
Ajeet Ram PathakNorwegian University of Science and Technology | NTNU · Department of Computer and Information Science
Ajeet Ram Pathak
Ph.D. (Computer Science & Engineering)
About
26
Publications
15,244
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
930
Citations
Introduction
Machine learning and High Performance Computing
Skills and Expertise
Additional affiliations
September 2019 - March 2022
NDS Infoserve
Position
- Analyst
Description
- Data Scientist
July 2019 - August 2019
July 2013 - June 2019
Education
August 2016 - January 2020
June 2012 - June 2014
Publications
Publications (26)
Projected and subspace clustering aim to find groups of similar objects within a subspace of the full-dimensional space.
Where subspace clustering tries to identify clusters in all possible subspaces, projected clustering assigns each point to a single cluster within one projected subspace, resulting in a much smaller result set.
PROCLUS is an ad...
Due to the inception of Web 2.0 and freedom to facilitate the dissemination of information, sharing views, expressing opinions with regards to current world level events, services, products, etc. social media platforms have been mainly contributing to user-generated content. Such social media data consist of various themes discussed online and are...
Detecting and predicting trending topics from steaming social data has always been the point of active research area in business and research firms to take quick decisions, change marketing strategies and set new goals. Topic modelling is one of the excellent methods to analyse the contents from large collection of documents in an unsupervised mann...
The dawn of exascale computing and its convergence with big data analytics has greatly spurred research interests. The reasons are straightforward. Traditionally, high performance computing (HPC) systems have been used for scientific applications involving majority of compute-intensive tasks. At the same time, the proliferation of big data resulted...
The Wood Wide Web is an emerging research area for the analysis of various fields like networking, machine learning, data science, etc. In this research, the nature-inspired novel approach is proposed for clustering the documents based on communication between the groups of trees. The experimental result shows that the proposed Tree Communication C...
The uniqueness of an individual can be identified according to one’s behavior, qualities, skills, characteristics, social connectivity, knowledge which all resemble to a single term called, “Personality.” There are ‘n’ number of ways to identify personality of an individual like judging the face gesture, way of speaking or communication, dressing s...
Due to inception of Web 2.0 and increased dependency and freedom to share views, thoughts, opinions on social media, there is high rise in generation of digitized, opinionated social media data. Online forums, blogs, micro-blogging sites, shopping sites, etc. are inundated with mammoth data. This data from multiple domains needs to be extracted and...
Facial expressions are manifestations of nonverbal communication. Researchers have been largely dependent upon sentiment analysis relating to texts, to devise group of programs to foretell elections, evaluate economic indicators, etc. Nowadays, people who use social media platforms to share their experiences or express themselves, primarily make us...
The ubiquitous nature of social media platforms resulted into generation of large amount of multimedia data in social networks. The openness and unrestricted way to share the information on social media platforms fosters information spread across the network regardless of its credibility. Such kind of spreading the misinformation happens usually in...
With constant rise in data globally, making timely and accurate decisions based on this voluminous data is essential for corporates and industries. Data analytics and machine learning algorithms can help us perform classification and prediction on such data. Our system eliminates the need for multiple systems as it provides a generalized platform t...
Due to freedom to express views, opinions, news, etc and easier method to disseminate the information to large population worldwide, social media platforms are inundated with big streaming data characterized by both short text and long normal text. Getting the glimpse of ongoing events happening over social media is quintessential from the viewpoin...
The availability of computing resources and generation of large scale data emanating from Artificial Intelligence, Internet of Things and social media platforms have resulted into resurgence of deep learning technology. Deep learning architectures have been successfully adopted to solve the problems arising in variety of domains such as computer vi...
File security is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, or destruction of files stored on a database. Nowadays, security has become a very challenging issue, as the number of attacks on cyber security has increased which has affected the confidentiality, authentication, integrity, and...
Background
The large amount of data emanated from social media platforms need scalable topic modeling in order to get current trends and themes of events discussed on such platforms. Topic modeling play crucial role in many natural language processing applications like sentiment analysis, recommendation systems, event tracking, summarization, etc....
Big data have become an important asset due to its immense power hidden in analytics. Every organization is inundated with colossal amount of data generated with high speed, requiring high-performance resources for storage and processing, special skills and technologies to get value out of it. Sources of big data may be either internal or external...
Database Outsourcing is a nascent data management paradigm in which the data owner stores the confidential data at the third party service provider's site. The service provider is responsible for managing and administering the database and allows the data owner and clients to create, update, delete and access the database. There are chances of hamp...
Detecting the objects from images and videos has always been the point
of active research area for the applications of computer vision and artificial intel-
ligence namely robotics, self-driving cars, automated video surveillance, crowd
management, home automation and manufacturing industries, activity recognition
systems, medical imaging, and biom...
Due to overwhelming advancement in sensor networks and communi-
cation technology, Internet of Things is taking shape to help make our lives smarter.
Devices working on Internet of Things are responsible for generating multifarious
and mammoth data. In addition to this, academia, business firms, etc., add vast
amount of data to the pool of storage...
Detecting objects from images is a challenging problem in the domain of
computer vision and plays a very crucial role for wide range of real-time appli-
cations. The ever-increasing growth of deep learning due to availability of large
training data and powerful GPUs helped computer vision community to build
commercial products and services which we...
The ubiquitous and wide applications like scene understanding, video surveillance, robotics, and self-driving systems triggered vast research in the domain of computer vision in the most recent decade. Being the core of all these applications, visual recognition systems which encompasses image classification, localization and detection have achieve...
Due to advancement in cloud computing technology and significant growth in database technology, Database as a Service (DBaaS) has become the breakaway technology of the recent era. It is the paramount solution for managing and administering the outsourced databases. Though the users are availed through the database services, the security of databas...
As the technology is developing with a huge rate, the functionality of smartphone is also getting higher. But the smartphones have some resource constraints like processing power, battery capacity, limited bandwidth for connecting to the Internet, etc. Therefore, to improve the performance of smartphone in terms of processing power, battery and mem...
Due to advancement in the Cloud Computing
technology, Database as a Service (DBaaS) - a novel data
management and administration paradigm has gained the
worldwide popularity. The data owner outsources their
confidential data to the third party service provider’s site.
The service provider manages and administers the database
and avails the rea...