Anuja Arora

Anuja Arora
Jaypee Institute of Information Technology | JIIT · Department of Computer Science & IT

Doctor of Engineering

About

89
Publications
26,200
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
935
Citations

Publications

Publications (89)
Article
In the present scenario, Automatic Text Summarization (ATS) is in great demand to address the ever-growing volume of text data available online to discover relevant information faster. In this research, the ATS methodology is proposed for the Hindi language using Real Coded Genetic Algorithm (RCGA) over the health corpus, available in the Kaggle da...
Chapter
Spam on the online social networks (OSNs) is evolving as a prominent problem for the users of these networks. Spammers often use certain techniques to deceive the OSN users for their own benefit. Facebook, one of the leading OSNs, is experiencing such crucial problems at an alarming rate. This chapter presents a methodology to segregate spam from l...
Article
This paper describes Named Entity Recognition (NER) system for Hindi language using two methodologies. An existing BaseLine Maximum Entropy-based Named Entity (BL-MENE) model and Context Pattern-based MENE (CP-MENE) framework the one proposed in this work. BL-MENE utilizes several features for the NER task but suffers from inaccurate Named Entity (...
Article
Full-text available
In the contemporary world, utilization of digital content has risen exponentially. For example, newspaper and web articles, status updates, advertisements etc. have become an integral part of our daily routine. Thus, there is a need to build an automated system to summarize such large documents of text in order to save time and effort. Although, th...
Article
Nowadays, the increased interest of users towards healthier lifestyle has motivated to develop virtual personal trainer application using Android as platform. Despite availability of numerous fitness apps and gyms, everyone needs proper training at their ease and wishes to monitor calories burnt. Thus, this paper proposes novel idea of virtual pers...
Article
Particle swarm optimization (PSO) algorithm is proposed to deal with text summarization for the Punjabi language. PSO is based on intelligence that predicts among a given set of solutions which is the best solution. The search is carried out by extremely high-speed particles. It updates particle position and velocity at the end of iteration so that...
Article
Social media is used as a dominant source of news distribution among users. The world’s preeminent decisions such as politics are acclaimed by social media to influence users for enclosing users’ decisions in their favor. However, the adoption of social media is much needed for awareness but the authenticity of content is an unknown factor in the c...
Article
Purpose The purpose of this study/paper is to propose a mathematical model that is able to predict the future popularity based on the view count of a particular YouTube video. Since the emergence of video-sharing sites from early 2005, YouTube has been pioneering in its performance and holds the largest share of internet traffic. YouTube plays a si...
Chapter
The City Grievance Management system is all about collecting complaints from citizen and presenting it to the authorities responsible for decision making. Grievances/complaints have to be visualized in an explanatory manner to understand it in an effective manner. Visualization plays a big role in any dashboard and also to know insights of content...
Article
Social media is one of the major outcomes of progressive changes in the world of technology. The various social webs and mobile technologies have accelerated the rate at which information sharing is done, how relationships developed, and influences are held. Social media is increasingly being used by t...
Chapter
Full-text available
Named Entity Recognition (NER) is a process of identification and classification of names into pre-defined categories- person, location, organization, date, time and others. NER serves as one of the most valuable application tools for varying languages and domains. Despite its popularity and successful deployment in English, this area is still expl...
Chapter
Intelligent and instinctive legal document subsection information retrieval system is much needed for the appropriate jurisprudential system. To satisfy the law stakeholders’ need, the system should be able to deal with the semantics of law domain content. In this chapter, a sophisticated legal Question-Answer (QA) system is developed specifically...
Chapter
Twitter is a microblogging service allowing users to post up to 280 characters at a time describing their thoughts. Twitter currently receives about 500 million tweets a day, in which people share their comments regarding a wide range of topics. In the process of creating social network profiles, users reveal a lot about themselves in what they sha...
Preprint
Understanding a visual scene incorporates objects, relationships, and context. Traditional methods working on an image mostly focus on object detection and fail to capture the relationship between the objects. Relationships can give rich semantic information about the objects in a scene. The context can be conducive to comprehending an image since...
Chapter
Understanding a visual scene incorporates objects, relationships, and context. Traditional methods working on an image mostly focus on object detection and fail to capture the relationship between the objects. Relationships can give rich semantic information about the objects in a scene. The context can be conducive in comprehending an image since...
Article
Social media has leveraged many brands and companies started interaction with customers through it. As the upsurge of brand popularity and their social growth on social media channels, the role to analyze and investigate the competitor's behaviours on social media becomes a crucial part. By utilizing these behaviours a brand can investigate and opt...
Conference Paper
Chatbots are designed to change the way system and users interact. As the IT-support system interaction behaves like developer asks a query regarding a project from system, then system searches and results the best suitable answer. Chatbots usually roam around two components of a conversational system—intent and entity. In order to build a generic...
Conference Paper
Full-text available
E-Commerce applications provide an added advantage to customer to buy product with added suggestions in the form of reviews. Obviously, reviews are useful and impactful for customers those are going to a buy product. But these enormous amount of reviews create problem also for customers as they are not able to segregate useful ones. Therefore, ther...
Article
Full-text available
