首页 > 最新文献

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
Skin Cancer Prediction Comparative Analysis using TL and NNs tln与神经网络预测皮肤癌的比较分析
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072302
A. Pandey, Amit Barve
The skin is the body’s outermost layer, concealing/covering numerous biological organs, muscles, and other innumerable body parts. The study found that the body’s exposure to ultraviolet radiation is the main contributor to skin cancer (UV). There are several layers to the skin, but the epidermis and dermis are where cancer first appears. Changes in your skin or the appearance of a mole in many locations on your body are the most common warning signs. The only way to prevent cancer is to stay as far away from UV rays as you can, which would stop your skin from coming into contact with the disease. According to statistics, cases of this cancer have not only increased but are increasing swiftly as a result of the ozone layer’s deterioration, which causes it to stop emitting dangerous light and, as a result, come into contact with our skin. For the following issue, numerous different strategies include machine learning, DL, and TL are being used. Naive Bayes, logistic regression, random forest, decision tree, artificial NN, and convolutional NN are just a few of the numerous techniques used. The study makes an effort to put both TL and DL techniques to use in order to provide a result that shows which performs better for the next challenge.
皮肤是身体的最外层,隐藏着许多生物器官、肌肉和其他无数的身体部位。研究发现,人体暴露在紫外线辐射下是皮肤癌(UV)的主要原因。皮肤有好几层,但表皮和真皮层是癌症最先出现的地方。皮肤的变化或身体许多部位出现痣是最常见的警告信号。预防癌症的唯一方法是尽可能远离紫外线,这将阻止你的皮肤接触到疾病。据统计,这种癌症的病例不仅增加了,而且还在迅速增加,这是由于臭氧层的恶化,导致它停止发出危险的光,结果,与我们的皮肤接触。对于以下问题,使用了许多不同的策略,包括机器学习、DL和TL。朴素贝叶斯,逻辑回归,随机森林,决策树,人工神经网络和卷积神经网络只是使用的众多技术中的一小部分。该研究努力将学习和深度学习技术结合起来使用,以便提供一个结果,显示哪一种技术在下一次挑战中表现更好。
{"title":"Skin Cancer Prediction Comparative Analysis using TL and NNs","authors":"A. Pandey, Amit Barve","doi":"10.1109/IC3I56241.2022.10072302","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072302","url":null,"abstract":"The skin is the body’s outermost layer, concealing/covering numerous biological organs, muscles, and other innumerable body parts. The study found that the body’s exposure to ultraviolet radiation is the main contributor to skin cancer (UV). There are several layers to the skin, but the epidermis and dermis are where cancer first appears. Changes in your skin or the appearance of a mole in many locations on your body are the most common warning signs. The only way to prevent cancer is to stay as far away from UV rays as you can, which would stop your skin from coming into contact with the disease. According to statistics, cases of this cancer have not only increased but are increasing swiftly as a result of the ozone layer’s deterioration, which causes it to stop emitting dangerous light and, as a result, come into contact with our skin. For the following issue, numerous different strategies include machine learning, DL, and TL are being used. Naive Bayes, logistic regression, random forest, decision tree, artificial NN, and convolutional NN are just a few of the numerous techniques used. The study makes an effort to put both TL and DL techniques to use in order to provide a result that shows which performs better for the next challenge.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114768266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on sink mobility-based routing algorithms in WSN proposed in the Year 2022 2022年提出的基于sink移动性的WSN路由算法综述
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072843
Supreet Kaur, Vinit Grewal
Through the Wireless Sensor Network (WSN), researchers have made every effort in advancing sensing technology worldwide. However, the essence of communication is deeply affected by the limited battery operating nature of sensor nodes. A lot of research efforts are reported that deal with this concern. Besides, the routing algorithms that tend to promise energy-efficient and optimized routing still fail to achieve optimized performance. Henceforth, sink mobility is one of the eminent solutions that tend to optimize the network through energy-saving routing strategies. In this paper, we have reviewed the sink mobility-based routing algorithms that are proposed for the Year 2022. We believe this review will help the readers to improvise the routing strategy by identifying the research gaps in the existing techniques.
