Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Divya Kapil

    Divya Kapil

    Machine Learning is empowering many aspects of day-to-day lives from filtering the content on social networks to suggestions of products that we may be looking for. This technology focuses on taking objects as image input to find new... more
    Machine Learning is empowering many aspects of day-to-day lives from filtering the content on social networks to suggestions of products that we may be looking for. This technology focuses on taking objects as image input to find new observations or show items based on user interest. The major discussion here is the Machine Learning techniques where we use supervised learning where the computer learns by the input data/training data and predict result based on experience. We also discuss the machine learning algorithms: Naïve Bayes Classifier, K-Nearest Neighbor, Random Forest, Decision Tress, Boosted Trees, Support Vector Machine, and use these classifiers on a dataset Malgenome and Drebin which are the Android Malware Dataset. Android is an operating system that is gaining popularity these days and with a rise in demand of these devices the rise in Android Malware. The traditional techniques methods which were used to detect malware was unable to detect unknown applications. We ha...
    Today Internet technology has become an essential part of our life for education, entertainment, gaming, banking and communication. In this modern digital era, it is very easy to have any information by one click. But everything which has... more
    Today Internet technology has become an essential part of our life for education, entertainment, gaming, banking and communication. In this modern digital era, it is very easy to have any information by one click. But everything which has pros and cons, as we have any information at our tips but Internet is an attack platform also. When we use Internet to make our work easy same time many attacker try to steal information from our system. There are many means for attacking, malicious URL one of them. When a user visits a website, which is malicious then it triggers a malicious activity which is predesigned. Hence, there are various approaches to find dangerous URL on the Internet. In this paper, we are using machine learning approach to detect malicious URLs. We used ISCXURL2016 dataset and used J48, Random forest, Lazy algorithm and Bayes net classifiers. As performance metrics, we calculate accuracy, TPR, FPR, precision and recall.
    Reuse is the elementary and essential attribute of the component-based software engineering. Reusability focuses on building huge and complex software through assembling pre-fabricated software constructs. In this paper, our emphasis is... more
    Reuse is the elementary and essential attribute of the component-based software engineering. Reusability focuses on building huge and complex software through assembling pre-fabricated software constructs. In this paper, our emphasis is on to analyze and quantify the two core notions of component-based software, that is, reusability and interaction behavior of the components with the goal of minimum complexity generation. We analyse prominent works available in the literature in the area of reuse and interaction complexities. We Analyze and Estimate reusability complexities of components in Component-Based Software Engineering and we propose efficient and useful metrics to compute the reusability of components. Reusability metrics are defined for individual components as well as overall system level. Different types of components are defined on the basis of their reusability, that is, components that can be reused as it as, and tailored components. To define the metrics we have used...
    Virtualization technology allows abstraction and isolation of lower level functionalities and underlying hardware. Virtual machine monitor, also called a hypervisor, which is a logical layer between underlying hardware and computational... more
    Virtualization technology allows abstraction and isolation of lower level functionalities and underlying hardware. Virtual machine monitor, also called a hypervisor, which is a logical layer between underlying hardware and computational processes, and runs on the top of a given host. Virtualization provides facility to migrate virtual machine from one host (source) to another physical host (destination). Virtual Machine Migration is a useful tool for administrator of data centers. The reasons for VM migration are: Load Balancing, accomplished by migrating VMs out of overloaded / overheated servers, and Server Consolidation. Two major VM migration technologies are VMotion and XenMotion respectively supported by two major virtualization vendors-VMware and Citrix. In this paper we are comparing these two live virtual machine migration techniques.
    Nowadays, computer technology has become necessary in our day-to-day life in various aspects such as communication, entertainment, education, banking, etc. In the digital era Network, security is essential, and the most challenging issue... more
    Nowadays, computer technology has become necessary in our day-to-day life in various aspects such as communication, entertainment, education, banking, etc. In the digital era Network, security is essential, and the most challenging issue is identifying the intrusion attacks. An intrusion Detection System is a technique that monitors the network for anomalous activities and when these actions are discovered, then it generates an alert. An intrusion Detection System analyses big data due to heavy traffic and it protects data and computer networks from malicious actions. So, a fast and efficient classification technique is required to classify the normal and suspicious activities. For intrusion detection, various techniques have come into existence that leverage the machine learning approach. Various machine learning-based IDS techniques are described and categorized in this paper. Also, this research work presents a threat model in various networking layers. For experimental analysis, the NSL_KDD dataset are used and Naïve Bayes, Random forest, and J 48 classification algorithms are used and the results are shown for TPR, precision FPR, F-measure, recall parameters.
    The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device... more
    The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation and live migration. In this paper we present an overview of cloud computing and also describe about its key technology "virtualization". We are also presenting research challenges in cloud computing.
    Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide... more
    Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide service. It splits up a physical machine into several virtual machines. A virtual machine can be defined as, “It is a software implementation of a computing environment in which an operating system or application can be installed and run. As hardware cost went down, the need for virtualization faded out. More recently, virtualization become important again to improve availability, security, cost reducing, reliability and flexibility. This paper describes Virtualization technology concept. And also a case study on live virtual machine migration is used to explain the points. Keywords— Virtualization, Virtual machine, Live virtual machine migration, cloud computing
    Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics and pandemics. Despite the advances in medication and drugs , virus generated infectious diseases are one of the main reason behind death... more
    Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics and pandemics. Despite the advances in medication and drugs , virus generated infectious diseases are one of the main reason behind death worldwide, particularly in low-income countries .Machine learning and computing are widely utilized in diagnose certain types of cancer from imaging knowledge/data and also in other clinical imaging data based diseases. This paper aims to investigate and compare machine learning classifiers for Ebola Virus Disease. The Kaggle data set for Ebola Virus diseases, containing 2486 instances, has been used as the database for the training and testing. For experimental analysis, we use Naïve Bayes, Random forest, and J 48 classification algorithms and show the results for TPR, precision FPR, F-measure, recall and ROC curve.