PURNA CHANDRA SETHI

@rdwu.ac.in

ASSISTANT PROFESSOR, DEPARTMENT OF COMPUTER SCIENCE
RAMA DEVI WOMEN'S UNIVERSITY



                 

https://researchid.co/pcsethi

RESEARCH, TEACHING, or OTHER INTERESTS

Computer Engineering, Computational Theory and Mathematics, Information Systems, Computer Networks and Communications

6

Scopus Publications

90

Scholar Citations

6

Scholar h-index

3

Scholar i10-index

Scopus Publications

  • Group security using ECC
    Purna Chandra Sethi, Neelima Sahu, and Prafulla Kumar Behera

    Springer Science and Business Media LLC
    Nowadays security is main issue during transmission of data. Among many cryptographic methods, ECC is the public key asymmetric cryptosystem which provides faster computation over smaller size in comparison to other asymmetric key cryptosystems. In this paper, we have proposed a group security algorithm using the ECC cryptography algorithm. The group security is applied to ECC in terms of m-gram selection called ECC m-gram selection. Due to the group security implementation in terms of common grams, processing speed will be faster in comparison to individual item security. We have also made the comparison study between the traditional ECC algorithm with the proposed group security algorithm using generalized frequent-common gram selection for depicting lesser time requirements to achieve better security for the whole process.

  • Image Encryption Using RSA Algorithm
    Aradhana Sahoo, Pratyasha Mohanty, and Purna Chandra Sethi

    Springer Nature Singapore

  • Effective online teaching learning during COVID-19 pandemic
    Purna Chandra Sethi and Prafulla Kumar Behera

    IOP Publishing
    Abstract The COVID-19 pandemic has resulted in a dramatic change in our day to day life. It affected not only the normal working of many organizations but also the traditional classroom teaching and learning methodologies. Since everyone has to maintain social distancing to follow COVID-19 guidelines, work from home is being preferred as the best alternative as a preventive measure from spreading the pandemic. In its severe impact, schools, colleges, and universities were shut down, pushing nearly 1.2 billion students out of the classroom. As a result, the education system has to suddenly adapt to a distinctive online-based e-learning approach over digital platforms. Research tells that online learning motivated more towards the retention of online resources with less cost in terms of money and time. But, it has also brought many challenges along the way. In this research work, we focus on some of the major challenges such as information security and network bandwidth problem during online teaching. The related security measures being adopted in our research work to secure personal information during any online teaching and learning process. We also focus on some basic learning models for provisioning effective online-based teaching and learning.

  • Preface
    Ishwar K. Sethi and Anil K. Jain

    Elsevier

  • Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm
    Purna Chandra Sethi and Prafulla Kumar Behera

    IEEE
    In the present scenario, most of the computing operations are performed over the Internet. Many companies provide their services using Internet, so networking services becomes more important these days. Hence, there is high demand for secured management of information, along with faster processing of operations. Due to increased demand for network services, there is a need to increase the performance of these services. The gradual increase in the amount of important information increases the packet payloads. EHMA is a faster searching algorithm that reduces the searching time significantly. In the original paper [1], EHMA is implemented in two tiers, but this paper considers the implementation of EHMA in three tiers. It follows incremental clustering algorithm for grouping clusters according to their impact factors. This three tier implementation of EHMA improves the security of the information as it uses SHA-256 for security.

  • High impact event processing using incremetal clustering in unsupervised feature space through genetic algorithm by selective repeat ARQ protocol
    Purna Chandra Sethi and Chinmay Dash

    IEEE
    High impact event represents the information which are frequently used. The frequently used information is maintained in different clusters such that it can be accessed quickly without involving much searching time. Clustering methods are one of the key steps that lead to the transformation of data to knowledge. Clustering algorithms aims at partitioning an initial set of objects into disjoint groups (clusters) such that objects in the same subset are more similar to each other than objects in different groups. In this paper we present a generalization of the k-Windows clustering algorithm in metric spaces by following a selective Repeat ARQ protocol having fixed window size for accurate information transmission. The original algorithm was designed to work on data with numerical values. The proposed generalization does not assume anything about the nature of the data, but only considers the distance function over the data set. The efficiency of the proposed approach is demonstrated on msnbc data sets. Genetic algorithm approach is used to detect and predict high-impact events in different areas such as automotive manufacturing, networking for data transmission, etc. While the high-impact events occurs infrequently, they are quite costly, means they have high-impact on the system key performance indicator. This approach is based on mining these types of events and its impact on the total process execution. The classified data are clustered for future implementation which have similar feature. Due to the clustering concept the clustered data can be used for various applications, which makes it robust. The parameters are optimized for best solution. This approach is tested on high impact events that occurs in networking, during transmission and it was found to be robust, highly accurate and with less probability of fault, for prediction of future occurrences of such events.

