As we know, World Wide Web (WWW) has been developing and it’s performance growth is increasing since last few years. So, it requires the need of fast and precise method to reach the information. Ranking is playing an important role to achieve the goal of receiving relevant information. Search Engines have an important component as ranking. It helps user to retrieve the pages that relates to his/her query. Semantic Web (SW) is the extension of WWW. It is a great technology, which helps search engines to retrieve most relevant pages. So, the concept of SW approach is satisfied, only if the results of retrieval are extremely related to user query. Than only, we can consider that due to best ranking schemes user expectations are increasing. Because by accurate result as per the query the scope of knowledge searching increases and make user to view the relevant need for query on top most.
{"title":"Novel Ranking Approach using Pattern Recognition for Ontology in Semantic Search Engine","authors":"Neera Chaudhary, Suresh Kumar, Ashok Kumar Yadav, Sugandha Chakraverti","doi":"10.1109/ICICT46931.2019.8977705","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977705","url":null,"abstract":"As we know, World Wide Web (WWW) has been developing and it’s performance growth is increasing since last few years. So, it requires the need of fast and precise method to reach the information. Ranking is playing an important role to achieve the goal of receiving relevant information. Search Engines have an important component as ranking. It helps user to retrieve the pages that relates to his/her query. Semantic Web (SW) is the extension of WWW. It is a great technology, which helps search engines to retrieve most relevant pages. So, the concept of SW approach is satisfied, only if the results of retrieval are extremely related to user query. Than only, we can consider that due to best ranking schemes user expectations are increasing. Because by accurate result as per the query the scope of knowledge searching increases and make user to view the relevant need for query on top most.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134633215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977630
Shilpa Mahajan, Rajneesh Rani
Text present in an image provides high level straight forward information about the image/ video in which it is present. Nowadays, analysis of script identification either in the natural image or document image facilitates benefits to the number of important applications. Automatic script identification is a highly challenging task due to various complexities of the text as well as the image. This paper presents a survey on script identification of different scripts across the world. From the survey, it is noted that research in this area is limited to the document images only. Natural images are yet to be explored for automatic script identification.
{"title":"A Decade on Script Identification from Natural Images/Videos: A Review","authors":"Shilpa Mahajan, Rajneesh Rani","doi":"10.1109/ICICT46931.2019.8977630","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977630","url":null,"abstract":"Text present in an image provides high level straight forward information about the image/ video in which it is present. Nowadays, analysis of script identification either in the natural image or document image facilitates benefits to the number of important applications. Automatic script identification is a highly challenging task due to various complexities of the text as well as the image. This paper presents a survey on script identification of different scripts across the world. From the survey, it is noted that research in this area is limited to the document images only. Natural images are yet to be explored for automatic script identification.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131539898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977632
S. Hussain, Manoj Kumar
Internet of Things (IOT) is one of the most emerging technologies that have engrossed a lot of opportunities these days. It offers a huge business scope for organizations and open new ventures for many existing sectors. Wireless Body Area Networks (WBAN) is one such emerging field that provides a remote mechanism to monitor and collect patient’s health related data using IOT based wearable bio-sensors. It has a huge potential to enhance health care delivery significantly by using remote monitoring, disease or performance tracking, and related medical procedures. The collected data is highly private in nature and must therefore be protected while being used by the healthcare professionals and during remote storage in Electronic Healthcare Repository (EHR). Traditional cryptographic techniques are highly greedy in terms of computation, storage, and energy consumption. Their implementations are found to be unsuitable in IOT devices which are highly resource constraints. This work is an effort to analyze security architecture of IOT based WBAN on the basis of security key agreement schemes.
