首页 > 最新文献

2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

英文 中文
Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated 利用混合负载均衡模拟器提高移动自组网服务质量:退火模拟
Anil Kumar, R. Shukla, R. Shukla, Shelendra Pal
Wireless topologies can change rapidly and unexpectedly. Hybrid networks are connected by gateways, which act as entry points for all traffic. Some gateways may be subject to high traffic loads and therefore may be overloaded. To compare the performance of the proposed work, various parameters including end-to-end latency, power consumption, and throughput are considered. Load Balancing Hybrid Simulator (LBHS) is an algorithm used in this paper to distribute traffic load among multiple gateways to solve load balancing problems in MANET. It combines a Hybridge Annealing Simulation (HAS) network technology with Decentralized Random Search (DRS). A network that supports QoS in MANET. The Dominant Minimal Set (DMS) problem is solved using AS. The DSS heuristic algorithm provides an algorithm with a simple structure and a high degree of exploration. In addition to faster convergence than other algorithms, it also implements an axiomatic algorithm to ensure the diversity of agents and avoid falling into local optimum. The test results show that the proposed Hybridge Annealing Simulated Decentralized Random Search (HAS-DRS) procedure performs better than the dominated connection set (DCS).
无线拓扑结构可以迅速而意外地变化。混合网络由网关连接,网关充当所有流量的入口点。某些网关可能会受到高流量负载的影响,因此可能会过载。为了比较所提议的工作的性能,考虑了各种参数,包括端到端延迟、功耗和吞吐量。负载均衡混合模拟器(Load Balancing Hybrid Simulator, LBHS)是一种用于在多个网关之间分配流量负载的算法,以解决MANET中的负载均衡问题。它结合了混合桥退火模拟(HAS)网络技术和分散随机搜索(DRS)。在MANET中支持QoS的网络。利用自治系统解决了优势最小集问题。DSS启发式算法提供了一种结构简单、探索程度高的算法。除了收敛速度快于其他算法外,它还实现了一种公理算法,以保证代理的多样性,避免陷入局部最优。实验结果表明,所提出的Hybridge退火模拟分散随机搜索(HAS-DRS)算法比支配连接集(DCS)算法性能更好。
{"title":"Enhancement of Quality of Service in Mobile Ad-Hoc Networks using Hybrid Load Balanced Simulator: Annealing Simulated","authors":"Anil Kumar, R. Shukla, R. Shukla, Shelendra Pal","doi":"10.1109/SMART55829.2022.10046821","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046821","url":null,"abstract":"Wireless topologies can change rapidly and unexpectedly. Hybrid networks are connected by gateways, which act as entry points for all traffic. Some gateways may be subject to high traffic loads and therefore may be overloaded. To compare the performance of the proposed work, various parameters including end-to-end latency, power consumption, and throughput are considered. Load Balancing Hybrid Simulator (LBHS) is an algorithm used in this paper to distribute traffic load among multiple gateways to solve load balancing problems in MANET. It combines a Hybridge Annealing Simulation (HAS) network technology with Decentralized Random Search (DRS). A network that supports QoS in MANET. The Dominant Minimal Set (DMS) problem is solved using AS. The DSS heuristic algorithm provides an algorithm with a simple structure and a high degree of exploration. In addition to faster convergence than other algorithms, it also implements an axiomatic algorithm to ensure the diversity of agents and avoid falling into local optimum. The test results show that the proposed Hybridge Annealing Simulated Decentralized Random Search (HAS-DRS) procedure performs better than the dominated connection set (DCS).","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133677210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Biometric System based on Eyelid Detection Innovation 基于眼睑检测创新的生物识别系统
J. Sahoo, Pooja Gupta
A biometric system can automatically identify a person by using a feature or attribute that is unique to that person. This can be accomplished through the use of a biometric. The system is the one that does this identification. It is generally agreed upon that iris recognition is the most reliable and accurate kind of biometric authentication that is currently available on the market [4], [6]. The eyelid, in conjunction with the eyelashes, can commonly hide a sizeable section of the iris. This is especially noticeable in people with blue eyes. Our method offers an innovative approach to the process of iris detection by making use of curve fitting in the analysis process. Iris recognition has the potential to be used in a broad number of settings, some examples of which include electronic commerce, information security, and door access control systems.
