Anvar Shathik - Academia.edu (original) (raw)
Papers by Anvar Shathik
Asian Journal of Computer Science Engineering(AJCSE), Sep 2, 2020
Smart grid, smart homes, intelligent water networks, and smart transport are the most infrastruct... more Smart grid, smart homes, intelligent water networks, and smart transport are the most infrastructural structures possible today to link our planet. The general vision of such systems is usually linked to a sole notion called the internet of things (IoT). In IoT, the whole solid infrastructure is diligently linked to information and communication technology through the use of networked embedded devices, where smart surveillance and control can be done. In such a sophisticated dynamic system, all instruments are interconnected to provide useful measurement and control instructions through the distributed sensor networks. The way we interact with the world around us is fast changing in technology. We are moving to new networking paradigms, the internet of objects (loT), which maintains data generation and internet communication for greater value and service through the worldwide number of interconnected sensors or intelligent objects. The IoT should facilitate the interconnection and sharing of information and useful data through thousands of devices, people, and services. To revolutionize the way the internet works, the IoT seeks to put together the ideas of machine-to-machine connectivity, big data, artificial intelligence, etc., to operate within a shared framework to interconnect cyberspace and human beings, which contributes to the advancement of cyber-physical systems. The idea of IoT has drawn considerable attention to research as the huge connectivity presents several challenges and hurdles, such as heterogeneity, scalability, safety, large data, and power demand. To achieve a stable IoT implementation, several security concepts on each layer should be enforced. The future of IoT can only be secured by discussing and resolving the security problems associated with it. Several researchers have tried by introducing effective countermeasures to resolve the security issues for IoT layers and tools. To date, there are limited surveys that highlight the challenges and issues of the IoT that has been identified as unique to the future internet and that various research communities must address and address. This paper gives an overview of security principles, technology and security challenges, proposed countermeasures , and future directions for IoT security. So far, a limited number of surveys have highlighted the challenges and issues of the IoT, the unique feature of this future network, and which different research groups have to face and address. To date, there are limited surveys that highlight the challenges and issues of the IoT that has been identified as unique to the future internet and that various research communities must address and address. This paper gives an overview of security principles, technology and security challenges, proposed countermeasures, and future directions for IoT security.
Journal of Grid Computing
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)
2022 International Conference on Inventive Computation Technologies (ICICT)
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)
A strategy for communicating with another person that, if done correctly, maybe easily be underst... more A strategy for communicating with another person that, if done correctly, maybe easily be understood or accepted by the other person. There are a variety of alternative modes of communication available, including visual representation, body language, conversation, written language, among others. Currently, speech recognition is evolving as a powerful technology in today's world, with applications in a wide range of areas requiring specialised hardware. Voice has a wide range of applications and is frequently regarded as the most powerful mode of communication among all other technologies. The attitude, health status, emotion, gender, and speaker's identity are all considered part of the rich dimension, also known as the rich dimension of communication. Gender and emotion are the significant components of this framework for voice recognition, and they are taken into consideration for a number of applications in this framework for voice recognition. We want to demonstrate an emotion detection system that uses a speech signal as its main input to identify various emotions with this framework. We offer a unique approach for emotion recognition from speech input that uses Artificial Neural Networks (ANN) and is implemented on a Field Programmable Gate Array device (FPGA). In this scenario, the back propagation technique underneath the ANN is utilised as a classifier in the emotion identification system. The emotions are categorised based on their intensity using this approach. Speech pre-processing, feature extraction, and classification are the proposed work's major processing stages. Here, during the features extraction process, characteristics from the data are recovered, such as Cepstrum, Pitch, Mel-frequency cepstral coefficients (MFCC), and the Discrete Wavelet Transform (DWT). In addition, the method of back propagation neural networks is used to achieve the classification task—the proposed work outcomes with the 91.235% accuracy with the less error rate.
