shrutika suri - Academia.edu (original) (raw)

shrutika suri

Related Authors

Aditya Naiknaware

Aswani Kumar  Cherukuri

Faisal Muhammad Shah

Nutan F Haq

Ahsanullah University of Science and Technology

Musharrat Rafni

Md. Sirazul Munir

indira priyadarsini

sukhwinder singh Sran

Uploads

Papers by shrutika suri

Research paper thumbnail of Evaluation of Ensemble Design For Intrusion Detection

Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision

Research paper thumbnail of Network and Information Security Issues

Ijca Proceedings on National Workshop Cum Conference on Recent Trends in Mathematics and Computing 2011, May 15, 2012

Research paper thumbnail of Comparative Study of Network Monitoring Tools

Research paper thumbnail of Gesture Recognition Using Artificial Neural Network

Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...

Research paper thumbnail of Comparative Analysis of Steganography for Coloured Images

Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...

Research paper thumbnail of Evaluation of Ensemble Design For Intrusion Detection

Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision

Research paper thumbnail of Network and Information Security Issues

Ijca Proceedings on National Workshop Cum Conference on Recent Trends in Mathematics and Computing 2011, May 15, 2012

Research paper thumbnail of Comparative Study of Network Monitoring Tools

Research paper thumbnail of Gesture Recognition Using Artificial Neural Network

Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...

Research paper thumbnail of Comparative Analysis of Steganography for Coloured Images

Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...

Log In