Geeta Atkar - Academia.edu (original) (raw)
Papers by Geeta Atkar
Neural Computing & Applications, 2021
Children learn and develop their abilities at their own pace. One of the most basic skills that t... more Children learn and develop their abilities at their own pace. One of the most basic skills that they acquire is reading. However, some children struggle with reading longer than their friends, and in such a case, it is possible that they have a learning disorder known as dyslexia. The paper aims to use neural networks, namely generative neural networks, for generating raw audio data of two- or three-letter Hindi words. Using the generated data, a system will be built that will pronounce generated words for children recuperating from dyslexia. The system aims to be an effective helping tool for teachers to speed up the recuperation process by making the child repeat the correct pronunciation of the word. The system uses advance Mel-generative adversarial network neural network for working with Mel-spectrograms of the raw audio, by which the system will model its own audio iteratively, until a satisfactory result is achieved. Generated audio sample contains the Hindi words which will ...
Now a day’s online payment gaining popularity because of easy and convenience use of ecommerce. I... more Now a day’s online payment gaining popularity because of easy and convenience use of ecommerce. It became very easy mode of payment. People choose online payment and e-shopping; because of time convenience, transport convenience, etc. As the result of huge amount of e-commerce use, there is a vast increment in credit card fraud also. Machine Learning has been successfully applied to finance databases to automate analysis of huge volumes of complex data. Machine Learning has also played a salient role in the detection of credit card fraud in online transactions. Fraud detection in credit card is a big problem, it becomes challenging due to two major reasons–first, the profiles of normal and fraudulent behaviors change frequently and secondly due to reason that credit card fraud data sets are highly skewed. KeywordsData Analysis, Fraud in credit card, naïve bayes, Machine Learning, Security.
Cryptography is one of the ways to secure data while transmitting from one location to another. T... more Cryptography is one of the ways to secure data while transmitting from one location to another. There are number of techniques to secure a data by using cryptography. This paper focuses on Substitution Cipher by using Multiple Substitution Table. In ESC (Extended Substitution Cipher), the key has two parts. The first part is used as a seed value and the second part is ‘n’ which is used to generate n different substitution cipher which will be used for encrypting the plain text. After generating cipher text two attacks are applied one is Brute Force attack and another one is frequency analysis attack. Results are generated. This is fastest and improved method for generating cipher text.
Dyslexia" is disorder normally occurred in children. In which they are unable to learn the things... more Dyslexia" is disorder normally occurred in children. In which they are unable to learn the things easily as like normal children. Such kids are considered as Dyslexic Children. Main objective of this paper is to assist such child for easy readability the paper focuses on reading disability of Hindi words. Children of age five to seven years are considered as target, which are having problem in reading. Here some of the software based techniques and some hardware based techniques are discussed. Total 600 sounds of Hindi two letters and three letters words are taken as an input. These audios are trained by using Dynamic Time wrapping algorithm. Their results are compared. After training whenever this system will be used as assistive system for dyslexic children. They should be easily read and recognize the word.
Firewalls are fundamental elements in Internet network security. A firewall always identifies eve... more Firewalls are fundamental elements in Internet network security. A firewall always identifies every incoming or outgoing packets and takes decision of whether to accept or discard that packet. This decision of firewall is based on its policy. A firewall is nothing but a security protector sited at the point of entry among a private web and also the outdoor network such that entire incoming and outgoing packets must pass through it. Though there is firewall rules management, mainly in multi-firewall enterprise network the management system has become a difficult and complex task. Previous search on firewall optimization concentrates on intra-firewall and inter-firewall optimization within some administrative domain in which the privacy of firewall policies is not a concern. Filtering rules of firewall have to be written, well-ordered and dispersed with care so as to avoid firewall policy anomalies which may cause vulnerability of network. Hence, inserting or updating filtering rules ...
Lecture Notes in Electrical Engineering, 2019
Dyslexia is type of disorder that occurs normally in children, and is also called as learning dis... more Dyslexia is type of disorder that occurs normally in children, and is also called as learning disability. Children who are having dyslexia, requires more time to read, write as compared to normal children. There are different kinds of disabilities which come under dyslexia like dysgraphia, and dyscalculia but this paper focuses on reading disability in children. Here, children between 8 and 10 years will be taught on most frequently used Hindi words. First, frequently used Hindi words will be created as a database and then the system is trained with those input words. Speech synthesis is applied to those words to get speech output from the trained system. Children will be given a set of words to read. If children are saying the wrong word three times then the system will give correct speech and train the children. This makes the process automatic and the system acts as a personal trainer to the dyslexic children. By doing this model, the children can learn in a more interactive mann...
