Papers by Khushboo Saxena
International Journal on Recent and Innovation Trends in Computing and Communication
Underwater images undergo quality degradation issues of an image, like blur image, poor contrast,... more Underwater images undergo quality degradation issues of an image, like blur image, poor contrast, non-uniform illumination etc. Therefore, to process these degraded images, image processing come into existence. In this paper, two important image processing methods namely Image restoration and Image enhancement are compared. This paper also discusses the quality measures parameters of image processing which will be helpful to see clear images.

International Journal of Electrical and Electronics Research
Image Restoration is a significant phase to process images for their enhancement. Underwater phot... more Image Restoration is a significant phase to process images for their enhancement. Underwater photographs are subject to quality issues such as blurry photos, poor contrast, uneven lighting, etc. Image processing is crucial in the processing of these degraded images. This research introduced an ensemble-based classifier based on the bagging approach to enhance UW images. The support vector machine and random forest classifiers serve as the ensemble classifier's main classifiers. Additionally, to complement the feature optimization technique, the proposed ensemble classifier leverages particle swarm optimization. The feature selection method for the classifier is improved by the feature optimization process. To validate results, underwater images are collected by the Kaggle repository. In this process, Extreme Learning (EL) and Convolution Neural Network (CNN) are compared with suggested algorithms. The simulation results indicate that the proposed algorithm outperformed the exist...
Importance of internet marketing
ABSTRACT: The Internet is a much more accountable and measurable medium than traditional media. T... more ABSTRACT: The Internet is a much more accountable and measurable medium than traditional media. The unique property of the Internet being a medium with bidirectional information flows has enabled performance-based pricing models that tie online advertising payments directly to campaign measurement data such as click-through and purchases. These pricing models have become increasingly popular in the online advertising industry and this is done by websites. Website is the backbone of any Internet marketing plan. Whether a company utilizes search engine marketing, e-mail marketing, affiliate marketing or contextual advertising, a website is the element that the campaigns are built upon. Companies have been redefining their marketing and branding strategies due to the unique characteristics of the internet and its capacity to change old rules
As data mining is used to extract valuable information from large amount of data. But this is har... more As data mining is used to extract valuable information from large amount of data. But this is harmful in some cases so some kind of protection is required for sensitive information. So privacy preserving mining is emerge with the goal to provide protection from mining. There are many research branches in this area. This paper focus on analyzing different techniques of privacy persevering and specify there requirement for special type of cases.

BT Code and SVM Feature Based CBIR
Mechanical Engineering eJournal, 2018
In content-based image retrieval (CBIR) implies the mission of a picture proceeds at the genuine ... more In content-based image retrieval (CBIR) implies the mission of a picture proceeds at the genuine substance material of picture to a positive volume to its metadata. The CBIR System has used for the evacuate the highlights, ordering person's highlights by improper development and competently given a reaction to the client's vulnerability. To supply the sensible reaction to the customer question, CBIR gave some keep running of work. A novel plan is arranged in this paper for shading picture ordering by building up the simplicity of the SVM framework. A novel strategy is proposed in this paper for shading picture ordering by misuse for it simple of the SVM framework. This component Extraction was viewed as the paired order issue and SVM was utilized for the arrangement this issue. It is assumed that to accomplish the extraction at the quick and furthermore to make it so versatile that it can similarly change with the photos of significant size. The essential point of this paper...
Privacy prevention of sensitive rules and values using perturbation technique
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
With the increase of digital data on servers different approach of data mining is done. This lead... more With the increase of digital data on servers different approach of data mining is done. This lead to important issue of proving privacy to the unfair information against any person, place, community etc. So Privacy preserving mining come in existence. This paper provide privacy for sensitive rule that discriminate data on the basis of frequency. So finding of those rules and suppression is done. Perturbation technique is use for the hiding sensitive rules. Experiment is done on real adult dataset for different ratio. Results shows that proposed work is better in maintaining the Perturbation Percentage, Individual Privacy at last suppress rules while other rules are remain unaffected.

The search for efficient Image Denoising methods is still a challenge at the crossing of function... more The search for efficient Image Denoising methods is still a challenge at the crossing of functional analysis and statistics. Image Denoising plays an important role in the image pre-processing. Visual information transmitted in the form of digital images which is becoming a major method of communication in the modern age, but image obtained after the transmission is often distorted with noise. The received image needs processing before it can be used in applications. Image Denoising involves the manipulation of the image data to develop a visually rich quality image. There are many methods to resolve the problems of Image Denoising. There are many Image Denoising algorithms exists, such as Wavelet Transform based approach, Haar Wavelet Transform approach, and Fractal-Wavelet approach. Image Denoising methods hierarchical structure is shown via diagram. In this research survey, It is studied the fundamental performance limits of Image Denoising methods/ algorithms where the aim of al...

