首页 > 最新文献

Proceeding International Conference on Science and Engineering最新文献

英文 中文
Progressive Analysis and Predictions of Leukemia (Cancer) Patients on a Machine Learning Model- The APPOLLO Hospitals Accredited 在机器学习模型上对白血病(癌症)患者进行渐进式分析和预测-阿波罗医院认证
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.282
Kamel Alikhan Siddiqui, K. Fatima, Ali Hasan Khan, Mr. Sibghatullah
This abstract describes a machine learning model for predicting the prognosis of cancer patients with leukemia. The model is based on analyzing patient data such as age, gender, diagnosis, lab results, treatment history, and prior hospitalizations. The model employs supervised learning techniques such as random forests and gradient boosting to generate predictions of survival probabilities. Additionally, the model uses feature engineering to identify important features and reduce noise in the data. The model is evaluated using the area under the receiver operating characteristic curve (AUC) and other metrics. The results indicate that the model has good predictive accuracy and can be used to identify high-risk patients and guide clinical decisions. The goal of this project is to develop a machine learning model for the diagnosis and prognosis of leukemia in Indian patients. The model will use a progressive analysis of patient data to identify the characteristics associated with leukemia, including genetic markers, environmental exposures, lifestyle factors, and demographic information. Using this information, the model will be used to accurately predict the risk of developing leukemia in Indian patients. Additionally, the model will be used to identify the most effective treatments for those diagnosed with leukemia and to monitor the disease progression. Finally, the model will be evaluated for its accuracy and effectiveness in a clinical setting.
摘要描述了一种用于预测癌症白血病患者预后的机器学习模型。该模型基于分析患者数据,如年龄、性别、诊断、实验室结果、治疗史和先前的住院情况。该模型采用随机森林和梯度增强等监督学习技术来生成生存概率的预测。此外,该模型使用特征工程来识别重要特征并降低数据中的噪声。使用接收器工作特性曲线下的面积(AUC)和其他指标来评估该模型。结果表明,该模型具有较好的预测精度,可用于识别高危患者,指导临床决策。该项目的目标是为印度白血病患者的诊断和预后开发一个机器学习模型。该模型将对患者数据进行渐进式分析,以确定与白血病相关的特征,包括遗传标记、环境暴露、生活方式因素和人口统计信息。利用这些信息,该模型将用于准确预测印度患者患白血病的风险。此外,该模型将用于为白血病患者确定最有效的治疗方法,并监测疾病进展。最后,该模型将评估其准确性和有效性在临床设置。
{"title":"Progressive Analysis and Predictions of Leukemia (Cancer) Patients on a Machine Learning Model- The APPOLLO Hospitals Accredited","authors":"Kamel Alikhan Siddiqui, K. Fatima, Ali Hasan Khan, Mr. Sibghatullah","doi":"10.52783/cienceng.v11i1.282","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.282","url":null,"abstract":"This abstract describes a machine learning model for predicting the prognosis of cancer patients with leukemia. The model is based on analyzing patient data such as age, gender, diagnosis, lab results, treatment history, and prior hospitalizations. The model employs supervised learning techniques such as random forests and gradient boosting to generate predictions of survival probabilities. Additionally, the model uses feature engineering to identify important features and reduce noise in the data. The model is evaluated using the area under the receiver operating characteristic curve (AUC) and other metrics. The results indicate that the model has good predictive accuracy and can be used to identify high-risk patients and guide clinical decisions. The goal of this project is to develop a machine learning model for the diagnosis and prognosis of leukemia in Indian patients. The model will use a progressive analysis of patient data to identify the characteristics associated with leukemia, including genetic markers, environmental exposures, lifestyle factors, and demographic information. Using this information, the model will be used to accurately predict the risk of developing leukemia in Indian patients. Additionally, the model will be used to identify the most effective treatments for those diagnosed with leukemia and to monitor the disease progression. Finally, the model will be evaluated for its accuracy and effectiveness in a clinical setting.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131317400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Growth of Industry during Kakatiyas Period (1000 - 1323 AD) Kakatiyas时期(公元1000 - 1323年)的工业发展
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.187
Kolipaka Srinivas, Manisha Dixit, Mamidala Kondal
The period from starting of the 11th to early part of the 14th century saw the emergence of the Kakatiyas dynasty that opened a fresh chapter in the annals of medieval South India. During the 12th and 13th centuries a number of developments contributed to a steady increase in over – all economic activity in Kakatiya kingdom. In fact, agriculture was the main occupation during the Kakatiya period, yet, a large number of industries and handicrafts flourished both in rural and urban areas. Textile industry, the leather industry Diamond Industry, Iron Industry etc. played a prominent role in the economic sphere of the Kakatiya kingdom. Among the industries of the period, textile, metal, jewellery and leather industries were the most flourished.
