WARISH PATEL - Academia.edu (original) (raw)
Papers by WARISH PATEL
2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Jan 27, 2023
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
Journal of Information and Optimization Sciences
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Association rule mining forms the core of data mining and it is termed as one of the well-known m... more Association rule mining forms the core of data mining and it is termed as one of the well-known methodologies of data mining. Objectives of mining is to find interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, Association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. For efficient targeted query processing, finding frequent patterns and itemset mining, there is an efficient way to generate an itemset tree structure named Memory Efficient Itemset Tree. Memory efficient IT is efficient for storing itemsets, but takes more time as compare to traditional IT. The proposed strategy generates maximal frequent itemsets from memory efficient itemset tree by using levelwise pruning. For that firstly pre-pruning of items based on minimum support count is carried out followed by itemset tree reconstruction. By having maximal frequent i...
2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2018
Internet of Things is a new emerging technology by which devices can communicate using internet. ... more Internet of Things is a new emerging technology by which devices can communicate using internet. The proposed work (i-NXGeVita), Intelligent Next Generation Vital Signs Monitoring System, states that how to apply Internet of Things in Healthcare using Machine Learning Techniques. Indeed, connect Internet of Medical Things (IoMT) to patient will be helping Doctors and Caregivers to monitor him or her in real-time around the globe. The IoMT devices will collect Vital Signs data such as body temperature, pulse rate, heartbeats (signals), using ECG (Electrocardiogram) sensor, Temperature sensor, etc. That will be stored in the Cloud System and it will synchronize with the local server. Machine Learning comes to analyze those data to identify health risks and estimate severity in real-time by using its Algorithms. i-NXGeVita based on Deep Neural Networks (DNN) and IoMT can differentiate between Normal and Abnormal Heartbeats and classify different Abnormal Rhythms. Such techniques will b...
Lecture Notes in Networks and Systems, 2021
International Journal of Computer Applications, 2015
Association rule mining forms the core of data mining and it is termed as one of the well-researc... more Association rule mining forms the core of data mining and it is termed as one of the well-researched techniques of data mining. It aims to extract interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, Association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. This paper provides the preliminaries of basic concepts about Itemset mining and survey the list of existing tree structure algorithms. These algorithms include various tasks such as fast query processing, optimizing memory space and reducing tree construction time. For mining maximal frequent pattern various algorithms used which optimization the search space for pruning.
2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), 2014
Information explosion is a well known phenomenon now and there is a vast amount of research going... more Information explosion is a well known phenomenon now and there is a vast amount of research going on into how best to handle and process huge amounts of data. One such idea for processing enormous quantities of data is Google's Map/Reduce. Map/Reduce was first introduced by Google engineers - Jeffrey Dean and Sanjay Ghemawat [9]. It was designed for and is still used at Google for processing large amounts of raw data (like crawled documents and web-request logs) to produce various kinds of derived data (like inverted indices, web-page summaries, etc.). It is a simple yet powerful framework for implementing distributed applications without having extensive prior knowledge of the intricacies involved in a distributed system. It is highly scalable and works on a cluster of commodity machines with integrated mechanisms for fault tolerance. The programmer is only required to write specialized map and reduce functions as part of the Map/Reduce job and the Map/Reduce framework takes care of the rest. It distributes the data across the cluster, instantiates multiple copies of the map and reduce functions in parallel, and takes care of any system failures that might occur during the execution. Since its inception at Google, Map/Reduce has found many adopters. Among them, the prominent one is the Apache Software Foundation, which has developed an Open-Source version of the Map/Reduce framework called Hadoop [2]. Hadoop boasts of a number of large web-based corporate like Yahoo, Facebook, Amazon, etc., that use it for various kinds of data-warehousing purposes. Facebook for instance, uses it to store copies of internal logs and uses it as a source for reporting and machine learning. Owing to its ease of use, installation and implementation, Hadoop has found many uses among programmers. One of them is query evaluation over large datasets. And one of the most important queries are Joins. This project explores the existing solutions, extends them and proposes a few new ideas for joining datasets using Hadoop. Algorithms have been broken into two categories - Two-Way joins and Multi-Way joins. Join algorithms are then discussed and evaluated under both categories. Options to pre-process data in order to improve performance have also been explored. The results are expected to give an insight into how good a fit Hadoop or Map/Reduce is for evaluating Joins.
