About
26
Publications
6,696
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
414
Citations
Introduction
Skills and Expertise
Current institution
Additional affiliations
June 2000 - present
May 2000 - present
Publications
Publications (26)
Obesity is a global issue that harms everyone’s health, regardless of age or gender. An excessive or abnormal amount of body fat is referred to as obesity. People who are obese are more likely to contract certain illnesses. Obese people are more likely to suffer from diabetes, thyroid, heart disease, liver cancer, and stroke, among other significan...
Today we are living in an era where everything is changing to be smart, whether it be a smart home, smart industries, smart irrigation, or a smart meter, where the word smart refers to the involvement of the Internet of Things (IoT). The increased use of IoT infrastructure in these fields has led to the failure of the nodes, increase in threats, at...
In this paper, we define the outlier detection and its application areas. The most important field of outlier detection is network anomaly detection. This can be achieved by network intrusion system. There are several NIDSs are developed and practically implemented. We proposed a comparative analysis of different machine learning methods for networ...
We can always look upon the intersection of history and events as an exciting façade, full of deceptions, half-baked truths, and awkward reconciliations in the framework of cultural studies. The Mexican author Valeria Luiselli’s Tell Me How It Ends (2017) attempts to trace the evolution of a set of social, political, and cultural circumstances that...
Cyber security is becoming more sophisticated, and as a result, there is an increasing challenge to accurately detect intrusions. Lack of intrusion prevention can degrade the credibility of security services, namely data confidentiality, integrity and availability. Many intrusion detection methods have been suggested in the literature to address th...
Preterm birth (PTB) in a pregnant woman is the most serious issue in the field of Gynaecology and Obstetrics, especially in rural India. In recent years, various clinical prediction models for PTB have been developed to improve the accuracy of learning models. However, to the best of the authors’ knowledge, most of them suffer from selecting the mo...
COVID - 19 affected severely worldwide. The pandemic has caused many causalities in a very short span. The IoT-cloud-based healthcare model requirement is utmost in this situation to provide a better decision in the covid-19 pandemic. In this paper, an attempt has been made to perform predictive analytics regarding the disease using a machine learn...
In the era of digitalization of information, big data plays an important role in the field of healthcare industry. The reason is that it generates a huge amount of digital data due to the digitalization of healthcare system. This digital data can be compared with big data according to its characteristics and can be characterized as ‘healthcare big...
Over the past decade, data recorded (due to digitization) in healthcare sectors have continued to increase, intriguing the thought about big data in healthcare. There already exists plenty of information, ready for analysis. Researchers are always putting their best effort to find valuable insight from the healthcare big data for quality medical se...
As the world is leading towards having everything smart, like smart home, smart grid smart irrigation, there is the major concern of attack and anomaly detection in the Internet of Things (IoT) domain. There is an exponential increase in the use of IoT infrastructure in every field leads to an increase in threats and attacks too. There can be many...
In the big data domain, the traditional algorithms approach fails in the classification for the large data set as they are memory dependent and suitable for small and medium size data sets and our proposed model attempts to apply the existing classification for the large data set. The proposed model shows percentage of reduction of time for optimal...
Plagiarism means copy and paste for a text or change in some words or make use of synonymous or near synonymous words without citing the source. Plagiarism is on rise especially in the academic and research field due the availability of the digital text documents in the internet which can easily be copied and pasted. Existing approaches for detecti...
Twitter act as a most important medium of communication and information sharing. As tweets do not provide sufficient word occurrences i.e.of 140 characters limits, classification methods that use traditional approaches like“Bag-Of-Words” have limitations.The proposed system used an intuitive approach to determine the class labels with the set of fe...
In this paper, a novel idea is being presented
to perform Opinion Mining in a very simple and efficient
manner with the help of the One-Level-Tree (OLT) based
approach. To recognize opinions specific for features in
customer reviews having a variety of features
commingled with diverse emotions. Unlike some
previous ventures entirely using one...
Twitter has established itself as a platform for real-time information sharing over the last decade. As such, various marketing organizations seek to mine Twitter for information about what people think about their services and products. With 500 million tweets being generated in a day, data scientists have used tweet classification as a powerful o...
One of the key problems encountered while using a text classification learning algorithms is that they require huge amount of labelled examples to learn accurately. The objective of this paper is to propose a novel method of topic modelling and document-document semantic similarity algorithm (DDSSA), which reduces the need for larger training data....
The objective of this paper is to analyze web logs using data mining so as to present users with more personalized web content. We classify users based on their internet usage patterns and for each class, maintain a cache of web documents. Searching is performed based on term set analysis and direction cosine distance approach. Finally a more perso...
This paper proposes a method employing text mining techniques to analyze e-mails collected at various source. The method inputs the subject and the body of an email and decides a text class for the e-mail. Also, the method extracts key concepts from e-mails and presents their statistical information. The results of numerical experiments indicate th...
In many real world industrial situations, quality of a product is considered to be a composite of a family of properties or multiple responses, which can often be interacting or correlated with one another, and nearly always measured in a variety of units. Optimal combination of properties rarely results from individual optimal condition of each re...
This paper discusses primary design issues of an intelligentbrowser for novice users. This work focuses on the study ofintelligent interface agents which adapt to the user according tothe interactions between the user and the browser. We propose apersonal web browser which adapts to the user interface layoutand navigation. Adaptation of user interf...
Scheduling of diversified service requests in distributed computing is a critical design issue. Cloud is a type of parallel and distributed system consisting of a collection of interconnected and virtual computers. It is not only the clusters and grid but also it comprises of next generation data centers. The paper proposes an initial heuristic alg...