从11世纪初到14世纪初,Kakatiyas王朝的出现在中世纪南印度的编年史上翻开了新的一章。在12世纪和13世纪期间,一些发展促进了Kakatiya王国整体经济活动的稳步增长。事实上,农业是Kakatiya时期的主要职业,然而,大量的工业和手工业在农村和城市地区蓬勃发展。纺织工业、皮革工业、钻石工业、钢铁工业等在卡卡提亚王国的经济领域中占有突出地位。在这一时期的工业中,纺织、金属、珠宝和皮革工业最为繁荣。
{"title":"Growth of Industry during Kakatiyas Period (1000 - 1323 AD)","authors":"Kolipaka Srinivas, Manisha Dixit, Mamidala Kondal ","doi":"10.52783/cienceng.v11i1.187","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.187","url":null,"abstract":"The period from starting of the 11th to early part of the 14th century saw the emergence of the Kakatiyas dynasty that opened a fresh chapter in the annals of medieval South India. During the 12th and 13th centuries a number of developments contributed to a steady increase in over – all economic activity in Kakatiya kingdom. In fact, agriculture was the main occupation during the Kakatiya period, yet, a large number of industries and handicrafts flourished both in rural and urban areas. Textile industry, the leather industry Diamond Industry, Iron Industry etc. played a prominent role in the economic sphere of the Kakatiya kingdom. Among the industries of the period, textile, metal, jewellery and leather industries were the most flourished.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125527673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Review on Medical Health Data Management Using Blockchain Technology 基于区块链技术的医疗健康数据管理系统综述
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.389
Prof. A. P. Gaigol, Dr. V. S. Wadne, Prof. S. R. Bhandari, Dr. R. S. Deshpande, Dr. T. R. Sangole
“Data” is the trending word since last few decades. When it comes to any type of data its security is important. Relating the same, maintaining the medical health data is also very significant. When the medical health data is stored or retrieved from the internet is called as Electronic Health Record (EHR). Many times an EHR can be accessed in an unethical way when it is maintaining through conventional approach. Misuse of the same data can lead to many unavoidable problems. Use of Blockchain Technology plays pivotal role in dealing with such problems. An already proven and completely functional Blockchain Technology based Crypto-currencies are the best examples of how efficient and capable Blockchain Technology is. Peer to peer network is used in Blockchain Technology to store the data. Key features of Blockchain-based network are Public Distributed Ledger or non-centralization, Hashing Concept, PoW which makes Blockchain Technology one of most robust technology and highly recommended to use to store and retrieve the data safely.  Goal of stated work is to study various benefits of Blockchain Technlogy, how an Electronic Health Record (EHR) can be access in a predefined way where the medical health data/an Electronic Health Record (EHR) will remain immutable throughout its existence.      
“数据”是过去几十年的流行词。对于任何类型的数据,其安全性都很重要。与此相关,医疗健康数据的维护也非常重要。当医疗健康数据被存储或从互联网检索时,称为电子健康记录(EHR)。很多时候,当电子病历通过传统方法维护时,可以以不道德的方式访问。对相同数据的滥用会导致许多不可避免的问题。区块链技术的使用在处理这些问题中起着关键作用。基于区块链技术的加密货币是区块链技术效率和能力的最佳例子。区块链技术采用点对点网络来存储数据。基于区块链的网络的关键特征是公共分布式账本或非集中化,哈希概念,PoW,这使得区块链技术成为最强大的技术之一,强烈建议使用它来安全地存储和检索数据。所述工作的目标是研究区块链技术的各种好处,如何以预定义的方式访问电子健康记录(EHR),其中医疗健康数据/电子健康记录(EHR)在其存在期间保持不变。
{"title":"A Systematic Review on Medical Health Data Management Using Blockchain Technology","authors":"Prof. A. P. Gaigol, Dr. V. S. Wadne, Prof. S. R. Bhandari, Dr. R. S. Deshpande, Dr. T. R. Sangole","doi":"10.52783/cienceng.v11i1.389","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.389","url":null,"abstract":"“Data” is the trending word since last few decades. When it comes to any type of data its security is important. Relating the same, maintaining the medical health data is also very significant. When the medical health data is stored or retrieved from the internet is called as Electronic Health Record (EHR). Many times an EHR can be accessed in an unethical way when it is maintaining through conventional approach. Misuse of the same data can lead to many unavoidable problems. Use of Blockchain Technology plays pivotal role in dealing with such problems. An already proven and completely functional Blockchain Technology based Crypto-currencies are the best examples of how efficient and capable Blockchain Technology is. Peer to peer network is used in Blockchain Technology to store the data. Key features of Blockchain-based network are Public Distributed Ledger or non-centralization, Hashing Concept, PoW which makes Blockchain Technology one of most robust technology and highly recommended to use to store and retrieve the data safely.  Goal of stated work is to study various benefits of Blockchain Technlogy, how an Electronic Health Record (EHR) can be access in a predefined way where the medical health data/an Electronic Health Record (EHR) will remain immutable throughout its existence.      ","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126515706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mass Media, Propaganda & Ethics: An Overview of a New Upsurge of Fascism in India 大众传媒、宣传与伦理:印度法西斯主义新高潮概览
