Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117384
Shubham Goel, A. Tripathi, T. Choudhury, Vivek Kumar
Soft computing is the utilisation of inaccurate results for technically hard assignments such as the result of NP-complete problems, for which there is no known calculation that can execute an exact arrangement in polynomial time. It acts significantly in real-time applications for the effective use of searching of the diseases. PD (or Parkinson's Disease) is a ceaseless and endless mobility disorder i.e the manifestation continues and compound after some time. The reason is dull, and despite the path that there is particularly no end, there are medication choices. It joins the breakdown and going of fundamental nerve cells called neurons. It effects on an extremely fundamental level the neurons in an area of the cerebrum which is known as the substantia nigra. Some of the shriveling neurons make dopamine, a substance that sends signals to the bit of the cerebrum that administers progression and coordination. As PD drives, the measure of dopamine made in the brain diminishes, leaving behind a person incapable of controlling progression routinely.
{"title":"Parkinson's Disease Detection using Soft Computing Technique","authors":"Shubham Goel, A. Tripathi, T. Choudhury, Vivek Kumar","doi":"10.1109/SMART46866.2019.9117384","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117384","url":null,"abstract":"Soft computing is the utilisation of inaccurate results for technically hard assignments such as the result of NP-complete problems, for which there is no known calculation that can execute an exact arrangement in polynomial time. It acts significantly in real-time applications for the effective use of searching of the diseases. PD (or Parkinson's Disease) is a ceaseless and endless mobility disorder i.e the manifestation continues and compound after some time. The reason is dull, and despite the path that there is particularly no end, there are medication choices. It joins the breakdown and going of fundamental nerve cells called neurons. It effects on an extremely fundamental level the neurons in an area of the cerebrum which is known as the substantia nigra. Some of the shriveling neurons make dopamine, a substance that sends signals to the bit of the cerebrum that administers progression and coordination. As PD drives, the measure of dopamine made in the brain diminishes, leaving behind a person incapable of controlling progression routinely.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132879134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117544
Bhumika Gupta, K. K. Gola, Manish Dhingra
Wireless sensor networks generally works on the principle of multipath propagation where multiple sensor nodes work together to collect the data and then transfer the sensed data to the sink node or base station. A replica node is the major issues in wireless sensor network is replica formation/creation. In this situation, an opponent node captures all the details of the original node and places the duplicate nodes in the network to get all the information related to the network. This paper presents a review of replica detection algorithm in wireless sensor network.
{"title":"Wireless Sensor Networks: “A Review on Replica Detection Techniques”","authors":"Bhumika Gupta, K. K. Gola, Manish Dhingra","doi":"10.1109/SMART46866.2019.9117544","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117544","url":null,"abstract":"Wireless sensor networks generally works on the principle of multipath propagation where multiple sensor nodes work together to collect the data and then transfer the sensed data to the sink node or base station. A replica node is the major issues in wireless sensor network is replica formation/creation. In this situation, an opponent node captures all the details of the original node and places the duplicate nodes in the network to get all the information related to the network. This paper presents a review of replica detection algorithm in wireless sensor network.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121742477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117400
Md. Afif Al Mamun, I. Kadir, AKM SHAHARIAR AZAD RABBY, Abdullah Al Azmi
Music genre classification is very vital for music recommendation and for the retrieval of music information. So many works have already been done for classifying genres of English music using different machine learning approaches. Even though Bangla music is very rich in its own fashion, there is almost no notable work found to classify music genres of Bangla music using machine learning techniques yet. There are so many types and styles of Bangla music which can be classified in different genres. Initially, we're considering 6 different Bangla music genres such as ‘Bangla Adhunik’, ‘Bangla Hip-Hop’, ‘Bangla Band Music’, ‘Nazrulgeeti’, ‘Palligeeti’, ‘Rabindra Sangeet’ etc. We are using 250–300 songs (. MP3 files) for each genre. We extracted different time domain and frequency domain features of audio signals from digital audio files (i.e. MP3 files). Finally, in this study, we proposed a deep learning model (after comparing performances of different models) to do a multiclass classification of Bangla music genres.
