dimple bohra - Academia.edu (original) (raw)
Papers by dimple bohra
2022 5th International Conference on Advances in Science and Technology (ICAST), Dec 2, 2022
Plagiarism is an act of stealing or reflecting others ideas or thoughts without the permission of... more Plagiarism is an act of stealing or reflecting others ideas or thoughts without the permission of authority or not mentioning that the ideas are the reflection of the authority. Plagiarism of others paper works is a crime, has been caught by plenty of intelligently coded plagiarism detection systems. The reason for this is lack of awareness about plagiarism. Some people are aware about plagiarism detection system's mechanism and they follow various ways to escape from the code, finally they do, because machine is a machine after all. In order to avoid this crime, there are plenty of papers are available insisting “knowledge theft” should be stopped by presenting wonderful detection techniques. But still we are in need of a concrete plagiarism detection system that can be able to track plagiarism by shuffling or manipulating synonyms of words and sentences in paper work. In this paper we discuss the evolution of plagiarism detection techniques along with the pros and cons of thos...
Genetic Algorithm, Simulated Annealing and a novel algorithm
International journal of engineering research and technology, 2014
Botnets are ever increasing day by day for malicious purposes. Most recent trends indicate harnes... more Botnets are ever increasing day by day for malicious purposes. Most recent trends indicate harnessing application layer vulnerabilities or targets that benefit the bot masters. This paper briefs about the Application layer based botnet attacks. Such attacks include: Botnet based Distributed Denial of Service (DDoS) attacks that are the most common and prevalent security attacks specially generating application layer traffic; another attack for financial gain is pharming, phishing along with fast flux making botnet harder to track down. Click Frauds are yet another example employed using botnets and proxies to gain financially. Another monetary gain attack which has recently emerged is mining of crypto-currencies such as Bitcoin, Litecoins etc. This papers describes in general about botnets, their infrastructure, their use in DDoS attacks, pharming, fast fluxing, Cryptocurrency mining. This papers also gives an insight into the methods that can be used to prevent these types of attac...
International Journal of Computer Applications, Jul 18, 2015
Communication is one of the most important medium through which people can share their intellectu... more Communication is one of the most important medium through which people can share their intellectual and cultural beliefs. Communication with the help of computers is increasing at a rapid speed. Securing this communication is of prime importance to maintain user privacy and data confidentiality. Anonymous communication systems can help us to prevent from eavesdropping and other attacks. Anonymous communication based on Onion Routing helps us to build a system that not only secures the data using multiple layers encryption but also by hiding the true sender and receiver of the data. Though there are many alternative solutions, Onion routing provides the efficient way of protection, which we have implemented.
This paper proposes the modelling of portfolio return using neuro-fuzzy system. The learning capa... more This paper proposes the modelling of portfolio return using neuro-fuzzy system. The learning capability of neural network is combined with the ability of fuzzy logic to represent human knowledge in the form of fuzzy rules. The proposed model utilizes adaptive neuro fuzzy inference system (ANFIS). In this system, the inputs namely opening price, closing price and the desired return constitutes the training data set. The actual return so obtained by ANFIS is graphically plotted against the desired return in order to judge the accuracy achieved. The advantage of the framework is to help the investor to double check the return which can be gained by combining various investments in commodities so as to mitigate the risk in future investment.
International Journal of Advanced Manufacturing Technology
Commodity trading or future trading is the trading on commodities. It is more stable than stock t... more Commodity trading or future trading is the trading on commodities. It is more stable than stock trading although is associated with greater risk factors. This paper proposes a novel algorithm GaSa for optimizing the returns in commodity trading. This novel algorithm hybridizes Genetic Algorithm and Simulated Annealing, with the mutation phase of Genetic algorithm replaced by simulated annealing. Results have shown that in comparison to using Genetic Algorithm, Simulated Annealing, GaSa produces optimized values with lesser number of iterations and also taking lesser time. The inputs to the system are the opening price, closing price and the Volume of commodities traded from Multi-Commodity Exchange (MCX), India..
