Rajesh Phursule - Academia.edu (original) (raw)

Papers by Rajesh Phursule

Research paper thumbnail of Enhancing Traffic Flow Using Computer Vision Based - Dynamic Traffic Light Control and Lane Management

International Journal on Recent and Innovation Trends in Computing and Communication

Traffic congestion is a persistent problem in many metropolises worldwide. Despite the existence ... more Traffic congestion is a persistent problem in many metropolises worldwide. Despite the existence of traffic control systems, they are not always efficient enough to manage the ever-changing traffic density environment. The traditional approach of allocating specific times to each lane with the green light, regardless of the traffic situation, has not been very effective. In fact, it often can make the traffic congestion worse. Thus, the need for a more sophisticated system has emerged to simulate and optimize traffic control. This paper proposes the use of computer vision technology to develop a traffic control system that is based on periodic still photo feeds and compares different object detection models to find the best model for vehicle detection in our system . The system aims to enhance traffic flow by dynamically adjusting the traffic light cycles based on real-time traffic conditions.

Research paper thumbnail of A survey on privacy preserving and content protecting location based queries

International Journal of Engineering & Technology, 2017

This paper presents a solution to one of the situation-based totally question problems. This down... more This paper presents a solution to one of the situation-based totally question problems. This downside is printed as follows: (i) a user desires to question a data of area records, referred to as factors Of interest (POI), and doesn't want to reveal his/her vicinity to the server way to privacy concerns; (ii) the proprietor of the state of affairs data, that is, the place server, would not wish to effortlessly distribute its statistics to any or all users. The scenario server needs to personal a few control over its data, since the data is its fine. A location based question resolution that employs 2 protocols that allows a person to privately verify and acquire vicinity statistics. The primary step is for a consumer to in private verify his/her region victimization oblivious switch on a public grid. Oblivious switch accustomed supply the goods a more secure resolution for every parties. the second one step involves a personal information retrieval interplay that retrieves the re...

Research paper thumbnail of Augmented Reality Snipping Tool

Research paper thumbnail of Study of text classifier based data mining methods for intrusion detection domain

International Journal of Advanced Research and Development, 2017

Research paper thumbnail of Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control

International Journal of Computer Applications, 2017

Cloud computing is one of the rising and encouraging field in Information Technology. It provides... more Cloud computing is one of the rising and encouraging field in Information Technology. It provides services to an organization over a network with the ability to scale up or down their service requirements. Cloud computing services are established and provided by a third party, who having the infrastructure. Cloud computing having number of benefits but the most organizations are worried for accepting it due to security issues and challenges having with the cloud. Security requirements required at the enterprise level forces to design models that solves the organizational and distributed aspects of information usage. Such models need to present the security policies intended to protect information against unauthorized access and modification stored in a cloud. The work describe the way for modeling the security requirements from the view of tasks performed in an organization by using the cryptography concepts to store data on cloud with the less time and cost for process of encryption and decryption. In this work, the RSA and AES algorithms are used for encryption and decryption of data. The role based access control model is used to provide accessibility according to the role assigned to the user. This paper has the mathematical model for the trust calculation of the

Research paper thumbnail of The Survey of Routing Protocols in Wireless Network

Mobile Ad-hoc network (MANET) is the main research area from several years. The key component in ... more Mobile Ad-hoc network (MANET) is the main research area from several years. The key component in this is the routing of packets over the network. As the nodes in MANET are mobile it is difficult to set the fixed path. It is a challenge to route theses packets. There are many routing protocols available who has its own features. MANET has two main types table driven routing protocol and on demand routing protocol. Mainly the dynamic routing is preferable due to the mobile nature of nodes. This paper discusses the table driven as well as the on demand routing protocols of MANET.