Journal of Physics: Conference Series, 2020
Network technology and mobile technologies are two essential and booming technologies in today’s ... more Network technology and mobile technologies are two essential and booming technologies in today’s scenario that have emerged and quickly evaluated in terms of hardware, communication media, and architecture. Based on the communication system there are massive developments in underlying devices with hardware, software, and entire architecture. All we experienced with 2G, 3G, and 4G communication system, and in the future, we will going to experience next-generation communication system 5G. In underlying technology there have been many improvements and advances, mainly with data transfer speed and unlimited bandwidth that we have never experienced before. Not only is this technology limited to voice and data, but we also expect some IoT revolutions, a system for mobile communication, automated vehicles, industrial and manufacturing automation, human-machine interface, logistics and warehousing, etc. So this 5G technology gives the opportunity for researchers to perform research in rela...
Many businesses are using social media networks to deliver different services and connect with<... more Many businesses are using social media networks to deliver different services and connect with<br> clients and collect information about the thoughts and views of individuals. Sentiment analysis is<br> a technique of machine learning that senses polarities such as positive or negative thoughts within<br> the text, full documents, paragraphs, lines, or subsections. Machine Learning (ML) is a<br> multidisciplinary field, a mixture of statistics and computer science algorithms that are commonly<br> used in predictive and classification analyses. This paper presents the common techniques of<br> analyzing sentiment from a machine learning perspective. In light of this, this literature review<br> explores and discusses the idea of Sentiment analysis by undertaking a systematic review and<br> assessment of corporate and community white papers, scientific research articles, journals, and<br> reports. The goal and primary objectives of th...
Security was not a major concern of the past in Information Technology Organizations. But<br&g... more Security was not a major concern of the past in Information Technology Organizations. But<br> presently, due to the vast growth in fraud and hacking techniques, the security of organizations<br> is a great concern. Organizations usually spend millions every year just to protect their<br> environment and to maintain security. Yet, no company claims to be a hundred percent secure<br> as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and<br> tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of<br> money for providers offering services of enterprise security schemes. The hackers are always<br> ready to intrude into the company's valuable information sources. As per the recent survey by<br> 'Security Week', nearly seventy percentages of respondents have faced a security threat which<br> ended up in the loss of valuable information or the collapse ...
Journal of Physics: Conference Series, 2020
Network technology and mobile technologies are two essential and booming technologies in today... more Network technology and mobile technologies are two essential and booming technologies in today's scenario that have emerged and quickly evaluated in terms of hardware, communication media, and architecture. Based on the communication system there are massive developments in underlying devices with hardware, software, and entire architecture. All we experienced with 2G, 3G, and 4G communication system, and in the future, we will be going to experience next-generation communication system 5G. In underlying technology there have been many improvements and advances, mainly with data transfer speed and unlimited bandwidth that we have never experienced before. Not only is this technology limited to voice and data, but we also expect some IoT revolutions, a system for mobile communication, automated vehicles, industrial and manufacturing automation, human-machine interface, logistics and warehousing, etc. So this 5G technology gives the opportunity for researchers to perform research ...
Document classification is employed through text classification techniques which have exploited m... more Document classification is employed through text classification techniques which have exploited many feature extraction and knowledge representation process in recent years in order to categorize the document into one or more classes. Unsupervised document classification is employed in this research in to predict the classes where there are no labels from the training samples but imperfect labels are available for all features in the dataset. In this paper, we present a novel technique termed as Ensemble Text Classifier. The Ensemble Text Classifier (ETC) is a multistep learning framework for classifying the novel classes from regularized classes in the document classification setting. The initial step of proposed framework is learning the document and extracting the features , feature evolutions , concept and concept evolution using feature extraction algorithm as it eliminates the irrelavent , Noisy and redundant features. As feature extraction algorithm reduces the dimensionality...
In this digital world, experience sharing, knowledge exploration, taught posting and other relate... more In this digital world, experience sharing, knowledge exploration, taught posting and other related social exploitations are common to every individual as well as social media/network such as FaceBook, Twitter, etc plays a vital role in such kinds of activities. In general, many social network based sentimental feature extraction details and logics are available as well as many researchers work on that domain for last few years. But all those research specification are narrowed in the sense of building a way for estimating the opinions and sentiments with respect to the tweets and posts the user raised on the social network or any other related web interfacing medium. Many social network schemes provides an ability to the users to push the voice tweets and voice messages, so that the voice messages may contain some harmful as well as normal and important contents. In this paper, a new methodology is designed called Intensive Deep Learning based Voice Estimation Principle (IDLVEP), in...
YMER Digital
Assistant Professor , , Department of CSE , Srinivas University College of Engineering and Techno... more Assistant Professor , , Department of CSE , Srinivas University College of Engineering and Technology, Mangalore, India
Journal of Engineering and Applied Sciences
SRINIVAS PUBLICATION, Jun 30, 2020
Security was not a major concern of the past in Information Technology Organizations. But present... more Security was not a major concern of the past in Information Technology Organizations. But presently, due to the vast growth in fraud and hacking techniques, the security of organizations is a great concern. Organizations usually spend millions every year just to protect their
environment and to maintain security. Yet, no company claims to be a hundred percent secure as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of money for providers offering services of enterprise security schemes. The hackers are always ready to intrude into the company's valuable information sources. As per the recent survey by 'Security Week', nearly seventy percentages of respondents have faced a security threat which
ended up in the loss of valuable information or the collapse of functioning last year. An employer of the company can indeed be a major attacker than an outside intruder. An employee of the company is already having all privileges to use resources of the company while various other ways are needed for an outer intruder for accessing the same company's network or data. Cisco, the networking giant has a major focus on Enterprise Security Policies. The company
has seen a valuable improvement in the last few decades, which shows the importance of security. Cisco had recently released data that showed a lack of security policies in about 23 percentages of companies worldwide. More than 70% of Information Technology persons say that their organizations lack behind in areas of security policy. Large numbers of IT people fail to practice security policies as they are not easily understandable. For every organization, policies are the building blocks. They function as road maps which each employee of the company uses in various ways. Developing a well-defined policy requires artistic skill. Federal agencies have a Statutory obligation is available for federal agencies for maintaining day-today security policies. The primary Information Security Officer (ISO) is usually pledged for
implementing these policies and the Chief Executive Officer (CEO) of the Company as well. The best security policies consider the vision and mission of companies, the important assets that need security, and security threats imposed against certain factors. All these come under
risk management which needs defect identification by business impact policies. The weakness of a company has to be identified to find the vulnerability ratio of that company. Designing a security policy is not a nightmare once the major scope of policy design is identified. The
major challenge lies in identifying the scope and threat areas for security policy. The policy is nothing but a collection of guidelines and procedures on what and how it can be implemented. In this paper, we are analyzing how Cognizant Technology Solutions (CTS) maintaining its
standards, policies, technologies, and management policies which are defined for securing data of an organization.
IJAEML by Anvar Shathik
International Journal of Applied Engineering and Management Letters (IJAEML), Aug 9, 2020
Many businesses are using social media networks to deliver different services and connect withcli... more Many businesses are using social media networks to deliver different services and connect withclients and collect information about the thoughts and views of individuals. Sentiment analysis isa technique of machine learning that senses polarities such as positive or negative thoughtswithin the text, full documents, paragraphs, lines, or subsections. Machine Learning (ML) is a
multidisciplinary field, a mixture of statistics and computer science algorithms that are
commonly used in predictive and classification analyses. This paper presents the commontechniques of analyzing sentiment from a machine learning perspective. In light of this, thisliterature review explores and discusses the idea of Sentiment analysis by undertaking asystematic review and assessment of corporate and community white papers, scientific researcharticles, journals, and reports. The goal and primary objectives of this article are to analyticallycategorize and analyze the prevalent research techniques and implementations of MachineLearning techniques to Sentiment Analysis on various applications. The limitation of thisanalysis is that by excluding the hardware and the theoretical exposure pertinent to the subject,the main emphasis is on the application side alone. The limitation of this study is that the majorfocus is on the application side thereby excluding the hardware and theoretical aspects related tothe subject. Finally, this paper includes a research proposal for e-commerce environmenttowards sentiment analysis applying machine learning algorithms.
