Revati M Wahul | MES College of engineering (original) (raw)
Papers by Revati M Wahul
Revue d'intelligence artificielle, Aug 30, 2023
Results in control and optimization, Mar 1, 2024
IJERMT, 2015
urrently Cloud computing is an emerging concept which efficiently combining many fields of comput... more urrently Cloud computing is an emerging concept which efficiently combining many fields of computing. Cloud computing provides usvarious services and software and processing capacity over the internet. The biggest advantage of cloud computing is that it is capable of handling a huge amount of growing work in a predestined manner for the usage of the business customers. Here in cloud computing the main concept for cloud computing is virtualization which generalizes the physical infrastructure and makes it easy to use and manage. In our project virtualization is used to allocate resources based on their needs and also supports green computing concept. Another concept that is "Skewness" is introduced here in which the same is minimized to combine various workloads to improve the utilization of the server. And Overload avoidance is maintained in this project which leads to achieve good performance. In order to achieve this dynamic resource allocation concept we have implemented Web hosting scenario.
Ingénierie des systèmes d information
International Journal on Communications Antenna and Propagation (IRECAP), 2017
Energy efficiency is mainly considered as a primary reason for migrating to Cloud environment. Ha... more Energy efficiency is mainly considered as a primary reason for migrating to Cloud environment. Hadoop is not only a Big Data processing system but also a storage system. Currently, huge effort has been invested to enhance Hadoop performance by considering different factors like job scheduling, improving HDFS mechanism, data locality, job execution time, system memory, data caching. But these experiments are seen less effective to enhance the Hadoop performance. The objective of this work is to focus on the network latency of Hadoop to enhance its performance by using the docker technique. The Docker is an open stage for delivery, creating and running applications. It is able to bundle and to package and run an application in a loosely isolated environment called a container. In our study, containers are running the Hadoop framework in a private Cloud. The workload is distributed among the containers in a single system. The workload depends on distributing HDFS Data. The goal is to enhance the performance of MapReduce framework of Hadoop by considering factors like the number of reading operations, the number of writing operations and CPU processing time using the different job with different data set size. In the proposed experiment, the same job with different size of the dataset was used.
Green computing is a very emerging topic these days, not only because of rising energy costs and ... more Green computing is a very emerging topic these days, not only because of rising energy costs and potential savings, but also due to the impact on the environment. Green technology focuses on reducing the environmental impact of industrial processes and technologies caused by the Earth's growing population. It has taken upon itself the goal to provide society's needs in ways that do not damage or deplete natural resources. To address the various challenges, we design the Green - Cloud architecture and the corresponding Green Cloud exploratory system. This article suggests that tracking energy consumption at every level will become the factor of success for green architecture practitioners. It also suggests some green computing tips for a greener environment.
Journal of emerging technologies and innovative research, 2016
E-healthcare systems are very popular now but face security constraints. The distributed m-health... more E-healthcare systems are very popular now but face security constraints. The distributed m-healthcare systems allow significant patient treatment by sharing personal health information among healthcare providers. The challenge it faces is to ensure the security of the patients identity as well as the data. Patients can decide which physician can access their information as well as set their physician .Based on this idea we are devising a new technique where the patient can self-control their data and develop a system where all of the patient’s health information is stored in a secured database ,the data will be available only to the patient, his/her specific physician and the consultant in case the case is transferred to the consultant, it supports secure and efficient data transfer and data retrieval
Sensors
The controlled interaction of work material and cutting tool is responsible for the precise outco... more The controlled interaction of work material and cutting tool is responsible for the precise outcome of machining activity. Any deviation in cutting parameters such as speed, feed, and depth of cut causes a disturbance to the machining. This leads to the deterioration of a cutting edge and unfinished work material. Recognition and description of tool failure are essential and must be addressed using intelligent techniques. Deep learning is an efficient method that assists in dealing with a large amount of dynamic data. The manufacturing industry generates momentous information every day and has enormous scope for data analysis. Most intelligent systems have been applied toward the prediction of tool conditions; however, they must be explored for descriptive analytics for on-board pattern recognition. In an attempt to recognize the variation in milling operation leading to tool faults, the development of a Deep Belief Network (DBN) is presented. The network intends to classify in tota...
