shrutika suri - Profile on Academia.edu (original) (raw)

shrutika suri

Aditya Naiknaware related author profile picture

Aswani Kumar  Cherukuri related author profile picture

Mohammad Amin Amini related author profile picture

Faisal Muhammad Shah related author profile picture

Nutan F Haq related author profile picture

Nutan F Haq

Ahsanullah University of Science and Technology

Musharrat Rafni related author profile picture

Shamsul Alam related author profile picture

Md. Sirazul Munir related author profile picture

indira priyadarsini related author profile picture

sukhwinder singh Sran related author profile picture

Uploads

Papers by shrutika suri

Research paper thumbnail of Evaluation of Ensemble Design For Intrusion Detection

Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision

Research paper thumbnail of Comparative Study of Network Monitoring Tools

Comparative Study of Network Monitoring Tools

Research paper thumbnail of Gesture Recognition Using Artificial Neural Network

Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...

Research paper thumbnail of Comparative Analysis of Steganography for Coloured Images

Comparative Analysis of Steganography for Coloured Images

Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...

Research paper thumbnail of Evaluation of Ensemble Design For Intrusion Detection

Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision

Research paper thumbnail of Comparative Study of Network Monitoring Tools

Comparative Study of Network Monitoring Tools

Research paper thumbnail of Gesture Recognition Using Artificial Neural Network

Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...

Research paper thumbnail of Comparative Analysis of Steganography for Coloured Images

Comparative Analysis of Steganography for Coloured Images

Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...

Log In