Skip to main content

previous disabled Page of 2
and
  1. No Access

    Article

    HFCCW: A Novel Hybrid Filter-Clustering-Coevolutionary Wrapper Feature Selection Approach for Network Anomaly Detection

    Network anomaly detection (NAD) is a crucial Artificial Intelligence (AI)-based security solution for protecting computer networks. However, analyzing high-dimensional data is a significant impediment for NAD ...

    Niharika Sharma, Bhavna Arora in International Journal of Machine Learning and Cybernetics (2024)

  2. No Access

    Article

    A comprehensive evaluation of feature-based AI techniques for deepfake detection

    In the contemporary era, where data and information are the key source in every domain, it becomes imperative to identify, detect and distinguish between fake and authentic content available online. Recent tec...

    Neha Sandotra, Bhavna Arora in Neural Computing and Applications (2024)

  3. No Access

    Article

    Flow Directions and Ages of Subsurface Water in a Salt Marsh System Constrained by Isotope Tracing

    Salt marshes are dynamic hydrologic systems where terrestrial groundwater, terrestrial surface water, and seawater mix due to bi-directional flows and pressure gradients. Due to the counteracting terrestrial a...

    Emilio Grande, Ate Visser, Erik Oerter, Bhavna Arora in Estuaries and Coasts (2023)

  4. Article

    Open Access

    The environmental controls on efficiency of enhanced rock weathering in soils

    Enhanced rock weathering (ERW) in soils is a promising carbon removal technology, but the realistically achievable efficiency, controlled primarily by in situ weathering rates of the applied rocks, is highly u...

    Hang Deng, Eric Sonnenthal, Bhavna Arora, Hanna Breunig, Eoin Brodie in Scientific Reports (2023)

  5. Article

    Open Access

    River thorium concentrations can record bedrock fracture processes including some triggered by distant seismic events

    Fractures are integral to the hydrology and geochemistry of watersheds, but our understanding of fracture dynamics is very limited because of the challenge of monitoring the subsurface. Here we provide evidenc...

    Benjamin Gilbert, Sergio Carrero, Wenming Dong, Claresta Joe-Wong in Nature Communications (2023)

  6. Article

    Open Access

    Long-term missing value imputation for time series data using deep neural networks

    We present an approach that uses a deep learning model, in particular, a MultiLayer Perceptron, for estimating the missing values of a variable in multivariate time series data. We focus on filling a long cont...

    Jangho Park, Juliane Müller, Bhavna Arora in Neural Computing and Applications (2023)

  7. No Access

    Chapter and Conference Paper

    Composition of Static and Dynamic Analysis for Algorithmic-Level Code Semantic Optimization

    Program optimization can be done at various levels like design, algorithm, data structure, source code, and run time. It can be based on various parameters like time, space, and code complexity. Higher the lev...

    Mehul Thakral, V. C. Skanda, Bhavna Arora in Machine Learning, Image Processing, Networ… (2023)

  8. No Access

    Chapter and Conference Paper

    Deep Learning Techniques Used for Fake News Detection: A Review and Analysis

    People can quickly obtain and publish the news through many platforms, i.e. social media, blogs, and websites, among others. Everything that is available on these platforms in not credible and it became impera...

    Yasmeena Akter, Bhavna Arora in Proceedings of International Conference on… (2023)

  9. No Access

    Chapter and Conference Paper

    Machine Learning Techniques for Image Manipulation Detection: A Review and Analysis

    Low-cost modified or tampered image enhancement processes and advanced multimedia technologies are becoming easily obtainable as image editing methods, different editing software, and image altering tools are ...

    Suhaib Wajahat Iqbal, Bhavna Arora in Proceedings of International Conference on… (2023)

  10. No Access

    Chapter and Conference Paper

    Framework for Detection of Malware Using Random Forest Classifier

    Malware poses a challenging threat to this digital world of communication, as it can manipulate or perform any baffling activity inside a computer by corrupting important files and disabling the network system...