International Journal of Performability Engineering
Ingénierie Des Systèmes D'information, Oct 31, 2022
Regular Issue, Mar 30, 2020
Cloud Computing has made it possible to provide individuals as well as organizations with a utili... more Cloud Computing has made it possible to provide individuals as well as organizations with a utility that is costeffective. It empowers businesses by delivering these services using the internet. Files can be shared through the cloud. These files may contain sensitive information that needs to be kept hidden from anonymous users. This is done using cryptographic algorithms. High level of security can be provided using hybrid cryptography to encrypt the data. Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) are the symmetric key encryption algorithms used to secure. An asymmetric key encryption algorithm, Rivest-Shamir-Adleman (RSA) helps in providing a hybrid cryptography model. The security of the key generated can be further enhanced using image steganography method Least Significant Bit (LSB). These issues regarding the security and its challenges will be addressed in this paper and also analyse the measures to handle it.
Habitually water quality monitoring commands to manually accumulation of water representations an... more Habitually water quality monitoring commands to manually accumulation of water representations and Commission to the lab for examining and investigating. To conquer this laborious culmination and to promote a low-potential, low-cost and configurable system to guarantee water quality for secured drinking water to the environment. The system which can be utilized in a distant area to assemble the information concerning, water level, water PH, water temperature, and carbon dioxide quantity present in water. In this paper, we are achieving a system for monitoring the water quality and accommodating innovative technologies such as IoT (Internet of Things), WSN's (Wireless sensor network) and communication pattern. This reconfigurable water quality monitoring system lives of water parameter Sensors, an ARM-based microcontroller (STM32 Nucleo), ZigBee communication module and a personal computer. The ARM-based microcontroller board (STM32 Nucleo) is programmed on STM32CubeMX software i...
Advances in Intelligent Systems and Computing, 2018
Massive increase in population around the world and the advent of more and more number of people ... more Massive increase in population around the world and the advent of more and more number of people moving to cities for livelihood has increased the demand for better transportation and infrastructure. It has given rise to conflicts between multiple smart city services and demands the better project management. Here, we are putting forward a fresh approach for smart city project management using the live data feed through which we detect the conflict in real time, which in turn helps the authorities for better decision-making.
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), 2018
Water quality monitoring is an important aspect to provide safe drinking water to the environment... more Water quality monitoring is an important aspect to provide safe drinking water to the environment and keep the naturally gifted resource safe from getting contaminated. Old method used for water quality monitoring is to send gathered samples to the lab and then test them to verify the different water parameters. The process may cause the potential errors as well as it is time-consuming and not the cost-effective solution. Solution need to real-time for the process of data acquisition, transmission, and processing of different parameters. This paper represents the system which is cost effective, less time as well as less power consuming solution for water quality monitoring with the help of innovative technology such as: Internet of Things, Wireless sensor network, Modern communication technology and data analysis techniques which will provide you the alert and preventive action to take in case of an emergency. Real-time water quality monitoring system implemented with various sensors (Parameters: Carbon Dioxide, pH, Turbidity, Temperature, Water Level) which will help to gather water parameter, ARM-based microcontroller (STM32 Nucleo-board) which will convert the analogue signal to digital signal, Zig-Bee module which is used to send the data to personal computer, then data analysis operation takes place which will notify the user wirelessly. The system keeps check on pollution of water as well as keep track through analysis on data optimized with the help of optimization data fusion algorithm, and if required, then alert the user to take the preventive action time to time.
International Journal for Research in Applied Science and Engineering Technology, 2021
To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As ... more To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search accuracy efficiency. Additionally, the volume of data stored in data centers has exploded. This will make it significantly more difficult to create cipher text search schemes capable of providing efficient and reliable online information retrieval on large quantities of encrypted data. The paper proposes a hierarchical clustering approach in order to accommodate additional search semantics and to satisfy the demand for fast cipher text search in a big data environment. The proposed hierarchical approach clusters documents according to their minimum importance levels and then sub-clusters them until the maximum cluster size is reached....
International Journal Of Engineering And Computer Science, 2016
Database has been considered to be very important since a really long time and securing it now is... more Database has been considered to be very important since a really long time and securing it now is of utmost importance-healthcare systems is very popular now but faces security constraints. The distributed m-healthcare systems allow significant patient treatment for medical consultation by sharing personal health information among healthcare providers. The important challenge is to ensure the security of the patient's identity as well as the data. Patients can decide which physician can access their information by using threshold predicates. Based on this idea we are devising a new technique where the patient can selfcontrol their data with different ways of security. The directly authorized physicians and the patient can respectively decipher the personal health information and/or verify and update patient's health information at the click of a button.
