Insha Altaf | Amity University (original) (raw)
Papers by Insha Altaf
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
International Journal of Communication Systems, 2022
2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015
We are moving towards a general public where web is the need of hour. Today the vast majority of ... more We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive regions physically. Testing a web application physically is tedious, so we go for test automation. In test automation we make utilization of a product device to run repeatable tests against the application to be tried. There are various focal points of test automation. They are exceptionally exact and have more prominent preparing pace when contrasted with manual automation. There are various open source and business devices accessible for test mechanization. Selenium is one of the broadly utilized open source device for test computerization. Test automation enhances the effectiveness of programming testing procedures. Test automation gives quick criticism to engineers. It additionally discovers the imperfections when one may miss in the manual testing. In test automation we can perform boundless emphases for testing the same example of code ceaselessly commonly.
2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2017
DNA microarray datasets have extensive number of genes however just a little number of qualities ... more DNA microarray datasets have extensive number of genes however just a little number of qualities are required to distinguish a specific kind of disease. There are some issues in microarray data, the curse of dimensionality and the number of irrelevant features present which can be overcome by features extraction and dimensionality reduction technique. So gene selection assumes a vital part in expelling unessential elements which enhances exactness. Accurate prediction of disease is a key to examine patients for prognosis and treatment. One key method for gene expression analysis is clustering. Cluster analysis is preferred for the comprehension of expression level of multiple genes simultaneously through a microarray data. In this thesis I have discussed about feature extraction procedures including I-Γrelief, Principal component analysis (PCA). Microarray datasets have the issue of dimensionality. Principal component analysis procedure can be very effective used to decrease dimensi...
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
2016 Online International Conference on Green Engineering and Technologies (IC-GET), 2016
The first section means to survey and psychoanalyze the capacious and New Harmony search (HS) alg... more The first section means to survey and psychoanalyze the capacious and New Harmony search (HS) algorithm as per the perspective of metaheuristics algorithms. At first I will discuss the basic steps of Harmony Search and how it works as per the expectations. I then try to recognize the attributes of metaheuristics and dissect why Harmony Search is a useful metaheuristics algorithm. I then retrace concisely other well-known metaheuristics, for example particle swarm optimization in order to discover their similarities and differences from Harmony Search. At last I will examine the different approaches to enhance and grow new variations of Harmony Search. This paper results in an improved harmony search (IHS) algorithm in order to solve highly optimized problems. Improved harmony Search utilizes a novel technique for creating new arrangement vectors that improves exactness and union rate of harmony search algorithm. I will explain the impact of constant parameters on harmony search algo...
International Journal of Engineering Sciences and Research Technology, 2016
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
In this paper, we in introduce a specification based intrusion detection model for detecting atta... more In this paper, we in introduce a specification based intrusion detection model for detecting attacks on routing protocols in MANETs. Intrusion detection is a viable approach to enhancing the security of existing computers and networks. Briefly, an intrusion detection system monitors activity in a system or network in order to identify ongoing attacks. Intrusion detection techniques can be classified into anomaly detection, signature-based detection, and specification-based detection. In anomaly detection, activities that deviate from the normal behavior profiles, usually statistical, are flagged as attacks. Signature-based detection matches current activity of a system against a set of attack signatures. Specification-based detection identifies system operations that are different from the correct behavior model. Our specification-based approach analyzes the protocol specification of an ad hoc routing protocol to establish a finite-state-automata (FSA) model that captures the correc...
in this paper, we make two major contributions for intrusiondetectionsystems (IDS) in MANET. Firs... more in this paper, we make two major contributions for intrusiondetectionsystems (IDS) in MANET. First, we propose a practical and effective messageexchangemodel: DistributedEvidence-driven MessageExchangingintrusiondetectionModel (DEMEM) for MANET. DEMEM overcomes the challenges to Distributed IDS architecture of MANET, where detectors do not have sufficient data to detect routingattacks. Instead of adopting costly promiscuous monitoring, detectors in DEMEM simply intercept routingmessages and validate these routingmessages in order to detectroutingattacks. Also, DEMEM segregates the duties of security agents and routing services to avoid modifying the routingprotocols. The efficient Evidence-driven messageexchange mechanism provides sufficient Evidence in order to perform scalable Distributedintrusiondetection at each node. Second, we integrate DEMEM into a proactiveroutingprotocol in MANET, OptimalLinkStateRouting (OLSR) with four practical assumptions, and three New proposed ID mess...
Studies in Autonomic, Data-driven and Industrial Computing
International Journal of Communication Systems
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
International Journal of Communication Systems, 2022
2015 International Conference on Green Computing and Internet of Things (ICGCIoT), 2015
We are moving towards a general public where web is the need of hour. Today the vast majority of ... more We are moving towards a general public where web is the need of hour. Today the vast majority of the product applications executed, are composed as online applications which are keep running in a web program. Testing programming applications is critical. Numerous associations make utilization of a specific web application, so the same web applications are tried habitually by diverse clients from distinctive regions physically. Testing a web application physically is tedious, so we go for test automation. In test automation we make utilization of a product device to run repeatable tests against the application to be tried. There are various focal points of test automation. They are exceptionally exact and have more prominent preparing pace when contrasted with manual automation. There are various open source and business devices accessible for test mechanization. Selenium is one of the broadly utilized open source device for test computerization. Test automation enhances the effectiveness of programming testing procedures. Test automation gives quick criticism to engineers. It additionally discovers the imperfections when one may miss in the manual testing. In test automation we can perform boundless emphases for testing the same example of code ceaselessly commonly.
