Punam Bedi

Punam Bedi
University of Delhi | DU · Department of Computer Science

Ph.D.

About

277
Publications
76,368
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,088
Citations
Citations since 2017
76 Research Items
1960 Citations
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
20172018201920202021202220230100200300400
Introduction
Punam Bedi is a Senior Professor in the Department of Computer Science, University of Delhi since July 2018. She was the Head of Department of Computer Science, University of Delhi during Oct. 2005 - Oct 2008. Before joining the Department of Computer Science, University of Delhi in January 2002, she worked as a Lecturer/ Reader in the Deshbandhu College, University of Delhi from January 1987. She is mainly working in the area of designing and developing intelligent systems. She is using multi
Additional affiliations
March 2007 - present
University of Delhi
Position
  • Professor

Publications

Publications (277)
Article
Electronic health records (EHR) contain patients’ health information in varied formats such as clinical reports written in natural language, X-rays, MRI, case/discharge-summary, etc. One of its essential constituents is clinical narratives which contain significant clinical findings of a patient. Since the clinical narratives are stored in natural...
Chapter
Stegomalware uses Information hiding techniques within Network protocols to leak out sensitive data and/or to exchange hidden commands between secretly communicating parties. Internet Protocol version 6 (IPv6) is a network layer protocol that is rapidly replacing Internet Protocol version 4 (IPv4). This has resulted in an increase in the availabili...
Chapter
Unlike conventional Recommender Systems (RS) techniques where items are recommended to users, in Reciprocal Recommender Systems users become the items that are recommended to other users. Hence the generated recommendations should be accepted by both the service user (receiver of the recommendation) and the recommended user. In this paper, we propo...
Article
Full-text available
Recommender Systems (RS) provide an effective way to deal with the problem of information overload by suggesting relevant items to users that the users may prefer. However, many online social platforms such as online dating and online recruitment recommend users to each other where both the users have preferences that should be considered for gener...
Chapter
Twitter is one of the topmost microblogging social media networks that bridge the gap between users in various communities across the globe. People worldwide have taken to Twitter to express their opinions and general emotions regarding current issues and events in the past. These emotions and opinions have been extensively analyzed in various stud...
Article
A robust collaborative system of active products (a product is called active when its ownership does not get transferred from provider to requestor at the time of its usage) should have an in-built mechanism which can make entities (service provider(s) and requestor(s)) to decide with whom to collaborate. In the absence of such a mechanism, the sys...
Article
With the increase in digital communication, images have become indispensable media for carrying obscured communication these days. Unraveling the presence or details of obscured transmission also known as steganography is termed as steganalysis. Passive steganalysis focuses only on classification of object as clean or adulterated. Finding the lengt...
Chapter
Session based Recommender systems consider change in preferences by focusing on user’s short term interests that may change over a period of time. This paper proposes FS-CNN-LSTM-SR, a hybrid technique that uses CNN (Convolutional Neural Networks) and LSTM (Long Short Term Memory) deep learning techniques with fuzzy time series to recommend product...
Chapter
Timely and holistic recommendations in disease diagnosis process may prove a great assistance to a medical practitioner. However, the amount of structured or unstructured data generated in medicinal domain are voluminous and thus imposes challenges. In order to make machines understand the data semantically and infer useful insights from patient’s...
Article
Full-text available
Increased usage of the Internet has risen the demand for more IP addresses across the globe resulting in replacement of IPv4 by IPv6 protocol. Hence, security of IPv6 has become a vital area of research. One of the serious threats to Internet security is the presence of Network Covert Channels (NCCs) that provide substantial aid for performing cove...
Article
In recent times, Network-based Intrusion Detection Systems (NIDSs) have become very popular for detecting intrusions in computer networks. Existing NIDSs can easily identify those intrusions that have been frequently witnessed in the network (majority attacks), but they cannot identify new and infrequent intrusions (minority attacks) accurately. Mo...
Article
Full-text available
Goal driven Requirements Analysis captures the stakeholder's expectations thoroughly and analyzes the requirements in a more comprehensive manner. The goal driven approaches have been popular in the last decade and hence incorporating them in web requirements engineering becomes crucial. Web applications have specific functional and non-functional...
Article
Full-text available
Plants are susceptive to various diseases in their growing phases. Early detection of diseases in plants is one of the most challenging problems in agriculture. If the diseases are not identified in the early stages, then they may adversely affect the total yield, resulting in a decrease in the farmers' profits. To overcome this problem, many resea...
Article
Full-text available
Since the beginning of COVID-19 (corona virus disease 2019), the Indian government implemented several policies and restrictions to curtail its spread. The timely decisions taken by the government helped in decelerating the spread of COVID-19 to a large extent. Despite these decisions, the pandemic continues to spread. Future predictions about the...
Article
Recommender System (RS) is an information filtering approach that helps the overburdened user with information in his decision making process and suggests items which might be interesting to him. While presenting recommendation to the user, accuracy of the presented list is always a concern for the researchers. However, in recent years, the focus h...
Article
Full-text available
Camouflaged communication using a media is known as Steganography. It is different than encryption as the presence of message is also concealed in case of steganography. The message however can be encrypted before hiding in a media. Detection of concealed exchange being carried out or unraveling the details of such transmission is known as Steganal...
Article
Network-based Intrusion Detection Systems (NIDSs) are deployed in computer networks to identify intrusions. NIDSs analyse network traffic to detect malicious content generated from different types of cyber-attacks. Though NIDSs can classify frequent attacks correctly, their performance declines on infrequent network intrusions. This paper proposes...
Article
Full-text available
A recommender system (RS) provides assistance for users to filter out items of their interest in the presence of millions of available items. The reason is to find out the likewise user with the assumption that if users have shared similar interest in the past then they may share the same in future. Collaborative filtering (CF) is the widely used r...
Chapter
Food is one of the basic needs of human life. The demand for food is in-creasing due to an exponential increase in the world’s population. To overcomesuch a massive demand for food, agricultural practitioners suggested the use of dif-ferent insecticides and pesticides to increase the yield of the crops. The use of theseinsecticides and pesticides i...
Article
Full-text available
Network-based Intrusion Detection Systems (NIDSs) identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for th...
Chapter
Health care is an important aspect of human life in which medical data plays an important role. The medical data present in pathology reports, diagnosis, prescription, and clinical articles however is normally available in an unstructured textual format. Such data can be processed using Clinical Natural Language Processing (NLP) to unearth the impo...
Preprint
Full-text available
The novel Coronavirus (COVID-19) has claimed the lives of almost a million people across the globe and this trend continues to rise rapidly day by day. The fear of getting infected by Corona virus is affecting the people emotionally, psychologically and mentally. They are not able to work to their full capacity and are also worried about the well b...
Chapter
With the advent of technology, data security over the networks has become a crucial responsibility of organizations these days. One of the techniques to secure data over the networks is through information hiding. The art of hiding data in media files to make it secure from interception is termed as Steganography. Image, Audio, Video, Document, Net...
Preprint
Vehicular Ad-hoc NETworks (VANETs) are developing at a very fast pace to enable smart transportation in urban cities, by designing some mechanisms for decreasing travel time for commuters by reducing congestion. Inefficient Traffic signals and routing mechanisms are the major factors that contribute to the increase of road congestion. For smoother...
Preprint
NIDSs identify malicious activities by analyzing network traffic. NIDSs are trained with the samples of benign and intrusive network traffic. Training samples belong to either majority or minority classes depending upon the number of available instances. Majority classes consist of abundant samples for the normal traffic as well as for recurrent in...
Preprint
Full-text available
The last leg of the year 2019 gave rise to a virus named COVID-19 (Corona Virus Disease 2019). Since the beginning of this infection in India, the government implemented several policies and restrictions to curtail its spread among the population. As the time passed, these restrictions were relaxed and people were advised to follow precautionary me...
Chapter
Covered communication is termed as steganography. And unveiling details about this camouflaged communication is steganalysis. In the current era, steganalysis helps forensics examiners to analyze and detect malicious communication. Feature extraction, training phase and testing phase are three steps used by traditional machine learning algorithms f...