Computer Science & Information Technology (CS & IT), 2012
Project Management Software dramatically improves performance and the communication between the d... more Project Management Software dramatically improves performance and the communication between the distributed and remote teams. Project Management software heightens the visibility and control of the application development lifecycle-giving a better control over the entire development process, from the management stage through development. The goal of Project Management Software is to produce a product that is delivered on time, within the allocated budget, and with the capabilities expected by the customer. Project management software is basically a properly managed project has a clear, communicated, and managed set of goals and objectives, whose progress is quantifiable and controlled. Resources are used effectively and efficiently to produce the desired product. A project usually has a communicated set of processes that cover the daily activities of the project, forming the project framework. As a result, every team member understands their roles, responsibilities and how they fit into the big picture thus promoting the efficient use of resources.
Lecture Notes in Electrical Engineering
International Journal of Advanced Trends in Computer Science and Engineering
International Journal in Foundations of Computer Science & Technology, 2012
Service Oriented Architecture A Revolution for Project Management Software has changed the way pr... more Service Oriented Architecture A Revolution for Project Management Software has changed the way projects today are moving on the fly with the help of web services booming the industry. Service oriented architecture improves performance and the communication between the distributed and remote teams. Web Services to Provide Project Management software the visibility and control of the application development lifecycle-giving a better control over the entire development process, from the management stage through development. The goal of Service Oriented Architecture for Project Management Software is to produce a product that is delivered on time, within the allocated budget, and with the capabilities expected by the customer. Web Services in Project management Project management software is basically a properly managed project and has a clear, communicated, and managed set of goals and objectives, whose progress is quantifiable and controlled. Resources are used effectively and efficiently to produce the desired product. With the help of service oriented architecture we can move into the future without abandoning the past. A project usually has a communicated set of processes that cover the daily activities of the project, forming the project framework. As a result, every team member understands their roles, responsibilities and how they fit into the big picture thus promoting the efficient use of resources.
Revue d'intelligence artificielle, Aug 30, 2023
Results in control and optimization, Mar 1, 2024
IJERMT, 2015
urrently Cloud computing is an emerging concept which efficiently combining many fields of comput... more urrently Cloud computing is an emerging concept which efficiently combining many fields of computing. Cloud computing provides usvarious services and software and processing capacity over the internet. The biggest advantage of cloud computing is that it is capable of handling a huge amount of growing work in a predestined manner for the usage of the business customers. Here in cloud computing the main concept for cloud computing is virtualization which generalizes the physical infrastructure and makes it easy to use and manage. In our project virtualization is used to allocate resources based on their needs and also supports green computing concept. Another concept that is "Skewness" is introduced here in which the same is minimized to combine various workloads to improve the utilization of the server. And Overload avoidance is maintained in this project which leads to achieve good performance. In order to achieve this dynamic resource allocation concept we have implemented Web hosting scenario.
Ingénierie des systèmes d information
International Journal on Communications Antenna and Propagation (IRECAP), 2017
Energy efficiency is mainly considered as a primary reason for migrating to Cloud environment. Ha... more Energy efficiency is mainly considered as a primary reason for migrating to Cloud environment. Hadoop is not only a Big Data processing system but also a storage system. Currently, huge effort has been invested to enhance Hadoop performance by considering different factors like job scheduling, improving HDFS mechanism, data locality, job execution time, system memory, data caching. But these experiments are seen less effective to enhance the Hadoop performance. The objective of this work is to focus on the network latency of Hadoop to enhance its performance by using the docker technique. The Docker is an open stage for delivery, creating and running applications. It is able to bundle and to package and run an application in a loosely isolated environment called a container. In our study, containers are running the Hadoop framework in a private Cloud. The workload is distributed among the containers in a single system. The workload depends on distributing HDFS Data. The goal is to enhance the performance of MapReduce framework of Hadoop by considering factors like the number of reading operations, the number of writing operations and CPU processing time using the different job with different data set size. In the proposed experiment, the same job with different size of the dataset was used.