通过无线传感器网络(WSN),研究人员为推动全球传感技术的发展做出了巨大努力。然而,传感器节点有限的电池工作性质深深影响了通信的本质。据报道,许多研究都在努力解决这一问题。此外,倾向于承诺节能和优化路由的路由算法仍然无法实现最优性能。因此,汇聚移动是通过节能路由策略优化网络的杰出解决方案之一。在本文中,我们回顾了2022年提出的基于sink移动性的路由算法。我们相信这篇综述将帮助读者通过识别现有技术中的研究差距来即兴制定路由策略。
{"title":"Review on sink mobility-based routing algorithms in WSN proposed in the Year 2022","authors":"Supreet Kaur, Vinit Grewal","doi":"10.1109/IC3I56241.2022.10072843","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072843","url":null,"abstract":"Through the Wireless Sensor Network (WSN), researchers have made every effort in advancing sensing technology worldwide. However, the essence of communication is deeply affected by the limited battery operating nature of sensor nodes. A lot of research efforts are reported that deal with this concern. Besides, the routing algorithms that tend to promise energy-efficient and optimized routing still fail to achieve optimized performance. Henceforth, sink mobility is one of the eminent solutions that tend to optimize the network through energy-saving routing strategies. In this paper, we have reviewed the sink mobility-based routing algorithms that are proposed for the Year 2022. We believe this review will help the readers to improvise the routing strategy by identifying the research gaps in the existing techniques.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115855251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Millimeter Wave Filter for 5G Applications 5G应用的毫米波滤波器
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072819
Pradosh Kumar Sharma, A. Rana, Smita Sharma, Manish Sharma, Mesay Mengstie, Annam Takshitha Rao
Bandpass filters, which only transmit frequencies that fall inside the transmission band and reject all other frequencies, are necessary for wireless communication systems. As 5G is set to be implemented, there will be a greater need for filters that operate in new frequency ranges. In 2022, the initial use is anticipated. The two key standards for filters that are used to build mobile applications are size and performance. With a repetition range of 26–28 GHz, the passband channel is designed in this proposal, simulated, and constructed. For downconversion of mmWave signals to microwave frequencies between 2 and 18 GHz, this channel can be employed as the front end of the apparatus. The size and efficiency of channels must be taken into account when planning new portable communications applications. Small, high-performance filters made by merging two components can be used in future mmWave applications like 5G. High-quality channels with minimal imprint are preferred for mmWave applications like 5G.
带通滤波器是无线通信系统所必需的,它只传输在传输频带内的频率,而拒绝所有其他频率。随着5G的实施,对在新频率范围内工作的滤波器的需求将会增加。预计将于2022年投入使用。用于构建移动应用程序的过滤器的两个关键标准是大小和性能。在26 ~ 28ghz的重复频率范围内,设计、仿真并构建了通道。对于毫米波信号的下变频到微波频率在2和18 GHz之间,该通道可以用作设备的前端。在规划新的便携式通信应用时,必须考虑信道的大小和效率。通过合并两个组件制成的小型高性能滤波器可用于未来的毫米波应用,如5G。对于5G等毫米波应用,具有最小印记的高质量通道是首选。
{"title":"A Millimeter Wave Filter for 5G Applications","authors":"Pradosh Kumar Sharma, A. Rana, Smita Sharma, Manish Sharma, Mesay Mengstie, Annam Takshitha Rao","doi":"10.1109/IC3I56241.2022.10072819","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072819","url":null,"abstract":"Bandpass filters, which only transmit frequencies that fall inside the transmission band and reject all other frequencies, are necessary for wireless communication systems. As 5G is set to be implemented, there will be a greater need for filters that operate in new frequency ranges. In 2022, the initial use is anticipated. The two key standards for filters that are used to build mobile applications are size and performance. With a repetition range of 26–28 GHz, the passband channel is designed in this proposal, simulated, and constructed. For downconversion of mmWave signals to microwave frequencies between 2 and 18 GHz, this channel can be employed as the front end of the apparatus. The size and efficiency of channels must be taken into account when planning new portable communications applications. Small, high-performance filters made by merging two components can be used in future mmWave applications like 5G. High-quality channels with minimal imprint are preferred for mmWave applications like 5G.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"355 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115287411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Internet of Things (IoT) Computing-Based Health Monitoring System with the Aid of Machine Learning Approach 基于机器学习方法的创新物联网(IoT)计算健康监测系统
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072528
M. Dhinakaran, P. Krishnapriya, Joel Alanya-Beltran, Vaibhav Gandhi, Sushma Jaiswal, D. P. Singh
The community health area comprises an enormous measure of data, and specific methodologies are utilized to deal with that data. One of the most common approaches is handling as well as processing. This technique forecasts the likely consequences of cardiovascular disease. The result of this strategy is to foresee the former heart disease. The work controls IOT utilizing a sensor (a heartbeat sensor to screen beats) and Arduino, and the outcomes might be seen on a successive screen. IFTTT is utilized to break down sensor readings in Google Sheets, which are accordingly changed over into CSV go-like information. The datasets utilized are characterized by treatment boundaries, in addition to being used for data preparation and testing. This technique assesses those boundaries utilizing the data arrangement request strategy. With artificial intelligence calculations and order work. The dataset is first taken apart, analyzed, and screened, after which the accumulated information is handled in Python programming utilizing AI Calculations, specifically Choice Tree Calculation with Irregular Woodlands Arrangement Calculation. SVM (Backing vector machine) creates the best outcomes concerning identifying coronary illness. Thus, the recommended worldview is demonstrated to be a solid one for foreseeing past coronary illness. The recommended equipment and programming innovation help patients in anticipating heart illness in its underlying stages.