Chapter
Full-text available
With an exponential growth in the number of vehicles plying on roads in metropolitan cities, there is an urgent need of means for controlling the traffic congestion. This congestion results in increase of travel cost, travel time and pollution that have a substantial impact on both the health of people and the economy of the nation. For the reducti...
Chapter
Full-text available
The present age of the Internet has brought people closer to each other and the world around them. Today, people have access to different forms of information that is made available by the World Wide Web (or simply the Web). The contents of the Web are crawled and indexed by search engines so that they can be displayed as a result of users’ search...
Article
Full-text available
Education plays a vital role in human life. To encourage higher education, the Indian government has taken many initiatives. These include the disbursement of scholarships to financially help the students belonging to low-income families. Central Sector Scheme of Scholarship for College and University Students (CSS) is one such scheme that financia...
Article
Full-text available
Steganography is a technique of hiding secret data inside a cover. The most popularly used cover media include images, videos, audios, documents and network protocols. Network Steganography is a technique that uses common network protocols (the header field, the payload field or both) to hide a secret message. TCP/IP protocol suite has been a poten...
Article
Full-text available
To tackle new and complex attacks, modern Intrusion Detection Systems (IDSs) are developed using Deep Learning (DL) techniques and are trained on intrusion detection datasets such as KDD and NSL-KDD. These two datasets have a large number of samples in Denial of Service and Probe attack classes besides the Normal class, but the number of samples in...
Conference Paper
To tackle new and complex attacks, modern Intrusion Detection Systems (IDSs) are developed using Deep Learning (DL) techniques and are trained on intrusion detection datasets such as KDD and NSL-KDD. These two datasets have a large number of samples in Denial of Service and Probe attack classes besides the Normal class, but the number of samples in...
Chapter
Nowadays, we receive, send and click a number of images frequently. Multimedia messages especially images can be easily transferred to anyone in no time and no cost just like text messages. There are many software easily available that can modify an image. With such a wide usage of images in communication networks it becomes difficult to conclude i...
Chapter
Full-text available
Increased capability and complexity of present-day networks is a product of advancements in technology which has strengthened inter-human connectivity like never before. But technological advancements empower both the developer as well as the attacker. As a result, the severity of network-based attacks have also escalated immensely. The need of the...
Chapter
Sentiment Analysis also termed as opinion mining is a classification process which is used to determine the polarity associated with user reviews in the form of text or images or speech. Due to the rapid growth in usage of social media such as forums, social networks, micro blogs etc., the need for sentiment analysis has simultaneously increased. S...
Article
Full-text available
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper aims to provide the parameter tuning in the existing Modified...
Article
Full-text available
With the enormous growth in the volume of online data users are flooded with a gigantic amount of information. This has made the task of Recommender systems (RSs) even more engrossing. The research in RSs has been revolving around newer concepts like social factors, context of the user and the groups they belong to. This paper presents the design a...
Article
Full-text available
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper aims to provide the parameter tuning in the existing Modified...
Conference Paper
Full-text available
With an exponential growth in the number of vehicles plying on roads in metropolitan cities, there is an urgent need of means for controlling the traffic congestion. This congestion leads to increase in travel time, travel cost and pollution that have a significant impact on both the health of people and the economy of the nation. For the reduction...
Article
Full-text available
At early requirements analysis, resolving conflicts and evaluating design alternatives saves time and effort in the forthcoming phases. Goal oriented approaches are preferred over other requirements engineering approaches for their capability to reason about the requirements and evaluate different solutions. We have enhanced and customized the goal...
Conference Paper
Full-text available
With the tremendous growth of the automobile industry, there is an urgent need of means for controlling the traffic congestion. Due to this congestion, there is an increase in total travel time along with the increase in both travel cost and pollution that have a remarkable impact on both economy of the nation and health of the people. For the redu...
Chapter
Recommender systems are widely used intelligent applications which assist users in a decision-making process to select one product from a huge set of alternative products or services. Recent research focus has been on developing methods for generating recommendations. We note lack of coherent research in the field of visual depictions of recommenda...
Chapter
Over the years many techniques have been used by the decision makers to test their theories in a near real world simulated situation. Military war games are one such platform where these theories can be tested and the outcome is recorded. War gaming has evolved from its starting as a board game to now widely played as a computer game. This paper fo...