Research paper thumbnail of Twitter Blogs Mining using Supervised Algorithm

International Journal of Computer Applications, 2015

Twitter has become one of the most popular micro blogging platforms recently. Near about 800 Mill... more Twitter has become one of the most popular micro blogging platforms recently. Near about 800 Millions of users can uses twitter micro-blogging platform to share their thoughts and opinions about different aspects? Therefore, Twitter is considered as a rich source of huge amount of information for decision making, data mining and Sentiment analysis. Sentiment analysis refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive, negative and neutral feelings with the aim of identifying attitude and opinions that are expressed in any form or language. Sentiment analysis over Twitter offers organizations a fast and effective way to monitor the public's feelings towards their products, brand, business, directors, etc. A wide range of features and methods for training sentiment classifiers for Twitter datasets have been researched in recent years with varying results. The primary issues in previous techniques are data sacristy, classification accuracy, and sarcasm, as they incorrectly classify most of the tweets with a very high percentage of tweets incorrectly classified as neutral. This work focuses on these problems and presents a supervised learning algorithm for twitter feeds classification based on a hybrid approach. The proposed method includes various pre-processing steps before feeding the text to the classifier. Experimental results show that the proposed technique overcomes the previous limitations and achieves higher accuracy, precision and higher recall when compared to similar techniques.

Research paper thumbnail of Implementation of Multi-Level Trust in Privacy Preserving Data Mining against Non-Linear Attack

International Journal of Computer Applications, 2015

The study of perturbation based Privacy Preserving Data Mining (PPDM) [1] [2] approaches introduc... more The study of perturbation based Privacy Preserving Data Mining (PPDM) [1] [2] approaches introduces random perturbation that is number of changes made in the original data. The limitation of existing work is single level trust on data miners but proposed work is focus on perturbation based PPDM to multilevel trust. [1] When data owner sends number of perturbated copy to the trusted third party, adversary cannot find the original copy from the perturbated copy means the adversary diverse from original copy this is known as the diversity attack. To prevent diversity attack is main goal of Multilevel Trust in Privacy Preserving Data Mining (MLT-PPDM) services. [1]The different MLT-PPDM algorithms are used to produce noise into original data. In existing system by applying nonlinear collusion attack on MLT-PPDM approach, it is possible to reconstruct original data. In proposed system by applying masking noise linear transformation algorithm which produce noise into original data. When same nonlinear collusion attack is applied on proposed approach it cannot reconstruct original data means it preserve the privacy. That means existing system is limited only for linear attack. [1] But proposed system is working on the non-linear attack also. Linear attack is calculating average between all perturbated copies. Nonlinear attack is calculating minimum, maximum, median function estimation.

Research paper thumbnail of A Combined Approach to DoS Attack Detection System

International Journal of Computer Applications, 2015

In the network system attack like Denial of service (DoS) is forthcoming damaging attack. The per... more In the network system attack like Denial of service (DoS) is forthcoming damaging attack. The performance of online servers degrades within seconds. Intensive computation on the target server is imposed due to this attack. Target Server gets flooded with large useless packets. The fatality server can be forced out of service From a few minutes to even several days. Eventually crucial business services running on the target fatality causes work down on the target fatality. So for the researchers it is very challenging task. The development of network-based detection mechanisms is the focus of the solution of this kind of attack. Based on these mechanisms in the existing detection systems, traffic transmitted over the protected networks get monitored. Mainly two methods are introduced for detection mechanism namely Misuse based and Anomaly based detection systems. But to enhance the detection rate they are not sufficient. In the proposed system the features which are directly associated with DoS attacks are extract by monitoring the network traffic. To generate geometrical triangular area measurements for normal profiles on the basis of these features the multivariate correlation analysis (MCA) model is used. To detect any unknown DoS attack in the network, these models are used as references. And furthermore to detect attack anomaly detection method is used. Only MCA and anomaly based system is not sufficient for accurate attack detection. So the inventive work behavioral based rule model integrated with MCA and anomaly, as a hybrid model used to enhance the accuracy of DoS attack detection. In proposed inventive model behavioral rules are generated for suspected packets and ultimately detection accuracy as well as detection rate get increased.