{"title":"Secret Key Agreement Schemes in IOT Based Wireless Body Area Network","authors":"S. Hussain, Manoj Kumar","doi":"10.1109/ICICT46931.2019.8977632","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977632","url":null,"abstract":"Internet of Things (IOT) is one of the most emerging technologies that have engrossed a lot of opportunities these days. It offers a huge business scope for organizations and open new ventures for many existing sectors. Wireless Body Area Networks (WBAN) is one such emerging field that provides a remote mechanism to monitor and collect patient’s health related data using IOT based wearable bio-sensors. It has a huge potential to enhance health care delivery significantly by using remote monitoring, disease or performance tracking, and related medical procedures. The collected data is highly private in nature and must therefore be protected while being used by the healthcare professionals and during remote storage in Electronic Healthcare Repository (EHR). Traditional cryptographic techniques are highly greedy in terms of computation, storage, and energy consumption. Their implementations are found to be unsuitable in IOT devices which are highly resource constraints. This work is an effort to analyze security architecture of IOT based WBAN on the basis of security key agreement schemes.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"58 30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977706
Monika Mathur, Vivek Upadhyaya, Rahul Srivastava
This research work presents a method using Stockwell transform which is aimed to process the communication signals to detect noise disturbances superimposed on the signals in the communication channel or at the transmitter or the receiver stations. The communication signals with noise disturbances are simulated with the help of mathematical relations. The communication signals with noise disturbance are decomposed with the help of Stockwell Transform and S-matrix is obtained. A summing of absolute values curve is proposed and calculated by summing of absolute values of each columns of S-matrix and plotted against time. A median curve is also proposed and calculated using median of absolute values of each columns of S- matrix. Proposed maximum absolute values plot is calculated using maximum values of absolute values of each columns of S- matrix. On comparing these plots of signal having noise disturbance with corresponding plots of pure sinusoidal communication signal, superimposed noise disturbances have been detected successfully. Proposed study is performed using the MATLAB software.
{"title":"Stockwell Transform Based Algorithm for Processing of Digital Communication Signals to Detect Superimposed Noise Disturbances","authors":"Monika Mathur, Vivek Upadhyaya, Rahul Srivastava","doi":"10.1109/ICICT46931.2019.8977706","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977706","url":null,"abstract":"This research work presents a method using Stockwell transform which is aimed to process the communication signals to detect noise disturbances superimposed on the signals in the communication channel or at the transmitter or the receiver stations. The communication signals with noise disturbances are simulated with the help of mathematical relations. The communication signals with noise disturbance are decomposed with the help of Stockwell Transform and S-matrix is obtained. A summing of absolute values curve is proposed and calculated by summing of absolute values of each columns of S-matrix and plotted against time. A median curve is also proposed and calculated using median of absolute values of each columns of S- matrix. Proposed maximum absolute values plot is calculated using maximum values of absolute values of each columns of S- matrix. On comparing these plots of signal having noise disturbance with corresponding plots of pure sinusoidal communication signal, superimposed noise disturbances have been detected successfully. Proposed study is performed using the MATLAB software.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114067212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977638
Ankit Chopade
Order of skin sores in different dangerous sort assumes a pivotal job in diagnosing different, neighborhood and quality related, ailments in the field of therapeutic science. Grouping of these sores in a few carcinogenic sorts i.e Melanoma(MEL), Melanomic Neves(NV), Basal Cell Carcinoma(BCC), Actinic Keratosis(AKIEC), Benign Keratosis(BKL )Dermatofibroma(DF) and Vascular Lesion(VASC) gives some understanding about the infection. Skin malignancy is the most deadly kind of malignancy however in the event that these infections are recognized in beginning times, at that point patients can have a high recurrence of recuperation. A few ways to deal with programmed arrangement have been investigated by numerous creators, utilizing different systems and methodologies however this paper proposed an extended version of novel Incremental methodology for Convolution Neural Network on dermoscopy pictures for characterization of skin sores in different skin malignant growths. This is a summed up methodologym subsequently can be executed in different calculations for accomplishing higher exactness. Worldwide Skin Imaging Collaboration (ISIC) 2018 test dataset is utilized in this paper. The methodology utilized in this paper yields an accuracy of more than 95%.
