Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728373
D. Vinutha, G. Raju
Hadoop is an open source implementation of MapReduce. Performance of Hadoop is affected by the overhead of communication during the transmission of large datasets to the computing node. In a heterogeneous cluster if a map task wants to process the data, which is not present in the local disk then the data transmission overhead occurs. To overcome this issue, Data Prefetching for Heterogeneous Hadoop cluster for resource optimization is proposed. data prefetching is used to fetch the input data in advance from the remote node to a particular computing node. Hence transmission of data occurs in parallel with data processing and the job execution time is reduced. Different MapReduce jobs are used to conduct the experiment. The results demonstrate that the time taken to transmit the data is reduced. The job execution time is reduced by 15% for the input data size greater than or equal to 2GB and performance improvement of 25% is obtained for 64MB block size.
{"title":"Data Prefetching for Heterogeneous Hadoop Cluster","authors":"D. Vinutha, G. Raju","doi":"10.1109/ICACCS.2019.8728373","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728373","url":null,"abstract":"Hadoop is an open source implementation of MapReduce. Performance of Hadoop is affected by the overhead of communication during the transmission of large datasets to the computing node. In a heterogeneous cluster if a map task wants to process the data, which is not present in the local disk then the data transmission overhead occurs. To overcome this issue, Data Prefetching for Heterogeneous Hadoop cluster for resource optimization is proposed. data prefetching is used to fetch the input data in advance from the remote node to a particular computing node. Hence transmission of data occurs in parallel with data processing and the job execution time is reduced. Different MapReduce jobs are used to conduct the experiment. The results demonstrate that the time taken to transmit the data is reduced. The job execution time is reduced by 15% for the input data size greater than or equal to 2GB and performance improvement of 25% is obtained for 64MB block size.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127242321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728432
Yamuna Aarthi, B. Karthikeyan, N. Raj, M. Ganesan
Photoplethysmograph (PPG) is low cost, portable and simple optical technique used to monitor cardiovascular related parameters such as heart rate, blood pressure, cardiac output, oxygen saturation of blood, respiratory rate and many such parameters. In recent times, PPG has gained popularity due to its ease of measuring from the user’s fingertips and its wearable nature. The measurements are taken preferably on the fingertips of the skin surface which has maximum nerve endings. In this paper, the PPG signal is obtained from the human subjects with the data acquisition system using Arduino board and Maxim Integrated sensor. Then signal processing is performed for removing baseline wander, motion artifacts and filtering of the signal for peak detection using the algorithm developed in MATLAB. The heart rate is calculated for 5 subjects using the maxim sensor kept on the finger tip. The capnobase database of various subjects of different ages is obtained for estimation of Heart Rate Variability and Signal to Noise Ratio. The peak detection algorithm shows maximum accuracy which is validated with capnobase labels.
{"title":"Fingertip Based Estimation Of Heart Rate Using Photoplethysmography","authors":"Yamuna Aarthi, B. Karthikeyan, N. Raj, M. Ganesan","doi":"10.1109/ICACCS.2019.8728432","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728432","url":null,"abstract":"Photoplethysmograph (PPG) is low cost, portable and simple optical technique used to monitor cardiovascular related parameters such as heart rate, blood pressure, cardiac output, oxygen saturation of blood, respiratory rate and many such parameters. In recent times, PPG has gained popularity due to its ease of measuring from the user’s fingertips and its wearable nature. The measurements are taken preferably on the fingertips of the skin surface which has maximum nerve endings. In this paper, the PPG signal is obtained from the human subjects with the data acquisition system using Arduino board and Maxim Integrated sensor. Then signal processing is performed for removing baseline wander, motion artifacts and filtering of the signal for peak detection using the algorithm developed in MATLAB. The heart rate is calculated for 5 subjects using the maxim sensor kept on the finger tip. The capnobase database of various subjects of different ages is obtained for estimation of Heart Rate Variability and Signal to Noise Ratio. The peak detection algorithm shows maximum accuracy which is validated with capnobase labels.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728401
Kanishk Agarwal, M. Gupta, Khushboo Gupta, Arshad Khan, M. Nallakaruppan
We are suggesting a blood transfusion system based on various data mining algorithms. We have applied and compared various algorithms such as Decision tree, Random forest and logistic regression, before and after applying GRA. The algorithm with most efficiency will be used to develop a system for predicting the nature of a blood donor, based on past data of donation. The prediction will be useful at various blood donation camps for contacting the donors, in case of a requirement.
