Salim Khan, F. Hasan, M. O. Faruk, Anayet Ullah, Mohammad Woli Ullah, Abdul Gafur
{"title":"Machine Learning Method Based Industrial Risk Analysis and Prediction","authors":"Salim Khan, F. Hasan, M. O. Faruk, Anayet Ullah, Mohammad Woli Ullah, Abdul Gafur","doi":"10.1145/3542954.3543003","DOIUrl":"https://doi.org/10.1145/3542954.3543003","url":null,"abstract":"IoT-based technologies growing all over the world. After the industrial revolution, machines and robots gradually replaced human effort. In the absence of the human brain-machine and robots makes an error. In this paper, a plan was developed to get out of this situation that works not only efficiently but also thinks like humans. In this system, the machine will learn based on the situation that has been made by any occurrence. In this work Raspberry Pi-based system helps to make a proper analysis of the machines. Voltage, current, gas value, and temperate values are taken as input parameters. Machine learning matches/compares these real-time sensor data with training data (which is used to train the system). As a result, The machine learning module provides some statistics graphs of sensor data. Machine performance can analyze by observing these graphs. Also, determine the efficiency and predict the possibility of upcoming threats or risks.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125742736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Akib Shahriar Khan, Md Jannatul Baki Showmik, Tanvir Ahmed, A. Saif
{"title":"A Constructive Review on Pedestrian Action Detection, Recognition and Prediction","authors":"Md. Akib Shahriar Khan, Md Jannatul Baki Showmik, Tanvir Ahmed, A. Saif","doi":"10.1145/3542954.3543007","DOIUrl":"https://doi.org/10.1145/3542954.3543007","url":null,"abstract":"Analysis of pedestrian activities in the video sequences is an intriguing domain that incorporates vast applications, such as autonomous driving systems, traffic control systems and interactions between people and computers. The primary focus of this research was on evaluating several strategies to analyse pedestrian activities effectively. The constructive comparison included three main steps, i.e. detection of the pedestrian, recognition of their actions and prediction about the activity of the pedestrian. Changes in activities of pedestrians, dynamic background, moving camera, view angle and processing time made it more challenging. Recent approaches were justified and compared based on precision accuracy, processing time and minimum resource allocation. The results were also compared by a series of state-of-the-art research datasets with provided significant observations in terms of greater accuracy which can lead to the construction of an extremely improvised system that would save pedestrian people from road accidents and assist autonomous driving systems. The purpose of this study is to discuss the current progress using different approaches.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125592972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md Musleh Uddin Hasan, M. Hossain, M. Hossain, K. I. Rushee
{"title":"Possible Side Effects after Getting COVID-19 Vaccine Based on Pre-Existing Disease: Asthma: Analysis of Side Effects after using Moderna, Pfizer and Janssen Vaccine Based on VAERS Dataset","authors":"Md Musleh Uddin Hasan, M. Hossain, M. Hossain, K. I. Rushee","doi":"10.1145/3542954.3543001","DOIUrl":"https://doi.org/10.1145/3542954.3543001","url":null,"abstract":"Vaccination could be a critical preventative strategy against coronavirus disease 2019 (COVID-19), and it is essential to understand the vaccine's usability in the general population. A safe and effective vaccination is the most effective way to terminate this epidemic. Many communities throughout the globe have expressed concerns regarding the efficacy and side effects of coronavirus SARS CoV2 vaccinations. Vaccines are now being rushed to market. Many papers have been published on COVID-19 vaccine, hesitancy, acceptance rate, local survey, vaccine distribution, vaccine information, etc. However, none of them mentioned any potential side effects from the COVID-19 vaccination for those with pre-existing disease like Asthma. The study aimed to describe the possible side effects after getting COVID-19 vaccines (Moderna, Pfizer and Janssen) for those who have a pre-existing disease like Asthma.