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.303
Shyamali Banerjee, Sanju Xavier
Mass Media, especially print media since its inception, if we look back, during Industrial Revolution and its concomitant Mass Production, has always been dwindled in between two binary epithets: Political Allegiance and Media Democracy. The duality lies in the fact that when the media has to work at the behest of political parties, ruling parties at the helm of body politique of the state, for its survival and sustenance, of course the other epithet which is ‘Media democracy’ or democratic rights of the media is questionable. However, the compulsion to show political allegiance to the ruling party at the governance is never accepted by the media without resistance and therefore any attempt of imposing censorship on media has been vehemently protested. Examples can be multiplied by drawing instances from history. Political censorship in Indian Media has never been such a recurrent phenomenon as it has become in the recent past. Also, ‘political allegiance’ when turned to propaganda tactics is more vulnerable than that of securing unflinching faith in the government. The number of defamation cases clamped against media houses, reporters and photo journalists have gone up from 13 to 167 as per a recent survey made by an independent journalist. This research study explores the fact that digital propaganda and political allegiance has been used by the ruling government to ensure a mass consensus over a number of socio-political issues, starting from Farmers’ Bill to Abrogation of Article 370 of Indian Constitution or for that matter Warfare Propaganda. The methodology that is used for this study is content analysis of media representation of information and speech analysis of PM Narendra Modi using a unique coding method. The samples are chosen on the basis of how media has represented announcement of different developmental schemes by the Modi Government and what they represent in reality. Most of the news reports that are analysed in this study between 2016-2022 are sourced from different newspapers and internet sources.
如果我们回顾一下,在工业革命及其伴随的大规模生产期间,大众媒体,特别是自诞生以来的印刷媒体,总是在两个二元绰号之间萎缩:政治忠诚和媒体民主。这种两重性在于,当媒体必须在政党的要求下工作时,执政党在国家政治体的掌舵下,为了它的生存和维持,当然,另一个绰号“媒体民主”或媒体的民主权利是值得怀疑的。然而,媒体从来没有不受抵制地接受过在执政时向执政党表示政治忠诚的强迫,因此,任何对媒体施加审查的企图都受到了强烈抗议。从历史中汲取实例,可以使例子成倍增加。印度媒体的政治审查从未像最近这样反复出现。此外,当“政治忠诚”变成宣传策略时,比确保对政府坚定不移的信任更脆弱。一位独立记者最近进行的一项调查显示,针对媒体机构、记者和摄影记者的诽谤案件已从13起上升到167起。本研究探讨的事实是,执政政府利用数位宣传和政治忠诚,以确保在一系列社会政治问题上达成大众共识,从农民法案到废除印度宪法第370条,或就此而言的战争宣传。本研究使用的方法是使用独特的编码方法对媒体表示的信息和总理纳伦德拉·莫迪的语音分析进行内容分析。这些样本是根据媒体如何代表莫迪政府宣布的不同发展计划以及它们在现实中的代表来选择的。在这项研究中分析的2016-2022年间的大多数新闻报道都来自不同的报纸和互联网资源。
{"title":"Mass Media, Propaganda & Ethics: An Overview of a New Upsurge of Fascism in India","authors":"Shyamali Banerjee, Sanju Xavier","doi":"10.52783/cienceng.v11i1.303","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.303","url":null,"abstract":"Mass Media, especially print media since its inception, if we look back, during Industrial Revolution and its concomitant Mass Production, has always been dwindled in between two binary epithets: Political Allegiance and Media Democracy. The duality lies in the fact that when the media has to work at the behest of political parties, ruling parties at the helm of body politique of the state, for its survival and sustenance, of course the other epithet which is ‘Media democracy’ or democratic rights of the media is questionable. However, the compulsion to show political allegiance to the ruling party at the governance is never accepted by the media without resistance and therefore any attempt of imposing censorship on media has been vehemently protested. Examples can be multiplied by drawing instances from history. Political censorship in Indian Media has never been such a recurrent phenomenon as it has become in the recent past. Also, ‘political allegiance’ when turned to propaganda tactics is more vulnerable than that of securing unflinching faith in the government. The number of defamation cases clamped against media houses, reporters and photo journalists have gone up from 13 to 167 as per a recent survey made by an