The need to accurately predict and make right decisions regarding crude oil price motivates the proposition of an alternative algorithmic method based on real-valued negative selection with variable-sized detectors (V-Detectors), by incorporating with fuzzy-rough set feature selection (FRFS) for predicting the most appropriate choices. The objectiv...
Article
Influence maximization is the main source of virality of any social media post/marketing activity. In recent trends, influence maximization has moved towards analytic approach instead of just being a suggestive metaphor for various social media paradigm. In this article, ego-centric approach and a bio-inspired algorithm is applied on social coding...
Article
With the expansion of information on the web, recommendation systems have become one of the most powerful resources to ease the task of users. Traditional recommendation systems (RS) suggest items based only on feedback submitted by users in form of ratings. These RS are not competent to deal with definite user preferences due to emerging and situa...
Article
Cooking is an art and every time whenever someone steps in kitchen, thought comes in one’s mind is to cook recipe according to ingredient availability. This diverted our attention also and soon it became apparent that a reliable system is required for preparatory descriptive analysis of the ingredient-recipe preparation study. Recipe preparations a...
Article
Full-text available
Apple trees are perhaps one of the most popular plants to grow in large plantations and in-home gardens. At the same time, Apple plants are among the plants that are the most prone to diseases. Disease identification at an early stage and its prevention before spreading into other parts of the plant is a challenge even for the expert’s eye. Therefo...
Article
Today, our virtual and real worlds are indistinguishably intertwined. In the era of smart interaction, each and everyone prefers immediate connect through internet as a virtual medium even though they are located at same place. YouTube is a well known and most vibrant site to share or upload any type of videos (personal, professional, educational,...
Chapter
Full-text available
The conventional approach to build a chatbot system uses the sequence of complex algorithms and productivity of these systems depends on order and coherence of algorithms. This research work introduces and showcases a deep learning-based conversation system approach. The proposed approach is an intelligent conversation model approach which conceptu...
Article
Background: The real strengths of AJAX technology are that AJAX web application is fit for the heterogeneous and autonomous environment. On the other hand, AJAX poses new challenges and difficulties for web application maintenance, evolution, and testing. Therefore, the prime aim of this research work is to present a testing environment for an AJAX...
Article
Due to the growing need of smart-health applications in Hindi language, there is a rapid demand for health-related Named Entity Recognition (NER) system for Hindi. For the purpose of the same, this research considers Twitter social network to extract tweets dated 1st October 2016 to 15th October 2017 from Patanjali, Dabur and other Hindi language-o...
Article
Named Entity Recognition (NER) is defined as an identification and classification of Named Entities (NEs) in a given text. Now-a-days, language and domain-specific NER systems are in progress, therefore Ontology-based Hindi language NER methodology for health domain (OntoHindi NER) is proposed in this paper. Hindi Health Data (HHD) is crawled from...
Article
Named Entity Recognition (NER) is defined as identification and classification of Named Entities (NEs) into set of well-defined categories. Many rule-based, machine learning based, and hybrid approaches have been devised to deal with NER, particularly, for the English language. However, in case of Hindi language several perplexing challenges occur...
Chapter
Full-text available
Today’s social media comprises of various platforms like Facebook, Twitter, YouTube, Google+, Snapchat; taking networking to a very different level. Amongst these YouTube has specifically gained significant attention and has emerged as a lead runner in the race of online video sharing sites. Much has been talked about social media platform on measu...
Chapter
The enormous growth and dynamic nature of online social networks have emerged to new research directions that examine the social network analysis mechanisms. In this chapter, the authors have explored a novel technique of recommendation for social media and used well known social network analysis (SNA) mechanisms-link prediction. The initial impetu...
Chapter
Spam on the online social networks (OSNs) is evolving as a prominent problem for the users of these networks. Spammers often use certain techniques to deceive the OSN users for their own benefit. Facebook, one of the leading OSNs, is experiencing such crucial problems at an alarming rate. This chapter presents a methodology to segregate spam from l...
Article
All the viewers of an online video do not watch a video at the same time. Consequently, on the basis of the behavioral measure of an individual who is moderately watching the videos earlier than others, viewers have been classified into viewer categories. Viewers’ categorization is much needed and has to be developed as viewers can lend a hand in t...
Article
Full-text available
Recommendation systems have been well established to reduce the problem of information overload and have become one of the most valuable tools applicable to different domains like computer science, mathematics, psychology, etc. The initial interest to write this survey is composing a concise research paper on the key motivation behind the various e...
Chapter
Online E-commerce systems such as Amazon facilitate users to provide users’ reviews and ratings for products through their daily interaction. The analysis of this social e-commerce giant Amazon shows the presence of a large amount of users’ feedback through reviews and its associated features for the published items/products. In this research work,...
Article
Full-text available
Online marketing is one of the best practices used to establish a brand and to increase its popularity. Advertisements are used in a better way to showcase the company’s product/service and give rise to a worthy online marketing strategy. Posting an advertisement on utilitarian web pages helps to maximize brand reach and get a better feedback. Now-...
Article
Source code plagiarism is becoming a common practice among higher education community. People duplicate and modify the source code of other people and show the program as their own program. In this paper, we want to draw researchers’ attention towards this problem and projected a novel approach which detects plagiarism in C language code by convert...
Article
