Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.018
S.M. Hari Krishna, Rinki Sharma
In the world of service-oriented businesses the deployment of services is of utmost importance. On the Web, the service-oriented business has a major impact through Web Application Program Interfaces (APIs). In the field of Web applications, majority of the applications run on the Web/Internet APIs. These APIs are dependent on architecture styles such as Representational State Transfer (REST) and Remote Procedure Call (RPC). Over a decade, REST is widely used for architectural style in API design followed by RPC. These styles are used extensively in various domains. This paper presents the survey of such APIs in the world of Software-Defined Networks (SDN) and Network Function Virtualization (NFV). The main contributions of the paper is to provide a ready reference for developing effective and efficient orchestration approaches towards micro services in SDN and NFV domains. The survey aims to help practitioners and researchers in this field to follow guidelines and standards for designing higher quality services.
在面向服务的业务领域中,服务的部署至关重要。在Web上,面向服务的业务通过Web应用程序编程接口(api)产生重大影响。在Web应用程序领域,大多数应用程序都运行在Web/Internet api上。这些api依赖于体系结构风格,例如具象状态传输(Representational State Transfer, REST)和远程过程调用(Remote Procedure Call, RPC)。十多年来,REST被广泛用于API设计中的架构风格,随后是RPC。这些样式广泛应用于各个领域。本文介绍了这些api在软件定义网络(SDN)和网络功能虚拟化(NFV)领域的概况。本文的主要贡献是为开发针对SDN和NFV域中微服务的有效和高效的编排方法提供了现成的参考。该调查旨在帮助该领域的从业人员和研究人员遵循设计更高质量服务的准则和标准。
{"title":"Survey on application programming interfaces in software defined networks and network function virtualization","authors":"S.M. Hari Krishna, Rinki Sharma","doi":"10.1016/j.gltp.2021.08.018","DOIUrl":"10.1016/j.gltp.2021.08.018","url":null,"abstract":"<div><p>In the world of service-oriented businesses the deployment of services is of utmost importance. On the Web, the service-oriented business has a major impact through Web Application Program Interfaces (APIs). In the field of Web applications, majority of the applications run on the Web/Internet APIs. These APIs are dependent on architecture styles such as Representational State Transfer (REST) and Remote Procedure Call (RPC). Over a decade, REST is widely used for architectural style in API design followed by RPC. These styles are used extensively in various domains. This paper presents the survey of such APIs in the world of Software-Defined Networks (SDN) and Network Function Virtualization (NFV). The main contributions of the paper is to provide a ready reference for developing effective and efficient orchestration approaches towards micro services in SDN and NFV domains. The survey aims to help practitioners and researchers in this field to follow guidelines and standards for designing higher quality services.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 199-204"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.018","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87257093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.041
Harshitha M S, Shashidhar R, Roopa M
The passage of a yield from the producer to the buyer is traced by a farming supply chain. A clear stage that permits organization members to farm together is a blockchain-based farming supply chain. This method eliminates the requirement for a centralized trusted authority, mediators, and business histories, growing production and security whereas sustaining extreme integrity, liability, and safety. According to the planned resolution, smart contracts are used to switch and handle all communications and dealings amongst all shareholders in the supply chain network. AgriBlockIoT is a block chain-based traceability key that comprises facts since IoT devices in the supply chain. It comprises an example of watching harvest from farmhouse to branch, as well as assessments of Ethereum and Hyperledger implementations.
