Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00034
Anu Radha Kota, J. Prasad, J. Chand
A method for developing Hybrid delicate swapping Mode in a systematic manner. In this study, PWM full crossed over DC to DC (IBB) converters are proposed, and single-stage power change, Zero-voltage and Zero current, and high-effectiveness execution are all possible with the proposed group of converters. To achieve optimal framework effectiveness, the delicate swapping method of the important switches might be adjusted under distinct information and yield conditions. Because the delicate turning states of the turn-ON and turn-OFF moments are very much dissociated in the zero-voltage and zero-current exchanging (ZVZCS) mode, the turn-ON and turn-OFF exchanging difficulties can be simplified. The mood killer exchanging misfortune can also be simplified in the zero-voltage exchanging (ZVS) mode because there is no requirement for light burden activity in this mode. By utilising low-voltage rating MOSFETs and diodes with better exchanging and conduction exhibitions, the additional conduction misfortune is kept to a minimum. A complete connection. The proposed converter and control procedure may also do careful exchanging execution of every dynamic switch and diode throughout a large weight and voltage range.
{"title":"Hybrid Soft Switching Mode PWM Full Bridge DC–DC Converter with Minimized Switching Loss","authors":"Anu Radha Kota, J. Prasad, J. Chand","doi":"10.1109/ICCS54944.2021.00034","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00034","url":null,"abstract":"A method for developing Hybrid delicate swapping Mode in a systematic manner. In this study, PWM full crossed over DC to DC (IBB) converters are proposed, and single-stage power change, Zero-voltage and Zero current, and high-effectiveness execution are all possible with the proposed group of converters. To achieve optimal framework effectiveness, the delicate swapping method of the important switches might be adjusted under distinct information and yield conditions. Because the delicate turning states of the turn-ON and turn-OFF moments are very much dissociated in the zero-voltage and zero-current exchanging (ZVZCS) mode, the turn-ON and turn-OFF exchanging difficulties can be simplified. The mood killer exchanging misfortune can also be simplified in the zero-voltage exchanging (ZVS) mode because there is no requirement for light burden activity in this mode. By utilising low-voltage rating MOSFETs and diodes with better exchanging and conduction exhibitions, the additional conduction misfortune is kept to a minimum. A complete connection. The proposed converter and control procedure may also do careful exchanging execution of every dynamic switch and diode throughout a large weight and voltage range.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124459717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00051
G. Walia, Parulpreet Singh, Manwinder Singh
The most fundamental and important parameter in Wireless Sensor Networks (WSNs) is to locate the actual location of the node which is supposed to be the target. To locate the node, the utmost parameter is to determine the coordinates of the nodes otherwise all the information which is accumulated using the other sensor nodes will be of no use and hence the communication will be erroneous and may become as a source of interference for all the nodes. Thus for majority of the application under WSNs, necessity is to find the exact geographical location of the target nodes. In this paper, to compute the location of randomly moving target nodes an algorithm known as Dragon Fly Metaheuristic algorithm is used. A node whose position is known is normally deployed in the middle of the region which is to be sensed. The effectiveness of the DA method may be determined by getting results and comparing performance metrics such as the number of localised nodes, location, and scalability.