Asian Journal of Computer Science Engineering(AJCSE), Sep 2, 2020
Smart grid, smart homes, intelligent water networks, and smart transport are the most infrastruct... more Smart grid, smart homes, intelligent water networks, and smart transport are the most infrastructural structures possible today to link our planet. The general vision of such systems is usually linked to a sole notion called the internet of things (IoT). In IoT, the whole solid infrastructure is diligently linked to information and communication technology through the use of networked embedded devices, where smart surveillance and control can be done. In such a sophisticated dynamic system, all instruments are interconnected to provide useful measurement and control instructions through the distributed sensor networks. The way we interact with the world around us is fast changing in technology. We are moving to new networking paradigms, the internet of objects (loT), which maintains data generation and internet communication for greater value and service through the worldwide number of interconnected sensors or intelligent objects. The IoT should facilitate the interconnection and sharing of information and useful data through thousands of devices, people, and services. To revolutionize the way the internet works, the IoT seeks to put together the ideas of machine-to-machine connectivity, big data, artificial intelligence, etc., to operate within a shared framework to interconnect cyberspace and human beings, which contributes to the advancement of cyber-physical systems. The idea of IoT has drawn considerable attention to research as the huge connectivity presents several challenges and hurdles, such as heterogeneity, scalability, safety, large data, and power demand. To achieve a stable IoT implementation, several security concepts on each layer should be enforced. The future of IoT can only be secured by discussing and resolving the security problems associated with it. Several researchers have tried by introducing effective countermeasures to resolve the security issues for IoT layers and tools. To date, there are limited surveys that highlight the challenges and issues of the IoT that has been identified as unique to the future internet and that various research communities must address and address. This paper gives an overview of security principles, technology and security challenges, proposed countermeasures , and future directions for IoT security. So far, a limited number of surveys have highlighted the challenges and issues of the IoT, the unique feature of this future network, and which different research groups have to face and address. To date, there are limited surveys that highlight the challenges and issues of the IoT that has been identified as unique to the future internet and that various research communities must address and address. This paper gives an overview of security principles, technology and security challenges, proposed countermeasures, and future directions for IoT security.
Journal of Grid Computing
2022 International Conference on Innovative Computing, Intelligent Communication and Smart Electrical Systems (ICSES)
2022 International Conference on Inventive Computation Technologies (ICICT)
2022 International Conference on Advanced Computing Technologies and Applications (ICACTA)
A strategy for communicating with another person that, if done correctly, maybe easily be underst... more A strategy for communicating with another person that, if done correctly, maybe easily be understood or accepted by the other person. There are a variety of alternative modes of communication available, including visual representation, body language, conversation, written language, among others. Currently, speech recognition is evolving as a powerful technology in today's world, with applications in a wide range of areas requiring specialised hardware. Voice has a wide range of applications and is frequently regarded as the most powerful mode of communication among all other technologies. The attitude, health status, emotion, gender, and speaker's identity are all considered part of the rich dimension, also known as the rich dimension of communication. Gender and emotion are the significant components of this framework for voice recognition, and they are taken into consideration for a number of applications in this framework for voice recognition. We want to demonstrate an emotion detection system that uses a speech signal as its main input to identify various emotions with this framework. We offer a unique approach for emotion recognition from speech input that uses Artificial Neural Networks (ANN) and is implemented on a Field Programmable Gate Array device (FPGA). In this scenario, the back propagation technique underneath the ANN is utilised as a classifier in the emotion identification system. The emotions are categorised based on their intensity using this approach. Speech pre-processing, feature extraction, and classification are the proposed work's major processing stages. Here, during the features extraction process, characteristics from the data are recovered, such as Cepstrum, Pitch, Mel-frequency cepstral coefficients (MFCC), and the Discrete Wavelet Transform (DWT). In addition, the method of back propagation neural networks is used to achieve the classification task—the proposed work outcomes with the 91.235% accuracy with the less error rate.
