首页 > 最新文献

2019 3rd International Conference on Computing and Communications Technologies (ICCCT)最新文献

英文 中文
An Approach To Comment Analysis In Online Social Media 网络社交媒体中的评论分析方法
K. Anitha, V. Saraswathy, K. Gayathri, S. Priya
Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.
社交媒体在我们的日常生活中变得普遍。人们通过评论来表达自己的观点、感受和情感。对用户输入的评论进行分析。使用Naïve贝叶斯算法来检测冒犯性和讽刺性的评论,从而防止它们在社交媒体上被上传。
{"title":"An Approach To Comment Analysis In Online Social Media","authors":"K. Anitha, V. Saraswathy, K. Gayathri, S. Priya","doi":"10.1109/ICCCT2.2019.8824949","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824949","url":null,"abstract":"Social media became prevalent in our day to day life. People express their views, feelings, emotion via comments. Those comments entered by the user is analyzed. The Naïve Bayes Algorithm is used to detect the offensive and sarcastic comment, thus preventing them from being uploaded in social media.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132664560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review On Performance Of Voice Feature Extraction Techniques 语音特征提取技术研究进展
D. Prabakaran, R. Shyamala
In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.
在数字时代,通过加强身份验证凭证来保护计算应用程序免受匿名攻击。已经提出了许多方法和算法来实现人类生物特征作为唯一身份,其中一种身份就是人类声纹。人的声纹是个体的一种独特特征,具有多种表示和提取数字语音信号特征的技术。语音识别技术在不同的平台上运行,并且在语音特征提取中使用不同的数学工具,导致性能和结果存在差异。在本文中,我们调查,分析和介绍了性能的多种语音识别技术的综述。
{"title":"A Review On Performance Of Voice Feature Extraction Techniques","authors":"D. Prabakaran, R. Shyamala","doi":"10.1109/ICCCT2.2019.8824988","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824988","url":null,"abstract":"In the digital era, the computing applications are to be secured from anonymous attacks by strengthening the authentication credentials. Numerous methodologies and algorithms have been proposed implementing human biometric as unique identity and one such identity is human voice print. The human voice print is a unique characteristic of the individual and has a wide variety of techniques in representing and extracting the features from the digital speech signals. The voice recognition techniques were executed on different platforms and exploit different mathematical tools in voice feature extraction, leading to dissimilarity in performance and results. In this paper, we investigate, analyze and present a review on performance of numerous voice recognition techniques.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
A Model For Enhancing The Structure And Strategy In An E-Learning Environment 电子学习环境下结构与策略优化模型
S. Subha, S. Priya
In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.
在电子学习领域,可以采取数百个维度,并可以根据用户的浏览历史进行预测。如今,网络学习已成为面对面教育的替代方式,网络学习成为学习过程中的有效工具。电子学习为学习者与数字化交付的内容和服务互动铺平了道路。它侧重于使学习者在学习过程中变得更感兴趣和更有效率。本文旨在设计在电子学习环境下改进课程结构、评估标准和课程完成率的策略。为实现这一目标,制定了以下子目标。第一个目标是提供一个定义良好的课程结构,而第二个目标侧重于设计一个具有特定评估标准的电子学习系统。第三个目标是实现注册学生的高完成率。通过框架定义结构,可以为给定的学生数据集固定和计算各种评估标准。最后,招生考生的积极参与可以经常检查。机器学习算法可以有效地用于处理大量数据。
{"title":"A Model For Enhancing The Structure And Strategy In An E-Learning Environment","authors":"S. Subha, S. Priya","doi":"10.1109/ICCCT2.2019.8824857","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824857","url":null,"abstract":"In the domain of E-learning, hundreds of dimensions can be taken and predictions can be made based on the browsing history of the users. Nowadays, web-based learning becomes an alternate to face to face education and E-learning becomes an effective tool in the learning process. E-Learning paves way for the learners to interact with the digitally delivered content and services. It focuses on making the learners to become more interested and efficient in their study process. This paper aims at designing strategies that will improvise the structure, assessment criteria and course completion rate in an e-learning environment. To achieve this aim, the following sub-objectives have been framed. The first objective is to provide a well-defined structure of the course whereas the second objective focuses on designing an e-learning system with specific assessment criteria. The third objective aims at achieving high completion rates for the registered students. By framing a defined structure, various assessment criteria can be fixed and calculated for a given student data set. Finally the active participation of enrolled candidates can be examined frequently. Machine Learning algorithms can be used efficiently in order to handle data in large amount.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133879196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Web –Based Street Light System 基于网络的路灯系统
S. Priyanka, T. Lakshmi, S. Sakthy
The proposed system uses a smart street light which are weather adaptive. The project is implemented by embedding a smart system which controls the automatic switching of the street lights. The system switches ON the street light automatically during the night time and is switched OFF during the day time. Manual work is not done here since the ON/OFF is done automatically. The authorized person can access the switch through internet anywhere and at anytime. At the top of the street a camera is placed in order to capture the footages and track the actions that are been taking place. These footages are sent to the server through internet. In addition to the camera, a panic button is being placed on the pole, in case of any emergencies the person can press the panic button which triggers an alarm to the nearby police stations about the current situation. Whenever the panic button is pressed, the current footages that are taken by the camera are sent immediately to the nearby police station, for them to view the incident’s spot. All the area street lights are connected to the nearby police station which can be accessed through the cloud services. Thus, this system ensures safety and energy consumption.
