Dr. Mithilesh Dubey - Academia.edu (original) (raw)
Papers by Dr. Mithilesh Dubey
Our Heritage, Feb 12, 2020
Augmented Reality (AR) is an emerging field that allows the user to see the real world overlaid w... more Augmented Reality (AR) is an emerging field that allows the user to see the real world overlaid with virtual data. This paper aims to investigate the supporting role of augmented reality in navigation and road safety. The characteristics of augmented reality-based navigation systems, including a detailed discussion of the technical issues concerned, are also described. AR provides an excellent user interface for visualization in mobile computing applications, i.e., navigation and information browsing. While dealing with the automotive navigation systems, we came across the major concern, which is road safety. According tothe W.H.O report, every year, the majority of the people die because of road traffic crashes. It is also termed as the 11th leading cause of death. Due to these factors, road safety goes parallel with the automotive navigation systems.
International Journal of Advanced Research in Computer Science, Jun 25, 2017
UX Research and Design is an exciting and growing field.User Experience (UX) is a term used by re... more UX Research and Design is an exciting and growing field.User Experience (UX) is a term used by researchers and professionals in many areas.UX Research is understanding of how to conduct interviews, how to evaluating systems, and analyze systems using principles of good design [2].UX involves many subjects and it is used to describe a wide range of topics. UX Design involves the generation of good, feasible design solutions and the creation of prototypes at multiple levels of fidelity. A same product may give different impressions of user experience to different users or user groups. Hence, feedback should be generally collected from a large group of users to measure the results.By using an iterative design approach and interleaving successive phases of UX Research and Design, one can learn by making mistakes and failing fast to improve towards a product with a good UX. It is a framework with wide applicability in areas of HCI, Corporate websites, Intranets, Mobile & Tablet, Website apps/ web Usability and the growing market gives a platform for huge scope of work to be done.Also there are many UX research methods and one can decide on when to use which method.
Research Square (Research Square), Jan 6, 2023
In the era of steadily expanding e-commerce, people prefer to purchase things and commodities onl... more In the era of steadily expanding e-commerce, people prefer to purchase things and commodities online which helps them to save time and efforts. The huge quantity of these online purchase decisions is in uenced by the suggestions of previous purchasers thereby increasing the spam content on the websites. As of the prevalence of spam content on social media is rapidly expanding, the subscribers receive a large number of junk information such as malevolent links, bogus accounts, fraud news and reviews via social networking sites and are unable to differentiate between spam and legitimate texts thereby making spam recognition vital. This research paper discusses about the novel soft computing and ensemble machine learning techniques and challenges based on detection of these review spams. It uses the datasets from different hotels and extracted its reviews, creation of novel model to analyze the problem, thus resulting in overall performance of model approximately equal to 85% of accuracy.
Advances in intelligent systems and computing, 2014
RSA cryptosystem is based on the difficulty of factoring large integers. It is used in encryption... more RSA cryptosystem is based on the difficulty of factoring large integers. It is used in encryption as well as in digital signature for providing security and authenticity of information. RSA is employed in various security applications. RSA has been extensively analyzed for flaws and cryptanalytic attacks but it is still considered secure due to adequate countermeasures and improvements reported. In this paper, we present a brief overview on RSA, discuss various flaws and cryptanalytic attacks including applicability of genetic algorithm and some countermeasures to overcome from certain flaws and cryptanalytic attacks. The review study shows that RSA is a most popular secure asymmetric cryptosystem and its strength would remain intact until availability of quantum computers.
Interactive Learning Environments
International Journal of Electrical and Computer Engineering (IJECE)
Continuous attempts have been made to improve the flexibility and effectiveness of distributed co... more Continuous attempts have been made to improve the flexibility and effectiveness of distributed computing systems. Extensive effort in the fields of connectivity technologies, network programs, high processing components, and storage helps to improvise results. However, concerns such as slowness in response, long execution time, and long completion time have been identified as stumbling blocks that hinder performance and require additional attention. These defects increased the total system cost and made the data allocation procedure for a geographically dispersed setup difficult. The load-based architectural model has been strengthened to improve data allocation performance. To do this, an abstract job model is employed, and a data query file containing input data is processed on a directed acyclic graph. The jobs are executed on the processing engine with the lowest execution cost, and the system's total cost is calculated. The total cost is computed by summing the costs of com...