Microbiology Spectrum, 2014
Two related tyrosine recombinases, XerC and XerD, are encoded in the genome of most bacteria wher... more Two related tyrosine recombinases, XerC and XerD, are encoded in the genome of most bacteria where they serve to resolve dimers of circular chromosomes by the addition of a crossover at a specific site, dif . From a structural and biochemical point of view they belong to the Cre resolvase family of tyrosine recombinases. Correspondingly, they are exploited for the resolution of multimers of numerous plasmids. In addition, they are exploited by mobile DNA elements to integrate into the genome of their host. Exploitation of Xer is likely to be advantageous to mobile elements because the conservation of the Xer recombinases and of the sequence of their chromosomal target should permit a quite easy extension of their host range. However, it requires means to overcome the cellular mechanisms that normally restrict recombination to dif sites harbored by a chromosome dimer and, in the case of integrative mobile elements, to convert dedicated tyrosine resolvases into integrases.
Mantech Publications eBooks, 2021
These days hardly anyone goes to the polls because of their tight schedule. There are numerous re... more These days hardly anyone goes to the polls because of their tight schedule. There are numerous reasons, and some may need to go to the polls, we may need to wait in long lines, many may be drained due to their tight schedules. So we have created a webbased voting system. But this system has some drawbacks. Phishing attackers legally obtain passwords from clients and they go to critical sites with the correct secret passwords. Consider a web-based voting system for corporate organizations, voting once a year to elect a president, secretary, or critical manager. In the current system, every voter has to gather at one place on the Election Day and cast their vote. In this method, we are using another scheme which is known as visual cryptography. In this plan, we are using visual data for security. Here we are dividing the unique picture into two into four which are placed in separate databases. At whatever point these two offers are intertwined with each other, we get the original picture. When we get the original picture, it is used as a secret password. This system is very helpful and acceptable for online remote voting. This system is an electronic application so that the web can evaluate it through any valid personal space on the planet.
Mathematical Problems in Engineering
The improvements in computation facility and technology support the development and implementatio... more The improvements in computation facility and technology support the development and implementation of automatic methods for medical data assessment. This study tries to extend a framework for efficiently classifying chest radiographs (X-rays) into normal/COVID-19 class. The proposed framework consists subsequent phases: (i) image resizing, (ii) deep features extraction using a pretrained deep learning method (PDLM), (iii) handcrafted feature extraction, (iv) feature optimization with Brownian Mayfly-Algorithm (BMA), (v) serial integration of optimized features, and (vi) binary classification with 10-fold cross validation. In addition, this work implements two methodologies: (i) performance evaluation of the existing PDLM in the literature and (ii) improving the COVID-19 detection performance of chosen PDLM with this proposal. The experimental investigation of this study authenticates that the effort performed using pretrained VGG16 with SoftMax helped get a classification accuracy o...
International journal of engineering research and technology, Jun 17, 2021
These days just hardly any individuals go for casting a ballot because of their tight schedule an... more These days just hardly any individuals go for casting a ballot because of their tight schedule and also it will useful for pandemic like COVID-19. There are numerous reasons, few might be everybody needs to go to voting center, we need to remain in a long line, many might be drained due to their tight schedule. So we have created web based voting system. But this system has some drawback. Phishing attackers legitimately get the passwords from the client and they go into the important sites with right secrete password. Consider a web based polling system for corporate organizations, polling is occurring once in a year to choose the president or secretary or key managers of the organization. At present system every one of the voters needs to assemble at one spot on polling day and put their vote. In this methodology we are utilizing another plan which is known as Cryptography. In this plan we are utilizing visual data for security. Here we are partitioning unique picture into two offers which are put away in isolated database. At whatever point these two offers are stacked with one another we get the original picture. When we get the original picture it tends to be utilized as secret password. This system is extremely helpful and ok for online remote voting. This system is electronic application so it can be assessed well by any approved individual anyplace on the planet through web.