{"title":"Blood Transfusion System Using Data Mining Techniques and GRA","authors":"Kanishk Agarwal, M. Gupta, Khushboo Gupta, Arshad Khan, M. Nallakaruppan","doi":"10.1109/ICACCS.2019.8728401","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728401","url":null,"abstract":"We are suggesting a blood transfusion system based on various data mining algorithms. We have applied and compared various algorithms such as Decision tree, Random forest and logistic regression, before and after applying GRA. The algorithm with most efficiency will be used to develop a system for predicting the nature of a blood donor, based on past data of donation. The prediction will be useful at various blood donation camps for contacting the donors, in case of a requirement.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132519274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728488
Akash Awasthi, A. Vamsi, Vibhuti Duggal, P. Deepalakshmi, S. Rao
The location of the source in case of radiotherapy is an important aspect because it directly affects the target medium. There are mainly two types of radio therapies namely external radiotherapy and brachytherapy. For our study, we are considering the external radiotherapy in which the source is located at some distance from the target body. Source produces the radiation which may be photon beam or electron radiation. In this study, we are assuming photons which do not interact with each other but interacts with materials particles unless and until magnetic field is present. This radiation destroys the tumorous tissues present in the target body. But during this process, lot of care should be taken so that the healthy tissue should not get damaged. In Radiotherapy Source Localization System (RSLS), dose distribution on the patient’s body is known and it needs to calculate the distance between each point of the target and source. So, hereby, we are proposing an algorithm for CPU/GPU to calculate correct position of the source using inverse Linear Boltzmann Transport Equation (LBTE). It can also be used as a radiation protection programme for removal of unwanted resources.
{"title":"3D Visualization and Localization of Radiation Source in External Radiotherapy Using Inverse linear Boltzmann Transport Equation","authors":"Akash Awasthi, A. Vamsi, Vibhuti Duggal, P. Deepalakshmi, S. Rao","doi":"10.1109/ICACCS.2019.8728488","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728488","url":null,"abstract":"The location of the source in case of radiotherapy is an important aspect because it directly affects the target medium. There are mainly two types of radio therapies namely external radiotherapy and brachytherapy. For our study, we are considering the external radiotherapy in which the source is located at some distance from the target body. Source produces the radiation which may be photon beam or electron radiation. In this study, we are assuming photons which do not interact with each other but interacts with materials particles unless and until magnetic field is present. This radiation destroys the tumorous tissues present in the target body. But during this process, lot of care should be taken so that the healthy tissue should not get damaged. In Radiotherapy Source Localization System (RSLS), dose distribution on the patient’s body is known and it needs to calculate the distance between each point of the target and source. So, hereby, we are proposing an algorithm for CPU/GPU to calculate correct position of the source using inverse Linear Boltzmann Transport Equation (LBTE). It can also be used as a radiation protection programme for removal of unwanted resources.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132071001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
After shopping products in supermarkets, at the time of billing, we have to wait in long queues for quite a long time, which is very hectic and tiresome task, hence we have thought of creating a shopping basket that eases the problem mentioned above and hence increases the efficiency of management in supermarkets. Now-a-days, electronics and commerce goes hand in hand, hence, this product will help in increasing the efficient use of time and assets of company as well as consumers. A modern, futuristic product is the one that is the good in comforting, convenient and efficient in everyday life. Basic idea that made us think of making this product is to ease the shopping experience, and make it even relaxing rather than thinking of waiting in long queues and have a headache. The main goal is to provide a technology oriented, easily possible and useful system for efficient shopping for a person.