{"title":"Block chain based agricultural supply chain-A review","authors":"Harshitha M S, Shashidhar R, Roopa M","doi":"10.1016/j.gltp.2021.08.041","DOIUrl":"10.1016/j.gltp.2021.08.041","url":null,"abstract":"<div><p>The passage of a yield from the producer to the buyer is traced by a farming supply chain. A clear stage that permits organization members to farm together is a blockchain-based farming supply chain. This method eliminates the requirement for a centralized trusted authority, mediators, and business histories, growing production and security whereas sustaining extreme integrity, liability, and safety. According to the planned resolution, smart contracts are used to switch and handle all communications and dealings amongst all shareholders in the supply chain network. AgriBlockIoT is a block chain-based traceability key that comprises facts since IoT devices in the supply chain. It comprises an example of watching harvest from farmhouse to branch, as well as assessments of Ethereum and Hyperledger implementations.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 220-226"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.041","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91242890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.009
Raju Hajare , Sanjana Kadam
EEG records the brain's electrical function. It displays the difference in voltages from distinct sites of the brain over a period of time. It plays a major role in understanding the brain. It also helps to diagnose disorders related to sleep, and find the epileptogenic foci in the brain. Recording accurate EEG signals, however, comes with its own limitations. Gels applied to the scalp are abrasive in nature. Gels dry up over time, and also irritate the skin. There are different kinds of electrodes that record EEG signals with appreciable accuracy, keeping comfort and practicality in mind. Some of them are: dry electrodes, capacitive electrodes, electrodes with nanomaterials. The electrodes mentioned above are discussed in this paper. It discusses the advancement in the field of EEG. This paper shows the ease at which signals can be captured, using the aforementioned electrodes. Cheaper, more accessible EEG electrodes are making it possible to bring affordable healthcare outside the confines of the hospitals and clinics.
{"title":"Comparative study analysis of practical EEG sensors in medical diagnoses","authors":"Raju Hajare , Sanjana Kadam","doi":"10.1016/j.gltp.2021.08.009","DOIUrl":"10.1016/j.gltp.2021.08.009","url":null,"abstract":"<div><p>EEG records the brain's electrical function. It displays the difference in voltages from distinct sites of the brain over a period of time. It plays a major role in understanding the brain. It also helps to diagnose disorders related to sleep, and find the epileptogenic foci in the brain. Recording accurate EEG signals, however, comes with its own limitations. Gels applied to the scalp are abrasive in nature. Gels dry up over time, and also irritate the skin. There are different kinds of electrodes that record EEG signals with appreciable accuracy, keeping comfort and practicality in mind. Some of them are: dry electrodes, capacitive electrodes, electrodes with nanomaterials. The electrodes mentioned above are discussed in this paper. It discusses the advancement in the field of EEG. This paper shows the ease at which signals can be captured, using the aforementioned electrodes. Cheaper, more accessible EEG electrodes are making it possible to bring affordable healthcare outside the confines of the hospitals and clinics.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 467-475"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.009","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74538661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.035
Sowmya S, Sahana Karanth, Sharath Kumar
Digital watermarking is one of the techniques used for copyright protection as well as authentication purpose. In this paper, digital watermark embedding and extraction techniques have been used in which a nested type of watermarking (a watermark inside another watermark) has been presented. The main purpose of using the nested watermarking method is, it increases the embedding capacity so that a large amount of information could be embedded. In this method, one watermark is embedded into another watermark. The resultant watermark is considered as main watermark. The main watermark is encrypted and then embedded into the main image. The main goal in encrypting the watermarks before embedding is increased safety. A5/1 encryption algorithm is used for the encryption and decryption purpose. Therefore, our research work focuses on two important things i.e., increased watermark embedding capacity and increased safety.
