{"title":"Efficient Query Processing For Imprecise Data","authors":"","doi":"10.30534/ijatcse/2022/031142022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/031142022","url":null,"abstract":"In real world applications we often need to test the queries based on fuzzy data. For example, some one can specify as “find students’ whose age is around 17 years old.”; “find tall person”. “find employee with high salary”; “find country with low population” etc. This fuzziness in measurement is captured in this paper. To test such fuzzy queries, we have developed an algorithm that is applicable universally to any type of database. In this paper first we have designed architecture to test fuzzy query. In the architecture we have defined an algorithm to find the membership value for each tuple of the relation based on the fuzzy attributes on which fuzzy query is made. Next Decision Maker (DM) will supply a threshold value or -cut based on which corresponding SQL of the given fuzzy query will be generated. This SQL will retrieve the resultant tuples from the database. Finally we have tested our algorithm with an example.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129683304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Electronic Document Securisation based on Document Structure","authors":"","doi":"10.30534/ijatcse/2022/041142022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/041142022","url":null,"abstract":"Securing electronic documents is an important task. It secures the identity of a document. In this sense, methods (mainly cryptographic methods) have been put in place to guarantee the secrecy of the meaning of messages as well as the signing of documents from certificates. The digital document is only defined by its textual content. With the rise of OCRs, the alteration and fraudulent use of documents has increased. In this work we propose an algorithm based on the use of a code book to secure the identity of the document. The codebook stores information that uniquely identifies the document. The codebook is used to make a correspondence table between the elements that we consider important to take into account in the modeling of a document and the different values that are associated with these elements. The results of our algorithm show that it is quite efficient.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134000444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction of software defects by knowledge graph and genetic algorithm","authors":"","doi":"10.30534/ijatcse/2022/011142022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/011142022","url":null,"abstract":"Software defect detection is one of the biggest software development challenges and accounts for the largest budget in the software development process. One of the effective activities for software development and increasing its reliability is to predict software defects before reaching the test stage, which helps to save time in the production, maintenance and cost process. This research aims to present a software defect prediction method based on knowledge graphs and automated machine learning. We use knowledge acquisition, knowledge fusion, knowledge storage and knowledge calculation and other knowledge map construction technology research, to realize the knowledge map recommends high-quality software defect prediction models as the hot-start input conditions for automatic search. The empirical study uses NASA's open-source dataset experimental objects and six performance evaluation indicators include Precision, Recall, PRC (Precision Recall Characteristic), ROC (Receiver Operating Characteristic), F-Measure, MCC (Matthews Correlation Coefficient). The experimental results show that the proposed model performs better than the traditional classic software defect prediction model recommended by the knowledge map in terms of different datasets and evaluation indicators","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"8 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120904308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparative study of Sentiment Analysis on Amazon Product Reviews using Recurrent Neural Network (RNN)","authors":"","doi":"10.30534/ijatcse/2022/111132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/111132022","url":null,"abstract":"The problem of sentiment analysis on Amazon products is addressed in this research. In reality, because opinions are at the center of practically all human activity, sentiment analysis tools are used in almost every economic and social arena. They are also major influencers of our actions. The recurrent neural network (RNN) model is used to classify the product reviews of Amazon in this paper. Furthermore, using this family of models, which is particularly well-suited to the processing of sequential data, we were able to construct comprehensible text from an initial sequence on a character- by-character basis. As a result, we used three Amazon review datasets to estimate the authors' attitudes. As a result, we achieve results of 85% accuracy, and which are comparable to the greatest state-of-the-art models in this area.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128130855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT and Machine Learning approach for Early Heart disease Prediction & Diagnosis","authors":"","doi":"10.30534/ijatcse/2022/101132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/101132022","url":null,"abstract":"Heart disease is one of the most prominent causes of deaths globally. Every year almost 17.9 million people lose their life due to heart disease which account for 31% of total deaths worldwide. Most of the time patients know about their heart disease after reaching a severe heart condition from where total recovery is impossible. However, if the Cardiovascular state is monitored regularly, heart disease can be detected at an early stage and early detection can prevent the severity of most heart diseases. In most cases patients do not feel any kind of pain when the cardiovascular diseases grow slowly. By the time someone feels uneasiness and pain, their heart condition gets seriously bad. Moreover, it is also not feasible for everyone to check up on their heart condition periodically by visiting a heart specialist. Our proposed system will work for the early detection of heart diseases using Machine learning classifiers and IoT technologies. Our system has two subsystems. First one is our trained machine learning model which will be implemented as a WebApi. Second one is our IoT setup with heartbeat sensors. Sensors will collect data from the user's body and send those to the machine learning model. Then, the model will predict the result about the user’s heart condition and send it back to the IoT device. Model will classify the user’s heart condition either as “Normal” or “Abnormal”. Based on the result, the user should go to a cardiologist for a checkup. We have used the Heart Disease Dataset from UCI Machine Learning Repository. In addition, we trained seven machine learning algorithms after preprocessing the dataset. Further we will also build an IoT setup with sensors to communicate with the WebApi and complete our proposed system of predicting heart diseases.