shital gupta - Academia.edu (original) (raw)

Papers by shital gupta

Research paper thumbnail of A Hybrid Model for Sentiment Analysis Based on Movie Review Datasets

International Journal on Recent and Innovation Trends in Computing and Communication

The classification of sentiments, often known as sentiment analysis, is now widely recognized as ... more The classification of sentiments, often known as sentiment analysis, is now widely recognized as an open field of research. Over the past few years, a huge amount of study work has been carried out in these disciplines by utilizing a wide variety of research approaches. Due to the possibility that the performance of sentiment analysis may be impacted by the high-dimensional feature set, text mining demands careful consideration during in the construction and selection of features.The process of recognising and extracting subjective information from written data is referred to as sentiment analysis. Sentiment analysis enables companies to understand the social sentiment around their brand, product, or service by monitoring the conversations that take place in internet chat rooms. In order to categorise people's attitudes or sentiments, this study provides a hybrid model (Support Vector Machine, Convolutional Neural Network, and Long Short-Term Memory). The findings of using the n...

Research paper thumbnail of A Robust Algorithm of Digital Video Watermarking using ELM

New Frontiers in Communication and Intelligent Systems

Image watermarking for copyright protection has become a widely studied subject with the sprawl o... more Image watermarking for copyright protection has become a widely studied subject with the sprawl of pirated content. A color, a monochrome – gray scale or a binary may be a watermark. The insertion of watermarks may be performed in a video domain unencoded or encoded. A robust technique of digital video watermarking using machine learning approach is based on Extreme Learning Machine (ELM) is proposed. Using the properties of hybrid transformations, robust features and robust zero watermarks can be extracted from videos can be built. Experimental findings show that the proposed algorithm is robust in high-efficiency video coding attacks with various parameters of quantization due the fast processing of frames. Regular image processing assaults, geometric attacks, frame-based attacks, and hybrid attacks can all be thwarted by this approach. Comparatively, the suggested video watermarking method can more accurately and completely recreate watermarking pictures.

Research paper thumbnail of Protection of System from Data Breaches

the tremendous increase in computer users, internet & cyberspace is giving rise to more number to... more the tremendous increase in computer users, internet & cyberspace is giving rise to more number to cybercrimes. Technocrats or popularly known as cybercriminals make use of technology, social engineering & other techniques to extract the confidential information. So there is a new need to have a comprehensive understanding of cyber-attacks and its classification & how one can get secured. In this paper, we provided a noble metric concept to test data breaches algorithm. Cybersecurity ensures the protection of information systems including software, hardware and information (data). The purpose of this paper is to give a review on Cybersecurity, its goals, impacts, issues and noble concept. The article also includes a brief description of various types of data breaches that have occurred in the past.

Research paper thumbnail of Review of Face Recognition System

Face recognition is one of the most suitable applications of image analysis. It’s a true challeng... more Face recognition is one of the most suitable applications of image analysis. It’s a true challenge to build an automated system which equals human ability to recognize faces. While traditional face recognition is typically based on still images, face recognition from video sequences has become popular recently due to more abundant information than still images. Video-based face recognition has been one of the hot topics in the field of pattern recognition in the last few decades. This paper presents an overview of face recognition scenarios and video-based face recognition system architecture and various approaches are used in video-based face recognition system which can not only discover more space-time semantic information hidden in video face sequence, but also make full use of the high level semantic concepts and the intrinsic nonlinear structure information to extract discriminative manifold features. We also compare our algorithm with other algorithms on our own database.

Research paper thumbnail of A Survey : Data Mining and Machine Learning Methods for Cyber Security

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021

This survey paper describes the literature survey for cyber analytics in support of intrusion det... more This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods. Short ML/DM method tutorial details will be given. Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important.

Research paper thumbnail of Review on Block Chain based Security Technique for Electronics Voting

Election is a way to choose the representatives through a fairness, integrity, and democratic rul... more Election is a way to choose the representatives through a fairness, integrity, and democratic rules. During the election, the voting system allows authorized voters to cast their vote for candidates. In essence, the voting system can directly influence several aspects that are political science, social science, and economics. Thus, the concept of the voting system must respond and rigorously considered before the election is held. The voting system begins evolving from paper voting, then E-voting and the latest will be I-voting. Concisely, E-voting is simply an electronic system, while I-voting is nothing but remote E-voting (internet accessible). Block chain technology provides a decentralized architecture that distributes digital information synchronously among the P2P network without a central database. This paper provides review on block chain based security technique for electronics voting. IndexTerms Block Chain, E-Voting, I-Voting P2P, Election, Security.

Research paper thumbnail of A Novel Approach for Watermarking using Dual Watermarking Technique in Noisy Regions

Digital Watermarking is one of the most prominent technique used for protection of ownership righ... more Digital Watermarking is one of the most prominent technique used for protection of ownership rights of digital media which is text, audio, video or image. For providing more security to the information and to enhance the hiding capacity of an image and avoid abrupt changes in image edge areas, as well as to achieve better quality of the stegoimage, a novel image data hiding technique by Wavelet Watermarking and frequency domain is proposed in this paper. The paper focuses on Image Adaptive watermarking methods in the Discrete Wavelet Transform Domain and frequency domain since they yield better results regarding robustness and transparency than other watermarking schemes. In this paper the technique is proposed to hide text data into noisy region of a digital image. The Discrete Wavelet Transform Domain and frequency domain dual adaptive watermarking algorithm which will be used for the novel application for watermarking. It helps, for providing more security to the information and ...

