Sheetal Phatangare - Academia.edu (original) (raw)

Papers by Sheetal Phatangare

Research paper thumbnail of Multi-Level Encryption System using AES and RSA Algorithms

International journal for research in applied science and engineering technology, May 31, 2024

Research paper thumbnail of AI-Powered News Web App

Research paper thumbnail of DStore: Blockchain-Powered Decentralized Cloud Mesh

International Journal on Recent and Innovation Trends in Computing and Communication, Oct 6, 2023

Research paper thumbnail of Blockchain and IPFS-Based Solution for KYC

Signals and communication technology, 2024

Research paper thumbnail of Real Time Human Activity Detection using YOLOv7

2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)

Research paper thumbnail of Bitcoin Price Prediction

International Journal for Research in Applied Science and Engineering Technology, May 31, 2023

Research paper thumbnail of Public Cryptography Linear Programming Solver in Cloud Computing

Artificial Intelligent Systems and Machine Learning, 2012

Public-key cryptography refers to a cryptographic system requiring two separate keys, one of whic... more Public-key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public.Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Focusing on engineering computing and optimization tasks, we investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. To validate the computation result, we explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. In the proposed algorithm, the robustness preference of the output given by the server is checked by the client, whether the server is given the correct output. Whether the cloud is giving the correct result we also try to device the robust algorithm for numerical stability.

Research paper thumbnail of Stock Market Forecasting

International Journal for Research in Applied Science and Engineering Technology, May 31, 2023

Stock market forecasting seeks to determine the worth of a firm's financial stocks in the future.... more Stock market forecasting seeks to determine the worth of a firm's financial stocks in the future. Machine learning is being used in recent developments in stock market forecasting technology to produce forecasts based on the values of current stock market indices by training on their previous values. Future stock price projections can be difficult to make when trying to anticipate the stock market. It is incredibly challenging to forecast the stock market since shares fluctuate so frequently. Every day and frequently, stock. Foreseeing trends in the stock market is often correct using this method. This study forecasts the closing prices of numerous corporations using Long-Short Term Memory (LSTM) methodologies. These models are assessed using RMSE, which is one of the commonly used error measures. LSTM works better than SVR, as shown by the experiment's findings. Keywords: LSTM model , RMS(Root mean square),stock prices, prices fluctuate. Forecasts for the stock market are in great demand from investors. We thoroughly evaluated a variety of well-known machine-learning models and discovered that our recommended method outperformed them all Prediction, Time series.

Research paper thumbnail of Public Cryptography Linear and Non Linear Programming Solver in Cloud Computing

Public-key cryptography refers to a cryptographic system requiring two separate keys, one of whic... more Public-key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public.Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner.Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Focusing on engineering computing and optimization tasks, we investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. To validate the computation result, we explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. In the proposed algorithm, the robustness preference of the output given by the server is checked by the client, whether the server is given the correct output. Whether the cloud is giving the correct result we also try to device the robust algorithm for numerical stability.

Research paper thumbnail of Bitcoin Price Prediction

International Journal for Research in Applied Science and Engineering Technology

Research paper thumbnail of Automated Object Identifing and Sorting Robot

International Journal for Research in Applied Science and Engineering Technology

The rapid growth of industries has led to the need for various automation robots that can make th... more The rapid growth of industries has led to the need for various automation robots that can make the operation process more efficient. Industries of various sectors like food, mining and automobiles demand a robot that can identify and sort different items which are either too heavy or dangerous to be done manually by humans. The robot also gets the work done with minimal error and in less time which in turn increases the profitability of the operation.In this project we built an prototype of such robotic arm which can automatically identify and sort different object using open cv and YOLO algorithm .The robotic arm is controlled by a microcontroller and has four servo motors .It consists of four Degrees of Freedom to sort the objects.

Research paper thumbnail of Stock Market Forecasting

International Journal for Research in Applied Science and Engineering Technology

: Stock market forecasting seeks to determine the worth of a firm’s financial stocks in the futur... more : Stock market forecasting seeks to determine the worth of a firm’s financial stocks in the future. Machine learning is being used in recent developments in stock market forecasting technology to produce forecasts based on the values of current stock market indices by training on their previous values. Future stock price projections can be difficult to make when trying to anticipate the stock market. It is incredibly challenging to forecast the stock market since shares fluctuate so frequently. Every day and frequently, stock. Foreseeing trends in the stock market is often correct using this method. This study forecasts the closing prices of numerous corporations using Long-Short Term Memory (LSTM) methodologies. These models are assessed using RMSE, which is one of the commonly used error measures. LSTM works better than SVR, as shown by the experiment's findings

