首页 > 最新文献

2022 6th International Conference on Computing Methodologies and Communication (ICCMC)最新文献

英文 中文
D-Eazy Donation Platform – An Artificial Intelligence and Video based Mobile Application D-Eazy捐赠平台-一个基于人工智能和视频的移动应用程序
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753693
Manan Khanna, Dhruv Pathak
About 9.2% of the world, or 689 million people, live in extreme Poverty according to the World Bank. The social agencies or trusts are limited in their capability and coverage to help these underprivileged people for food and main essentials. This paper focuses on the solution which enables mass Donors to seamlessly connect to recipients or Point-of-Contacts (PoCs) for easily donating food and essentials to underprivileged people while sitting at their homes/places. The solution introduces a Video-based Mobile App Platform that can be used by Donors anytime from anywhere to post and schedule their donations. Recipients directly or through agencies/organizations' PoCs are notified of the scheduled donations and pick-up/drop can be arranged internally or through 3rd party pick-up agencies. One of the other key features is SOS (emergency alert). If any poor person or family needs urgent help in terms of expensive medicines, blood, etc., this platform can be used by recipient PoCs to trigger SOS which will be received by all the people registered to this platform and hence can offer help immediately. The Application platform is designed and developed with frontend user interface in React Native/JavaScript and backend server in Python/Django. The application offers AI based Donation Prediction Engine (AIDPE) for adaptive video upload/upload processing and efficient PoC allocation based on multiple factors.
根据世界银行的数据,世界上约有9.2%的人,即6.89亿人生活在极端贫困中。社会机构或信托在帮助这些贫困人口获得食物和主要必需品方面的能力和覆盖范围有限。本文重点介绍了一种解决方案,该解决方案使大规模捐助者能够与接受者或联络点(PoCs)无缝连接,以便坐在贫困人口的家中/地方轻松地向他们捐赠食物和必需品。该解决方案引入了一个基于视频的移动应用平台,捐赠者可以随时随地发布和安排他们的捐赠。直接或通过机构/组织的poc通知收件人预定的捐赠,可在内部或通过第三方接收机构安排领取/投递。另一个关键功能是SOS(紧急警报)。如果任何贫困的人或家庭在昂贵的药品、血液等方面需要紧急帮助,接受者PoCs可以使用该平台触发SOS,所有在该平台注册的人都会收到SOS,因此可以立即提供帮助。应用平台的前端用户界面使用React Native/JavaScript,后端服务器使用Python/Django进行设计和开发。该应用程序提供基于人工智能的捐赠预测引擎(AIDPE),用于自适应视频上传/上传处理和基于多因素的高效PoC分配。
{"title":"D-Eazy Donation Platform – An Artificial Intelligence and Video based Mobile Application","authors":"Manan Khanna, Dhruv Pathak","doi":"10.1109/ICCMC53470.2022.9753693","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753693","url":null,"abstract":"About 9.2% of the world, or 689 million people, live in extreme Poverty according to the World Bank. The social agencies or trusts are limited in their capability and coverage to help these underprivileged people for food and main essentials. This paper focuses on the solution which enables mass Donors to seamlessly connect to recipients or Point-of-Contacts (PoCs) for easily donating food and essentials to underprivileged people while sitting at their homes/places. The solution introduces a Video-based Mobile App Platform that can be used by Donors anytime from anywhere to post and schedule their donations. Recipients directly or through agencies/organizations' PoCs are notified of the scheduled donations and pick-up/drop can be arranged internally or through 3rd party pick-up agencies. One of the other key features is SOS (emergency alert). If any poor person or family needs urgent help in terms of expensive medicines, blood, etc., this platform can be used by recipient PoCs to trigger SOS which will be received by all the people registered to this platform and hence can offer help immediately. The Application platform is designed and developed with frontend user interface in React Native/JavaScript and backend server in Python/Django. The application offers AI based Donation Prediction Engine (AIDPE) for adaptive video upload/upload processing and efficient PoC allocation based on multiple factors.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"20 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133043170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Epileptic Seizure Detection using Two-Layer Feature Extraction and Hyper-Parameter Optimization 基于双层特征提取和超参数优化的癫痫发作检测
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753964
P. S, B. P, V. S, Sasmita. K
Epileptic seizures happen owing to anarchy in intellect functionality that can influence patient's physical condition. Finding of epileptic seizures inception is fairly valuable for medication and emergency alerts. Machine learning techniques and computational methods play a key part in detecting epileptic seizures from Electroencephalograms (EEG) signals. The main objective of this work is to provide an ANN framework with optimized performance related to seizure detection. Here, a machine learning framework is employed for seizure detection where the two-layer feature extraction with ANN classifiers are used to categorize seizure and non-seizure data. To get better performance, the best parameters related to ANN with the dataset are identified through bayes-optimization method. This model affords a trustworthy feature extraction and optimization for training a detection model. The proposed model is evaluated using the popular public dataset CHB-MIT.