Research paper thumbnail of An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network

International Journal of Computer Applications, 2015

Research paper thumbnail of Online Cost Sensitive Domain Knowledge Adaption

International Journal of Computer Applications, 2015

In online learning, classifier is updated as records get available sequentially with the help of ... more In online learning, classifier is updated as records get available sequentially with the help of time. The misclassifications depends on the class which has been wrongly classified. Above both concepts are largely studied in data mining .In Cost sensitive online learning classification , cost of the misclassification is considered during online learning of the classifier. In domain knowledge adaption, Knowledge (Classifier) from source domain is adapted to target domain considering cost of misclassification. So accuracy of the system is increased. In proposed work cost of the misclassification is considered to adapt the knowledge from source domain to target domain .The proposed system uses the concept of cost sensitive online learning based knowledge transfer. In existing knowledge transfer system i.e.in OTL cost of misclassification is not considered while transferring knowledge from source domain to target domain. But in proposed system cost of misclassification is considered while updating classifier on sequentially coming data. To evaluate the approach spam base dataset is used and the implemented system gives better results.

Research paper thumbnail of Augmented Analytics and Modern Business Intelligence Adoption to Maximize Business Value

Journal of University of Shanghai for Science and Technology

The business success is critical for any organization irrespective of its size. Understanding bus... more The business success is critical for any organization irrespective of its size. Understanding business value and advanced technology capabilities in Business Intelligence (BI) solutions for analysis and decision making is the need of every management, researchers and analysts. Data is available at every corner, at every platform and it is being produced all the way using digital equipment. These complex data sets for analysis and decision-making can be used on various platforms and are more accessible than ever to find insights and explanations. There is an abundance of datasets and data analysts, but organizations are still unable to leverage its potential to the fullest and this perhaps is the failure of most data analytics initiatives. This paper covers the need for Augmented Analytics adoption in companies to maximize business value with respect to added advanced analytics capabilities in BI Tools for effective, accurate and timely decision making, and business analysis.

Research paper thumbnail of Design of Detection System using Deep Learning Algorithm for Attack on Network

2022 IEEE 7th International conference for Convergence in Technology (I2CT)

Research paper thumbnail of Effective Prediction of Heart Disease: Data Mining in Healthcare Domain

2022 IEEE 7th International conference for Convergence in Technology (I2CT)

Research paper thumbnail of Global Journal of Engineering Science and Researches Topic Detection from Online Social Media

From last few decades there is wide spread usage of social network platforms such as twitter or o... more From last few decades there is wide spread usage of social network platforms such as twitter or other micro blogging systems which contains huge amount of timely generated data. Tweeter is fastest means of information sharing where user shares event/news which take place in front of them. Thus Tweeter act as news portal where news reaches to the people within fraction of seconds. Extracting valuable information in timely manner is important because this wealthy information is useful for companies, government agencies and health organizations. Topic detection is the new research area in data mining and knowledge discovery where extracting useful and valuable information from timely generated online streams is the new challenge. In this article we survey the different algorithms used for trending topic and event detection using social media data and proposes new system for topic detection from social media.

Research paper thumbnail of Algorithmic Clustering Techniques

Clustering the documents based on similarity of words and searching the text is major search proc... more Clustering the documents based on similarity of words and searching the text is major search procedure and widely used for large set of documents. Documents can be clustered using many clustering algorithms such as Nearest Neighbor, K-Means, Hierarchical, Graph Theoretic etc [4] [5] [7]. The performance measurement in terms of space complexity and execution time and searched output in terms of accuracy and redundancy of these algorithms is a needful study [3]. This paper mainly focuses on performance measurement of Nearest Neighbor, K-Means and Hierarchical agglomerative clustering algorithms on text documents as well as compares them in terms of space complexity, execution time, accuracy and redundancy. In particular, preprocess the input text document and convert it into the document graph represented in the form of matrix. Then convert that document graph into relation matrix which gives relation (similarity score) among all the nodes from 0 to 1 [2]. Implementation and the resul...