Research paper thumbnail of Fire Fighting Robot

Zenodo (CERN European Organization for Nuclear Research), Dec 13, 2022

Research paper thumbnail of Cloud based Smart Mobile Application for Women Safety

2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA)

Research paper thumbnail of Secure Outsourcing of Linear Programming Solver in Cloud Computing: A Survey

AJCT, 2019

There are currently major concerns about how to safeguard and process the data processed by infec... more There are currently major concerns about how to safeguard and process the data processed by infection. Innumerable industrial, figuring and optimization methods are being used to resolve this problem. The problem has been fixed for secure outsourcing for large issues. In this paper, the terms required in Cloud Security have been presented. The privacy feats of secure cloud are used to frustrate, to achieve more aspects of security. While cloud computing is being used to outsource large scale computer outsourced to the cloud, data privacy has become a major problem. In this paper, modern cryptographic techniques, which have been sourcing with research work proposed in the previous years. Based on some flaw fixes, the current situation has been identified. There is also the motivation for this paper problem and future research guidelines.

Research paper thumbnail of New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

IJITEE, 2020

Cloud computing is the on-request accessibility of computer system resources, specially data stor... more Cloud computing is the on-request accessibility of computer system resources, specially data storage and computing power, without direct dynamic management by the client. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. Along the improvement of cloud computing, more and more applications are migrated into the cloud. A significant element of distributed computing is pay-more only as costs arise. Distributed computing gives strong computational capacity to the general public at diminished cost that empowers clients with least computational assets to redistribute their huge calculation outstanding burdens to the cloud, and monetarily appreciate the monstrous computational force, transmission capacity, stockpiling, and even reasonable programming that can be partaken in a compensation for each utilization way Tremendous bit of leeway is the essential objective that forestalls the wide scope of registering model for clients when their secret information are expended during the figuring procedure. Critical thinking is a system to arrive at the pragmatic objective of specific instruments that tackles the issues as well as shield from pernicious practices.. In this paper, we examine secure outsourcing for large-scale systems of linear equations, which are the most popular problems in various engineering disciplines. Linear programming is an operation research technique formulates private data by the customer for LP problem as a set of matrices and vectors, to develop a set of efficient privacypreserving problem transformation techniques, which allow customers to transform original LP problem into some arbitrary one while protecting sensitive input/output information. Identify that LP problem solving in Cloud component is efficient extra cost on cloud server. In this paper we are utilizing Homomorphic encryption system to increase the performance and time efficiency.

Research paper thumbnail of Secure Outsourcing of Linear Programming Solver in Cloud Computing: A Survey

There are currently major concerns about how to safeguard and process the data processed by infec... more There are currently major concerns about how to safeguard and process the data processed by infection. Innumerable industrial, figuring and optimization methods are being used to resolve this problem. The problem has been fixed for secure outsourcing for large issues. In this paper, the terms required in Cloud Security have been presented. The privacy feats of secure cloud are used to frustrate, to achieve more aspects of security. While cloud computing is being used to outsource large scale computer outsourced to the cloud, data privacy has become a major problem. In this paper, modern cryptographic techniques, which have been sourcing with research work proposed in the previous years. Based on some flaw fixes, the current situation has been identified. There is also the motivation for this paper problem and future research guidelines.

Research paper thumbnail of New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Cloud computing is the on-request accessibility of computer system resources, specially data stor... more Cloud computing is the on-request accessibility of computer system resources, specially data storage and computing power, without direct dynamic management by the client. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. Along the improvement of cloud computing, more and more applications are migrated into the cloud. A significant element of distributed computing is pay-more only as costs arise. Distributed computing gives strong computational capacity to the general public at diminished cost that empowers clients with least computational assets to redistribute their huge calculation outstanding burdens to the cloud, and monetarily appreciate the monstrous computational force, transmission capacity, stockpiling, and even reasonable programming that can be partaken in a compensation for each utilization way Tremendous bit of leeway is the essential objective that forestalls the wide scope of r...