{"title":"Localizing Mobile Nodes in WSNs using Dragonfly Algorithm","authors":"G. Walia, Parulpreet Singh, Manwinder Singh","doi":"10.1109/ICCS54944.2021.00051","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00051","url":null,"abstract":"The most fundamental and important parameter in Wireless Sensor Networks (WSNs) is to locate the actual location of the node which is supposed to be the target. To locate the node, the utmost parameter is to determine the coordinates of the nodes otherwise all the information which is accumulated using the other sensor nodes will be of no use and hence the communication will be erroneous and may become as a source of interference for all the nodes. Thus for majority of the application under WSNs, necessity is to find the exact geographical location of the target nodes. In this paper, to compute the location of randomly moving target nodes an algorithm known as Dragon Fly Metaheuristic algorithm is used. A node whose position is known is normally deployed in the middle of the region which is to be sensed. The effectiveness of the DA method may be determined by getting results and comparing performance metrics such as the number of localised nodes, location, and scalability.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"251 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115863634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00043
M. Pal, Munish Bhatia
Shimla hilly city dubbed as ‘Queen of Hills’ and is the most populated city in the State of Himachal Pradesh, lies in the Indian Himalayan region. It is a prominent hill station and tourist destination in India with an elevation of 2397.59 meters above mean sea level. Although Shimla has ranked first among 62 cities with a population under a million in the 2020 Ease of Living Index. However, Unplanned and short-term developmental plans increase urbanization and have led to tons of solid waste, due this solid waste has become a challengeable issue. The rising generation trend of garbage can create acute health problems and a very unpleasant living environment that could ruin the beauty of Hill Queen. The waste generation/collection per capita is 350g/day in Shimla city. The waste problems in hilly and plain cities differ due to the different topography of hilly terrain, which is described by steep mountains, steep terrain, deep valleys, traffic congestion, and narrow roads. This paper begins with a brief status of municipal solid waste (MSW) in the context of India and Shimla city. The main components of solid waste as well as the challenges of Shimla city are elaborated. Further, a technology-driven state-of-the-art architecture for end-to-end smart waste management has been proposed. This proposed architecture for the Shimla smart city with the deployment of a citywide array of IoT sensors aims to overcome the limitations of the traditional waste management system. Finally, the paper is concluded with some future suggestions.
{"title":"Challenges and Proposed Architecture of Municipal Solid Waste in Context of Hilly Terrain Shimla City, India","authors":"M. Pal, Munish Bhatia","doi":"10.1109/ICCS54944.2021.00043","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00043","url":null,"abstract":"Shimla hilly city dubbed as ‘Queen of Hills’ and is the most populated city in the State of Himachal Pradesh, lies in the Indian Himalayan region. It is a prominent hill station and tourist destination in India with an elevation of 2397.59 meters above mean sea level. Although Shimla has ranked first among 62 cities with a population under a million in the 2020 Ease of Living Index. However, Unplanned and short-term developmental plans increase urbanization and have led to tons of solid waste, due this solid waste has become a challengeable issue. The rising generation trend of garbage can create acute health problems and a very unpleasant living environment that could ruin the beauty of Hill Queen. The waste generation/collection per capita is 350g/day in Shimla city. The waste problems in hilly and plain cities differ due to the different topography of hilly terrain, which is described by steep mountains, steep terrain, deep valleys, traffic congestion, and narrow roads. This paper begins with a brief status of municipal solid waste (MSW) in the context of India and Shimla city. The main components of solid waste as well as the challenges of Shimla city are elaborated. Further, a technology-driven state-of-the-art architecture for end-to-end smart waste management has been proposed. This proposed architecture for the Shimla smart city with the deployment of a citywide array of IoT sensors aims to overcome the limitations of the traditional waste management system. Finally, the paper is concluded with some future suggestions.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126553659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00054
Seerat Choudhary, Jyoti Godara
Sentiment research on social media provides businesses with a quick and easy way to track public opinion about their brand, business, directors, and other topics. In recent years, a variety of features and approaches for training sentiment classifiers on datasets have been investigated, with mixed results. In this research, we have proposed an approach for detecting emotion in text and predicting sentiment using semantics as extra characteristics for various datasets and a study on present methods for opinion mining like machine learning and lexicon-based methods.
{"title":"Semantic Analysis on Social Media","authors":"Seerat Choudhary, Jyoti Godara","doi":"10.1109/ICCS54944.2021.00054","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00054","url":null,"abstract":"Sentiment research on social media provides businesses with a quick and easy way to track public opinion about their brand, business, directors, and other topics. In recent years, a variety of features and approaches for training sentiment classifiers on datasets have been investigated, with mixed results. In this research, we have proposed an approach for detecting emotion in text and predicting sentiment using semantics as extra characteristics for various datasets and a study on present methods for opinion mining like machine learning and lexicon-based methods.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126707787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00042
Avneet Kaur, Munish Bhatia
Research and development, the 2 intimately connected processes progress through innovative new ideas and by introducing new products and services. The word smart education was introduced to describe an advancement in education backed up by smart technology. Moreover, the development in Information and Communication Technology (ICT) have accelerated global efforts toward the idea of boosting smart education. This pace has resulted in increasing research output and interest from many sectors in the field of ICT assisted education. The significant popularity of this domain necessitates a quantitative analysis in order to comprehend its evolution, progress, and current state. In this research, we conducted a complete literature review to learn how this term is used, what technologies are involved, and what assurances are offered. While the term is ambiguous, we conclude that there are currently several innovations accessible that can make educational technology significantly more flexible to the learner and hence underlie learning in a more intelligent manner.
