Gaurav Srivastav

@sharda.ac.in

ARTIFICIAL INTELLIGENCE
SHARDA UNIVERSITY



                             

https://researchid.co/luckygaurav25

Profile: Academic:7 Years. Industry: 2 Years. Total: 9 Y; 11 Papers+ 08 FDPs+
3 Expert talks + 3 courses organized + 2 Patent+1 Book Chapter (Scopus papers
05) Total: 28

EDUCATION

Sl.
No Examination Passed Year Name of the
Board/Universit
y

Division
/Grade % Of
marks

1 PhD (Thesis Submitted-CSE) 2022 Sharda University - Thesis
Submitted
2 M. Tech (CSE) 2015 Sharda University
3 B. Tech (IT) 2011 UPTU, Lucknow
5 10+2 2007
6 Secondary exams 2005

RESEARCH INTERESTS

MACHINE LEARNING, DEEP LEARNING, NLP

11

Scopus Publications

149

Scholar Citations

6

Scholar h-index

4

Scholar i10-index

Scopus Publications

  • Design of an AI-Driven Feedback and Decision Analysis in Online Learning with Google BERT


  • An Efficient Sentiment Analysis Technique for Virtual Learning Environments using Deep Learning model and Fine-Tuned EdBERT


  • Multi-Level Cloud Datacenter Security Using Efficient Hybrid Algorithm †
    Koushik Chakraborty, Amrita Parashar, Pawan Bhambu, Durga Prasad Tripathi, Pratap Patil, and Gaurav Kumar Srivastav

    MDPI
    : Security is currently the main boundary for cloud-based administrations. It is not adequate to just consolidate the cloud by adding a couple of additional controls or component answers for your current organization security programming. Businesses must utilize both virtual and physical information center security frameworks to keep them secure. The objective is to defend it from dangers that may jeopardize the secrecy, judgment, or openness of mental property or commerce data resources. These are the fundamental central focuses of all assigned attacks, and in this way, they require a high degree of security. Hundreds to thousands of physical and virtual servers are partitioned up into information centers agreeing to sort applications, information classification zones, and other criteria. To protect applications, frameworks, information, and clients, information center security takes on the workload over physical information centers and multi-cloud situations. It also applies to open cloud data centers. All server ranches ought to protect their applications and data from a rising number of refined threats and around-the-world ambushes. Each organization is at risk of assault, and numerous organizations have been compromised without being mindful of it. An evaluation of your resources and business necessities is important to improve a spotless way to deal with your way of life and cloud security technique. To deal with a strong mixture of multi-cloud wellbeing program, you should lay out perceivability and control. You can consolidate incredible controls, organize responsibility dispersion, and lay out fantastic gambles on the board with the assistance of safety items and experts.

  • Impact of Artificial Intelligence on Virtual Learning Ecosystem
    Gaurav Srivastav, Shri Kant, Durgesh Srivastava, and Satvik Vats

    IEEE
    Nowadays, one of the most intriguing fields of research in information technology is artificial intelligence (AI) and machine learning (ML). For educational researchers and scientists, it offers an excellent prospect. Since education practitioners have little awareness about utilizing AI in the educational system (AIEd), it is, therefore, a promising field of research for improving the quality of educational practices. This study aims to investigate AI-ML to create an AI-enabled educational eco-system. Researchers have expressed interest in using educational data mining and the data science approach to find patterns in extensive educational data collections. This study demonstrates how intelligent applications based on AI can be used to improve teaching and learning.

  • Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future
    Richa Singh, Gaurav Srivastav, Rekha Kashyap, and Satvik Vats

    IEEE
    Intelligent network orchestration and management are crucial components of the 6G network. Therefore, machine learning and artificial intelligence play a big part in the 6G paradigm that is being imagined. However, the combination of 6G and AIML utilization may frequently be a double-edged sword because AI has the capacity to either protect or compromise security and privacy. Proactive threat detection, the use of mitigating intelligent techniques, and network automation in future are needed to enable the achievement of independent networks in 6G. As a result, this paper has detailed focus on the ongoing projects based on 6G and factors that make 6G technology necessary. The role of ZT architecture is discussed in detail, use of AIML in 6G, Various application areas and challenges associated in 6G has been mentioned in this paper.


