- Topic Modeling
- Spam and Phishing Detection
- Natural Language Processing Techniques
- Advanced Malware Detection Techniques
- Software Engineering Research
- User Authentication and Security Systems
- Biomedical Text Mining and Ontologies
- COVID-19 Clinical Research Studies
- SARS-CoV-2 and COVID-19 Research
- Misinformation and Its Impacts
- Biometric Identification and Security
- Herpesvirus Infections and Treatments
- Poxvirus research and outbreaks
- Hepatitis C virus research
- Bacillus and Francisella bacterial research
- Impact of Technology on Adolescents
- Digital Mental Health Interventions
- Data Quality and Management
- Consumer Retail Behavior Studies
- Angiogenesis and VEGF in Cancer
- Hate Speech and Cyberbullying Detection
- Music and Audio Processing
- Advanced Steganography and Watermarking Techniques
- Rheumatoid Arthritis Research and Therapies
- Network Security and Intrusion Detection
Sharda University
2022-2023
Koneru Lakshmaiah Education Foundation
2020-2023
Jain University
2022
University of Maryland, Baltimore County
2016-2021
West Middlesex University Hospital
2020
University of Maryland, Baltimore
2019
In recent years pre-trained language models (PLM) such as BERT have proven to be very effective in diverse NLP tasks Information Extraction, Sentiment Analysis and Question Answering. Trained with massive general-domain text, these capture rich syntactic, semantic discourse information the text. However, due differences between general specific domain text (e.g., Wikipedia versus clinic notes), may not ideal for domain-specific extracting clinical relations). Furthermore, it require...
Arpita Roy, Youngja Park, Taesung Lee, Shimei Pan. Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and 9th International Joint (EMNLP-IJCNLP). 2019.
In medical imaging, skin lesion prediction and classification is highly crucial while predicting malignancy. Various prevailing deep learning-based CAD diagnosis approaches show poor performance. It incredibly challenging to diagnose lesions with complex features like artefacts, boundary analysis, low contrast images foreground background images, constraint training datasets. Also, it relies on the appropriate tuning of millions parameters that causes generalization, overfitting, massive...
The discovery of the SARS-CoV-2 Omicron (B.1.1.529) variant has sparked alarm globally because its rapid rate infection and trespassing acquired immunity due to vaccination or natural infection. This heavily mutated is rapidly spreading around world. Infected individuals with may suffer from flu-like symptoms, infected Delta frequently report low oxygen levels, high pulse rates, a loss smell taste. Also, causes asymptomatic mild disease so far, not any severe illness as like Delta, this new...
The rapid evolution of digital technologies has necessitated robust and scalable testing solutions to ensure high-quality software delivery across multiple domains. Karate Framework emerges as a comprehensive solution that seamlessly integrates API UI test automation, enabling organizations achieve enhanced efficiency, reliability, agility in their processes. By leveraging Karate’s intuitive syntax versatile features, engineers can design reusable cases facilitate cross-functional efforts...
Problematic internet use (PIU) by children and adolescents is a concern for many parents. Several factors, including students' education level, the method of instruction, dependence on internet, their intended could all be contributing factors to PIU depression. Disturbed mental health may attributed cancellation physical classes because COVID-19 outbreak. This study aimed assess association pandemic with depressive symptoms in adolescent students.
Word embedding is a Natural Language Processing (NLP) technique that automatically maps words from vocabulary to vectors of real numbers in an space. It has been widely used recent years boost the performance vari-ety NLP tasks such as Named Entity Recognition, Syntac-tic Parsing and Sentiment Analysis. Classic word methods Word2Vec GloVe work well when they are given large text corpus. When input texts sparse many specialized domains (e.g., cybersecurity), these often fail produce...
Security of the data is one major concerns now a days. To secure text–based authentication vulnerable to attacks like shoulder surfing, hidden cameras and hackers. avoid these attacks, biometric schemes are useful by means face recognition, voice thumb impression detection, fingerprint detection etc which more costly as it requires some external equipments. In this paper, we proposed security system based on fuzzy rule intelligent can be used for process user's behavior. The behavioral...