{"title":"Smart Education: A Systematic Survey and Future Research Directions","authors":"Avneet Kaur, Munish Bhatia","doi":"10.1109/ICCS54944.2021.00042","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00042","url":null,"abstract":"Research and development, the 2 intimately connected processes progress through innovative new ideas and by introducing new products and services. The word smart education was introduced to describe an advancement in education backed up by smart technology. Moreover, the development in Information and Communication Technology (ICT) have accelerated global efforts toward the idea of boosting smart education. This pace has resulted in increasing research output and interest from many sectors in the field of ICT assisted education. The significant popularity of this domain necessitates a quantitative analysis in order to comprehend its evolution, progress, and current state. In this research, we conducted a complete literature review to learn how this term is used, what technologies are involved, and what assurances are offered. While the term is ambiguous, we conclude that there are currently several innovations accessible that can make educational technology significantly more flexible to the learner and hence underlie learning in a more intelligent manner.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"97 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128954001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00020
Syed Ishfaq Manzoor, Jimmy Singla
Nowadays, the recognition of patterns by artificial intelligence algorithms based on artificial neural networks is one of the broadest and most developed areas of study in the computer industry. With this study, a solution is proposed to the problem of recognizing handwritten textual information for statistical purposes based on the recognition of natural text by means of artificial neural networks. The system has been programmed to be able to acquire information from a scanner, digital camera, Pad or from a file, which gives it flexibility with potential users. This work presents the development of a computer system that allows the recognition of handwritten text based on image processing techniques, artificial intelligence, artificial neural networks, and pattern recognition for natural and handwritten text recognition systems. In the proposed system the handwritten text is recognized with precision of 0.81 or higher
{"title":"A Novel System for Image Text Recognition and Classification using Deep Learning","authors":"Syed Ishfaq Manzoor, Jimmy Singla","doi":"10.1109/ICCS54944.2021.00020","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00020","url":null,"abstract":"Nowadays, the recognition of patterns by artificial intelligence algorithms based on artificial neural networks is one of the broadest and most developed areas of study in the computer industry. With this study, a solution is proposed to the problem of recognizing handwritten textual information for statistical purposes based on the recognition of natural text by means of artificial neural networks. The system has been programmed to be able to acquire information from a scanner, digital camera, Pad or from a file, which gives it flexibility with potential users. This work presents the development of a computer system that allows the recognition of handwritten text based on image processing techniques, artificial intelligence, artificial neural networks, and pattern recognition for natural and handwritten text recognition systems. In the proposed system the handwritten text is recognized with precision of 0.81 or higher","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"339 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125795102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00037
M. Jha, Anand C S, Yogesh Mahawar, Uday Kalyan, Vikas Verma
Looking at the current scenario of 21st century, people have revolutionized their daily life and activities with the help of internet and digitalization. As the digital era is advancing and getting more digitalized, the cyber space is often targeted to attacks in an unethical way for illegal benefits. The sudden spike in cyber-attacks has led to creation of cyber rules and regulations. The cunningness and effective attack by attackers make it nearly impossible to trace back the attacker. In this paper, a rigorous review has been conducted on cyber-crime, fundamental terminologies used in cyber, related laws and guidelines to be more secure on cyber space.