  • Breast Cancer Detection in Mammogram Images using Machine Learning Methods and CLAHE Algorithm
    Gaurav Srivastav, Mamoon Rashid, Richa Singh, Anita Gehlot, and Neha Sharma

    IEEE
    Breast cancer is one of the most common cancer types. This is the second-leading cause of cancer-related death in women. It ranked 2nd according to available data lung cancers is the only one causing more causalities. It’s critical to receive a breast cancer diagnosis quickly. The MIAS data set is used in this study to examine machine learning-based categorization approaches used to study breast cancer. Important image data is fetched from mammograms. We choose eight distinct classifiers and assess each one’s precision, recall, accuracy, and F-score. The analysis’s findings were higher than 69.88%.

  • Classification of HCI and issues and challenges in smart home HCI implementation
    Pramod Vishwakarma, Vijay Kumar Soni, Gaurav Srivastav, and Abhishek Jain

    Wiley

  • Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset
    Richa Singh and Gaurav Srivastav

    IEEE
    There are various deep learning-based IDS techniques are implemented in large scale. Intrusion detection systems are critical components for protecting ICT infrastructure (IDSs). Keeping this in mind, solid solution is required for different types of new attacks and complexity control. Deep learning and machine learning is widely used to handle high dimensional, complex type data. The IDS detects and attracts various attack types such as known, unknown, and zero-day attacks using unsupervised machine learning techniques. To detect threats without prior knowledge, a framework has been designed that uses the concept of One Class SVM (OCSVM) and active learning. The CIC-IDS2017 dataset was used to test the performance of the framework and compare the result with UNSW-NB15 and KDD cup 99 dataset. The final output shows that this framework gives better performance than other.

  • Study and Review of Learning Management System Software
    Mahima Sharma and Gaurav Srivastav

    Springer Singapore

  • Review on e-Learning Environment Development and context aware recommendation systems using Deep Learning
    Gaurav Srivastav and Shri Kant

    IEEE
    Internet has open platforms for various domains to interact with each other. e-leaning is a domain which consistently getting attention because of “Learn any-time, anywhere” approach. Since, the start of e-learning environment development phase semantic web base ontology is used for describing and making relation between Learning Objects (LO's). Since contents are increasing every day, on this point ontologies are lagging to recommend. Development of recommendation using deep learning techniques are producing comparatively better results. Deep learning is now been used for classification, predictions, recommendations. It is also used in detection and segmentation techniques as well. This paper presents discussion various categories of recommendation systems. Then a comparative study is on deep learning-based recommendation systems. Major challenge that an e-learning environment is facing is because of “Cold-Start” and “Sparsity” in content based (CB) & collaborative Filter (CF) based recommendation systems. How to reduce Cold-Start and Sparsity is tried to find out in this paper.

RECENT SCHOLAR PUBLICATIONS

  • Design of an AI-Driven Feedback and Decision Analysis in Online Learning with Google BERT
    G Srivastav, S Kant, D Srivastava
    International Journal of Intelligent Systems and Applications in Engineering 2024

  • Predicting the Veracity of News Articles Using Multimodal Embeddings and NLP-Based Features
    R Singh, R Kashyap, V Sharma, G Srivastava
    2023 1st DMIHER International Conference on Artificial Intelligence in 2023

  • Comparative evaluation and correlation of variations in articular disc morphology as assessed by automated segmentation using deep learning on magnetic resonance imaging (MRI
    A Surendran, S Shrivastav, G Srivastav
    F1000Research 12, 855 2023

  • Impact of Artificial Intelligence on Virtual Learning Ecosystem
    G Srivastav, S Kant, D Srivastava, S Vats
    2023 World Conference on Communication & Computing (WCONF), 1-5 2023

  • Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future
    R Singh, G Srivastav, R Kashyap, S Vats
    2023 International Conference on Disruptive Technologies (ICDT), 375-380 2023

  • An Efficient Sentiment Analysis Technique for Virtual Learning Environments using Deep Learning model and Fine-Tuned EdBERT
    G Srivastav, S Kant, D Srivastava
    International Journal of Intelligent Systems and Applications in Engineering 2023

  • Breast cancer detection in mammogram images using machine learning methods and clahe algorithm
    G Srivastav, M Rashid, R Singh, A Gehlot, N Sharma
    2022 5th International Conference on Contemporary Computing and Informatics 2022

  • Facial recognition based workplace security system using LBPH algorithm
    G Srivastav, R Singh
    AIP Conference Proceedings 2555 (1) 2022