{"title":"Protection of data using image watermarking technique","authors":"Sowmya S, Sahana Karanth, Sharath Kumar","doi":"10.1016/j.gltp.2021.08.035","DOIUrl":"10.1016/j.gltp.2021.08.035","url":null,"abstract":"<div><p>Digital watermarking is one of the techniques used for copyright protection as well as authentication purpose. In this paper, digital watermark embedding and extraction techniques have been used in which a nested type of watermarking (a watermark inside another watermark) has been presented. The main purpose of using the nested watermarking method is, it increases the embedding capacity so that a large amount of information could be embedded. In this method, one watermark is embedded into another watermark. The resultant watermark is considered as main watermark. The main watermark is encrypted and then embedded into the main image. The main goal in encrypting the watermarks before embedding is increased safety. A5/1 encryption algorithm is used for the encryption and decryption purpose. Therefore, our research work focuses on two important things i.e., increased watermark embedding capacity and increased safety.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 386-391"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.035","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86444275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.023
Venkatesh Shankar
Communication in Wireless Sensor Networks (WSN) by its environment further disposed to danger attacks and it harms data. Secured information or maintain data confidentiality is a big challenge in today life, but main issue is which needs a security for the purpose of localization. Including to this one more complication now focused on sensation in acoustic motes which practices Particle Swarm Optimization (PSO) method for locality or Position Assessment. Here propose Contemporary Secured Target Locality (CSTL) algorithm mainly addresses security and target location issues, Sybil and on-off attack and wicked motes occurrence at altered stages of target locality at the end results are compared with existing method General Localization (GLS), Approximate Point in Triangle, Distance Vector hop localization and multi hop method with proposed method. Here outcome of simulation prove better accuracy and progressive reaction in attack recognition presently contributes in build a secured wireless sensor network.
{"title":"Contemporary secured target locality in wireless sensor networks","authors":"Venkatesh Shankar","doi":"10.1016/j.gltp.2021.08.023","DOIUrl":"10.1016/j.gltp.2021.08.023","url":null,"abstract":"<div><p>Communication in Wireless Sensor Networks (WSN) by its environment further disposed to danger attacks and it harms data. Secured information or maintain data confidentiality is a big challenge in today life, but main issue is which needs a security for the purpose of localization. Including to this one more complication now focused on sensation in acoustic motes which practices Particle Swarm Optimization (PSO) method for locality or Position Assessment. Here propose Contemporary Secured Target Locality (CSTL) algorithm mainly addresses security and target location issues, Sybil and on-off attack and wicked motes occurrence at altered stages of target locality at the end results are compared with existing method General Localization (GLS), Approximate Point in Triangle, Distance Vector hop localization and multi hop method with proposed method. Here outcome of simulation prove better accuracy and progressive reaction in attack recognition presently contributes in build a secured wireless sensor network.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 194-198"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77139069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.065
N Kavyashree , Dr. Supriya M C , Dr. Lokesh M R
Software reliability is one and only the standard used to calculate the excellence of a software system. In this situation, we suggest a method to forecast software reliability in the primary creation of any process growth phases since from the designing stage only. Software mobile application has remained a significant tool in our lifetime, and several small-medium scale software progress companies capitalize the substantial resources to mark accessible prospects. The landscape of mobile atmospheres varies as of server environments owing to various issues, by means of the net, liveliness, battery-operated, and compatibility. Estimating and forecasting mobile application reliability remain the actual contests as of the variety of the mobile situations in which the applications are used, and the absence of widely available fault data. In addition, error information is optionally given in to the end-users. Hence, in what way to estimate reliability of mobile software application has remained more and more significant. In this paper, site reliability engineering (SRE) for mobile application is proposed for the reliability of software and is taken as a case study. Their failure is copied back to the exact features of mobile application is useful and powerful.
