Papers by C Namrata Mahender
Journal of Engineering Research
Facebook has become the most popular among the students. Hence there is a need to examine the eff... more Facebook has become the most popular among the students. Hence there is a need to examine the effects of excess use of Facebook. There are different factors discovered which leaves greater impact on the students, this study examines the effects of using Facebook on undergraduate and postgraduate students and finding the association between the excess use of Facebook and academic of the students. A cross-sectional design was used to collect the data from college and university students who are using the Facebook. Total 106 participants have participated in an offline survey. The research has shown that there is a positive correlation between Excess use and Academics of students. The results suggests that the moderate use of Facebook can help students in their studies.
International Journal of Computer Applications Technology and Research, 2015
Humans communication is generally under the control of emotions and full of opinions. Emotions an... more Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user's opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to developed an full fledge system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.

Handbook of Research on Natural Language Processing and Smart Service Systems
Summarization is the process of selecting representative data to produce a reduced version of the... more Summarization is the process of selecting representative data to produce a reduced version of the given data with a minimal loss of information; so, it generally works on text, images, videos, and speech data. The chapter deals with not only concepts of text summarization (types, stages, issues, and criteria) but also with applications. The two main categories of approaches generally used in text summaries (i.e., abstractive and extractive) are discussed. ive techniques use linguistic methods to interpret the text; they produce understandable and semantically equivalent sentences with a shorter length. Extractive techniques mostly rely on statistical methods for extracting essential sentences from the given text. In addition, the authors explore the SACAS model to exemplify the process of summarization. The SACAS system analyzed 50 stories, and its evaluation is presented in terms of a new measurement based on question-answering MOS, which is also introduced in this chapter.
i-manager’s Journal on Pattern Recognition

Advances in Science, Technology and Engineering Systems Journal
This is era of new technology; most of information is collected from internet, web sites. Some pe... more This is era of new technology; most of information is collected from internet, web sites. Some people uses data from research papers, thesis, and website as it is and publish as their own research without giving proper acknowledgement. This term is known as plagiarism. There are two types of plagiarism detection methods, i) Extrinsic plagiarism detection ii) Intrinsic plagiarism detection. Through extrinsic plagiarism utilizing reference corpus plagiarism is observed, while in intrinsic plagiarism identification, using author's writing style, plagiarism can be identified. If the anonymous text is written by unknown author. By using authorship analysis we can find original author of text. Authorship analysis is having three types i)Author identification ii) Author characterization and iii) Similarity detection. This paper mainly focuses on author identification for Marathi language. To calculate projection in two different files, we used feature vectors of main author file and summary file of other authors. The result of average projection shows, there is similarity in main author file and summary file of different authors, it also shows summary file of each author is having impact of main author file.
Communications in Computer and Information Science
International Journal of Strategic Information Technology and Applications
In this article, the authors have proposed a method to detect plagiarism in the Marathi language ... more In this article, the authors have proposed a method to detect plagiarism in the Marathi language by using semantic analysis. Nowadays, plagiarism is a challenging task in educational and research fields. Currently, there are some tools available to detect the plagiarism on the basis of similarity of words. But there is no tool available to detect the plagiarism semantically. In this article, the authors have applied preprocessing to a database i.e. tokenization, removed stop words and punctuations, for the goal of calculating the frequency of words. Then searching the same word or synonyms of words in wordnet to detect the semantic plagiarism. It is useful for many researchers who are working in this domain.
Indonesian Journal of Electrical Engineering and Informatics (IJEEI), 2016
Humans communication is generally under the control of emotions and full of opinions. Emotions an... more Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user's opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to develop a fully fledged system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.
Ijca Proceedings on National Conference on Recent Trends in Computing, May 12, 2012
In the general framework of Knowledge discovery ,data mining techniques are usually dedicated to ... more In the general framework of Knowledge discovery ,data mining techniques are usually dedicated to information extraction from structured database .Text mining techniques ,on other hand are dedicated to information extraction(IE) from unstructured textual data and Natural language Process(NLP) can then see as helpful tool for text mining procedure. In this paper we discussed about our work related to IE and proper structuring of the web news related to conference like name of conference, date, location and area of interest etc. Here we have also emphasised on the major issues while extracting and correlating those information for further processing.
As the new era is of Electronic Commerce (e-commerce) the whole world is moving towards the more ... more As the new era is of Electronic Commerce (e-commerce) the whole world is moving towards the more usage of Credit card. The popularity of credit card has increased dramatically as it can be used for both online as well as for regular shopping, so the number of fraud cases taking place is also more. This paper compares the two techniques used for detecting Credit card Frauds HMM (Hidden Markov Model) and NN (Neural Network). It is observed that the accuracy of detecting fraud using Neural Network is more than the Hidden Markov Model.
International Journal of Computer Applications, 2012
Online courses are getting popular among students. Trends of objective examination for such cours... more Online courses are getting popular among students. Trends of objective examination for such courses are already available but many courses require assessment in traditional way so that the subject understanding of the candidate can be evaluated which requires subjective assessment i.e. descriptive based examination. Thus in our paper we are focusing on the inference process required for development of such type of systems. Our system is able to assess one word and one sentence based answer with more than 80% of efficiency. While answering single sentence answers paraphrasing is consider for assessing the variations occurring due to the use of vocabulary.
This paper discusses the design and implementation of SAR image compression based on the set part... more This paper discusses the design and implementation of SAR image compression based on the set partitioning using hierarchical trees (SPIHT) coding algorithm. SAR images are considered in our work due to large scope in its application area which requires reduction i.e. is compression. As per the survey SPIHT algorithm has achieved prominent success in image compression. Here we use a modified version of SPIHT for two dimensional signals which is lossless. Set partition coding is a procedure that recursively splits groups of integer data or transform elements guided by a sequence of adaptive threshold, and presented in octree form.
Uploads
Papers by C Namrata Mahender