Research paper thumbnail of Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Now days digital watermarking is very popular field for the researchers because it provide the be... more Now days digital watermarking is very popular field for the researchers because it provide the better solutions for authentication and copyright protection problems of digital object. Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of information under a digital object (image, video, audio) for the purpose of copyright protection. Both the image and the watermark are most frequently translated into a transform domain where the embedding takes place. The selection of both the transform domain and the particular algorithm that is used for the embedding of the watermark, depend heavily on the application. One of the most widely used transform domains for watermarking of still digital images is the Discrete Wavelet Transform (DWT) domain. In this paper we present a new algorithm which is more robust against different geometric attacks. Such as rotation and translation. Our algorithm has high embedding capacity, high imperceptibility and lo...

Research paper thumbnail of Survey Paper on Enhancing Information Based Learning System Using Educational Data Mining

International Journal for Research in Applied Science and Engineering Technology, 2022

Educational Data Mining (EDM) is a platform for literacy and exploring from data to get essential... more Educational Data Mining (EDM) is a platform for literacy and exploring from data to get essential information and induce the unique pattern which will help study, assay and skill pupil performance in academic. Colourful data mining styles can be apply to sludge the data from data storehouse to apply data mining ways which helps pupil for taking opinions for better outgrowth. The model which can be use in Educational data mining must be a formative and descriptive model applied on data storehouse and must gather veritably accurate data for enhance the performance of study. Retrogression analysis can also be used to develop a model to use as study tool; it can be used dependent or independent variables. If the model is enough perfect for using as study tool also every cluster of data must be use that model to cost the attendant data. Occasionally educational data mining is considered as overall performance of scholars, but each pupil has its own position of understanding the contents so that system must also be enough flexible for every one; for fulfilling this demand educational system can be complex, but once it's constructed also it'll helpful for everyone. This paper is describing colourful data mining ways and their proper uses.

Research paper thumbnail of Language Processors (E2.15

Drafts by shital gupta

Research paper thumbnail of Model Questions and Answers computer science and engineering

cloud computing question and answers

Research paper thumbnail of A Hybrid Model for Sentiment Analysis Based on Movie Review Datasets

International Journal on Recent and Innovation Trends in Computing and Communication

The classification of sentiments, often known as sentiment analysis, is now widely recognized as ... more The classification of sentiments, often known as sentiment analysis, is now widely recognized as an open field of research. Over the past few years, a huge amount of study work has been carried out in these disciplines by utilizing a wide variety of research approaches. Due to the possibility that the performance of sentiment analysis may be impacted by the high-dimensional feature set, text mining demands careful consideration during in the construction and selection of features.The process of recognising and extracting subjective information from written data is referred to as sentiment analysis. Sentiment analysis enables companies to understand the social sentiment around their brand, product, or service by monitoring the conversations that take place in internet chat rooms. In order to categorise people's attitudes or sentiments, this study provides a hybrid model (Support Vector Machine, Convolutional Neural Network, and Long Short-Term Memory). The findings of using the n...

Research paper thumbnail of A Robust Algorithm of Digital Video Watermarking using ELM

New Frontiers in Communication and Intelligent Systems

Image watermarking for copyright protection has become a widely studied subject with the sprawl o... more Image watermarking for copyright protection has become a widely studied subject with the sprawl of pirated content. A color, a monochrome – gray scale or a binary may be a watermark. The insertion of watermarks may be performed in a video domain unencoded or encoded. A robust technique of digital video watermarking using machine learning approach is based on Extreme Learning Machine (ELM) is proposed. Using the properties of hybrid transformations, robust features and robust zero watermarks can be extracted from videos can be built. Experimental findings show that the proposed algorithm is robust in high-efficiency video coding attacks with various parameters of quantization due the fast processing of frames. Regular image processing assaults, geometric attacks, frame-based attacks, and hybrid attacks can all be thwarted by this approach. Comparatively, the suggested video watermarking method can more accurately and completely recreate watermarking pictures.

Research paper thumbnail of Protection of System from Data Breaches

the tremendous increase in computer users, internet & cyberspace is giving rise to more number to... more the tremendous increase in computer users, internet & cyberspace is giving rise to more number to cybercrimes. Technocrats or popularly known as cybercriminals make use of technology, social engineering & other techniques to extract the confidential information. So there is a new need to have a comprehensive understanding of cyber-attacks and its classification & how one can get secured. In this paper, we provided a noble metric concept to test data breaches algorithm. Cybersecurity ensures the protection of information systems including software, hardware and information (data). The purpose of this paper is to give a review on Cybersecurity, its goals, impacts, issues and noble concept. The article also includes a brief description of various types of data breaches that have occurred in the past.