癫痫发作的发生是由于智力功能混乱,影响患者的身体状况。发现癫痫发作初期对药物治疗和紧急警报相当有价值。机器学习技术和计算方法在从脑电图(EEG)信号检测癫痫发作中起着关键作用。这项工作的主要目标是提供一个与癫痫检测相关的性能优化的ANN框架。在这里,机器学习框架被用于癫痫检测,其中两层特征提取与人工神经网络分类器被用于对癫痫和非癫痫数据进行分类。为了获得更好的性能,通过贝叶斯优化方法识别与数据集相关的最佳人工神经网络参数。该模型为训练检测模型提供了可靠的特征提取和优化。使用流行的公共数据集CHB-MIT对所提出的模型进行了评估。
{"title":"Epileptic Seizure Detection using Two-Layer Feature Extraction and Hyper-Parameter Optimization","authors":"P. S, B. P, V. S, Sasmita. K","doi":"10.1109/ICCMC53470.2022.9753964","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753964","url":null,"abstract":"Epileptic seizures happen owing to anarchy in intellect functionality that can influence patient's physical condition. Finding of epileptic seizures inception is fairly valuable for medication and emergency alerts. Machine learning techniques and computational methods play a key part in detecting epileptic seizures from Electroencephalograms (EEG) signals. The main objective of this work is to provide an ANN framework with optimized performance related to seizure detection. Here, a machine learning framework is employed for seizure detection where the two-layer feature extraction with ANN classifiers are used to categorize seizure and non-seizure data. To get better performance, the best parameters related to ANN with the dataset are identified through bayes-optimization method. This model affords a trustworthy feature extraction and optimization for training a detection model. The proposed model is evaluated using the popular public dataset CHB-MIT.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133809657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Attack Detection And Classification using ANN Algorithm 基于ANN算法的网络攻击检测与分类
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753934
D. Akhil Reddy, V. Puneet, S. Siva Rama Krishna, S. Kranthi
Advancement of computer networktechnology and the IT business lead to new security issues in networks emerge on a regular basis, making it increasingly difficult to ignore. How to successfully prevent dangerous network hackers from invading, so that network systems and computers are safe and regular functioning, is a critical job for today's network administrators. In recent decades, network security has become increasingly important due to the rapid growth of the Internet and the growing number of users. Intrusion detection systems (IDSs), which attempt to maintain the maximum level of security, have recently become one of the most popular research subjects in network security. Deep learning neural network is used to extract features of network monitoring data, and classify intrusion types. The method will be validated using KDD CUP’99 dataset or any other relevant dataset. The results will be compared with other algorithms to show that the proposed method has a significant improvement over the traditional machine learning model accuracies.