Research paper thumbnail of Multiple-Keyword Ranking Search Over Encrypted Data with Secure and Dynamic Operation

International Journal of Advance Engineering and Research Development, 2017

A Secure and Dynamic Multi-keyword Ranked explore Scheme over Encrypted Cloud Data Due to the inc... more A Secure and Dynamic Multi-keyword Ranked explore Scheme over Encrypted Cloud Data Due to the increasing regard of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data operation like keyword-based essay retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. We construct a special treebased index structure and propose a Greedy Depth-first Search algorithm to provide efficient multi-keyword ranked search. The locked KNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure perfect importance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are extra to the index vector for blind search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.

Research paper thumbnail of Password Authentication Key Exchange By Two Server Password Only in Web Applications

In the world of communication there is need of secure transmission of message so password based a... more In the world of communication there is need of secure transmission of message so password based authentication make a client and a server to authenticate and established a session key through Deffie Hellman and ElGamal protocol. In single server architecture, passwords are stored in single server only, if it got hacked through attack, the password will get easily accessed by the intruder .To solve this problem two server with password authenticated key exchange is used where symmetric or asymmetric way is applied .So in the symmetric protocol which is used to initialized our secure transmission ,client can form cryptographic keys in two servers. The efficiency of protocol is better ,It is cost effective and lead to parallel execution of servers which are included for registration and authentication.

Research paper thumbnail of Performance based Analysis and Comparison of Multi-Algorithmic Clustering Techniques

International Journal of Computer Applications, 2012

the documents based on similarity of words and searching the text is major search procedure and w... more the documents based on similarity of words and searching the text is major search procedure and widely used for large set of documents. Documents can be clustered using many clustering algorithms such as Nearest Neighbor, K- Means, Hierarchical, Graph Theoretic etc (4) (5) (7). The performance measurement in terms of space complexity and execution time and searched output in terms of accuracy and redundancy of these algorithms is a needful study (3). This paper mainly focuses on performance measurement of Nearest Neighbor, K-Means and Hierarchical agglomerative clustering algorithms on text documents as well as compares them in terms of space complexity, execution time, accuracy and redundancy. In particular, preprocess the input text document and convert it into the document graph represented in the form of matrix. Then convert that document graph into relation matrix which gives relation (similarity score) among all the nodes from 0 to 1 (2). Implementation and the results of appl...

Research paper thumbnail of Detection and Prevention of Attacks in MANET

A mobile ad hoc network (MANET) is introduced as a self-configuring infrastructure-less network o... more A mobile ad hoc network (MANET) is introduced as a self-configuring infrastructure-less network of mobile devices connected by wireless. MANETs each device is able to move individually in any direction, so they can change its links to other devices regularly, they change their locations. To hide node identities and/or routes from outside viewers in order to provide anonymity security Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols. Current anonymous routing protocols depend on either hop-by-hop encryption or terminated traffic; either generates high cost or cannot provide full anonymity security to data sources, destinations, and routes. We use an Anonymous Location-based Efficient Routing protocol (ALERT) to minimize the cost. ALERT hides the data sources/destinations among many sources/destinations to reinforce source and destination anonymity security. ALERT offers anonymity security to sources, destinations, and routes. ALERT has strategies to counter intersectio...

Research paper thumbnail of Enhancing Traffic Flow Using Computer Vision Based - Dynamic Traffic Light Control and Lane Management

International Journal on Recent and Innovation Trends in Computing and Communication

Traffic congestion is a persistent problem in many metropolises worldwide. Despite the existence ... more Traffic congestion is a persistent problem in many metropolises worldwide. Despite the existence of traffic control systems, they are not always efficient enough to manage the ever-changing traffic density environment. The traditional approach of allocating specific times to each lane with the green light, regardless of the traffic situation, has not been very effective. In fact, it often can make the traffic congestion worse. Thus, the need for a more sophisticated system has emerged to simulate and optimize traffic control. This paper proposes the use of computer vision technology to develop a traffic control system that is based on periodic still photo feeds and compares different object detection models to find the best model for vehicle detection in our system . The system aims to enhance traffic flow by dynamically adjusting the traffic light cycles based on real-time traffic conditions.