Recommendation Systems have gained huge importance in recent years as they proffer most admissible choices explored out of large data sets and are analogous to the user’s interests. But the notion of context – that describes the user, item or how users interact with the recommendation system has become one of the most significant factors that has i...
Article
In today’s digital world, wherein user personalized content such as text, video, photos and much more have become an integral part of people’s daily lives; photo intensive social media applications have acquired enhanced adoption in social media users through Instagram. By the time, Instagram- a photo sharing site continues to evolve and grow in po...
Article
A number of postings for different job roles and job positions are posted at numerous sources in the recruitment industry. Therefore, this is a challenging and time-consuming task to collate the information and find out most relevant user-job connection mapping according to the skills and preferences of a user. This research work has been done to c...
Article
Technology does not drive us apart, it brings us closer. In today’s busy world, no one has the time to listen and discuss their daily problems, critical incidents and many more things which we usually don’t try and are unable to share because of lack of time and many other situations. So through this app, we are trying to connect to the people and...
Conference Paper
DBLP (Digital Bibliography & Library Project) has the huge collection (around 3.4 million) of journal articles with its meta data, papers published in various national and international conferences, and other number of online publications in the field of computer science. Research data on DBLP increases enormously which arises many research problem...
Article
Full-text available
Context in the form of meta-data has been accredited as an important component in cross-domain collaborative filtering (CDCF). In this research paper CDCF concept is used to exploit event information (context) from two UI matrices to allow the recommendation performance of one domain (Facebook- User-Event Matrix) to benefit from the information fro...
Article
Full-text available
Web 2.0 provides us the opportunity for various interactive online social networks (OSNs) applications for data dissemination over internet. We can share data among various users by using its functionalities but it is not much secure. Currently in social network new scenarios are emerging that raise new security issues that goes beyond the existing...
Article
Full-text available
In today's Scenario, Remote Monitoring is a fascinating research aspect of mobile computing technology. In this research paper, our prime focus is on the Personal computer remote monitoring system. Another challenging task is the security while sharing data in remotely monitoring PC or handheld devices over Wi-Fi, 3G, and Bluetooth. An application...
Conference Paper
Full-text available
in this work we have implemented and discussed the performance evaluation of Least Significant Bit (LSB) and Least Significant Digit (LSD) on various formats of multimedia data. We have shown the performance variation on different formats for which these two techniques have been applied to hide the messages. Implementation of both the algorithms ha...
Conference Paper
Bug report contains a vital role during software development, However bug reports belongs to different categories such as performance, usability, security etc. This paper focuses on security bug and presents a bug mining system for the identification of security and non-security bugs using the term frequency-inverse document frequency (TF-IDF) weig...
Conference Paper
This paper presents a method for test cases generation from a state machine. This paper investigates variable chromosome length genetic algorithm for automatically generating state based test cases. For efficiency we developed a Genetic algorithm that optimize and select test case which are covering maximum number of states and transitions on disti...
Conference Paper
In web, users with different interest and goal enter queries to the search engine. Search engines provide all these users with the same search results irrespective of their context and interest. Therefore, the user has to browse through many results most of which are irrelevant to his goal. Personalization of search results involves understanding t...
Conference Paper
There is growing tendency of users to use web application in place of desktop application because of technological advancement such as AJAX. AJAX is used to build single page web application because content and structure can be changed using AJAX features like Asynchronous communication and run time DOM manipulation. To understand and analyze extre...
Article
A whole new generation WEB 2.0 is being written to take advantage of extreme dynamism as in AJAX. AJAX is used to build rich internet applications that are more interactive, responsive, and easy to use. With the advent of Ajax which involves extreme dynamism, novel problems add to those already known in the Web testing area. For Testing an AJAX app...
Conference Paper
This paper presents a proficient technique to test all static and dynamic analysis of chosen web application using state machine and variable chromosome length genetic algorithm. We propose a framework to generate user session based state machine model of dynamic behavior of a web application and the technique used to test the correctness of genera...
Conference Paper
Dynamic Content of a Web Application gives acclivity to whole set of new challenges in the field of web application testing. After canvassing several approaches on how to effectively test Dynamic Web Applications, We found that an effective way to counter the web application dynamic content testing exceptions is using the combined approaches of sta...
Article
This paper presents a diagnostic system for the detection of presence and absence of cardiac Arrhythmia from the Electrocardiogram (ECG) data using the methods of Feature Selection, Feature Extraction and Binary Classification Technique. A hybrid approach of three algorithms namely Rank Correlation, Principal Component Analysis (PCA) and Support Ve...
Conference Paper
Remote sensing image classification in recent years has been a proliferating area of global research for obtaining geo-spatial information from satellite data. In Biogeography Based Optimization (BBO), knowledge sharing between candidate problem solutions or habitats depends on the migration mechanisms of the ecosystem. In this paper an extension t...
Article
Full-text available
In this paper, the various features essential for a content management system are explored. This includes a comparison of various open source CMS, their features and a conclusion on improvements that will be made in order to alleviate problems. Our aim was to find out the best available open source CMS and implement it for our website. For this we...