Journal of Physics: Conference Series, 2020
Network technology and mobile technologies are two essential and booming technologies in today’s ... more Network technology and mobile technologies are two essential and booming technologies in today’s scenario that have emerged and quickly evaluated in terms of hardware, communication media, and architecture. Based on the communication system there are massive developments in underlying devices with hardware, software, and entire architecture. All we experienced with 2G, 3G, and 4G communication system, and in the future, we will going to experience next-generation communication system 5G. In underlying technology there have been many improvements and advances, mainly with data transfer speed and unlimited bandwidth that we have never experienced before. Not only is this technology limited to voice and data, but we also expect some IoT revolutions, a system for mobile communication, automated vehicles, industrial and manufacturing automation, human-machine interface, logistics and warehousing, etc. So this 5G technology gives the opportunity for researchers to perform research in rela...
Many businesses are using social media networks to deliver different services and connect with<... more Many businesses are using social media networks to deliver different services and connect with<br> clients and collect information about the thoughts and views of individuals. Sentiment analysis is<br> a technique of machine learning that senses polarities such as positive or negative thoughts within<br> the text, full documents, paragraphs, lines, or subsections. Machine Learning (ML) is a<br> multidisciplinary field, a mixture of statistics and computer science algorithms that are commonly<br> used in predictive and classification analyses. This paper presents the common techniques of<br> analyzing sentiment from a machine learning perspective. In light of this, this literature review<br> explores and discusses the idea of Sentiment analysis by undertaking a systematic review and<br> assessment of corporate and community white papers, scientific research articles, journals, and<br> reports. The goal and primary objectives of th...
Security was not a major concern of the past in Information Technology Organizations. But<br&g... more Security was not a major concern of the past in Information Technology Organizations. But<br> presently, due to the vast growth in fraud and hacking techniques, the security of organizations<br> is a great concern. Organizations usually spend millions every year just to protect their<br> environment and to maintain security. Yet, no company claims to be a hundred percent secure<br> as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and<br> tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of<br> money for providers offering services of enterprise security schemes. The hackers are always<br> ready to intrude into the company's valuable information sources. As per the recent survey by<br> 'Security Week', nearly seventy percentages of respondents have faced a security threat which<br> ended up in the loss of valuable information or the collapse ...
Journal of Physics: Conference Series, 2020
Network technology and mobile technologies are two essential and booming technologies in today... more Network technology and mobile technologies are two essential and booming technologies in today's scenario that have emerged and quickly evaluated in terms of hardware, communication media, and architecture. Based on the communication system there are massive developments in underlying devices with hardware, software, and entire architecture. All we experienced with 2G, 3G, and 4G communication system, and in the future, we will be going to experience next-generation communication system 5G. In underlying technology there have been many improvements and advances, mainly with data transfer speed and unlimited bandwidth that we have never experienced before. Not only is this technology limited to voice and data, but we also expect some IoT revolutions, a system for mobile communication, automated vehicles, industrial and manufacturing automation, human-machine interface, logistics and warehousing, etc. So this 5G technology gives the opportunity for researchers to perform research ...
Document classification is employed through text classification techniques which have exploited m... more Document classification is employed through text classification techniques which have exploited many feature extraction and knowledge representation process in recent years in order to categorize the document into one or more classes. Unsupervised document classification is employed in this research in to predict the classes where there are no labels from the training samples but imperfect labels are available for all features in the dataset. In this paper, we present a novel technique termed as Ensemble Text Classifier. The Ensemble Text Classifier (ETC) is a multistep learning framework for classifying the novel classes from regularized classes in the document classification setting. The initial step of proposed framework is learning the document and extracting the features , feature evolutions , concept and concept evolution using feature extraction algorithm as it eliminates the irrelavent , Noisy and redundant features. As feature extraction algorithm reduces the dimensionality...
In this digital world, experience sharing, knowledge exploration, taught posting and other relate... more In this digital world, experience sharing, knowledge exploration, taught posting and other related social exploitations are common to every individual as well as social media/network such as FaceBook, Twitter, etc plays a vital role in such kinds of activities. In general, many social network based sentimental feature extraction details and logics are available as well as many researchers work on that domain for last few years. But all those research specification are narrowed in the sense of building a way for estimating the opinions and sentiments with respect to the tweets and posts the user raised on the social network or any other related web interfacing medium. Many social network schemes provides an ability to the users to push the voice tweets and voice messages, so that the voice messages may contain some harmful as well as normal and important contents. In this paper, a new methodology is designed called Intensive Deep Learning based Voice Estimation Principle (IDLVEP), in...