该系统使用一种可适应天气的智能路灯。该项目通过嵌入控制路灯自动开关的智能系统来实现。该系统在夜间自动打开路灯,在白天自动关闭。这里不需要手动操作,因为开/关是自动完成的。授权人员可以随时随地通过互联网访问交换机。在街道的顶部放置了一台摄像机,以便捕捉镜头并跟踪正在发生的动作。这些视频通过互联网发送到服务器。除了摄像头外,电线杆上还安装了一个紧急按钮,一旦发生紧急情况,人们可以按下紧急按钮,警报就会向附近的警察局发出警报,告知当前情况。每当紧急按钮被按下时,摄像机拍摄的当前画面就会立即发送到附近的警察局,以便他们查看事件发生的地点。所有地区的路灯都连接到附近的警察局,可以通过云服务访问警察局。因此,该系统保证了安全性和能耗。
{"title":"Web –Based Street Light System","authors":"S. Priyanka, T. Lakshmi, S. Sakthy","doi":"10.1109/ICCCT2.2019.8824931","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824931","url":null,"abstract":"The proposed system uses a smart street light which are weather adaptive. The project is implemented by embedding a smart system which controls the automatic switching of the street lights. The system switches ON the street light automatically during the night time and is switched OFF during the day time. Manual work is not done here since the ON/OFF is done automatically. The authorized person can access the switch through internet anywhere and at anytime. At the top of the street a camera is placed in order to capture the footages and track the actions that are been taking place. These footages are sent to the server through internet. In addition to the camera, a panic button is being placed on the pole, in case of any emergencies the person can press the panic button which triggers an alarm to the nearby police stations about the current situation. Whenever the panic button is pressed, the current footages that are taken by the camera are sent immediately to the nearby police station, for them to view the incident’s spot. All the area street lights are connected to the nearby police station which can be accessed through the cloud services. Thus, this system ensures safety and energy consumption.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127225782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Navigation Technology to meet new people using Fused Location API 导航技术,以满足新的人使用融合定位API
Bharath Ravi Prakash, S. S. Kulkarni
There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.
在我们日常生活中使用的技术范围总是需要改进的。本文主要研究用户的位置更新问题。这可以通过使用融合定位API的概念来实现。位置api理论路径点是区域创新的兴趣点,融合位置提供程序用于获取区域数据,并尽可能减少在预期情况下的功耗,以及操作确认,使应用程序能够适应客户端的当前活动。使用Fused Location的一个优势是能够连接朋友,即使他们在不同的时间来自不同的地点。主要的概念是设计和开发一个应用程序,帮助跟踪朋友。所提出的应用程序能够从手机中收集手机的GPS位置信息,并以简单方便的方式呈现该信息。
{"title":"Navigation Technology to meet new people using Fused Location API","authors":"Bharath Ravi Prakash, S. S. Kulkarni","doi":"10.1109/ICCCT2.2019.8824831","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824831","url":null,"abstract":"There is always a need for improvement in the scope of technology used in our daily life. This paper consists of one such aspect that mainly concentrates on location updates of user. This is made possible by using the concept of Fused location API. The Location APIs theoretical path points of interest in the area innovations, Fused Location Provider is utilized for obtaining area data with as decreased power use as could be expected under the circumstances and action acknowledgment for enabling applications to adjust to the present activity of the Client.One advantage of using Fused Location is the ability to connect friends even if they are from different locations at different periods of time.The main concept was to design and develop an application which helps to keep track of friends. The proposed application is able to gather information of the phone’s GPS locations from the phone and present the information in a simple and convenient way.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133090780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated Power Management with Automated Attendance System 集成电源管理与自动考勤系统
V. Narmadha, K. Aparna, J. Kamaleshwari, K. Tharny
Optimal energy management in smart spaces requires intelligent and reliable energy-aware-based context sensing and technologies that are capable of recognizing and analyzing the power consumption. In this system, we propose a efficient and reliable power management system with inclusion of automated attendance. The main objective is to automatically control the fan and lights inside any space involving number of people. The next objective is automated attendance. ID cards containing barcode data is sufficient for their identity, show case their real time data, their usage additional fine system for being late. Priority of this work, is made to ensure that this system is affordable to all with assurance of data integrity and authority.
