jitendra Sheetlani - Academia.edu (original) (raw)
Papers by jitendra Sheetlani
Social Science Research Network, Mar 27, 2018
International Journal of Advance Research and Innovative Ideas in Education, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
Journal of Harmonized Research in Engineering, 2020
Introduction: The emerging technical space is growing with the Internet of Things (IoT). IoT is b... more Introduction: The emerging technical space is growing with the Internet of Things (IoT). IoT is bringing about a paradigm shift in services, infrastructure, and consumer industries [1,5]. While this paradigm shift is happening, trust and security are necessary requirements to tackle different kinds of attacks, threats, malfunctions, and devastating impacts to society. The responsibility of securing IoT lies with device manufacturing companies and companies that use the devices. Having a complete set of security terms is a priority to organize the threat and overcome all security challenges in IoT. Some security requirements for IoT have been proposed, including encryption, hashing, and other forms of secure communications [2, 3]. Yet, more is needed to secure this infrastructure from threats and attacks as well as other concerning interests. Advancing the technology to secure the IoT environment is the motivation of this research work. With increased
Social Science Research Network, Jan 25, 2018
Pervasive Computing and Social Networking, 2022
An efficient PSO has been proposed for frequent itemsets mining. It is based on random bias remov... more An efficient PSO has been proposed for frequent itemsets mining. It is based on random bias removal in each iteration. Numeric and character both data can be accepted in our framework.Mushroom T10I4D100K dataset have been used for experimentation. Our approach also provides the facility of artificial dataset creation. Support value has been calculated based on the flexibility of the multi-minimum support in one time. Positive as well as negative association has been considered. Then PSO algorithm has been applied and the results are compared based on the positive (Max-Min) and Negative (Max-Min). The results are compared from the previous approaches.It clearly shows that the produced results in case of minimization and maximization are better in comparison to the previous method in case of support threshold as well as time.
International Journal for Research in Applied Science and Engineering Technology, 2018
This paper talks about a help framework for stereo shooting and 3D generation, called Stereoscopi... more This paper talks about a help framework for stereo shooting and 3D generation, called Stereoscopic Analyzer. An element based scene examination evaluates in realtime the relative posture of the two cameras with a specific end goal to permit ideal camera arrangement and focal point settings straightforwardly at the set. It consequently disposes of undesired vertical aberrations and geometrical bends through picture amendment. Furthermore, it recognizes the situation of close and far items in the scene to infer the ideal between pivotal separation (stereo pattern), and gives a confining alarm if there should be an occurrence of stereoscopic window infringement. Against this foundation the paper portrays the framework engineering, clarifies the hypothetical foundation and examines future advancements.
International Journal of Advanced Research in Computer Science, 2020
IoT devices enhance efficiency, accuracy and economic advantages along with less involvement of h... more IoT devices enhance efficiency, accuracy and economic advantages along with less involvement of human resources, thus our different daily applications have become more flexible and convenient. But, in IoT we have many security and privacy challenges emerging on regular basis. Earlier this issue has been addressed by introduction of many approaches for achieving privacy-preserving in data aggregation process. In this aspect this paper presents an outline of IoT-oriented approach for achieving privacy preservation together with minimizing communication overhead. This paper reviews the latest Privacy Preserving Data Aggregation (PPDA) techniques along with their comparative analysis. Latest techniques are investigated here to give a detail analysis of the each and every step of these techniques. In addition, every mathematical operation used in several PPDA schemes is analyzed here. Also current study will be advantageous to researchers in designing solutions in terms of energy efficiency and computational feasibility for ensuring user privacy in different IoT application.
Smart Intelligent Computing and Applications, 2019
This paper presents the issue of security for the document image, which may store in the cloud en... more This paper presents the issue of security for the document image, which may store in the cloud environment. To provide the protect to the document image is gained by using the Arnold Transform scrambling and descrambling method. In today’s scenario, we are witnesses of the rapid development of the technology. The security of data is becoming the most critical factor. The Document image is treats as the digital property of any individual person, organization or any Government sector. The digitized documents are stored from any place and allow the access also from any place on the globe, by using Cloud computing technologies. Hence, there has been an issue of security, which plays the important role. The security issue still exists in cloud computing. This security issue is motivated to address in this paper. We have considered the Arnold Transformation method for scrambling the document image. The image may send using the medium of internet technology or store in the cloud. By using this work, the security applied to the document image and this ensures un-authorized persons should not be able to read or exploit the document image information. To retrieve the original image descrambling process is applied. The proposed method exhibited encouraging results.