生物识别系统可以通过使用该人独有的特征或属性来自动识别该人。这可以通过使用生物识别技术来实现。系统是做这种识别的。人们普遍认为虹膜识别是目前市场上最可靠、最准确的一种生物特征认证方式b[4], b[6]。眼睑,连同睫毛,通常可以隐藏虹膜的相当大的一部分。这在蓝眼睛的人身上尤其明显。我们的方法通过在分析过程中使用曲线拟合,为虹膜检测过程提供了一种创新的方法。虹膜识别具有广泛应用的潜力,其中一些例子包括电子商务、信息安全和门禁控制系统。
{"title":"Biometric System based on Eyelid Detection Innovation","authors":"J. Sahoo, Pooja Gupta","doi":"10.1109/SMART55829.2022.10046727","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046727","url":null,"abstract":"A biometric system can automatically identify a person by using a feature or attribute that is unique to that person. This can be accomplished through the use of a biometric. The system is the one that does this identification. It is generally agreed upon that iris recognition is the most reliable and accurate kind of biometric authentication that is currently available on the market [4], [6]. The eyelid, in conjunction with the eyelashes, can commonly hide a sizeable section of the iris. This is especially noticeable in people with blue eyes. Our method offers an innovative approach to the process of iris detection by making use of curve fitting in the analysis process. Iris recognition has the potential to be used in a broad number of settings, some examples of which include electronic commerce, information security, and door access control systems.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117294933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Optimized Proposed Model for Gateway Congestion Control 网关拥塞控制的优化提议模型研究
Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi
A congestion control mechanism is needed to balance the network load to prevent pack drops and avoid network deadlocks. The main purpose is to analyze efficient and reliable congestion control methods which will reduce the weaknesses in various existing congestion control methods and propose a framework to minimize the gateway congestion in the network. As the demand of heterogeneous users of computer network day by day dynamically and rapidly changing in many aspects, grounded on the application situations our congestion control mechanism functions well in the situations that occur in Internet. The maximum degree of dynamics can be handle efficiently by keeping the generality of its existing end-to-end solution in our congestion control design.
需要拥塞控制机制来平衡网络负载,防止丢包,避免网络死锁。主要目的是分析有效可靠的拥塞控制方法,减少现有各种拥塞控制方法的弱点,并提出一个最小化网络中网关拥塞的框架。由于计算机网络中各种用户的需求在许多方面都是动态、快速变化的,基于实际的应用情况,我们的拥塞控制机制能够很好地适应互联网中出现的各种情况。通过在拥塞控制设计中保持现有端到端解决方案的通用性,可以有效地处理最大程度的动态。
{"title":"A Study of Optimized Proposed Model for Gateway Congestion Control","authors":"Suhail Javed Quraishi, Rubina Liyakat Khan, Tanvir Mahmoud Hussein, Vineet Saxena, Sushovan Chaudhury, A. Rastogi","doi":"10.1109/SMART55829.2022.10047440","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047440","url":null,"abstract":"A congestion control mechanism is needed to balance the network load to prevent pack drops and avoid network deadlocks. The main purpose is to analyze efficient and reliable congestion control methods which will reduce the weaknesses in various existing congestion control methods and propose a framework to minimize the gateway congestion in the network. As the demand of heterogeneous users of computer network day by day dynamically and rapidly changing in many aspects, grounded on the application situations our congestion control mechanism functions well in the situations that occur in Internet. The maximum degree of dynamics can be handle efficiently by keeping the generality of its existing end-to-end solution in our congestion control design.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Stress using Machine Learning and IoT 利用机器学习和物联网预测压力
Amit Jain, Muskan Kumari
Stress is considered as the leading problem in healthcare. This paper is about a brief review of machine learning Algorithms and IoT, and their roles in the prediction of stress. A lot of research has been done by researchers in the prediction of stress by taking reference to previous research we compare SVM and KNN accuracy and performanceon the basis of PSS (perceived stress scale), EDR and ECG. This paper discusses ML Techniques that are implemented on the Internet of things (IoT) nowadays. Also, emphasis has been laid on identifying the causes, symptoms of stress along with studying the existing Machine Learning algorithms related to Stress.