independent journalist. This research study explores the fact that digital propaganda and political allegiance has been used by the ruling government to ensure a mass consensus over a number of socio-political issues, starting from Farmers’ Bill to Abrogation of Article 370 of Indian Constitution or for that matter Warfare Propaganda. The methodology that is used for this study is content analysis of media representation of information and speech analysis of PM Narendra Modi using a unique coding method. The samples are chosen on the basis of how media has represented announcement of different developmental schemes by the Modi Government and what they represent in reality. Most of the news reports that are analysed in this study between 2016-2022 are sourced from different newspapers and internet sources.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Aspergillus Fumigatus using Molecular Techniques 烟曲霉的分子鉴定
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.222
M. Banu
Plant pathogenic fungi belong to the Kingdom Fungi comprising of over 100,000 registered species grouped into about 4,300 genera. Many of these fungi infect a variety of cereals particularly stored condition. A study was conducted to evaluate the occurrence of Plant pathogenic fungi associated with stored Sorghum vulgare grains. The fungal was subjected to the fungal load for exact identification using the molecular biology technique. The fungal isolates were isolated from the collected grains. Results revealed that Genus Aspergillus fumigatus was the most frequent isolate which are known to produce Aflatoxins. A combination of many different isolates was present on the grains. The molecular identification method using Polymerase Chain Reaction (PCR) helped in the identification of fungi at the species level with precision and in the least possible time. In conclusion, the isolated species were identified morphologically as Aspergillus fumigatus. The fungal samples were then identified through molecular techniques by DNA sequencing which was identified as Aspergillus fumigatus. The molecular techniques used in this study, has added great benefits to the process of distinguishing between similar species of fungi in comparison with the classical techniques. Furthermore, there is a need for having a National Level, Germplasm collection centre and detailed database of all the naturally occurring post-harvest Plant pathogenic fungi for easy intervention and timely overcoming of situations in case of any emergency.
植物病原真菌属于真菌界,由超过100,000个已登记的物种组成,分为约4,300个属。这些真菌中的许多感染各种谷物,特别是储存条件。对贮藏高粱籽粒相关植物病原真菌的发生情况进行了研究。利用分子生物学技术对该真菌进行了真菌负荷鉴定。真菌分离株是从采集的稻谷中分离得到的。结果表明,烟曲霉属是已知产生黄曲霉毒素的最常见的分离物。许多不同菌株的组合出现在谷物上。采用聚合酶链反应(PCR)的分子鉴定方法可以在最短的时间内准确地在种水平上对真菌进行鉴定。经形态学鉴定,分离种为烟曲霉。通过分子技术对真菌样品进行DNA测序鉴定,鉴定为烟曲霉。在本研究中使用的分子技术,与传统技术相比,在区分相似真菌物种的过程中增加了很大的好处。此外,有必要建立一个国家一级的种质收集中心和所有自然发生的收获后植物致病真菌的详细数据库,以便在发生紧急情况时易于干预和及时克服情况。
{"title":"Identification of Aspergillus Fumigatus using Molecular Techniques","authors":"M. Banu","doi":"10.52783/cienceng.v11i1.222","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.222","url":null,"abstract":"Plant pathogenic fungi belong to the Kingdom Fungi comprising of over 100,000 registered species grouped into about 4,300 genera. Many of these fungi infect a variety of cereals particularly stored condition. A study was conducted to evaluate the occurrence of Plant pathogenic fungi associated with stored Sorghum vulgare grains. The fungal was subjected to the fungal load for exact identification using the molecular biology technique. The fungal isolates were isolated from the collected grains. Results revealed that Genus Aspergillus fumigatus was the most frequent isolate which are known to produce Aflatoxins. A combination of many different isolates was present on the grains. The molecular identification method using Polymerase Chain Reaction (PCR) helped in the identification of fungi at the species level with precision and in the least possible time. In conclusion, the isolated species were identified morphologically as Aspergillus fumigatus. The fungal samples were then identified through molecular techniques by DNA sequencing which was identified as Aspergillus fumigatus. The molecular techniques used in this study, has added great benefits to the process of distinguishing between similar species of fungi in comparison with the classical techniques. Furthermore, there is a need for having a National Level, Germplasm collection centre and detailed database of all the naturally occurring post-harvest Plant pathogenic fungi for easy intervention and timely overcoming of situations in case of any emergency.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120959990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Symmetric Convergent Encryption for Secured Data Deduplication in Cloud 云环境下安全重复数据删除的增强对称收敛加密