    Mohsin Manzoor, Bhavna Arora in Proceedings of International Conference on… (2023)

  11. Article

    Combating multimodal fake news on social media: methods, datasets, and future perspective

    The growth in the use of social media platforms such as Facebook and Twitter over the past decade has significantly facilitated and improved the way people communicate with each other. However, the information...

    Sakshini Hangloo, Bhavna Arora in Multimedia Systems (2022)

  12. No Access

    Chapter and Conference Paper

    Cyber Threat Intelligence “Comparative Analysis of Its Sources and Parameters of Evaluation”

    Cyber threat intelligence plays a significant role in defending against the ever increasingly frequent, varied and sophisticated cyber-attacks. Threat intelligence is information about the cyber threats and th...

    Govind Kanav Singh, Bhavna Arora in Innovations in Computer Science and Engineering (2022)

  13. No Access

    Chapter and Conference Paper

    Stemming Techniques on English Language and Devanagari Script: A Review

    Natural language processing (NLP) is the branch of artificial intelligence, computer science, and linguistics which is used to understand and determine implications to human languages in a keen and valuable wa...

    Samridhi Gupta, Bhavna Arora in Recent Innovations in Computing (2022)

  14. No Access

    Chapter and Conference Paper

    A Review of Credit Card Fraud Detection Techniques

    In today’s world, people are more inclined towards online shop** and payment, which is leading to an increase in the number of credit card users worldwide. And in the result of that, fraudsters are also find...

    Sourabh, Bhavna Arora in Recent Innovations in Computing (2022)

  15. No Access

    Chapter

    Hot Spots and Hot Moments in the Critical Zone: Identification of and Incorporation into Reactive Transport Models

    Biogeochemical processes are often spatially discrete (hot spots) and temporally isolated (hot moments) due to variability in controlling factors like hydrologic fluxes, lithological characteristics, bio-geomo...

    Bhavna Arora, Martin A. Briggs, Jay P. Zarnetske in Biogeochemistry of the Critical Zone (2022)

  16. No Access

    Article

    Surrogate optimization of deep neural networks for groundwater predictions

    Sustainable management of groundwater resources under changing climatic conditions require an application of reliable and accurate predictions of groundwater levels. Mechanistic multi-scale, multi-physics simu...

    Juliane Müller, Jangho Park, Reetik Sahu in Journal of Global Optimization (2021)

  17. No Access

    Article

    Microbially mediated kinetic sulfur isotope fractionation: reactive transport modeling benchmark

    Microbially mediated sulfate reduction is a ubiquitous process in many subsurface systems. Isotopic fractionation is characteristic of this anaerobic process, since sulfate-reducing bacteria (SRB) favor the re...

    Yiwei Cheng, Bhavna Arora, S. Sevinç Şengör in Computational Geosciences (2021)

  18. No Access

    Article

    Stable and radioactive carbon isotope partitioning in soils and saturated systems: a reactive transport modeling benchmark study

    This benchmark provides the first rigorous test of a three-isotope system [12C, 13C, and 14C] subject to the combined effects of radioactive decay and both stable equilibrium and kinetic fractionation. We present...

    Jennifer L. Druhan, Sophie Guillon, Manon Lincker in Computational Geosciences (2021)

  19. No Access

    Chapter and Conference Paper

    Feature Selection and Extraction for Dogri Text Summarization

    Text summarization is defined as the process of condensing information from the source text into a shorter form without affecting the context of the information. Based on the summary generated by the summariza...

    Sonam Gandotra, Bhavna Arora in Rising Threats in Expert Applications and Solutions (2021)

  20. No Access

    Chapter and Conference Paper

    Hybridization of Energy-Efficient Clustering and Multi-heuristic Strategies to Increase Lifetime of Network—A Review

    Wireless sensor network has significant applications but few flaws also exist. The flaw of sensor energy consumption requires to be tackled. The sensor is an integrated component of WSN that is used to collect...

    Deepak Sharma, Bhavna Arora in Innovations in Information and Communicati… (2021)

previous disabled Page of 2