2022 5th International Conference on Advances in Science and Technology (ICAST), Dec 2, 2022
Plagiarism is an act of stealing or reflecting others ideas or thoughts without the permission of... more Plagiarism is an act of stealing or reflecting others ideas or thoughts without the permission of authority or not mentioning that the ideas are the reflection of the authority. Plagiarism of others paper works is a crime, has been caught by plenty of intelligently coded plagiarism detection systems. The reason for this is lack of awareness about plagiarism. Some people are aware about plagiarism detection system's mechanism and they follow various ways to escape from the code, finally they do, because machine is a machine after all. In order to avoid this crime, there are plenty of papers are available insisting “knowledge theft” should be stopped by presenting wonderful detection techniques. But still we are in need of a concrete plagiarism detection system that can be able to track plagiarism by shuffling or manipulating synonyms of words and sentences in paper work. In this paper we discuss the evolution of plagiarism detection techniques along with the pros and cons of thos...
Genetic Algorithm, Simulated Annealing and a novel algorithm
International journal of engineering research and technology, 2014
Botnets are ever increasing day by day for malicious purposes. Most recent trends indicate harnes... more Botnets are ever increasing day by day for malicious purposes. Most recent trends indicate harnessing application layer vulnerabilities or targets that benefit the bot masters. This paper briefs about the Application layer based botnet attacks. Such attacks include: Botnet based Distributed Denial of Service (DDoS) attacks that are the most common and prevalent security attacks specially generating application layer traffic; another attack for financial gain is pharming, phishing along with fast flux making botnet harder to track down. Click Frauds are yet another example employed using botnets and proxies to gain financially. Another monetary gain attack which has recently emerged is mining of crypto-currencies such as Bitcoin, Litecoins etc. This papers describes in general about botnets, their infrastructure, their use in DDoS attacks, pharming, fast fluxing, Cryptocurrency mining. This papers also gives an insight into the methods that can be used to prevent these types of attac...
International Journal of Computer Applications, Jul 18, 2015
Communication is one of the most important medium through which people can share their intellectu... more Communication is one of the most important medium through which people can share their intellectual and cultural beliefs. Communication with the help of computers is increasing at a rapid speed. Securing this communication is of prime importance to maintain user privacy and data confidentiality. Anonymous communication systems can help us to prevent from eavesdropping and other attacks. Anonymous communication based on Onion Routing helps us to build a system that not only secures the data using multiple layers encryption but also by hiding the true sender and receiver of the data. Though there are many alternative solutions, Onion routing provides the efficient way of protection, which we have implemented.
This paper proposes the modelling of portfolio return using neuro-fuzzy system. The learning capa... more This paper proposes the modelling of portfolio return using neuro-fuzzy system. The learning capability of neural network is combined with the ability of fuzzy logic to represent human knowledge in the form of fuzzy rules. The proposed model utilizes adaptive neuro fuzzy inference system (ANFIS). In this system, the inputs namely opening price, closing price and the desired return constitutes the training data set. The actual return so obtained by ANFIS is graphically plotted against the desired return in order to judge the accuracy achieved. The advantage of the framework is to help the investor to double check the return which can be gained by combining various investments in commodities so as to mitigate the risk in future investment.
International Journal of Advanced Manufacturing Technology
Commodity trading or future trading is the trading on commodities. It is more stable than stock t... more Commodity trading or future trading is the trading on commodities. It is more stable than stock trading although is associated with greater risk factors. This paper proposes a novel algorithm GaSa for optimizing the returns in commodity trading. This novel algorithm hybridizes Genetic Algorithm and Simulated Annealing, with the mutation phase of Genetic algorithm replaced by simulated annealing. Results have shown that in comparison to using Genetic Algorithm, Simulated Annealing, GaSa produces optimized values with lesser number of iterations and also taking lesser time. The inputs to the system are the opening price, closing price and the Volume of commodities traded from Multi-Commodity Exchange (MCX), India..