随着计算机网络技术和IT业务的发展,新的网络安全问题层出不穷,越来越不容忽视。如何成功地防止危险的网络黑客入侵,使网络系统和计算机安全正常运行,是当今网络管理员的重要工作。近几十年来,由于互联网的快速发展和用户数量的不断增加,网络安全变得越来越重要。入侵检测系统(Intrusion detection system, ids)是近年来网络安全领域研究的热点之一。利用深度学习神经网络提取网络监控数据的特征,并对入侵类型进行分类。该方法将使用KDD CUP ' 99数据集或任何其他相关数据集进行验证。将结果与其他算法进行比较,表明所提出的方法比传统的机器学习模型精度有显著提高。
{"title":"Network Attack Detection And Classification using ANN Algorithm","authors":"D. Akhil Reddy, V. Puneet, S. Siva Rama Krishna, S. Kranthi","doi":"10.1109/ICCMC53470.2022.9753934","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753934","url":null,"abstract":"Advancement of computer networktechnology and the IT business lead to new security issues in networks emerge on a regular basis, making it increasingly difficult to ignore. How to successfully prevent dangerous network hackers from invading, so that network systems and computers are safe and regular functioning, is a critical job for today's network administrators. In recent decades, network security has become increasingly important due to the rapid growth of the Internet and the growing number of users. Intrusion detection systems (IDSs), which attempt to maintain the maximum level of security, have recently become one of the most popular research subjects in network security. Deep learning neural network is used to extract features of network monitoring data, and classify intrusion types. The method will be validated using KDD CUP’99 dataset or any other relevant dataset. The results will be compared with other algorithms to show that the proposed method has a significant improvement over the traditional machine learning model accuracies.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130302253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Full Duplex Self Interference Managing Approaches 全双工自干扰管理方法研究
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753803
G. L. Salvin, J. Arul Linsely, I. Kathīr
This manuscript presents a complete study of self-interference(SI) managing plans needed to accomplish a full duplex (FD) broadcasting in wireless networks. A FD is regularly alluded to as in-band FD approach have arisen as an intriguing answer for the subsequently invention movable networks in mobile environments anywhere the shortage of accessible broadcasting signal is a significant concern. Despite the fact that reviews on the alleviation of self-interference have been recorded in the study, all encompassing effort to introduce not simply the different strategies accessible for dealing with self-interference that emerges when a FD equipment is empowered, as an overview, however it likewise examines other methodologies hindrances that considerably influence the self-interference for satellite propagation. The overview gives a scientific classification of self-interference demonstrates through examinations the qualities and restrictions of different self- interference. Significantly, the reviews sums up the study, identifies and unwrap research difficulty and important study intended for upcoming. This study is proposed to exist a lead and obtain inedible spot for additional effort on SI to accomplish FD propagation in portable environments, with assorted environments, that is verifiably the Internet of things to come remote frameworks.
本文提出了一个完整的研究自干扰(SI)管理计划需要完成一个全双工(FD)广播在无线网络。FD通常被称为带内FD方法,作为随后发明的移动环境中的移动网络的有趣答案而出现,在任何地方缺乏可访问的广播信号是一个重大问题。尽管在研究中已经记录了关于减轻自干扰的评论,但作为概述,所有的努力不仅介绍了处理FD设备授权时出现的自干扰的不同策略,而且还研究了对卫星传播的自干扰有很大影响的其他方法障碍。概述了自干扰的科学分类,并通过对各种自干扰的性质和限制条件的考察进行了论证。重要的是,综述总结了研究,确定并揭示了研究难点和未来研究的重点。本研究旨在为SI在可移植环境中完成FD传播的额外努力提供一个领先和不可缺少的位置,具有各种环境,这是可验证的物联网未来的远程框架。
{"title":"A Study on Full Duplex Self Interference Managing Approaches","authors":"G. L. Salvin, J. Arul Linsely, I. Kathīr","doi":"10.1109/ICCMC53470.2022.9753803","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753803","url":null,"abstract":"This manuscript presents a complete study of self-interference(SI) managing plans needed to accomplish a full duplex (FD) broadcasting in wireless networks. A FD is regularly alluded to as in-band FD approach have arisen as an intriguing answer for the subsequently invention movable networks in mobile environments anywhere the shortage of accessible broadcasting signal is a significant concern. Despite the fact that reviews on the alleviation of self-interference have been recorded in the study, all encompassing effort to introduce not simply the different strategies accessible for dealing with self-interference that emerges when a FD equipment is empowered, as an overview, however it likewise examines other methodologies hindrances that considerably influence the self-interference for satellite propagation. The overview gives a scientific classification of self-interference demonstrates through examinations the qualities and restrictions of different self- interference. Significantly, the reviews sums up the study, identifies and unwrap research difficulty and important study intended for upcoming. This study is proposed to exist a lead and obtain inedible spot for additional effort on SI to accomplish FD propagation in portable environments, with assorted environments, that is verifiably the Internet of things to come remote frameworks.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130348447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Big Data Analysis and Mining Technology of Smart Grid Based on Privacy Protection 基于隐私保护的智能电网大数据分析与挖掘技术
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753721
Mei Wang
Aiming at the big data security and privacy protection issues in the smart grid, the current key technologies for big data security and privacy protection in smart grids are sorted out, and a privacy-protecting smart grid association rule is proposed according to the privacy-protecting smart grid big data analysis and mining technology route The mining plan specifically analyzes the risk factors in the operation of the new power grid, and discusses the information security of power grid users from the perspective of the user, focusing on the protection of privacy and security, using safe multi-party calculation of the support and confidence of the association rules. Privacy-protecting smart grid big data mining enables power companies to improve service quality to 7.5% without divulging customer private information.