社区保健领域包含大量数据,并采用具体方法处理这些数据。最常见的方法之一是处理和处理。这项技术可以预测心血管疾病的可能后果。这种策略的结果是预见到以前的心脏病。工作控制物联网利用传感器(心跳传感器屏幕节拍)和Arduino,结果可能会在一个连续的屏幕上看到。IFTTT被用来分解谷歌表格中的传感器读数,这些读数相应地被转换成类似CSV的信息。除了用于数据准备和测试之外,所使用的数据集还具有治疗边界的特征。该技术利用数据安排请求策略评估这些边界。用人工智能计算和排序工作。首先对数据集进行分解、分析和筛选,然后利用AI计算在Python编程中处理积累的信息,特别是使用不规则林地排列计算的选择树计算。支持向量机(SVM)在识别冠状动脉疾病方面产生最佳结果。因此,推荐的世界观被证明是一个可靠的预测过去的冠状动脉疾病。推荐的设备和程序创新帮助患者在其潜在阶段预测心脏病。
{"title":"An Innovative Internet of Things (IoT) Computing-Based Health Monitoring System with the Aid of Machine Learning Approach","authors":"M. Dhinakaran, P. Krishnapriya, Joel Alanya-Beltran, Vaibhav Gandhi, Sushma Jaiswal, D. P. Singh","doi":"10.1109/IC3I56241.2022.10072528","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072528","url":null,"abstract":"The community health area comprises an enormous measure of data, and specific methodologies are utilized to deal with that data. One of the most common approaches is handling as well as processing. This technique forecasts the likely consequences of cardiovascular disease. The result of this strategy is to foresee the former heart disease. The work controls IOT utilizing a sensor (a heartbeat sensor to screen beats) and Arduino, and the outcomes might be seen on a successive screen. IFTTT is utilized to break down sensor readings in Google Sheets, which are accordingly changed over into CSV go-like information. The datasets utilized are characterized by treatment boundaries, in addition to being used for data preparation and testing. This technique assesses those boundaries utilizing the data arrangement request strategy. With artificial intelligence calculations and order work. The dataset is first taken apart, analyzed, and screened, after which the accumulated information is handled in Python programming utilizing AI Calculations, specifically Choice Tree Calculation with Irregular Woodlands Arrangement Calculation. SVM (Backing vector machine) creates the best outcomes concerning identifying coronary illness. Thus, the recommended worldview is demonstrated to be a solid one for foreseeing past coronary illness. The recommended equipment and programming innovation help patients in anticipating heart illness in its underlying stages.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123410638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Encryption Algorithm with Hybrid Block Chain in Wireless Body Area Network 无线体域网络中混合区块链加密算法研究
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072838
S. Kayalvizhi, S. Mythili
The recent electronic Medical monitoring system focuses on maintaining the database of patients with their medical history and up-to-date prescriptions and treatment maintained with high degree of confidentiality. The E-Medical services where Wireless Body Area Network (WBAN) is integrated face certain challenges such as data sharing, network reliability, database management and so on. The greatest threat in WBAN remained the data security and integrity. Several new methodologies supports to overcome these threats with secure hash function, digital signature with effective routing protocols to provide enhanced solutions for secure data maintenance and sharing in WBAN. The security system based on Block Chain Technology(BCT) are the most common trust building measure for WBAN, where the data are stored in distributed ledgers. This technology faces problems on minimal storage size and unauthorized access of the distributed data. This was overcome by the technique called sequential aggregate signature scheme with designated verifier with block chain based cloud transaction in WBAN in recent trends. The above scheme faces problem of wastage of storage space in the ledgers and it could be rectified by the proposed system of Encrypted Multi map block chain in WBAN which supports high degree of data access with reduced computational complexity of storage. This proposed system aims to simulate the WBAN with improved access of distributed authentication key of users in ledger pools and provides confidential sharing of data. This system deals with the comparative study of different encryption used in block chain storage to analyze their performance in WBAN