{"title":"Cyber Security: Terms, Laws, Threats and Protection","authors":"M. Jha, Anand C S, Yogesh Mahawar, Uday Kalyan, Vikas Verma","doi":"10.1109/ICCS54944.2021.00037","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00037","url":null,"abstract":"Looking at the current scenario of 21st century, people have revolutionized their daily life and activities with the help of internet and digitalization. As the digital era is advancing and getting more digitalized, the cyber space is often targeted to attacks in an unethical way for illegal benefits. The sudden spike in cyber-attacks has led to creation of cyber rules and regulations. The cunningness and effective attack by attackers make it nearly impossible to trace back the attacker. In this paper, a rigorous review has been conducted on cyber-crime, fundamental terminologies used in cyber, related laws and guidelines to be more secure on cyber space.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128171126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00014
Gazi Imtiyaz Ahmad, Jimmy Singla
The arrival of web 2.0 platforms and increasing usage of social networking sites have proliferated social media content on the web. These platforms also provides multilingual interface to allow people to write freely in their native language. Over the past few decades, a new phenomenon called code-mixing has been observed in social media data which has attracted attention of researchers in sociolinguists and Natural Language Processing domains. However, due to informal nature of the text present in code-mixing phenomenon, there are a number of challenges ranging from data extraction to summarization. Sentiment Analysis of code-mixed data is a key research field which has emerged in the recent past. NLP researchers aim to provide natural language processing (NLP) tools that can collect, analyzed, evaluate, and summarize code-mixed data. The researchers had to deal with dataset construction, preprocessing, annotation, language identification, feature extraction, feature selection, and sentiment classification when it came to sentiment analysis of Code-mixed Social Media Text. This paper provides an overview of work carried out in sentiment analysis of code-mixed Indian languages textual data.
web 2.0平台的到来和社交网站的日益普及使得网络上的社交媒体内容激增。这些平台还提供多语言界面,让人们可以用自己的母语自由写作。在过去的几十年里,社交媒体数据中出现了一种被称为代码混合的新现象,引起了社会语言学家和自然语言处理领域的研究人员的关注。然而,由于代码混合现象中存在的文本的非正式性质,从数据提取到摘要都存在许多挑战。代码混合数据的情感分析是近年来兴起的一个重点研究领域。NLP研究者的目标是提供自然语言处理(NLP)工具来收集、分析、评估和总结代码混合数据。在对代码混合社交媒体文本进行情感分析时,研究人员必须处理数据集构建、预处理、注释、语言识别、特征提取、特征选择和情感分类等问题。本文概述了在码混合印度语言文本数据情感分析方面所做的工作。
{"title":"Sentiment Analysis of Code-Mixed Social Media Text (SA-CMSMT) in Indian-Languages","authors":"Gazi Imtiyaz Ahmad, Jimmy Singla","doi":"10.1109/ICCS54944.2021.00014","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00014","url":null,"abstract":"The arrival of web 2.0 platforms and increasing usage of social networking sites have proliferated social media content on the web. These platforms also provides multilingual interface to allow people to write freely in their native language. Over the past few decades, a new phenomenon called code-mixing has been observed in social media data which has attracted attention of researchers in sociolinguists and Natural Language Processing domains. However, due to informal nature of the text present in code-mixing phenomenon, there are a number of challenges ranging from data extraction to summarization. Sentiment Analysis of code-mixed data is a key research field which has emerged in the recent past. NLP researchers aim to provide natural language processing (NLP) tools that can collect, analyzed, evaluate, and summarize code-mixed data. The researchers had to deal with dataset construction, preprocessing, annotation, language identification, feature extraction, feature selection, and sentiment classification when it came to sentiment analysis of Code-mixed Social Media Text. This paper provides an overview of work carried out in sentiment analysis of code-mixed Indian languages textual data.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00057
Neha Sehrawat, Sahil Vashisht, Navdeep Kaur
The commencement of extensive applications of Internet of Things devices in information technology is generating massive amounts of data. The deployment of various Internet of Things devices/sensors within the complex interconnected networks gives rise to raw data from sensors, processed and controlled data, decision-making data providing intelligent solutions, etc. Internet of Things offers a common platform (called IoT cloud) for all the networks and devices connected to those networks. The analytics can be performed on data, and valuable information can be extracted. Massive data traffic generated by Internet of Things sensors and related processing poses an overwhelming load and cost on Internet of Things cloud related to bandwidth, latency and resource scarcity. This, in turn, degrades the quality of service and network performance. To cope with such issues, Edge Computing paradigms came into existence, extending the cloud storage capacity and computational resources close to specific Internet of Things devices. However, EC assisted Internet of Things to reduce the volume of data transition over the cloud but continued with significant risks associated with security and privacy. Moreover, the expansion of service requirements triggers security and efficiency issues.
