• Home
  • Rajiv Vasantrao Dharaskar
Rajiv Vasantrao Dharaskar

Rajiv Vasantrao Dharaskar
Director, IIIT Kottayam, Kerala, India Institute of National Importance

PhD (Computer Science & Engineering), M.Tech.(Computers),M.Phil.(Maths), M.Sc.(Maths), PGDip.Comp.

About

228
Publications
89,296
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
759
Citations

Publications

Publications (228)
Conference Paper
Full-text available
It is an investigation into integration of Natural language processing into the SQL. There are several artificial languages for manipulating the data in the database. But their usage needs knowledge about the database structure, language syntax etc. It is of very great use in application areas like e-governance, agriculture, rural health, education...
Article
Full-text available
Human activity recognition is an extensive area of a machine learning research because of its applications in healthcare, smart environments, homeland security, entertainment, etc. Study for human activity recognition observes that researchers are interested mostly in the daily activities of the human. Activity recognition using sensor data plays a...
Article
Full-text available
Human activity recognition is the most recently introduced and nowadays widely used term. Human activity recognition is a big research point. Many researchers had developed different architectural systems for this. In this paper a survey of frameworks designed to develop a human activity recognition technique is done. This paper makes survey of dif...
Article
Full-text available
Human activity recognition is intrinsic area of exploration just because of its real world's applications. The sensors included smart phones are used to recognize activity. Mobile phone provides small size, CPU, Memory and Battery. A detailed survey of Design classifier for human activity recognition systems by using soft computing techniques are d...
Chapter
Full-text available
Nowadays, all smartphones are equipped with powerful multiple built-in sensors. People are carrying these “sensors” nearly all the time from morning to night before sleep as they carry the smartphone all the time. These smartphone allow the data to be collected through built-in sensors, especially the accelerometer and gyroscope give us several obv...
Article
Full-text available
It is crucial in image forensics to prove the authenticity of the digital images. Due to the availability of the using sophisticated image editing software programs, anyone can manipulate the images easily. There are various types of digital image manipulation or tampering possible; like image compositing, splicing, copy-paste, etc. In this paper,...
Article
Full-text available
The issue of the authenticity and integrity of digital images is getting critical. Nowadays it became easy to create image forgeries. Digital image forensics plays a vital role in proving authenticity and integrity of digital images. There are various types of image forgeries possible, and Copy-Paste is one of it. In this type of forgery, a region...
Article
Full-text available
Copy-Move forgery is the most common image tampering method to create forged images. The images may be forged to conceal or change the meaning of the photographs. Hence, it becomes important to verify the integrity and authenticity of the images. The copy-move forgery detection can be classified under two heads viz., block based and keypoint based....
Conference Paper
Full-text available
Mobile Phone used not to be matter of luxury only, it has become a significant need for rapidly evolving fast track world. This paper proposes a spatial context recognition system in which certain types of human physical activities using accelerometer and gyroscope data generated by a mobile device focuses on reducing processing time. The benchmark...
Article
Full-text available
Users store vast amounts of sensitive data on a cloud. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services. However, secure data sharing is problematic. Security is one of the most difficult task to implement in cloud computing. Different forms of attacks i...
Article
Full-text available
The main challenge in cloud computing is load balancing to distribute the dynamic workload across the multiple nodes to ensure that no single node is inundated which helps in optimal utilization of resources and hence enhances the system performance. In enjoin to achieve utmost profits with optimized load balancing algorithms, it is essential to ut...
Conference Paper
Full-text available
Cloud balancing is still new, but the technology to add value is available today. The main objective is to develop an effective load balancing algorithm using task scheduling to maximize or minimize different performance parameters such as throughput, latency for the clouds of different sizes. This work has also been enhanced with divisible load ba...
Conference Paper
Full-text available
Days have gone when Mobile Phone used to be matter luxury, it has become a significant need for rapidly evolving fast track world. Intelligent aspects of the computing device enhance the importance of the interface development since; efficient collaboration always relies on the good communication between man and machine. The information about mobil...
Conference Paper
Full-text available
Nowadays, all smartphones are equipped with powerful multiple built-in sensors. People are carrying these "sensors" nearly all the time from morning to night before sleep as they carry the smartphone all the time. These smartphone allow the data to be collected through built-in sensors, especially the accelerometer and gyroscope give us several obv...
