{"title":"Techniques for Sensing Heartbeat using IoT","authors":"Ananya Chaturvedi, A. Sajnani, S. Khatri","doi":"10.1109/ISCON47742.2019.9036171","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036171","url":null,"abstract":"These days various people are losing their life inferable from heart assault and lack of restorative regard for patient at correct stage. Consequently, in this task we are actualizing pulse checking and heart assault acknowledgment framework using IoT. The patient will convey equipment having sensors with android application. The heartbeat sensor will permit monitoring heart beat measures and sending them to the web. The client may set the high and low dimension of heartbeat limits. Once these limits are set the framework can begin observing the patient's pulse and when the heart beat readings go above or beneath the farthest point set by the client the framework will send a caution about high or low heartbeat also about shots of heart assault.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Blockchain in Financial Sector to Improve Scalability","authors":"Sheetal Sinha, Kumkum, R. Bathla","doi":"10.1109/ISCON47742.2019.9036241","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036241","url":null,"abstract":"The Blockchain is an encrypted database that stores information statistics, or in different words, it is a virtual ledger of any transactions, contracts - that needs to be independently recorded. One of the key capabilities of Blockchain is that this virtual ledger is out there throughout several masses and heaps of computer and isn't always sure to be stored in a single place. Blockchain chain has already commenced disrupting the financial offerings area, and it's far this technology which underpins the virtual currency- bitcoin transaction. The aim of the paper is to conduct research on the effect of blockchain technology on the financial sector. There is no doubt that the world is curious to see how this promising technology will influence or shape the future of banking. Blockchain enhances safety in data storage and transmutation, avails a decentralized and transparent network infrastructure and significantly reduces the costs in operations. These remarkable attributes make blockchain a very promising and in-demand solution even in an industry as restricted as the banking sector.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117342199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Fraudulent Insurance Claims Using Random Forests and Synthetic Minority Oversampling Technique","authors":"Sonakshi Harjai, S. Khatri, Gurinder Singh","doi":"10.1109/ISCON47742.2019.9036162","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036162","url":null,"abstract":"There has been a significant amount of growth in the number of fraudulent activities by the policy-holders over the last couple of years. Deliberately deceiving the insurance providers by omitting facts and hiding details while claiming for insurance has led to significant loss of money and customer value. To keeps these risks under control; a proper framework is required for judiciously monitoring insurance fraud. In this paper, we demonstrate a novel approach for building a machine- learning based auto-insurance fraud detector which will predict fraudulent insurance claims from the dataset of over 15,420 car-claim records. The proposed model is built using synthetic minority oversampling technique (SMOTE) which removes the class imbalance-ness of the dataset. We use random forests classification method to classify the claim records. The data used in our experiment is taken from a publically available auto insurance datasets. The outcomes of our approach were compared with other existing models based on various performance metrics.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131409945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Criminal Activity Detection in Social Network by Text Mining: Comprehensive Analysis","authors":"Tamanna Siddiqui, A. Amer, N. A. Khan","doi":"10.1109/ISCON47742.2019.9036157","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036157","url":null,"abstract":"Criminal activity detection in social network by text mining is the process of finding criminal activity by the criminals and help law text mining technique, the ability to detect hidden text from corpus documents. Text mining is process of transforming data from unstructured text to structured text which is easily perceived and processed by humans, but hard for machines to understand without designing algorithms, tools and methods in order to effectively process, such enforcing agencies to keep control of the prevailing crimes Text mining is method deriving high-quality information from raw data through the pattern devising and statistical pattern learning. Text mining is field a multidisciplinary field that relies on data mining, information retrieval, statistics, machine learning, and computational linguistics. The main thing in text mining process of analyzing and exploring is natural language processing, information retrieval, information extraction, content analysis, text clustering, and text classification. All that processes are wanted after you complete a step, the preprocess task. The importance of pre-processing task is to reduce the volume of the corpus textual documents and the tasks involved in that step are text boundary determinant, natural language specific stemming stop-word, elimination, and tokenization to remove unwanted data and handling missing data. Among this, doing the most important work is tokenization. Tokenization assist to divide the text data to individual words, open source tools become available for those interested such as spacy, NLTK with python, Gensim and many other. After that define model architecture to fit the model on the training data and evaluate this model on test simple data in order to predict values.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128122444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of analogical analysis techniques in interpretation of lineaments and litho-boundaries using Landsat 7 ETM+ imagery of western Jahajpur belt, Bhilwara, Rajasthan, India","authors":"Mahesh Kumar Tripathi, H. Govil","doi":"10.1109/ISCON47742.2019.9036196","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036196","url":null,"abstract":"Broader capability of synoptic view of remote sensing image helps solving many geological enigmas because of limitations of conventional geology investigation to map the structural features such as lineaments because of manual and mapping error. To correct these types of error using remote sensing technology, which have better capability to map or delineate the structural features. The lithological map on the characteristics of rocks, lithotype, association and mineral assemblage for example ground water investigation on the basis of lineaments network. The main rocks of Jahajpur group are associated with dolomite, phyllite and quartzite. Demarcation of litho boundaries in this area is a challenging task because of minute variations in place to place according to SW-NE trending ridge. This research work carried out for analogical interpretation of lithobounderies and lineament through Landsat 7 ETM+ multispectral satellite on Eradas Imagine and Arc GIS software. There are various shorter lineaments are visually interpreted other than long lineaments.