智能空间的最佳能源管理需要智能可靠的基于能量感知的环境感知和能够识别和分析功耗的技术。在这个系统中,我们提出了一个高效可靠的电源管理系统,包括自动考勤。主要目标是自动控制风扇和灯光在任何空间涉及的人数。下一个目标是自动出勤。包含条形码数据的身份证足以显示他们的身份,显示他们的实时数据,他们使用的额外罚款系统迟到。这项工作的优先事项是确保所有人都能负担得起这个系统,并保证数据的完整性和权威性。
{"title":"Integrated Power Management with Automated Attendance System","authors":"V. Narmadha, K. Aparna, J. Kamaleshwari, K. Tharny","doi":"10.1109/ICCCT2.2019.8824905","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824905","url":null,"abstract":"Optimal energy management in smart spaces requires intelligent and reliable energy-aware-based context sensing and technologies that are capable of recognizing and analyzing the power consumption. In this system, we propose a efficient and reliable power management system with inclusion of automated attendance. The main objective is to automatically control the fan and lights inside any space involving number of people. The next objective is automated attendance. ID cards containing barcode data is sufficient for their identity, show case their real time data, their usage additional fine system for being late. Priority of this work, is made to ensure that this system is affordable to all with assurance of data integrity and authority.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129033904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Power Efficiency and Automation Based on IoT 基于物联网的电力效率和自动化
M. Parthasarathy, R. Aniruth, M. SureshKumar
Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.
在广泛的供电系统中,输电是电力分配的重要环节之一。尽管已经采取了各种措施来发现一种新的具有最小功率损耗的一致材料,但还有其他方法可以通过以复杂和有效的方式修改生产和使用系统来节省和防止功率和电流的损失。有一个统计需要收集数据,以便修改系统,以有效的方式分配产生的电力。根据世界银行收集的数据,我们所面临的总体损失在全球范围内的损失总量接近8.25%。在对我们在传输和使用过程中面临的损失进行了必要的研究和调查之后,我们提出了一项提案,该提案提供了一项倡议,旨在利用物联网,数据库,机器学习,嵌入式系统和传感器组件开发更有效的解决方案。
{"title":"Power Efficiency and Automation Based on IoT","authors":"M. Parthasarathy, R. Aniruth, M. SureshKumar","doi":"10.1109/ICCCT2.2019.8824848","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824848","url":null,"abstract":"Power transmission is one of the vital process in distribution of power in the widespread power supplying system. Even though various measures have been taken to discover a new consistent material with minimal power loss there are other ways to save and prevent loss of power and current by modifying the production and usage system in a sophisticated and efficient manner. There is a statistical need to collect the data in order to modify the system to distribute the generated power in a efficient way.The overall losses that we are facing according to the data collected by world bank the quantity of loss is aggregated near 8.25% all over the world. After conducting essential research and survey on the loses that we are facing during transmission and usage we have come up with a proposal that provides a initiative to develop a more efficient solution regarding this problem using IoT, Database, Machine learning, Embedded Systems and Sensor Components.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124957635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Preservation of Attribute Couplet Attack by Node Addition in Social Networks 基于节点添加的社交网络属性对联攻击保护
M. Kiranmayi, N. Maheswari, M. Sivagami
Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.