Conference Paper
Full-text available
Mobile Phone used not to be matter luxury only, it has become a significant need for rapidly evolving fast track world. In this paper, we evaluate the performance of a various machine learning classifiers on WISDM human activity recognition dataset which is available in public domain. We show that while keeping smartphone in pocket, it is very easy...
Article
Full-text available
In recent days significant interest is developed in gesture recognition domain because of need of different possible applications,that includes: search and rescue, hospital care, etc.This paper recognizes need of parameter optimization for gesture recognition. Various optimization techniques are discussed like Convex Optimization, Contextual Video-...
Conference Paper
Digital forensics is the overarching term for digital crime investigations concerning (among other aspects) digital data recorded on various computing devices and services as evidence for the purposes of analysis, event reconstruction, attribution, and eventual prosecution or exoneration of suspects. Vehicular adhoc networks have recently attracted...
Article
Full-text available
Human activity recognition is bringing much attention because of its applications in many areas like health care, adaptive interfaces and a smart environment. Today's smartphone is well equipped with advanced processor, more memory, powerful battery and built-in sensors. This provides an opportunity to open up new areas of data mining for activity...
Chapter
Full-text available
Mobile Phone used not to be matter of luxury only, it has become a significant need for rapidly evolving fast track world. This paper proposes a spatial context recognition system in which certain types of human physical activities using accelerometer and gyroscope data generated by a mobile device focuses on reducing processing time. The benchmark...
Conference Paper
It became very easy today to capture and create digital photographs. It's no more a costlier affair, as most of the handheld electronic gadgets such as mobile phones are equipped with digital cameras. Today, there are ample PC and mobile apps available which are developed to manipulate captured photographs. One can easily take a picture, manipulate...
Conference Paper
Full-text available
Online messaging provides a convenient and effective means of fast communication. Along with personal communication it is being used by organizations for official communication. Many organizations make use of online messaging for exchanging sensitive and secret information. Although online messaging is used for legitimate purpose, it can be misused...
Article
Many researchers are working to automate the process of reading, understanding and interpretation of handwritten character. In this paper, we present the new machine learning algorithm for Handwritten Devanagari (Marathi) characters recognition. Offline handwritten character recognition is an important area of Document Analysis and Recognition (DAR...
Article
Full-text available
Many researchers are working to automate the process of reading, understanding and interpretation of handwritten character. In this paper, we present the new machine learning algorithm for Handwritten Devanagari (Marathi) characters recognition. Offline handwritten character recognition is an important area of Document Analysis and Recognition (DAR...
Article
Full-text available
The context aware framework is the backbone of context aware application the framework. It is because the context has continuously been in the process of evolution. It is implemented depending on the requirements of situation. Many architectures or framework were proposed in order to support the development and to ease the implementation of context...
Article
Full-text available
Authorship Identification is subfield of authorship analysis deals with finding the plausible author of anonymous messages. The Authorship identification problem of online messages is challenging task because cyber predators make use of obscurity of Cyberspace and conceal the identity. By performing the forensic analysis of online messages, empiric...
Article
Full-text available
The large data sets of medical diseases are obtained due to recent technology advancement. These large data contain valuable information for diagnosing diseases. One of the major challenges in medical domain is the extraction of comprehensible knowledge from medical diagnosis data. A practical approach is proposed to help in the analysis of the lar...
Article
Full-text available
Compound character recognition of Devanagari Script (Marathi language) is one of the challenging tasks since the compound character is combination of one or more characters. These characters can be treated as fusion of two or more characters and hence these are complex in structure. Marathi, Hindi, Sanskrit and Nepali are written with Devanagari sc...
Article
Full-text available
This research work deals with the feature extraction and recognition of Modifiers in Marathi Text (Devanagari). Many researchers are working on the handwritten Marathi character recognition. As compare to English and other languages Marathi is little bit complex language. Marathi language contains 12 common vowels and 36 consonants. In addition to...
Article
Full-text available
Authorship Identification is being used for forensics analysis and humanities to identify the author of anonymous text used for communication. Authorship Identification can be achieved by selecting the textual features or writing style. Textual features are the important elements for Authorship Identification .It is therefore important to analyze t...