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114152680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An overview of Mobile Edge Computing in Vehicle Platooning","authors":"Tareq Md Rabiul Hossain Chy, Nushrat Jahan","doi":"10.1145/3542954.3542975","DOIUrl":"https://doi.org/10.1145/3542954.3542975","url":null,"abstract":"Due to a vehicle terminal’s limited computing capacity against cloud computing, it is quite hard to meet the needs of certain services and applications, mainly for intensive types of computation, resulting in increased computation burden and delay, as well as increased energy consumption. MEC (Mobile Edge Computing) is a up to date architecture which extends the processing and the storage services to the network’s edge. It’s a cutting-edge technology that can serve many devices and services with ultra-low latency. For vehicle platooning a task offloading is analyzed in this paper.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129669714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing Website Detection using Deep Learning","authors":"Md. Abubakar Siddiq, Md. Arifuzzaman, M. S. Islam","doi":"10.1145/3542954.3542967","DOIUrl":"https://doi.org/10.1145/3542954.3542967","url":null,"abstract":"Phishing attack is a type of cyber-attack where attacker sends fraudulent (spoofed, fake or deceptive) messages designed to lure a human victim to give away personal information or credentials or to deploy malicious software in victim's infrastructure like ransomware. As Internet usage is increasing day by day so are the cyber-crimes and scams. Phishing is one of the latest sophisticated techniques used by the scammers. Phishing website detection can help the users to avoid falling victim to these attacks. Although phishing websites are disguised as a legitimate one, fortunately they have some identifiable features. We have proposed a supervised learning approach using deep learning algorithms to detect phishing websites. We have achieved 94.8% accuracy using standard neural network model and achieved 93.6% accuracy with CNN (Conv2D) model. We have used a dataset downloaded from University of California, Irvine machine learning repository.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124310178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazi Md Minhajul Haider, Mondira Dhar, Fahima Akter, Sadia Islam, Syed Ragib Shariar, Muhammad Iqbal Hossain
{"title":"An Enhanced CNN Model For Classifying Skin Cancer","authors":"Kazi Md Minhajul Haider, Mondira Dhar, Fahima Akter, Sadia Islam, Syed Ragib Shariar, Muhammad Iqbal Hossain","doi":"10.1145/3542954.3543019","DOIUrl":"https://doi.org/10.1145/3542954.3543019","url":null,"abstract":"Unrepaired deoxyribonucleic acid in skin cells causes skin cancer by generating genetic abnormalities or mutations, rising day by day. Detecting or diagnosing skin cancer in its initial stages is expensive and challenging, giving superior treatment options. Given the severity of these issues, researchers have generated a set of early classification techniques for skin cancer. Skin cancer is diagnosed and segregated from melanoma by looking at the symmetry, color, size, shape, and other features of lesions. While there are various computerized approaches for classifying skin lesions, convolutional neural networks (CNNs) have exceeded standard practices. In this paper, we have used multiple machine learning libraries. Also, we have used five pre-trained models such as VGG-16, VGG-19, Inception V3, Efficient Net B7, ResNet 50 models and presented our proposed model for skin cancer classification using the HAM10000 dataset, which is an enormous skin cancer dataset. This research reports a maximum accuracy of 85.25% for Inception V3 models within five pre-trained models and the highest accuracy of 90.55% for our proposed model. In terms of image detection, our experimental settings show that our suggested model achieved the best classification accuracy than the other five pre-trained models. Our findings are helpful in providing a comprehensive comparison with brief analysis of many deep neural networks in the categorization of skin cancer.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126194518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Banking Management System Architecture Using AI & Blockchain","authors":"Meherab Mamun, B. Arifuzzaman, S. Mahmud","doi":"10.1145/3542954.3542966","DOIUrl":"https://doi.org/10.1145/3542954.3542966","url":null,"abstract":"The digital revolution has changed many elements within the online banking industries. Even with many state of the art advancements, there are technologies to help secure the banking system on their digital platforms. So therefore it is crucial to have a complete secure system architecture, where various security features aid the digitized platform. In this paper, a banking management system architecture is proposed where the system is devised with the interaction of three modern technologies: Artificial Intelligence, Blockchain, and Hyperledger. All these three technologies are working together as one part of a multi-layer security and management system, as well as, it improves the security of the bank. In order to analyze the implementation of these systems, each of the architectures is defined separately with comparison-based evaluation to derive the fact how these technologies within our system architecture works efficiently.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131697160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Md. Redowan Mahmud Arnob, Sabiqun Nahar, Mohammad Nasir Uddin