{"title":"Automatic Shopping Basket Technobask","authors":"D. Thote, Sailee Parsewar, Arushi Welekar, Naved Sheikh, Rachita Dhakate, Rukhsar Sheikh","doi":"10.1109/ICACCS.2019.8728309","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728309","url":null,"abstract":"After shopping products in supermarkets, at the time of billing, we have to wait in long queues for quite a long time, which is very hectic and tiresome task, hence we have thought of creating a shopping basket that eases the problem mentioned above and hence increases the efficiency of management in supermarkets. Now-a-days, electronics and commerce goes hand in hand, hence, this product will help in increasing the efficient use of time and assets of company as well as consumers. A modern, futuristic product is the one that is the good in comforting, convenient and efficient in everyday life. Basic idea that made us think of making this product is to ease the shopping experience, and make it even relaxing rather than thinking of waiting in long queues and have a headache. The main goal is to provide a technology oriented, easily possible and useful system for efficient shopping for a person.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130889710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728421
B. Sathish, P. Ganesan, L. Bharathi, V. Suryanarayana, A. Ranganayakulu
A wireless sensor system be projected to examine construction headed for appraise shaking smash up, the sensor preterit exploit routine built-up capacitive micro electro mechanical structure strain and 3D acceleration feeler and a low power state formally claim precise microcircuit designed for exciting battery life span up and about to 12 years. The strain sensors escalate at the base of the structure to subsist the arrangement unite plastic midpoint opening of the construction while an earthquake happens. They live sporadically or on stipulate preliminary the base station. The accelerometers square measure mounted at each floor of the formation to live the unstable response of the building throughout associate degree earthquake.
{"title":"Advanced Design of Wireless Communication Network for Building Monitoring","authors":"B. Sathish, P. Ganesan, L. Bharathi, V. Suryanarayana, A. Ranganayakulu","doi":"10.1109/ICACCS.2019.8728421","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728421","url":null,"abstract":"A wireless sensor system be projected to examine construction headed for appraise shaking smash up, the sensor preterit exploit routine built-up capacitive micro electro mechanical structure strain and 3D acceleration feeler and a low power state formally claim precise microcircuit designed for exciting battery life span up and about to 12 years. The strain sensors escalate at the base of the structure to subsist the arrangement unite plastic midpoint opening of the construction while an earthquake happens. They live sporadically or on stipulate preliminary the base station. The accelerometers square measure mounted at each floor of the formation to live the unstable response of the building throughout associate degree earthquake.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130985626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728321
Junaid Ali Reshi, R. Ali
With the intrusion of social media into personal, social and political space of today’s world, the iniquities associated with it have also found a place to thrive. One such malevolent act is the spread of rumors through social networks. This survey analyses the various domains where social media finds its relevance and has a considerable impact. It also explores various studies done on the nature of rumors, the characteristics of rumors and the studies identifying the important features for the social media-based rumors. Further, the latest developments in the field of rumor detection through the approaches of Machine learning and Deep learning have also been discussed.
{"title":"Rumor proliferation and detection in Social Media: A Review","authors":"Junaid Ali Reshi, R. Ali","doi":"10.1109/ICACCS.2019.8728321","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728321","url":null,"abstract":"With the intrusion of social media into personal, social and political space of today’s world, the iniquities associated with it have also found a place to thrive. One such malevolent act is the spread of rumors through social networks. This survey analyses the various domains where social media finds its relevance and has a considerable impact. It also explores various studies done on the nature of rumors, the characteristics of rumors and the studies identifying the important features for the social media-based rumors. Further, the latest developments in the field of rumor detection through the approaches of Machine learning and Deep learning have also been discussed.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126709167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728323
Vishnu Vardhanaan.S, S. M., A. J
Due to conflicting objective of the stake holders, the privacy of the user in the Internet is difficult to achieve. There are some laws in privacy which are implemented by several national governments. The data usage of Internet is still gathered by ISP’s, even with data breaches risks. Data breaches are very harmful since it affects several well-developed organizations and its impact is more on future. In this, Users availing anonymous services such as Tor who were stooping the users with P2P network are rare to identify. However, there are also negative sides of Tor that its legitimate user are viewed suspiciously by the law governing authorities due to use of services by criminals in negative aspects. This paper delivers, A protocol with internet access is introduced to compromise the conflicting stake holders’ objectives for user anonymity. The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility. The methods and approach used in our projected protocol were: (i) Onion Routing Protocol, which is used for disguising web user’s identity, (ii) An Authentic Computation, which creates a common communication between ISP and User keeping those information’s private. (iii) Digital Certification of Licenses, which ensures that the anonymous status is provided for users only by the authorised web content providers and spoofing of service providers for licensing to provide anonymous status can’t be done.