针对智能电网中大数据安全和隐私保护问题,梳理了当前智能电网中大数据安全和隐私保护的关键技术,并根据隐私保护智能电网大数据分析挖掘技术路线,提出了隐私保护智能电网关联规则,挖掘方案具体分析了新电网运行中的风险因素;并从用户的角度讨论了电网用户的信息安全问题,重点关注隐私和安全的保护,采用安全多方计算的支持度和置信度的关联规则。保护隐私的智能电网大数据挖掘,使电力公司在不泄露客户隐私信息的情况下,将服务质量提高到7.5%。
{"title":"Big Data Analysis and Mining Technology of Smart Grid Based on Privacy Protection","authors":"Mei Wang","doi":"10.1109/ICCMC53470.2022.9753721","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753721","url":null,"abstract":"Aiming at the big data security and privacy protection issues in the smart grid, the current key technologies for big data security and privacy protection in smart grids are sorted out, and a privacy-protecting smart grid association rule is proposed according to the privacy-protecting smart grid big data analysis and mining technology route The mining plan specifically analyzes the risk factors in the operation of the new power grid, and discusses the information security of power grid users from the perspective of the user, focusing on the protection of privacy and security, using safe multi-party calculation of the support and confidence of the association rules. Privacy-protecting smart grid big data mining enables power companies to improve service quality to 7.5% without divulging customer private information.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124503760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
FPGA Implementation of High-Performance Montgomery Modular Multiplication with Adaptive Hold Logic 具有自适应保持逻辑的高性能蒙哥马利模乘法的FPGA实现
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9754043
Bharath Naidu Vangapandu, Anu Chalil
This paper provides an efficient Montgomery modular multiplication technique, such as high-performance Montgomery modular multiplier, which is the most important arithmetic functional unit. The throughput of this multiplier is critical to the overall performance of these digital multiplication systems, which is measured in bits per second. The suggested work in this study proposes a Montgomery modular multiplier architecture that incorporates a unique adaptive hold logic (AHL) circuit to achieve a high level of performance. Because by the variable latency, the multiplier can deliver increased throughput while also adjusting the AHL circuit to prevent performance decline caused by the aging aware effect. Therefore, this proposed multiplier was developed using Verilog HDL and Synthesized in a Xilinx FPGA, which reduced the number of clock cycles required for operand pre-computation and conversion of format. As a result, high throughput can be achieved by hiding the additional clock cycles required for operand pre-computation and conversion of format. According to the experimental findings, our suggested design with 32-bit multipliers may provide up to a significant performance boost when compared to current 32-bit Montgomery Multipliers in terms of speed and efficiency.