Article
Full-text available
Digital Forensics research field has gained the supreme importance recently due to increase in digital crimes. Many researchers are working on the various issues of digital forensics and they have developed many tools and techniques to deal with digital crimes. Digital forensics is the process of uncovering and interpreting electronic data for use...
Conference Paper
Full-text available
This paper presents a review of structural features for character recognition. Structural features are the features that are physically a part of the structure of the character, such as straight lines, arcs, circles, intersections etc. Selection of a feature extraction method is probably the single most important factor in achieving high recognitio...
Article
Full-text available
In this paper, we have introduced the concept of user modeling which simply means "Doing right thing at right place at right time". In this paper we discuss firstly about the history of modeling user and hierarchy of user model which will help in designing the user model for different context. Also give the comparison between the stereotype and fea...
Article
In this paper, we have introduced the concept of user modeling which simply means “Doing right thing at right place at right time”. In this paper we discuss firstly about the history of modeling user and hierarchy of user model which will help in designing the user model for different context. Also give the comparison between the stereotype and fea...
Article
Full-text available
The extraordinary development of mobile communications is a source of new security challenges. Today, mobile phones have become ubiquitous in nature involving their use in many daily activities, and sometimes those activities might be criminal in nature. The remarkable advancements in the technology and increase in computing power of these devices...
Conference Paper
Full-text available
Keyword: Statistical techniques, Feature Extraction, Handwritten character recognition. The content work in this paper is to describe the statistical techniques used for feature extraction for handwritten character recognition. Many researchers are working for recognition of handwritten characters. There are many script and languages in the world....
Article
Full-text available
In this paper, we have introduced the concept of user modeling which simply means "Doing right thing at right place at right time". In this paper we discuss firstly about the history of modeling user and hierarchy of user model which will help in designing the user model for different context. Also give the comparison between the stereotype and fea...
Article
Full-text available
Authorship Identification techniques are used to identify the most appropriate author from group of potential suspects of online messages and find evidences to support the conclusion. Cybercriminals make misuse of online communication for sending blackmail or a spam email and then attempt to hide their true identities to void detection.Authorship I...
Conference Paper
Technologies used in multimodal interfaces include conventional direct-manipulation devices like the keyboard, mouse, and pen and touch screen, as well as progressively more advanced recognition technologies such as speech recognition, 2D and 3D gesture recognition, and lip movement and gaze tracking. Usability studies, exploring and evaluating the...
Conference Paper
Full-text available
Market competition of the domestic mobile communications industry is increasingly fierce, with more emphasis on customer-centred perfect customer relationship management, the explosive growth of customer data needs the support of data mining technology. In this paper, consumptive behaviour based on data mining technology is discussed. Use of data m...
Article
With the rapidly increasing complexity of computer systems and various media devices and the insufficient attack analysis techniques there is need of improvement of computer forensics analysis techniques. Although many of forensics tools and techniques help in analysis process till forensics analysis process become difficult problem. Here we presen...
Article
Full-text available
Network forensics is the most significant technology to investigate different types of networking attack. Network forensics will help to capture, copy, transfer, analysis and investigation purpose. The most of the web application can easily attack by the hackers even when antivirus, firewall are exist in the system. This system used to identify dif...
Conference Paper
Full-text available
With a growing number of computer devices around us, and the increasing time we sped for interacting with such devices, we are strongly interested in finding new interaction methods which ease the use of computers or increasing interaction efficiency. Eye tracking seems to be a promising technology to achieve this goal. As the disable user cannot h...
Article
Full-text available
The term Usability refers to the making Systems easier to use to the user needs. The advent of mobile devices imposes great challenges for user-friendly displays for effective browsing for web contents. This paper reports usability and their principles, Adaptive mobile content, Adaptive mobile content in action, we discuss how to exploit solutions...
Article
Full-text available
The data clustering is a classical activity in data mining. In this paper we propose a method to carry out data clustering using Evolutionary algorithms. We use evolutionary characteristics to define the data clustering procedure. Evolutionary clustering technique is proposed that opts for cluster centers straight way from the data set, further mak...
Article
Full-text available
The term Usability refers to the making Systems easier to use to the user needs. The advent of mobile devices imposes great challenges for user-friendly displays for effective browsing for web contents. This paper reports usability and their principles, Adaptive mobile content, Adaptive mobile content in action, we discuss how to exploit solutions...