Lecture Notes in Networks and Systems, 2021
International Journal of Research, 2019
2018 Conference on Information and Communication Technology (CICT), 2018
Steganography techniques are used to provide security to the sensitive data during transmission a... more Steganography techniques are used to provide security to the sensitive data during transmission and storage by hiding the secret information in the cover media. By applying Haar wavelet transform on the original image the four sub bands (Approximate band (LL), Horizontal band (LH), Vertical band (HL), Diagonal band (HH)) can be obtained. As detailed bands (LH, HL, HH) have lesser information of the original image the more number of LSBs of the detailed bands can be used to embed the secret information. After inserting the secret information in the sub bands inverse haar discrete wavelet transform is applied on the four sub bands. The values obtained after applying Haar IDWT(Inverse Discrete wavelet transform) may have fraction part or negative values. When the fraction part is truncated or negative values are made zero to obtain the pixel values in 0-255 range, the hidden secret information cannot be obtained completely after applying Haar DWT on the received image. In this paper a novel odd-even method is proposed to decrease the number of dissimilar coefficient values of the approximate band and thus to maximize the extraction of secret information hidden in approximate and detailed bands. Total numbers of coefficient values having different values at sender and receiver side are found. Larger the number of dissimilar coefficient values lesser is the secret information extracted. Peak Signal to Noise Ratio (PSNR) value is computed to analyse the quality of the stego image.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Many organizations large amount of data are collected. These data are further used by the organiz... more Many organizations large amount of data are collected. These data are further used by the organizations for the analysis purposes which help gaining useful knowledge. The data collected may contain private or sensitive information which should be protected. Privacy protection is an important issue if we release data for the mining or sharing purpose. Our technique protects the sensitive data with less information loss which increase data usability and also prevent the sensitive data for various types of attack. Data can also be reconstructed using our proposed technique. A novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy. A hybrid approach for used to improved security and accuracy to private data. Our novel hybrid approach towards privacy preserving k-anonymity and artificial neural network techn...
In many organizations large amount of data are collected. These data are sometimes used by the or... more In many organizations large amount of data are collected. These data are sometimes used by the organizations for data mining tasks. However, the data collected may contain private or sensitive information which should be protected.Privacy protection is an important issue if we release data for the mining or sharing purpose. Our technique protects the sensitive data with less information loss which increase data usability and also prevent the sensitive data for various types of attack. Data can also be reconstructed using our proposed technique. A novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy.clustring based noise techniques that not only preserve the privacy but also ensure effective data mining.
2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Jan 27, 2023
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
Journal of Information and Optimization Sciences
World Academy of Science, Engineering and Technology, International Journal of Computer and Information Engineering, 2015
Association rule mining forms the core of data mining and it is termed as one of the well-known m... more Association rule mining forms the core of data mining and it is termed as one of the well-known methodologies of data mining. Objectives of mining is to find interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, Association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. For efficient targeted query processing, finding frequent patterns and itemset mining, there is an efficient way to generate an itemset tree structure named Memory Efficient Itemset Tree. Memory efficient IT is efficient for storing itemsets, but takes more time as compare to traditional IT. The proposed strategy generates maximal frequent itemsets from memory efficient itemset tree by using levelwise pruning. For that firstly pre-pruning of items based on minimum support count is carried out followed by itemset tree reconstruction. By having maximal frequent i...
2018 3rd IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), 2018
Internet of Things is a new emerging technology by which devices can communicate using internet. ... more Internet of Things is a new emerging technology by which devices can communicate using internet. The proposed work (i-NXGeVita), Intelligent Next Generation Vital Signs Monitoring System, states that how to apply Internet of Things in Healthcare using Machine Learning Techniques. Indeed, connect Internet of Medical Things (IoMT) to patient will be helping Doctors and Caregivers to monitor him or her in real-time around the globe. The IoMT devices will collect Vital Signs data such as body temperature, pulse rate, heartbeats (signals), using ECG (Electrocardiogram) sensor, Temperature sensor, etc. That will be stored in the Cloud System and it will synchronize with the local server. Machine Learning comes to analyze those data to identify health risks and estimate severity in real-time by using its Algorithms. i-NXGeVita based on Deep Neural Networks (DNN) and IoMT can differentiate between Normal and Abnormal Heartbeats and classify different Abnormal Rhythms. Such techniques will b...
Lecture Notes in Networks and Systems, 2021
International Journal of Computer Applications, 2015
Association rule mining forms the core of data mining and it is termed as one of the well-researc... more Association rule mining forms the core of data mining and it is termed as one of the well-researched techniques of data mining. It aims to extract interesting correlations, frequent patterns, associations or casual structures among sets of items in the transaction databases or other data repositories. Hence, Association rule mining is imperative to mine patterns and then generate rules from these obtained patterns. This paper provides the preliminaries of basic concepts about Itemset mining and survey the list of existing tree structure algorithms. These algorithms include various tasks such as fast query processing, optimizing memory space and reducing tree construction time. For mining maximal frequent pattern various algorithms used which optimization the search space for pruning.