A KNN-ACO approach for intrusion detection using KDDCUP'99 dataset
2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016
Feature reduction in data mining from the large dataset can proficiently develop and enhance the ... more Feature reduction in data mining from the large dataset can proficiently develop and enhance the performance of the whole system. The reduction of feature is chosen using entropy and information gain. Consequently, that reduced feature subset is passed to the KNN classifier to expose the normal and abnormal classes of attack. In this work, intrusion detection using data mining algorithm is discussed. The intrusion detection system supervises the activity performed by the users and if any type of misconduct activity is detected then it alert to the administrator to avert it. Here, the exercise is done on KNN classifier with ACO (ant colony optimization) method to expose the intruders and make a use of KDDCUP dataset to categorize different class of attack. The simulation analysis of proposed system is done using accuracy and false alarm rate (FAR) performance parameter. Our proposed system generates more accurate results than the existing method.
This paper provides an up-to-date critical survey of enhancement of infrared images by two popula... more This paper provides an up-to-date critical survey of enhancement of infrared images by two popular algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) based upon a infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. To provide this comprehensive survey we have not only focused on concept of infrared image but also two enhancement techniques are presented and discussed along with their advantages and disadvantages

Evaluation of Security Conditions of Protocols for Data Routing in Wireless Sensors Networks
A wireless sensor networks have recently emerged as successful technologies in a number of applic... more A wireless sensor networks have recently emerged as successful technologies in a number of application domains. WSN design is influenced by many factors such as transmission errors, network topology and power consumption. Security in wireless sensor network is a challenging task; the need to build security services into them remains however a considerable challenge as the hardware used often shows serious processing and energy limitations. This work evaluates the impact of a security conditions and robustness criteria of routing protocols for WSN. Some of ITS features are not found in existing WSN simulation systems. It will provide the opportunity to implement and evaluate routing algorithms are designed to be that secure but for which there are in the experimental studies on the robustness and real impact of designed security mechanisms. This evaluation will focus primarily on examining the effectiveness of the provided security mechanisms. Additionally, it will also assess the im...
This paper provides an up-to-date critical survey of enhancement of infrared images by two popula... more This paper provides an up-to-date critical survey of enhancement of infrared images by two popular algorithms namely spatial and spatiotemporal homomorphic filtering (SHF and STHF) based upon a infrared imaging model. Although spatiotemporal homomorphic filtering may reduce the number of iterations greatly in comparison to spatial one for a similar degree of convergence by making explicit use of the additional information provided temporally, the enhanced results from SHF are in general better than those from STHF. To provide this comprehensive survey we have not only focused on concept of infrared image but also two enhancement techniques are presented and discussed along with their advantages and disadvantages

Hybrid Technique Based on DBSCAN for Selection of Improved Features for Intrusion Detection System
Advances in Intelligent Systems and Computing, 2018
Data mining is the taking out of concealed data from enormous databases (DBs); it is an effective... more Data mining is the taking out of concealed data from enormous databases (DBs); it is an effective innovation with unusual probable to enable associations to deliberate on the mainly imperative data in their data warehouses. IDS are the chief issue of the security which is helpful in everyday life to avoid the data from the attackers. Data mining includes numerous methods for the detection of intrusion which involves the detection of all harmful activities. In our proposed work, we initially apply KDD cup’99 dataset which is most broadly used method for detecting intrusion. DBSCAN is the most utilized method which is used to eliminate noise from the data. Then, we generate the most meaning inputs by analyzing and processing whole data which is done by the selection of feature method. K-means clustering performs grouping of data which is followed by SMO classifier. So we proposed a hybrid structure which improves the taken as a whole accuracy. MATLAB and WEKA tools are used to execute the whole process.
Visual cryptography and concurrent slice-tracking with privacy preserving in data mining
2016 International Conference on ICT in Business Industry & Government (ICTBIG), 2016
In this work, visual crypto is basically peeling of partitions from original image, grouping the ... more In this work, visual crypto is basically peeling of partitions from original image, grouping the peeled portions in a random manner using schemes like modular process. This is analogous to the long division process with the successive distinct remainders providing the information to reconstruct the original image. The slice positions are randomized, but related with one another in a subtle way such that using the first set of sliced sub-frames, the next set can be reconstructed. In this paper, using the concepts of group theory, the slices are randomized and multiple partitions are handled concurrently with verilog implementation.

IntroductionOSA has been postulated to be associated with mortality in COVID19, but studies are l... more IntroductionOSA has been postulated to be associated with mortality in COVID19, but studies are lacking thereof. This study was done to estimate prevalence of OSA in patients with COVID-19 using various screening questionnaires and to assess effect of OSA on outcome of disease.MethodologyIn this prospective observational study, consecutive patients with RTPCR confirmed COVID 19 patients were screened for OSA by different questionnaires (STOPBANG, Berlin Questionnaire, NoSAS and Epworth Scale). Association between OSA and outcome (mortality) and requirement for respiratory support was assessed.ResultsIn study of 213 patients; screening questionnaires for OSA {STOPBANG, Berlin Questionnaire (BQ), NoSAS} were more likely to be positive in patients who died compared to patients who survived. On binary logistic yregression analysis, age≥55 and STOPBANG score ≥5 were found to have small positive but independent effect on mortality even after adjusting for other variables. Proportion of pa...