{"title":"Site reliability engineering for IOS mobile application in small-medium scale industries","authors":"N Kavyashree , Dr. Supriya M C , Dr. Lokesh M R","doi":"10.1016/j.gltp.2021.08.065","DOIUrl":"10.1016/j.gltp.2021.08.065","url":null,"abstract":"<div><p>Software reliability is one and only the standard used to calculate the excellence of a software system. In this situation, we suggest a method to forecast software reliability in the primary creation of any process growth phases since from the designing stage only. Software mobile application has remained a significant tool in our lifetime, and several small-medium scale software progress companies capitalize the substantial resources to mark accessible prospects. The landscape of mobile atmospheres varies as of server environments owing to various issues, by means of the net, liveliness, battery-operated, and compatibility. Estimating and forecasting mobile application reliability remain the actual contests as of the variety of the mobile situations in which the applications are used, and the absence of widely available fault data. In addition, error information is optionally given in to the end-users. Hence, in what way to estimate reliability of mobile software application has remained more and more significant. In this paper, site reliability engineering (SRE) for mobile application is proposed for the reliability of software and is taken as a case study. Their failure is copied back to the exact features of mobile application is useful and powerful.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 137-144"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.065","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88374233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper is introduced with a brief survey about existing causes for Knee ailments followed by conventional treatments for them. Studies show that ailments like Osteo Arthritis (OA) of the Knee and Knee related injuries cause chronic pain and stiffness to the knee joint. This affects the range of motion of the leg. The severity of this is highly dependent on the age and BMI (Body-mass Index) of the patient. Further, a contrast between conventional Physiotherapy Machines (CPM) and the proposed model is established. The paper proposes an alternative to the existing CPMs. A cost-effective system capable of diagnosing the severity of the knee using machine learning models and provide appropriate Automated physiotherapy. Using gyroscopic data and a predefined questionnaire, a 1D-CNN is trained. An accuracy of 90.21% was obtained from the machine learning model. The accuracy of the proposed model exceeded the accuracy of some state-of-the-art algorithms in determining the severity of the affected knee by utilizing gyroscopic parameters and with the least computational cost.
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.013
Datta Rakshith KS , Rudresh MD , Shashibhushsan G
The main goal of this research work is to experimentally verify the importance of spoken Speech digit signal in person authentication in controlling applications. The motivation is based on the earlier work of demonstrating the feasibility of using spoken speech digit utterance signal for person security and controlling applications. This paper work also discusses the. Comparative analysis of the cepstral analysis with the mel frequency cepstral coefficient (MFCC) by using vector quantization feature matching technique. All digits speech digit from zero utterance to nine digit utterance data has been collected for 15 subjects in three different sessions. For the thus collected spoken speech digit data, the feature extraction techniques such as cepstral and MFCC were applied to extract the Cepstral and MFCC features. In the next stage of work vector quantization was used for feature matching for both Cepstral and MFCC features and performance were recorded for two different session data. By comparing the performance of Cepstral plus VQ with the MFCC plus VQ, we can conclude that feature extraction technique MFCC gives the better performance than cepstral feature for spoken digit utterance data.
{"title":"Comparative performance analysis for speech digit recognition based on MFCC and vector quantization","authors":"Datta Rakshith KS , Rudresh MD , Shashibhushsan G","doi":"10.1016/j.gltp.2021.08.013","DOIUrl":"10.1016/j.gltp.2021.08.013","url":null,"abstract":"<div><p>The main goal of this research work is to experimentally verify the importance of spoken Speech digit signal in person authentication in controlling applications. The motivation is based on the earlier work of demonstrating the feasibility of using spoken speech digit utterance signal for person security and controlling applications. This paper work also discusses the. Comparative analysis of the cepstral analysis with the mel frequency cepstral coefficient (MFCC) by using vector quantization feature matching technique. All digits speech digit from zero utterance to nine digit utterance data has been collected for 15 subjects in three different sessions. For the thus collected spoken speech digit data, the feature extraction techniques such as cepstral and MFCC were applied to extract the Cepstral and MFCC features. In the next stage of work vector quantization was used for feature matching for both Cepstral and MFCC features and performance were recorded for two different session data. By comparing the performance of Cepstral plus VQ with the MFCC plus VQ, we can conclude that feature extraction technique MFCC gives the better performance than cepstral feature for spoken digit utterance data.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 513-519"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.013","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85639383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-11-01DOI: 10.1016/j.gltp.2021.08.039
Kakuthota Rakshitha, Ramalingam H M, M Pavithra, Advi H D, Maithri Hegde
The idea of sentimental analysis is getting attention for the last few years. The key challenges in a sentimental analysis are the collection of huge data from the sources, applying appropriate algorithms or techniques, and classifying them into different sentiments. In this fast-spreading internet world, social media provides a platform for individuals to express their sentiments. With the changing ways of things in different areas in our day-to-day life, the way of expressing one's view or opinion has also changed. People tend to express themselves in their regional language or in a way convenient to them. These individual reviews play an important role in decision-making. With the huge amount of data that is obtained on social media, it is of no use if the opinions are not classified based on their sentiments. This paper provides information about the tweets posted by the customer are positive, negative, or neutral. For this the proposed model first scrape the tweets from Twitter by using Twitter APIs, then later by using text blob, the customer reviews are given different sentiment scores and classify them as positive, negative, or neutral by using text classification model.