Conference Paper
Full-text available
In this paper, an individual human computer interface system using eye motion and hand gestures is introduced. Traditionally, human computer interface uses mouse, keyboard as an input device. This paper presents interface between computer and human. This technology is intended to replace the conventional computer screen pointing devices for the use...
Article
Full-text available
The Google's Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in work by early 2011[21]. The explosive growth of the platform has been significant win for consumers with respect to competition and features. However forensic analysis and security engineers have struggled as th...
Article
Full-text available
Traffic Safety is a major challenge recognized by governments and automotive companies around the world. On an average day in India, vehicular collisions kill more than 100 and injure thousands. To further improve traffic safety and efficiency, significant research efforts have been undertaken to integrate computing and communication technologies i...
Conference Paper
Full-text available
The major challenge that faces Indian Sign Language recognition now is developing methods/processes that will scale well in a better shape with increasing research findings by various researchers and supports by various institutions & government organization working for the standardization of sign language. Sign language recognition is best express...
Article
Full-text available
Neural network help to determine the network attack such as Denial of Service (DoS), User to Root (U2R), Root to Local (R2L) and Probing. These propose technique based on network forensics and forensics work on the basis of post event. In propose application the post event are log files for that kddcup 99 is used as a standard dataset. This dataset...
Conference Paper
Full-text available
This paper discusses briefly the significance of e-mail communication in today's world, how substantial e-mails are with respect to obtaining digital evidence. The framework proposed by authors employs state-of-the-art existing data mining techniques. Experiments are conducted for e-mail analysis on the Enron data corpus. The intent of the proposed...
Article
The Google’s Android mobile platform is the most popular mobile operating system in terms of shipment of devices [21]. The Android platform provided significant advantages for consumers with respect to competition and features. Due to lack of knowledge and supported tools for investigating Android powered devices, the forensic investigators have st...
Conference Paper
Sign languages are natural languages that use to communicate with deaf and mute people. There exist different sign languages in the world. But we focused on Indian Sign Language which is on the way of standardization & very less work has been done on it so far. We have focused on Indian sign language history and progress in this domain and work car...
Article
Full-text available
Data mining is part of the interdisciplinary field of knowledge discovery in databases. Research on data mining began in the 1980s and grew rapidly in the 1990s.Specific techniques that have been developed within disciplines such as artificial intelligence, machine learning and pattern recognition have been successfully employed in data mining. Dat...
Article
Full-text available
Nowadays, big organizations have a huge amount of data stored in the database systems. This may be the personnel, account, logistics or other kind of data. This data is a very important source to apply digital forensics, in order to check the honesty of the company. It is very difficult to extract the actual/hidden data without knowing the actual s...
Article
Full-text available
Human-robot voice interface has a key role in many application fields. Hand gesture is a very natural form of human interaction and can be used effectively in human computer interaction (HCI). In this paper, we propose a "Human Machine Interfacing Device" utilizing hand gestures to communicate with computers and other embedded systems acting as an...
Conference Paper
Full-text available
Internet has provided us a much more convenient way to share information all over the world. Cyberspace also opened a new platform for criminal activities. With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation process is in its infancy and there has been l...
Article
Full-text available
Gesture and Speech based human Computer interaction is attractive attention across various areas such as pattern recognition, computer vision. Thus kind of research areas find many kind of application in Multimodal HCI, Robotics control, Sign language recognition. This paper presents head and hand Gesture as well as Speech recognition system for hu...
Article
Full-text available
Gesture and Speech based human Computer interaction is attractive attention across various areas such as pattern recognition, computer vision. This recognition system consists of two main modules namely1.Gesture recognition 2.Speech recognition. The main approaches for analyzing and classifying hand gestures for HCI include combination of SOMM that...
Article
Full-text available
Gesture and Speech based human Computer interaction is attractive attention across various areas such as pattern recognition, computer vision. Thus kind of research areas find many kind of application in Multimodal HCI, Robotics control, Sign language recognition. This paper presents head and hand Gesture as well as Speech recognition system for hu...
Conference Paper
Full-text available
This paper presents a review of structural features for character recognition. Structural features are the features that are physically a part of the structure of the character, such as straight lines, arcs, circles, intersections etc. Selection of a feature extraction method is probably the single most important factor in achieving high recognitio...