Papers by RAJKUMAR SHENDE

Product Traceability Using Blockchain
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), 2020
In this modern era, as the demand for the products has substantially increased, it has been obser... more In this modern era, as the demand for the products has substantially increased, it has been observed that compromises being made in the quality of the products. This has also led to many frauds due to the lack of transparency in the Supply Chain Management (SCM) systems. Due to the inconsistency and opaqueness of these systems, it is not possible to detect all the fraudulent steps that have been carried out with the product and other compromises that have been made to the quality of the product.Here we propose a blockchain-based product traceability system to overcome these inconsistencies in the current systems. With the help of enhanced security of blockchain technology [1], tampering of the data can be prevented and transparency of this system can help us develop and maintain trust among all the participating entities in the system. In this way, we can eradicate all the discrepancies present in the current system and ensure that the quality of the product is not being compromised.
In cloud computing we can store personal and business data. Cloud computing provides various feat... more In cloud computing we can store personal and business data. Cloud computing provides various features like less maintenance, more storage capacity, pay-per-use etc. But with this features cloud computing has some disadvantages like security and privacy. Existing data security mechanisms are not sufficient for the security of the data. In this work, five layers of security of data have been proposed which makes data more secure on cloud. In the 1st two layers user authentication with one time password mechanism is proposed. Then in the next layers data encryption, access rights and in the final layer file will be split and store that file on different locations of server.
A proposed system for recapitulating tweets using graph-based clustering
Twitter, a well-liked online social networking site, facilitates millions of users on a daily bas... more Twitter, a well-liked online social networking site, facilitates millions of users on a daily basis to dispatch and orate quick 140-character notes named tweets. Nowadays, twitter is cogitated as the fastest and popular intermediate of communication and is used to follow latest events. Tweets pertaining to a specific event can be effortlessly found using keyword matching, but there are numerous tweets that are likely to contain information that is semantically identical. Moreover, there exist many systems for recapitulating tweets related to a particular event, but they have numerous limitations and are unable to provide accurate results. This study aims to overcome the limitations of existing systems by proposing a system for recapitulating tweets using graph-based clustering.

International Journal of Engineering Research and, 2015
Cloud computing is distributed computing over a network and it means the ability to run a program... more Cloud computing is distributed computing over a network and it means the ability to run a program on many connected computers at the same time.Large scale distributed systems such as cloud computing applications are becoming very common. These applications come with increasing challenges on how to transfer and where to store and compute data. Load balancing is the one of the challenging task. Load balancing is the process of reassigning the total loads to the individual nodes of the collective system to make the best response time and also good utilization of the resources and to remove the situation where some nodes are over loaded and some other are under loaded. To decrease the total number of heavy nodes (servers) in the system by moving load from heavy nodes (servers) to light nodes (servers) is the main aim of balancing the load. Our objective is to allocate the files as uniformly as possible among the nodes such that no node manages an excessive number of loads. In this paper we present K-means algorithm, Min-Min and Max-Min algorithm for load balancing on cloud.

An intelligent approach for data fortification in cloud computing
2015 IEEE Electrical Insulation Conference (EIC), 2014
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we ... more Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.

Recommendation System using optimized Matrix Multiplication Algorithm
2020 IEEE International Symposium on Sustainable Energy, Signal Processing and Cyber Security (iSSSC)
Volume, Variety, Velocity, Veracity & Value of data has drawn the attention of many analysts ... more Volume, Variety, Velocity, Veracity & Value of data has drawn the attention of many analysts in the last few years. Performance optimization and comparison are the main challenges we face when we talk about the humongous volume of data. Data Analysts use data for activities like forecasting or deep learning and to process these data various tools are available which helps to achieve this task with minimum efforts. Recommendation System plays a crucial role while running any business such as a shopping website or travel agency where the system recommends the user according to their search history, likes, comments, or their past order/booking details. Recommendation System works on various strategies such as Content Filtering, Collaborative Filtering, Neighborhood Methods, or Matrix Factorization methods. For achieving maximum efficiency and accuracy based on the data a specific strategy can be the best case or the worst case for that scenario. Matrix Factorization is the key point of interest in this work. Matrix Factorization strategy includes multiplication of user matrix and item matrix in-order to get a rating matrix that can be recommended to the users. Matrix Multiplication can be achieved by using various algorithms such as Naive Algorithm, Strassen Algorithm, Coppersmith – Winograd (CW) Algorithm. In this work, a new algorithm is proposed to achieve less amount of time and space complexity used in-order for performing matrix multiplication which helps to get the results much faster. By using the Matrix Factorization strategy with various Matrix Multiplication Algorithm we are going to perform a comparative analysis of the same to conclude the proposed algorithm is more efficient.
Uploads
Papers by RAJKUMAR SHENDE