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.176
Dr. G. V. Uma
Cloud storage is a virtual setting that includes an amazing amount of processing power. The resources are in a state where they can serve users. Cloud data centres are the locations where all of this computing is maintained. In order to produce high-performance computing, the data centre houses a sizable number of powerful computers and servers connected to one another. The physical computer resources housed in the cloud data centre are accessible to the user via virtualization. To provide a convergent encryption method that will enhance data security while reducing deduplication's impact on security, encryption, and decryption times.  Convergent encryption is used to prevent duplicating data, but the key used to encrypt data for the first time is kept up to date and distributed to all users who have same or closely related content of data to upload to the cloud storage. In an open cloud environment, it's crucial to distribute the key to all users. When using cloud storage services, users encountered numerous issues.  
云存储是一种虚拟设置,其中包含惊人的处理能力。资源处于可以为用户服务的状态。云数据中心是维护所有这些计算的位置。为了产生高性能计算,数据中心容纳了相当数量的功能强大的计算机和服务器,这些计算机和服务器相互连接。用户可以通过虚拟化访问云数据中心中的物理计算机资源。提供融合加密方式,在降低重复数据删除对安全性和加解密次数影响的同时,提高数据安全性。采用融合加密防止数据重复,但首次加密数据时使用的密钥保持最新,并分发给所有具有相同或密切相关数据内容的用户上传到云存储。在开放的云环境中,向所有用户分发密钥是至关重要的。在使用云存储服务时,用户遇到了许多问题。
{"title":"Enhanced Symmetric Convergent Encryption for Secured Data Deduplication in Cloud","authors":"Dr. G. V. Uma","doi":"10.52783/cienceng.v11i1.176","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.176","url":null,"abstract":"Cloud storage is a virtual setting that includes an amazing amount of processing power. The resources are in a state where they can serve users. Cloud data centres are the locations where all of this computing is maintained. In order to produce high-performance computing, the data centre houses a sizable number of powerful computers and servers connected to one another. The physical computer resources housed in the cloud data centre are accessible to the user via virtualization. To provide a convergent encryption method that will enhance data security while reducing deduplication's impact on security, encryption, and decryption times.  Convergent encryption is used to prevent duplicating data, but the key used to encrypt data for the first time is kept up to date and distributed to all users who have same or closely related content of data to upload to the cloud storage. In an open cloud environment, it's crucial to distribute the key to all users. When using cloud storage services, users encountered numerous issues.  ","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116772031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Irrigation and Crop Health Prediction 智能灌溉与作物健康预测
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.314
Md Owais Quadri, Mahmood farmaan, Md Anas, Praveen Ku Reshma Ghani
The scarcity of clean water resources around the globe has generated a need for their optimum utilization Internet of Things (IoT) solutions, based on the application specific sensors’ data acquisition and intelligent processing are bridging the gaps between the cyber and physical world. IoT based smart irrigation systems can help in achieving optimum water-resource utilization in the precision farming landscape. This paper presents an open-source technology based smart system to predict the irrigation requirements of a field using the sensing of ground parameter like soil moisture soil temperature, and environmental conditions along with the weather forecast data from the Internet. The intelligence of the proposed system is based on a smart algorithm, which considers sensed data along with the weather forecast parameters like precipitation, air temperature, humidity, and UV for the near future. The complete system has been developed and deployed on a pilot scale, where the sensor node data is wirelessly collected over the cloud using web-services and a web-based information visualization and decision support system provides the real-time information-insights based on the analysis of sensors data and weather forecast data. The paper describes the system and discusses in detail the information processing results of three weeks data based on the proposed algorithm. The system is fully functional and the prediction results are very encouraging.