2014 International Conference on Signal Propagation and Computer Technology (ICSPCT 2014), 2014
Information explosion is a well known phenomenon now and there is a vast amount of research going... more Information explosion is a well known phenomenon now and there is a vast amount of research going on into how best to handle and process huge amounts of data. One such idea for processing enormous quantities of data is Google's Map/Reduce. Map/Reduce was first introduced by Google engineers - Jeffrey Dean and Sanjay Ghemawat [9]. It was designed for and is still used at Google for processing large amounts of raw data (like crawled documents and web-request logs) to produce various kinds of derived data (like inverted indices, web-page summaries, etc.). It is a simple yet powerful framework for implementing distributed applications without having extensive prior knowledge of the intricacies involved in a distributed system. It is highly scalable and works on a cluster of commodity machines with integrated mechanisms for fault tolerance. The programmer is only required to write specialized map and reduce functions as part of the Map/Reduce job and the Map/Reduce framework takes care of the rest. It distributes the data across the cluster, instantiates multiple copies of the map and reduce functions in parallel, and takes care of any system failures that might occur during the execution. Since its inception at Google, Map/Reduce has found many adopters. Among them, the prominent one is the Apache Software Foundation, which has developed an Open-Source version of the Map/Reduce framework called Hadoop [2]. Hadoop boasts of a number of large web-based corporate like Yahoo, Facebook, Amazon, etc., that use it for various kinds of data-warehousing purposes. Facebook for instance, uses it to store copies of internal logs and uses it as a source for reporting and machine learning. Owing to its ease of use, installation and implementation, Hadoop has found many uses among programmers. One of them is query evaluation over large datasets. And one of the most important queries are Joins. This project explores the existing solutions, extends them and proposes a few new ideas for joining datasets using Hadoop. Algorithms have been broken into two categories - Two-Way joins and Multi-Way joins. Join algorithms are then discussed and evaluated under both categories. Options to pre-process data in order to improve performance have also been explored. The results are expected to give an insight into how good a fit Hadoop or Map/Reduce is for evaluating Joins.
Microbiology Spectrum, 2014
Two related tyrosine recombinases, XerC and XerD, are encoded in the genome of most bacteria wher... more Two related tyrosine recombinases, XerC and XerD, are encoded in the genome of most bacteria where they serve to resolve dimers of circular chromosomes by the addition of a crossover at a specific site, dif . From a structural and biochemical point of view they belong to the Cre resolvase family of tyrosine recombinases. Correspondingly, they are exploited for the resolution of multimers of numerous plasmids. In addition, they are exploited by mobile DNA elements to integrate into the genome of their host. Exploitation of Xer is likely to be advantageous to mobile elements because the conservation of the Xer recombinases and of the sequence of their chromosomal target should permit a quite easy extension of their host range. However, it requires means to overcome the cellular mechanisms that normally restrict recombination to dif sites harbored by a chromosome dimer and, in the case of integrative mobile elements, to convert dedicated tyrosine resolvases into integrases.
Mantech Publications eBooks, 2021
These days hardly anyone goes to the polls because of their tight schedule. There are numerous re... more These days hardly anyone goes to the polls because of their tight schedule. There are numerous reasons, and some may need to go to the polls, we may need to wait in long lines, many may be drained due to their tight schedules. So we have created a webbased voting system. But this system has some drawbacks. Phishing attackers legally obtain passwords from clients and they go to critical sites with the correct secret passwords. Consider a web-based voting system for corporate organizations, voting once a year to elect a president, secretary, or critical manager. In the current system, every voter has to gather at one place on the Election Day and cast their vote. In this method, we are using another scheme which is known as visual cryptography. In this plan, we are using visual data for security. Here we are dividing the unique picture into two into four which are placed in separate databases. At whatever point these two offers are intertwined with each other, we get the original picture. When we get the original picture, it is used as a secret password. This system is very helpful and acceptable for online remote voting. This system is an electronic application so that the web can evaluate it through any valid personal space on the planet.
