Asha Ashok

ORCID: 0000-0002-0881-8312
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Anomaly Detection Techniques and Applications
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Data Stream Mining Techniques
  • Medical Image Segmentation Techniques
  • Image Retrieval and Classification Techniques
  • Sentiment Analysis and Opinion Mining
  • Advanced Graph Neural Networks
  • Data Mining Algorithms and Applications
  • Artificial Immune Systems Applications
  • Advanced Computing and Algorithms
  • User Authentication and Security Systems
  • Electricity Theft Detection Techniques
  • Pharmacology and Nanomedicine Research
  • Menopause: Health Impacts and Treatments
  • Emotion and Mood Recognition
  • Stock Market Forecasting Methods
  • Blockchain Technology Applications and Security
  • COVID-19 diagnosis using AI
  • Image and Object Detection Techniques
  • Food Science and Nutritional Studies
  • Food Drying and Modeling
  • Diverse Scientific Research Studies
  • Advanced Chemical Sensor Technologies
  • Music and Audio Processing

Amrita Vishwa Vidyapeetham
2012-2024

Kerala Veterinary and Animal Sciences University
2022-2024

National Dairy Research Institute
2022

Emotion classification is very easy to detect by any human being with noticing the change in facial appearance or tone of voice other person. But for machine understand and decode it, becomes complex. This domain important relevant present era as it can be used modelled taking feedback from customer regarding product hotel etc. The idea behind creating this proposed solution was build a learning model that will emotions speech concerned persons. main objective acknowledge classifying them...

10.1109/icccnt51525.2021.9579881 article EN 2022 13th International Conference on Computing Communication and Networking Technologies (ICCCNT) 2021-07-06

Anomaly detection refers to the task of estimating and finding patterns which do not comply with general behavior data. Moreover, a range assumptions are made so as differentiate between normal deviated data instances. This paper describes solution approach this problem using two-step phase including an important preprocessing anomaly phase. For phase, we have used two methods mainly: Recursive Feature Elimination method (RFE) Random Forest Ensemble (RF-Ensemble) method. next detection,...

10.1109/icacci.2016.7732226 article EN 2016-09-01

In the present scenario, stock trading is one of most important activities carried out by many users directly or even indirectly. Due to growing importance among vast publics, also Predictions on market prices gaining equal importance. Nevertheless, when dealt with this issue, it becomes a great challenge since environment hugely multifaceted and active environment. There are numerous educations from several zones motivated carry that task application Machine Learning methods play an role in...

10.1109/icnte51185.2021.9487745 article EN 2021-01-15

Abnormality or inconsistency detection within a data is an attempt to make distinction between usual and exceptional instances. In this paper, we have proposed novel methodAbnormality Prediction in High Dimensional Dataset among Semi Supervised Learning approaches (AP-HDD-SSL) match the efficiencies of different semi supervised machine learning using high dimensional KDD CUP 99 dataset. The pre-processing phase with dimensionality diminution done prior clustering RFE (Random Forest...

10.1109/icacci.2017.8126052 article EN 2017-09-01

People has started relying more on online reviews and rating provided by other users, before buying a product or availing service. Almost 84% of the people use these to take decision. Here comes problem fake opinion spams, where review rate products they havent used hotels checked in. These kind tamper heavily with business model reputation provider. So it become an important task detect remove reviews.

10.1109/icacci.2018.8554706 article EN 2018-09-01

Phishing based incidents are the procedure of posting illegal or dishonest communications that seems to be originated from a trustworthy sending node. It is commonly reflected in case email transmission. The aim rob one's important personal information which includes credit/ debit card details, login information, account related data etc. In one way another, emails can trick users into revealing crucial technical information. Users needs very careful and cautious when working with they...

10.1109/icicict54557.2022.9917765 article EN 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT) 2022-08-11

Binarization and Segmentation are considered to be the vital tasks in Optical Character Recognition (OCR) for document digitization.This paper discusses applications of powerful Level set methodologies on these important associated with OCR.Results acquired essential procedures turn govern accuracy OCR system.Conventionally Otsu method Histogram profiling methods were used binarization segmentation purpose [1].In this paper, we try replace different by a single procedure based Set...

10.5120/7396-0436 article EN International Journal of Computer Applications 2012-06-30

Covid-19 has proven to be a particularly challenging epidemic contain. been around for more than two years, despite the swift efforts of medical specialists. Our paper helps this cause by presenting ways forecast estimated number cases in certain state or country on future date. This will contribute preparation and fight against spread virus as people know which states require lockdown do not. The research also provide statistics many patterns that have observed India result problem, well...

10.1109/icicict54557.2022.9917761 article EN 2022 Third International Conference on Intelligent Computing Instrumentation and Control Technologies (ICICICT) 2022-08-11

Diabetic Retinopathy (DR) is one of the most rampant ophthalmic disease found in diabetic patients. The damage blood venule light-sensitive cell at back eye causes DR. Vision impairment and vision loss are results due to degradation can be prevented if diagnosed early treated promptly. Normally clinical diagnosis done by visual examination fundus manually an ophthalmologist. This technique time-consuming costly. Today emerging technologies health care aims reduce cost treatment diagnosis....

10.1109/iciccs53718.2022.9788306 article EN 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) 2022-05-25

Moisture sorption characteristics of Mohanthal, a traditional dairy product from Gujarat were investigated at temperature 5–45 °C and water activities (aw) 0.11–0.97. The isotherms obtained sigmoid in nature. Nine different mathematical models found to effectively describe the moisture data on basis regression analyses goodness fit. Each model was statistically evaluated by means percent root mean square coefficient determination. GAB gave best fit entire range aw. Temperature...

10.33785/ijds.2022.v75i04.002 article EN Indian Journal of Dairy Science 2022-08-20

A quantitative study was to assess the prevalance of menopausal symptoms and effectiveness structured teaching programme on knowledge attitude among women at selected wards Kadapra Grama Panchayat, Pathanamthitta district. The objectives symptoms, pretest level regarding its management, find out management association with demographic variables. Non-probability purposive sampling used select 100 Sample. conceptual framework developed based Rosenstock’s modified health belief model. Modified...

10.52711/2454-2660.2021.00078 article EN International Journal of Nursing Education and Research 2021-06-19

Restaurants have always been experimental to give a better customer service which is evident from the evolution of handwritten food ordering system utilization robots in delivering at restaurant table. The year 2020 and human race fighting against COVID-19, global pandemic. In this project we are addressing safe hygienic billing along with great experience, for contact less process or crowded restaurant. device an affordable commodity that can be utilized reduce manpower increase...

10.1109/icnte51185.2021.9487765 article EN 2021-01-15
Coming Soon ...