Rakhi Batra

Rakhi Batra
Verified
Rakhi verified their affiliation via an institutional email.
Verified
Rakhi verified their affiliation via an institutional email.
  • PhD Student at The Ohio State University

About

12
Publications
11,384
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
552
Citations
Introduction
Rakhi does research in Actionable Knowledge Discovery, Data Mining, and Algorithms.
Current institution
The Ohio State University
Current position
  • PhD Student
Additional affiliations
January 2019 - present
Sukkur IBA University
Position
  • Manager
Education
January 2016 - January 2018
Sukkur IBA University
Field of study
  • Computer Science (Data and Knowledge Engineering)

Publications

Publications (12)
Article
Full-text available
Low-resource languages are gaining much-needed attention with the advent of deep learning models and pre-trained word embedding. Though spoken by more than 230 million people worldwide, Urdu is one such low-resource language that has recently gained popularity online and is attracting a lot of attention and support from the research community. One...
Article
Full-text available
Urdu is still considered a low-resource language despite being ranked as the world’s 10th most spoken language with nearly 230 million speakers. The scarcity of benchmark datasets in low-resource languages has led researchers to utilize more ingenious techniques to curb the issue. One such option widely adopted is to use language translation servic...
Article
Full-text available
It has been more than a year since the coronavirus (COVID-19) engulfed the whole world, disturbing the daily routine, bringing down the economies, and killing two million people across the globe at the time of writing. The pandemic brought the world together to a joint effort to find a cure and work toward developing a vaccine. Much to the anticipa...
Article
Full-text available
How different cultures react and respond given a crisis is predominant in a society's norms and political will to combat the situation. Often, the decisions made are necessitated by events, social pressure, or the need of the hour, which may not represent the nation's will. While some are pleased with it, others might show resentment. Coronavirus (...
Preprint
Full-text available
How different cultures react and respond given a crisis is predominant in a society's norms and political will to combat the situation. Often the decisions made are necessitated by events, social pressure, or the need of the hour, which may not represent the will of the nation. While some are pleased with it, others might show resentment. Coronavir...
Article
Full-text available
Actionable Knowledge Discovery approaches to extract the business and technical significant actions/patterns to support direct decision making. These actions suggest how to transform an object from an undesirable status to a desirable status by incurring less cost and high profit. This article aims to propose a work that generates actionable patter...
Chapter
This article describes how the enormous potential benefits provided by the cloud services, made enterprises to show huge interest in adopting cloud computing. As the service provider has control over the entire data of an organization stored onto the cloud, a malicious activity, whether internal or external can tamper with the data and computation....
Conference Paper
Full-text available
Sentiment Analysis is new way of machine learning to extract opinion orientation (positive, negative, neutral) from a text segment written for any product, organization, person or any other entity. Sentiment Analysis can be used to predict the mood of people that have impact on stock prices, therefore it can help in prediction of actual stock movem...
Article
Full-text available
Cell phones have turn out to be the most central communication gadget in our daily life. This results in an enormously intense competition between almost all the mobile phone vendors. Despite of manufacturer’s diverse types of advertising strategies such as exceptional price cut offers or modern attractive functions, what really matter is whether t...
Article
Full-text available
In today's age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In tradit...
Article
Full-text available
Cell phones have turn out to be the most central communication gadget in our daily life. This results in anenormously intense competition between almost all the mobile phone vendors. Despite of manufacturer’s diverse types ofadvertising strategies such as exceptional price cut offers or modern attractive functions, what really matter is whether thi...

Network

Cited By