2017 Second International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2017
DNA microarray datasets have extensive number of genes however just a little number of qualities ... more DNA microarray datasets have extensive number of genes however just a little number of qualities are required to distinguish a specific kind of disease. There are some issues in microarray data, the curse of dimensionality and the number of irrelevant features present which can be overcome by features extraction and dimensionality reduction technique. So gene selection assumes a vital part in expelling unessential elements which enhances exactness. Accurate prediction of disease is a key to examine patients for prognosis and treatment. One key method for gene expression analysis is clustering. Cluster analysis is preferred for the comprehension of expression level of multiple genes simultaneously through a microarray data. In this thesis I have discussed about feature extraction procedures including I-Γrelief, Principal component analysis (PCA). Microarray datasets have the issue of dimensionality. Principal component analysis procedure can be very effective used to decrease dimensi...
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
2016 Online International Conference on Green Engineering and Technologies (IC-GET), 2016
The first section means to survey and psychoanalyze the capacious and New Harmony search (HS) alg... more The first section means to survey and psychoanalyze the capacious and New Harmony search (HS) algorithm as per the perspective of metaheuristics algorithms. At first I will discuss the basic steps of Harmony Search and how it works as per the expectations. I then try to recognize the attributes of metaheuristics and dissect why Harmony Search is a useful metaheuristics algorithm. I then retrace concisely other well-known metaheuristics, for example particle swarm optimization in order to discover their similarities and differences from Harmony Search. At last I will examine the different approaches to enhance and grow new variations of Harmony Search. This paper results in an improved harmony search (IHS) algorithm in order to solve highly optimized problems. Improved harmony Search utilizes a novel technique for creating new arrangement vectors that improves exactness and union rate of harmony search algorithm. I will explain the impact of constant parameters on harmony search algo...
International Journal of Engineering Sciences and Research Technology, 2016
Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from ... more Data Mining just alludes to the extraction of exceptionally intriguing patterns of the data from the monstrous data sets. Outlier detection is one of the imperative parts of data mining which Rexall discovers the perceptions that are going amiss from the normal expected conduct. Outlier detection and investigation is once in a while known as Outlier mining. In this paper, we have attempted to give the expansive and a far reaching literature survey of Outliers and Outlier detection procedures under one rooftop, to clarify the lavishness and multifaceted nature connected with each Outlier detection technique. Besides, we have likewise given a wide correlation of the different strategies for the diverse Outlier techniques. Outliers are the focuses which are unique in relation to or conflicting with whatever is left of the information. They can be novel, new, irregular, strange or uproarious data. Outliers are in some cases more fascinating than most of the information. The principle di...
In this paper, we in introduce a specification based intrusion detection model for detecting atta... more In this paper, we in introduce a specification based intrusion detection model for detecting attacks on routing protocols in MANETs. Intrusion detection is a viable approach to enhancing the security of existing computers and networks. Briefly, an intrusion detection system monitors activity in a system or network in order to identify ongoing attacks. Intrusion detection techniques can be classified into anomaly detection, signature-based detection, and specification-based detection. In anomaly detection, activities that deviate from the normal behavior profiles, usually statistical, are flagged as attacks. Signature-based detection matches current activity of a system against a set of attack signatures. Specification-based detection identifies system operations that are different from the correct behavior model. Our specification-based approach analyzes the protocol specification of an ad hoc routing protocol to establish a finite-state-automata (FSA) model that captures the correc...
in this paper, we make two major contributions for intrusiondetectionsystems (IDS) in MANET. Firs... more in this paper, we make two major contributions for intrusiondetectionsystems (IDS) in MANET. First, we propose a practical and effective messageexchangemodel: DistributedEvidence-driven MessageExchangingintrusiondetectionModel (DEMEM) for MANET. DEMEM overcomes the challenges to Distributed IDS architecture of MANET, where detectors do not have sufficient data to detect routingattacks. Instead of adopting costly promiscuous monitoring, detectors in DEMEM simply intercept routingmessages and validate these routingmessages in order to detectroutingattacks. Also, DEMEM segregates the duties of security agents and routing services to avoid modifying the routingprotocols. The efficient Evidence-driven messageexchange mechanism provides sufficient Evidence in order to perform scalable Distributedintrusiondetection at each node. Second, we integrate DEMEM into a proactiveroutingprotocol in MANET, OptimalLinkStateRouting (OLSR) with four practical assumptions, and three New proposed ID mess...
Studies in Autonomic, Data-driven and Industrial Computing
International Journal of Communication Systems