Rajni Jindal

Rajni Jindal
Delhi Technological University | Delhi College of Engineering · Department of Computer Engineering

phd

About

92
Publications
47,379
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,173
Citations
Additional affiliations
May 2012 - February 2015
Indira Gandhi Delhi Technical University for Women
Position
  • Professor, Dean (R&C) and Head of Department

Publications

Publications (92)
Article
Full-text available
Over the past few years, blockchain technology has acquired good faith as a modern, secure distributed network in the form of a ledger to conduct and store records of transactions. Blockchain is an evolving technological innovation that can offer solutions to real-world problems of various domains such as cloud computing, the Internet of Things, su...
Article
Full-text available
In recent years, universities have been developing more robust competency-based classes for students in Science, Technology, Engineering, and Mathematics (STEM). Competency-based education (CBE) is based on outcomes and is student-centred, creating a better learning experience. This paper provides context for competency-based education over a knowl...
Article
Blockchain has emerged as a revolutionary technology for various industrial applications of the next century. One of them is a decentralized storage system enabled by the corporation of Blockchain technology. In this context, Blockchain provides innovation to address traditional storage challenges by securely transmitting files through a fully dece...
Article
Full-text available
Industry-academia collaboration (IAC) has long been a source of discussion in various ways. A vital first step toward closing the gap is fostering alumni engagement in industry and academia. Industry-academia collaborations are like earth and water, and they live in harmony. They cannot exist apart from one another. The collaborative effort between...
Article
Full-text available
Cloud system provides an on-demand and low-cost computing and storing model. Many organizations and individual end-users are using cloud storage services to back up their crucial data. However, this storage utility suffers from various threats and security issues. Before outsourcing the data to the cloud server, some data security measures should b...
Article
Full-text available
The current healthcare system is designed using advanced competence technologies such as big data analytics, machine learning, and information technology to provide progressive and intelligent healthcare services. The available healthcare services suffer from various issues such as lack of healthcare data handling, data filtering, and right treatme...
Article
Full-text available
The deployment of blockchain technologies for multiple use cases has been widely investigated in the academic and business sectors over the last few years. The blockchain model has attained considerable attention due to its decentralized, persistent, anonymous, and auditable features. This review does a comprehensive literature analysis of broad bl...
Article
Blockchain is a modern technology that has gained enormous attention in scientific and practical applications. A smart contract is a digital transaction that runs, executes, and records the dynamic operation on the ledger automatically. A smart contract is the central aspect of a blockchain that facilitates blockchain as a platform outside the cryp...
Conference Paper
Software Engineering Students often have a low level of motivation and lack of interest in traditional teaching methods. Project-Based Learning (PBL), coupled with Games, helps in improving student’s involvement in the project and enhance their learning experience. In this paper, the overall concept of PBL-gamification for teaching software enginee...
Article
The approach of health 4.0 is driven out from the well-known industry 4.0. The goal of industry 4.0 is to bring a revolution in the manufacturing sector by digitization. The future of health management will become timelier and more personalized as new technologies will empower individuals to conduct their health monitoring by using cyber–physical s...
Article
Cloud storage system provides on-demand and pay-per-use storage model with low computing cost. However, this storage system suffers from various security risks. Blockchain technology is an advanced technique that stores data in a distributed manner, and the data, once stored, cannot be altered. Therefore, we propose a blockchain-based decentralized...
Article
Full-text available
World Wide Web (WWW) constitutes fuzzy information and requires soft computing techniques to deal context of the query. It works on the principle of keyword matching yielding low precision and recall. Semantic web, an extension WWW improves the information retrieval process. Query expansion is utmost importance in information retrieval to retrieve...
Article
Background: Non-Functional Requirements (NFR) have a direct impact on the architecture of the system, thus it is essential to identify NFRs in the initial phases of software development. Aim: The work is based on extraction of relevant keywords from NFR descriptions by employing text mining steps and thereafter classifying these descriptions into o...
Chapter
Blockchain technology has received significant popularity, with a growing interest in various domains, including data processing, financial services, information security, and IoT to the healthcare and medical research industries. There has also been a tremendous trend in using blockchain technologies to provide efficient data protection in health...
Conference Paper