Monkeypox (MPOX) is a zoonotic viral disease caused by an Orthopox DNA virus named mpox (MPOXV). Scientists first discovered MPOXV in monkey transported from Singapore to Denmark for research purposes. However, at first, the virus's primary animal reservoir was rodents. In 1970, 9-year-old child Democratic Republic of Congo diagnosed with MPOX. Since then, 11 African nations have recorded human instances MPOX.1 Between 1970 and 1979, six countries reported only 48 confirmed MPOX cases. more...
Word embedding, a process to automatically learn the mathematical representations of words from unlabeled text corpora, has gained lot attention recently. Since are basic units natural language, more precisely we can represent morphological, syntactic and semantic properties words, better support downstream Natural Language Processing (NLP) tasks. traditional word embeddings mainly designed capture relatedness between co-occurred in predefined context, it may not be effective encoding other...
Illicit drug use is a serious problem around the world. Social media has increasingly become an important tool for analyzing patterns and monitoring emerging abuse trends. Accurately retrieving illicit drug-related social posts step in this research. Frequently, hashtags are used to identify retrieve on specific topic. However highly ambiguous. Posts with same not always Moreover, evolving, especially those related drugs. New street names introduced constantly avoid detection. In paper, we...
We describe the systems developed by UMBC team for 2018 SemEval Task 8, SecureNLP (Semantic Extraction from CybersecUrity REports using Natural Language Processing). participated in three of sub-tasks: (1) classifying sentences as being relevant or irrelevant to malware, (2) predicting token labels sentences, and (4) attribute Malware Attribute Enumeration Characterization vocabulary defining malware characteristics. achieve F1 score 50.34/18.0 (dev/test), 22.23 (test-data), 31.98...
Recently, text embedding techniques such as Word2Vec and BERT have produced state-of-the-art results in a wide variety of NLP tasks. As result, traditional features frequently used Information Extraction (IE) POS tags, dependency relations semantic types received less attention. In this paper, we investigate whether can be combined with word sentence embeddings to improve relation extraction. We explored diverse feature sets different neural network architectures evaluated our models on...
Nowadays, teens and young adults spend a significant amount of time on social media. According to the national survey American attitudes substance abuse, who media sites are at increased risk smoking, drinking illicit drug use. Reducing teens’ exposure use-related posts may help minimize their future use addiction. In this paper, we present method for automated detection userelated posts. With technology, content can be automatically filtered out from To detect related posts, employ...
Arpita Roy, Youngja Park, Shimei Pan. Proceedings of the 2019 Conference North American Chapter Association for Computational Linguistics: Human Language Technologies, Volume 1 (Long and Short Papers). 2019.
The prediction of skin cancer at the earlier stage is extremely essential for melanoma. There a need intellectual computer analysis lesions. segmentation lesion boundaries vital to accurately identify lesions from dermoscopic images where diagnosis complex various types. Thus, some pre-processing steps are required attain higher sensitive boundary and classification. Initially, done with median filter offer reputation preservation does not in-cooperate newer pixel values processed image....
Word embedding is a Natural Language Processing (NLP) technique that automatically maps words from vocabulary to vectors of real numbers in an space. It has been widely used recent years boost the performance variety NLP tasks such as named entity recognition, syntactic parsing and sentiment analysis. Classic word methods Word2Vec GloVe work well when they are given large text corpus. When input texts sparse many specialized domains (e.g., cybersecurity), these often fail produce...
A convolutional intermittent neural network (CRNN) for labeling music is presented in this paper. Convolutional networks (CNNs) are used by CRNNs to extract nearby elements, while recurrent (RNNs) briefly summarize the extracted highlights. We compare two CNN structures and CRNN that have been applied labeling, controlling number of parameters preparation time each test. Overall, our research revealed perform well terms parameter quantity time, proving usefulness their crossbreed structure...
Retailers/Businessmen search for quick benefits with fewer speculations. This paper focuses on structuring an application to yield more profits retailers by utilizing Machine Learning. By considering the properties such as spot of retail, season impact product(s), and many produce a where product(s) can gain retailers/business people. knowing proper item right spot, purchase required through application. Learning it helps discover "Pace Recommendation (exactness)." Through that precision,...