本文提出了一种高效的蒙哥马利模乘法技术,即高性能蒙哥马利模乘法器,它是最重要的算术函数单元。该乘法器的吞吐量对这些数字乘法系统的整体性能至关重要,其以每秒比特数为单位进行测量。本研究建议的工作提出了Montgomery模块化乘法器架构,该架构包含独特的自适应保持逻辑(AHL)电路,以实现高水平的性能。因为通过可变延迟,乘法器可以提供更高的吞吐量,同时还可以调整AHL电路,以防止老化感知效应引起的性能下降。因此,采用Verilog HDL开发了该乘法器,并在Xilinx FPGA中进行了合成,减少了操作数预计算和格式转换所需的时钟周期数。因此,可以通过隐藏操作数预计算和格式转换所需的额外时钟周期来实现高吞吐量。根据实验结果,与目前的32位Montgomery乘法器相比,我们建议的32位乘法器设计在速度和效率方面可以提供显著的性能提升。
{"title":"FPGA Implementation of High-Performance Montgomery Modular Multiplication with Adaptive Hold Logic","authors":"Bharath Naidu Vangapandu, Anu Chalil","doi":"10.1109/ICCMC53470.2022.9754043","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754043","url":null,"abstract":"This paper provides an efficient Montgomery modular multiplication technique, such as high-performance Montgomery modular multiplier, which is the most important arithmetic functional unit. The throughput of this multiplier is critical to the overall performance of these digital multiplication systems, which is measured in bits per second. The suggested work in this study proposes a Montgomery modular multiplier architecture that incorporates a unique adaptive hold logic (AHL) circuit to achieve a high level of performance. Because by the variable latency, the multiplier can deliver increased throughput while also adjusting the AHL circuit to prevent performance decline caused by the aging aware effect. Therefore, this proposed multiplier was developed using Verilog HDL and Synthesized in a Xilinx FPGA, which reduced the number of clock cycles required for operand pre-computation and conversion of format. As a result, high throughput can be achieved by hiding the additional clock cycles required for operand pre-computation and conversion of format. According to the experimental findings, our suggested design with 32-bit multipliers may provide up to a significant performance boost when compared to current 32-bit Montgomery Multipliers in terms of speed and efficiency.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124914292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Association Rule Mining from Distributed Medical Database for Predicting Heart Disease 分布式医学数据库中一种有效的关联规则挖掘方法用于心脏病预测
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753720
Aswin Kumar.K, S. Gowri, John Wilifred David .J, Y. Bevish Jinila
Naïve Bayes classification categorization in machine learning is employed to check the patient's entire heart illness in this proposed work. As a result, the percentage of patients that contract disease as both positive and negative data is used. Most database management systems and desktop analytics and visualization applications make working with big data difficult. As a result of this machine learning can be employed from the standpoint of data mining, and the proposal displays a machine learning methodology. The classifiers are used to process heart percentages, and the results are given as a confusion matrix. In the presence of a training dataset, a unique classification strategy is introduced that can effectively increase classification performance. Heart disease stent diagnostic In addition, the generated method has a high identification of rates, making It's a useful tool for junior cardiologists to check the cardio vascular patients with a high risk for certain diseases and refer them to expert cardiologists for further evaluation.
Naïve本工作采用机器学习中的贝叶斯分类分类来检查患者的整个心脏疾病。因此,将患病患者的百分比作为阳性和阴性数据加以使用。大多数数据库管理系统和桌面分析和可视化应用程序使处理大数据变得困难。因此,机器学习可以从数据挖掘的角度使用,并且该提案展示了一种机器学习方法。分类器用于处理心脏百分比,并将结果作为混淆矩阵给出。在存在训练数据集的情况下,引入了一种独特的分类策略,可以有效地提高分类性能。此外,所生成的方法具有较高的识别率,可以为初级心脏病专家检查某些疾病的高危心血管患者,并将其转诊给心脏病专家进一步评估提供有用的工具。