全球清洁水资源的稀缺已经产生了对其最佳利用的需求,基于特定应用传感器的数据采集和智能处理的物联网(IoT)解决方案正在弥合网络和物理世界之间的差距。基于物联网的智能灌溉系统可以帮助实现精准农业景观中水资源的最佳利用。本文提出了一种基于开源技术的智能系统,该系统通过对土壤湿度、土壤温度、环境条件等地面参数的感知以及来自互联网的天气预报数据来预测农田的灌溉需求。该系统的智能是基于一种智能算法,该算法将感知到的数据与近期的降水、气温、湿度、紫外线等天气预报参数一起考虑。完整的系统已经开发并部署在试点规模,其中传感器节点数据通过网络服务在云端无线收集,基于网络的信息可视化和决策支持系统提供基于传感器数据和天气预报数据分析的实时信息洞察。本文介绍了该系统,并详细讨论了基于该算法的三周数据信息处理结果。系统功能齐全,预测结果令人鼓舞。
{"title":"Smart Irrigation and Crop Health Prediction","authors":"Md Owais Quadri, Mahmood farmaan, Md Anas, Praveen Ku Reshma Ghani","doi":"10.52783/cienceng.v11i1.314","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.314","url":null,"abstract":"The scarcity of clean water resources around the globe has generated a need for their optimum utilization Internet of Things (IoT) solutions, based on the application specific sensors’ data acquisition and intelligent processing are bridging the gaps between the cyber and physical world. IoT based smart irrigation systems can help in achieving optimum water-resource utilization in the precision farming landscape. This paper presents an open-source technology based smart system to predict the irrigation requirements of a field using the sensing of ground parameter like soil moisture soil temperature, and environmental conditions along with the weather forecast data from the Internet. The intelligence of the proposed system is based on a smart algorithm, which considers sensed data along with the weather forecast parameters like precipitation, air temperature, humidity, and UV for the near future. The complete system has been developed and deployed on a pilot scale, where the sensor node data is wirelessly collected over the cloud using web-services and a web-based information visualization and decision support system provides the real-time information-insights based on the analysis of sensors data and weather forecast data. The paper describes the system and discusses in detail the information processing results of three weeks data based on the proposed algorithm. The system is fully functional and the prediction results are very encouraging.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122751900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms 使用机器学习算法检测网络攻击和网络攻击
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.120
Rohit Khedkar et al.
Now a days cyber crime growing and has a big effect everywhere globally. ethical hackers are normally involved in identifying flaws and recommending mitigation measures. the cyber safety international, there's a pressing need for the improvement of powerful techniques. Because of the effectiveness of machine learning in cyber security issues, machine learning for cyber security has recently become a hot topic. In cyber security, machine learning approaches have been utilized to handle important concerns such as intrusion detection, malware classification and detection, spam detection, and phishing detection. Although ML cannot fully automate a cyber-security system, it can identify cyber-security threats more efficiently than other software-oriented approaches, relieving security analysts of their burden. As a result, effective adaptive methods, such as machine learning techniques, can yield higher detection rates, lower false alarm rates, and cheaper computing and transmission costs. Our key goal is that the challenge of detecting attacks is fundamentally different from those of these other applications, making it substantially more difficult for the intrusion detection community to apply machine learning effectively. In this study, the CPS is modeled as a network of agents that move in unison with one another, with one agent acting as a leader and commanding the other agents. The proposed strategy in this study is to employ the structure of deep neural networks for the detection phase, which should tell the system of the attack's existence in the early stages of the attack. The use of robust control algorithms in the network to isolate the misbehaving agent in the leader-follower mechanism has been researched. Following the attack detection phase with a deep neural network, the control system uses the reputation algorithm to isolate the misbehaving agent in the presented control method. Experiment results show that deep learning algorithms can detect attacks more effectively than traditional methods, making cyber security simpler, more proactive, and less expensive and more expensive.