Materials Today: Proceedings, 2021
Abstract Word embedding generation is the task of distributed representation of words on vector s... more Abstract Word embedding generation is the task of distributed representation of words on vector space. The word embeddings captures both the syntactic and semantic information to perform natural language processing tasks. The word embeddings has attained considerable attention from last few years giving their inherent applicability to Natural Language Processing like part of speech tagging, sentiment analyzing or dependency parsing etc. despite recent advancement in word embedding mappings, very little research has devoted for Urdu word embeddings where word with similar meaning will align to similar vector space and different far apart. In this research paper Word2vec model has been used for Urdu word embedding generation. The model will help to make the dense word vector representation of Urdu words which could be used for pre-trained word vectors. The results showed the proposed method can be used to improve conventional word embedding methods.
Advances in Intelligent Systems and Computing, 2018
The smart grids, a new-generation power supply system, have the capacity to lowering the cost, ca... more The smart grids, a new-generation power supply system, have the capacity to lowering the cost, can increase service provision tremendously, and make surroundings greener as compared to conventional power supply systems. To interact with the physical world and widen its capabilities, integrated smart grid cyber-physical system (SG-CPS) can be used for computation, communication, and control. To support smart grid (SG), cloud components are employed for storing and processing users’ power demand and control flow information generated at different control components like smart meter (SM), home energy management (HEM), phasor measurement units (PMUs), and soon. But storing smart grid data to cloud and processing incurs unacceptable delays. This paper addresses quality-of-service (QoS) requirements of SGs by integrating fog computing along with cloud computing infrastructure for realizing an Edge Computing integrated Smart Grid (EC-iSG). To that end, this paper presents novel heuristics for resource management of such integrated infrastructure that accounts for parameters such as uplink and downlink communication costs, cost for VM deployment, and cost for communicating among base stations. The results presented demonstrate the efficacy of the proposed methodology.
Social Science Research Network, 2018
Detecting face quiet have issues in managing pictures in the bare because of huge presence dissim... more Detecting face quiet have issues in managing pictures in the bare because of huge presence dissimilarities. Rather than exit look differences straightforwardly to measurable knowledge calculations, we suggest a various leveled (body-part) portion centered Essential replica to unequivocally catch them. This replica empowers part subtype alternative to deal with nearby appearance variations, for example, shut and exposed mouth, and body-portion distortion to catch the worldwide look differences, for example, posture and articulation. In recognition, applicant frame is fit to the Essential replica to surmise the portion area and portion subtype, and finding total is then processed in light of the fitted arrangement. Thusly, the impact of appearance variety is diminished. Other than the face replica, we abuse the co-event amongst body and face, which handles huge variations, for example, substantial impediments, to additionally support the face detection execution. We display an express...
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
In India, advancement in technology is imperative for the betterment of the education system. For... more In India, advancement in technology is imperative for the betterment of the education system. For improving the nature of education given to the understudies, the School must make a collective climate for Technological Changes. The Education System generates a large amount of data related to different indicators involved in the U-DISE+ and SDMIS database of the Education System. However, these indicators are considered as very important for quality Education. The goal of this paper is to anticipate the execution of School and understudies based on UDISE Plus information by utilizing different classification Algorithms.
Smart Intelligent Computing and Applications, 2019
Machine learning is one of the applications of AI which enables analysis of massive quantities of... more Machine learning is one of the applications of AI which enables analysis of massive quantities of data. While it generally delivers quicker, more precise results in order to recognize profitable opportunities or hazardous risks, it may also entail additional time and resources to train it appropriately. This paper presents the survey of machine learning application in the development of software quality. Development of software quality becomes more important in real world scenario but lots of work done by various author for this. In this we discuss various machine learning techniques such as Bayesian classifier, Neural Network, decision tree and genetic algorithm etc. which helps the researchers for the better prediction of software quality.
Gender identification is a significant task which is very useful in many computer applications li... more Gender identification is a significant task which is very useful in many computer applications like human–computer interaction, surveillance, demographic studies, and forensic studies. Being one of the most popular soft biometrics, gender information plays a vital role in improvement of the accuracy of biometric systems. In this paper, we have presented an approach based on multiresolution statistical descriptors derived from histogram of Discrete Wavelet Transform. First, the input facial image was enhanced by applying contrast limited adaptive histogram equalization. During feature extraction, multiresolution statistical descriptors were computed and fed into the Nearest Neighbor, Support Vector Machine, and Linear Discriminant Analysis classifiers respectively. We have achieved encouraging accuracy for gender identification on complex dataset of frontal facial images.
