
Sameena Naaz- Ph.D
- Professor at Jamia Hamdard
Sameena Naaz
- Ph.D
- Professor at Jamia Hamdard
About
86
Publications
150,313
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
632
Citations
Introduction
Current institution
Publications
Publications (86)
Background: Diabetes is a metabolic disorder characterized by increased blood sugar levels. Early detection of diabetes could help individuals to manage and delay the progression of this disorder effectively. Machine learning (ML) methods are important in forecasting the progression and diagnosis of different medical problems with better accuracy....
Background: Cardiovascular disease remains a leading cause of mortality worldwide, necessitating advanced predictive models to improve early detection and prevention. The integration of natural remedies with machine learning techniques offers a promising approach for enhancing heart disease prediction. Aim: This study aims to develop a hybrid learn...
Millions of people throughout the world suffer from the chronic illness diabetes mellitus. Effective diabetes care and complication avoidance depend on early diabetes prediction and diagnosis. Using the three distinct datasets—the PIMA India dataset, the NHANES dataset, and Mendeley's diabetes dataset—we give a thorough analysis of diabetic predict...
Extensive inquiry has been conducted to explore potential applications of machine learning methodologies in the realm of cardiovascular disease management. To facilitate a more comprehensive investigation This study explores machine learning algorithms, specifically Support Vector Machines (SVM) and Artificial Neural Networks (ANN), for disease ide...
Heart disease is a condition that affects the heart and has been responsible for most deaths globally in recent decades. Getting a proper diagnosis is an essential step in treating heart disease. The challenge is timely diagnosis and treatment of heart disease in order to save lives. Machine learning algorithms can help healthcare practitioners to...
This paper is a study of the effects of various
resampling techniques with different machine learning
classifiers on the accuracy of multi-class classification of
Diabetes using an imbalanced dataset. The diabetes dataset of
Mendeley is a multi-class dataset with information about
patients with no diabetes, pre-diabetes, and diabetes. The
dataset i...
Load balancing is a very important concept in cloud computing. In this work, studies are conducted on workload traces at Los Alamos National Lab (LANL). The jobs in this trace are asymmetric in nature as most of them have small time limit. Two hybrid algorithms, a Genetic Algorithm combined with First Come First Serve (GA_FCFS) and Genetic Algorith...
Despite the existence of modern antidiabetic medications, diabetes still affects millions of individuals worldwide, with a high death and disability rate. There has been a concerted search for alternative natural medicinal agents; luteolin (LUT), a polyphenolic molecule, might be a good choice, both because of its efficacy and because of it having...
Background:
Mental task identification using electroencephalography (EEG) signals is required for patients with limited or no motor movements. A subject-independent mental task classification framework can be applied to identify the mental task of a subject with no available training statistics. Deep learning frameworks are popular among researche...
Body odor is a biometric feature unique to each individual, and it can be used for authentication. However, decision makers must learn about the users’ level of acceptance of this technology, as well as their thoughts on the system’s features and procedures. In this study, a technology acceptance model (TAM) for body-odor-based biometric techniques...
Big data technology has gained attention in all fields, particularly with regard to research and financial institutions. This technology has changed the world tremendously. Researchers and data scientists are currently working on its applicability in different domains such as health care, medicine, and the stock market, among others. The data being...
IoT devices enable an assortment of large amounts of information from the environment that may well be used to produce sensible autonomous buildings. For example, within the context of public buildings like hospitals, it's necessary to regulate and predict the indoor environment. Just in case of emergencies or failures, the facility is going to be...
The year 2020 will always be remembered for the change it brought to our life. Covid-19 which stands for Coronavirus Disease-2019 affected many countries, as millions lost their lives. But it was not just Covid-19 that affected the people. The pandemic was consequently followed by a government-imposed lockdown, which forced many economies to go dow...
Users may access virtual, scalable, and dynamic resources using cloud computing, which is a novel technology that charges them only for the resources they use. This technology is reliant on a network to function. Several services, like as e-commerce apps, use the whole network as a result of the sheer scope of the network. Cloud computing has progr...
Epidemiology is the study of dynamics of health and disease in human population. It aims to identify the occurrence, pattern, and etiology of human diseases so that the causes of these diseases can be understood, which in turn will help in preventing their spread. In traditional epidemiology, the data is collected by various public health agencies...
One of the most common neurodegenerative disorders of the present age is Parkinson’s Disease or Parkinsonism. To estimate its advancement in the patient, huge amounts of data are being collected and studied to draw out inferences. The types of data generally studied towards that end are vocal data, body movement data, eye movement data, handwriting...
Background
In traditional herbal medicine, the Gymnema species has been well known for various therapeutic activities such as anti-diabetic, anti-inflammatory, anti-bacterial, anti-arthritic, anti-hyperlipidemic, cytotoxic, and immunostimulatory activities. This review is an effort to analyse all the recent studies done to explore the anti-diabetic...