  • Fine-Tuned BERT Enabled Context Aware Virtual Learning Assessment Model
    G Srivastav, S Kant
    Design Engineering, 1422-1438 2021

  • Classification of HCI and Issues and Challenges in Smart Home HCI Implementation
    P Vishwakarma, VK Soni, G Srivastav, A Jain
    Cognitive Behavior and Human Computer Interaction Based on Machine Learning 2021

  • Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset
    R Singh, G Srivastav
    2021 International Conference on Technological Advancements and Innovations 2021

  • Effective Utilization and Rising Challenges for Cloud Computing Environment during the COVID-19 Pandemic
    G Srivastav, S Kant
    Journal of Scientific and Technical Research (Sharda University, Noida), 43-47 2021

  • Automatic Number Plate Recognition
    G Srivastava, A Sharma, A Mittal, A Shishodia, A Gaur
    2020

  • Movie Recommendation System Using Cosine Similarity and KNN
    S Srivastav, Gaurav, Narula ,Tushar, Tripathi Tanisha, Singh, Harbir Ramni ...
    International Journal of Engineering and Advanced Technology (IJEAT) 9 (5 2020

  • Study and review of learning management system software
    M Sharma, G Srivastav
    Innovations in Computer Science and Engineering: Proceedings of 7th ICICSE 2020

  • 2019 3rd International Conference on Recent Developments in Control, Automation &Power Engineering (RDCAPE) 10-11 October 2019 Department of Electrical & Electronics
    B JAINT
    2019

  • Review on e-Learning Environment Development and context aware recommendation systems using Deep Learning
    G Srivastav, S Kant
    2019 3rd international conference on recent developments in control 2019

  • Effective Sensory Communication using GEAR Protocol
    G Srivastav
    International Journal of Science and Research (IJSR) vol 9, 1809-1815 2013

  • b-LSTM enabled Assessment Model for Virtual Learning Eco-system
    G Srivastav, S Kant


MOST CITED SCHOLAR PUBLICATIONS

  • Movie Recommendation System Using Cosine Similarity and KNN
    S Srivastav, Gaurav, Narula ,Tushar, Tripathi Tanisha, Singh, Harbir Ramni ...
    International Journal of Engineering and Advanced Technology (IJEAT) 9 (5 2020
    Citations: 89

  • Review on e-Learning Environment Development and context aware recommendation systems using Deep Learning
    G Srivastav, S Kant
    2019 3rd international conference on recent developments in control 2019
    Citations: 12

  • Novel Framework for Anomaly Detection Using Machine Learning Technique on CIC-IDS2017 Dataset
    R Singh, G Srivastav
    2021 International Conference on Technological Advancements and Innovations 2021
    Citations: 10

  • Study and review of learning management system software
    M Sharma, G Srivastav
    Innovations in Computer Science and Engineering: Proceedings of 7th ICICSE 2020
    Citations: 10

  • An Efficient Sentiment Analysis Technique for Virtual Learning Environments using Deep Learning model and Fine-Tuned EdBERT
    G Srivastav, S Kant, D Srivastava
    International Journal of Intelligent Systems and Applications in Engineering 2023
    Citations: 7

  • Breast cancer detection in mammogram images using machine learning methods and clahe algorithm
    G Srivastav, M Rashid, R Singh, A Gehlot, N Sharma
    2022 5th International Conference on Contemporary Computing and Informatics 2022
    Citations: 6

  • Effective Sensory Communication using GEAR Protocol
    G Srivastav
    International Journal of Science and Research (IJSR) vol 9, 1809-1815 2013
    Citations: 5

  • Study on Zero-Trust Architecture, Application Areas & Challenges of 6G Technology in Future
    R Singh, G Srivastav, R Kashyap, S Vats
    2023 International Conference on Disruptive Technologies (ICDT), 375-380 2023
    Citations: 3

  • Automatic Number Plate Recognition
    G Srivastava, A Sharma, A Mittal, A Shishodia, A Gaur
    2020
    Citations: 3

  • Facial recognition based workplace security system using LBPH algorithm
    G Srivastav, R Singh
    AIP Conference Proceedings 2555 (1) 2022
    Citations: 2

  • Fine-Tuned BERT Enabled Context Aware Virtual Learning Assessment Model
    G Srivastav, S Kant
    Design Engineering, 1422-1438 2021
    Citations: 2