首页 > 最新文献

International Journal of Advance Research, Ideas and Innovations in Technology最新文献

英文 中文
A Hop To Hop Energy Efficient Transmission for WBAN (Wireless Body Area Network) WBAN(无线体域网络)的一跳到一跳节能传输
Er. Pinki Rani, Er. Rajnish Kansal
It is a familiar fact that conservation and preservation of network energy is one of the primary objectives of the sensor nodes in a wireless sensor network. This becomes even more important when we are talking about Wireless Body Area Network (WBAN). In this case, the sensor nodes are working either very close to or inside a human body. Hence performance is a very important task here. In this project we aim to reduce the consumption of energy while a transmission is made. We tend to strategically toggle between working/non-working status of a sensor node while it is being involved or not involved in the transmission process. This was, we are able to increase the network time by a very good amount. Other deceptive parameters are also to be calculated. With the advancement in technology, we now have access to wearable physiological monitoring system. In this concept, an individual will wear a fabric in which a collection of sensors will be embedded. All these sensors will be connected to a central monitoring system. Sensors will continuously send data to these central monitoring systems. Hence, wireless sensors are now being used as wearable gadgets. But the limitation here is that they have very limited amount of energy. And when it comes in medical terms, every fault in an instrument can be a factor in determining the cause of a healthy life or an unnoticed illness. Hence, it becomes very important to work on these sensors and give them a long lifetime so that their monitoring does not get affected. There are many ways we can achieve this. Good amount of research has been done in this domain. We here are working on an algorithm in which a sensor node will be strategically switched on and off based upon its usage. This way, only the appropriate amount of energy will be used by the sensor and overall energy of the complete system or network will be preserved on a larger extent.
众所周知,网络能量的守恒和保存是无线传感器网络中传感器节点的主要目标之一。当我们谈论无线体域网络(WBAN)时,这一点变得更加重要。在这种情况下,传感器节点要么非常接近人体,要么在人体内部工作。因此,性能在这里是一个非常重要的任务。在这个项目中,我们的目标是在传输过程中减少能源消耗。当传感器节点参与或不参与传输过程时,我们倾向于在工作/非工作状态之间进行策略切换。这就是,我们能够将网络时间大大增加。其他欺骗性参数也要计算。随着科技的进步,我们现在有了可穿戴的生理监测系统。在这个概念中,一个人将穿着一件嵌入了一系列传感器的织物。所有这些传感器都将连接到一个中央监控系统。传感器将不断向这些中央监控系统发送数据。因此,无线传感器现在被用作可穿戴设备。但这里的限制是它们的能量非常有限。当涉及到医学术语时,仪器的每一个故障都可能是决定健康生活或未被注意疾病原因的因素。因此,对这些传感器进行工作并延长它们的使用寿命变得非常重要,这样它们的监测就不会受到影响。我们有很多方法可以做到这一点。在这个领域已经做了大量的研究。我们正在研究一种算法,在这种算法中,传感器节点将根据其使用情况有策略地打开或关闭。这样,传感器只会使用适量的能量,更大程度上保留了整个系统或网络的整体能量。
{"title":"A Hop To Hop Energy Efficient Transmission for WBAN (Wireless Body Area Network)","authors":"Er. Pinki Rani, Er. Rajnish Kansal","doi":"10.21090/ijaerd.84169","DOIUrl":"https://doi.org/10.21090/ijaerd.84169","url":null,"abstract":"It is a familiar fact that conservation and preservation of network energy is one of the primary objectives of the sensor nodes in a wireless sensor network. This becomes even more important when we are talking about Wireless Body Area Network (WBAN). In this case, the sensor nodes are working either very close to or inside a human body. Hence performance is a very important task here. In this project we aim to reduce the consumption of energy while a transmission is made. We tend to strategically toggle between working/non-working status of a sensor node while it is being involved or not involved in the transmission process. This was, we are able to increase the network time by a very good amount. Other deceptive parameters are also to be calculated. With the advancement in technology, we now have access to wearable physiological monitoring system. In this concept, an individual will wear a fabric in which a collection of sensors will be embedded. All these sensors will be connected to a central monitoring system. Sensors will continuously send data to these central monitoring systems. Hence, wireless sensors are now being used as wearable gadgets. But the limitation here is that they have very limited amount of energy. And when it comes in medical terms, every fault in an instrument can be a factor in determining the cause of a healthy life or an unnoticed illness. Hence, it becomes very important to work on these sensors and give them a long lifetime so that their monitoring does not get affected. There are many ways we can achieve this. Good amount of research has been done in this domain. We here are working on an algorithm in which a sensor node will be strategically switched on and off based upon its usage. This way, only the appropriate amount of energy will be used by the sensor and overall energy of the complete system or network will be preserved on a larger extent.