards tools and technologies want to store data. The content of that data and methods are focused by informational security to guard information including privacy, integrity and availability. Creating Internet of Things (IoT) technologies safe and reversing the curve for cyberspace crimes strategic implementation of cyber security and knowledge security necessary. Internet and cloud computing have come to be a compulsion in people's lives. Privacy concerns and threats related to data security are, however, an inevitable result of the increasing proliferation of technology. To curb these technological vulnerabilities, governments and businesses are turning to cybersecurity and information security. Cyber security constitutes methods which are used to confine unauthorised access to data, networks and devices which safeguards tools and technologies want to store data. The content of that data and methods are focused by informational security to guard information including privacy, integrity and availability.

Citations (4)


... The objective is to minimize the risk of cyberattacks. However, information security states the preservation of data with importance on its availability, truthfulness, and privacy aspects [3,4]. The fact that information security is a continual process rather than a one-time occurrence is the most crucial fact about it. ...

Reference:

A Review of Cyber Security and its Approaches with Recent Progress and Challenges
A Survey on Cyber Security
  • Citing Article
  • April 2021

... The idea of cloud computing can be traced back to the 1960s when time-sharing was used on mainframe computers, where many users shared one computer resource [52]. But, it was in the early 2000s, thanks to faster Internet connections and better technologies, that cloud computing emerged as we understand it today [52]. ...

Research Paper on Cloud Computing
  • Citing Article
  • June 2021

... In paper [18], the authors have reviewed studies on multi-objective virtual machine (VM) placement algorithms for reducing energy consumption in green cloud data centers. The authors in [20] A survey of green cloud computing current researches for sustainable development Reduction in use of hazardous materials Maximizing output from the product during its lifetime Minimizing energy consumption Minimizing reusability Minimizing recyclability and biodegradability of used products and wastes 5 [21] Evolutionary algorithms for energy consumption Reducing energy consumption 6 [22] A survey of green cloud computing Reviewing the most achievements of green cloud computing 7 [23] A review on adoption of green computing attributes and vendor-specific implementations ...

Green Cloud Computing
  • Citing Article
  • April 2021

... Shrestha and Adhikari (2019) pointed out that if proper security solution is not implemented, the intruder can take advantage and get into the system through faked MAC addresses, unknown stations and illegitimate access points. To address the aforementioned threats, there must be an information security infrastructure mechanism that will offer three essential security objectives which are confidentiality, integrity and availability (Sheth, 2021;Choi, 2008). The three objectives ensure that only authorized users can get into the system, see what is intended for that user and change data and information delegated to change (Parte, 2012). ...

Research Paper on Cyber Security
  • Citing Article
  • June 2021