最新的电子医疗监测系统的重点是保持病人的病史和最新的处方和治疗数据库,并保持高度保密。集成无线体域网络(WBAN)的电子医疗业务面临着数据共享、网络可靠性、数据库管理等方面的挑战。无线宽带网络最大的威胁仍然是数据的安全性和完整性。采用安全哈希函数、数字签名和有效的路由协议来克服这些威胁的新方法为WBAN中的安全数据维护和共享提供了增强的解决方案。基于区块链技术(BCT)的安全系统是WBAN最常见的信任构建措施,其中数据存储在分布式账本中。该技术面临着分布式数据的最小存储量和未授权访问等问题。近年来,基于区块链的WBAN云交易中指定验证者的顺序聚合签名方案克服了这一问题。上述方案面临账本存储空间浪费的问题,提出的WBAN加密多映射区块链系统可以在降低存储计算复杂度的同时支持高度的数据访问,从而解决这一问题。该系统旨在模拟WBAN,改进账本池中用户的分布式认证密钥访问,并提供数据的机密共享。本系统对区块链存储中使用的不同加密技术进行了比较研究,分析了它们在无线宽带网络中的性能
{"title":"A Survey on Encryption Algorithm with Hybrid Block Chain in Wireless Body Area Network","authors":"S. Kayalvizhi, S. Mythili","doi":"10.1109/IC3I56241.2022.10072838","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072838","url":null,"abstract":"The recent electronic Medical monitoring system focuses on maintaining the database of patients with their medical history and up-to-date prescriptions and treatment maintained with high degree of confidentiality. The E-Medical services where Wireless Body Area Network (WBAN) is integrated face certain challenges such as data sharing, network reliability, database management and so on. The greatest threat in WBAN remained the data security and integrity. Several new methodologies supports to overcome these threats with secure hash function, digital signature with effective routing protocols to provide enhanced solutions for secure data maintenance and sharing in WBAN. The security system based on Block Chain Technology(BCT) are the most common trust building measure for WBAN, where the data are stored in distributed ledgers. This technology faces problems on minimal storage size and unauthorized access of the distributed data. This was overcome by the technique called sequential aggregate signature scheme with designated verifier with block chain based cloud transaction in WBAN in recent trends. The above scheme faces problem of wastage of storage space in the ledgers and it could be rectified by the proposed system of Encrypted Multi map block chain in WBAN which supports high degree of data access with reduced computational complexity of storage. This proposed system aims to simulate the WBAN with improved access of distributed authentication key of users in ledger pools and provides confidential sharing of data. This system deals with the comparative study of different encryption used in block chain storage to analyze their performance in WBAN","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123512444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Adoption in Blockchain-Based Smart Applications 在基于区块链的智能应用中采用机器学习
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072980
Vishal Suthar, V. Bansal, C. Reddy, J. L. Arias-Gonzáles, Devendra Singh, D. P. Singh
The development of blockchain technology (BT) in recent years has made it a distinctive, revolutionary, and popular innovation. Information security and confidentiality are prioritised by the decentralised database in BT. Additionally, the consensus process in it ensures the validity and security of the data. However, it brings up fresh security concerns including majority assault and the double expenditures. Data analytics using cryptocurrency sensitive data are needed to address the aforementioned problems. These dataset' analytics highlight the value of recently developed techniques such as machine learning (ML). ML uses a reasonable quantity of data to generate accurate predictions. In ML, data exchange and dependability are essential to enhancing the precision of outcomes. Results from the fusion of these two technologies (ML and BT) may be quite exact. In this research, we give a thorough investigation into the use of machine learning (ML) to strengthen the security of BT-based intelligent systems. The assaults on a blockchain-based network may be analysed using a variety of classic machine learning (ML) approaches, including Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), Clustering, Bagging, and Support Vector Machines (SVM) (LSTM).We also discuss how the two technologies may be used together in a number of advanced areas, including smart urban, the national grid, medicine, and autonomous aerial vehicles (UAVs). The difficulties and concerns facing future research are then examined. Finally, a study based with a thorough analysis is offered.
