Papers by shubhangi vaikole

International Journal of Safety and Security Engineering, Dec 24, 2023
Data confidentiality, security authentication are just some of the many uses for image encryption... more Data confidentiality, security authentication are just some of the many uses for image encryption, making it one of the most effective methods for safeguarding geospatial data. However, even with advancements in an encryption algorithms still face challenges in terms of both security and speed. However, limitations in key space, complexity of algorithms, make it susceptible to assaults plague present in image encryption methods. Considering the restrictions of past strategies, we've formulated a brought together way to deal with raster data encryption by consolidating shuffled raster Output, Chirikov and Chebyshev chaotic map. At the point image is the constant raster is first shuffled by shuffling method to muddle the pixels of each block. The randomization characteristic in keys generated by Chirikov and Chebyshev Chaotic maps will be used to encode raster data. Encryption is performed rapidly utilizing the recommended approach. The reenactment results exhibit the adequacy and reasonableness of the method for safeguarding raster geospatial data.
Information Extraction (IE) on the web is the task of automatically extracting knowledge from tex... more Information Extraction (IE) on the web is the task of automatically extracting knowledge from text. Web Information Extraction (WIE) systems have recently been able to extract massive quantities of relational data from online text. This massive body of text which are now available on the World Wide Web do presents an unparalleled opportunity for information extraction. However, this information extraction on the Web is challenging due to the vast variety of distinct concepts and structured expressed. The explosive growth and popularity of the worldwide web has resulted in a huge amount of information sources on the Internet. However, due to the heterogeneity, diversity and the lack of structure of Web information sources, access to this huge collection of information has been limited to browsing and searching.

2013 2nd National Conference on Information Assurance (NCIA), 2013
ABSTRACT Today, Cloud Computing is the preferred choice of every IT organization since it provide... more ABSTRACT Today, Cloud Computing is the preferred choice of every IT organization since it provides flexible and pay-per-use based services to its users. However, the security and privacy is a major hurdle in its success because of its open and distributed architecture that is vulnerable to intruders. Intrusion Detection System (IDS) is the most commonly used mechanism to detect attacks on cloud. This paper provides an overview of different intrusions in cloud. Then, we analyze some existing cloud based intrusion detection systems (IDS) with respect to their type, positioning, detection time, detection technique, data source and attacks they can detect. The analysis also provides limitations of each technique to evaluate whether they fulfill the security requirements of cloud computing environment or not. We emphasize the deployment of IDS that uses multiple detection methods to cope with security challenges in cloud.
International Journal of Engineering Trends and Technology

Bioengineering
The purpose of this research is to emphasize the importance of mental health and contribute to th... more The purpose of this research is to emphasize the importance of mental health and contribute to the overall well-being of humankind by detecting stress. Stress is a state of strain, whether it be mental or physical. It can result from anything that frustrates, incenses, or unnerves you in an event or thinking. Your body’s response to a demand or challenge is stress. Stress affects people on a daily basis. Stress can be regarded as a hidden pandemic. Long-term (chronic) stress results in ongoing activation of the stress response, which wears down the body over time. Symptoms manifest as behavioral, emotional, and physical effects. The most common method involves administering brief self-report questionnaires such as the Perceived Stress Scale. However, self-report questionnaires frequently lack item specificity and validity, and interview-based measures can be time- and money-consuming. In this research, a novel method used to detect human mental stress by processing audio-visual data...
International Journal on Interactive Design and Manufacturing (IJIDeM)
EasyChair, Jul 5, 2021
EasyChair preprints are intended for rapid dissemination of research results and are integrated w... more EasyChair preprints are intended for rapid dissemination of research results and are integrated with the rest of EasyChair.

Vehicles being the most widely used machines need to get smarter compared to their current techno... more Vehicles being the most widely used machines need to get smarter compared to their current technology. The necessity described by the younger generation of users, the millennials, for their devices to be smart and their vision to have more computerized and smarter applications of various sensors. The invention and development of better-computerized systems for infotainment and control of vehicles have taken speed and research is done mainly in an open-source on Linux kernel-based operating systems. The Smart Bike System is a Raspberry pi based operating system(AGL) for bikes tracks the various components of the bike like Speed, Quantity of fuel, Distance covered in a single trip, Temperature, Date and Time. We make a note that the current system of dashboards for representing the various aspects of a bike is old. A significant improvement would be made in the quality of the bike and the way people use it if the current computer technology of the world embraces the vehicular system. ...