社交网络是最理想的平台之一,在那里可以从许多不同的社交平台获得大量的数据。发布数据时不隐藏个人敏感数据或外交数据是一个不能保证隐私的关键问题。因此,公布的数据需要在公布之前删除个人的识别细节(匿名)。匿名数据更具挑战性,也是社交网络中数据发布的一种流行的隐私保护模式。然而,即使在对数据集进行匿名化处理后,攻击者仍试图找到新的方法来获取具有一定背景知识的个人的私人信息并对其进行识别。其中一种方法是属性对偶攻击,攻击者掌握数据的一些背景信息,利用一对节点属性派生出身份。在现有方法中,k-对偶匿名利用边缘修改方法实现了属性对偶攻击下的隐私性。这将改变节点之间的距离属性,还可能引入不希望的和误导性的假关系。本文采用节点加法的方法设计了一种名为“对联匿名化”的算法。添加新节点并将其连接到原网络中的一些节点可以避免这种属性对偶攻击,并且可以更好地保留网络属性。这种节点的增加有助于减少虚假关系的误导,同时也保持了社交网络的效用。
{"title":"Preservation of Attribute Couplet Attack by Node Addition in Social Networks","authors":"M. Kiranmayi, N. Maheswari, M. Sivagami","doi":"10.1109/ICCCT2.2019.8824873","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824873","url":null,"abstract":"Social Network is one of the most desired platform where an immense amount of data are available from many different social platforms. Publishing data without hiding sensitive data or diplomatic data about individuals is a crucial problem which cannot guarantees the privacy. Therefore published data needs to remove identifying particulars of the individuals (anonymized) before the data is released. Anonymizing data is more challenging and a popular privacy preserving model for data publishing in social networks. However even after anonymizing the data sets, attackers try to find new methods to derive private information of individuals with some background knowledge and identify them. One of such method is attribute couplet attack where the attacker has some background information about the data and derive the identity using a pair of node attributes. In the existing approach, the k-couplet anonymity achieves the privacy under the attribute couplet attack by using edge modification approach. This will change the distance properties between nodes and might also introduce undesirable and misleading fake relations. In this paper, we design an algorithm named Couplet Anonymization by using node addition approach. Adding new nodes and connecting them to some of the nodes in the original network can avoid this attribute couplet attack and gives a better chance to preserve the network properties. This node addition helps to reduce the misleading fake relations and also preserves the utility of the social networks.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125564057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Efficient Deep Neural Network Multilayer Perceptron Based Classifier in Healthcare System 基于深度神经网络多层感知器的医疗系统分类器
C. L. Krishna, P. V. Reddy
The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.
存储在各种存储库中的数据量一直在快速增长。为了从这些数据中发现隐藏的信息,需要信息提取技术。这导致使用数据挖掘和机器学习任务,如分类。医疗保健系统是每天产生大量记录的行业之一。与医疗领域相关的数据处理患者的诊断,更高的决策准确性被期望。在这项工作中,我们处理克利夫兰心脏病数据的分析,其中包含303例患者记录。在处理后的数据上应用四种分类器来衡量分类的准确性。我们的研究结果表明,深度神经网络MLP分类器能够更准确地诊断患者的状态。
{"title":"An Efficient Deep Neural Network Multilayer Perceptron Based Classifier in Healthcare System","authors":"C. L. Krishna, P. V. Reddy","doi":"10.1109/ICCCT2.2019.8824913","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824913","url":null,"abstract":"The amount of data being stored in various repositories has been growing rapidly. In order to uncover hidden information from such data, there is a need for information extraction techniques. This resulted in the use of Data Mining and Machine Learning tasks such as Classification. One among the industries producing huge number of records on a daily basis is the Healthcare system. Data associated with medical field deal with the diagnosis of patients, higher accuracy in decision making is expected. In this work, we deal with the analysis of Cleveland Heart Disease data which contains 303 instances of patients records. Four classifiers are applied on the processed data to measure the accuracy of classification. Our results show that Deep Neural Net MLP classifier is able to diagnose the status of a patient with more accuracy.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116990255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Forensic Based Cloud Computing Architecture – Exploration and Implementation 基于取证的云计算架构——探索与实现
Sugandha Bhatia, J. Malhotra
The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.
云计算技术正以惊人的速度发展。它被认为是计算机工程和信息技术中最突出的研究领域之一。云计算提供平台、软件、虚拟机、安全和分析服务,并根据使用策略付费。因此,它为云计算用户和服务提供商提供了经济优势。这种信息技术的新范式非常有用,即便如此,隐私、安全和取证问题仍是云计算系统发展的主要障碍。云架构应该支持和兼容数字取证的工具或技术,这是当前的需要。因此,本文提出了一种支持云系统取证和调查的体系结构,以满足云计算应用和服务可持续发展的需要。
{"title":"Forensic Based Cloud Computing Architecture – Exploration and Implementation","authors":"Sugandha Bhatia, J. Malhotra","doi":"10.1109/ICCCT2.2019.8824813","DOIUrl":"https://doi.org/10.1109/ICCCT2.2019.8824813","url":null,"abstract":"The technology of cloud computing has been growing at an enormous speed. It is considered as one of the most prominent area of research in computer engineering and information technology. Cloud computing provides platforms, software, virtual machine, security and analytical services on the basis of pay as per usage policy. Hence, it furnishes economic advantage to cloud computing users and service providers. This new paradigm of information technology is very useful, even then, the privacy, security and forensic issues are the primary obstacles in the growth of cloud computing systems. It is need of the hour that cloud architecture should support and compatible with tools or techniques of digital forensics. Therefore, in this research paper an architecture is being proposed to support forensic accession and investigation of cloud based system which is required for the sustainable growth of the cloud computing applications and services.","PeriodicalId":445544,"journal":{"name":"2019 3rd International Conference on Computing and Communications Technologies (ICCCT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114641771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 3rd International Conference on Computing and Communications Technologies (ICCCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1