Green computing is a very emerging topic these days, not only because of rising energy costs and ... more Green computing is a very emerging topic these days, not only because of rising energy costs and potential savings, but also due to the impact on the environment. Green technology focuses on reducing the environmental impact of industrial processes and technologies caused by the Earth's growing population. It has taken upon itself the goal to provide society's needs in ways that do not damage or deplete natural resources. To address the various challenges, we design the Green - Cloud architecture and the corresponding Green Cloud exploratory system. This article suggests that tracking energy consumption at every level will become the factor of success for green architecture practitioners. It also suggests some green computing tips for a greener environment.
Journal of emerging technologies and innovative research, 2016
E-healthcare systems are very popular now but face security constraints. The distributed m-health... more E-healthcare systems are very popular now but face security constraints. The distributed m-healthcare systems allow significant patient treatment by sharing personal health information among healthcare providers. The challenge it faces is to ensure the security of the patients identity as well as the data. Patients can decide which physician can access their information as well as set their physician .Based on this idea we are devising a new technique where the patient can self-control their data and develop a system where all of the patient’s health information is stored in a secured database ,the data will be available only to the patient, his/her specific physician and the consultant in case the case is transferred to the consultant, it supports secure and efficient data transfer and data retrieval
Sensors
The controlled interaction of work material and cutting tool is responsible for the precise outco... more The controlled interaction of work material and cutting tool is responsible for the precise outcome of machining activity. Any deviation in cutting parameters such as speed, feed, and depth of cut causes a disturbance to the machining. This leads to the deterioration of a cutting edge and unfinished work material. Recognition and description of tool failure are essential and must be addressed using intelligent techniques. Deep learning is an efficient method that assists in dealing with a large amount of dynamic data. The manufacturing industry generates momentous information every day and has enormous scope for data analysis. Most intelligent systems have been applied toward the prediction of tool conditions; however, they must be explored for descriptive analytics for on-board pattern recognition. In an attempt to recognize the variation in milling operation leading to tool faults, the development of a Deep Belief Network (DBN) is presented. The network intends to classify in tota...
International Journal of Performability Engineering
Ingénierie Des Systèmes D'information, Oct 31, 2022
Regular Issue, Mar 30, 2020
Cloud Computing has made it possible to provide individuals as well as organizations with a utili... more Cloud Computing has made it possible to provide individuals as well as organizations with a utility that is costeffective. It empowers businesses by delivering these services using the internet. Files can be shared through the cloud. These files may contain sensitive information that needs to be kept hidden from anonymous users. This is done using cryptographic algorithms. High level of security can be provided using hybrid cryptography to encrypt the data. Advanced Encryption Standard (AES) and Triple Data Encryption Standard (3DES) are the symmetric key encryption algorithms used to secure. An asymmetric key encryption algorithm, Rivest-Shamir-Adleman (RSA) helps in providing a hybrid cryptography model. The security of the key generated can be further enhanced using image steganography method Least Significant Bit (LSB). These issues regarding the security and its challenges will be addressed in this paper and also analyse the measures to handle it.
Habitually water quality monitoring commands to manually accumulation of water representations an... more Habitually water quality monitoring commands to manually accumulation of water representations and Commission to the lab for examining and investigating. To conquer this laborious culmination and to promote a low-potential, low-cost and configurable system to guarantee water quality for secured drinking water to the environment. The system which can be utilized in a distant area to assemble the information concerning, water level, water PH, water temperature, and carbon dioxide quantity present in water. In this paper, we are achieving a system for monitoring the water quality and accommodating innovative technologies such as IoT (Internet of Things), WSN's (Wireless sensor network) and communication pattern. This reconfigurable water quality monitoring system lives of water parameter Sensors, an ARM-based microcontroller (STM32 Nucleo), ZigBee communication module and a personal computer. The ARM-based microcontroller board (STM32 Nucleo) is programmed on STM32CubeMX software i...
Advances in Intelligent Systems and Computing, 2018
Massive increase in population around the world and the advent of more and more number of people ... more Massive increase in population around the world and the advent of more and more number of people moving to cities for livelihood has increased the demand for better transportation and infrastructure. It has given rise to conflicts between multiple smart city services and demands the better project management. Here, we are putting forward a fresh approach for smart city project management using the live data feed through which we detect the conflict in real time, which in turn helps the authorities for better decision-making.