{"title":"An Efficient Association Rule Mining from Distributed Medical Database for Predicting Heart Disease","authors":"Aswin Kumar.K, S. Gowri, John Wilifred David .J, Y. Bevish Jinila","doi":"10.1109/ICCMC53470.2022.9753720","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753720","url":null,"abstract":"Naïve Bayes classification categorization in machine learning is employed to check the patient's entire heart illness in this proposed work. As a result, the percentage of patients that contract disease as both positive and negative data is used. Most database management systems and desktop analytics and visualization applications make working with big data difficult. As a result of this machine learning can be employed from the standpoint of data mining, and the proposal displays a machine learning methodology. The classifiers are used to process heart percentages, and the results are given as a confusion matrix. In the presence of a training dataset, a unique classification strategy is introduced that can effectively increase classification performance. Heart disease stent diagnostic In addition, the generated method has a high identification of rates, making It's a useful tool for junior cardiologists to check the cardio vascular patients with a high risk for certain diseases and refer them to expert cardiologists for further evaluation.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125281520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lung Cancer Prediction using Extended KNN Algorithm 基于扩展KNN算法的肺癌预测
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753689
E. Ajitha, B. Diwan, M. Roshini
Among several different types of cancer the one that causes high mortality in every country is lung carcinoma. The possibility of survival from this deadly disease can be enhanced by identifying cancer at an early stage. This paper focuses on an Extended version of the KNN Algorithm that is used for the prediction of lung carcinoma based on the Computed Tomography (CT) - Images given as the input. The 2-D image undergoes a Modified Gabor Filtration technique wherein the images are used to extract the features for Edge Detection. This further undergoes Feature Extraction followed by Binarization which is fed as Production data to the Machine Learning model. Based on the Extended KNN Algorithm, the model evaluates the testing data and corresponding predictions are made. The model predicts the Cancer Stage based on the input CT - Image which is passed to the doctor for further medication.
在几种不同类型的癌症中,在每个国家造成高死亡率的癌症是肺癌。通过在早期阶段发现癌症,可以提高从这种致命疾病中存活的可能性。本文主要研究KNN算法的扩展版本,该算法用于基于计算机断层扫描(CT)图像作为输入的肺癌预测。二维图像经过改进的Gabor过滤技术,其中图像用于提取边缘检测的特征。这进一步经历了特征提取,然后是二值化,作为生产数据提供给机器学习模型。该模型基于扩展KNN算法对测试数据进行评估,并做出相应的预测。该模型根据输入的CT图像预测癌症的分期,并将其传递给医生进行进一步的治疗。
{"title":"Lung Cancer Prediction using Extended KNN Algorithm","authors":"E. Ajitha, B. Diwan, M. Roshini","doi":"10.1109/ICCMC53470.2022.9753689","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753689","url":null,"abstract":"Among several different types of cancer the one that causes high mortality in every country is lung carcinoma. The possibility of survival from this deadly disease can be enhanced by identifying cancer at an early stage. This paper focuses on an Extended version of the KNN Algorithm that is used for the prediction of lung carcinoma based on the Computed Tomography (CT) - Images given as the input. The 2-D image undergoes a Modified Gabor Filtration technique wherein the images are used to extract the features for Edge Detection. This further undergoes Feature Extraction followed by Binarization which is fed as Production data to the Machine Learning model. Based on the Extended KNN Algorithm, the model evaluates the testing data and corresponding predictions are made. The model predicts the Cancer Stage based on the input CT - Image which is passed to the doctor for further medication.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134126104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Binary descriptors for Copy-Move Forgery Detection in Digital Photographs 用于数字照片复制-移动伪造检测的二进制描述符
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9753970
S. Velmurugan, T. Subashini
Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.