This paper presents a network intrusion behavior detection utilizing an adaptive blockchain mechanism. A Layered Voting Rule System (LVRS) is introduced, which contains a positive layer, negative layer and propagation layer which trains the blockchain using the power consumption of the users to transfer and receive the data. The performance of the...
Article
Full-text available
The demand for Blockchain innovation and the significance of its application has inspired ever-progressing exploration in various scientific and practical areas. Even though it is still in the initial testing stage, the blockchain is being viewed as a progressive solution to address present-day technology concerns, such as decentralization, identit...
Conference Paper
Peer learning companions such as interactive tablets and social robots have shown great promise in supporting language development in young children. However, studies have shown that the perceived credibility of a robot as an educator and peer companion is contingent on how socially it behaves. We specifically focus on two roles of a peer learning...
Article
Full-text available
Semantic similarity is used to perceive the meaning of words in textual data and having several applications in the field of Computational linguistic and Natural language processing. Semantic similarity and semantic relatedness are interchangeable terms, in Semantic relatedness all types of semantic relationships are considered i.e. (has, part-of,...
Article
Full-text available
A major challenge among various applications of computational linguistics, natural language processing and information retrieval is to measure semantic similarity accurately. In this research paper, various ontology-based approaches i.e. compute semantic similarity between words have been studied and listed their benefits and shortcomings on the va...
Article
Full-text available
Community detection plays an important role in creation and transfer of information. Active learning has been employed recently to improve the performance of community detection techniques. Active learning provides a semi-automatic approach in a selective sampling of data. Based on this, a community trolling approach for topic based community detec...
Article
Measuring the accurate semantic similarity between the words is a major issue in various applications of artificial intelligence and computational linguistics areas such as natural language processing, text-mining, information retrieval and for development of semantic web. In the past, many approaches have been proposed and adopted to evaluate simi...
Article
Full-text available
A major challenge among various applications of computational linguistics, natural language processing and information retrieval is to measure semantic similarity accurately. In this research paper, various ontology-based approaches i.e. compute semantic similarity between words have been studied and listed their benefits and shortcomings on the va...
Article
To discover useful information or knowledge from text documents, the knowledge discovery in text documents (KDT) process is used. In this paper, an automated knowledge discovery process is proposed that helps in the multi label categorization of text documents, i.e., a text document may belong to more than one class or category. We have proposed a...
Preprint
Full-text available
With the increasing user base of Android devices and advent of technologies such as Internet Banking, delicate user data is prone to be misused by malware and spyware applications. As the app developer community increases, the quality reassurance could not be justified for every application and a possibility of data leakage arises. In this research...
Conference Paper
Full-text available
With the increasing user-base of Android devices & advents of technologies such as Internet Banking, delicate user data is prone to be misused by malware and spyware applications. As the app-developer community increases, the quality reassurance could not be justified for every application and a possibility of data leakage arises. In this research,...
Article
Mining high utility pattern has become prominent as it provides semantic significance (utility/weighted patterns) associated with items in a transaction. Data analysis and respective strategies for mining high utility patterns is important in real world scenarios. Recent researches focused on high utility pattern mining using tree-based data struct...
Article
The paper proposes a model for the information retrieval system (E-library) for the learner, based on his current requirements and scenario. It follows a brokerage model using non monotonic logic utilizing semantics and ontology for object description. Ontology captures the learning object properties which can help in eliminating and evaluating the...
Conference Paper
The paper proposes an E-library which will be combining the collective intelligence of the social web with E-learning. In this paper, we argue that though it is important to have a structured explicit knowledge base in an E-learning site, in the present scenario when lot of research is being done on the personalized E-learning, it is necessary to r...
Article
Text categorisation is an upcoming area in the field of text mining. The text documents possess huge number of features due to their unstructured nature. In this paper, an algorithm for multi label categorisation of text documents based on the concepts of lexical and semantics using word net (MC-LSW) is proposed. The proposed algorithm is based on...
Conference Paper
