Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Madhurima Hooda is active.

Publication


Featured researches published by Madhurima Hooda.


Archive | 2016

A Survey on Challenges in Software Development During the Adoption of Agile Environment

Chandrika Sikka; Saru Dhir; Madhurima Hooda

In the recent years, agile development has received increasing interest in software development organization. Agile adoption has lead to increase in productivity and has better outcome than the traditional software development methods. However, agile adoption also come with challenges which can adversely affect the project. In this paper, the challenges of agile implementation and its solutions are discussed.


Archive | 2016

A Study on Cyber Security, Its Issues and Cyber Crime Rates in India

Saurabh Mishra; Saru Dhir; Madhurima Hooda

In the current technological era, use of computers becomes an essential part of our lives. But this part is also affected by a new breed of security known as cyber security. It is a global issue that arises by different organisations. This paper presents the global cyber security scenario, cyber security and its practices, and firms who are major stakeholders in the cyber security. At the end counter measures of cyber crimes, its average rate is calculated in India during the years 2009–2013.


Archive | 2019

iCop: A System for Mitigation of Felonious Encroachment Using GCM Push Notification

Saurabh Mishra; Madhurima Hooda; Saru Dhir; Alisha Sharma

A mobile application can enable a user to get control on an infrared or IR sensor device, remotely and also along with detecting and notifying of any movement that should happen around the sensor via GPRS. To further improve this thought, we interfaced the mobile technology with hardware. The focus is placed on getting the control of the secured zones, by monitoring the human movement IR sensors alongside some other movement that might happen in the fringe of the sensor. The use of this thought can be extremely very much expected in the circumstances that are exceedingly secure and in which, not withstanding manual security, electronic and mobile security efforts to establish safety are likewise needed. These spots could be banking sector, money midsections, criminal prisons, atomic establishments, confidential and very secret exploration zones, and so forth. The paper implements an intrusion detection system iCop and also presents the testing results showing expected output and actual output. Also, the risk factors and their corresponding mitigation plan are discussed.


Archive | 2018

Implementation of Image Compression and Cryptography on Fractal Images

Abhishek Madaan; Madhulika Bhatia; Madhurima Hooda

Fractal image compression can be implemented in many ways, such as IFS, affine transformations, and HV partitioning. Quadtree decomposition and Huffman encoding are used to improve compression. The work shows the existing methods like quadtree decomposition which is used to subdivide the original fractal image into unoverlapped blocks with a certain value of threshold. It also helps to improve compression ratio and peak signal-to-noise ratio. Huffman encoding is used with quadtree to decrease the number of bits required per symbol. The paper also involves the implementation of selective encryption using chaos on fractal images. A lot of data is being transferred every day, and that is why there is always a need of cryptography. Selective encryption is preferred over other encryption algorithms because it does not require to encrypt the whole image, i.e., image is only partially encrypted. Security analysis of proposed algorithm is also done in this paper which shows that this algorithm would be safe from any attack. MATLAB is used as a tool to implement the two algorithms.


Archive | 2017

Enacting Segmentation Algorithms for Classifying Fish Species

Madhulika Bhatia; Madhulika Pandey; Neeraj Kumar; Madhurima Hooda; Akriti

The fundamental feature of Computer vision involves consolidating image processing, pattern recognition and classification procedures. Extricating data from a digital picture relies on upon first distinguishing essential objects or dividing the picture into homogenous sectors or objects termed as segmentation and afterward allotting out these sectors or objects to specific classes termed as classification procedure. The term homogeneous may allude to the shade of the region or an object, however it additionally may utilize different characteristics, for example, composition and shape. This study concentrates on implementing image segmentation and classification on six different fish species using the watershed and the nearest neighbor classifier (kNN) algorithm.


Indian journal of science and technology | 2018

AN INITIATIVE TO IDENTIFY DEPRESSION USING SENTIMENT ANALYSIS: A MACHINE LEARNING APPROACH

Akriti Sood; Madhurima Hooda; Saru Dhirn; Madhulika Bhatia


Archive | 2018

Erratum to: Emotion Recognition: A Step Ahead of Traditional Approaches

Surbhi Agarwal; Madhulika Bhatia; Madhurima Hooda


2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017

Pervasive Security of Internet Enabled Host Services

Madhurima Hooda; Shashwat Pathak; Madhulika; Babita Yadav


2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017

A Study and Comparison of Prediction Algorithms for Depression Detection among Millennials: A Machine Learning Approach

Madhurima Hooda; Aashie Roy Saxena; Madhulika; Babita Yadav


2017 International Conference on Current Trends in Computer, Electrical, Electronics and Communication (CTCEEC) | 2017

Perceptions of Millennials Towards Social Media Privacy Issues: A Survey

Madhurima Hooda; Madhulika Bhatia; Babita Yadav

Collaboration


Dive into the Madhurima Hooda's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge