Prachi S. Deshpande's research while affiliated with Dr. Babasaheb Ambedkar Technological University and other places

Publications (9)

Book
This book gathers high-quality research papers presented at the International Conference on Computing in Engineering and Technology (ICCET 2020) [formerly ICCASP], a flagship event in the area of engineering and emerging next-generation technologies jointly organized by the Dr. Babasaheb Ambedkar Technological University and MGM’s College of Engine...
Article
The article reports the effect of Tratak Sadhana (meditation) on humans using electroencephalograph (EEG) signals. EEG represents the brain activities in the form of electrical signals. Due to non-stationary nature of the EEG signals, nonlinear parameters like approximate entropy, wavelet entropy and Higuchi' fractal dimensions are used to assess t...
Book
The book is a collection of selected high quality research papers presented at the International Conference on Computing in Engineering and Technology (ICCET 2019), held on January 10–11, 2019 at Deogiri Institute of Engineering and Management Studies, Aurangabad, India. Focusing on frontier topics and next-generation technologies, it presents orig...
Chapter
This chapter describes a Cloud-based data security and storage module. The module is simple in design and verified in the Cloud environment. Qualitative comparison shows that the module is a better candidate in Cloud environment.
Chapter
This chapter reports a network-based IDS for the Cloud scenario. The IDS is implemented and analysed for the DDoS attack. The particular choice is due to the vulnerability of the DDoS attack in the Cloud paradigm.
Chapter
In this book, two important issues, i.e. the intrusion detection and data storage security aspect in the Cloud computing scenario has been discussed. These issues probably are the most serious threats to today’s Internet. To address this issue, we proposed and evaluated detection and defence schemes for internal as well as external intrusions in th...
Chapter
A host-based intrusion detection system for Cloud environment is reported in this chapter along with its laboratory analysis. This module alerts the Cloud user against the malicious activities within the system by analysing the system call traces. It analyses only selective system call traces, the failed system call trace, rather than all. This mod...
Book
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented again...
Chapter
The notion of data analytics and its real-time application is important in the Big-data era owing to the voluminous data generation. Predictive and prescriptive analytics provide the future trends from the available data effectively. This will help to decide the usability of the data and thereby its retention for future applications. The paper repo...

Citations

... The suitable values of pH and EC for lettuce is 6.0 to 6.5 and 0.8 to 1.2 [11][12]. The required pH level for lettuce is the same with cauliflower and broccoli and is significantly higher than tomato and carrot. ...
... BNID at the network layer in the cloud environment was proposed by Ghanshala et al. [23] as a flexible intrusion detection approach. The authors created a security architecture for deploying BNID at the cloud network node to protect cloud machines against network threats. ...
... Then, using these statistical measures, an ANN was utilised to classify their data into meditators and non-meditators, with an accuracy of 87.2 percent. Using EEG signals, Kamthekar et al. investigate the effect of Tratak Sadhana (TS) meditation for reducing stress rapidly in humans[10].2 Nonlinear metrics like approximation entropy, Higuchi's fractal dimensions and wavelet entropy are used to evaluate the oscillations in EEG signals during TS and rest. ...
... In addition, a model can be trained using historical data, which enables predictive analytics. Predicting how a health value will change in the future enables counteracting an adverse trend at an early stage [55]. The potential of such services is therefore virtually unlimited, including education, diagnostics, and treatment [56]. ...
... Host-based IDS [8,10,27,29,49] and network-based IDS [17,20,28] have been studied well in the literature. Further, IDS can also be classified as signature-based and anomaly-based detectors [20,47]. ...
... Les HIDS, tels que Samhain [WPRW05] ou OSSEC [Cid04], analysent les données fournies par le système. Ces données peuvent être, par exemple, des séquences d'appels système ou des logs, du système d'exploitation ou d'un service en particulier. ...