近年来,区块链技术(BT)的发展使其成为一项独特的、革命性的、受欢迎的创新。BT的分散数据库优先考虑信息的安全性和保密性,其中的共识过程确保了数据的有效性和安全性。然而,它带来了新的安全问题,包括多数攻击和双重支出。需要使用加密货币敏感数据进行数据分析以解决上述问题。这些数据集的分析突出了最近开发的技术的价值,如机器学习(ML)。机器学习使用合理数量的数据来生成准确的预测。在机器学习中,数据交换和可靠性对于提高结果的准确性至关重要。这两种技术(ML和BT)的融合结果可能相当精确。在这项研究中,我们对机器学习(ML)的使用进行了深入的研究,以加强基于bt的智能系统的安全性。对基于区块链的网络的攻击可以使用各种经典的机器学习(ML)方法进行分析,包括卷积神经网络(CNN)、长短期记忆(LSTM)、聚类、Bagging和支持向量机(SVM) (LSTM)。我们还讨论了这两种技术如何在智能城市、国家电网、医疗和自主飞行器(uav)等一些先进领域一起使用。然后探讨了未来研究面临的困难和问题。最后,在深入分析的基础上进行了研究。
{"title":"Machine Learning Adoption in Blockchain-Based Smart Applications","authors":"Vishal Suthar, V. Bansal, C. Reddy, J. L. Arias-Gonzáles, Devendra Singh, D. P. Singh","doi":"10.1109/IC3I56241.2022.10072980","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072980","url":null,"abstract":"The development of blockchain technology (BT) in recent years has made it a distinctive, revolutionary, and popular innovation. Information security and confidentiality are prioritised by the decentralised database in BT. Additionally, the consensus process in it ensures the validity and security of the data. However, it brings up fresh security concerns including majority assault and the double expenditures. Data analytics using cryptocurrency sensitive data are needed to address the aforementioned problems. These dataset' analytics highlight the value of recently developed techniques such as machine learning (ML). ML uses a reasonable quantity of data to generate accurate predictions. In ML, data exchange and dependability are essential to enhancing the precision of outcomes. Results from the fusion of these two technologies (ML and BT) may be quite exact. In this research, we give a thorough investigation into the use of machine learning (ML) to strengthen the security of BT-based intelligent systems. The assaults on a blockchain-based network may be analysed using a variety of classic machine learning (ML) approaches, including Convolutional Neural Network (CNN), Long Short-Term Memory (LSTM), Clustering, Bagging, and Support Vector Machines (SVM) (LSTM).We also discuss how the two technologies may be used together in a number of advanced areas, including smart urban, the national grid, medicine, and autonomous aerial vehicles (UAVs). The difficulties and concerns facing future research are then examined. Finally, a study based with a thorough analysis is offered.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121728257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Loan Eligibility Prediction using Machine Learning based on Personal Information 基于个人信息的机器学习贷款资格预测
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073318
M. Meenaakumari, P. Jayasuriya, Nasa Dhanraj, Seema Sharma, Geetha Manoharan, M. Tiwari
Banks serves the basic necessities of everyone next to hospitals and schools. People reach out to banks for various purposes. But one of the most common services offered by banks is loans. However, many common people are not completely aware of the banking procedures and eligibility criteria for loans. This study aims to develop a Machine Learning (ML) model which is capable of predicting whether the person is eligible for a health loan or not by analyzing some basic values entered by the user. For this process, a dataset consisting of all necessary parameters for a loan application is collected from Kaggle. The collected dataset is then preprocessed by two methods namely the null value elimination method and encoding. Simultaneously, three ML models were developed using three different algorithms. They are the Random Forest (RF), Naive Bayes (NB), and Linear Regression (LR). The preprocessed data will next be used to train the models. Following that, a comparison of a few parameters will be used to assess the models' effectiveness. The results of the analysis prove that the RF algorithm is the best in terms of both accuracy and error. The accuracy of the RF algorithm is 91% and it also predicts loan eligibility with lesser error values. The LR model has the lowest accuracy values and the highest error value making it the least efficient algorithm that can be used in loan prediction.
