Papers by Dr. Sanjay Pachauri
Network intrusion detection system based on protocol behavior
INFLIBNET, Jun 7, 2012

International journal of computer applications, Jul 17, 2017
ETL is a type of data integration that refers to the three steps (extract, transform, and load) u... more ETL is a type of data integration that refers to the three steps (extract, transform, and load) used to blend data from multiple sources. It's often used to build a data warehouse. During this process, data is taken (extracted) from a source system, converted (transformed) into a format that can be analyzed, and stored (loaded) into a data warehouse or other system. FME has a rich data model designed implement ETL. FME provides tremendous transformation functionality, resulting in output that can be much greater than the sum of the inputs, and allowing data to be transformed from one type to another. The current paper uses FME workbench and implement the concept of ETL using a case study where a private firm wants to integrate attribute and spatial information regarding its employee, filter the unnecessary information and finally implement business query regarding Monthly Travelling Allowance. The results establish ETL and FEM as interdisciplinary technological domain and backbone of the data warehouse architecture.
Mann-Kendall Test - A Novel Approach for Statistical Trend Analysis
International Journal of Computer Trends and Technology, Sep 25, 2018
The Computational and Symbolic Security Analysis Connections
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA), Sep 21, 2022

Journal of emerging technologies and innovative research, Jul 1, 2021
Traffic management system is considered as one of the major dimensions of a smart city. With the ... more Traffic management system is considered as one of the major dimensions of a smart city. With the rapid growth of population and urban mobility in metropolitan cities, traffic congestion is often seen on roads. To tackle various issues for managing traffic on roads and to help authorities in proper planning, a smart traffic management system using the Internet of Things (IoT) is proposed in this paper. Traffic stream processing involves linking everything the differing time accessible to traffic flow rate of available vehicles on a highway and intelligent traffic platform allocation of that uses traffic signals in real time. Another traffic management system, called smart traffic control, was created to cope with issues of pollution and to further optimize traffic flow on roads. This study describes a method for the substantial growth of traffic flow as well as well as conventional device alternatives that are capable of meeting traffic needs that works well in major cities, but isn't flexible enough to cope with the new needs. Traffic management techniques proposed using the state-of-the-art methodology are focused on keeping an eye on the overall road infrastructure stability rather than on only individual behavior. Traffic intensity is able to adjust the timing of the signal according to the specific location of the roadside, rendering traffic control feasible, and even by interacting with the local system more accurately than ever before. And in the event of a local computer or server outage, the device is able to function as a little more effectively with a decentralized method. This research has ultimate goal to illustrated the traffic pattern study and simulate it in the time domain to analysis the real time traffic situation. This paper explores the Nodes Selection Algorithm which has mathematically presented in this thesis and encapsulate the formulation in MATLAB to construct the GUI. The GUI is the basic interface which has the arrival, discharge, old discharge of traffic nodes. The even created in this simulation has further categorized in three plans having three different time patterns of one hours, thirty mins and last small observation as 15 mins. This also has two specials phase introduced as statical and dynamic situation. The statical situation basically a non-changeable real time scenario where as the dynamic situation has conferred with real involvement of change due to external traffic controller in real time.
Generation Y and Generation Z's substantial technology use and mental health ignorance: A Descriptive Analysis
Proceedings of the International Conference on Application of AI and Statistical Decision Making for the Business World, ICASDMBW 2022, 16-17 December 2022, Rukmini Devi Institute of Advanced Studies, Delhi, India, 2023
The Computational and Symbolic Security Analysis Connections
2022 4th International Conference on Inventive Research in Computing Applications (ICIRCA)

Storagе spacе ability and computational authority incrеasеs, procеssing and analyzing largе volum... more Storagе spacе ability and computational authority incrеasеs, procеssing and analyzing largе volumеs of databasе systеms acts as a significant rolе in sеvеral arеas of sciеntific rеsеarch. Databasе comprеssion and dеcomprеssion is a suscеptiblе problеm in thе databasе framеwork. Disk storagе systеms can oftеn bе thе most еxpеnsivе componеnts of a databasе solution, еvеn a small rеduction in thе storagе subsystеm can rеsult in substantial cost savings for thееntirе databasе solution. Whеn you havе largе amounts of data, thе cost of thе storagе subsystеm can еasily еxcееd thе cost of your data sеrvеr. In this papеr wе proposеd a nеw algorithm for databasе comprеssion and dеcomprеssion callеd HIRAC algorithm. If wе comprеss thе databasе, thеrе is chancе of hurting thе data in thе comprеssеd databasе systеms. Projеctеd algorithm will manipulatеs еach row in comprеssеd databasе insidе thе filе to еxtract thе original databasе without losing any data.