Bioengineering
The purpose of this research is to emphasize the importance of mental health and contribute to th... more The purpose of this research is to emphasize the importance of mental health and contribute to the overall well-being of humankind by detecting stress. Stress is a state of strain, whether it be mental or physical. It can result from anything that frustrates, incenses, or unnerves you in an event or thinking. Your body’s response to a demand or challenge is stress. Stress affects people on a daily basis. Stress can be regarded as a hidden pandemic. Long-term (chronic) stress results in ongoing activation of the stress response, which wears down the body over time. Symptoms manifest as behavioral, emotional, and physical effects. The most common method involves administering brief self-report questionnaires such as the Perceived Stress Scale. However, self-report questionnaires frequently lack item specificity and validity, and interview-based measures can be time- and money-consuming. In this research, a novel method used to detect human mental stress by processing audio-visual data...
This paperpresents a reliable methodof restricted totwotypes ofminutiae ridge endings andridge co... more This paperpresents a reliable methodof restricted totwotypes ofminutiae ridge endings andridge computation forminutiae feature extraction from bifurcations asshowninFigure 1. fingerprint images. We present a novelfingerprint representation schemethatrelies on describing the orientation field ofthefingerprint pattern withrespect to -_ eachminutia detail. A fingerprint image istreated asa textured image. Improved algorithms forenhancement of _ _ _ --

Social Science Research Network, 2020
Nowadays it is very normal for humans to experience mild or moderate mental stress in a variety o... more Nowadays it is very normal for humans to experience mild or moderate mental stress in a variety of situations. A manageable amount of stress is good for an individual, however, too much of stress affects person’s mental health and is a guarantor for suicidal risks if left unnoticed over a longer period. It has been proven that long term stress correlates with physical health problems. With the increasing number of people undergoing stress, it is crucial to be able to detect it at an early stage and help people realize and resolve it before much damage is done. The traditional methods of assessing stress levels are by interviewing the individual and by observing the facial gestures. In the interview, stress related questions are asked to have a better understanding of individual’s condition. People under stress react by giving different facial expressions i.e. the eyebrows shape differently, their pupils dilate, or the blinking rate might differ. These methods are limited as they may...

1Student, Dept. of Computer Engineering, Datta Meghe College of Engineering, Navi Mumbai, Maharas... more 1Student, Dept. of Computer Engineering, Datta Meghe College of Engineering, Navi Mumbai, Maharashtra, India 2Professor, Dept. of Computer Engineering, Datta Meghe College of Engineering, Navi Mumbai, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Virtual Coach was developed to play the role of a personal fitness trainer. The main aim was to prevent the trainee from injury caused by incorrect exercise form. This was achieved using Pose Estimation. The sequence of poses captured while performing a particular exercise was mapped to the correctness of the form. This information about correctness was then used to provide real-time captions, audio and visual feedback to the user. This sequential model was trained with data comprising weightlifting and muscle building exercises. Since yoga involves holding the body in a particular position, the assessment for yoga was d...
Emerging multimedia applications demands content-based video processing. Video has to be segmente... more Emerging multimedia applications demands content-based video processing. Video has to be segmented into objects for content-based processing. A number of video object segmentation algorithms have been proposed such as semiautomatic and automatic. Semiautomatic methods adds burden to users and also not suitable for some applications. Automatic segmentation systems are still a challenge, although they are required by many applications. The proposed work aims at contributing to identify the gaps that are present in the current segmentation system and also to give the possible solutions to overcome those gaps so that the accurate and efficient video segmentation system can be developed.
Content based video retrival systems requires video to be segmented into objects. A large number ... more Content based video retrival systems requires video to be segmented into objects. A large number of video segmentation algorithms have been proposed such as semi-automatic and automatic. Semiautomatic methods requires the human intervention and also not suitable for some applications. Many applications requires automatic segmentation but still there is lot of scope for the improvement. The proposed work aims at contributing to identify the laconas that are present in the existing segmentation system and also to give the possible number of solutions to overcome those laconas so that the accurate and efficient video object segmentation system can be developed. The proposed system deals with the issue of automatic video segmentation system such as uncovered background, Temporary poses and Global motion of background.