{"title":"Bangla Music Genre Classification Using Neural Network","authors":"Md. Afif Al Mamun, I. Kadir, AKM SHAHARIAR AZAD RABBY, Abdullah Al Azmi","doi":"10.1109/SMART46866.2019.9117400","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117400","url":null,"abstract":"Music genre classification is very vital for music recommendation and for the retrieval of music information. So many works have already been done for classifying genres of English music using different machine learning approaches. Even though Bangla music is very rich in its own fashion, there is almost no notable work found to classify music genres of Bangla music using machine learning techniques yet. There are so many types and styles of Bangla music which can be classified in different genres. Initially, we're considering 6 different Bangla music genres such as ‘Bangla Adhunik’, ‘Bangla Hip-Hop’, ‘Bangla Band Music’, ‘Nazrulgeeti’, ‘Palligeeti’, ‘Rabindra Sangeet’ etc. We are using 250–300 songs (. MP3 files) for each genre. We extracted different time domain and frequency domain features of audio signals from digital audio files (i.e. MP3 files). Finally, in this study, we proposed a deep learning model (after comparing performances of different models) to do a multiclass classification of Bangla music genres.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121994447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117468
G. M. R. I. Rasiq, Abdullah Al Sefat, M. Hasnain
Multiple Choice Question (MCQ) script sheets are very popular in Bangladesh as it is an easy way to take exams that include Multiple choice questions. It is also a great way of collecting a huge amount of data in a short period of time. This research proposes a novel approach to analyzing and evaluating MCQ scripts without using any OMR machine or OMR paper. The first step is to scan the MCQ script as an image via an android smartphone. Secondly, the specific answer area from the image is cropped. After that, each answer choice is extracted and Black pixels are calculated in each choice to obtain the given answer. In the final step, a text file containing given answers to all questions is generated.
{"title":"Mobile based MCQ Answer Sheet Analysis and Evaluation Application","authors":"G. M. R. I. Rasiq, Abdullah Al Sefat, M. Hasnain","doi":"10.1109/SMART46866.2019.9117468","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117468","url":null,"abstract":"Multiple Choice Question (MCQ) script sheets are very popular in Bangladesh as it is an easy way to take exams that include Multiple choice questions. It is also a great way of collecting a huge amount of data in a short period of time. This research proposes a novel approach to analyzing and evaluating MCQ scripts without using any OMR machine or OMR paper. The first step is to scan the MCQ script as an image via an android smartphone. Secondly, the specific answer area from the image is cropped. After that, each answer choice is extracted and Black pixels are calculated in each choice to obtain the given answer. In the final step, a text file containing given answers to all questions is generated.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130250127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117345
Ankush Joshi, S. Goyal
In last ten to fifteen years lots of improved and transformed forms of RR Scheduling have been created to overcome some of issues which were available in the standard RR Scheduling. When these transformed versions were given by various scientists and researchers, these algorithms were always compared with the standard Round Robin Algorithm to make sure that the improved version is better than the standard algorithm. In this research paper we tried to draw comparison between various improved versions of round robin algorithm and analyze their average waiting time, average turnaround times and context switches, to check which one improved version would be able to suggest a fruitful modification over the original one.
{"title":"Comparison of Various Round Robin Scheduling Algorithms","authors":"Ankush Joshi, S. Goyal","doi":"10.1109/SMART46866.2019.9117345","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117345","url":null,"abstract":"In last ten to fifteen years lots of improved and transformed forms of RR Scheduling have been created to overcome some of issues which were available in the standard RR Scheduling. When these transformed versions were given by various scientists and researchers, these algorithms were always compared with the standard Round Robin Algorithm to make sure that the improved version is better than the standard algorithm. In this research paper we tried to draw comparison between various improved versions of round robin algorithm and analyze their average waiting time, average turnaround times and context switches, to check which one improved version would be able to suggest a fruitful modification over the original one.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117491
M. P. Mishra, D. P. Vidyarthi
For efficient wireless communication, the main resource is spectrum. Proper allocation of spectrum is one of the key requirements to effectively utilize the available resources. As the available spectrum is fixed and utilized by proper licensing and control, it is essential to use the spectrum to the extent possible to meet the ever increasing demand of various services including multimedia services that eat up more spectrums. Cognitive radio (CR) is a potential technology to solve spectrum scarcity problem for 5G cellular systems. CR provides flexibility, adaptability and interoperability. As CR users are opportunistic and try to use the licensed spectrum without causing any adverse effect on QoE of the licensed users. CR is the enabling technology, using which dynamic sharing of spectrum is done for unlicensed users to use frequency bands of the licensed users and hence improve the spectrum utilization. In CR, secondary users may require spectrum handoff when licensed users arrives and the channels currently being used by secondary user should be returned to the primary users. This paper, provide a survey of spectrum handoff in cognitive radio network (CRN). We have first introduced the cognitive radio network and concept of spectrum holes. Then this paper discuss about functions of CRN. Also, the concept of Quality of Experience (QoE) in CRN is explained. Subsequently, some recently proposed spectrum handoff algorithms in CRN are reviewed and different approaches to handle spectrum handoff are described. Finally, the paper is concluded with outlining the directions for future research in this area.