银行为医院和学校附近的每个人提供基本必需品。人们出于各种目的向银行求助。但银行提供的最常见的服务之一是贷款。然而,许多普通人并不完全了解银行贷款的程序和资格标准。本研究旨在开发一个机器学习(ML)模型,该模型能够通过分析用户输入的一些基本值来预测该人是否有资格获得医疗贷款。对于这个过程,将从Kaggle收集一个包含贷款申请所有必要参数的数据集。然后对收集到的数据集进行空值消除法和编码两种方法的预处理。同时,使用三种不同的算法开发了三个ML模型。它们是随机森林(RF)、朴素贝叶斯(NB)和线性回归(LR)。预处理后的数据将用于训练模型。接下来,将使用几个参数的比较来评估模型的有效性。分析结果表明,射频算法在精度和误差方面都是最好的。RF算法的准确率为91%,并且它还能以较小的误差值预测贷款资格。LR模型具有最低的准确度值和最高的误差值,使其成为可用于贷款预测的效率最低的算法。
{"title":"Loan Eligibility Prediction using Machine Learning based on Personal Information","authors":"M. Meenaakumari, P. Jayasuriya, Nasa Dhanraj, Seema Sharma, Geetha Manoharan, M. Tiwari","doi":"10.1109/IC3I56241.2022.10073318","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073318","url":null,"abstract":"Banks serves the basic necessities of everyone next to hospitals and schools. People reach out to banks for various purposes. But one of the most common services offered by banks is loans. However, many common people are not completely aware of the banking procedures and eligibility criteria for loans. This study aims to develop a Machine Learning (ML) model which is capable of predicting whether the person is eligible for a health loan or not by analyzing some basic values entered by the user. For this process, a dataset consisting of all necessary parameters for a loan application is collected from Kaggle. The collected dataset is then preprocessed by two methods namely the null value elimination method and encoding. Simultaneously, three ML models were developed using three different algorithms. They are the Random Forest (RF), Naive Bayes (NB), and Linear Regression (LR). The preprocessed data will next be used to train the models. Following that, a comparison of a few parameters will be used to assess the models' effectiveness. The results of the analysis prove that the RF algorithm is the best in terms of both accuracy and error. The accuracy of the RF algorithm is 91% and it also predicts loan eligibility with lesser error values. The LR model has the lowest accuracy values and the highest error value making it the least efficient algorithm that can be used in loan prediction.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122178480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Analysis of word embedding techniques and text similarity Measures 词嵌入技术与文本相似度度量的比较分析
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072927
Nagothi Vaibhav Anjani Kumar, S. Mehrotra
Digital text data is increasing daily in various uses, such as clinical notes, lab test reports, research articles, etc. Most of the mentioned data are unstructured. While searching for information lot of unrelated information is returned against the query. The paper presents a comparative analysis of word embedding techniques and text similarity measures to determine how similar two bits of text are in respective lexical, semantic characteristics, and closeness. The principal aim of this paper is to perform pre-processing process of medical history notes of the patient's data followed by word embedding techniques such as Word2Vec, FastText, and Doc2Vec.