Research paper thumbnail of A survey on privacy preserving and content protecting location based queries

International Journal of Engineering & Technology, 2017

This paper presents a solution to one of the situation-based totally question problems. This down... more This paper presents a solution to one of the situation-based totally question problems. This downside is printed as follows: (i) a user desires to question a data of area records, referred to as factors Of interest (POI), and doesn't want to reveal his/her vicinity to the server way to privacy concerns; (ii) the proprietor of the state of affairs data, that is, the place server, would not wish to effortlessly distribute its statistics to any or all users. The scenario server needs to personal a few control over its data, since the data is its fine. A location based question resolution that employs 2 protocols that allows a person to privately verify and acquire vicinity statistics. The primary step is for a consumer to in private verify his/her region victimization oblivious switch on a public grid. Oblivious switch accustomed supply the goods a more secure resolution for every parties. the second one step involves a personal information retrieval interplay that retrieves the re...

Research paper thumbnail of Augmented Reality Snipping Tool

Research paper thumbnail of Study of text classifier based data mining methods for intrusion detection domain

International Journal of Advanced Research and Development, 2017

Research paper thumbnail of Developing Secure Cloud Storage System by Integrating Trust and Cryptographic Algorithms with Role based Access Control

International Journal of Computer Applications, 2017

Cloud computing is one of the rising and encouraging field in Information Technology. It provides... more Cloud computing is one of the rising and encouraging field in Information Technology. It provides services to an organization over a network with the ability to scale up or down their service requirements. Cloud computing services are established and provided by a third party, who having the infrastructure. Cloud computing having number of benefits but the most organizations are worried for accepting it due to security issues and challenges having with the cloud. Security requirements required at the enterprise level forces to design models that solves the organizational and distributed aspects of information usage. Such models need to present the security policies intended to protect information against unauthorized access and modification stored in a cloud. The work describe the way for modeling the security requirements from the view of tasks performed in an organization by using the cryptography concepts to store data on cloud with the less time and cost for process of encryption and decryption. In this work, the RSA and AES algorithms are used for encryption and decryption of data. The role based access control model is used to provide accessibility according to the role assigned to the user. This paper has the mathematical model for the trust calculation of the

Research paper thumbnail of The Survey of Routing Protocols in Wireless Network

Mobile Ad-hoc network (MANET) is the main research area from several years. The key component in ... more Mobile Ad-hoc network (MANET) is the main research area from several years. The key component in this is the routing of packets over the network. As the nodes in MANET are mobile it is difficult to set the fixed path. It is a challenge to route theses packets. There are many routing protocols available who has its own features. MANET has two main types table driven routing protocol and on demand routing protocol. Mainly the dynamic routing is preferable due to the mobile nature of nodes. This paper discusses the table driven as well as the on demand routing protocols of MANET.