{"title":"Classification of Skin Lesions by using Extended-Incremental Convolutional Neural Network","authors":"Ankit Chopade","doi":"10.1109/ICICT46931.2019.8977638","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977638","url":null,"abstract":"Order of skin sores in different dangerous sort assumes a pivotal job in diagnosing different, neighborhood and quality related, ailments in the field of therapeutic science. Grouping of these sores in a few carcinogenic sorts i.e Melanoma(MEL), Melanomic Neves(NV), Basal Cell Carcinoma(BCC), Actinic Keratosis(AKIEC), Benign Keratosis(BKL )Dermatofibroma(DF) and Vascular Lesion(VASC) gives some understanding about the infection. Skin malignancy is the most deadly kind of malignancy however in the event that these infections are recognized in beginning times, at that point patients can have a high recurrence of recuperation. A few ways to deal with programmed arrangement have been investigated by numerous creators, utilizing different systems and methodologies however this paper proposed an extended version of novel Incremental methodology for Convolution Neural Network on dermoscopy pictures for characterization of skin sores in different skin malignant growths. This is a summed up methodologym subsequently can be executed in different calculations for accomplishing higher exactness. Worldwide Skin Imaging Collaboration (ISIC) 2018 test dataset is utilized in this paper. The methodology utilized in this paper yields an accuracy of more than 95%.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125182589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977656
Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal
Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.
{"title":"Security Attacks, Requirements and Authentication Schemes in VANET","authors":"Amit kumar Goyal, Arun Kumar Tripathi, G. Agarwal","doi":"10.1109/ICICT46931.2019.8977656","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977656","url":null,"abstract":"Vehicular Ad-hoc Networks (VANET), the promising technique, is getting attention for managing the traffic efficiently and making the road safe. The topographies and its vast applications varying from road safety, to the traffic management, payment service to infotainment. VANETs are characterized as a self-organized, distributed, highly mobile, dynamic topology, unconstrained power, computational and storage networks. The communication in VANET is performed in open-access environment which demands the security issues must be deal with utter importance. Security requirements includes authentication, availability, message confidentiality, message integrity, data availability, access control, privacy, message non-repudiation and real time guarantees of message delivery. In order to have a secure and efficient VANET infrastructure, an extensive overview of characteristics, challenges, security attacks and requirements must be dealt with. The prime objective of this paper is to provide a classification of security requirements, security characteristics and challenges.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131287463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977663
Naman Garg, B. Saxena, Sanjeev Mishra
Buildings are one of the major contributors to the consumption of electrical energy generated by power plants. Taking the context of India, out of total generated energy 30% is consumed by building sectors. Therefore, this paper focuses on reducing the total energy demand for a building by applying several improvements like reducing loads, applying insulation, etc. Optimum demand of a department of University is estimated using eQUEST software version 3.65.7175 in this research and comparative results are obtained. The present research focuses on only connected load and improvement methods have been suggested which can save a total of about Rs. 31,507/-. An estimated payback period of 7.9 year is also calculated for the replacement of new equipment’s with the present one.
{"title":"Energy Analysis of University Department Building Using eQUEST Software","authors":"Naman Garg, B. Saxena, Sanjeev Mishra","doi":"10.1109/ICICT46931.2019.8977663","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977663","url":null,"abstract":"Buildings are one of the major contributors to the consumption of electrical energy generated by power plants. Taking the context of India, out of total generated energy 30% is consumed by building sectors. Therefore, this paper focuses on reducing the total energy demand for a building by applying several improvements like reducing loads, applying insulation, etc. Optimum demand of a department of University is estimated using eQUEST software version 3.65.7175 in this research and comparative results are obtained. The present research focuses on only connected load and improvement methods have been suggested which can save a total of about Rs. 31,507/-. An estimated payback period of 7.9 year is also calculated for the replacement of new equipment’s with the present one.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123475119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977675
Neha Gupta, Arun Sharma, M. K. Pachariya
Whenever a change is done in software, regression testing is done to check that a recent change in code has not created any unwanted defects in the system. As size of regression test suite is very large, optimization algorithms help in selecting, minimizing and prioritizing test suites. Main aim is maximize fault detection ability with less number of test cases. Optimization techniques of various types are available but Multiobjective algorithms are the best choice to use as testing is dependent on many adequacy criteria or surrogates. In this paper, authors have carried out study on research papers where multi-objective algorithms are used in regression testing. Then comparison of performance of multi-objective algorithms is done to identify the best suitable multi-objective algorithm for regression testing.