Spеcific charactеristics of mobilе еnvironmеnts makе traditional transaction managеmеnt tеchniquе... more Spеcific charactеristics of mobilе еnvironmеnts makе traditional transaction managеmеnt tеchniquеs no longеr appropriatе. This is duе thе fact that thе ACID propеrtiеs of transactions arе not simply followеd, in particular thе consistеncy propеrty. Thus, transaction managеmеnt modеls adopting wеakеr form of consistеncy arе nееdеd and thеsе modеls can now tolеratе a limitеd amount of consistеncy. In this papеr wе еvaluatе our еxеcution framеwork on diffеrеnt mobilе computation modеs using diffеrеnt еxеcution stratеgiеs. Morеovеr, thе еffеcts of thе fixеd host transaction arе idеntifiеd and includеd in thе еvaluation Thе intеgration bеtwееn wirеd and wirеlеss еnvironmеnts confirms that thе еxеcution stratеgy is critical for thе pеrformancе of a systеm. Nеithеr MHS nor FHS arе optimal in all situations and thе pеrformancе pеnaltiеs and wastеd wirеlеss rеsourcеs can bе substantial. A combinеd stratеgy CHS ovеr MCA-FSA computation modеl matchеs thе bеst pеrformancе of thе FHS and MHS and...
Cloud-computing, without a doubt, has turned into the popular expression in the IT business today... more Cloud-computing, without a doubt, has turned into the popular expression in the IT business today. Taking a gander at the potentials way it has on various business provisions and in our ordinary life. A large number of the peculiarities that make cloud system have tested the current security framework, as well as uncovered new security issues. This paper gives a analysis of the current status on Cloud-computing security issues focused around an itemized study conveyed. It additionally makes an endeavour to depict the security challenges in Software-as-a-Service model of cloud and also proposed a Security Model for SaaS(SMS) as a guide for assessing and enhancing security in each layer of SaaS delivery model.
This Model management is an important issue in many different contexts and domains. Due to the sp... more This Model management is an important issue in many different contexts and domains. Due to the specific characteristics of models, specific systems are required for model management, in order to model, store, retrieve, and manipulate models in an efficient and effective way. Thus, there need to create model repositories where the knowledge artifacts known as models will reside, as primitive data reside in data base management systems (DBMSs). This paper introduces model characteristics and its importance in present scenario. The problems and challenges with model management are also presented here. The research direction towards a model base management system (PBMSs) by abstracting common features of models and management requirements is discussed.
The working range of Ad-hoc network will spread in coming future due to dynamic nature. However, ... more The working range of Ad-hoc network will spread in coming future due to dynamic nature. However, there will be the risk of spreading wrong routing information, packet dropping and selective forwarding in the network which further leads to special kind of attacks [1]. Existing authenticated routing protocols for Ad-hoc network fails to detect and defend against such kind of attacks in the mobile ad hoc network. Thus, if malicious node hack the packets and make the modifications , intentionally drop control or data packets, the current specification of existing routing protocols cannot detect or defend against such authenticated selfish nodes.This weakness in ARAN specification will result in the disturbance of the ad hoc network and the waste of the network bandwidth. In this research paper, a solution is proposed to account for this type of attacks.
Network intrusion detection system based on protocol behavior

Breakthroughs in information and communication technology establish payment-collection technologi... more Breakthroughs in information and communication technology establish payment-collection technologies like Debit and Credit card systems at the level where their rapid penetration in commercial market have led to an everlarger share of the world payment system and leading to a higher rate of stolen account numbers and subsequent losses by banks. Improved fraud detection thus has become essential to maintain the viability of the payment system, especially for e-commerce. This tremendous growth in databases, fraud detection and payment security systems has spawned a pressing need for new techniques and tools that can intelligently and automatically transform data into useful information and knowledge. In recent years, data-mining (DM) has become one of the most valuable tools for extracting and manipulating data and for establishing patterns in order to produce useful information for decision-making. This paper introduces three important data mining techniques J48, Naive Bayes and One-R...
International Journal of Computer Applications, 2019
The cause of climate change detection is very tedious and complex phenomenon. For the purpose, th... more The cause of climate change detection is very tedious and complex phenomenon. For the purpose, the behaviour identification of climatic variable using long term historical database is very important. In present study, highlights the climatic variability has been identified using the nonparametric Mann-Kendall, and Sen's slope estimators over northeastern region of India. In this study long term precipitation data has been considered during 1901-2015. The non-parametric tests have been tested at the 5% level of significance. The non-parametric tests were applied at eight northeastern states i.e.,

International Journal of Computer Applications, 2017
ETL is a type of data integration that refers to the three steps (extract, transform, and load) u... more ETL is a type of data integration that refers to the three steps (extract, transform, and load) used to blend data from multiple sources. It's often used to build a data warehouse. During this process, data is taken (extracted) from a source system, converted (transformed) into a format that can be analyzed, and stored (loaded) into a data warehouse or other system. FME has a rich data model designed implement ETL. FME provides tremendous transformation functionality, resulting in output that can be much greater than the sum of the inputs, and allowing data to be transformed from one type to another. The current paper uses FME workbench and implement the concept of ETL using a case study where a private firm wants to integrate attribute and spatial information regarding its employee, filter the unnecessary information and finally implement business query regarding Monthly Travelling Allowance. The results establish ETL and FEM as interdisciplinary technological domain and backbone of the data warehouse architecture.
Mann-Kendall Test - A Novel Approach for Statistical Trend Analysis
International Journal of Computer Trends and Technology, 2018
Uploads
Papers by Dr. Sanjay Pachauri