{"title":"Spectrum Handoff in Cognitive Radio Cellular Network: A Review","authors":"M. P. Mishra, D. P. Vidyarthi","doi":"10.1109/SMART46866.2019.9117491","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117491","url":null,"abstract":"For efficient wireless communication, the main resource is spectrum. Proper allocation of spectrum is one of the key requirements to effectively utilize the available resources. As the available spectrum is fixed and utilized by proper licensing and control, it is essential to use the spectrum to the extent possible to meet the ever increasing demand of various services including multimedia services that eat up more spectrums. Cognitive radio (CR) is a potential technology to solve spectrum scarcity problem for 5G cellular systems. CR provides flexibility, adaptability and interoperability. As CR users are opportunistic and try to use the licensed spectrum without causing any adverse effect on QoE of the licensed users. CR is the enabling technology, using which dynamic sharing of spectrum is done for unlicensed users to use frequency bands of the licensed users and hence improve the spectrum utilization. In CR, secondary users may require spectrum handoff when licensed users arrives and the channels currently being used by secondary user should be returned to the primary users. This paper, provide a survey of spectrum handoff in cognitive radio network (CRN). We have first introduced the cognitive radio network and concept of spectrum holes. Then this paper discuss about functions of CRN. Also, the concept of Quality of Experience (QoE) in CRN is explained. Subsequently, some recently proposed spectrum handoff algorithms in CRN are reviewed and different approaches to handle spectrum handoff are described. Finally, the paper is concluded with outlining the directions for future research in this area.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129575288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117512
Abdul Mohaimin Rahat, Abdul Kahir, Abu Kaisar Mohammad Masum
Now a day's sentiment analysis is the most used research topic. The sentiment analysis result is based on different investigation for example politics, terrorism, economy, international affairs, movies, fashion, justice, humanity. Social media are the main resource for collecting people's opinion and their sentiment about a different trending topic. People use many abusing words in social media to express their emotion. Using sentiment analysis, we will build a platform where one can easily identify the opinions are either positive or negative or neutral. This research paper will contain supervised learning which is under the machine learning approach. We run an experiment on different queries from humanity to terrorism and find out an interesting result. First of all, we have preprocessed the dataset to convert unstructured airline review into structured review form. After that, we convert structured review into a numerical value. We have to preprocess the data before using it. Stop word removal, @ removal, Hashtag removal, POS tagging, calculating sentiment score have done in preprocessing part. Then an algorithm has been applied to classify the opinion as either it is positive or negative. In this research paper, we will briefly discuss supervised machine learning. Support vector machine as well as Naïve Bayes algorithm and compares their overall accuracy, precession, recall value. The result shows that in the case of airline reviews Support vector machine gave way better result than Naïve Bayes algorithm.
{"title":"Comparison of Naive Bayes and SVM Algorithm based on Sentiment Analysis Using Review Dataset","authors":"Abdul Mohaimin Rahat, Abdul Kahir, Abu Kaisar Mohammad Masum","doi":"10.1109/SMART46866.2019.9117512","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117512","url":null,"abstract":"Now a day's sentiment analysis is the most used research topic. The sentiment analysis result is based on different investigation for example politics, terrorism, economy, international affairs, movies, fashion, justice, humanity. Social media are the main resource for collecting people's opinion and their sentiment about a different trending topic. People use many abusing words in social media to express their emotion. Using sentiment analysis, we will build a platform where one can easily identify the opinions are either positive or negative or neutral. This research paper will contain supervised learning which is under the machine learning approach. We run an experiment on different queries from humanity to terrorism and find out an interesting result. First of all, we have preprocessed the dataset to convert unstructured airline review into structured review form. After that, we convert structured review into a numerical value. We have to preprocess the data before using it. Stop word removal, @ removal, Hashtag removal, POS tagging, calculating sentiment score have done in preprocessing part. Then an algorithm has been applied to classify the opinion as either it is positive or negative. In this research paper, we will briefly discuss supervised machine learning. Support vector machine as well as Naïve Bayes algorithm and compares their overall accuracy, precession, recall value. The result shows that in the case of airline reviews Support vector machine gave way better result than Naïve Bayes algorithm.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123079998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117312
D. Parygin, S. Masaev, V. Malikov, E. Maksimova, N. Sadovnikova, A. Finogeev
Modern monitoring and accounting tools allow to accumulate a significant amount of thematic information, which can be a good basis for supporting management decisions on the development of urban areas. Therefore, this paper proposes a number of methods for a comprehensive evaluation and work with information about residential real estate. Modern approaches to work with data on the real estate market are considered. However, an appropriate information infrastructure is needed to obtain a holistic view of the composition and status of residential real estate. The paper describes the developed system for spatial monitoring of real estate objects, as well as the tools included in it for presentation geospatial data on residential objects (at the level of buildings and apartments) and assessing their value based on comparative approach. It is proposed to use the “box-and-whiskers” method to determine price spike for objects in the process of using the comparative approach.