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89069080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of BG-II Cotton Hybrids and Non Bt Cotton on Weight of Different Instars of Spodoptera Litura (Fab.) Bt - ii型棉花杂交种与非Bt棉对斜纹夜蛾不同龄期体重的影响
Pub Date : 2017-05-18 DOI: 10.20546/ijcmas.2017.610.257
Ramanjali Thirri, T. Singh
Laboratory evaluation of eleven Bt cotton cultivars expressing both Cry1Ac and Cry2Ab endotoxins (BT-II) and non Bt cotton on weight of first, second, third and fourth instar larvae of Spodoptera litura. Different plant parts were used i.e. leaves, squares and bolls at 60, 75, 90 and 125 days after sowing of the crop for bioassay. First instar larvae fed on leaves and bolls shows hundred per cent mortality. The final weight of the each instar was reduced at seven days after feeding when compared to non Bt cotton. Reduced in weight was more in case of first, second and third instar than fourth instar larvae. Among leaves, squares and bolls reduction in weight of all four instars was more on leaves followed by squares and bolls
11个同时表达Cry1Ac和Cry2Ab内毒素(Bt - ii)的Bt棉品种与非Bt棉品种对斜纹夜蛾1、2、3、4龄幼虫体重的室内评价在作物播种后的60、75、90和125天,使用不同的植物部位,即叶片、方形和棉铃进行生物测定。以树叶和棉铃为食的一龄幼虫死亡率为100%。饲喂后7 d各龄期末重较非Bt棉有所降低。1、2、3龄幼虫的体重下降幅度大于4龄幼虫。在叶片中,方形和棉铃的重量减少最多,其次是方形和棉铃
{"title":"Effect of BG-II Cotton Hybrids and Non Bt Cotton on Weight of Different Instars of Spodoptera Litura (Fab.)","authors":"Ramanjali Thirri, T. Singh","doi":"10.20546/ijcmas.2017.610.257","DOIUrl":"https://doi.org/10.20546/ijcmas.2017.610.257","url":null,"abstract":"Laboratory evaluation of eleven Bt cotton cultivars expressing both Cry1Ac and Cry2Ab endotoxins (BT-II) and non Bt cotton on weight of first, second, third and fourth instar larvae of Spodoptera litura. Different plant parts were used i.e. leaves, squares and bolls at 60, 75, 90 and 125 days after sowing of the crop for bioassay. First instar larvae fed on leaves and bolls shows hundred per cent mortality. The final weight of the each instar was reduced at seven days after feeding when compared to non Bt cotton. Reduced in weight was more in case of first, second and third instar than fourth instar larvae. Among leaves, squares and bolls reduction in weight of all four instars was more on leaves followed by squares and bolls","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88402916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Hybrid Approach on Face Detection and Recognition 一种新的人脸检测与识别混合方法
Saloni Dwivedi, Nitika Gupta
Face detection and recognition is an important paradigm when we consider the biometric based systems. Among various biometric elements, the face is the most reliable one and can be easily observed even from a distance as compared to iris or fingerprint which needs to be closely observed to use them for any kind of detection and recognition. Challenges faced by face detection algorithms often involve the presence of facial features such as beards, mustaches, and glasses, facial expressions, and occlusion of faces like surprised or crying. Another problem is illumination and poor lighting conditions such as in video surveillance cameras image quality and size of an image as in passport control or visa control. Complex backgrounds also make it extremely hard to detect faces. In this research work, a number of methods and research paradigms pertaining to face detection and recognition is studied at length and evaluate various face detection and recognition methods, provide a complete solution for image-based face detection and recognition with higher accuracy, a better response rate as an initial step for video surveillance.