压力被认为是医疗保健中的主要问题。本文简要回顾了机器学习算法和物联网,以及它们在应力预测中的作用。研究者在压力预测方面做了大量的研究,参考前人的研究,我们在感知压力量表(PSS)、EDR和ECG的基础上,比较了SVM和KNN的准确率和性能。本文讨论了目前在物联网(IoT)上实现的机器学习技术。此外,重点是确定压力的原因,症状以及研究与压力相关的现有机器学习算法。
{"title":"Prediction of Stress using Machine Learning and IoT","authors":"Amit Jain, Muskan Kumari","doi":"10.1109/SMART55829.2022.10046907","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046907","url":null,"abstract":"Stress is considered as the leading problem in healthcare. This paper is about a brief review of machine learning Algorithms and IoT, and their roles in the prediction of stress. A lot of research has been done by researchers in the prediction of stress by taking reference to previous research we compare SVM and KNN accuracy and performanceon the basis of PSS (perceived stress scale), EDR and ECG. This paper discusses ML Techniques that are implemented on the Internet of things (IoT) nowadays. Also, emphasis has been laid on identifying the causes, symptoms of stress along with studying the existing Machine Learning algorithms related to Stress.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120891398","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph Family Characterization using the Path Length Array 使用路径长度数组的图族表征
Pardeep Kumar, Sanjay Arora
Distance-based definition of graph families the range in between nodes or sides here on network is known as the shortest route size between both two nodes or sides. The degree of a specific edge is defined as the total number pf triangles that surround that apex. The node e sequence's length level series () is the quantity of nodes but rather vertices at a length I from v, where () = 0(), 1(),…,()(). Here, utilizing their distance extent sequence, they have covered the creation and classification of total circles, cycles of extremely weird and now even dimensions, and complete PPI network 2. In addition, some of the findings have really been provided with methodologies.
基于距离的图族定义网络中节点或边之间的距离被称为两个节点或边之间的最短路径大小。特定边的度数定义为环绕该顶点的三角形的总数。节点e序列的长度级别series()是节点的数量,而不是从v开始的长度为I的顶点,其中()= 0(),1(),…,()()。在这里,利用他们的距离范围序列,他们已经涵盖了总圆的创建和分类,极其奇怪和现在偶数维的循环,以及完整的PPI网络2。此外,有些发现确实提供了方法。
{"title":"Graph Family Characterization using the Path Length Array","authors":"Pardeep Kumar, Sanjay Arora","doi":"10.1109/SMART55829.2022.10046959","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046959","url":null,"abstract":"Distance-based definition of graph families the range in between nodes or sides here on network is known as the shortest route size between both two nodes or sides. The degree of a specific edge is defined as the total number pf triangles that surround that apex. The node e sequence's length level series () is the quantity of nodes but rather vertices at a length I from v, where () = 0(), 1(),…,()(). Here, utilizing their distance extent sequence, they have covered the creation and classification of total circles, cycles of extremely weird and now even dimensions, and complete PPI network 2. In addition, some of the findings have really been provided with methodologies.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121166130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework 利用机器学习和MITRE框架的实时多阶段攻击检测
Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam
Organizations regardless of their size are rapidly transforming, adopting and embracing digitalization amid the COVID pandemic. The pandemic forced organizations to ratio- nalize offline operations and swift towards online operations. Many organizations have digitized their services and have witnessed increasing Multistage cyber-attacks. Further, a lot of organizations have enabled remote access to the enterprise resources and services. As a result, organizations are striving to defend against Multistage cyber-attacks. These multistage attacks often spread across many stages, which is best described by MITRE Adversarial Tactics, Techniques, and Common Knowl- edge (ATT&CK) Framework. There are many research efforts for static detection of malicious binaries but very few or limited research targeting run-time detection of malicious processes in the system. Detection of these malicious processes are key for identifying new variants of multistage attacks or malware in the real world. This paper proposes a system for detecting multistage attacks in real-time or run-time by leveraging Machine learning and MITRE ATT&CK Framework. Machine learning facilitates detecting the malicious process in the system, and the MITRE ATT&CK framework offers insight into adversary techniques. Combination of these two is very effective in detecting multistage attacks and identifying individual stages. The proposed system shows promising results when tested on real-time/latest malware. Test result shows that our system can achieve 95.83% of accuracy. This paper discusses the challenges in detection of runtime malware, dataset generation