---------------------------------------------------------------------***-------------------------... more ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract -This project involves Lip to Speech Synthesis and Speech to Lip Generation System. In this project the problem of lip-syncing a talking face video of an arbitrary identity to match a target speech segment is invested. Current works excel at producing accurate lip movements on a static image or videos of specific people seen during the training phase. However, they fail to accurately morph the lip movements of arbitrary identities in dynamic, unconstrained talking face videos, resulting in significant parts of the video being out-of-sync with the new audio. Identifying key reasons about this and hence resolving them by learning from a powerful lip-sync discriminator. Also, to explore the task of lip to speech synthesis, i.e., learning to generate natural speech given only the lip movements of a speaker. Focusing on learning accurate lip sequences to speech mappings for individual speakers in unconstrained, large vocabulary settings. To this end, collecting and releasing a large-scale benchmark dataset, the first of its kind, specifically to train and evaluate the single speaker lip to speech task in natural settings. By proposing a novel approach with key design choices to achieve accurate, natural lip to speech synthesis in such unconstrained scenarios for the first time.

International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
Vehicles being the most widely used machines need to get smarter compared to their current techno... more Vehicles being the most widely used machines need to get smarter compared to their current technology. The necessity described by the younger generation of users, the millennials, for their devices to be smart and their vision to have more computerized and smarter applications of various sensors. The invention and development of better-computerized systems for infotainment and control of vehicles have taken speed and research is done mainly in an open-source on Linux kernel-based operating systems. The Smart Bike System is a Raspberry pi based operating system(AGL) for bikes tracks the various components of the bike like Speed, Quantity of fuel, Distance covered in a single trip, Temperature, Date and Time. We make a note that the current system of dashboards for representing the various aspects of a bike is old. A significant improvement would be made in the quality of the bike and the way people use it if the current computer technology of the world embraces the vehicular system. ...

International Journal of Scientific Research in Computer Science, Engineering and Information Technology
In today's world, blockchain-based systems are in demand across various industries, especiall... more In today's world, blockchain-based systems are in demand across various industries, especially in transportation and supply chain, because of its secure, trusted, and decentralized network as well as more efficient than the traditional methods. However, the traditional ways these days are facing a lot of issues and challenges because of the complex and less secure network. Blockchain network integration overcomes the problems faced by traditional methods across industries. The Blockchain integrated network provides benefits such as a reduction in cost, scalability, improve efficiency by connecting the links between the flows, increase Transparency, the trace of the product. Although the blockchain-based systems provide various benefits, due to lack of knowledge about this technology, the implementation rate is low. In this work, it highlights the distinction between the traditional transportation and supply chain as well as Blockchain network-based transportation and supply chai...

International Journal of Science and Research (IJSR)
Emerging multimedia applications demand content-based video processing. Video has to be segmented... more Emerging multimedia applications demand content-based video processing. Video has to be segmented into objects for content-based processing. A number of video object segmentation algorithms have been proposed such as semiautomatic and automatic. Semiautomatic method adds burden to users and also not suitable for some applications. Automatic segmentation systems are still a challenge, although they are required by many applications. The proposed work aims at contributing to develop a system to segment video objects automatically from the background given a sequence of video frames. The proposed work will identify and solve different problems in change detection like uncovered background, global motion of background, temporary poses. In the proposed work we will try to resolve the issue of moving camera and uncovered background. For moving camera we will use Affine Motion Model. To resolve the issue of the Uncovered Background we will use Background Registration Technique. The proposed work will try to resolve the issue of temporary poses by integrating the region based segmentation with the system. To improve the resulting change detection masks, a post-processing method is used to fill open areas inside object regions with uniform intensity. To improve the boundary of segmentation masks, morphological operations will be used.
Procedia Computer Science, 2016
Abstract Video has to be segmented into objects for content-based processing. A number of video o... more Abstract Video has to be segmented into objects for content-based processing. A number of video object segmentation algorithms have been proposed such as semiautomatic and automatic. Semiautomatic methods adds burden to users and also not suitable for some applications. Automatic segmentation systems are still a challenge, although they are required by many applications. The proposed work aims at contributing to identify the gaps that are present in the current segmentation system and also to give the possible solutions to overcome those gaps so that the accurate and efficient video segmentation system can be developed. The proposed system aims to resolve the issue of uncovered background, Temporary poses and Global motion of background.
With the today's changing and high-tech lifestyle the use of network becomes a part of each and e... more With the today's changing and high-tech lifestyle the use of network becomes a part of each and everyone's routine life. Most of us keep and access sensitive data online. So it becomes most important to secure your network from various network attacks. Intruder is one of the most publicized threats to network security. Network intrusion detection system (NIDS) has become a standard component in network security infrasture.But at the same time today's intrusion detection system faces number of challenges. An intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper we address two concepts one layered architecture and second conditional random fields and integrate them to improve the overall accuracy and effiency of the system.
Uploads
Papers by shubhangi vaikole