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)
Individuals that work with web services commonly focus on internet-based feedback to make decisio... more Individuals that work with web services commonly focus on internet-based feedback to make decisions about shopping via online, booking an apartment, renting banquette halls etc., because people believe that making a decision which is based on the views of others, can contribute in making the right decision about their purchases. While publishing negative reviews or comments, brings financial benefit to manufacturers via online review websites and also increases the review spam happenings. Sentimental misinformation in feedback has therefore become a significant challenge for people to make decisions about their purchase and thus decrease the credibility of review on websites. The malicious spam identification of views is therefore an important activity in the fields of machine learning (NLP- Natural Language Processing). The conventional bag-of-words model is used to recognize the text analysis characteristics of most of the current research on review spam detection and to apply traditional machine learning models such as Support Vector Machines, Random forest, Decision tree and Naïve Bayes as classifiers. With increase in the effective applications of Soft computing, the spam detection framework has achieved improved efficiency over traditional machine learning and works well with unique models and provides better solutions to complicated real-life scenarios. This paper discusses the overview of soft computing techniques in spam detection.
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)
The paper represents review on student learning outcomes on the basis of various evaluation param... more The paper represents review on student learning outcomes on the basis of various evaluation parameters which plays an important role in an education system. Student learning outcomes along with other attributes are taken into consideration like learner factor, learner engagement, learning strategies use, teacher experience, motivational beliefs and technology in learning etc. With the help of examination and evaluation we can measure student learning outcome. Classification Algorithms like Decision Tree, Naïve Bayes and Support Vector Machine can help us to classify student’s performance. This classifier helps in tracking student performance. With the use of machine learning techniques we are trying to identify whether learning outcome is achieved or not. Students learning evaluation should be done on regular basis so that true learning outcomes can be measure. Once learning outcome is evaluated on regular basis, its aggregation should be done to sum up the learning outcome of course.
The Journal of Supercomputing
Turkish Online Journal of Qualitative Inquiry, Oct 4, 2021
Materials Today: Proceedings, 2022
Turkish Online Journal of Qualitative Inquiry, Oct 16, 2021
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019
Several efforts have been made to develop strategies in order to provide mechanisms that increase... more Several efforts have been made to develop strategies in order to provide mechanisms that increase the availability, reliability, and maintainability of this type of network. The article introduced the Adaptive Neuro-Fuzzy Inference System (ANFIS) for software fault classification that is hybrid approach. ANFIS can be viewed either as a fuzzy inference system, a neural network or a fuzzy neural network (FNN). Framework is provided for combination of both numerical information and linguistic. This intelligent system is used for modelling and classifying the fault types. The proposed methods give better results in software fault detection in WSNs.
2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2020
Wireless Sensor Networks (WSN) becomes a point of intrest in technologies that is being utilized ... more Wireless Sensor Networks (WSN) becomes a point of intrest in technologies that is being utilized in several modules. The WSN have been deployed in the unattended environment, hostile and harsh for a long interval of time. By doing the good quality of service, a great challenge has been created. That introduced the faults, communication failure and sensor failures or even in a change in topologies as well. This study focuses on the various faults that can cause the network failure or may become the reason for packet loss. Numerous reliability issues arise when packet loss situation occurs in the network. Moreover, it leads to the reduction of the network performance and decrement inefficiency of the network. To tackle such kinds of faults, one should apply different fault management techniques so as to ensure reliability and increase performance as well as reliability. In this study, we reviewed several aspects related to the fault management of WSN.