YMER Digital
Assistant Professor , , Department of CSE , Srinivas University College of Engineering and Techno... more Assistant Professor , , Department of CSE , Srinivas University College of Engineering and Technology, Mangalore, India
Journal of Engineering and Applied Sciences
SRINIVAS PUBLICATION, Jun 30, 2020
Security was not a major concern of the past in Information Technology Organizations. But present... more Security was not a major concern of the past in Information Technology Organizations. But presently, due to the vast growth in fraud and hacking techniques, the security of organizations is a great concern. Organizations usually spend millions every year just to protect their
environment and to maintain security. Yet, no company claims to be a hundred percent secure as fraudulent techniques are more tricky and latest. As the hackers are becoming hard and tricky, the major Information Technology (IT) Organizations are willing to pay a large sum of money for providers offering services of enterprise security schemes. The hackers are always ready to intrude into the company's valuable information sources. As per the recent survey by 'Security Week', nearly seventy percentages of respondents have faced a security threat which
ended up in the loss of valuable information or the collapse of functioning last year. An employer of the company can indeed be a major attacker than an outside intruder. An employee of the company is already having all privileges to use resources of the company while various other ways are needed for an outer intruder for accessing the same company's network or data. Cisco, the networking giant has a major focus on Enterprise Security Policies. The company
has seen a valuable improvement in the last few decades, which shows the importance of security. Cisco had recently released data that showed a lack of security policies in about 23 percentages of companies worldwide. More than 70% of Information Technology persons say that their organizations lack behind in areas of security policy. Large numbers of IT people fail to practice security policies as they are not easily understandable. For every organization, policies are the building blocks. They function as road maps which each employee of the company uses in various ways. Developing a well-defined policy requires artistic skill. Federal agencies have a Statutory obligation is available for federal agencies for maintaining day-today security policies. The primary Information Security Officer (ISO) is usually pledged for
implementing these policies and the Chief Executive Officer (CEO) of the Company as well. The best security policies consider the vision and mission of companies, the important assets that need security, and security threats imposed against certain factors. All these come under
risk management which needs defect identification by business impact policies. The weakness of a company has to be identified to find the vulnerability ratio of that company. Designing a security policy is not a nightmare once the major scope of policy design is identified. The
major challenge lies in identifying the scope and threat areas for security policy. The policy is nothing but a collection of guidelines and procedures on what and how it can be implemented. In this paper, we are analyzing how Cognizant Technology Solutions (CTS) maintaining its
standards, policies, technologies, and management policies which are defined for securing data of an organization.
International Journal of Applied Engineering and Management Letters (IJAEML), Aug 9, 2020
Many businesses are using social media networks to deliver different services and connect withcli... more Many businesses are using social media networks to deliver different services and connect withclients and collect information about the thoughts and views of individuals. Sentiment analysis isa technique of machine learning that senses polarities such as positive or negative thoughtswithin the text, full documents, paragraphs, lines, or subsections. Machine Learning (ML) is a
multidisciplinary field, a mixture of statistics and computer science algorithms that are
commonly used in predictive and classification analyses. This paper presents the commontechniques of analyzing sentiment from a machine learning perspective. In light of this, thisliterature review explores and discusses the idea of Sentiment analysis by undertaking asystematic review and assessment of corporate and community white papers, scientific researcharticles, journals, and reports. The goal and primary objectives of this article are to analyticallycategorize and analyze the prevalent research techniques and implementations of MachineLearning techniques to Sentiment Analysis on various applications. The limitation of thisanalysis is that by excluding the hardware and the theoretical exposure pertinent to the subject,the main emphasis is on the application side alone. The limitation of this study is that the majorfocus is on the application side thereby excluding the hardware and theoretical aspects related tothe subject. Finally, this paper includes a research proposal for e-commerce environmenttowards sentiment analysis applying machine learning algorithms.