2018 3rd International Conference on Contemporary Computing and Informatics (IC3I), 2018
Water quality monitoring is an important aspect to provide safe drinking water to the environment... more Water quality monitoring is an important aspect to provide safe drinking water to the environment and keep the naturally gifted resource safe from getting contaminated. Old method used for water quality monitoring is to send gathered samples to the lab and then test them to verify the different water parameters. The process may cause the potential errors as well as it is time-consuming and not the cost-effective solution. Solution need to real-time for the process of data acquisition, transmission, and processing of different parameters. This paper represents the system which is cost effective, less time as well as less power consuming solution for water quality monitoring with the help of innovative technology such as: Internet of Things, Wireless sensor network, Modern communication technology and data analysis techniques which will provide you the alert and preventive action to take in case of an emergency. Real-time water quality monitoring system implemented with various sensors (Parameters: Carbon Dioxide, pH, Turbidity, Temperature, Water Level) which will help to gather water parameter, ARM-based microcontroller (STM32 Nucleo-board) which will convert the analogue signal to digital signal, Zig-Bee module which is used to send the data to personal computer, then data analysis operation takes place which will notify the user wirelessly. The system keeps check on pollution of water as well as keep track through analysis on data optimized with the help of optimization data fusion algorithm, and if required, then alert the user to take the preventive action time to time.
International Journal for Research in Applied Science and Engineering Technology, 2021
To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As ... more To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search accuracy efficiency. Additionally, the volume of data stored in data centers has exploded. This will make it significantly more difficult to create cipher text search schemes capable of providing efficient and reliable online information retrieval on large quantities of encrypted data. The paper proposes a hierarchical clustering approach in order to accommodate additional search semantics and to satisfy the demand for fast cipher text search in a big data environment. The proposed hierarchical approach clusters documents according to their minimum importance levels and then sub-clusters them until the maximum cluster size is reached....
International Journal Of Engineering And Computer Science, 2016
Database has been considered to be very important since a really long time and securing it now is... more Database has been considered to be very important since a really long time and securing it now is of utmost importance-healthcare systems is very popular now but faces security constraints. The distributed m-healthcare systems allow significant patient treatment for medical consultation by sharing personal health information among healthcare providers. The important challenge is to ensure the security of the patient's identity as well as the data. Patients can decide which physician can access their information by using threshold predicates. Based on this idea we are devising a new technique where the patient can selfcontrol their data with different ways of security. The directly authorized physicians and the patient can respectively decipher the personal health information and/or verify and update patient's health information at the click of a button.
Computer Science & Information Technology (CS & IT), 2012
Project Management Software dramatically improves performance and the communication between the d... more Project Management Software dramatically improves performance and the communication between the distributed and remote teams. Project Management software heightens the visibility and control of the application development lifecycle-giving a better control over the entire development process, from the management stage through development. The goal of Project Management Software is to produce a product that is delivered on time, within the allocated budget, and with the capabilities expected by the customer. Project management software is basically a properly managed project has a clear, communicated, and managed set of goals and objectives, whose progress is quantifiable and controlled. Resources are used effectively and efficiently to produce the desired product. A project usually has a communicated set of processes that cover the daily activities of the project, forming the project framework. As a result, every team member understands their roles, responsibilities and how they fit into the big picture thus promoting the efficient use of resources.
Lecture Notes in Electrical Engineering
International Journal of Advanced Trends in Computer Science and Engineering
International Journal in Foundations of Computer Science & Technology, 2012
Service Oriented Architecture A Revolution for Project Management Software has changed the way pr... more Service Oriented Architecture A Revolution for Project Management Software has changed the way projects today are moving on the fly with the help of web services booming the industry. Service oriented architecture improves performance and the communication between the distributed and remote teams. Web Services to Provide Project Management software the visibility and control of the application development lifecycle-giving a better control over the entire development process, from the management stage through development. The goal of Service Oriented Architecture for Project Management Software is to produce a product that is delivered on time, within the allocated budget, and with the capabilities expected by the customer. Web Services in Project management Project management software is basically a properly managed project and has a clear, communicated, and managed set of goals and objectives, whose progress is quantifiable and controlled. Resources are used effectively and efficiently to produce the desired product. With the help of service oriented architecture we can move into the future without abandoning the past. A project usually has a communicated set of processes that cover the daily activities of the project, forming the project framework. As a result, every team member understands their roles, responsibilities and how they fit into the big picture thus promoting the efficient use of resources.