Neural Computing & Applications, 2021
Children learn and develop their abilities at their own pace. One of the most basic skills that t... more Children learn and develop their abilities at their own pace. One of the most basic skills that they acquire is reading. However, some children struggle with reading longer than their friends, and in such a case, it is possible that they have a learning disorder known as dyslexia. The paper aims to use neural networks, namely generative neural networks, for generating raw audio data of two- or three-letter Hindi words. Using the generated data, a system will be built that will pronounce generated words for children recuperating from dyslexia. The system aims to be an effective helping tool for teachers to speed up the recuperation process by making the child repeat the correct pronunciation of the word. The system uses advance Mel-generative adversarial network neural network for working with Mel-spectrograms of the raw audio, by which the system will model its own audio iteratively, until a satisfactory result is achieved. Generated audio sample contains the Hindi words which will ...
Now a day’s online payment gaining popularity because of easy and convenience use of ecommerce. I... more Now a day’s online payment gaining popularity because of easy and convenience use of ecommerce. It became very easy mode of payment. People choose online payment and e-shopping; because of time convenience, transport convenience, etc. As the result of huge amount of e-commerce use, there is a vast increment in credit card fraud also. Machine Learning has been successfully applied to finance databases to automate analysis of huge volumes of complex data. Machine Learning has also played a salient role in the detection of credit card fraud in online transactions. Fraud detection in credit card is a big problem, it becomes challenging due to two major reasons–first, the profiles of normal and fraudulent behaviors change frequently and secondly due to reason that credit card fraud data sets are highly skewed. KeywordsData Analysis, Fraud in credit card, naïve bayes, Machine Learning, Security.
Cryptography is one of the ways to secure data while transmitting from one location to another. T... more Cryptography is one of the ways to secure data while transmitting from one location to another. There are number of techniques to secure a data by using cryptography. This paper focuses on Substitution Cipher by using Multiple Substitution Table. In ESC (Extended Substitution Cipher), the key has two parts. The first part is used as a seed value and the second part is ‘n’ which is used to generate n different substitution cipher which will be used for encrypting the plain text. After generating cipher text two attacks are applied one is Brute Force attack and another one is frequency analysis attack. Results are generated. This is fastest and improved method for generating cipher text.
Dyslexia" is disorder normally occurred in children. In which they are unable to learn the things... more Dyslexia" is disorder normally occurred in children. In which they are unable to learn the things easily as like normal children. Such kids are considered as Dyslexic Children. Main objective of this paper is to assist such child for easy readability the paper focuses on reading disability of Hindi words. Children of age five to seven years are considered as target, which are having problem in reading. Here some of the software based techniques and some hardware based techniques are discussed. Total 600 sounds of Hindi two letters and three letters words are taken as an input. These audios are trained by using Dynamic Time wrapping algorithm. Their results are compared. After training whenever this system will be used as assistive system for dyslexic children. They should be easily read and recognize the word.
Firewalls are fundamental elements in Internet network security. A firewall always identifies eve... more Firewalls are fundamental elements in Internet network security. A firewall always identifies every incoming or outgoing packets and takes decision of whether to accept or discard that packet. This decision of firewall is based on its policy. A firewall is nothing but a security protector sited at the point of entry among a private web and also the outdoor network such that entire incoming and outgoing packets must pass through it. Though there is firewall rules management, mainly in multi-firewall enterprise network the management system has become a difficult and complex task. Previous search on firewall optimization concentrates on intra-firewall and inter-firewall optimization within some administrative domain in which the privacy of firewall policies is not a concern. Filtering rules of firewall have to be written, well-ordered and dispersed with care so as to avoid firewall policy anomalies which may cause vulnerability of network. Hence, inserting or updating filtering rules ...
Lecture Notes in Electrical Engineering, 2019
Dyslexia is type of disorder that occurs normally in children, and is also called as learning dis... more Dyslexia is type of disorder that occurs normally in children, and is also called as learning disability. Children who are having dyslexia, requires more time to read, write as compared to normal children. There are different kinds of disabilities which come under dyslexia like dysgraphia, and dyscalculia but this paper focuses on reading disability in children. Here, children between 8 and 10 years will be taught on most frequently used Hindi words. First, frequently used Hindi words will be created as a database and then the system is trained with those input words. Speech synthesis is applied to those words to get speech output from the trained system. Children will be given a set of words to read. If children are saying the wrong word three times then the system will give correct speech and train the children. This makes the process automatic and the system acts as a personal trainer to the dyslexic children. By doing this model, the children can learn in a more interactive mann...