Prachi S. Deshpande's research while affiliated with Dr. Babasaheb Ambedkar Technological University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (9)
This book gathers high-quality research papers presented at the International Conference on Computing in Engineering and Technology (ICCET 2020) [formerly ICCASP], a flagship event in the area of engineering and emerging next-generation technologies jointly organized by the Dr. Babasaheb Ambedkar Technological University and MGM’s College of Engine...
The article reports the effect of Tratak Sadhana (meditation) on humans using electroencephalograph (EEG) signals. EEG represents the brain activities in the form of electrical signals. Due to non-stationary nature of the EEG signals, nonlinear parameters like approximate entropy, wavelet entropy and Higuchi' fractal dimensions are used to assess t...
The book is a collection of selected high quality research papers presented at the International Conference on Computing in Engineering and Technology (ICCET 2019), held on January 10–11, 2019 at Deogiri Institute of Engineering and Management Studies, Aurangabad, India. Focusing on frontier topics and next-generation technologies, it presents orig...
A host-based intrusion detection system for Cloud environment is reported in this chapter along with its laboratory analysis. This module alerts the Cloud user against the malicious activities within the system by analysing the system call traces. It analyses only selective system call traces, the failed system call trace, rather than all. This mod...
This chapter reports a network-based IDS for the Cloud scenario. The IDS is implemented and analysed for the DDoS attack. The particular choice is due to the vulnerability of the DDoS attack in the Cloud paradigm.
In this book, two important issues, i.e. the intrusion detection and data storage security aspect in the Cloud computing scenario has been discussed. These issues probably are the most serious threats to today’s Internet. To address this issue, we proposed and evaluated detection and defence schemes for internal as well as external intrusions in th...
This chapter describes a Cloud-based data security and storage module. The module is simple in design and verified in the Cloud environment. Qualitative comparison shows that the module is a better candidate in Cloud environment.
The notion of data analytics and its real-time application is important in the Big-data era owing to the voluminous data generation. Predictive and prescriptive analytics provide the future trends from the available data effectively. This will help to decide the usability of the data and thereby its retention for future applications. The paper repo...
This book analyses the various security threats in cloud computing. A host-based IDS (HIDS) using signature verification is developed and implemented for the concerned security issues. Further, owing to the vulnerability of distributed denial of service (DDoS) attacks in cloud computing, a network based IDS (NIDS) is developed and implemented again...
Citations
... The suitable values of pH and EC for lettuce is 6.0 to 6.5 and 0.8 to 1.2 [11][12]. The required pH level for lettuce is the same with cauliflower and broccoli and is significantly higher than tomato and carrot. ...
... BNID at the network layer in the cloud environment was proposed by Ghanshala et al. [23] as a flexible intrusion detection approach. The authors created a security architecture for deploying BNID at the cloud network node to protect cloud machines against network threats. ...
... Then, using these statistical measures, an ANN was utilised to classify their data into meditators and non-meditators, with an accuracy of 87.2 percent. Using EEG signals, Kamthekar et al. investigate the effect of Tratak Sadhana (TS) meditation for reducing stress rapidly in humans[10].2 Nonlinear metrics like approximation entropy, Higuchi's fractal dimensions and wavelet entropy are used to evaluate the oscillations in EEG signals during TS and rest. ...
... BDA is characterized as descriptive, predictive, and prescriptive. The taxonomy chosen for analytical levels has been broadly adopted in the literatures (Ahmed et al., 2017;Assunção et al., 2015;Deshpande et al., 2019;El Morr & Ali-Hassan, 2019;Saggi & Jain, 2018;Sivarajah et al., 2017;Wang et al., 2016). Descriptive analytics detect patterns in the current process through reports and multidimensional OLAP (online analytical processing). ...
Reference: Smart agriculture: a literature review
... Host-based IDS [8,10,27,29,49] and network-based IDS [17,20,28] have been studied well in the literature. Further, IDS can also be classified as signature-based and anomaly-based detectors [20,47]. ...
... Les HIDS, tels que Samhain [WPRW05] ou OSSEC [Cid04], analysent les données fournies par le système. Ces données peuvent être, par exemple, des séquences d'appels système ou des logs, du système d'exploitation ou d'un service en particulier. ...