如今,网络犯罪日益增长,并在全球各地产生了巨大影响。道德黑客通常参与识别漏洞并建议缓解措施。国际上的网络安全,迫切需要改进强大的技术。由于机器学习在网络安全问题上的有效性,机器学习用于网络安全最近成为一个热门话题。在网络安全领域,机器学习方法已被用于处理入侵检测、恶意软件分类和检测、垃圾邮件检测和网络钓鱼检测等重要问题。虽然机器学习不能完全自动化网络安全系统,但它可以比其他面向软件的方法更有效地识别网络安全威胁,减轻安全分析师的负担。因此,有效的自适应方法,如机器学习技术,可以产生更高的检测率,更低的误报率,更便宜的计算和传输成本。我们的主要目标是,检测攻击的挑战与这些其他应用的挑战有着根本的不同,这使得入侵检测社区有效地应用机器学习变得更加困难。在这项研究中,CPS被建模为一个相互一致移动的代理网络,其中一个代理充当领导者并指挥其他代理。本研究提出的策略是在检测阶段采用深度神经网络的结构,该结构应该在攻击的早期阶段告诉系统攻击的存在。研究了在网络中使用鲁棒控制算法来隔离leader-follower机制中行为不端的agent。在深度神经网络攻击检测阶段之后,控制系统使用信誉算法隔离行为不端的智能体。实验结果表明,深度学习算法可以比传统方法更有效地检测攻击,使网络安全更简单,更主动,成本更低,成本更高。
{"title":"Detection of Cyber Attacks and Network Attacks Using Machine Learning Algorithms","authors":"Rohit Khedkar et al.","doi":"10.52783/cienceng.v11i1.120","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.120","url":null,"abstract":"Now a days cyber crime growing and has a big effect everywhere globally. ethical hackers are normally involved in identifying flaws and recommending mitigation measures. the cyber safety international, there's a pressing need for the improvement of powerful techniques. Because of the effectiveness of machine learning in cyber security issues, machine learning for cyber security has recently become a hot topic. In cyber security, machine learning approaches have been utilized to handle important concerns such as intrusion detection, malware classification and detection, spam detection, and phishing detection. Although ML cannot fully automate a cyber-security system, it can identify cyber-security threats more efficiently than other software-oriented approaches, relieving security analysts of their burden. As a result, effective adaptive methods, such as machine learning techniques, can yield higher detection rates, lower false alarm rates, and cheaper computing and transmission costs. Our key goal is that the challenge of detecting attacks is fundamentally different from those of these other applications, making it substantially more difficult for the intrusion detection community to apply machine learning effectively. In this study, the CPS is modeled as a network of agents that move in unison with one another, with one agent acting as a leader and commanding the other agents. The proposed strategy in this study is to employ the structure of deep neural networks for the detection phase, which should tell the system of the attack's existence in the early stages of the attack. The use of robust control algorithms in the network to isolate the misbehaving agent in the leader-follower mechanism has been researched. Following the attack detection phase with a deep neural network, the control system uses the reputation algorithm to isolate the misbehaving agent in the presented control method. Experiment results show that deep learning algorithms can detect attacks more effectively than traditional methods, making cyber security simpler, more proactive, and less expensive and more expensive.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121853704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brain Tumor Detection Using Block Chain 基于区块链的脑肿瘤检测
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.128
Prof. Ganga Yadawad, Yash Zope, Niraj Ohol, Tejas
Brain tumor can be divided into two types: benign and malignant. Brain tumors are the most common and aggressive disease, which in its highest stage leads to a very short life expectancy. Thus, treatment planning is a key phase for improving patients' quality of life. However, it has some limitations (i.e., accurate quantitative measurements are provided for a limited number of frames). A reliable and automatic classification system is therefore necessary to prevent human mortality. Block chain technology is an emerging field of science that plays a major role in every application field of science, including education, banking, and healthcare. . In healthcare, most health problems arise due to their neglect of correct diagnosis by the doctor and ignorance of the symptom by the patients. The most common disease today is called cancer. A brain tumor usually has symptoms such as frequent headaches, unexplained nausea or vomiting. Sometimes he may also have blurred vision, double vision and sometimes loss of peripheral vision. In this project we will diagnose tumor using Blockchain strategy.