This paper focuses on the VM allocation policies for load balancing in cloud computing environment. Intermittent nature of balancing the load scheme into the cloud computing becomes a challenging job and it also affects the load balancing of the cloud. The suggested proposed model generates and step-up the VM allocation policies but also transforms...
Security has become the greatest issue, both within and outside the organizations which are on cloud. The use of user IDs, passwords, and firewalls are the common steps that are taken in order to secure the computers. However, these are not proven to be so effective solutions in current unsecured era. The need for efficient security systems led to...
The social networking sites are currently assisting in delivering faster communication and they are also very useful to know about the different people’s opinions, views, and their sentiments. Twitter is one of the social networking sites, which can help to predict many health-related problems. In this work, sentiment analysis has been performed on...
Data analysis is a multi-disciplinary approach for developing mathematical models for analyzing data and doing predictions from it. The aim of this work is to study the past election results from the available data and develop a model that can be used to find the results of upcoming elections. The ups and downs in a particular region or constituenc...
Phishing attacks are growing in the similar manner as e-commerce industries are growing. Prediction and prevention of phishing attacks is a very critical step towards safeguarding online transactions. Data mining tools can be applied in this regard as the technique is very easy and can mine millions of information within seconds and deliver accurat...
Nowadays, a huge quantity of data is produced by means of multiple data sources. The existing tools and techniques are not capable to handle such voluminous data produced from a variety of sources. This continuous and varied generation of data requires advanced technologies for processing and storage that seems to be a big challenge for data scient...
Nowadays, a huge quantity of data is produced by means of multiple data sources. The existing tools and techniques are not capable to handle such voluminous data produced from a variety of sources. This continuous and varied generation of data requires advanced technologies for processing and storage that seems to be a big challenge for data scient...
Over the past few years human beings have become completely dependent on computers and IT technologies, which in turn have led to the issue of energy and power consumption in IT industries. Since the energy cost as well as the electrical requirements of the industry has increased drastically throughout the world, therefore it has become necessary t...
Academic Mining is an interdisciplinary and developing research area of Data mining, statistics and
Mathematics. Academic Mining is a field of machine learning which deals with mining of educational
data for finding out interesting patterns in various educational organizations which could help in gathering
important insights. For students’ better p...
Self driving cars are one of the most acclaimed technologies of the 21st century after the internet, but they have become a bone of contention amongst orthodox drivers. With the evolution of advances in software such as reinforcement learning algorithms and Q-learning, the world of artificial intelligence has taken a big leap forward. These algorit...
Over the past few years human beings have become completely dependent on computers and IT technologies, which in turn has led to the issue of energy and power consumption in IT industries. Since the energy cost as well as the electrical requirements of the industry has increased drastically throughout the world, therefore it has become necessary to...
Finger vein identification is a dominating method of biometric technology used for authentication in a highly secure environment. Vein patterns are unique for each individual and it is underneath skin so there is less chance for forgery. In the current research work, finger vein features are extracted and verified for the purpose of authentication....
Comparative Analysis of Digital Image Watermarking Based on Lifting Wavelet Transform & Singular Value Decomposition
This paper describes the importance of wireshark as a sniffing tool in a computer network. Any throttle in the performance of a network can prove to be a serious concern for network administrators, often leading to huge loss of resources. Many times the cause behind service disruptions like sudden terminal shutdown, connectivity loss, performance d...
Cloud Computing, one of the rapidly growing areas in the field of computer science. A modern paradigm to provide services through the Internet. An internet-based technology that employs pay-as you-go model (PAYG). Load balancing is one of the important and vital issue in cloud computing .It (Load balancing) is a technique which improves the distrib...
The various advents in the field of computer science and the need of technology urge the humans to find solutions to various challenges. One amongst them is solving the combinatorial optimization problems under the domain of problem solving approach. In order to meet the requirements of such stochastic problems, we need an alternative which is both...
Phishing attacks are growing in the similar manner as e-commerce industries are growing. Prediction and
prevention of phishing attacks is a very critical step towards safeguarding online transactions. Data mining
tools can be applied in this regard as the technique is very easy and can mine millions of information
within seconds and deliver accurat...
Epidemiology is the study of dynamics of health and disease in human population. It aims to identify the occurrence, pattern, and etiology of human diseases so that the causes of these diseases can be understood, which in turn will help in preventing their spread. In traditional epidemiology, the data is collected by various public health agencies...
An enormous growth of multimedia information in the internet has given rise to varied unauthorized use and modification. This authenticity issue is equally a limitation both in the defense data transmission and secured transmission. Digital watermarking is one of the legitimate solutions to the above problem since it makes possible validation and s...