Research paper thumbnail of Multi-Level Encryption System using AES and RSA Algorithms

International journal for research in applied science and engineering technology, May 31, 2024

Research paper thumbnail of AI-Powered News Web App

Research paper thumbnail of DStore: Blockchain-Powered Decentralized Cloud Mesh

International Journal on Recent and Innovation Trends in Computing and Communication, Oct 6, 2023

Research paper thumbnail of Blockchain and IPFS-Based Solution for KYC

Signals and communication technology, 2024

Research paper thumbnail of Real Time Human Activity Detection using YOLOv7

2023 7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)

Research paper thumbnail of Bitcoin Price Prediction

International Journal for Research in Applied Science and Engineering Technology, May 31, 2023

Research paper thumbnail of Public Cryptography Linear Programming Solver in Cloud Computing

Artificial Intelligent Systems and Machine Learning, 2012

Public-key cryptography refers to a cryptographic system requiring two separate keys, one of whic... more Public-key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public.Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner. Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Focusing on engineering computing and optimization tasks, we investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. To validate the computation result, we explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. In the proposed algorithm, the robustness preference of the output given by the server is checked by the client, whether the server is given the correct output. Whether the cloud is giving the correct result we also try to device the robust algorithm for numerical stability.

Research paper thumbnail of Stock Market Forecasting

International Journal for Research in Applied Science and Engineering Technology, May 31, 2023

Stock market forecasting seeks to determine the worth of a firm's financial stocks in the future.... more Stock market forecasting seeks to determine the worth of a firm's financial stocks in the future. Machine learning is being used in recent developments in stock market forecasting technology to produce forecasts based on the values of current stock market indices by training on their previous values. Future stock price projections can be difficult to make when trying to anticipate the stock market. It is incredibly challenging to forecast the stock market since shares fluctuate so frequently. Every day and frequently, stock. Foreseeing trends in the stock market is often correct using this method. This study forecasts the closing prices of numerous corporations using Long-Short Term Memory (LSTM) methodologies. These models are assessed using RMSE, which is one of the commonly used error measures. LSTM works better than SVR, as shown by the experiment's findings. Keywords: LSTM model , RMS(Root mean square),stock prices, prices fluctuate. Forecasts for the stock market are in great demand from investors. We thoroughly evaluated a variety of well-known machine-learning models and discovered that our recommended method outperformed them all Prediction, Time series.

Research paper thumbnail of Public Cryptography Linear and Non Linear Programming Solver in Cloud Computing

Public-key cryptography refers to a cryptographic system requiring two separate keys, one of whic... more Public-key cryptography refers to a cryptographic system requiring two separate keys, one of which is secret and one of which is public.Cloud Computing has great potential of providing robust computational power to the society at reduced cost. It enables customers with limited computational resources to outsource their large computation workloads to the cloud, and economically enjoy the massive computational power, bandwidth, storage, and even appropriate software that can be shared in a pay-per-use manner.Despite the tremendous benefits, security is the primary obstacle that prevents the wide adoption of this promising computing model, especially for customers when their confidential data are consumed and produced during the computation. Treating the cloud as an intrinsically insecure computing platform from the viewpoint of the cloud customers, we must design mechanisms that not only protect sensitive information by enabling computations with encrypted data, but also protect customers from malicious behaviors by enabling the validation of the computation result. Focusing on engineering computing and optimization tasks, we investigates secure outsourcing of widely applicable linear programming (LP) computations. In order to achieve practical efficiency, our mechanism design explicitly decomposes the LP computation outsourcing into public LP solvers running on the cloud and private LP parameters owned by the customer. To validate the computation result, we explore the fundamental duality theorem of LP computation and derive the necessary and sufficient conditions that correct result must satisfy. In the proposed algorithm, the robustness preference of the output given by the server is checked by the client, whether the server is given the correct output. Whether the cloud is giving the correct result we also try to device the robust algorithm for numerical stability.

Research paper thumbnail of Bitcoin Price Prediction

International Journal for Research in Applied Science and Engineering Technology

Research paper thumbnail of Automated Object Identifing and Sorting Robot

International Journal for Research in Applied Science and Engineering Technology

The rapid growth of industries has led to the need for various automation robots that can make th... more The rapid growth of industries has led to the need for various automation robots that can make the operation process more efficient. Industries of various sectors like food, mining and automobiles demand a robot that can identify and sort different items which are either too heavy or dangerous to be done manually by humans. The robot also gets the work done with minimal error and in less time which in turn increases the profitability of the operation.In this project we built an prototype of such robotic arm which can automatically identify and sort different object using open cv and YOLO algorithm .The robotic arm is controlled by a microcontroller and has four servo motors .It consists of four Degrees of Freedom to sort the objects.