In recent years, databases have become a very crucial part in all organizations and hence database security has become very essential. In order to protect organizational databases, intrusion detection systems (IDS) are deployed. Non-signature based IDS are found to be reasonable better than signature based IDS. In this paper, a new data mining base...
Article
Changes in the software are unavoidable due to an ever changing dynamic and active environment wherein expectations and requirements of the users tend to change rapidly. As a result, software needs to upgrade itself from its previous version to the next version in order to meet expectations of the user. The upgradation of the software is in terms o...
Article
Big data analytics is one of the emerging technologies as it promises to provide better insights from huge and heterogeneous data. Big data analytics involves selecting the suitable big data storage and computational framework augmented by scalable machine‐learning algorithms. Despite the tremendous buzz around big data analytics and its advantages...
Conference Paper
With the huge data flow in the E-library, nowadays performance of the e-libraries can't be judged with the correctness of the search results shown to the Learner for a given query but also with the level of acceptance of the Learner. In this paper, we envisage a Personalized E-library, which will not only quench the knowledge thirst of the learner...
Article
With ever increasing demands from the software organizations, the rate of the defects being introduced in the software cannot be ignored. This has now become a serious cause of concern and must be dealt with seriously. Defects which creep into the software come with varying severity levels ranging from mild to catastrophic. The severity associated...
Article
Full-text available
Automated classification of text into predefined categories has always been considered as a vital method to manage and process a vast amount of documents in digital forms that are widespread and continuously increasing. This kind of web information, popularly known as the digital/electronic information is in the form of documents, conference materi...
Conference Paper
In today's world, many real world examples are based on multi label classification. A single document may belong to a set of class labels simultaneously. The process of ranking i.e. strict ordering of class labels is of great concern here. We have used the concept of quantifiers for ranking of class labels. We have proposed eight new quantifiers, w...
Article
Predictive analytics is the process of forecasting future courses of action by analyzing historical and current facts. It's now a priority in many organizations because it can suggest the most favorable future planning by letting decision makers combine data about the four W's - that is, what, who, where, and when - to analyze why and how. Apart fr...
Article
Incremental data can be defined as dynamic data that changes as time advances. Mining frequent patterns from such data is costly as most of the approaches need repetitive scanning and generates a large number of candidate keys. It is important to develop an efficient approach to enhance the performance of mining. This paper proposes a novel tree-ba...
Conference Paper
Full-text available
This research proposes a novel lexical approach to text categorization in the bio-medical domain. We have proposed LKNN (Lexical KNN) algorithm, in which lexemes (tokens) are used to represent the medical documents. These tokens are used to classify the abstracts by matching them with the standard list of keywords specified as MESH (Medical Subject...
Conference Paper
To enhance the quality and cost effectiveness of the education, students participation and a better understanding of the learning is important. The proliferation of learning innovations such as distributed and heterogeneous applications and resources requires the adoption of appropriate technique to deal with the various information flows to suppor...
Conference Paper
Defect severity assessment is highly essential for the software practitioners so that they can focus their attention and resources on the defects having a higher priority than the other defects. This would directly impact resource allocation and planning of subsequent defect fixing activities. In this paper, we intend to predict a model which will...
Conference Paper
Full-text available
Recommender systems can provide users with relevant items based on each user’s preferences. However, in the domain of mobile applications (apps), existing recommender systems merely recommend apps that users have experienced (rated, commented, or downloaded) since this type of information indicates each user’s preference for the apps. Unfortunately...
Article
Full-text available
Educational Data Mining (EDM) is an emerging fieldexploring data in educational context by applyingdifferent Data Mining (DM) techniques/tools. It provides intrinsic knowledge of teaching and learningprocess for effective education planning. In this survey work focuses on components, research trends (1998to 2012) of EDM highlighting its related Too...
Article
Educational Data Mining (EDM) is an emerging field exploring data in educational context by applying different Data Mining (DM) techniques/tools. It provides intrinsic knowledge of teaching and learning process for effective education planning. In this survey work focuses on components, research trends (1998 to 2012) of EDM highlighting its rela...
Conference Paper
Graph theory has played a vital role in implementation of many mathematical and computer applications [8]. The immensely critical role of graph theory calls for an efficient methodology of representing the graphs. In this paper we explore an approach to represent the graphs [1] through adjacency lists using stacks instead of the conventional method...