Research paper thumbnail of Twitter Blogs Mining using Supervised Algorithm

International Journal of Computer Applications, 2015

Twitter has become one of the most popular micro blogging platforms recently. Near about 800 Mill... more Twitter has become one of the most popular micro blogging platforms recently. Near about 800 Millions of users can uses twitter micro-blogging platform to share their thoughts and opinions about different aspects? Therefore, Twitter is considered as a rich source of huge amount of information for decision making, data mining and Sentiment analysis. Sentiment analysis refers to a classification problem where the main focus is to predict the polarity of words and then classify them into positive, negative and neutral feelings with the aim of identifying attitude and opinions that are expressed in any form or language. Sentiment analysis over Twitter offers organizations a fast and effective way to monitor the public's feelings towards their products, brand, business, directors, etc. A wide range of features and methods for training sentiment classifiers for Twitter datasets have been researched in recent years with varying results. The primary issues in previous techniques are data sacristy, classification accuracy, and sarcasm, as they incorrectly classify most of the tweets with a very high percentage of tweets incorrectly classified as neutral. This work focuses on these problems and presents a supervised learning algorithm for twitter feeds classification based on a hybrid approach. The proposed method includes various pre-processing steps before feeding the text to the classifier. Experimental results show that the proposed technique overcomes the previous limitations and achieves higher accuracy, precision and higher recall when compared to similar techniques.

Research paper thumbnail of Implementation of Multi-Level Trust in Privacy Preserving Data Mining against Non-Linear Attack

International Journal of Computer Applications, 2015

The study of perturbation based Privacy Preserving Data Mining (PPDM) [1] [2] approaches introduc... more The study of perturbation based Privacy Preserving Data Mining (PPDM) [1] [2] approaches introduces random perturbation that is number of changes made in the original data. The limitation of existing work is single level trust on data miners but proposed work is focus on perturbation based PPDM to multilevel trust. [1] When data owner sends number of perturbated copy to the trusted third party, adversary cannot find the original copy from the perturbated copy means the adversary diverse from original copy this is known as the diversity attack. To prevent diversity attack is main goal of Multilevel Trust in Privacy Preserving Data Mining (MLT-PPDM) services. [1]The different MLT-PPDM algorithms are used to produce noise into original data. In existing system by applying nonlinear collusion attack on MLT-PPDM approach, it is possible to reconstruct original data. In proposed system by applying masking noise linear transformation algorithm which produce noise into original data. When same nonlinear collusion attack is applied on proposed approach it cannot reconstruct original data means it preserve the privacy. That means existing system is limited only for linear attack. [1] But proposed system is working on the non-linear attack also. Linear attack is calculating average between all perturbated copies. Nonlinear attack is calculating minimum, maximum, median function estimation.

Research paper thumbnail of A Combined Approach to DoS Attack Detection System

International Journal of Computer Applications, 2015

In the network system attack like Denial of service (DoS) is forthcoming damaging attack. The per... more In the network system attack like Denial of service (DoS) is forthcoming damaging attack. The performance of online servers degrades within seconds. Intensive computation on the target server is imposed due to this attack. Target Server gets flooded with large useless packets. The fatality server can be forced out of service From a few minutes to even several days. Eventually crucial business services running on the target fatality causes work down on the target fatality. So for the researchers it is very challenging task. The development of network-based detection mechanisms is the focus of the solution of this kind of attack. Based on these mechanisms in the existing detection systems, traffic transmitted over the protected networks get monitored. Mainly two methods are introduced for detection mechanism namely Misuse based and Anomaly based detection systems. But to enhance the detection rate they are not sufficient. In the proposed system the features which are directly associated with DoS attacks are extract by monitoring the network traffic. To generate geometrical triangular area measurements for normal profiles on the basis of these features the multivariate correlation analysis (MCA) model is used. To detect any unknown DoS attack in the network, these models are used as references. And furthermore to detect attack anomaly detection method is used. Only MCA and anomaly based system is not sufficient for accurate attack detection. So the inventive work behavioral based rule model integrated with MCA and anomaly, as a hybrid model used to enhance the accuracy of DoS attack detection. In proposed inventive model behavioral rules are generated for suspected packets and ultimately detection accuracy as well as detection rate get increased.