{"title":"Web Surfing in Anonymity Status","authors":"Vishnu Vardhanaan.S, S. M., A. J","doi":"10.1109/ICACCS.2019.8728323","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728323","url":null,"abstract":"Due to conflicting objective of the stake holders, the privacy of the user in the Internet is difficult to achieve. There are some laws in privacy which are implemented by several national governments. The data usage of Internet is still gathered by ISP’s, even with data breaches risks. Data breaches are very harmful since it affects several well-developed organizations and its impact is more on future. In this, Users availing anonymous services such as Tor who were stooping the users with P2P network are rare to identify. However, there are also negative sides of Tor that its legitimate user are viewed suspiciously by the law governing authorities due to use of services by criminals in negative aspects. This paper delivers, A protocol with internet access is introduced to compromise the conflicting stake holders’ objectives for user anonymity. The protocol in the paper allows the analysis of web data usage only by the interested parties (i.e. ISP) and the criminal abuses are greatly reduced and also supports the law enforcement by providing flexibility. The methods and approach used in our projected protocol were: (i) Onion Routing Protocol, which is used for disguising web user’s identity, (ii) An Authentic Computation, which creates a common communication between ISP and User keeping those information’s private. (iii) Digital Certification of Licenses, which ensures that the anonymous status is provided for users only by the authorised web content providers and spoofing of service providers for licensing to provide anonymous status can’t be done.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116149211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728466
E. Jose, Greeshma M., M. T. P., S. M. H.
Surveillance systems, in spite of the recent advances, still poses many challenges, especially in the field of patrolling or tracking of subjects through CCTV footage or any other portable drone mechanisms. Real time monitoring of public places for possible suspects are still made through manual observations in many places. The manual labour involved and the human errors that can occur makes the system less efficient. Many research attempts were made for designing foolproof systems and still going on, understanding the importance of the problem. This paper presents the implementation of an intelligent multicamera Face Recognition based surveillance system using FaceNet and MTCNN algorithm on Jetson TX2. The proposed portable system tracks the subject or the suspect with the camera ID/location together with the timestamp and logs his presence in the database, using multiple camera installation.
{"title":"Face Recognition based Surveillance System Using FaceNet and MTCNN on Jetson TX2","authors":"E. Jose, Greeshma M., M. T. P., S. M. H.","doi":"10.1109/ICACCS.2019.8728466","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728466","url":null,"abstract":"Surveillance systems, in spite of the recent advances, still poses many challenges, especially in the field of patrolling or tracking of subjects through CCTV footage or any other portable drone mechanisms. Real time monitoring of public places for possible suspects are still made through manual observations in many places. The manual labour involved and the human errors that can occur makes the system less efficient. Many research attempts were made for designing foolproof systems and still going on, understanding the importance of the problem. This paper presents the implementation of an intelligent multicamera Face Recognition based surveillance system using FaceNet and MTCNN algorithm on Jetson TX2. The proposed portable system tracks the subject or the suspect with the camera ID/location together with the timestamp and logs his presence in the database, using multiple camera installation.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125116546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-03-01DOI: 10.1109/ICACCS.2019.8728378
Vijay Banerjee, Jui Telavane, Pooja R. Gaikwad, P. Vartak
Innovation is developing quickly today. This headways in innovation has changed how individuals cooperate in an expansive way giving communication another dimension. But despite the fact that innovation encourages us in numerous parts of life, it accompanies different effects that influence people in a few or the other way. Cyberbullying is one of such effects. Cyberbullying is a wrongdoing in which a culprit focuses on an individual with online provocation and loathe which has antagonistic emotional, social and physical effects on the victim. So as to address such issue we proposed a novel cyberbullying detection method dependent on deep neural network. Convolution Neural Network is utilized for the better outcomes when contrasted with the current systems.
{"title":"Detection of Cyberbullying Using Deep Neural Network","authors":"Vijay Banerjee, Jui Telavane, Pooja R. Gaikwad, P. Vartak","doi":"10.1109/ICACCS.2019.8728378","DOIUrl":"https://doi.org/10.1109/ICACCS.2019.8728378","url":null,"abstract":"Innovation is developing quickly today. This headways in innovation has changed how individuals cooperate in an expansive way giving communication another dimension. But despite the fact that innovation encourages us in numerous parts of life, it accompanies different effects that influence people in a few or the other way. Cyberbullying is one of such effects. Cyberbullying is a wrongdoing in which a culprit focuses on an individual with online provocation and loathe which has antagonistic emotional, social and physical effects on the victim. So as to address such issue we proposed a novel cyberbullying detection method dependent on deep neural network. Convolution Neural Network is utilized for the better outcomes when contrasted with the current systems.","PeriodicalId":249139,"journal":{"name":"2019 5th International Conference on Advanced Computing & Communication Systems (ICACCS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}