脑肿瘤可分为良性和恶性两种。脑肿瘤是最常见和最具侵袭性的疾病,其最高阶段导致的预期寿命非常短。因此,治疗计划是提高患者生活质量的关键阶段。然而,它有一些局限性(即,为有限数量的帧提供精确的定量测量)。因此,一个可靠的自动分类系统对于防止人类死亡是必要的。区块链技术是一门新兴的科学领域,在教育、银行、医疗等各个科学应用领域都发挥着重要作用。在医疗保健中,大多数健康问题是由于医生忽视正确诊断和患者对症状的无知而产生的。今天最常见的疾病叫做癌症。脑瘤通常有经常头痛、无法解释的恶心或呕吐等症状。有时还会出现视力模糊、重影,有时还会出现周边视力丧失。在这个项目中,我们将使用区块链策略诊断肿瘤。
{"title":"Brain Tumor Detection Using Block Chain","authors":"Prof. Ganga Yadawad, Yash Zope, Niraj Ohol, Tejas ","doi":"10.52783/cienceng.v11i1.128","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.128","url":null,"abstract":"Brain tumor can be divided into two types: benign and malignant. Brain tumors are the most common and aggressive disease, which in its highest stage leads to a very short life expectancy. Thus, treatment planning is a key phase for improving patients' quality of life. However, it has some limitations (i.e., accurate quantitative measurements are provided for a limited number of frames). A reliable and automatic classification system is therefore necessary to prevent human mortality. Block chain technology is an emerging field of science that plays a major role in every application field of science, including education, banking, and healthcare. . In healthcare, most health problems arise due to their neglect of correct diagnosis by the doctor and ignorance of the symptom by the patients. The most common disease today is called cancer. A brain tumor usually has symptoms such as frequent headaches, unexplained nausea or vomiting. Sometimes he may also have blurred vision, double vision and sometimes loss of peripheral vision. In this project we will diagnose tumor using Blockchain strategy.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128040015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Non- Store Retailing in Indian Economy 非商店零售业对印度经济的影响
Pub Date : 2023-02-18 DOI: 10.52783/cienceng.v11i1.278
Dr. Sweta Rani
Non-store retailing is the selling of goods and services without ever establishing a physical store, as opposed to the traditional way – the very foundation of retail. In an ever-changing market of globalization era, where need for better efficiency is crucial, non-store retailing is patronized to time conscious consumers or compulsive buyers. Non-store retailing, that includes e-commerce, direct selling, telemarketing, etc., has evolved throughout the years and continues to offer consumers the convenience of buying 24 hours a day, 7 days a week and delivery at the location and time of their choice. Taking a leap in popularity in the pandemic era, the mere expectation that it will grow at a staggering rate over the next few years is no rocket science either. Although here the potential customer base can be limitless, it’s not devoid of its own demerits and negative aspects, of which unhealthy competition leading to customers having to pay twice-thrice the money they should pay, is the biggest. This study aims to thoroughly go through both the positive and negative aspects of non-store retailing, to seek out and strike a balance between store based retailing and non-store retailing, so that both continue to develop, evolve and thrive in a healthy manner and contribute to the nation’s GDP and towards customer satisfaction as well as retention.
非实体零售是指在没有实体店的情况下销售商品和服务,与传统的零售方式相反——这是零售的基础。在全球化时代瞬息万变的市场中,对更高效率的需求至关重要,非商店零售被时间意识强的消费者或强迫性购买者光顾。非实体零售,包括电子商务、直销、电话营销等,多年来不断发展,并继续为消费者提供每周7天、每天24小时购物的便利,并在他们选择的地点和时间送货。在大流行时期,仅仅期望它在未来几年以惊人的速度增长,也不是什么火箭科学。虽然这里的潜在客户基础是无限的,但它也有自己的缺点和负面因素,其中最大的问题是不健康的竞争导致客户不得不支付他们应该支付的两倍至三倍的钱。本研究旨在全面探讨非实体零售的积极和消极方面,寻求并在实体零售和非实体零售之间取得平衡,使两者继续健康发展,发展和繁荣,为国家的GDP做出贡献,并提高客户满意度和保留率。
{"title":"Impact of Non- Store Retailing in Indian Economy","authors":"Dr. Sweta Rani","doi":"10.52783/cienceng.v11i1.278","DOIUrl":"https://doi.org/10.52783/cienceng.v11i1.278","url":null,"abstract":"Non-store retailing is the selling of goods and services without ever establishing a physical store, as opposed to the traditional way – the very foundation of retail. In an ever-changing market of globalization era, where need for better efficiency is crucial, non-store retailing is patronized to time conscious consumers or compulsive buyers. Non-store retailing, that includes e-commerce, direct selling, telemarketing, etc., has evolved throughout the years and continues to offer consumers the convenience of buying 24 hours a day, 7 days a week and delivery at the location and time of their choice. Taking a leap in popularity in the pandemic era, the mere expectation that it will grow at a staggering rate over the next few years is no rocket science either. Although here the potential customer base can be limitless, it’s not devoid of its own demerits and negative aspects, of which unhealthy competition leading to customers having to pay twice-thrice the money they should pay, is the biggest. This study aims to thoroughly go through both the positive and negative aspects of non-store retailing, to seek out and strike a balance between store based retailing and non-store retailing, so that both continue to develop, evolve and thrive in a healthy manner and contribute to the nation’s GDP and towards customer satisfaction as well as retention.","PeriodicalId":214525,"journal":{"name":"Proceeding International Conference on Science and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133435937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceeding International Conference on Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1