Research paper thumbnail of Stock Market Forecasting

International Journal for Research in Applied Science and Engineering Technology

: Stock market forecasting seeks to determine the worth of a firm’s financial stocks in the futur... more : Stock market forecasting seeks to determine the worth of a firm’s financial stocks in the future. Machine learning is being used in recent developments in stock market forecasting technology to produce forecasts based on the values of current stock market indices by training on their previous values. Future stock price projections can be difficult to make when trying to anticipate the stock market. It is incredibly challenging to forecast the stock market since shares fluctuate so frequently. Every day and frequently, stock. Foreseeing trends in the stock market is often correct using this method. This study forecasts the closing prices of numerous corporations using Long-Short Term Memory (LSTM) methodologies. These models are assessed using RMSE, which is one of the commonly used error measures. LSTM works better than SVR, as shown by the experiment's findings

Research paper thumbnail of Fire Fighting Robot

Zenodo (CERN European Organization for Nuclear Research), Dec 13, 2022

Research paper thumbnail of Cloud based Smart Mobile Application for Women Safety

2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA)

Research paper thumbnail of Secure Outsourcing of Linear Programming Solver in Cloud Computing: A Survey

AJCT, 2019

There are currently major concerns about how to safeguard and process the data processed by infec... more There are currently major concerns about how to safeguard and process the data processed by infection. Innumerable industrial, figuring and optimization methods are being used to resolve this problem. The problem has been fixed for secure outsourcing for large issues. In this paper, the terms required in Cloud Security have been presented. The privacy feats of secure cloud are used to frustrate, to achieve more aspects of security. While cloud computing is being used to outsource large scale computer outsourced to the cloud, data privacy has become a major problem. In this paper, modern cryptographic techniques, which have been sourcing with research work proposed in the previous years. Based on some flaw fixes, the current situation has been identified. There is also the motivation for this paper problem and future research guidelines.

Research paper thumbnail of New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

IJITEE, 2020

Cloud computing is the on-request accessibility of computer system resources, specially data stor... more Cloud computing is the on-request accessibility of computer system resources, specially data storage and computing power, without direct dynamic management by the client. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer's hard drive. Along the improvement of cloud computing, more and more applications are migrated into the cloud. A significant element of distributed computing is pay-more only as costs arise. Distributed computing gives strong computational capacity to the general public at diminished cost that empowers clients with least computational assets to redistribute their huge calculation outstanding burdens to the cloud, and monetarily appreciate the monstrous computational force, transmission capacity, stockpiling, and even reasonable programming that can be partaken in a compensation for each utilization way Tremendous bit of leeway is the essential objective that forestalls the wide scope of registering model for clients when their secret information are expended during the figuring procedure. Critical thinking is a system to arrive at the pragmatic objective of specific instruments that tackles the issues as well as shield from pernicious practices.. In this paper, we examine secure outsourcing for large-scale systems of linear equations, which are the most popular problems in various engineering disciplines. Linear programming is an operation research technique formulates private data by the customer for LP problem as a set of matrices and vectors, to develop a set of efficient privacypreserving problem transformation techniques, which allow customers to transform original LP problem into some arbitrary one while protecting sensitive input/output information. Identify that LP problem solving in Cloud component is efficient extra cost on cloud server. In this paper we are utilizing Homomorphic encryption system to increase the performance and time efficiency.

Research paper thumbnail of Secure Outsourcing of Linear Programming Solver in Cloud Computing: A Survey

There are currently major concerns about how to safeguard and process the data processed by infec... more There are currently major concerns about how to safeguard and process the data processed by infection. Innumerable industrial, figuring and optimization methods are being used to resolve this problem. The problem has been fixed for secure outsourcing for large issues. In this paper, the terms required in Cloud Security have been presented. The privacy feats of secure cloud are used to frustrate, to achieve more aspects of security. While cloud computing is being used to outsource large scale computer outsourced to the cloud, data privacy has become a major problem. In this paper, modern cryptographic techniques, which have been sourcing with research work proposed in the previous years. Based on some flaw fixes, the current situation has been identified. There is also the motivation for this paper problem and future research guidelines.

Research paper thumbnail of New Algorithms for Secure Outsourcing of Large-Scale Systems of Linear Equations

Cloud computing is the on-request accessibility of computer system resources, specially data stor... more Cloud computing is the on-request accessibility of computer system resources, specially data storage and computing power, without direct dynamic management by the client. In the simplest terms, cloud computing means storing and accessing data and programs over the Internet instead of your computer’s hard drive. Along the improvement of cloud computing, more and more applications are migrated into the cloud. A significant element of distributed computing is pay-more only as costs arise. Distributed computing gives strong computational capacity to the general public at diminished cost that empowers clients with least computational assets to redistribute their huge calculation outstanding burdens to the cloud, and monetarily appreciate the monstrous computational force, transmission capacity, stockpiling, and even reasonable programming that can be partaken in a compensation for each utilization way Tremendous bit of leeway is the essential objective that forestalls the wide scope of r...