首页 > 最新文献

Global Transitions Proceedings最新文献

英文 中文
International Conference on Intelligent Engineering Approach (ICIEA-2022), 12th February 2022, H.K.E. Society's S.L.N. College of Engineering, Raichur, Karnataka, India 智能工程方法国际会议(ICIEA-2022), 2022年2月12日,印度卡纳塔克邦Raichur, hke.society 's S.L.N.工程学院
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.026
{"title":"International Conference on Intelligent Engineering Approach (ICIEA-2022), 12th February 2022, H.K.E. Society's S.L.N. College of Engineering, Raichur, Karnataka, India","authors":"","doi":"10.1016/j.gltp.2022.04.026","DOIUrl":"10.1016/j.gltp.2022.04.026","url":null,"abstract":"","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Page 1"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000620/pdfft?md5=c6ba2f413493ca6a9f8bf38c6c5e9687&pid=1-s2.0-S2666285X22000620-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78213715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN based multi-view classification and ROI segmentation: A survey 基于CNN的多视图分类和ROI分割研究综述
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.019
Rashmi S, Chandrakala B M, Divya M. Ramani, Megha S. Harsur

In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.

在当今世界,人类死亡率上升的原因之一是癌症。由于某些细胞无法控制地生长,它们会扩散到身体的其他部位,因此必然会发生癌症。不同类型的癌症疾病有肺癌、乳腺癌、脑癌、皮肤癌。其中最令人担忧的是脑癌。随着AI-ML技术的出现,癌症肿瘤的检测可以自动化。卷积神经网络是脑肿瘤检测的有效方法之一。人类在决策过程中经常使用来自不同视角的视觉信息。对于脑肿瘤的识别,单张显示物体的图像是不够的。多视图分类的目的是通过将多个角度的数据组合成一个统一的、全面的下游任务表示,从而提高分类精度。它提出了一种值得信赖的多视图分类方法,一种在证据水平上动态集成不同视角的分类方法,从而为多视图学习提供了一种新的范式。通过合并来自每个视图的数据,该方法通过组合多个视图来提高分类可靠性和弹性。图像分割的过程包括将图像中的区域划分为不同的类别,以便识别和分类它们。在CNN中,有E-Net、T-Net、W-Net等不同的架构来确定ROI并进行图像分割。为了实现脑肿瘤的自动检测,MRI图像分割起着至关重要的作用。本文综述了各种图像分割方法,并对其进行了比较。这里主要关注的是可以改进和优化的策略,而不是那些已经在使用的策略。
{"title":"CNN based multi-view classification and ROI segmentation: A survey","authors":"Rashmi S,&nbsp;Chandrakala B M,&nbsp;Divya M. Ramani,&nbsp;Megha S. Harsur","doi":"10.1016/j.gltp.2022.04.019","DOIUrl":"10.1016/j.gltp.2022.04.019","url":null,"abstract":"<div><p>In today's world, one of the reasons in rise of mortality among people is cancer. A cancerous disease is bound to occur due to the ungovernable growth of certain cells that can scatter to other parts of the body. The different types of cancerous diseases are lung cancer, breast cancer, brain cancer, skin cancer. One among them which is of major concern is the brain cancer. With the emergence of AI-ML techniques, detection of cancerous tumour can be automated. One of the efficient methods for the detection of brain tumour is convolutional neural network. Visual information from various viewpoints is frequently used by humans in their decision-making process. For the recognition of the brain tumour a single image showing an object is insufficient. Multi-view classification aims to improve classification accuracy by combining data from several perspectives into a uniform comprehensive representation for downstream tasks. To aim that it presents a trustworthy multi-view classification, a classification approach that dynamically integrates diverse perspectives at an evidence level, resulting in a new paradigm for multi-view learning. By incorporating data from each view, the method promotes both classification reliability and resilience by combining several viewpoints. The process of segmenting images involves separating areas within a picture into distinct classes in order to identify them and classify them. In CNN there are different architectures like E-Net, T-Net, W-Net to determine the ROI and perform the image segmentation. In order to automate detection of the brain tumour, MRI image segmentation plays vital role. In this paper, a survey on the various image segmentation approaches and its comparison is presented. The main focus here is on strategies that can be improved and optimized over those that are already in use.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000553/pdfft?md5=e6c4d48f52e2faf41f0555f1258a2aa2&pid=1-s2.0-S2666285X22000553-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78594383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysing corpus of office documents for macro-based attacks using Machine Learning 使用机器学习分析基于宏的攻击的办公文档语料库
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.004
V Ravi, S.P. Gururaj, H.K. Vedamurthy, M.B. Nirmala

Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called Obfuscated-Word2vec is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.