Sentiment analysis and opinion mining help in the analysis of people’s views, opinions, attitudes, emotions and sentiments. In this twenty-first century, huge amount of opinionated data recorded in the digital form is available for analysis. The demand of sentiment analysis occupies the same space with the growth of social media such as Twitter, Fa...
Nowadays biometric authentication is one of the most preferred choice and in that also palmprint is becoming the most widely accepted technique because it can be captured easily and the algorithms can be implemented with ease. Detection of coarse lines in palm images is easy to the point that these lines can be revealed even by using a low determin...
Academic Mining or Educational Data Mining is multidisciplinary research area of Mathematics, Data Mining/ Machine Learning and Statistics to enable student, teacher, civil society and educational administrators in better understanding and decision making. Academic mining is still evolving and is closely associated with learning analytics which ena...
Brain tumor is a formation of abnormal cells within the brain that can disrupt the function of the brain. In India, every year 40,000-50,000 persons are diagnosed with brain tumor. Traditionally, radiologist manually detect and calculate the size of the tumor from CT Scan images during regular screening. Out of which, approximately, 10% to 30% of t...
Breast cancer is one of the leading cancers and cause of mortality among women in developing countries including Indi., Data mining is a field of science with the help of which we can recognize the unique patterns and markers from huge heterogeneous database responsible for particular disease. It is helpful to create awareness and to take early dec...
Advancements in technology has led to an outburst in the amount of data being generated from various sources which includes telecommunication data, medical data, geographical data, data from various social networking sites etc. Although so much development is taking place, still the governments of underdeveloped and developing nations are not able...
Abstract:
All countries of the world face new epidemics every now and then, and so does India, but the slow rate at which our country is able to respond and contain these diseases, leaves our country's population shattered and victimized on massive scales while the world is harnessing novel technologies to process Big Data and give a tough time to...
Cloud computing is a term which is associated with of virtualization, distributed computing, networking, software and web services. A cloud is made up of several elements such as clients, datacenter and distributed servers. Some of the desired features of cloud environment includes fault tolerance, high availability, scalability, flexibility and mi...
Digital image watermarking is considered to be one of the extremely valuable technology for providing security
to the digital media on web. The act of concealing a message related to a digital signals in various forms such as
an image, video, song inside the signal itself is known as Digital image watermarking. Watermarking is
significant applicati...
The recent trend in system design is on the mixed signal systems consisting of analog and digital subsystems on the same chip. It is in fact to avail the advantages of both analog and digital world. Such systems facilitate their parameter control through analog as well as digital means, which is required in modern communication, instrumentation, an...
Objectives: The protection of signal against jamming is accomplished using Spread Spectrum (SS) techniques. In this research paper, noise rejecting property of the matched filter and Binary Phase Shift Keying (BPSK) modulation is used in Direct Sequence Spread Spectrum (DSSS) system for secure communication. Methods/Statistical Analysis: Here, DSSS...
Cloud computing is a term which is associated with of virtualization, distributed computing, networking, software and web services. A cloud is made up of several elements such as clients, datacenter and distributed servers. Some of the desired features of cloud environment includes fault tolerance, high availability, scalability, flexibility and mi...
Requirements elicitation is an important process of requirements engineering. Different requirements elicitation methods have been proposed in literature to identify the need of the requirements of the software. For example, goal oriented requirements elicitation, group requirements elicitation process etc. Among various requirements elicitation me...
For different computers to communicate on the same network or on different networks they need to know one another's IP address or MAC address. Involving the IP address and MAC address has led to a challenging task for a network analyst to secure the communication. There are various ways to mitigate the attacks in application, transport and network...
This paper talks about an emerging and exciting application of ad-hoc network where vehicles are serving as nodes. This area has certain promised aspects and activities to be offered, which are broadly related with the safety, convenience, entertainment, and various other topics of interest. It is an ad hoc network of vehicles, known as 'Vehicular...
As there is a huge amount of data available online, the World Wide Web is a fertile area for data mining research. In recent years a various surveys have been performed on static data of web sites to perform web usage mining. This paper deals with the Web usage mining of a website which is hosted on IIS web server. Web usage mining is the area of d...
Advancements in hardware as well as software technologies have resulted in very heavy use of distributed systems. Because these systems are physically separated so managing the various resources is one of the challenging areas. In this paper will talk about the management of the processing power of the various nodes which are geographically apart....
In a distributed environment the workload on the network has to be managed in such a way that the total throughput of the system can be maximized. For this to happen some of the jobs have to be migrated from one node to another. When, how and where a job has to be migrated depends upon the load balancing algorithm being used. But it is very difficu...
Distributed computing systems are becoming increasingly available because of the rapid decrease in hardware cost and the advances in computer networking technologies.. It is frequently observed that in a computing environment with a number of hosts connected by a network, the hosts are often loaded differently. In typical distributed system task ar...