About
37
Publications
18,824
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
211
Citations
Introduction
Current institution
Additional affiliations
July 2013 - August 2014
RCOEM,NAGPUR
Position
- Professor (Assistant)
Publications
Publications (37)
This is an attempt to review and address the various issues in thediagnostic test accuracy of caries detection using image processing techniques. This study is carried out with a sole objective to o undertake a comprehensive assessment to establish the diagnostic accuracy in thedetection and diagnosis ofdental cariesusing image processing technique...
This is an attempt to address the various challenges opportunities and scope for formulating and designing new procedure in imbalanced classification problem which poses a challenge to a predictive modelling as many of AI ML n DL algorithms which are extensively used for classification are always designed from the perspective of with majority of fo...
Authorship attribution is the challenging and promising research field of digital forensics. It determines the plausible author of a text message written by an author by investigating other documents written by that author. Analysis of online messages is helpful to examine the text content in order to draw conclusion about attribution of authorship...
Online messaging provides a convenient and effective means of fast communication. Along with personal communication it is being used by organizations for official communication. Many organizations make use of online messaging for exchanging sensitive and secret information. Although online messaging is used for legitimate purpose, it can be misused...
Authorship Identification is subfield of authorship analysis deals with finding the plausible author of anonymous messages. The Authorship identification problem of online messages is challenging task because cyber predators make use of obscurity of Cyberspace and conceal the identity. By performing the forensic analysis of online messages, empiric...
Authorship Identification is being used for forensics analysis and humanities to identify the author of anonymous text used for communication. Authorship Identification can be achieved by selecting the textual features or writing style. Textual features are the important elements for Authorship Identification .It is therefore important to analyze t...
Digital Forensics research field has gained the supreme importance recently due to increase in digital crimes. Many researchers are working on the various issues of digital forensics and they have developed many tools and techniques to deal with digital crimes. Digital forensics is the process of uncovering and interpreting electronic data for use...
In the era of internet, the use of online blogs, forum, social network and email is very popular for communication. At the same time due to anonymity, cybercriminals making use of these online messages for illegal activities like cyber bulling, fishing etc.In this context, Authorship identification plays important role by finding the plausible auth...
Authorship Identification techniques are used to identify the most
appropriate author from group of potential suspects of online messages and find
evidences to support the conclusion. Cybercriminals make misuse of online
communication for sending blackmail or a spam email and then attempt to hide
their true identities to void detection.Authorship I...
Mobile Ad Hoc Network (MANET) is a mobile distributed wireless networks. In MANET each node are self capable that support routing functionality in an ad hoc scenario, forwarding of data or exchange of topology information using wireless communications. These characteristic specifies a better scalability of network. But this advantage leads to the s...
Mobile Ad-Hoc Network (MANET) is a distributed wireless communication network that comprises, wireless mobile nodes that dynamically self organize into ad hoc topologies. In, MANET the nodes in network can seamlessly interconnect with each other without pre-existing infrastructure. MANET feature make it scalable, as well as chances of security thre...
With the rapidly increasing complexity of computer systems and various media devices and the insufficient attack analysis techniques there is need of improvement of computer forensics analysis techniques. Although many of forensics tools and techniques help in analysis process till forensics analysis process become difficult problem. Here we presen...
Network forensics is the most significant technology to investigate different types of networking attack. Network forensics will help to capture, copy, transfer, analysis and investigation purpose. The most of the web application can easily attack by the hackers even when antivirus, firewall are exist in the system. This system used to identify dif...
Neural network help to determine the network attack such as Denial of Service (DoS), User to Root (U2R), Root to Local (R2L) and Probing. These propose technique based on network forensics and forensics work on the basis of post event. In propose application the post event are log files for that kddcup 99 is used as a standard dataset. This dataset...
This paper discusses briefly the significance of e-mail communication in today's world, how substantial e-mails are with respect to obtaining digital evidence. The framework proposed by authors employs state-of-the-art existing data mining techniques. Experiments are conducted for e-mail analysis on the Enron data corpus. The intent of the proposed...
Data mining is part of the interdisciplinary field of knowledge discovery in databases. Research on data mining began in the 1980s and grew rapidly in the 1990s.Specific techniques that have been developed within disciplines such as artificial intelligence, machine learning and pattern recognition have been successfully employed in data mining. Dat...
Internet has provided us a much more convenient way to share information all over the world. Cyberspace also opened a new platform for criminal activities. With increased access to computers across the world, cybercrime is becoming a major challenge to law enforcement agencies. Cybercrime investigation process is in its infancy and there has been l...
MANET has no clear line of defense so, it is accessible to both legitimate network nodes and malicious nodes. Some of the nodes may be selfish, for example, by not forwarding the packets to the destination, thereby saving the battery power. Some others may act malicious by launching security attacks like black hole or hack the information. Traditio...
The advent of the Web has raised different searching and querying problems. Keyword matching[1] based querying techniques used by various search engines, return thousands of Web documents for a single query, and most of these documents are generally are unrelated to the users' required information. Queries submitted to a search engine may have ambi...
E-mail communication has become the need of the hour, with the advent of Internet. However, it is being abused for various illegitimate purposes, such as, spamming, drug trafficking, cyber bullying, phishing, racial vilification, child pornography, and sexual harassment, etc. Several cyber crimes such as identity theft, plagiarism, internet fraud s...
E-mail is a widely used mechanism for communication, due to its cost and expediency. However, the concern lies when along with its legitimate usage; it is being abused for committing various cyber crimes. E-mail system security lacks adequate proactive mechanism, to defend against such vulnerabilities and misuses. A cyber forensic investigation is...
With the enormous amount of data stored in files, databases, and other repositories, it is increasingly important, to develop powerful means for analysis and perhaps interpretation of such data and for the extraction of interesting knowledge that could help in decision-making. Data Mining, also popularly known as Knowledge Discovery in Databases (K...
In a knowledge driven economy information plays an important role. Different entities of society are seeking varied information on a day to day basis. In every walk of life decision makers are taking decisions after careful analysis of relevant information. Hence quality of decisions eventually depends upon quality of information. With the advent o...
Web page clustering techniques categorize &organize search results into semantically meaningful clusters that assist users to search relevant information quickly. In general, it provides a solution for data management, information locating &interpretation of web data. Also facilitate users for discrimination, navigation &organization of web pages....
As the customer opens their views for the product and their services, so it is necessary that it is classifying and categorizing these views in feature manner. The job of analyzing such information is collectively called as customer product reviews, also called as opinion mining. Basically it consists of some steps, and different task achieved by a...