Conference Paper
Full-text available
Collaborative filtering technique is widely adopted by researchers to generate quality recommendations. Constant efforts are being made by the researchers to generate quality recommendations thus satisfying and retaining the user. This work is an effort to generate quality recommendations by proposing a collaborative filtering approach. The propose...
Article
Full-text available
Nowadays, with the invention of CUDA, a parallel computing platform and programming model, there is a dramatic increase in computing performance by harnessing the power of the GPU. GPU computing with CUDA can be utilised to find efficient solutions for many real world complex problems. One such problem is traffic signal control problem, which takes...
Article
User profile modelling for the domain of tourism is different compared with most of the other domains, such as books or movies. The structure of a tourist product is more complex than a movie or a book. Moreover, the frequency of activities and ratings in tourism domain is also smaller than the other domains. To address these challenges, this study...
Article
Full-text available
p class="p1">In the war, military conflicts have many aspects that are consistent with complexity theory e.g., the higher commander’s decision is directed at animate entity that react under hierarchical and self-organised structure in decentralised command and control for the collectivist dynamism of decomposed elements due to nonlinear complexity...
Article
Full-text available
With the increase in traffic volume day by day, cities are facing the problem of extreme congestion in most of the developing countries. The congestion on the road leads to increase in travel time and travel cost as well as having a significant impact on the health of people. This paper proposes a novel Improved Hybrid Ant Particle Optimization (IH...
Conference Paper
Full-text available
Developed cities are facing a serious problem of traffic congestion that leads to the wastage of both fuel and time of the commuters. To alleviate this problem, a preemptive HAPO (HAPO-P) algorithm has been presented in the literature to reduce the trip time by combining HAPO algorithm with preemptive traffic control. The HAPO-P algorithm is able t...
Article
Full-text available
Vehicular Ad-hoc NETworks (VANETs) are extremely flexible and dynamic ad-hoc networks that are used to provide smooth, safe and comfortable journey to commuters. The commuters spend significant time of their journey either for their turn to cross the intersections or in the congestion on the path. For reducing the total travel time, it is essential...
Chapter
The process of steganalysis involves feature extraction and classification based on feature sets. The high dimension of feature sets used for steganalysis makes classification a complex and time-consuming process, thus it becomes important to find an optimal subset of features while retaining high classification accuracy. This paper proposes a nove...
Article
Full-text available
Improper functioning of traffic signals at the intersections result in extreme congestion leading to increase in overall journey time and wastage of precious fuel. Various algorithms have been proposed in literature for alleviating the problem of congestion. Fixed-time, non-preemptive and preemptive approaches work towards reduction of queue length...
Article
Full-text available
Asymmetric information is a major problem in e-commerce transactions as it gives rise to adverse selection and moral hazard problems. Reputation mechanisms provide a solution to this problem by discouraging fraudulent behavior and encouraging honest behavior of participants in the uncertain and un-trusted environment of e-market. This paper discuss...
Article
Full-text available
The development in the field of Intelligent Transportation System (ITS) is growing exponentially with the advancement of Vehicular Ad-hoc NETworks (VANETs). Vehicular networks have gained notable attention among the researchers from both industry and academia due to major research going in the era of smart cities. There exist many standards for wir...
Article
Full-text available
The expansion of the web and emergence of a large number of social networking sites (SNS) have empowered users to easily interconnect on a shared platform. A social network can be represented by a graph consisting of a set of nodes and edges connecting these nodes. The nodes represent the individuals/entities, and the edges correspond to the intera...
Article
Agent-mediated reputation systems provide the necessary decision making support to facilitate the automation of processes, and to improve the quality of services in an information asymmetric e-market. Reputation systems encourage honest behavior and discourage malicious behavior of buyer and seller agents by safeguarding honest participants and by...
Article
Full-text available
Over the past few years, with the advent of Compute Unified Device Architecture (CUDA), Graphics Processing Units (GPUs) have evolved into highly parallel programmable architecture and provide the solution to many real-world applications. In this paper, we deal with a GPU implementation of Modified Ant Colony Optimization (MACO) algorithm that redu...