当我们考虑基于生物特征的系统时,人脸检测和识别是一个重要的范例。在各种生物特征元素中,人脸是最可靠的,即使在远处也可以很容易地观察到,而虹膜或指纹需要近距离观察才能用于任何类型的检测和识别。人脸检测算法面临的挑战通常涉及胡须、胡须和眼镜等面部特征的存在、面部表情以及惊讶或哭泣等面部遮挡。另一个问题是照明和照明条件差,如视频监控摄像机的图像质量和图像大小,如护照控制或签证控制。复杂的背景也使得人脸检测极其困难。在本研究工作中,对人脸检测与识别的一些方法和研究范式进行了详细的研究,并对各种人脸检测与识别方法进行了评估,为基于图像的人脸检测与识别提供了一个完整的解决方案,具有更高的精度,更好的响应率,作为视频监控的第一步。
{"title":"A New Hybrid Approach on Face Detection and Recognition","authors":"Saloni Dwivedi, Nitika Gupta","doi":"10.31219/osf.io/r7984","DOIUrl":"https://doi.org/10.31219/osf.io/r7984","url":null,"abstract":"Face detection and recognition is an important paradigm when we consider the biometric based systems. Among various biometric elements, the face is the most reliable one and can be easily observed even from a distance as compared to iris or fingerprint which needs to be closely observed to use them for any kind of detection and recognition. Challenges faced by face detection algorithms often involve the presence of facial features such as beards, mustaches, and glasses, facial expressions, and occlusion of faces like surprised or crying. Another problem is illumination and poor lighting conditions such as in video surveillance cameras image quality and size of an image as in passport control or visa control. Complex backgrounds also make it extremely hard to detect faces. In this research work, a number of methods and research paradigms pertaining to face detection and recognition is studied at length and evaluate various face detection and recognition methods, provide a complete solution for image-based face detection and recognition with higher accuracy, a better response rate as an initial step for video surveillance.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85530241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data Security in Cloud Computing 云计算中的数据安全
Vimal Kumar, Sivadon Chaisiri, R. Ko
Cloud computing is a globalized concept and there are no borders within the cloud. Computers used to process and store user data can be located anywhere on the globe, depending on where the capacities that are required are available in the global computer networks used for cloud computing. Because of the attractive features of cloud computing, many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using thin clients as and when required. One of the major issue in the cloud today is data security in cloud computing. Storage of data in the cloud can be risky because of use of the Internet by cloud-based services which means less control over the stored data. One of the major concern in the cloud is how do we grab all the been ts of the cloud while maintaining security controls over the organizations' assets. Our aim is to propose a more reliable, decentralized lightweight key management technique for cloud systems which provides more e client data security and key management in cloud systems. Our proposed technique provides better security against Byzantine failure, server colluding and data modi cation attacks. Keywords: Cloud security; key management; server colluding attacks; Byzantine failure;
云计算是一个全球化的概念,在云内没有边界。用于处理和存储用户数据的计算机可以位于全球任何地方,这取决于用于云计算的全球计算机网络中所需容量的位置。由于云计算具有吸引人的特性,许多组织正在使用云存储来存储其关键信息。用户可以将数据远程存储在云中,并且可以在需要时使用瘦客户机访问数据。当今云计算的主要问题之一是云计算中的数据安全。在云中存储数据可能存在风险,因为基于云的服务使用互联网,这意味着对存储数据的控制较少。云计算中的一个主要问题是,我们如何在保持对组织资产的安全控制的同时,获取云的所有数据。我们的目标是为云系统提出一种更可靠、分散的轻量级密钥管理技术,为云系统提供更多的客户端数据安全和密钥管理。我们提出的技术提供了更好的安全性,防止拜占庭故障,服务器串通和数据篡改攻击。关键词:云安全;密钥管理;服务器串通攻击;拜占庭失败;
{"title":"Data Security in Cloud Computing","authors":"Vimal Kumar, Sivadon Chaisiri, R. Ko","doi":"10.1049/PBSE007E","DOIUrl":"https://doi.org/10.1049/PBSE007E","url":null,"abstract":"Cloud computing is a globalized concept and there are no borders within the cloud. Computers used to process and store user data can be located anywhere on the globe, depending on where the capacities that are required are available in the global computer networks used for cloud computing. Because of the attractive features of cloud computing, many organizations are using cloud storage for storing their critical information. The data can be stored remotely in the cloud by the users and