SSRN Electronic Journal, 2018
CC is getting to be noticeably worldwide as it offers quick and effective on-request services for... more CC is getting to be noticeably worldwide as it offers quick and effective on-request services for storage, system, software, and hardware through the Internet CC offers most recent offices to undertakings, organizations, and the general, open and gives ease registering framework to IT-based arrangements. Load balancing (LB) in clouds is a strategy that conveys the overabundance dynamic local workload equally over every one of the nodes. It is utilized for accomplishing a better service provisioning and resource utilization ratio, thus enhancing the general execution of the framework Incoming undertakings are originating from various area are gotten by the load balancer and after that appropriated to the server farm, for the best possible load distribution. In this paper, we performed detailed analysis on execution time for different encryption algorithm for different data size.

SSRN Electronic Journal, 2018
Cloud computing (CC) performs calculation over a collective and huge group of resources for the d... more Cloud computing (CC) performs calculation over a collective and huge group of resources for the dispersed environment. It calculates the resources using applications, processing power, storage etc. As its practical use in the day to day life, it grabs much more attention for the research in academic and industry. CC gives various advantages, including lessened IT costs, adaptability, expanded collaboration, and so forth. Nonetheless, the approach of CC has represented an assortment of new difficulties for both cloud clients and cloud specialist sources. With increasing attentiveness and apprehensions considers to CC and Information Security, there is increasing awareness and practice of Security Algorithms into procedures and Systems of records. As recognized by study, numerous of the concerns dealing with the CC want to be resolved immediately. The industry has prepared important progresses in reducing threats to CC, but there is additional to be done to attain a level of maturity that presently exists with conventional/on-premise hosting.
International Business & Economics Research Journal (IBER), 2010
In developing countries like India, mobilization of rural saving is necessary for inclusive growt... more In developing countries like India, mobilization of rural saving is necessary for inclusive growth. This micro study, aims at ascertaining the significance of financial institutions in mobilizing financial saving of rural/ semi-urban households. It is based on the primary data collected from full scale sample survey conducted in five villages and two suburban areas of National Capital Region, India. A hierarchal regression carried out on this data identified that the membership of financial institutions, specifically that of banks, insurance and informal financial institutions explains significant proportion of the variation in the rural household financial saving.

A hybrid technique for License Plate Recognition based on feature selection of wavelet transform and artificial neural network
2014 International Conference on Reliability Optimization and Information Technology (ICROIT), 2014
A number of vehicles may be controlled and supervised by traffic security and its management. The... more A number of vehicles may be controlled and supervised by traffic security and its management. The License Plate Recognition is broadly employed in traffic management to recognize a vehicle whose owner has despoiled traffic laws or to find stolen vehicles. Vehicle License Plate Detection and Recognition is a key technique in most of the traffic related applications such as searching of stolen vehicles, road traffic monitoring, airport gate monitoring, speed monitoring and automatic parking lots access control. It is simply the ability of automatically extract and recognition of the vehicle license number plate's character from a captured image. Number Plate Recognition method suffered from problem of feature selection process. The current method of number plate recognition system only focus on local, global and Neural Network process of Feature Extraction and process for detection. The Optimized Feature Selection process improves the detection ratio of number plate recognition. In this paper, it is proposed a new methodology for `License Plate Recognition' based on wavelet transform function. This proposed methodology compare with Correlation based method for detection of number plate. Empirical result shows that better performance in comparison of correlation based technique for number plate recognition. Here, it is modified the Matching Technique for numberplate recognition by using Multi-Class RBF Neural Network Optimization.

Survey Paper on Visibility Restoration of Underwater Optical Images and Enhancement Techniques
IOP Conference Series: Materials Science and Engineering, 2021
We have investigated the problem of underwater hazy image enhancement and restoration in this pap... more We have investigated the problem of underwater hazy image enhancement and restoration in this paper studied. Underwater image processing has several applications in the field of oceanic research work and scientific applications such as archaeology, geology, underwater environmental assessment, laying of long distance gas pipelines and communication links across the continents which demand geo-referential surveying of the oceanic bed and prospection of ancient shipwreck. There are many difficulties for undersea optical imaging. To submerging a camera in underwater enough space is required. The maneuvering of the camera with the help from remote place or in person at the site is likewise a complex task. However, the major challenge is imposed by underwater medium properties. Underwater haze image enhancement has gained widespread importance with the rapid development of modern imaging equipment. Though, the contrast enhancement of single underwater hazy image is a cumbersome task for ...
Uploads
Papers by Khushboo Saxena