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132512177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Handwritten Digits Image Generation with help of Generative Adversarial Network: Machine Learning Approach","authors":"","doi":"10.30534/ijatcse/2022/091132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/091132022","url":null,"abstract":"In recent years, research into Generative Adversarial Nets (GANs) has increased dramatically. GAN was first proposed in 2014 and has since used in various real-time applications,Includes computer vision and natural language processing for approximately accurate results. Image composition is the most popular study of the many applications of GAN,Studies in this area have already shown the great future of using GAN for image composition.This article shows how to classify image composition methods, reviews different models of text-to-image composition and image-to-image conversionand provides some metrics and future research on image composition using GAN. I will explain the direction of in this paper. In current years, frameworks using Generative Adversarial Networks (GAN) have been very successful in many areas many areas, especially in image generation, asthey can create very realistic and crisp images and train on large datasets. However, successful GAN training can be very difficult if you need high resolution images. Text-to-image compositing, image-to-image conversion, face manipulation, 3D image compositing, and deep master printing are five interesting areas that can be applied to image compositing based on the state-of-the-art GAN technology described in this article. It presents a comprehensive analysis of current GAN-based imaging models, including their strengths and weaknesses. At the same time, recent rediscovery of deep learning and widespread interest in generation methods in the scientific community have made it possible to generate realistic images by learning the data distribution from noise. If the input data contains information about the visual content of the image, the quality of the generated image will improve.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122644779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"THESISQUO: Research Management System with Plagiarism Checker and Prescriptive Analytics","authors":"","doi":"10.30534/ijatcse/2022/051132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/051132022","url":null,"abstract":"The researchers established a study that can benefit educational institutions by offering an online repository for undergraduate, graduate, master's, and doctorate thesis studies. The system includes a Plagiarism checker that scans and checks the similarity of the thesis study that will be uploaded to the system. The system also includes Prescriptive analytics that can give a real-time update about the current study count, highest upload count, and other relative data that can be presented to help the end-user decide on what study to develop. The researchers and developers ask the guidance and help from faculty, students, and some IT experts from Bulacan State University by evaluating the system. The system's evaluation is based on ISO 25010 and was based on the Likert scale with the scale and descriptive interpretations.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public Health Record Management System: An Up-Close Monitoring System","authors":"","doi":"10.30534/ijatcse/2022/041132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/041132022","url":null,"abstract":"The researchers developed a public health record management system for the barangay health center of Sto. Rosario, Paombong, Bulacan, recognize the existing problem, circumstances and reduce the risk of data lost due to unprecedented accidents or human errors and decrease the probability of data redundancy for the patients. The developers used an illustrative and user-friendly design that presents the data in the easiest way possible. Public Health Record Management System (PHRMS) aims to elevate the current state of record management of the public health center by incorporating technology to further enhance the productivity securely and a faster way of data processing to save time and serve more patients. For the acceptability of the developed health information system, the researchers consulted with IT professionals from different fields, IT instructors from Bulacan State University, and the endusers or clients of the developed system such as the midwife, and barangay health workers. The evaluation form has the following criteria for software quality evaluation as follows: (1) functional suitability; (2) performance efficiency; (3) usability; (4) reliability; (5) security; and (6) portability.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Design of a Student and Admin Portal with a Pomodoro Technique Feature for Mindanao Kokusai Daigaku (Mindanao International College)","authors":"","doi":"10.30534/ijatcse/2022/021132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/021132022","url":null,"abstract":"Academic institutions have become so accustomed to using antiquated paper recording methods to store and process student data that transitioning to a more advanced technological method may not be a top priority at first. Many educational advancements have been demonstrated to be beneficial, however, some educational institutions are falling behind. Mindanao Kokusai Daigaku's lack of a centralized system is the reason for the university's foregoing problems. The college is still managing student data through paper records and an obsolete enrollment information system, which has been very inconvenient for both students and admins, especially during the Covid-19 pandemic. The main objective of this paper is to design a student and admin portal for Mindanao Kokusai Daigaku with a Pomodoro technique feature as an advanced approach for the university's internal operations to improve user convenience, secure documents, and make information more accessible to students while also encouraging productivity. Various methodologies and models were used in this study to further clarify the proposed system's operations and purpose. Based on the results of the findings, the researchers conclude that the suggested portal system is feasible and will address Mindanao Kokusai Daigaku’s current challenges.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"8 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120806988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Monochromatic Image Colorization using Machine Learning","authors":"","doi":"10.30534/ijatcse/2022/071132022","DOIUrl":"https://doi.org/10.30534/ijatcse/2022/071132022","url":null,"abstract":"The introduction of Artificial intelligence has opened doors to many automatic, unsupervised learning trends, which help to translate and acknowledge data. During the past years, the procedure of colorization of monochrome images has been greater or greater in several application fields, like restoration of old images or degraded images, and also, storage of monochrome images is more efficient when compared to colored images. This issue is not excessively presented because of an extremely high likelihood of conceivable outcomes during the designation of varied subtleties to the picture. A considerable lot of the new advancements in colorization have pictures with a normal format or exceptionally refined information, like semantic guides as the info. In the proposed system we are making use of Generative Adversarial Network (GAN). The final outcome is compared between the traditional deep neural network and the generative Model","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121484320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}