数字文本数据的各种用途日益增加,如临床记录、实验室测试报告、研究论文等。上面提到的大多数数据都是非结构化的。在搜索信息时,会根据查询返回许多不相关的信息。本文介绍了词嵌入技术和文本相似度度量的比较分析,以确定两个文本在各自的词汇、语义特征和接近度方面的相似程度。本文的主要目的是对患者数据的病史笔记进行预处理处理,然后采用Word2Vec、FastText、Doc2Vec等词嵌入技术。
{"title":"A Comparative Analysis of word embedding techniques and text similarity Measures","authors":"Nagothi Vaibhav Anjani Kumar, S. Mehrotra","doi":"10.1109/IC3I56241.2022.10072927","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072927","url":null,"abstract":"Digital text data is increasing daily in various uses, such as clinical notes, lab test reports, research articles, etc. Most of the mentioned data are unstructured. While searching for information lot of unrelated information is returned against the query. The paper presents a comparative analysis of word embedding techniques and text similarity measures to determine how similar two bits of text are in respective lexical, semantic characteristics, and closeness. The principal aim of this paper is to perform pre-processing process of medical history notes of the patient's data followed by word embedding techniques such as Word2Vec, FastText, and Doc2Vec.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121412895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transfer Learning Approach on Bacteria Classification from Microscopic Images 微生物图像细菌分类的迁移学习方法
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072818
Anupam Singh, Abhishek Kumar, H. M. Salman, Navneet Rawat, Sanjiv Kumar Jain, Annam Takshitha Rao
The ability to identify and categorize bacteria is crucial in modern medicine for disease diagnosis, infection treatment, and epidemic investigation. However, manually identification and categorization of bacteria requires a lot of time and effort from humans. As technology has progressed, computer systems-based techniques are now doing the duty of identifying images captured by digital electron microscopes. On top of that, modern Deep Learning (DL) methods have shown remarkable improvement in the area of image classification. In this research, we explore a method for using a DL model to automate the identification and categorization of bacteria. To develop the DL model, we used a dataset consisting of more than 600 images of 33 distinct bacteria taken with a microscope and the ‘transfer learning’ technique. GoogLeNet and AlexNet are two examples of transfer learning models used in this research. The DL classification accuracy was evaluated using 20% randomly selected and isolated images from the dataset. Experimental findings of prediction obtained an accuracy of roughly 98.67% by GoogLeNet, and both transfer learning models recognized and classified all 33 bacterial species with better success rates.
识别和分类细菌的能力在现代医学疾病诊断、感染治疗和流行病调查中至关重要。然而,人工鉴定和分类细菌需要人类花费大量的时间和精力。随着技术的进步,基于计算机系统的技术现在正在承担识别数字电子显微镜捕获的图像的职责。最重要的是,现代深度学习(DL)方法在图像分类领域表现出显著的进步。在这项研究中,我们探索了一种使用DL模型来自动识别和分类细菌的方法。为了开发DL模型,我们使用了一个由显微镜和“迁移学习”技术拍摄的33种不同细菌的600多张图像组成的数据集。GoogLeNet和AlexNet是本研究中使用的迁移学习模型的两个例子。使用从数据集中随机选择和隔离的20%图像来评估DL分类精度。实验结果表明,GoogLeNet的预测准确率约为98.67%,两种迁移学习模型对所有33种细菌的识别和分类成功率都较高。
{"title":"Transfer Learning Approach on Bacteria Classification from Microscopic Images","authors":"Anupam Singh, Abhishek Kumar, H. M. Salman, Navneet Rawat, Sanjiv Kumar Jain, Annam Takshitha Rao","doi":"10.1109/IC3I56241.2022.10072818","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072818","url":null,"abstract":"The ability to identify and categorize bacteria is crucial in modern medicine for disease diagnosis, infection treatment, and epidemic investigation. However, manually identification and categorization of bacteria requires a lot of time and effort from humans. As technology has progressed, computer systems-based techniques are now doing the duty of identifying images captured by digital electron microscopes. On top of that, modern Deep Learning (DL) methods have shown remarkable improvement in the area of image classification. In this research, we explore a method for using a DL model to automate the identification and categorization of bacteria. To develop the DL model, we used a dataset consisting of more than 600 images of 33 distinct bacteria taken with a microscope and the ‘transfer learning’ technique. GoogLeNet and AlexNet are two examples of transfer learning models used in this research. The DL classification accuracy was evaluated using 20% randomly selected and isolated images from the dataset. Experimental findings of prediction obtained an accuracy of roughly 98.67% by GoogLeNet, and both transfer learning models recognized and classified all 33 bacterial species with better success rates.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122547063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conceptual Analysis of Machine Learning Towards Digital Marketing Transformation 机器学习对数字营销转型的概念分析
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073416
Alpana Sharma, S. Poojitha, Archana B. Saxena, M. Bhanushali, Priyanka Rawal
Man-made brainpower has been underexplored. Machines with profound learning skills can take advanced showcasing higher than ever with their Man-made consciousness having a significant effect. This paper tries to find discoveries from an investigation of responses across various socioeconomics to robots and their selling powers. It’s also been discovered that software engineers need to work in tandem with digital marketers using machines with deep learning to consider consumer attitudes, behaviors, and preferences while designing the architecture. Because of this, in the future, marketers will have far more access to correct information on customers, which will have enormous advantages for the company. While search engine marketing automation has a lot of potential, marketers know that humans still have an essential role to play in the formulation of abstract strategies. The review that is being given here centres around how promoting offices, media organizations, and sponsors use and utilize ML-driven investigation instruments. The exploration features four central issues, including 1) the meaning of wise scientific apparatuses in the turn of events and execution of promoting strategies; 2) the absence of familiarity with arising advancements, for example, Al (ML) and man-made consciousness (simulated intelligence); 3) the imminent utilization of ML instruments in publicizing; and 4) the low degree of improvement and use of ML-driven logical devices in advertising. To help organizations in distinguishing valuable open doors and completing drives zeroed in on the sending and acknowledgement of quantitative ML devices in computerized showcasing, a system comprised of facilitators and a task plan was laid out.Data collection and analysis will perform using SPSS software, and findings will be drawn from a combination of a fuzzy-approach to determining how best to persuade customers to utilize the machine’s services and a variable-oriented, quantitative examination of the obtained data will consider.