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Health Care Management System Using Time Series Analysis","authors":"Shubhangu Shukla, Pulkit Singh, Narayan Neopane, Rishabh","doi":"10.1109/ISCON47742.2019.9036150","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036150","url":null,"abstract":"The paper proposes a technique for risk prediction with graph-based proofs so as to observe and monitor the progress of a developing situation in the field of health. Making an automated system which will help to predict various health parameters of a host remotely is our primary objective. Providing a way to predict the future body temperature, pulse rate, haemoglobin, systolic and diastolic pressure with the help of an existing data set record, in an optimized manner is our primary concern using which we can forecast the health of a patient. Using the collected data with the help of a built-in framework to detect future health hazards is our main objective. Forecasting the health condition is being done by using Time series algorithm to predict body temperature, pulse rate, haemoglobin, systolic and diastolic pressure of the host patient, in an efficient manner. The errors generated for the forecast values are compared using various error evaluation techniques.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Parameter Analysis of Congestion Control in Wireless Sensor Networks","authors":"Divya Pandey, V. Kushwaha","doi":"10.1109/ISCON47742.2019.9036302","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036302","url":null,"abstract":"Congestion control has been witnessed as most pervasive problem in the literature for design and development of Wireless Sensor Networks(WSNs). The most obvious reason of congestion occurrence in WSNs is resource constraints in terms of information processing, storage space, transmission bandwidth and most importantly power supply. To cope effectively with this problem, researchers need to model energy-aware protocols and algorithms along with taking into account different networking parameters such as throughput, reliability, fairness, packet loss ratio, etc. to ensure quality of service. In this research article, we have provided a comprehensive analysis of performance parameters considered by researchers and programmers while designing congestion control algorithms in wireless sensor networks, and their effect on the performance of algorithms. Unlike past studies we have not only considered classical approaches but also analyzed novel soft computing based approaches. It is logical intellection to take a holistic view and study the performance metrics of both the approaches of congestion control so that it would be useful for improving algorithms and further directions in the field of WSNs.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128992244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Authentication Model for Online Transactions Using Biometric Security","authors":"Yoshita Sharma, Himanshu Gupta, S. Khatri","doi":"10.1109/ISCON47742.2019.9036284","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036284","url":null,"abstract":"The recent developments in online transactions have benefitted the consumer by enabling them to perform transactions on small mobile or tablet sized devices rather than on large mainframes or other virtually connected structures. The next generation of online transactions highlights the issue of successfully making secure online transactions as the 3 prime categories in any online transaction, namely, Banking, Wallet, and Shopping, enables the consumers to store their passwords on the application itself which later is stored in the databases or on servers. This increases the possibility of password breaches. Thus, the application of technology like Biometric security, will not only decrease the threat to personal data, but the consumers would no longer have to remember passwords, and through each step, while making an online transaction it would be secured with their biometric prints. This paper outlines the importance of biometric in today's fast pacing world where technology is rapidly advancing and each day bringing more threat to data, identity, and credentials of the consumers.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124045974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment/Opinion Review Analysis: Detecting Spams from the good ones!","authors":"Yshika Agarwal, D. Sharma, R. Katarya","doi":"10.1109/ISCON47742.2019.9036249","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036249","url":null,"abstract":"In this era of Whatsapp, Facebook, Twitter, Instagram, and various other social media platforms, we all are connected to each other's thought in one way or another. The Internet has brought us closer to everybody's work, place, plans, ethics, feelings, and emotions. We are much more interested in showing off our day, commenting and reviewing each and everything we came across throughout the day, knowing others opinion on the same and identifying how and why are they different from ours. Reviews also help in identifying the market conditions and strategies, and it could be done via Sentimental analysis as it helps us in identifying the things that are in trend and helps the organizations, businesses to utilize and expand accordingly. It can also be used in general by people themselves to look for which movie to watch to which laptop to buy, but when we encounter spam reviews we sometimes do not know whether they are fake or not in reality, but they do change our point of view. In this article, we go through this in a step by step format of different papers and summarize for other readers how we can identify the correct emotions and differentiate between the real and fake reviews. Using some researches, we get to know in-depth about how to choose the correct dataset, and the challenges faced.","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124585382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Vishwakarma, P. Jain, Namrata Sahayam, Kanchan Cecil
{"title":"A Modified Turbo Coding for Reduction of FADING&BER in 4x4 OFDM with Full Rate of Communication-Implementation","authors":"A. Vishwakarma, P. Jain, Namrata Sahayam, Kanchan Cecil","doi":"10.1109/ISCON47742.2019.9036206","DOIUrl":"https://doi.org/10.1109/ISCON47742.2019.9036206","url":null,"abstract":"In this study, we have found the outcome of nonlinear distortion, in this case phase distortion which is caused by High Power Amplifier (HPA) in Multi Input Multi Output System which consists of transmit/ receive filtering is scrutinized in detail. It is shown that nonlinear distortion impact in MIMO and SISO system is somewhat different. Then we figured out the constraints & Inadequacy from preceding papers. A new turbo encoder based phase compensator is proposed based on precise analysis. In Orthogonal Frequency Division Multiplexing (OFDM) an appropriate solution which provides better compensation of spectrum re-growth, constellation warping for ISI & ICI, the presented work uses a unique Turbo coding in Orthogonal Frequency Division OFDM based MIMO communication for fading&ICI reduction, Available MIMO-Turbo encoding are not working at full rate hence proposed work will use Space Frequency Block division (SFBD)to provide better orthogonality instead of Space-Time Block Coding (STBC).","PeriodicalId":124412,"journal":{"name":"2019 4th International Conference on Information Systems and Computer Networks (ISCON)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128813888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}