can be accessed using thin clients as and when required. One of the major issue in the cloud today is data security in cloud computing. Storage of data in the cloud can be risky because of use of the Internet by cloud-based services which means less control over the stored data. One of the major concern in the cloud is how do we grab all the been ts of the cloud while maintaining security controls over the organizations' assets. Our aim is to propose a more reliable, decentralized lightweight key management technique for cloud systems which provides more e client data security and key management in cloud systems. Our proposed technique provides better security against Byzantine failure, server colluding and data modi cation attacks. Keywords: Cloud security; key management; server colluding attacks; Byzantine failure;","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90736330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space Hilbert空间上的一类(K-N)拟n-正规算子
Pub Date : 2016-11-26 DOI: 10.24996/ijs.2017.58.4b.20
N. Sivakumar, Bavithra
In this work we introduce another class of normal operator which is (K-N) quasi n normal operator and given some basic properties. The relation between this operator with another types of normal operators are discussed. Here the results are given by using the conditions of (K-N) quasi normal operators.
本文引入了另一类正规算子(K-N)拟n正规算子,并给出了一些基本性质。讨论了该算子与其他正规算子的关系。本文利用(K-N)拟正规算子的条件给出了结果。
{"title":"On the Class of (K-N) Quasi-n-Normal Operators on Hilbert Space","authors":"N. Sivakumar, Bavithra","doi":"10.24996/ijs.2017.58.4b.20","DOIUrl":"https://doi.org/10.24996/ijs.2017.58.4b.20","url":null,"abstract":"In this work we introduce another class of normal operator which is (K-N) quasi n normal operator and given some basic properties. The relation between this operator with another types of normal operators are discussed. Here the results are given by using the conditions of (K-N) quasi normal operators.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76814145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Twitter Stream Analysis for Traffic Detection in Real Time 用于实时流量检测的Twitter流分析
Rucha Kulkarni, Sayali Dhanawade, S. Raut
Now a days,social networking are more popular.for example,twitter,Facebook etc.social networking are used forevent detection in real time.Real time events are traffic detection,earthquake monitoring.In this paper,we use the the twitter for real time traffic event detection.Firstly,the system extract the tweets from twitter and apply the text mining techniques on that tweets.those techniques are tokenization, stop-word removing,stemming.after that classify that on the basis of class label i.e traffic event or no traffic event.In this paper, we present an online method for detection of real-traffic events in Twitter data.
如今,社交网络更受欢迎。例如,twitter,Facebook等社交网络被用来防止实时检测。实时事件是交通检测,地震监测。在本文中,我们使用twitter进行实时交通事件检测。首先,系统从推特中提取推文,并对推文进行文本挖掘技术。这些技术是标记化,停止词删除,词干提取。然后根据类别标签对其进行分类,即流量事件或无流量事件。在本文中,我们提出了一种在线检测Twitter数据中实时流量事件的方法。
{"title":"Twitter Stream Analysis for Traffic Detection in Real Time","authors":"Rucha Kulkarni, Sayali Dhanawade, S. Raut","doi":"10.21090/ijaerd.76454","DOIUrl":"https://doi.org/10.21090/ijaerd.76454","url":null,"abstract":"Now a days,social networking are more popular.for example,twitter,Facebook etc.social networking are used forevent detection in real time.Real time events are traffic detection,earthquake monitoring.In this paper,we use the the twitter for real time traffic event detection.Firstly,the system extract the tweets from twitter and apply the text mining techniques on that tweets.those techniques are tokenization, stop-word removing,stemming.after that classify that on the basis of class label i.e traffic event or no traffic event.In this paper, we present an online method for detection of real-traffic events in Twitter data.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87076937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone. 基于个人手机实时现场数据采集的灾害报告。
Jayanti Khutwad, B. Konde, A. Deokate, A.A.Kadam
Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.