Mathematical Problems in Engineering
The improvements in computation facility and technology support the development and implementatio... more The improvements in computation facility and technology support the development and implementation of automatic methods for medical data assessment. This study tries to extend a framework for efficiently classifying chest radiographs (X-rays) into normal/COVID-19 class. The proposed framework consists subsequent phases: (i) image resizing, (ii) deep features extraction using a pretrained deep learning method (PDLM), (iii) handcrafted feature extraction, (iv) feature optimization with Brownian Mayfly-Algorithm (BMA), (v) serial integration of optimized features, and (vi) binary classification with 10-fold cross validation. In addition, this work implements two methodologies: (i) performance evaluation of the existing PDLM in the literature and (ii) improving the COVID-19 detection performance of chosen PDLM with this proposal. The experimental investigation of this study authenticates that the effort performed using pretrained VGG16 with SoftMax helped get a classification accuracy o...
International journal of engineering research and technology, Jun 17, 2021
These days just hardly any individuals go for casting a ballot because of their tight schedule an... more These days just hardly any individuals go for casting a ballot because of their tight schedule and also it will useful for pandemic like COVID-19. There are numerous reasons, few might be everybody needs to go to voting center, we need to remain in a long line, many might be drained due to their tight schedule. So we have created web based voting system. But this system has some drawback. Phishing attackers legitimately get the passwords from the client and they go into the important sites with right secrete password. Consider a web based polling system for corporate organizations, polling is occurring once in a year to choose the president or secretary or key managers of the organization. At present system every one of the voters needs to assemble at one spot on polling day and put their vote. In this methodology we are utilizing another plan which is known as Cryptography. In this plan we are utilizing visual data for security. Here we are partitioning unique picture into two offers which are put away in isolated database. At whatever point these two offers are stacked with one another we get the original picture. When we get the original picture it tends to be utilized as secret password. This system is extremely helpful and ok for online remote voting. This system is electronic application so it can be assessed well by any approved individual anyplace on the planet through web.
Lecture Notes in Networks and Systems, 2021
International Journal of Research, 2019
2018 Conference on Information and Communication Technology (CICT), 2018
Steganography techniques are used to provide security to the sensitive data during transmission a... more Steganography techniques are used to provide security to the sensitive data during transmission and storage by hiding the secret information in the cover media. By applying Haar wavelet transform on the original image the four sub bands (Approximate band (LL), Horizontal band (LH), Vertical band (HL), Diagonal band (HH)) can be obtained. As detailed bands (LH, HL, HH) have lesser information of the original image the more number of LSBs of the detailed bands can be used to embed the secret information. After inserting the secret information in the sub bands inverse haar discrete wavelet transform is applied on the four sub bands. The values obtained after applying Haar IDWT(Inverse Discrete wavelet transform) may have fraction part or negative values. When the fraction part is truncated or negative values are made zero to obtain the pixel values in 0-255 range, the hidden secret information cannot be obtained completely after applying Haar DWT on the received image. In this paper a novel odd-even method is proposed to decrease the number of dissimilar coefficient values of the approximate band and thus to maximize the extraction of secret information hidden in approximate and detailed bands. Total numbers of coefficient values having different values at sender and receiver side are found. Larger the number of dissimilar coefficient values lesser is the secret information extracted. Peak Signal to Noise Ratio (PSNR) value is computed to analyse the quality of the stego image.
International Journal of Advance Research and Innovative Ideas in Education, 2016
Many organizations large amount of data are collected. These data are further used by the organiz... more Many organizations large amount of data are collected. These data are further used by the organizations for the analysis purposes which help gaining useful knowledge. The data collected may contain private or sensitive information which should be protected. Privacy protection is an important issue if we release data for the mining or sharing purpose. Our technique protects the sensitive data with less information loss which increase data usability and also prevent the sensitive data for various types of attack. Data can also be reconstructed using our proposed technique. A novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy. A hybrid approach for used to improved security and accuracy to private data. Our novel hybrid approach towards privacy preserving k-anonymity and artificial neural network techn...
In many organizations large amount of data are collected. These data are sometimes used by the or... more In many organizations large amount of data are collected. These data are sometimes used by the organizations for data mining tasks. However, the data collected may contain private or sensitive information which should be protected.Privacy protection is an important issue if we release data for the mining or sharing purpose. Our technique protects the sensitive data with less information loss which increase data usability and also prevent the sensitive data for various types of attack. Data can also be reconstructed using our proposed technique. A novel hybrid method to achieve k-support anonymity based on statistical observations on the datasets. Our comprehensive experiments on real as well as synthetic datasets show that our techniques are effective and provide moderate privacy.clustring based noise techniques that not only preserve the privacy but also ensure effective data mining.