RECENT SCHOLAR PUBLICATIONS

  • Image encryption using RSA algorithm
    A Sahoo, P Mohanty, PC Sethi
    Intelligent Systems: Proceedings of ICMIB 2021, 641-652 2022

  • Group security using ECC
    PC Sethi, N Sahu, PK Behera
    International Journal of Information Technology 14 (2), 955-963 2022

  • Dynamic Network Traffic Management for Secure and Faster Data Transmission
    PC Sethi, PK Behera
    International Conference on Computational Intelligence and Sustainable 2022

  • Anomaly detection and optimization using scalable and flexible network data characterization
    PC Sethi, PK Behera
    Global Transitions Proceedings 2 (1), 67-72 2021

  • Digital Democracy–IT for Change: 53rd Annual Convention of the Computer Society of India, CSI 2020, Bhubaneswar, India, January 16–18, 2020, Revised Selected Papers
    PK Behera, PC Sethi
    Springer Nature 2021

  • Effective online teaching learning during COVID-19 pandemic
    PC Sethi, PK Behera
    Journal of Physics: Conference Series 1797 (1), 012068 2021

  • Network traffic management using dynamic bandwidth on demand
    PC Sethi, PK Behera
    International Journal of Computer Science and Information Security (IJCSIS 2017

  • RSA cryptography algorithm using linear congruence class
    PC Sethi, PK Behera
    Int J Adv Res 4 (5), 1335-1347 2016

  • Bioinformatics: Applications and Issues
    PC Sethi, PK Behera
    CSI Commun 40, 24-25 2016

  • Internet Traffic Classification for Faster and Secured Network Service
    PC Sethi, PK Behera
    International Journal of Computer Applications 131 (4), 15-20 2015

  • Methods of Network Security and Improving the Quality of Service – A Survey
    PCS P.K. Behera
    International Journal of Advanced Research in Computer Science and Software 2015

  • Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm
    PC Sethi, PK Behera
    2014 International Conference on High Performance Computing and Applications 2014

  • Secure packet inspection using hierarchical pattern matching implemented using incremental clustering algorithm
    PC Sethi, PK Behera
    December-22-24, ICHPCA-2014 (IEEE International Conference) 9 2014

  • An Efficient Dynamic Bandwidth Allocation Algorithm for improving the Quality of Service of Networks
    PCS Dr. PK Behera
    European Journal of Academic Essays 1 (Special Issue (1)), 31-35 2014

  • UPnP and Secure Group communication Technique for Zero-configuration Environment construction using Incremental Clustering
    PC SETHI
    IJERT 2 (12), 2095-2101 2013

  • High impact event processing using incremetal clustering in unsupervised feature space through genetic algorithm by selective repeat ARQ protocol
    PC Sethi, C Dash
    2011 2nd International Conference on Computer and Communication Technology 2011

MOST CITED SCHOLAR PUBLICATIONS

  • Network traffic management using dynamic bandwidth on demand
    PC Sethi, PK Behera
    International Journal of Computer Science and Information Security (IJCSIS 2017
    Citations: 14

  • Image encryption using RSA algorithm
    A Sahoo, P Mohanty, PC Sethi
    Intelligent Systems: Proceedings of ICMIB 2021, 641-652 2022
    Citations: 12

  • Group security using ECC
    PC Sethi, N Sahu, PK Behera
    International Journal of Information Technology 14 (2), 955-963 2022
    Citations: 10

  • Effective online teaching learning during COVID-19 pandemic
    PC Sethi, PK Behera
    Journal of Physics: Conference Series 1797 (1), 012068 2021
    Citations: 7

  • Methods of Network Security and Improving the Quality of Service – A Survey
    PCS P.K. Behera
    International Journal of Advanced Research in Computer Science and Software 2015
    Citations: 7

  • Secure packet inspection using hierarchical pattern matching implemented using incremental clustering algorithm
    PC Sethi, PK Behera
    December-22-24, ICHPCA-2014 (IEEE International Conference) 9 2014
    Citations: 7

  • RSA cryptography algorithm using linear congruence class
    PC Sethi, PK Behera
    Int J Adv Res 4 (5), 1335-1347 2016
    Citations: 6

  • UPnP and Secure Group communication Technique for Zero-configuration Environment construction using Incremental Clustering
    PC SETHI
    IJERT 2 (12), 2095-2101 2013
    Citations: 6

  • Internet Traffic Classification for Faster and Secured Network Service
    PC Sethi, PK Behera
    International Journal of Computer Applications 131 (4), 15-20 2015
    Citations: 5

  • High impact event processing using incremetal clustering in unsupervised feature space through genetic algorithm by selective repeat ARQ protocol
    PC Sethi, C Dash
    2011 2nd International Conference on Computer and Communication Technology 2011
    Citations: 5

  • Anomaly detection and optimization using scalable and flexible network data characterization
    PC Sethi, PK Behera
    Global Transitions Proceedings 2 (1), 67-72 2021
    Citations: 3

  • Bioinformatics: Applications and Issues
    PC Sethi, PK Behera
    CSI Commun 40, 24-25 2016
    Citations: 3

  • Secured packet inspection with hierarchical pattern matching implemented using incremental clustering algorithm
    PC Sethi, PK Behera
    2014 International Conference on High Performance Computing and Applications 2014
    Citations: 2

  • An Efficient Dynamic Bandwidth Allocation Algorithm for improving the Quality of Service of Networks
    PCS Dr. PK Behera
    European Journal of Academic Essays 1 (Special Issue (1)), 31-35 2014
    Citations: 2

  • Dynamic Network Traffic Management for Secure and Faster Data Transmission
    PC Sethi, PK Behera
    International Conference on Computational Intelligence and Sustainable 2022
    Citations: 1