{"title":"Analysis of MORTO:Multi-objective Regression test optimization","authors":"Neha Gupta, Arun Sharma, M. K. Pachariya","doi":"10.1109/ICICT46931.2019.8977675","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977675","url":null,"abstract":"Whenever a change is done in software, regression testing is done to check that a recent change in code has not created any unwanted defects in the system. As size of regression test suite is very large, optimization algorithms help in selecting, minimizing and prioritizing test suites. Main aim is maximize fault detection ability with less number of test cases. Optimization techniques of various types are available but Multiobjective algorithms are the best choice to use as testing is dependent on many adequacy criteria or surrogates. In this paper, authors have carried out study on research papers where multi-objective algorithms are used in regression testing. Then comparison of performance of multi-objective algorithms is done to identify the best suitable multi-objective algorithm for regression testing.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127153348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977672
Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya
The unambiguous and unseamed integration of mixed and non-identical end systems are offered by the Internet of Things (IoT). It has been greatly used in many applications such as network automobile, micro-controller, smart farming, smart retail, wearable devices, and industrial internet. In these applications, a substantial number of IoT devices are established that can sense, actuate, evaluate and publicize. There could be a possible violation of the IoT devices also by capturing the servers or the sensors that is, an intruder may affect the sensor and record false data, or an intruder may capture the servers and incorrectly actuate sensors. Therefore, there is significant need of an strong but light weighted mutual authentication scheme. Following this, authentication is done before the data exchange among sensors and the server. Moreover, due to limited capacity of batteries in IoT devices, the mutual authentication protocol is expected to be light weighted. This work proposed an authentication scheme by using the dynamic cipher along with the existing public key encryption, where the client generates the key dynamically, which can only be solved by brute force. The key which is dynamically generated using random function is used for encryption and decryption. Further, an enhancement to the security is proposed by introducing dynamic cipher based authentication. The proposed scheme is evaluated in software environments i.e., IPv6 over low-power wireless personal area networks (6LoWPAN) which is widely used for IoT applications.
{"title":"Light Weighted Mutual Authentication and Dynamic Key Encryption for IoT Devices Applications","authors":"Anuj Sachan, D. N. Kumar, Adwiteeya Adwiteeya","doi":"10.1109/ICICT46931.2019.8977672","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977672","url":null,"abstract":"The unambiguous and unseamed integration of mixed and non-identical end systems are offered by the Internet of Things (IoT). It has been greatly used in many applications such as network automobile, micro-controller, smart farming, smart retail, wearable devices, and industrial internet. In these applications, a substantial number of IoT devices are established that can sense, actuate, evaluate and publicize. There could be a possible violation of the IoT devices also by capturing the servers or the sensors that is, an intruder may affect the sensor and record false data, or an intruder may capture the servers and incorrectly actuate sensors. Therefore, there is significant need of an strong but light weighted mutual authentication scheme. Following this, authentication is done before the data exchange among sensors and the server. Moreover, due to limited capacity of batteries in IoT devices, the mutual authentication protocol is expected to be light weighted. This work proposed an authentication scheme by using the dynamic cipher along with the existing public key encryption, where the client generates the key dynamically, which can only be solved by brute force. The key which is dynamically generated using random function is used for encryption and decryption. Further, an enhancement to the security is proposed by introducing dynamic cipher based authentication. The proposed scheme is evaluated in software environments i.e., IPv6 over low-power wireless personal area networks (6LoWPAN) which is widely used for IoT applications.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129539735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/ICICT46931.2019.8977688
Vidushi, Manisha Agarwal, Rekha Rajoria
The process of gaining knowledge from enormous amount of data is called data mining. This paper uses the Weka tool to compare different types of classification methods. Decision tree, Multilayer perceptron, Naïve Bayes, J48 algorithms are used for classification analysis in terms of correctly and incorrectly classified instances and Area of ROC curve. Test option selected is cross validation with 10 folds. Datasets used breast cancer, diabetes from health care industry. In health care industry huge data is available but not so much knowledge extracted.
{"title":"Analysis of Various Classification Methods","authors":"Vidushi, Manisha Agarwal, Rekha Rajoria","doi":"10.1109/ICICT46931.2019.8977688","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977688","url":null,"abstract":"The process of gaining knowledge from enormous amount of data is called data mining. This paper uses the Weka tool to compare different types of classification methods. Decision tree, Multilayer perceptron, Naïve Bayes, J48 algorithms are used for classification analysis in terms of correctly and incorrectly classified instances and Area of ROC curve. Test option selected is cross validation with 10 folds. Datasets used breast cancer, diabetes from health care industry. In health care industry huge data is available but not so much knowledge extracted.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127275558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}