International Journal of Scientific & Technology Research, 2020
Most modern programming languages support multi-threading, which is commonly required in executin... more Most modern programming languages support multi-threading, which is commonly required in executing parallel programs in mobile multimedia applications, web-servers and operating systems. Concurrency bugs are common in multi-threaded applications. Bugs like race conditions, data races and deadlocks are some problems which arise out of unsynchronized code but have to capacity to sneak in to large and complex structures and may result in giving unexpected results. Data Race is one such synchronization bug, arising out of unsynchronized code, which can stay hidden even after many rounds of testing, but can emerge as a system destroyer when it surfaces. Researchers, in last four decades have presented various tools to detect data races which are broadly classified into static, dynamic and hybrid categories. In this paper authors have focussed on data races arising in object oriented programming language-java and have presented a study of various research articles subjected towards early detection of data races. Authors hereby present a study of techniques used by different researchers and have tried to summarise the java oriented approaches to solve the problem. Authors also present a comparison on different java based tools used for data race detection.
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021
Increasing role of Artificial Intelligence (AI) has changed its shape and scope in different bran... more Increasing role of Artificial Intelligence (AI) has changed its shape and scope in different branches of the education sector. AI is going to add new features instead of changing the whole traditional system in education. This paper mentions the role of AI technologies, applications and its benefits in education. AI is involved in various education branches and improving the learning style. Contribution of AI in education sector, comparison of various machine learning algorithms like SVM classifiers, hidden Markov models, neural Networks and random forest etc has been discussed. Web-based and mobile-based applications are used commonly in education due to its easy and convenient features. Based on the consistency between Artificial Intelligence and education, analysis and relationship between the two, artificial intelligence is applied to education, which paves the way for the common development of the two.
SIP(Session Initiation Protocol ) Visualizer is related to Telecom & Development project. This to... more SIP(Session Initiation Protocol ) Visualizer is related to Telecom & Development project. This tool has been designed for visualizing SIP call flows. It shows the status of the current messages, and also of the complete scenario that is taking place. With Visualizer a user can see, how the messages are flowing from one user agent to another user agent. SIP Visualizer is totally based on the SIP Protocol. The Session Initiation Protocol is a new signaling protocol developed to setup, modify, and teardown multimedia sessions over the Internet. SIP Visualizer works where the user wants to know about his session and SIP messages to the corresponding session .In the security aspects of SIP Visualizer we have studied & analyzed security of Sip Vis and proposed a solution for end to end system security.
Our Heritage, Feb 12, 2020
Augmented Reality (AR) is an emerging field that allows the user to see the real world overlaid w... more Augmented Reality (AR) is an emerging field that allows the user to see the real world overlaid with virtual data. This paper aims to investigate the supporting role of augmented reality in navigation and road safety. The characteristics of augmented reality-based navigation systems, including a detailed discussion of the technical issues concerned, are also described. AR provides an excellent user interface for visualization in mobile computing applications, i.e., navigation and information browsing. While dealing with the automotive navigation systems, we came across the major concern, which is road safety. According tothe W.H.O report, every year, the majority of the people die because of road traffic crashes. It is also termed as the 11th leading cause of death. Due to these factors, road safety goes parallel with the automotive navigation systems.
International Journal of Advanced Research in Computer Science, Jun 25, 2017
UX Research and Design is an exciting and growing field.User Experience (UX) is a term used by re... more UX Research and Design is an exciting and growing field.User Experience (UX) is a term used by researchers and professionals in many areas.UX Research is understanding of how to conduct interviews, how to evaluating systems, and analyze systems using principles of good design [2].UX involves many subjects and it is used to describe a wide range of topics. UX Design involves the generation of good, feasible design solutions and the creation of prototypes at multiple levels of fidelity. A same product may give different impressions of user experience to different users or user groups. Hence, feedback should be generally collected from a large group of users to measure the results.By using an iterative design approach and interleaving successive phases of UX Research and Design, one can learn by making mistakes and failing fast to improve towards a product with a good UX. It is a framework with wide applicability in areas of HCI, Corporate websites, Intranets, Mobile & Tablet, Website apps/ web Usability and the growing market gives a platform for huge scope of work to be done.Also there are many UX research methods and one can decide on when to use which method.