在COVID大流行期间,无论规模大小的组织都在迅速转型、采用和拥抱数字化。疫情迫使组织按比例调整离线业务,并迅速转向在线业务。许多组织已经将其服务数字化,并目睹了越来越多的多级网络攻击。此外,许多组织已经启用了对企业资源和服务的远程访问。因此,组织正在努力防御多级网络攻击。这些多阶段攻击通常跨越多个阶段,最好的描述是MITRE对抗战术、技术和共同知识边缘(ATT&CK)框架。对于恶意二进制文件的静态检测有很多研究,但是针对系统中恶意进程的运行时检测的研究很少或很有限。检测这些恶意进程是识别现实世界中多阶段攻击或恶意软件的新变体的关键。本文提出了一种利用机器学习和MITRE ATT&CK框架在实时或运行时检测多阶段攻击的系统。机器学习有助于检测系统中的恶意进程,而MITRE ATT&CK框架提供了对对手技术的洞察。这两者的结合在检测多阶段攻击和识别单个阶段时非常有效。在实时/最新恶意软件的测试中,该系统显示出良好的效果。测试结果表明,该系统可以达到95.83%的准确率。本文讨论了运行时恶意软件检测、数据集生成等方面的挑战
{"title":"Real Time Multistage Attack Detection Leveraging Machine Learning and MITRE Framework","authors":"Yuvraj Sanjayrao Takey, Sai Gopal Tatikayala, M. U. Patil, Lakshmi Eswari P. R, Satyanadha Sarma Samavedam","doi":"10.1109/SMART55829.2022.10047248","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047248","url":null,"abstract":"Organizations regardless of their size are rapidly transforming, adopting and embracing digitalization amid the COVID pandemic. The pandemic forced organizations to ratio- nalize offline operations and swift towards online operations. Many organizations have digitized their services and have witnessed increasing Multistage cyber-attacks. Further, a lot of organizations have enabled remote access to the enterprise resources and services. As a result, organizations are striving to defend against Multistage cyber-attacks. These multistage attacks often spread across many stages, which is best described by MITRE Adversarial Tactics, Techniques, and Common Knowl- edge (ATT&CK) Framework. There are many research efforts for static detection of malicious binaries but very few or limited research targeting run-time detection of malicious processes in the system. Detection of these malicious processes are key for identifying new variants of multistage attacks or malware in the real world. This paper proposes a system for detecting multistage attacks in real-time or run-time by leveraging Machine learning and MITRE ATT&CK Framework. Machine learning facilitates detecting the malicious process in the system, and the MITRE ATT&CK framework offers insight into adversary techniques. Combination of these two is very effective in detecting multistage attacks and identifying individual stages. The proposed system shows promising results when tested on real-time/latest malware. Test result shows that our system can achieve 95.83% of accuracy. This paper discusses the challenges in detection of runtime malware, dataset generation","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114731043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Retinal Detachment Severity using RDidean Evaluative System and Classifier Assessment Implementation Models 应用RDidean评价系统和分类器评价实现模型分析视网膜脱离严重程度
L. Poongothai, K. Sharmila
Vision loss can be a permanent disability of a human, that could be attributed to due to Retinal Detachment (RD). This is perilous disorder that could be caused due to dealignment of the layers in a retina. The choroid supplies oxygen and nutrients to the outer segments of the photoreceptors. The retina's photoreceptors will stop working if the choroid separates from the retina. The degree of dependence on the choroid is high, due to its supply of oxygen to the fovea that increases the breathability of the retinal blood vessels. This tapering of the oxygen levels can paramount to macula detachment that can be an irreversible damage to the cones and rods at the posterior pole, thereby leading to blindness. If the retina is quickly reattached, good vision can be preserved even if the macula is not removed. Retinal detachment hitherto has been studied through conceptual data processing and image processing techniques. However, this paper analyzes the retinal detachment for an individual through the various features, and the same is encompassed in an equational form to be termed as the “RDidean” evaluative system. The evaluative model thus explicitly categorizes the retinal database into normal and abnormal images based on the value obtained from the system. The performance of this system is then effectuated through diverse tree classifier models and the deep learning AlexNet classifier in MATLAB to comprehend the precision of classification. While effectively entailing another pool of algorithmic models like the SVM variations and the Naïve Bayesian methods to cognize the accuracy of retinal detachment severity that the evaluative system rendered. This indagation analyzes focusses to establish a corroborative and impeccable prediction system for the classification of normal and abnormal eye through color fundus images. Thereby aiding to improve the ergonomic environment of clinicians to improve the treatment plan, along with delivering complementary clinical decisions, and in institutionalizing affordability for patients through optimal cost for agnizing retinal detachments.
