Shano Solanki

ORCID: 0000-0003-2550-1971
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Opinion Dynamics and Social Influence
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Complex Network Analysis Techniques
  • Caching and Content Delivery
  • Anomaly Detection Techniques and Applications
  • Digital Marketing and Social Media
  • Vehicle emissions and performance
  • Mobile Crowdsensing and Crowdsourcing
  • Image and Video Stabilization
  • Text and Document Classification Technologies
  • Sentiment Analysis and Opinion Mining
  • Air Quality Monitoring and Forecasting
  • Web Data Mining and Analysis
  • Manufacturing Process and Optimization
  • Advanced Malware Detection Techniques
  • Data Stream Mining Techniques
  • Image Retrieval and Classification Techniques
  • Advanced Graph Neural Networks
  • Game Theory and Applications
  • Online Learning and Analytics
  • Advanced Text Analysis Techniques
  • Video Analysis and Summarization
  • Forensic Anthropology and Bioarchaeology Studies

National Institute of Technical Teachers Training and Research
2017-2025

University of Memphis
2017

National Institute of Technical Teachers’ Training and Research
2017

The field of educational data mining has enabled the researchers, educators to predict student's pass rate, failure dropout rate etc. main reason for dropouts student is students. Several researchers have proposed various techniques predicting performance and analyzed existing on datasets. In this paper, we four machine learning algorithms dataset used early prediction performance. While there a rich literature survey in prediction, our work differs from works as follows:(i) Our not limited...

10.1109/icces45898.2019.9002038 article EN 2019-07-01

The rapid growth of information availability on the Web related to movies, news, books, hotels, medicines, jobs etc. have increased scope filtering techniques. Recommender System is software application that uses techniques and algorithms generate personalized preferences support decision making users. Collaborative Filtering one type recommender system finds neighbors users basis similar rated items by or common items. It suffers from data sparsity inaccuracy issues. In this paper, concept...

10.1109/confluence.2017.7943151 article EN 2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence) 2017-01-01

With the evolution of internet, network security has emerged as one key areas research. Network is to safeguard privacy, availability and integrity system. Identification intrusion core component attain overall success. Therefore, detection (ID) broadly explored by researchers idea identification developed into a system, known system (IDS). IDS focuses on investigation attacks offers desirable support for defence management along with information about intrusion. Several approaches are...

10.1504/ijsn.2020.111128 article EN International Journal of Security and Networks 2020-01-01

Due to the advancement of Internet over last decade, network security has turned out be one important areas research. Therefore, Intrusion Detection (ID) is widely studied achieve overall success. Aim System (IDS) put checks on attacks and provide desirable support for defense management along with information about intrusion. The several intrusion detection approaches are proposed so far predict malicious traffic from network. In this paper, existing techniques reviewed a hybrid approach...

10.1109/iss1.2019.8908116 article EN 2019-02-01

With the evolution of internet, network security has emerged as one key areas research. Network is to safeguard privacy, availability and integrity system. Identification intrusion core component attain overall success. Therefore, detection (ID) broadly explored by researchers idea identification developed into a system, known system (IDS). IDS focuses on investigation attacks offers desirable support for defence management along with information about intrusion. Several approaches are...

10.1504/ijsn.2020.10033120 article EN International Journal of Security and Networks 2020-01-01
Coming Soon ...