人工智能尚未得到充分开发。具有深刻学习技能的机器可以比以往任何时候都更先进的展示,他们的人造意识具有显著的影响。本文试图从对不同社会经济学对机器人及其销售能力的反应的调查中找到发现。人们还发现,软件工程师需要与数字营销人员协同工作,在设计架构时使用具有深度学习功能的机器来考虑消费者的态度、行为和偏好。正因为如此,在未来,营销人员将有更多的机会获得有关客户的正确信息,这将为公司带来巨大的优势。虽然搜索引擎营销自动化有很大的潜力,但营销人员知道,在抽象策略的制定中,人类仍然扮演着重要的角色。这里给出的审查主要围绕推广办公室、媒体组织和赞助商如何使用和利用机器学习驱动的调查工具。探索的四个中心问题包括:1)明智的科学装置在事件的转折和促进战略的执行中的意义;2)不熟悉正在出现的进步,例如人工智能(ML)和人造意识(模拟智能);3)即将在宣传中使用ML工具;4)广告中机器学习驱动的逻辑设备的改进和使用程度较低。为了帮助组织区分有价值的开放门并完成在计算机化展示中发送和确认定量ML设备的驱动器,设计了一个由促进者和任务计划组成的系统。数据收集和分析将使用SPSS软件进行,结果将从模糊方法的组合中得出,以确定如何最好地说服客户利用机器的服务,并考虑对获得的数据进行变量导向的定量检查。
{"title":"A Conceptual Analysis of Machine Learning Towards Digital Marketing Transformation","authors":"Alpana Sharma, S. Poojitha, Archana B. Saxena, M. Bhanushali, Priyanka Rawal","doi":"10.1109/IC3I56241.2022.10073416","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073416","url":null,"abstract":"Man-made brainpower has been underexplored. Machines with profound learning skills can take advanced showcasing higher than ever with their Man-made consciousness having a significant effect. This paper tries to find discoveries from an investigation of responses across various socioeconomics to robots and their selling powers. It’s also been discovered that software engineers need to work in tandem with digital marketers using machines with deep learning to consider consumer attitudes, behaviors, and preferences while designing the architecture. Because of this, in the future, marketers will have far more access to correct information on customers, which will have enormous advantages for the company. While search engine marketing automation has a lot of potential, marketers know that humans still have an essential role to play in the formulation of abstract strategies. The review that is being given here centres around how promoting offices, media organizations, and sponsors use and utilize ML-driven investigation instruments. The exploration features four central issues, including 1) the meaning of wise scientific apparatuses in the turn of events and execution of promoting strategies; 2) the absence of familiarity with arising advancements, for example, Al (ML) and man-made consciousness (simulated intelligence); 3) the imminent utilization of ML instruments in publicizing; and 4) the low degree of improvement and use of ML-driven logical devices in advertising. To help organizations in distinguishing valuable open doors and completing drives zeroed in on the sending and acknowledgement of quantitative ML devices in computerized showcasing, a system comprised of facilitators and a task plan was laid out.Data collection and analysis will perform using SPSS software, and findings will be drawn from a combination of a fuzzy-approach to determining how best to persuade customers to utilize the machine’s services and a variable-oriented, quantitative examination of the obtained data will consider.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122811764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1