shrutika suri - Academia.edu (original) (raw)
Related Authors
Ahsanullah University of Science and Technology
Uploads
Papers by shrutika suri
Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision
Ijca Proceedings on National Workshop Cum Conference on Recent Trends in Mathematics and Computing 2011, May 15, 2012
Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...
Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...
Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious... more Intrusion Detection System (IDS) examine large quantity of data with the intent to find malicious event among them. A misclassification of what is examine can lead to a higher rate false positive or false negative, thus any model built for the task must be as accurate as possible. The purpose of this study was observe how applying ensemble method can affect the performance of a classifier. We worked with: Adaptive Boosting (AdaBoost) and Banging Classifier as ensembles on different classifiers, namely: Naïve Bayes and Decision
Ijca Proceedings on National Workshop Cum Conference on Recent Trends in Mathematics and Computing 2011, May 15, 2012
Information communication between two people can be done using various medium. These may be lingu... more Information communication between two people can be done using various medium. These may be linguistic or gestures. Gestures recognition means identification and recognition of gestures originating from any type of body motion but only originate from face or hand. It is a process by which gestures made by users are used to convey the information. It provides important aspects of human interaction, both interpersonally and in the context of human - computer interfaces. There are several approaches available for recognizing gesture, some of them being MATLAB, Artificial Neural Networks, etc. This paper is a comprehensive evaluation of how gesture can be recognized in a more natural way using neural networks. It consists of 3 stages: image acquisition, feature extraction and recognition. In first stage the image is captured using a webcam, digital camera in approximate frame rate. In the second stage features are extracted using input image. The features may be angle made between finge...
Information security has become a major cause of concern because intruders are concerned with rea... more Information security has become a major cause of concern because intruders are concerned with reading the information. It is because of electronic dropping security is under threat. This paper deals with the comparative analysis of steganography over coloured images. “Steganography” is a greek word which means “hidden writing”. It is the art of hiding the secret message within a image. The goal of steganography is to avoid drawing suspicious to transmission of hidden message. It serves a better way of securing message than cryptography which provide security to content of message and not the existence. Original message is being hidden within a carrier such that the changes occurred in carrier are not observed. The hidden message in carrier is difficult to detect without retrieval. Different techniques are described in this paper for steganography over coloured images. One of them is spatial steganography. In this technique some bits in the image pixel is used for hiding data. Second...