Article
The term Text Mining or Text Analytics refers to the process of extracting useful patterns or knowledge from text. The data in textual documents can be of two types, either it can be unstructured or semi-structured. Unstructured data is freely naturally occurring text, whereas web documents data (HTML or XML) is semi structured. Since the natural l...
Article
The term Text Mining or Text Analytics refers to the process of extracting useful patterns or knowledge from text. The data in textual documents can be of two types, either it can be unstructured or semi-structured. Unstructured data is freely naturally occurring text, whereas web documents data (HTML or XML) is semi structured. Since the natural l...
Article
Data mining is used to extract the required data from large databases [1]. The data mining algorithm is the mechanism that creates mining models [2]. To create a model, an algorithm first learns the rules from a set of data then looks for specific required patterns and trends according to those rules. The algorithm then uses the fallouts of this ex...
Article
With the recent advancements in the modern Information and Communication Technology (ICT), e-Learning has emerged as a new paradigm for learning in the modern world. There are many dimensions such as pedagogical, technological, ethical etc which are to be satisfied by the e-learning service provider to become a better option in compare to the tradi...
Article
Full-text available
The process of developing a data warehouse starts with identifying and gathering requirements, designing the dimensional model followed by testing and maintenance. The design phase is the most important activity in the successful building of a data warehouse. In this paper, we surveyed and evaluated the literature related to the various data wareho...
Conference Paper
MapReduce is a framework for processing large data sets, where straightforward computations are performed by hundreds of machines on large input data. Data could be stored and retrieved using structured queries. Join queries are most frequently used and importatnt. So its crucial to find out efficient join processing techniques. This paper provides...
Conference Paper
Abstract In this paper we are proposing a new Attribute Selection Measure Function (heuristic) on existing C4. 5 algorithm. The advantage of heuristic is that the split information never approaches zero, hence produces stable Rule set and Decision Tree. In ideal situation, in admission process in engineering colleges in India, a student takes ad...
Article
Full-text available
Patents and Research papers are published in various fields. These are stored in various conferences and journals database. If a user (researcher or any general user) want to search for any patent or research paper in any particular field, then there is lack of search criteria available for this. In this paper, we have used nearest neighbor algorit...
Conference Paper
In this paper we are suggesting improvements over an existing C4.5 Algorithm. This is a very popular tree based classification algorithm, used to generate decision tree from a set of training examples. The heuristic function used in this algorithm is based on the concept of information entropy. We are proposing two new heuristic functions which are...
Article
Full-text available
The automatic creation of finite automata has long been a goal of the evolutionary computation community. The previous works in the evolution of finite state automata were limited to the evolution of strictly non-modular FSA. Here, a modular architecture to evolve FSA is proposed and a genetic programming procedure for evolving such structures is p...
Article
Full-text available
In Recent high-performance embedded system technology, applications are demanding very high performance from system with minimum available hardware resource. Due to this fast development, developer integrates more functionality into a single chip (Hardware). Reconfigurable architectures can adapt the behavior of the hardware resources to a specific...
Article
With the explosive growth of data, mining information and knowledge from large databases has become one of the major challenges for data management and mining community. Data mining is the extraction of hidden unpredictive information from large databases. It is concerned with the analysis of data and finding patterns that exist in large databases...
Article
The third generation (3G) wireless communication systems will support multimedia traffic at a target transmission rate of up to 2 Mbps for static mobile users and 384 kbps for high mobility users. Unlike wired networks, communication entities in wireless networks change their connectivity via handoff when they move from one cell to another. The use...
Article
Full-text available
With increasing technological advances, the number of computer networks is on the rise. Related with bulgeoning number of networks, is the issue of their security. Some common security threats include Denial of service (DOS) attack, unauthorized access, confidentiality breaches and data diddling and even its destruction. To protect the networks fro...
Article
As one of the most dynamic and gigantic instantiations of the Mobile Ad Hoc Networks, VANET's have attracted a lot of research towards the scalability of security aspects. Most results tend to point towards a digital signature based Public Key Encryption mechanism. Intermittent access to the fixed infrastructure, especially during the initial stage...

Network

Cited By