基于宏的恶意软件攻击在最近的网络攻击中呈上升趋势,这些攻击使用visual basic代码编写的恶意代码可以用来攻击计算机以实现各种利用。宏恶意软件可以使用各种工具混淆,很容易逃避杀毒软件。为了检测这种宏恶意软件,已经提出了几种机器学习技术方法,这些方法具有不充分的数据集,用于良性和恶意宏代码,这些宏代码不可复制并在不平衡数据集上进行评估。本文提出利用Word2Vec嵌入等词嵌入技术进行代码分析,对用visual basic语言编写的宏代码进行分析和处理,在打开文档之前理解和检测攻击向量。提出的词嵌入技术,称为obfusated - word2vec,用于从宏代码中检测被混淆的关键字、被混淆的函数名,并将其分类为被混淆的或良性的函数调用,这些函数调用随后用作特征向量来训练模型,以从宏代码中提取最相关的特征,甚至帮助分类器更准确地检测downloader、droppper恶意软件、shellcode、PowerShell漏洞等。实验结果表明,该方法具有良好的可重复性,可以利用随机森林分类器对宏代码进行分析,检测出全新的宏恶意软件,准确率达到82.65%。
{"title":"Analysing corpus of office documents for macro-based attacks using Machine Learning","authors":"V Ravi,&nbsp;S.P. Gururaj,&nbsp;H.K. Vedamurthy,&nbsp;M.B. Nirmala","doi":"10.1016/j.gltp.2022.04.004","DOIUrl":"10.1016/j.gltp.2022.04.004","url":null,"abstract":"<div><p>Macro-based malware attacks are on the rise in recent cyber-attacks using malicious code written in visual basic code which can be used to target computers to achieve various exploitations. Macro malware can be obfuscated using various tools and easily evade antivirus software. To detect this macro malware, several methods of machine learning techniques have been proposed with an inadequate dataset for both benign and malicious macro codes which are not reproducible and evaluated on unbalanced datasets. In this paper, use of word embedding technique such as Word2Vec embedding is used for code analysis is proposed to analyze and process macro code written in visual basic language to understand and detect the attack vector before opening the documents. The proposed word embedding technique, called <em>Obfuscated-Word2vec</em> is proposed to detect obfuscated keywords, Obfuscated function names from the macro code and classify them as obfuscated or benign function calls which are later used as feature vectors to train models to extract the most relevant features from macro code and even to help the classifiers to detect more accurately as a downloader, dropper malware, shellcode, PowerShell exploits, etc. Experimental results show that proposed method is reproducible and could detect completely new macro malware by analyzing the macro code by the help of Random forest classifier with 82.65 percent accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 20-24"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000401/pdfft?md5=e7b876b452a7172444358a89eb62dde6&pid=1-s2.0-S2666285X22000401-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76899586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Reconfigurable fractal microstrip antenna with varactor diode 可重构变容二极管分形微带天线
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.007
Madhusudhana K , Shriram P Hegde

In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant εr = 4.4) substrate with dimension (41 × 41 × 1.6) mm3. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.

本文提出了一种菱形分形微带频率重构贴片天线。根据变容二极管的电容值,所提出的天线在以下10个不同的频率上谐振:1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz和5.825GHz。利用IE3D仿真工具对变容二极管的不同电容值进行了分析,对微带天线进行了设计与优化。本设计采用尺寸为(41 × 41 × 1.6) mm3的FR4(介电常数εr = 4.4)衬底实现。插入槽上的单个变容二极管用于切换工作频率。所提出的天线设计,无论是模拟还是制作,都被认为是非常一致的,并且适合在L, S和C波段应用。
{"title":"Reconfigurable fractal microstrip antenna with varactor diode","authors":"Madhusudhana K ,&nbsp;Shriram P Hegde","doi":"10.1016/j.gltp.2022.03.007","DOIUrl":"10.1016/j.gltp.2022.03.007","url":null,"abstract":"<div><p>In this article, a rhombus shaped fractal microstrip frequency reconfiguration patch antenna is presented. The proposed antenna depending upon the capacitance value of varactor diode resonates at ten distinct frequencies as follows: 1.375GHz, 1.525GHz, 1.725GHz, 2.45GHz, 3.45GHz, 4GHz, 5.3GHz, 5.45GHz, 5.5GHz and 5.825GHz. Design and optimization of microstrip antenna with analysis for different capacitance values of varactor diode is carried out using IE3D simulation tool. The proposed design is realized using FR4 (Dielectric constant <em>ε<sub>r</sub></em> = 4<em>.</em>4) substrate with dimension (41 × 41 × 1.6) mm<sup>3</sup>. A single varactor diode inserted upon the slot is used to switch the operating frequency. The proposed design of antenna, both simulated and fabricated is seen to have close agreement, and is appropriate to be used in L, S and C band applications.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 183-189"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000127/pdfft?md5=f3ace4dc2f3218d9f7d6b293aa2c9a99&pid=1-s2.0-S2666285X22000127-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81173951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QCA: A survey and design of logic circuits QCA:逻辑电路的综述与设计
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.012
Smita C. Chetti , Omkar Yatgal

Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.