危险是指有可能危害人类、财产或环境的情况或事物。危险区域危害许多人的健康。所以我们必须防止它。我们正在制定危害报告制度,以防止危害问题的发生。报告的重要任务是数据收集。地理空间数据用于指示数据以及地理组件。这意味着数据集具有与它们相关联的位置信息,例如坐标、地址、城市或邮政编码形式的地理数据。用户通过使用相同的数据向组织报告,组织解决了这个问题。
{"title":"Hazards Reporting based on Real-Time Field Data Collection using Personal Mobile Phone.","authors":"Jayanti Khutwad, B. Konde, A. Deokate, A.A.Kadam","doi":"10.21090/ijaerd.78931","DOIUrl":"https://doi.org/10.21090/ijaerd.78931","url":null,"abstract":"Hazard is a situation or thing that has the potential to harm people's, property or the environment. Hazardous area cause many people health. So we must to prevent from it. We are develop hazard reporting system to prevent from hazard prob- lem. Important task of the Reporting is Data Collection.The Geo-spatial Data is used to Indicate the Data along with the geographic component.This means that the data set have loca- tion information tied to them such as geographical data in the form of coordinates,address,city,or ZIP code.User report to the organization by using the same data and organization solve that problem.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73717115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Natural Language Processing 自然语言处理
Pub Date : 2016-10-10 DOI: 10.1007/978-1-4842-3069-5_5
Aparna Priyadarsini Khadanga, S. K. Nayak
{"title":"Natural Language Processing","authors":"Aparna Priyadarsini Khadanga, S. K. Nayak","doi":"10.1007/978-1-4842-3069-5_5","DOIUrl":"https://doi.org/10.1007/978-1-4842-3069-5_5","url":null,"abstract":"","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87595426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prediction of Heart Disease using Data Mining Techniques 使用数据挖掘技术预测心脏病
Pub Date : 2016-02-05 DOI: 10.21090/ijaerd.030137
Era Singh Kajal, Nishika
Data mining is process to analyses number of data sets and then extracts the meaning of data. It helps to predict the patterns and future trends, allowing business in decision making. Data mining applications are able to give the answer of business questions which can take much time to resolve traditionally. High amount of data that can be generated for the prediction of disease is analyzed traditionally and is too complicated along with voluminous to be processed. Data mining provides methods and techniques for transformation of the data into useful information for decision making. These techniques can make process fast and take less time to predict the heart disease with more accuracy. The healthcare sector assembles enormous quantity of healthcare data which cannot be mined to uncover hidden information for effectual decision making. However, there is a plenty of hidden information in this data which is untapped and not being used appropriately for predictions. It becomes more influential in case of heart disease that is considered as the predominant reason behind death all over the world. In medical field, Data Mining provides several methods which are widely used in the medical and clinical decision support systems which should be helpful for diagnosis and predicting of various diseases. These data mining techniques can be used in heart diseases takes less time and make the process much faster for the prediction system to predict diseases with good accuracy to improve their health. In this paper we survey different papers in which one or more algorithms of data mining used for the prediction of heart disease. By Applying data mining techniques to heart disease data which requires to be processed, we can get effective results and achieve reliable performance which will help in decision making in healthcare industry. It will help the medical practitioners to diagnose the disease in less time and predict probable complications well in advance. Identify the major risk factors of Heart Disease categorizing the risk factors in an order which causes damages to the heart such as diabetes, high blood cholesterol, obesity, hyper tension, smoking, poor diet, stress, etc. Data mining techniques and functions are used to identify the level of risk factors which helps the patients to take precautions in advance to save their life.