如今,图像取证是一个新兴的领域,其目的是验证图像的可信度。随着图像编辑工具的不断完善,人们可以通过多种方式伪造图像,本文所研究的复制-移动(CM)伪造就是其中之一。CM伪造通过复制图像的一部分并将其粘贴到类似图像中的不同位置来修改图像的内容。欺诈者,为了掩盖欺诈行为,欺骗人眼,有时会做一些后处理操作,如旋转、缩放、多重CM等。目前广泛使用的基于块的CM伪造检测方法对仿射变换的鲁棒性不足,对缩放、旋转和噪声的影响也不稳定。为此,本文提出了基于BRISK和ORB描述符的基于关键点的CM伪造检测方法,用于检测数字图像中的CM伪造。本文提出的方法依赖于blob,使用DoG算子进行检测,从中提取出BRISK和ORB特征。利用汉明距离度量对提取的特征进行匹配,找到相似的关键点来识别CM区域。这项工作是在Python中实现的,并在其中使用合成图像来分析和比较所提出技术的有效性。实验结果表明,该方法对多cm攻击和几何变换(旋转和缩放)都是有效的。虽然这两种方法都能够有效地检测CM伪造,但ORB的执行速度比BRISK快。
{"title":"Binary descriptors for Copy-Move Forgery Detection in Digital Photographs","authors":"S. Velmurugan, T. Subashini","doi":"10.1109/ICCMC53470.2022.9753970","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9753970","url":null,"abstract":"Today, image forensic is an emerging area which aims at authenticating the credibility of an image. Sophisticating image editing tools make it easy to forge images in different ways and one amongst them is copy-move (CM) forgery which is considered in this paper. CM forgery modifies the content of an image by copying a portion of an image and pasting it in a distinct location in the similar image. Fraudsters, in order to conceal the fraud and to deceive the human eyes, sometimes do some post-processing operations such as rotation, scaling, multiple CM, etc. The widely used block-based methods for CM forgery detection are not robust enough to affine transformation and are not invariant to scaling, rotation, and noise. So, in this work, key-point-based CM forgery detection methods based on BRISK and ORB descriptors are proposed for detecting CM forgeries in digital images. The presented methods are dependent upon blobs, detecting using DoG operator, from which BRISK and ORB features are extracted. The extracted features are matched using Hamming distance metrics to find similar key points to identify the CM regions. The work was implemented in Python and synthesized images were used in this to analyze and compare the efficacy of the presented techniques. The experimental outcomes demonstrates that the presented technique was effectual for multi-CM attacks and geometric transformations namely rotation and scaling. Though both the methods were able to detect the CM forgeries efficiently, ORB executed faster compared to BRISK.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"430 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132245601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Functions and Ways of Computer Information Technology in Optimizing Library Operation and Management Considering Massive Data Mining 考虑海量数据挖掘的计算机信息技术在优化图书馆运营管理中的作用与途径
Pub Date : 2022-03-29 DOI: 10.1109/ICCMC53470.2022.9754122
J. Song
With the continuous development of science and technology, the application of computer information technology in various fields has become more and more extensive, and the world is entering the information age. The development and application of information technology has brought new opportunities and challenges to library management. This article combines the concept of library information technology, analyzes the challenges of library management under information technology, and then proposes the practical application of information technology in library management, and reviews in detail the research status of the massive data mining process and Faced with challenges, and discussed the processing mode in the process of massive data mining from the perspective of game theory, granular computing model and big data processing thinking.
随着科学技术的不断发展,计算机信息技术在各个领域的应用越来越广泛,世界正在进入信息时代。信息技术的发展和应用给图书馆管理带来了新的机遇和挑战。本文结合图书馆信息技术的概念,分析了信息技术下图书馆管理面临的挑战,进而提出了信息技术在图书馆管理中的实际应用,并详细回顾了海量数据挖掘过程中的研究现状和面临的挑战,并从博弈论的角度探讨了海量数据挖掘过程中的处理模式。颗粒计算模型与大数据处理思维。
{"title":"Functions and Ways of Computer Information Technology in Optimizing Library Operation and Management Considering Massive Data Mining","authors":"J. Song","doi":"10.1109/ICCMC53470.2022.9754122","DOIUrl":"https://doi.org/10.1109/ICCMC53470.2022.9754122","url":null,"abstract":"With the continuous development of science and technology, the application of computer information technology in various fields has become more and more extensive, and the world is entering the information age. The development and application of information technology has brought new opportunities and challenges to library management. This article combines the concept of library information technology, analyzes the challenges of library management under information technology, and then proposes the practical application of information technology in library management, and reviews in detail the research status of the massive data mining process and Faced with challenges, and discussed the processing mode in the process of massive data mining from the perspective of game theory, granular computing model and big data processing thinking.","PeriodicalId":345346,"journal":{"name":"2022 6th International Conference on Computing Methodologies and Communication (ICCMC)","volume":"502 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131951214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 6th International Conference on Computing Methodologies and Communication (ICCMC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1