量子点元胞自动机(QCA)是一种超越CMOS的新技术。在各种其他技术中,由于其面积和功率优势,这被认为是最可行和可行的。本文对QCA领域的研究工作的起源和进展进行了讨论。从基本门的研究和加法电路的设计出发,讨论了其他几个功能模块的设计。本文提出QCA,因为它被认为是CMOS技术饱和后的未来技术。由于其在面积、功率和时序要求方面的优势,QCA被认为是如此。这一领域仍处于研究阶段,尚未广泛开展。因此,笔者尝试通过设计对其进行探索,并对所提出的设计进行了仿真。仿真结果证明了该设计的有效性。
{"title":"QCA: A survey and design of logic circuits","authors":"Smita C. Chetti ,&nbsp;Omkar Yatgal","doi":"10.1016/j.gltp.2022.04.012","DOIUrl":"10.1016/j.gltp.2022.04.012","url":null,"abstract":"<div><p>Quantum Dot Cellular Automata (QCA) is one of the new technologies beyond CMOS. Among various other technologies, this is considered to be most feasible and viable due to its area and power advantages. In this paper the discussion about the origin and progress of research works is carried out with respect to QCA domain. Starting from the basic gate study and designing of Adders few other functional blocks are also discussed. This paper proposes QCA as it is considered as the upcoming technology after the saturation of CMOS technology. QCA is considered so due to its advantages in area, power and timing requirements. This domain is still under research and has not been carried to large extent. Hence the authors have made an attempt in exploring it through designing and have simulated the proposed designs. the working of the design is proved through the simulation results.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 142-148"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000486/pdfft?md5=8bb8b9d84756c5c42234f294b4d9c46e&pid=1-s2.0-S2666285X22000486-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80244402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An enhancing for cluster head selection using fuzzy logic in wireless sensor network 基于模糊逻辑的无线传感器网络簇头选择改进
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.011
Sujatha J. , Geetha N. , Jyothi N. , Vishwanath P.

Extending lifetime for far off sensor coordinate through immaterial human perception is unreasonable. To comprehend this concern assorted researchers come up through assembly methodology which preserve construct up a far-off sensor put together extra adaptable, prolonged life time, proficient imperativeness. Nevertheless, an imposing part of planned computations overstuff the congregation chief in midst of pack diversion plan. Front attitude such a circumstance, proposal of fluffy analysis is superior the circumstance essential authority in distant sensor systematize. Fleecy reasoning is lesion up being additional usual for heap dispersion amongst sensor center points at last extending structure lifetime. Here Type2 fleecy reasoning is planned which handles uncertain level decisions enhanced than sort feathery reasoning. For the most part here essentialness smoothing out provoking extend structure lifetime using gather is cultivated. Likewise, the proposed fleecy reasoning which picks the gathering head just as show how organize life span can be stretched out close via immaterial cluster adversity in the midst of transmission process. Various computation as well as the connected structure lifetime is in like manner showed up through feathery analysis mounting most outrageous structure lifetime appeared differently in relation to other people.