{"title":"An Empirical Analysis of 5.76 Tbits/s SDM-PDM-Nyquist superchannel WDM hybrid multiplexing technique for channel capacity enhancement","authors":"Md. Redowan Mahmud Arnob, Sabiqun Nahar, Mohammad Nasir Uddin","doi":"10.1145/3542954.3542971","DOIUrl":"https://doi.org/10.1145/3542954.3542971","url":null,"abstract":"This article presents the feasibility study of 5.76 Tbits/s SDM-PDM-Nyquist superchannel WDM hybrid multiplexing technique for enhancing the channel capacity over a transmission distance up to 10 km using C-band frequencies in the multimodal domain. This system uses 48 independent channels carrying 48 bits streams of data using 8 C-band frequencies, 2 polarization states, and 3 LP modes. At a transmission distance of 10 km, satisfactory BER (log BER -9.35, faithful Q-factor 6.09, and extinction ratios 7.78 were observed with the minimum OSNR (46.5 dB) of the system, not going below the minimum OSNR (27.8) considering FEC limit. Each channel receives a satisfactory amount of power after 2 stage amplification process leading to a spectral efficiency of 137%.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125340611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rahul Deb Mohalder, Juliet Polok Sarkar, Khandkar Asif Hossain, Laboni Paul, M. Raihan
{"title":"Efficient Machine Learning Techniques to Predict Lung Cancer","authors":"Rahul Deb Mohalder, Juliet Polok Sarkar, Khandkar Asif Hossain, Laboni Paul, M. Raihan","doi":"10.1145/3542954.3543067","DOIUrl":"https://doi.org/10.1145/3542954.3543067","url":null,"abstract":"One of the most difficult to diagnose and one of the deadliest diseases is lung cancer. A big reason for this is that it takes a long time to identify at an early stage. For treatment, a rapid and precise diagnosis of nodules is very crucial. In order to identify cancer in its early stages, a variety of techniques have been employed. Machine learning approaches were used in this work in order to identify lung cancer nodules. We used machine learning algorithms such as LightGBM, XGBoost, K-Nearest Neighbors, Support Vector Machines, Naïve Bayes, and Random Forest to discover anomalous data. We compared all of the approaches. The results of the experiments reveal that LightGBM produces the greatest outcomes with 99.91 percent accuracy, 0.001261 loss and XGBoost outcomes with 99.86 percent accuracy, 0.001446 loss.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EMG-Based Hand Gesture Dataset to Control Electronic Wheelchair for SCI Patients","authors":"S. Afrin, H. Mahmud, Md. Kamrul Hasan","doi":"10.1145/3542954.3542979","DOIUrl":"https://doi.org/10.1145/3542954.3542979","url":null,"abstract":"This paper presents electromyography (EMG)-based hand gesture dataset to control electric wheelchair for the patient with spinal cord injury (SCI). We have recorded eight-channel surface EMG (sEMG) signals from EMG sensor placed at the forearm of the SCI patient. These signals were collected from six hand gesture-based wheelchair control movements (forward, backward, left, right, start and stop). We collected hand gesture data containing different EMG signals from 12 healthy subjects and 7 SCI subjects. Later on, The EMG signals were segmented and the time-domain feature extraction technique was applied to generate 18000 training samples and 10500 testing samples. We then classified the hand gestural EMG signals using 5 different classical machine learning models. We analyze the classification results in two ways. The first one is, training the models using only data of healthy subjects and cross-validated using data from 7 SCI patients. And the second one is by including six SCI patient’s data in the training process along with healthy subjects we performed leave one out cross-validation. From this analysis we were able to achieve highest 95.42% accuracy using decision tree (DT) and Random Forest(RF) algorithms.","PeriodicalId":104677,"journal":{"name":"Proceedings of the 2nd International Conference on Computing Advancements","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122574285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}