视力丧失可能是人类的永久性残疾,这可能归因于视网膜脱离(RD)。这是一种危险的疾病,可能是由于视网膜层的排列失调引起的。脉络膜为光感受器的外部部分提供氧气和营养。如果脉络膜与视网膜分离,视网膜的感光器就会停止工作。对脉络膜的依赖程度很高,因为它为中央凹提供氧气,增加了视网膜血管的透气性。氧气水平的逐渐减少会导致黄斑脱离,对后极的视锥细胞和视杆细胞造成不可逆转的损伤,从而导致失明。如果视网膜迅速重新附着,即使不切除黄斑,也能保持良好的视力。迄今为止,视网膜脱离一直是通过概念数据处理和图像处理技术来研究的。然而,本文通过各种特征来分析个体的视网膜脱离,并将其包含在称为“RDidean”评估系统的方程形式中。因此,评估模型根据从系统中获得的值明确地将视网膜数据库分为正常和异常图像。然后通过多种树分类器模型和MATLAB中的深度学习AlexNet分类器来实现该系统的性能,以了解分类的精度。同时有效地需要另一组算法模型,如SVM变化和Naïve贝叶斯方法来识别评估系统呈现的视网膜脱离严重程度的准确性。本研究通过对焦点的分析,通过眼底彩色图像对正常眼和异常眼进行分类,建立了一个确凿的、完善的预测系统。从而帮助改善临床医生的人体工程学环境,以改进治疗计划,同时提供补充的临床决策,并通过组织视网膜脱离的最佳成本使患者的负担能力制度化。
{"title":"Analysis of Retinal Detachment Severity using RDidean Evaluative System and Classifier Assessment Implementation Models","authors":"L. Poongothai, K. Sharmila","doi":"10.1109/SMART55829.2022.10046999","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10046999","url":null,"abstract":"Vision loss can be a permanent disability of a human, that could be attributed to due to Retinal Detachment (RD). This is perilous disorder that could be caused due to dealignment of the layers in a retina. The choroid supplies oxygen and nutrients to the outer segments of the photoreceptors. The retina's photoreceptors will stop working if the choroid separates from the retina. The degree of dependence on the choroid is high, due to its supply of oxygen to the fovea that increases the breathability of the retinal blood vessels. This tapering of the oxygen levels can paramount to macula detachment that can be an irreversible damage to the cones and rods at the posterior pole, thereby leading to blindness. If the retina is quickly reattached, good vision can be preserved even if the macula is not removed. Retinal detachment hitherto has been studied through conceptual data processing and image processing techniques. However, this paper analyzes the retinal detachment for an individual through the various features, and the same is encompassed in an equational form to be termed as the “RDidean” evaluative system. The evaluative model thus explicitly categorizes the retinal database into normal and abnormal images based on the value obtained from the system. The performance of this system is then effectuated through diverse tree classifier models and the deep learning AlexNet classifier in MATLAB to comprehend the precision of classification. While effectively entailing another pool of algorithmic models like the SVM variations and the Naïve Bayesian methods to cognize the accuracy of retinal detachment severity that the evaluative system rendered. This indagation analyzes focusses to establish a corroborative and impeccable prediction system for the classification of normal and abnormal eye through color fundus images. Thereby aiding to improve the ergonomic environment of clinicians to improve the treatment plan, along with delivering complementary clinical decisions, and in institutionalizing affordability for patients through optimal cost for agnizing retinal detachments.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Valuation of Mergers and Acquisitions 并购估值
Vipin Kumar, Priyanka Jain
In the business area of India mergers and acquisitions are expanding fundamentally. Indian organizations are taking their oppositions to the next level by procuring unfamiliar organizations while permitting unfamiliar financial backers to put resources into India. The Indian business area is liable to relentless rivalry, subsequently, they have become inseparable from instruments that assist in enduring the market. Business rebuilding have frequently come about emphatically because of an expansion in the effectiveness and maintainability of the organizations. Because of globalization, numerous organizations advanced towards the Indian business area and the Indian organizations continued procuring unfamiliar foundations. Organizations are more worried about protecting their worth on the lookout because the business world has turned aggressive. Exchanges of offer or acquisition of any foundation request a computation of having fair worth which console partners and regulators. In these computation of having fair worth should be possible by different strategies. Paper talk about the valuation required during mergers and acquisitions.