通过非物质的人的感知来延长远距离传感器坐标的寿命是不合理的。为了理解这一问题,各种研究人员提出了一种组装方法,这种方法可以构建一个远程传感器,并且具有更强的适应性,更长的使用寿命,更强的紧迫性。然而,计划中的一项重大计算使会众负责人在分组分流计划中不知所措。面对这样的情况,毛绒绒的分析建议是遥感系统中上级情况的必要权威。对于传感器中心点之间的堆分散,flefley推理是一种额外的方法,最终延长了结构的寿命。本文设计了处理不确定级别决策的第2类羽状推理,其处理不确定级别决策的能力比羽状推理强。这里主要是利用集束培养的方法来抚平和延长结构寿命。同样,所提出的选取集束头的绒毛推理也表明,在传播过程中,组织寿命是如何通过非物质的集群逆境来延长的。各种计算以及连接的结构寿命都类似地通过羽状分析显示,最离谱的结构寿命相对于其他结构出现了不同。
{"title":"An enhancing for cluster head selection using fuzzy logic in wireless sensor network","authors":"Sujatha J. ,&nbsp;Geetha N. ,&nbsp;Jyothi N. ,&nbsp;Vishwanath P.","doi":"10.1016/j.gltp.2022.03.011","DOIUrl":"10.1016/j.gltp.2022.03.011","url":null,"abstract":"<div><p>Extending lifetime for far off sensor coordinate through immaterial human perception is unreasonable. To comprehend this concern assorted researchers come up through assembly methodology which preserve construct up a far-off sensor put together extra adaptable, prolonged life time, proficient imperativeness. Nevertheless, an imposing part of planned computations overstuff the congregation chief in midst of pack diversion plan. Front attitude such a circumstance, proposal of fluffy analysis is superior the circumstance essential authority in distant sensor systematize. Fleecy reasoning is lesion up being additional usual for heap dispersion amongst sensor center points at last extending structure lifetime. Here Type2 fleecy reasoning is planned which handles uncertain level decisions enhanced than sort feathery reasoning. For the most part here essentialness smoothing out provoking extend structure lifetime using gather is cultivated. Likewise, the proposed fleecy reasoning which picks the gathering head just as show how organize life span can be stretched out close via immaterial cluster adversity in the midst of transmission process. Various computation as well as the connected structure lifetime is in like manner showed up through feathery analysis mounting most outrageous structure lifetime appeared differently in relation to other people.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 202-207"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000164/pdfft?md5=36d6de5a26ab71091fea86ca9afdec8b&pid=1-s2.0-S2666285X22000164-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82964498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Forecasting the survival rate of breast cancer patients using a supervised learning method 使用监督学习方法预测乳腺癌患者的生存率
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.005
Shweta S. Kaddi , Malini M. Patil

The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.

本文旨在利用NKI乳腺癌数据集建立一个回归模型。用于实现目标的方法包括回归方法的三种变体,即线性、多元和多项式。回归分析是一种有效的预测建模方法,有助于理解变量之间的数学关系。多元回归和多项式回归方法也与线性回归模型一致,但自变量的数量会发生变化。与卫生保健数据相关的查询具有实际意义。预测模型的结果有助于分析乳腺癌数据集的不同特征的行为,并为患者的诊断提供有用的见解。从NKI数据集的1570个有用特征中选择14个进行回归分析。对于不同的自变量和因变量组合,发现多元回归表现更好,准确率为83%。
{"title":"Forecasting the survival rate of breast cancer patients using a supervised learning method","authors":"Shweta S. Kaddi ,&nbsp;Malini M. Patil","doi":"10.1016/j.gltp.2022.04.005","DOIUrl":"10.1016/j.gltp.2022.04.005","url":null,"abstract":"<div><p>The paper aims to develop a regression model using the NKI breast cancer data set. The methodology used to achieve the objectives includes three variations of regression methods viz., linear, multiple, and polynomial, respectively. Regression analysis is one of the efficient predictive modeling methods that help understand the mathematical relationship between the variables. The multiple and polynomial regression methods also work in line with the linear regression model, but the number of independent variables will be varying. Queries related to health care data are of practical interest. The outcome of the predictive model helps in analyzing the behavior of different features of the breast cancer data set and provides useful insights towards the diagnosis of a patient. 14 out of 1570 useful features of the NKI data set are selected for the regression analysis. With different combinations of independent and dependent variables, it is found that multiple regression performs better with 83% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 25-30"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000413/pdfft?md5=2c95660b423c6ed5ccd81c4cd695b04c&pid=1-s2.0-S2666285X22000413-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84207646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Ooly instant logistics 奥利即时物流
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.002
Qazi Amaan, Satyam Priyam, Rohan Veerapaneni, Sudha Guru Priyanka, Vinodha K

Consumers prefer to order from apps/websites at their ease. The existing solutions have affected the local vendors by providing this ease to the customers. The authors have made a working O2O, B2B logistics system and a deployed web platform ready to deliver products at consumer's ease and provide an online presence for the vendors. OOLY is the proposed model that has remodelled the way people order, transfer items, and move by providing an online presence to the vendors. This review has proved that the Customers get local support from local vendors since the customer knows the shop/vendor. Findings have shown that the Local vendors with an online presence provide the trust for customers and transfer items at ease. The products get replaced at ease without the long existent processes. Authors have succeeded by providing an online presence for vendors and have improved customer satisfaction.