{"title":"Edge-Computing Paradigm: Survey and Analysis on security Threads","authors":"Neha Sehrawat, Sahil Vashisht, Navdeep Kaur","doi":"10.1109/ICCS54944.2021.00057","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00057","url":null,"abstract":"The commencement of extensive applications of Internet of Things devices in information technology is generating massive amounts of data. The deployment of various Internet of Things devices/sensors within the complex interconnected networks gives rise to raw data from sensors, processed and controlled data, decision-making data providing intelligent solutions, etc. Internet of Things offers a common platform (called IoT cloud) for all the networks and devices connected to those networks. The analytics can be performed on data, and valuable information can be extracted. Massive data traffic generated by Internet of Things sensors and related processing poses an overwhelming load and cost on Internet of Things cloud related to bandwidth, latency and resource scarcity. This, in turn, degrades the quality of service and network performance. To cope with such issues, Edge Computing paradigms came into existence, extending the cloud storage capacity and computational resources close to specific Internet of Things devices. However, EC assisted Internet of Things to reduce the volume of data transition over the cloud but continued with significant risks associated with security and privacy. Moreover, the expansion of service requirements triggers security and efficiency issues.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130055822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-12-01DOI: 10.1109/ICCS54944.2021.00017
D. Krithika, K. Rohini
Heart attack is leading cause of death. In our body heart is hardest working organ. Risk factors for future cardiovascular is people with high cholesterol, high blood pressure, diabetes, strong family history. Heart attack is primarily caused by lifestyle. CAD is coronary arteries blood vessels supply oxygen and blood to the heart.it is almost cause of death worldwide. Coronary arteries normally happen when deposition of cholesterol accumulate artery walls creating plaques. Arteries being tighten and difficult to blood flow to the heart. It also causes blood clots of rhombus totally occludes blood flow, when a blockage occur it is called coronary occlusion. So, blockages are occlusion (myocardial infarction) of heart attack. contraction of heart muscle suddenly stopped. Blood viscosity is important role to maintain vascular homeostasis. Hematocrit is the packed cell volume (pcv) of blood. Few machine learning algorithms applied to large amount of data and accuracy checked. The proposed model is CVD prediction using Extreme Gradient Boost, DT, KNN, SVM, Naïve bayes, Random forest, ANN, Hyper parameter tunned random forest Algorithm.
{"title":"Ensemble Based Prediction of Cardiovascular Disease Using Bigdata analytics","authors":"D. Krithika, K. Rohini","doi":"10.1109/ICCS54944.2021.00017","DOIUrl":"https://doi.org/10.1109/ICCS54944.2021.00017","url":null,"abstract":"Heart attack is leading cause of death. In our body heart is hardest working organ. Risk factors for future cardiovascular is people with high cholesterol, high blood pressure, diabetes, strong family history. Heart attack is primarily caused by lifestyle. CAD is coronary arteries blood vessels supply oxygen and blood to the heart.it is almost cause of death worldwide. Coronary arteries normally happen when deposition of cholesterol accumulate artery walls creating plaques. Arteries being tighten and difficult to blood flow to the heart. It also causes blood clots of rhombus totally occludes blood flow, when a blockage occur it is called coronary occlusion. So, blockages are occlusion (myocardial infarction) of heart attack. contraction of heart muscle suddenly stopped. Blood viscosity is important role to maintain vascular homeostasis. Hematocrit is the packed cell volume (pcv) of blood. Few machine learning algorithms applied to large amount of data and accuracy checked. The proposed model is CVD prediction using Extreme Gradient Boost, DT, KNN, SVM, Naïve bayes, Random forest, ANN, Hyper parameter tunned random forest Algorithm.","PeriodicalId":340594,"journal":{"name":"2021 International Conference on Computing Sciences (ICCS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130833446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}