Smart Intelligent Computing and Applications, 2019
In this paper, we have analyzed the matrix patterns of different interconnection networks. The tr... more In this paper, we have analyzed the matrix patterns of different interconnection networks. The transpose of the PDN matrix is the same as its adjacency matrix and the partitioning of the matrix of PDN, and Hypercube shows symmetry. We have also demonstrated the structural relationship between nodes and edges and can derive as the ratio between the total number of edges & its multiplication with diameter & the total number of nodes. Many new properties are presented in the form of lemmas which may be beneficial for further research in matrix patterns of different interconnection networks.
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017
This paper refers to secure the cloud in the scenario of overflow problem of a network coding sto... more This paper refers to secure the cloud in the scenario of overflow problem of a network coding storage system. From the analysis and experiments, it shows the impacts of overflow problem in a network coding scheme, which is not only waste storage, but also degrade the coding efficiency. To avoid this overflow problem, we developed the method to reduce the overflow problem and degrading coding efficiency this development is make use of Network Coding based Secure Storage (NCSS) scheme. The NCSS is able to improve the performance of a cloud storage cost and coding execution time.
Journal of emerging technologies and innovative research, 2018
Handwriting recognition has been one of the dynamic and testing research zones in the field of ex... more Handwriting recognition has been one of the dynamic and testing research zones in the field of example recognition. It has various applications which incorporate, perusing help for dazzle, bank checks and transformation of any manually written record into auxiliary content frame [1]. As there are no adequate number of deals with Indian dialect character recognition particularly Kannada content among 15 noteworthy contents in India [2]. A manually written kannada character is resized into 60x40 pixel. The resized character is utilized for preparing the neural network. Once the preparation procedure is finished a similar character is given as contribution to the neural network with various arrangement of neurons in concealed layer and their recognition precision rate for various kannada characters has been ascertained and thought about. The outcomes demonstrate that the proposed framework yields great recognition exactness rates practically identical to that of other manually written ...
International Journal of Scientific & Technology Research, 2020
Social Science Research Network, Mar 27, 2018
International Journal of Advance Research and Innovative Ideas in Education, 2021
With the rapid growth in cloud users and they store number of data in cloud, security of cloud be... more With the rapid growth in cloud users and they store number of data in cloud, security of cloud becomes most essential. Whereas cloud offers the facility to users that they can access the data from anywhere and anytime. Cloud computing provides consistent and irrepressible infrastructure for users to remotely store data and use on-demand applications and services. Conversely, the outsourced data is not every time reliable because of the loss of physical control and possession over the data. Internet of things is one of the most emerging and popular technology, which has changed our life, by impacting different areas such as shopping, enterprise production, storage, monitoring physical devices, etc. An enterprise has to store data generated from the Internet of Things and this data grows exponentially, it forces to think about cloud storage for storing IoT data. Here the proposed system uses the secure hash algorithm for enhancing the security of Cloud based IoT system.
Journal of Harmonized Research in Engineering, 2020
Introduction: The emerging technical space is growing with the Internet of Things (IoT). IoT is b... more Introduction: The emerging technical space is growing with the Internet of Things (IoT). IoT is bringing about a paradigm shift in services, infrastructure, and consumer industries [1,5]. While this paradigm shift is happening, trust and security are necessary requirements to tackle different kinds of attacks, threats, malfunctions, and devastating impacts to society. The responsibility of securing IoT lies with device manufacturing companies and companies that use the devices. Having a complete set of security terms is a priority to organize the threat and overcome all security challenges in IoT. Some security requirements for IoT have been proposed, including encryption, hashing, and other forms of secure communications [2, 3]. Yet, more is needed to secure this infrastructure from threats and attacks as well as other concerning interests. Advancing the technology to secure the IoT environment is the motivation of this research work. With increased
Social Science Research Network, Jan 25, 2018
Pervasive Computing and Social Networking, 2022
An efficient PSO has been proposed for frequent itemsets mining. It is based on random bias remov... more An efficient PSO has been proposed for frequent itemsets mining. It is based on random bias removal in each iteration. Numeric and character both data can be accepted in our framework.Mushroom T10I4D100K dataset have been used for experimentation. Our approach also provides the facility of artificial dataset creation. Support value has been calculated based on the flexibility of the multi-minimum support in one time. Positive as well as negative association has been considered. Then PSO algorithm has been applied and the results are compared based on the positive (Max-Min) and Negative (Max-Min). The results are compared from the previous approaches.It clearly shows that the produced results in case of minimization and maximization are better in comparison to the previous method in case of support threshold as well as time.