Research paper thumbnail of An Improved the Optimal Distributed Dummy Signature for Malicious Software in Mobile Network

International Journal of Computer Applications, 2015

Research paper thumbnail of Online Cost Sensitive Domain Knowledge Adaption

International Journal of Computer Applications, 2015

In online learning, classifier is updated as records get available sequentially with the help of ... more In online learning, classifier is updated as records get available sequentially with the help of time. The misclassifications depends on the class which has been wrongly classified. Above both concepts are largely studied in data mining .In Cost sensitive online learning classification , cost of the misclassification is considered during online learning of the classifier. In domain knowledge adaption, Knowledge (Classifier) from source domain is adapted to target domain considering cost of misclassification. So accuracy of the system is increased. In proposed work cost of the misclassification is considered to adapt the knowledge from source domain to target domain .The proposed system uses the concept of cost sensitive online learning based knowledge transfer. In existing knowledge transfer system i.e.in OTL cost of misclassification is not considered while transferring knowledge from source domain to target domain. But in proposed system cost of misclassification is considered while updating classifier on sequentially coming data. To evaluate the approach spam base dataset is used and the implemented system gives better results.

Research paper thumbnail of Augmented Analytics and Modern Business Intelligence Adoption to Maximize Business Value

Journal of University of Shanghai for Science and Technology

The business success is critical for any organization irrespective of its size. Understanding bus... more The business success is critical for any organization irrespective of its size. Understanding business value and advanced technology capabilities in Business Intelligence (BI) solutions for analysis and decision making is the need of every management, researchers and analysts. Data is available at every corner, at every platform and it is being produced all the way using digital equipment. These complex data sets for analysis and decision-making can be used on various platforms and are more accessible than ever to find insights and explanations. There is an abundance of datasets and data analysts, but organizations are still unable to leverage its potential to the fullest and this perhaps is the failure of most data analytics initiatives. This paper covers the need for Augmented Analytics adoption in companies to maximize business value with respect to added advanced analytics capabilities in BI Tools for effective, accurate and timely decision making, and business analysis.

Research paper thumbnail of Design of Detection System using Deep Learning Algorithm for Attack on Network

2022 IEEE 7th International conference for Convergence in Technology (I2CT)

Research paper thumbnail of Effective Prediction of Heart Disease: Data Mining in Healthcare Domain

2022 IEEE 7th International conference for Convergence in Technology (I2CT)

Research paper thumbnail of Global Journal of Engineering Science and Researches Topic Detection from Online Social Media

From last few decades there is wide spread usage of social network platforms such as twitter or o... more From last few decades there is wide spread usage of social network platforms such as twitter or other micro blogging systems which contains huge amount of timely generated data. Tweeter is fastest means of information sharing where user shares event/news which take place in front of them. Thus Tweeter act as news portal where news reaches to the people within fraction of seconds. Extracting valuable information in timely manner is important because this wealthy information is useful for companies, government agencies and health organizations. Topic detection is the new research area in data mining and knowledge discovery where extracting useful and valuable information from timely generated online streams is the new challenge. In this article we survey the different algorithms used for trending topic and event detection using social media data and proposes new system for topic detection from social media.

Research paper thumbnail of Algorithmic Clustering Techniques

Clustering the documents based on similarity of words and searching the text is major search proc... more Clustering the documents based on similarity of words and searching the text is major search procedure and widely used for large set of documents. Documents can be clustered using many clustering algorithms such as Nearest Neighbor, K-Means, Hierarchical, Graph Theoretic etc [4] [5] [7]. The performance measurement in terms of space complexity and execution time and searched output in terms of accuracy and redundancy of these algorithms is a needful study [3]. This paper mainly focuses on performance measurement of Nearest Neighbor, K-Means and Hierarchical agglomerative clustering algorithms on text documents as well as compares them in terms of space complexity, execution time, accuracy and redundancy. In particular, preprocess the input text document and convert it into the document graph represented in the form of matrix. Then convert that document graph into relation matrix which gives relation (similarity score) among all the nodes from 0 to 1 [2]. Implementation and the resul...