Research Square (Research Square), Jan 6, 2023
In the era of steadily expanding e-commerce, people prefer to purchase things and commodities onl... more In the era of steadily expanding e-commerce, people prefer to purchase things and commodities online which helps them to save time and efforts. The huge quantity of these online purchase decisions is in uenced by the suggestions of previous purchasers thereby increasing the spam content on the websites. As of the prevalence of spam content on social media is rapidly expanding, the subscribers receive a large number of junk information such as malevolent links, bogus accounts, fraud news and reviews via social networking sites and are unable to differentiate between spam and legitimate texts thereby making spam recognition vital. This research paper discusses about the novel soft computing and ensemble machine learning techniques and challenges based on detection of these review spams. It uses the datasets from different hotels and extracted its reviews, creation of novel model to analyze the problem, thus resulting in overall performance of model approximately equal to 85% of accuracy.
Advances in intelligent systems and computing, 2014
RSA cryptosystem is based on the difficulty of factoring large integers. It is used in encryption... more RSA cryptosystem is based on the difficulty of factoring large integers. It is used in encryption as well as in digital signature for providing security and authenticity of information. RSA is employed in various security applications. RSA has been extensively analyzed for flaws and cryptanalytic attacks but it is still considered secure due to adequate countermeasures and improvements reported. In this paper, we present a brief overview on RSA, discuss various flaws and cryptanalytic attacks including applicability of genetic algorithm and some countermeasures to overcome from certain flaws and cryptanalytic attacks. The review study shows that RSA is a most popular secure asymmetric cryptosystem and its strength would remain intact until availability of quantum computers.
Interactive Learning Environments
International Journal of Electrical and Computer Engineering (IJECE)
Continuous attempts have been made to improve the flexibility and effectiveness of distributed co... more Continuous attempts have been made to improve the flexibility and effectiveness of distributed computing systems. Extensive effort in the fields of connectivity technologies, network programs, high processing components, and storage helps to improvise results. However, concerns such as slowness in response, long execution time, and long completion time have been identified as stumbling blocks that hinder performance and require additional attention. These defects increased the total system cost and made the data allocation procedure for a geographically dispersed setup difficult. The load-based architectural model has been strengthened to improve data allocation performance. To do this, an abstract job model is employed, and a data query file containing input data is processed on a directed acyclic graph. The jobs are executed on the processing engine with the lowest execution cost, and the system's total cost is calculated. The total cost is computed by summing the costs of com...
2022 3rd International Conference on Intelligent Engineering and Management (ICIEM)
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)
Individuals that work with web services commonly focus on internet-based feedback to make decisio... more Individuals that work with web services commonly focus on internet-based feedback to make decisions about shopping via online, booking an apartment, renting banquette halls etc., because people believe that making a decision which is based on the views of others, can contribute in making the right decision about their purchases. While publishing negative reviews or comments, brings financial benefit to manufacturers via online review websites and also increases the review spam happenings. Sentimental misinformation in feedback has therefore become a significant challenge for people to make decisions about their purchase and thus decrease the credibility of review on websites. The malicious spam identification of views is therefore an important activity in the fields of machine learning (NLP- Natural Language Processing). The conventional bag-of-words model is used to recognize the text analysis characteristics of most of the current research on review spam detection and to apply traditional machine learning models such as Support Vector Machines, Random forest, Decision tree and Naïve Bayes as classifiers. With increase in the effective applications of Soft computing, the spam detection framework has achieved improved efficiency over traditional machine learning and works well with unique models and provides better solutions to complicated real-life scenarios. This paper discusses the overview of soft computing techniques in spam detection.
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM)
The paper represents review on student learning outcomes on the basis of various evaluation param... more The paper represents review on student learning outcomes on the basis of various evaluation parameters which plays an important role in an education system. Student learning outcomes along with other attributes are taken into consideration like learner factor, learner engagement, learning strategies use, teacher experience, motivational beliefs and technology in learning etc. With the help of examination and evaluation we can measure student learning outcome. Classification Algorithms like Decision Tree, Naïve Bayes and Support Vector Machine can help us to classify student’s performance. This classifier helps in tracking student performance. With the use of machine learning techniques we are trying to identify whether learning outcome is achieved or not. Students learning evaluation should be done on regular basis so that true learning outcomes can be measure. Once learning outcome is evaluated on regular basis, its aggregation should be done to sum up the learning outcome of course.
