Mayank Shrivastava

ORCID: 0000-0003-1672-1702
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Text Analysis Techniques
  • Sentiment Analysis and Opinion Mining
  • Software System Performance and Reliability
  • Algorithms and Data Compression
  • Advanced Software Engineering Methodologies
  • Privacy, Security, and Data Protection
  • Topic Modeling
  • Chaos-based Image/Signal Encryption
  • Cryptographic Implementations and Security
  • IoT-based Smart Home Systems
  • European and International Contract Law
  • Generative Adversarial Networks and Image Synthesis
  • Text and Document Classification Technologies
  • Digital Media Forensic Detection
  • IoT and Edge/Fog Computing
  • Dispute Resolution and Class Actions
  • Advanced Database Systems and Queries
  • ICT in Developing Communities
  • Internet of Things and AI
  • Software Reliability and Analysis Research
  • Data Management and Algorithms
  • Advanced Image and Video Retrieval Techniques
  • Coding theory and cryptography
  • Music and Audio Processing

Jaypee University of Engineering and Technology
2019-2020

LinkedIn (United States)
2018

AISECT University
2013

Indian Institute of Technology Kharagpur
2011

Modern users demand analytical features on fresh, real time data. Offering these to hundreds of millions is a relevant problem encountered by many large scale web companies.

10.1145/3183713.3190661 article EN Proceedings of the 2022 International Conference on Management of Data 2018-05-25

This paper presents two-stream processing of audio to index the content for Spoken Web search. The first stream indexes meta-data associated with a particular document. is usually very sparse, but accurate. therefore results in high-precision, low-recall index. second uses novel language-independent speech recognition generate text be indexed. Owing multiple languages and noise user generated on Web, accuracy such systems not high, thus they result low-precision, high-recall attempts use...

10.1145/1963192.1963364 article EN 2011-03-28

Because of the defect only single data encryption and use famous algorithm, which was not improved in traditional methods registration process, a combined algorithm is proposed this paper.That is, security greatly improved, through researching several algorithms, improving some algorithms.In paper, new hybrid crypto [1, 2, 3] concept combination symmetric message digesting function (MD-5).Moreover, performance technique calculated presented results showing technique.

10.5120/13845-1674 article EN International Journal of Computer Applications 2013-10-18

Humans act as a social animal and drive on intuitions. These intuitions are the result of sentiments which one perceived through life experiences. Applying analytics Opinion Mining can help governments, businesses educational institutions to define policy that best suits consumer base. This study aims review researches sentiment analysis where techniques vary from early attempts newly developed. The implementing supervised unsupervised would identify hidden texts have been categorized...

10.1109/cict48419.2019.9066186 article EN 2019-12-01

The complexity and continuous evolution of enterprise systems is making it increasingly difficult to maintain the predictability system. system managers are often unaware impact an action across various layers IT ranging from business functions, applications, infrastructure. Due lack this transparency, many risks go unnoticed leading outages or violations Service Level Agreements (SLAs). In paper, we address problem analysis component on We present novel techniques model aspects dependencies...

10.1109/dsaa.2015.7344807 article EN 2015-10-01
Coming Soon ...