Research paper thumbnail of Review of Face Recognition System

Face recognition is one of the most suitable applications of image analysis. It’s a true challeng... more Face recognition is one of the most suitable applications of image analysis. It’s a true challenge to build an automated system which equals human ability to recognize faces. While traditional face recognition is typically based on still images, face recognition from video sequences has become popular recently due to more abundant information than still images. Video-based face recognition has been one of the hot topics in the field of pattern recognition in the last few decades. This paper presents an overview of face recognition scenarios and video-based face recognition system architecture and various approaches are used in video-based face recognition system which can not only discover more space-time semantic information hidden in video face sequence, but also make full use of the high level semantic concepts and the intrinsic nonlinear structure information to extract discriminative manifold features. We also compare our algorithm with other algorithms on our own database.

Research paper thumbnail of A Survey : Data Mining and Machine Learning Methods for Cyber Security

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2021

This survey paper describes the literature survey for cyber analytics in support of intrusion det... more This survey paper describes the literature survey for cyber analytics in support of intrusion detection of machine learnings (ML) and data mining (DM) methods. Short ML/DM method tutorial details will be given. Documents representing each method were categorized, read and summarized based on the number of citations and significance of an evolving method. Since data is so important.

Research paper thumbnail of Review on Block Chain based Security Technique for Electronics Voting

Election is a way to choose the representatives through a fairness, integrity, and democratic rul... more Election is a way to choose the representatives through a fairness, integrity, and democratic rules. During the election, the voting system allows authorized voters to cast their vote for candidates. In essence, the voting system can directly influence several aspects that are political science, social science, and economics. Thus, the concept of the voting system must respond and rigorously considered before the election is held. The voting system begins evolving from paper voting, then E-voting and the latest will be I-voting. Concisely, E-voting is simply an electronic system, while I-voting is nothing but remote E-voting (internet accessible). Block chain technology provides a decentralized architecture that distributes digital information synchronously among the P2P network without a central database. This paper provides review on block chain based security technique for electronics voting. IndexTerms Block Chain, E-Voting, I-Voting P2P, Election, Security.

Research paper thumbnail of A Novel Approach for Watermarking using Dual Watermarking Technique in Noisy Regions

Digital Watermarking is one of the most prominent technique used for protection of ownership righ... more Digital Watermarking is one of the most prominent technique used for protection of ownership rights of digital media which is text, audio, video or image. For providing more security to the information and to enhance the hiding capacity of an image and avoid abrupt changes in image edge areas, as well as to achieve better quality of the stegoimage, a novel image data hiding technique by Wavelet Watermarking and frequency domain is proposed in this paper. The paper focuses on Image Adaptive watermarking methods in the Discrete Wavelet Transform Domain and frequency domain since they yield better results regarding robustness and transparency than other watermarking schemes. In this paper the technique is proposed to hide text data into noisy region of a digital image. The Discrete Wavelet Transform Domain and frequency domain dual adaptive watermarking algorithm which will be used for the novel application for watermarking. It helps, for providing more security to the information and ...

Research paper thumbnail of Digital Image Watermarking Using DWT and SLR Technique Against Geometric Attacks

Now days digital watermarking is very popular field for the researchers because it provide the be... more Now days digital watermarking is very popular field for the researchers because it provide the better solutions for authentication and copyright protection problems of digital object. Digital watermarking is a highly evolving field, which involves the embedding of a certain kind of information under a digital object (image, video, audio) for the purpose of copyright protection. Both the image and the watermark are most frequently translated into a transform domain where the embedding takes place. The selection of both the transform domain and the particular algorithm that is used for the embedding of the watermark, depend heavily on the application. One of the most widely used transform domains for watermarking of still digital images is the Discrete Wavelet Transform (DWT) domain. In this paper we present a new algorithm which is more robust against different geometric attacks. Such as rotation and translation. Our algorithm has high embedding capacity, high imperceptibility and lo...

Research paper thumbnail of Survey Paper on Enhancing Information Based Learning System Using Educational Data Mining

International Journal for Research in Applied Science and Engineering Technology, 2022

Educational Data Mining (EDM) is a platform for literacy and exploring from data to get essential... more Educational Data Mining (EDM) is a platform for literacy and exploring from data to get essential information and induce the unique pattern which will help study, assay and skill pupil performance in academic. Colourful data mining styles can be apply to sludge the data from data storehouse to apply data mining ways which helps pupil for taking opinions for better outgrowth. The model which can be use in Educational data mining must be a formative and descriptive model applied on data storehouse and must gather veritably accurate data for enhance the performance of study. Retrogression analysis can also be used to develop a model to use as study tool; it can be used dependent or independent variables. If the model is enough perfect for using as study tool also every cluster of data must be use that model to cost the attendant data. Occasionally educational data mining is considered as overall performance of scholars, but each pupil has its own position of understanding the contents so that system must also be enough flexible for every one; for fulfilling this demand educational system can be complex, but once it's constructed also it'll helpful for everyone. This paper is describing colourful data mining ways and their proper uses.

Research paper thumbnail of Language Processors (E2.15

Research paper thumbnail of Model Questions and Answers computer science and engineering

cloud computing question and answers