This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/)
Peer-review under responsibility of the scientific committee of the 8th International Conference on Through-Life Engineering Service – TESConf 2019.
{"title":"Sentimental analysis of Indian regional languages on social media","authors":"Kakuthota Rakshitha, Ramalingam H M, M Pavithra, Advi H D, Maithri Hegde","doi":"10.1016/j.gltp.2021.08.039","DOIUrl":"10.1016/j.gltp.2021.08.039","url":null,"abstract":"<div><p>The idea of sentimental analysis is getting attention for the last few years. The key challenges in a sentimental analysis are the collection of huge data from the sources, applying appropriate algorithms or techniques, and classifying them into different sentiments. In this fast-spreading internet world, social media provides a platform for individuals to express their sentiments. With the changing ways of things in different areas in our day-to-day life, the way of expressing one's view or opinion has also changed. People tend to express themselves in their regional language or in a way convenient to them. These individual reviews play an important role in decision-making. With the huge amount of data that is obtained on social media, it is of no use if the opinions are not classified based on their sentiments. This paper provides information about the tweets posted by the customer are positive, negative, or neutral. For this the proposed model first scrape the tweets from Twitter by using Twitter APIs, then later by using text blob, the customer reviews are given different sentiment scores and classify them as positive, negative, or neutral by using text classification model.</p><p>This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/)</p><p>Peer-review under responsibility of the scientific committee of the 8th International Conference on Through-Life Engineering Service – TESConf 2019.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 414-420"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.039","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90688845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recognition of a person in society is based on the behaviour and socio-communicative skills. But some neurodevelopment illness like Autism Spectrum disorder (ASD) highly influences the behaviour and communication skill of an individual. Individuals with such illness need early detection for minimizing its effect. The ASD diagnosis is done by a mobile-based screening app to extract information from all individuals irrespective of age. The information is stored in publicly accessible authenticated research UCI Machine Learning (ML) repository and Kaggle. The proposed approach in this paper is investigated up on child data set gathered from UCI repository. The analysis is done for two distinct cases: complete and missing data via standardization by Mean Standard deviation approach followed by dimension reduction using Diffusion Mapping and finally classification of ASD class utilising Deep Neural Network Prediction and Classification (DNNPC) model. The performance of DNNPC classifier model is validated by distinct performance parameters.
{"title":"ASD classification for children using deep neural network","authors":"Ashima Sindhu Mohanty , Priyadarsan Parida , Krishna Chandra Patra","doi":"10.1016/j.gltp.2021.08.042","DOIUrl":"10.1016/j.gltp.2021.08.042","url":null,"abstract":"<div><p>The recognition of a person in society is based on the behaviour and socio-communicative skills. But some neurodevelopment illness like Autism Spectrum disorder (ASD) highly influences the behaviour and communication skill of an individual. Individuals with such illness need early detection for minimizing its effect. The ASD diagnosis is done by a mobile-based screening app to extract information from all individuals irrespective of age. The information is stored in publicly accessible authenticated research UCI Machine Learning (ML) repository and Kaggle. The proposed approach in this paper is investigated up on child data set gathered from UCI repository. The analysis is done for two distinct cases: complete and missing data via standardization by Mean Standard deviation approach followed by dimension reduction using Diffusion Mapping and finally classification of ASD class utilising Deep Neural Network Prediction and Classification (DNNPC) model. The performance of DNNPC classifier model is validated by distinct performance parameters.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 461-466"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.042","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81067930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}