International Journal for Research in Applied Science and Engineering Technology, 2018
This paper talks about a help framework for stereo shooting and 3D generation, called Stereoscopi... more This paper talks about a help framework for stereo shooting and 3D generation, called Stereoscopic Analyzer. An element based scene examination evaluates in realtime the relative posture of the two cameras with a specific end goal to permit ideal camera arrangement and focal point settings straightforwardly at the set. It consequently disposes of undesired vertical aberrations and geometrical bends through picture amendment. Furthermore, it recognizes the situation of close and far items in the scene to infer the ideal between pivotal separation (stereo pattern), and gives a confining alarm if there should be an occurrence of stereoscopic window infringement. Against this foundation the paper portrays the framework engineering, clarifies the hypothetical foundation and examines future advancements.
International Journal of Advanced Research in Computer Science, 2020
IoT devices enhance efficiency, accuracy and economic advantages along with less involvement of h... more IoT devices enhance efficiency, accuracy and economic advantages along with less involvement of human resources, thus our different daily applications have become more flexible and convenient. But, in IoT we have many security and privacy challenges emerging on regular basis. Earlier this issue has been addressed by introduction of many approaches for achieving privacy-preserving in data aggregation process. In this aspect this paper presents an outline of IoT-oriented approach for achieving privacy preservation together with minimizing communication overhead. This paper reviews the latest Privacy Preserving Data Aggregation (PPDA) techniques along with their comparative analysis. Latest techniques are investigated here to give a detail analysis of the each and every step of these techniques. In addition, every mathematical operation used in several PPDA schemes is analyzed here. Also current study will be advantageous to researchers in designing solutions in terms of energy efficiency and computational feasibility for ensuring user privacy in different IoT application.
Smart Intelligent Computing and Applications, 2019
This paper presents the issue of security for the document image, which may store in the cloud en... more This paper presents the issue of security for the document image, which may store in the cloud environment. To provide the protect to the document image is gained by using the Arnold Transform scrambling and descrambling method. In today’s scenario, we are witnesses of the rapid development of the technology. The security of data is becoming the most critical factor. The Document image is treats as the digital property of any individual person, organization or any Government sector. The digitized documents are stored from any place and allow the access also from any place on the globe, by using Cloud computing technologies. Hence, there has been an issue of security, which plays the important role. The security issue still exists in cloud computing. This security issue is motivated to address in this paper. We have considered the Arnold Transformation method for scrambling the document image. The image may send using the medium of internet technology or store in the cloud. By using this work, the security applied to the document image and this ensures un-authorized persons should not be able to read or exploit the document image information. To retrieve the original image descrambling process is applied. The proposed method exhibited encouraging results.
Materials Today: Proceedings, 2021
Abstract Word embedding generation is the task of distributed representation of words on vector s... more Abstract Word embedding generation is the task of distributed representation of words on vector space. The word embeddings captures both the syntactic and semantic information to perform natural language processing tasks. The word embeddings has attained considerable attention from last few years giving their inherent applicability to Natural Language Processing like part of speech tagging, sentiment analyzing or dependency parsing etc. despite recent advancement in word embedding mappings, very little research has devoted for Urdu word embeddings where word with similar meaning will align to similar vector space and different far apart. In this research paper Word2vec model has been used for Urdu word embedding generation. The model will help to make the dense word vector representation of Urdu words which could be used for pre-trained word vectors. The results showed the proposed method can be used to improve conventional word embedding methods.
Advances in Intelligent Systems and Computing, 2018
The smart grids, a new-generation power supply system, have the capacity to lowering the cost, ca... more The smart grids, a new-generation power supply system, have the capacity to lowering the cost, can increase service provision tremendously, and make surroundings greener as compared to conventional power supply systems. To interact with the physical world and widen its capabilities, integrated smart grid cyber-physical system (SG-CPS) can be used for computation, communication, and control. To support smart grid (SG), cloud components are employed for storing and processing users’ power demand and control flow information generated at different control components like smart meter (SM), home energy management (HEM), phasor measurement units (PMUs), and soon. But storing smart grid data to cloud and processing incurs unacceptable delays. This paper addresses quality-of-service (QoS) requirements of SGs by integrating fog computing along with cloud computing infrastructure for realizing an Edge Computing integrated Smart Grid (EC-iSG). To that end, this paper presents novel heuristics for resource management of such integrated infrastructure that accounts for parameters such as uplink and downlink communication costs, cost for VM deployment, and cost for communicating among base stations. The results presented demonstrate the efficacy of the proposed methodology.