Network

Cited By

Projects

Projects (11)
Project
Artificial Intelligence has a broad scope andinterdisciplinary area. A diverse and wide spectrum of AI offers greatpotential for society. Hence, societal issues related to the usage of ArtificialIntelligence can not be ignored any longer. The horizon of AI acts as ablessing to resolve various societal domain problems. The broader societalissues include agriculture, healthcare, e-governance, eCommerce, communitywelfare, entertainment, cultural, management, economics, energy efficiency,etc. AI helps society by providing a sustainable, secure, fair, and ethicalperspective. Such issues may overlap among each other in an intricate manner.From the technical aspect, societal issues entail a human-centered perspectivefor model designing. AI applications in the areas of social relevance aspire tobe fair, avoid ethnicity, and unaffected by bias.  AI models in general, are difficult to interpretbecause functional form related to input data, for a specified outcome, is fartoo complex. Only interpretable models are well-explained where decision-makingis conveyed to humans. AI is still under exploration stage in order to validateits performance on various untouched societal issues. Solving this untouched societal problem with the help of AI needs elucidation. The special session focuses on societal issues whichcan be resolved with the use of AI. RECOMMENDEDTOPICS:Topics to be discussed in this special session include (but are not limited to) thefollowing:  Knowledge Representation Machine Learning Deep Learning Agriculture Domain E-Commerce E-Governance Healthcare Systems Community Welfare Bioinformatics Language Models Natural Language Processing Human-Centric Interaction Social Network Analysis Recommendation System AI and Public Policies Financial Analysis Image Recognition Medical Diagnosis Cyber Threat SUBMISSIONPROCEDURE: Researchers and practitioners are invitedto submit papers for this special theme session on Societal Issues and Problems Solutions using ArtificialIntelligence on or before 1stOctober 2019.All submissions must be original and may not be under review by anotherpublication. INTERESTED AUTHORS SHOULD CONSULT THE CONFERENCE’S GUIDELINES FORMANUSCRIPT SUBMISSIONS at http://icicc-conf.com/paper_submission.html. All submittedpapers will be reviewed on a double-blind, peer review basis.  All the accepted papers are published by Springer AISCseries (ISI Proceedings, EI-Compendex, DBLP, SCOPUS, Google Scholar andSpringerlink)and extended selected papers will be published in the special issues of SCI/SCOPUS/WoS/DBLP/ACM indexed Journals. Submission Link: http://icicc-conf.com/paper_submission  NOTE: While submitting the paper in this special session,please specify Societal Issues and Problems Solutions using Artificial Intelligence at the top (above papertitle) of the first page of your paper.