The Journal of Supercomputing
Turkish Online Journal of Qualitative Inquiry, Oct 4, 2021
Materials Today: Proceedings, 2022
Turkish Online Journal of Qualitative Inquiry, Oct 16, 2021
2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), 2019
Several efforts have been made to develop strategies in order to provide mechanisms that increase... more Several efforts have been made to develop strategies in order to provide mechanisms that increase the availability, reliability, and maintainability of this type of network. The article introduced the Adaptive Neuro-Fuzzy Inference System (ANFIS) for software fault classification that is hybrid approach. ANFIS can be viewed either as a fuzzy inference system, a neural network or a fuzzy neural network (FNN). Framework is provided for combination of both numerical information and linguistic. This intelligent system is used for modelling and classifying the fault types. The proposed methods give better results in software fault detection in WSNs.
2020 International Conference on Computation, Automation and Knowledge Management (ICCAKM), 2020
Wireless Sensor Networks (WSN) becomes a point of intrest in technologies that is being utilized ... more Wireless Sensor Networks (WSN) becomes a point of intrest in technologies that is being utilized in several modules. The WSN have been deployed in the unattended environment, hostile and harsh for a long interval of time. By doing the good quality of service, a great challenge has been created. That introduced the faults, communication failure and sensor failures or even in a change in topologies as well. This study focuses on the various faults that can cause the network failure or may become the reason for packet loss. Numerous reliability issues arise when packet loss situation occurs in the network. Moreover, it leads to the reduction of the network performance and decrement inefficiency of the network. To tackle such kinds of faults, one should apply different fault management techniques so as to ensure reliability and increase performance as well as reliability. In this study, we reviewed several aspects related to the fault management of WSN.
International Journal of Scientific & Technology Research, 2020
Most modern programming languages support multi-threading, which is commonly required in executin... more Most modern programming languages support multi-threading, which is commonly required in executing parallel programs in mobile multimedia applications, web-servers and operating systems. Concurrency bugs are common in multi-threaded applications. Bugs like race conditions, data races and deadlocks are some problems which arise out of unsynchronized code but have to capacity to sneak in to large and complex structures and may result in giving unexpected results. Data Race is one such synchronization bug, arising out of unsynchronized code, which can stay hidden even after many rounds of testing, but can emerge as a system destroyer when it surfaces. Researchers, in last four decades have presented various tools to detect data races which are broadly classified into static, dynamic and hybrid categories. In this paper authors have focussed on data races arising in object oriented programming language-java and have presented a study of various research articles subjected towards early detection of data races. Authors hereby present a study of techniques used by different researchers and have tried to summarise the java oriented approaches to solve the problem. Authors also present a comparison on different java based tools used for data race detection.
2021 2nd International Conference on Intelligent Engineering and Management (ICIEM), 2021
Increasing role of Artificial Intelligence (AI) has changed its shape and scope in different bran... more Increasing role of Artificial Intelligence (AI) has changed its shape and scope in different branches of the education sector. AI is going to add new features instead of changing the whole traditional system in education. This paper mentions the role of AI technologies, applications and its benefits in education. AI is involved in various education branches and improving the learning style. Contribution of AI in education sector, comparison of various machine learning algorithms like SVM classifiers, hidden Markov models, neural Networks and random forest etc has been discussed. Web-based and mobile-based applications are used commonly in education due to its easy and convenient features. Based on the consistency between Artificial Intelligence and education, analysis and relationship between the two, artificial intelligence is applied to education, which paves the way for the common development of the two.
SIP(Session Initiation Protocol ) Visualizer is related to Telecom & Development project. This to... more SIP(Session Initiation Protocol ) Visualizer is related to Telecom & Development project. This tool has been designed for visualizing SIP call flows. It shows the status of the current messages, and also of the complete scenario that is taking place. With Visualizer a user can see, how the messages are flowing from one user agent to another user agent. SIP Visualizer is totally based on the SIP Protocol. The Session Initiation Protocol is a new signaling protocol developed to setup, modify, and teardown multimedia sessions over the Internet. SIP Visualizer works where the user wants to know about his session and SIP messages to the corresponding session .In the security aspects of SIP Visualizer we have studied & analyzed security of Sip Vis and proposed a solution for end to end system security.