在印度的商业领域,兼并和收购正在从根本上扩大。印度组织通过采购不熟悉的组织,同时允许不熟悉的金融支持者将资源投入印度,将他们的反对意见提升到一个新的水平。印度商业领域容易受到无情的竞争,随后,他们已经离不开帮助维持市场的工具。由于组织的有效性和可维护性的扩展,业务重建经常出现。由于全球化,许多组织进入印度商业领域,印度组织继续采购不熟悉的基金会。企业更关心的是如何保护自己的价值,因为商业世界已经变得咄咄逼人。任何基金会的交易或收购都要求计算公平价值,这让合作伙伴和监管机构感到欣慰。在这些计算中,公平价值应该通过不同的策略来实现。论文论述了并购过程中所需要的估值。
{"title":"Valuation of Mergers and Acquisitions","authors":"Vipin Kumar, Priyanka Jain","doi":"10.1109/smart55829.2022.10047079","DOIUrl":"https://doi.org/10.1109/smart55829.2022.10047079","url":null,"abstract":"In the business area of India mergers and acquisitions are expanding fundamentally. Indian organizations are taking their oppositions to the next level by procuring unfamiliar organizations while permitting unfamiliar financial backers to put resources into India. The Indian business area is liable to relentless rivalry, subsequently, they have become inseparable from instruments that assist in enduring the market. Business rebuilding have frequently come about emphatically because of an expansion in the effectiveness and maintainability of the organizations. Because of globalization, numerous organizations advanced towards the Indian business area and the Indian organizations continued procuring unfamiliar foundations. Organizations are more worried about protecting their worth on the lookout because the business world has turned aggressive. Exchanges of offer or acquisition of any foundation request a computation of having fair worth which console partners and regulators. In these computation of having fair worth should be possible by different strategies. Paper talk about the valuation required during mergers and acquisitions.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121181363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and Execution of Block Chain Technology in the Field of Education 区块链技术在教育领域的实施与执行
Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma
Occupational category or education professionals at all degrees have always been drawn to emerging innovations in order to maximize their potential for working hard and enriching the experiences of teaching and learning of both instructors and students. The increased usage of Big Data, Business Intelligence, and Intelligent Systems are a few of the breakthroughs. The usage of Block chain technology is another emerging field that is receiving attention from the education industry. The contribution to the Ir4.0 phenomena is the Block chain. It is a new technology that operates according to the autonomy and dispersion principles. The book “Block Chain Uses for School,” edited in Ramesh Vijay Yadav, Hadi Heidari, and GulsunKurubacak, was thoroughly reviewed in the article. It is among the few books that highlights the use of bitcoin technology in the classroom. The writers of the corresponding pages include a variety of potential Public Block chain management for schooling application. Additionally, the eBook focuses on managing institutions databases employing block chain, which increases the validity and safety of school data related to diplomas and grading sheet by enabling failsafe verification for all shareholders. In a couple of the pages, it is discussed how open and remote institutions of learning may handle large data using block chain. The book is essential reading for anybody involved in creating educational policies, putting them into practise, or studying education in general since it offers fresh perspectives on the numerous facets of this relatively recent field of technology application in education. This would assist students in changing how they see educational procedures.