消费者更喜欢轻松地从应用程序/网站订购。现有的解决方案通过为客户提供这种便利而影响了本地供应商。作者已经制作了一个工作的O2O, B2B物流系统和一个部署的网络平台,准备好让消费者轻松地交付产品,并为供应商提供在线存在。OOLY是提议的模型,它通过向供应商提供在线呈现,重塑了人们订购、转移物品和移动的方式。这次审查证明了客户从当地供应商那里得到了当地的支持,因为客户知道这家商店/供应商。调查结果表明,有网上存在的本地供应商为客户提供了信任,并轻松地转移物品。产品更换方便,无需经过冗长的流程。作者已经成功地为供应商提供了在线展示,并提高了客户满意度。
{"title":"Ooly instant logistics","authors":"Qazi Amaan,&nbsp;Satyam Priyam,&nbsp;Rohan Veerapaneni,&nbsp;Sudha Guru Priyanka,&nbsp;Vinodha K","doi":"10.1016/j.gltp.2022.04.002","DOIUrl":"10.1016/j.gltp.2022.04.002","url":null,"abstract":"<div><p>Consumers prefer to order from apps/websites at their ease. The existing solutions have affected the local vendors by providing this ease to the customers. The authors have made a working O2O, B2B logistics system and a deployed web platform ready to deliver products at consumer's ease and provide an online presence for the vendors. OOLY is the proposed model that has remodelled the way people order, transfer items, and move by providing an online presence to the vendors. This review has proved that the Customers get local support from local vendors since the customer knows the shop/vendor. Findings have shown that the Local vendors with an online presence provide the trust for customers and transfer items at ease. The products get replaced at ease without the long existent processes. Authors have succeeded by providing an online presence for vendors and have improved customer satisfaction.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 8-12"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000383/pdfft?md5=ef4694db97367dad247b35cc1cc4976b&pid=1-s2.0-S2666285X22000383-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78427154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication 基于离散小波变换和Alpha混合的图像隐写性能分析
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.024
Saleem S Tevaramani , Ravi J

The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.

在当前的网络时代,交换信息的机会增加了。媒体的日益普及给与安全有关的问题带来了真正的挑战。隐写术是一种安全交换信息的技术。意图不引起怀疑的视频、音频或图像可以是载体。在隐藏了秘密信息之后,隐写技术产生了一模一样的封面图像。这将防止外部观察者注意到秘密信息的存在。在本文中,alpha是一个缩放参数。不同类型和尺寸的覆盖物和有效载荷图像、来自网络摄像头的实时图像以及其他格式的预定义图像已被规范化和预处理。对覆盖图像和有效载荷图像分别进行Haar离散小波变换(DWT)。为了生成隐写图像,对有效载荷图像进行加密并与掩蔽图像融合。测量了结果参数,如PSNR、MSE和Entropy。
{"title":"Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication","authors":"Saleem S Tevaramani ,&nbsp;Ravi J","doi":"10.1016/j.gltp.2022.03.024","DOIUrl":"10.1016/j.gltp.2022.03.024","url":null,"abstract":"<div><p>The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 208-214"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000309/pdfft?md5=66c93e7a2b156d6244b62ffa00cfb781&pid=1-s2.0-S2666285X22000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80650118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms 基于人工智能和监督机器学习算法的云计算环境智能风险评估方法建模
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.030
Abhishek Sharma, Umesh Kumar Singh

Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing & hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.

当今竞争激烈和即将到来的市场的主要支柱无疑是云计算。因此,企业利用云计算服务的能力。为了通过云计算服务或crp改进安全计划,人们总是需要新型的工具和协议。为了建立全面的风险评估方法,进行了广泛的文献审查,以确定可能影响云计算采用的风险因素。在这方面,确定了各种风险因素。在特征选择和风险因素识别后,利用线性回归算法选择最有效的特征。然后使用决策树(DTC)、随机过滤器分类器(Randomizable Filter Classifier)、k-star和RMSE方法等AI-ML技术对CC环境中的威胁进行分析。实验结果表明,将数据集划分为(95%-5%)在每次剩余的划分中获得了最好的结果,并提出了DTC算法在实验设置中使用的整个数据集中获得了最好的结果。
{"title":"Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms","authors":"Abhishek Sharma,&nbsp;Umesh Kumar Singh","doi":"10.1016/j.gltp.2022.03.030","DOIUrl":"10.1016/j.gltp.2022.03.030","url":null,"abstract":"<div><p>Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing &amp; hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 243-250"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200036X/pdfft?md5=da30c7c469672403b680e1e34ac54ba2&pid=1-s2.0-S2666285X2200036X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81997939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
Global Transitions Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1