Social Science Research Network, 2018
Detecting face quiet have issues in managing pictures in the bare because of huge presence dissim... more Detecting face quiet have issues in managing pictures in the bare because of huge presence dissimilarities. Rather than exit look differences straightforwardly to measurable knowledge calculations, we suggest a various leveled (body-part) portion centered Essential replica to unequivocally catch them. This replica empowers part subtype alternative to deal with nearby appearance variations, for example, shut and exposed mouth, and body-portion distortion to catch the worldwide look differences, for example, posture and articulation. In recognition, applicant frame is fit to the Essential replica to surmise the portion area and portion subtype, and finding total is then processed in light of the fitted arrangement. Thusly, the impact of appearance variety is diminished. Other than the face replica, we abuse the co-event amongst body and face, which handles huge variations, for example, substantial impediments, to additionally support the face detection execution. We display an express...
2020 International Conference on Computer Science, Engineering and Applications (ICCSEA), 2020
In India, advancement in technology is imperative for the betterment of the education system. For... more In India, advancement in technology is imperative for the betterment of the education system. For improving the nature of education given to the understudies, the School must make a collective climate for Technological Changes. The Education System generates a large amount of data related to different indicators involved in the U-DISE+ and SDMIS database of the Education System. However, these indicators are considered as very important for quality Education. The goal of this paper is to anticipate the execution of School and understudies based on UDISE Plus information by utilizing different classification Algorithms.
Smart Intelligent Computing and Applications, 2019
Machine learning is one of the applications of AI which enables analysis of massive quantities of... more Machine learning is one of the applications of AI which enables analysis of massive quantities of data. While it generally delivers quicker, more precise results in order to recognize profitable opportunities or hazardous risks, it may also entail additional time and resources to train it appropriately. This paper presents the survey of machine learning application in the development of software quality. Development of software quality becomes more important in real world scenario but lots of work done by various author for this. In this we discuss various machine learning techniques such as Bayesian classifier, Neural Network, decision tree and genetic algorithm etc. which helps the researchers for the better prediction of software quality.
Gender identification is a significant task which is very useful in many computer applications li... more Gender identification is a significant task which is very useful in many computer applications like human–computer interaction, surveillance, demographic studies, and forensic studies. Being one of the most popular soft biometrics, gender information plays a vital role in improvement of the accuracy of biometric systems. In this paper, we have presented an approach based on multiresolution statistical descriptors derived from histogram of Discrete Wavelet Transform. First, the input facial image was enhanced by applying contrast limited adaptive histogram equalization. During feature extraction, multiresolution statistical descriptors were computed and fed into the Nearest Neighbor, Support Vector Machine, and Linear Discriminant Analysis classifiers respectively. We have achieved encouraging accuracy for gender identification on complex dataset of frontal facial images.
Smart Intelligent Computing and Applications, 2019
In this paper, we have analyzed the matrix patterns of different interconnection networks. The tr... more In this paper, we have analyzed the matrix patterns of different interconnection networks. The transpose of the PDN matrix is the same as its adjacency matrix and the partitioning of the matrix of PDN, and Hypercube shows symmetry. We have also demonstrated the structural relationship between nodes and edges and can derive as the ratio between the total number of edges & its multiplication with diameter & the total number of nodes. Many new properties are presented in the form of lemmas which may be beneficial for further research in matrix patterns of different interconnection networks.
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017
This paper refers to secure the cloud in the scenario of overflow problem of a network coding sto... more This paper refers to secure the cloud in the scenario of overflow problem of a network coding storage system. From the analysis and experiments, it shows the impacts of overflow problem in a network coding scheme, which is not only waste storage, but also degrade the coding efficiency. To avoid this overflow problem, we developed the method to reduce the overflow problem and degrading coding efficiency this development is make use of Network Coding based Secure Storage (NCSS) scheme. The NCSS is able to improve the performance of a cloud storage cost and coding execution time.
Journal of emerging technologies and innovative research, 2018
Handwriting recognition has been one of the dynamic and testing research zones in the field of ex... more Handwriting recognition has been one of the dynamic and testing research zones in the field of example recognition. It has various applications which incorporate, perusing help for dazzle, bank checks and transformation of any manually written record into auxiliary content frame [1]. As there are no adequate number of deals with Indian dialect character recognition particularly Kannada content among 15 noteworthy contents in India [2]. A manually written kannada character is resized into 60x40 pixel. The resized character is utilized for preparing the neural network. Once the preparation procedure is finished a similar character is given as contribution to the neural network with various arrangement of neurons in concealed layer and their recognition precision rate for various kannada characters has been ascertained and thought about. The outcomes demonstrate that the proposed framework yields great recognition exactness rates practically identical to that of other manually written ...
International Journal of Scientific & Technology Research, 2020