各种学位的职业类别或教育专业人员一直被新兴的创新所吸引,以最大限度地发挥他们的潜力,努力工作,丰富教师和学生的教学经验。大数据、商业智能和智能系统的使用增加是其中的一些突破。区块链技术的使用是另一个受到教育行业关注的新兴领域。对工业4.0现象的贡献是区块链。它是一种根据自治和分散原理运行的新技术。由Ramesh Vijay Yadav、Hadi Heidari和GulsunKurubacak编辑的《区块链用于学校》一书在文章中进行了全面的审查。它是少数几本强调在课堂上使用比特币技术的书之一。相应页面的作者包括各种潜在的用于学校应用的公共区块链管理。此外,电子书侧重于使用区块链管理机构数据库,通过为所有股东提供故障安全验证,从而提高与文凭和成绩单相关的学校数据的有效性和安全性。在几页中,讨论了开放和远程学习机构如何使用区块链处理大数据。对于任何参与制定教育政策、将其付诸实践或研究教育的人来说,这本书都是必不可少的读物,因为它为这一相对较新的技术在教育中的应用领域的许多方面提供了新的视角。这将有助于学生改变他们对教育程序的看法。
{"title":"Implementation and Execution of Block Chain Technology in the Field of Education","authors":"Joel Alanya ‒ Beltran, Jesús Padilla-Caballero, F. A. Ochoa Tataje, Claudia Poma ‒ Garcia, Adolfo Perez ‒ Mendoza, Trishu Sharma","doi":"10.1109/SMART55829.2022.10047800","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047800","url":null,"abstract":"Occupational category or education professionals at all degrees have always been drawn to emerging innovations in order to maximize their potential for working hard and enriching the experiences of teaching and learning of both instructors and students. The increased usage of Big Data, Business Intelligence, and Intelligent Systems are a few of the breakthroughs. The usage of Block chain technology is another emerging field that is receiving attention from the education industry. The contribution to the Ir4.0 phenomena is the Block chain. It is a new technology that operates according to the autonomy and dispersion principles. The book “Block Chain Uses for School,” edited in Ramesh Vijay Yadav, Hadi Heidari, and GulsunKurubacak, was thoroughly reviewed in the article. It is among the few books that highlights the use of bitcoin technology in the classroom. The writers of the corresponding pages include a variety of potential Public Block chain management for schooling application. Additionally, the eBook focuses on managing institutions databases employing block chain, which increases the validity and safety of school data related to diplomas and grading sheet by enabling failsafe verification for all shareholders. In a couple of the pages, it is discussed how open and remote institutions of learning may handle large data using block chain. The book is essential reading for anybody involved in creating educational policies, putting them into practise, or studying education in general since it offers fresh perspectives on the numerous facets of this relatively recent field of technology application in education. This would assist students in changing how they see educational procedures.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125260790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Graph Database-Based Method for Network Log File Analysis 基于图数据库的网络日志文件分析方法
K. Sharma, Arvind Kumar
It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.
为了更准确地判断网络威胁的严重程度,经常需要评估从大量网络日志中获取的数据。这可以通过审查数据来完成。一个例子是在单独监禁中检查命令行工具产生的日志记录。尽管使用日志管理系统可以使识别某些日志文档变得更简单,但是为了确定不同类型的网络活动之间的连接而检查所有日志文档可能会很耗时。为了构建这些桥,我们可以利用关系数据库,例如,通过使用使用大量连接进程的复杂数据库查询来连接表。近年来,人们对使用图数据库作为一种存储和组织数据的方法,为语义搜索做准备的兴趣有所增加。
{"title":"A Graph Database-Based Method for Network Log File Analysis","authors":"K. Sharma, Arvind Kumar","doi":"10.1109/SMART55829.2022.10047250","DOIUrl":"https://doi.org/10.1109/SMART55829.2022.10047250","url":null,"abstract":"It is frequently required to evaluate data acquired from numerous network logs in order to offer a more accurate judgement of the severity of a cyber threat. This may be accomplished by reviewing the data. One example would be the examination of log records produced by command line tools in solitary confinement. In spite of the fact that employing a log management system makes it simpler to identify certain log documents, it might be time-consuming to examine all of them in order to determine the connection(s) between the different types of network activity. To construct these bridges, we may make use of relational databases by, for example, linking the tables by using complicated database queries that make use of a large number of join processes. Recent years have seen a rise in interest in the use of graph databases as a method for the storage and organization of data in preparation for semantic searches.","PeriodicalId":431639,"journal":{"name":"2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124341523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1