数据挖掘是对大量数据集进行分析,进而提取数据含义的过程。它有助于预测模式和未来趋势,从而允许企业进行决策。数据挖掘应用程序能够给出业务问题的答案,而这些问题在传统上需要花费大量时间来解决。为预测疾病而产生的大量数据传统上是通过分析产生的,这些数据过于复杂,而且数量庞大,难以处理。数据挖掘提供了将数据转换为决策有用信息的方法和技术。这些技术可以使过程更快,用更少的时间更准确地预测心脏病。医疗保健行业汇集了大量的医疗保健数据,这些数据无法挖掘以发现隐藏的信息以进行有效的决策。然而,在这些数据中有大量未开发的隐藏信息,没有被适当地用于预测。在全世界被认为是死亡的主要原因的心脏病的情况下,它的影响更大。在医学领域,数据挖掘提供了多种方法,广泛应用于医学和临床决策支持系统,有助于各种疾病的诊断和预测。这些数据挖掘技术可以用于心脏疾病,花费更少的时间,使预测系统的过程更快,以良好的准确性预测疾病,以改善他们的健康状况。在本文中,我们调查了不同的论文,其中一种或多种数据挖掘算法用于预测心脏病。将数据挖掘技术应用到需要处理的心脏病数据中,可以得到有效的结果并获得可靠的性能,为医疗行业的决策提供帮助。这将有助于医生在更短的时间内诊断疾病,并提前预测可能的并发症。确定心脏病的主要危险因素,将导致心脏损害的危险因素按顺序分类,如糖尿病、高胆固醇、肥胖、高血压、吸烟、不良饮食、压力等。利用数据挖掘技术和功能识别危险因素水平,帮助患者提前采取预防措施,挽救生命。
{"title":"Prediction of Heart Disease using Data Mining Techniques","authors":"Era Singh Kajal, Nishika","doi":"10.21090/ijaerd.030137","DOIUrl":"https://doi.org/10.21090/ijaerd.030137","url":null,"abstract":"Data mining is process to analyses number of data sets and then extracts the meaning of data. It helps to predict the patterns and future trends, allowing business in decision making. Data mining applications are able to give the answer of business questions which can take much time to resolve traditionally. High amount of data that can be generated for the prediction of disease is analyzed traditionally and is too complicated along with voluminous to be processed. Data mining provides methods and techniques for transformation of the data into useful information for decision making. These techniques can make process fast and take less time to predict the heart disease with more accuracy. The healthcare sector assembles enormous quantity of healthcare data which cannot be mined to uncover hidden information for effectual decision making. However, there is a plenty of hidden information in this data which is untapped and not being used appropriately for predictions. It becomes more influential in case of heart disease that is considered as the predominant reason behind death all over the world. In medical field, Data Mining provides several methods which are widely used in the medical and clinical decision support systems which should be helpful for diagnosis and predicting of various diseases. These data mining techniques can be used in heart diseases takes less time and make the process much faster for the prediction system to predict diseases with good accuracy to improve their health. In this paper we survey different papers in which one or more algorithms of data mining used for the prediction of heart disease. By Applying data mining techniques to heart disease data which requires to be processed, we can get effective results and achieve reliable performance which will help in decision making in healthcare industry. It will help the medical practitioners to diagnose the disease in less time and predict probable complications well in advance. Identify the major risk factors of Heart Disease categorizing the risk factors in an order which causes damages to the heart such as diabetes, high blood cholesterol, obesity, hyper tension, smoking, poor diet, stress, etc. Data mining techniques and functions are used to identify the level of risk factors which helps the patients to take precautions in advance to save their life.","PeriodicalId":13720,"journal":{"name":"International Journal of Advance Research, Ideas and Innovations in Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2016-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90045903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
International Journal of Advance Research, Ideas and Innovations in Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1