Research paper thumbnail of Multiple-Keyword Ranking Search Over Encrypted Data with Secure and Dynamic Operation

International Journal of Advance Engineering and Research Development, 2017

A Secure and Dynamic Multi-keyword Ranked explore Scheme over Encrypted Cloud Data Due to the inc... more A Secure and Dynamic Multi-keyword Ranked explore Scheme over Encrypted Cloud Data Due to the increasing regard of cloud computing, more and more data owners are motivated to outsource their data to cloud servers for great convenience and reduced cost in data management. However, sensitive data should be encrypted before outsourcing for privacy requirements, which obsoletes data operation like keyword-based essay retrieval. In this paper, we present a secure multi-keyword ranked search scheme over encrypted cloud data, which simultaneously supports dynamic update operations like deletion and insertion of documents. Specifically, the vector space model and the widely-used TFIDF model are combined in the index construction and query generation. We construct a special treebased index structure and propose a Greedy Depth-first Search algorithm to provide efficient multi-keyword ranked search. The locked KNN algorithm is utilized to encrypt the index and query vectors, and meanwhile ensure perfect importance score calculation between encrypted index and query vectors. In order to resist statistical attacks, phantom terms are extra to the index vector for blind search results. Due to the use of our special tree-based index structure, the proposed scheme can achieve sub-linear search time and deal with the deletion and insertion of documents flexibly. Extensive experiments are conducted to demonstrate the efficiency of the proposed scheme.

Research paper thumbnail of Password Authentication Key Exchange By Two Server Password Only in Web Applications

In the world of communication there is need of secure transmission of message so password based a... more In the world of communication there is need of secure transmission of message so password based authentication make a client and a server to authenticate and established a session key through Deffie Hellman and ElGamal protocol. In single server architecture, passwords are stored in single server only, if it got hacked through attack, the password will get easily accessed by the intruder .To solve this problem two server with password authenticated key exchange is used where symmetric or asymmetric way is applied .So in the symmetric protocol which is used to initialized our secure transmission ,client can form cryptographic keys in two servers. The efficiency of protocol is better ,It is cost effective and lead to parallel execution of servers which are included for registration and authentication.

Research paper thumbnail of Performance based Analysis and Comparison of Multi-Algorithmic Clustering Techniques

International Journal of Computer Applications, 2012

the documents based on similarity of words and searching the text is major search procedure and w... more the documents based on similarity of words and searching the text is major search procedure and widely used for large set of documents. Documents can be clustered using many clustering algorithms such as Nearest Neighbor, K- Means, Hierarchical, Graph Theoretic etc (4) (5) (7). The performance measurement in terms of space complexity and execution time and searched output in terms of accuracy and redundancy of these algorithms is a needful study (3). This paper mainly focuses on performance measurement of Nearest Neighbor, K-Means and Hierarchical agglomerative clustering algorithms on text documents as well as compares them in terms of space complexity, execution time, accuracy and redundancy. In particular, preprocess the input text document and convert it into the document graph represented in the form of matrix. Then convert that document graph into relation matrix which gives relation (similarity score) among all the nodes from 0 to 1 (2). Implementation and the results of appl...

Research paper thumbnail of Detection and Prevention of Attacks in MANET

A mobile ad hoc network (MANET) is introduced as a self-configuring infrastructure-less network o... more A mobile ad hoc network (MANET) is introduced as a self-configuring infrastructure-less network of mobile devices connected by wireless. MANETs each device is able to move individually in any direction, so they can change its links to other devices regularly, they change their locations. To hide node identities and/or routes from outside viewers in order to provide anonymity security Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols. Current anonymous routing protocols depend on either hop-by-hop encryption or terminated traffic; either generates high cost or cannot provide full anonymity security to data sources, destinations, and routes. We use an Anonymous Location-based Efficient Routing protocol (ALERT) to minimize the cost. ALERT hides the data sources/destinations among many sources/destinations to reinforce source and destination anonymity security. ALERT offers anonymity security to sources, destinations, and routes. ALERT has strategies to counter intersectio...