{"title":"Urban Areas Development Analysis and Management Decision Support based on Residential Real Estate Objects Evaluation Methods","authors":"D. Parygin, S. Masaev, V. Malikov, E. Maksimova, N. Sadovnikova, A. Finogeev","doi":"10.1109/SMART46866.2019.9117312","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117312","url":null,"abstract":"Modern monitoring and accounting tools allow to accumulate a significant amount of thematic information, which can be a good basis for supporting management decisions on the development of urban areas. Therefore, this paper proposes a number of methods for a comprehensive evaluation and work with information about residential real estate. Modern approaches to work with data on the real estate market are considered. However, an appropriate information infrastructure is needed to obtain a holistic view of the composition and status of residential real estate. The paper describes the developed system for spatial monitoring of real estate objects, as well as the tools included in it for presentation geospatial data on residential objects (at the level of buildings and apartments) and assessing their value based on comparative approach. It is proposed to use the “box-and-whiskers” method to determine price spike for objects in the process of using the comparative approach.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132191631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117411
Vinod Kumar, D. Mangal, P. Pandy
The lean manufacturing concept was initially developed for maximum utilization in minimum wastes. Now in the present scenario, lean is well known for the sustaining the business in the competitive environment. Radical changing in the current business scenario environment is the toughest and complex task to deal with the Indian manufacturing sector. The survival and sustaining in the complex environment can be handled through the elimination of non-value-added activities in the business operations. The present paper deal with the consideration of Lean Manufacturing as a weapon to deal with uncertainty in the market.
{"title":"Is the Lean Approach Beneficial for the Manufacturing Sector: Review on Literature","authors":"Vinod Kumar, D. Mangal, P. Pandy","doi":"10.1109/SMART46866.2019.9117411","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117411","url":null,"abstract":"The lean manufacturing concept was initially developed for maximum utilization in minimum wastes. Now in the present scenario, lean is well known for the sustaining the business in the competitive environment. Radical changing in the current business scenario environment is the toughest and complex task to deal with the Indian manufacturing sector. The survival and sustaining in the complex environment can be handled through the elimination of non-value-added activities in the business operations. The present paper deal with the consideration of Lean Manufacturing as a weapon to deal with uncertainty in the market.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121517804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-11-01DOI: 10.1109/SMART46866.2019.9117391
Tanzeela Javid, M. Gupta
This paper focuses on privacy-preserving of the data while extracting some meaningful information from the large lumps of data available. Many techniques have been used for privacy-preserving of the data while mining but to balance it with data utility has always been a difficult task. In this paper four-dimensional rotational transformation to transform the numeric data into disguised format to preserve its privacy by hiding its sensitivity has been used. The non-numeric data could be preserved using cryptographic algorithms. The data before transformation is normalized using min-max normalization and Geometric Data Perturbation method, which fractionates the numeric data into 2 groups and rotates these groups simultaneously along two planes vis-a-vis xy-plane and zw-plane using four-dimensional rotational matrices. To rigidify the security level, the angle whose variance value is high is selected. By rigidifying the security level it becomes difficult to extort the actual data from the transformed data format. In the proposed method the privacy and utility of data are preserved using 4D Rotation Transformation.
{"title":"Privacy Preserving Classification using 4-Dimensional Rotation Transformation","authors":"Tanzeela Javid, M. Gupta","doi":"10.1109/SMART46866.2019.9117391","DOIUrl":"https://doi.org/10.1109/SMART46866.2019.9117391","url":null,"abstract":"This paper focuses on privacy-preserving of the data while extracting some meaningful information from the large lumps of data available. Many techniques have been used for privacy-preserving of the data while mining but to balance it with data utility has always been a difficult task. In this paper four-dimensional rotational transformation to transform the numeric data into disguised format to preserve its privacy by hiding its sensitivity has been used. The non-numeric data could be preserved using cryptographic algorithms. The data before transformation is normalized using min-max normalization and Geometric Data Perturbation method, which fractionates the numeric data into 2 groups and rotates these groups simultaneously along two planes vis-a-vis xy-plane and zw-plane using four-dimensional rotational matrices. To rigidify the security level, the angle whose variance value is high is selected. By rigidifying the security level it becomes difficult to extort the actual data from the transformed data format. In the proposed method the privacy and utility of data are preserved using 4D Rotation Transformation.","PeriodicalId":328124,"journal":{"name":"2019 8th International Conference System Modeling and Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130708151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}