2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)最新文献

筛选
英文 中文
Clustering Evaluation by Davies-Bouldin Index(DBI) in Cereal data using K-Means 基于K-Means的谷物数据davis - bouldin指数聚类评价
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00057
Akhilesh Kumar Singh, Shantanu Mittal, P. Malhotra, Yash Srivastava
{"title":"Clustering Evaluation by Davies-Bouldin Index(DBI) in Cereal data using K-Means","authors":"Akhilesh Kumar Singh, Shantanu Mittal, P. Malhotra, Yash Srivastava","doi":"10.1109/ICCMC48092.2020.ICCMC-00057","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00057","url":null,"abstract":"Cereals grains have been used as a principle ingredient of human diet for hundreds of years. Indian cereal crops provide vital nutrients and energy to the human diet. The motivation behind this research paper is to distribute the research discoveries of applying K-Means clustering, on a cereal dataset and to differentiate the outcomes found on the number of bunches to identify whether the ideal or best number of groups to be 3 or 5. This speculation is achieved by applying distinctive clustering tests (likewise reordered in the paper), and visualizations. The aforementioned resolution by doing exploratory analysis, at that point modeled fitting followed by result testing, driving us to a definite end. The language utilized for our exploration is R.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126552238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Image Mining Methodology for Detection of Brain Tumor: A Review 脑肿瘤检测的图像挖掘方法综述
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00044
Shinde Swapnil, V. Girish
{"title":"Image Mining Methodology for Detection of Brain Tumor: A Review","authors":"Shinde Swapnil, V. Girish","doi":"10.1109/ICCMC48092.2020.ICCMC-00044","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00044","url":null,"abstract":"A human brain contains number of tissues that relate to achieving proper functioning of brain. Meanwhile, any abnormal growth in these tissues may change the functioning and this is generally referred as brain tumor. Brain tumor is mainly of two types low grade or benign (Grade 1 and Grade 2) and high grade or malignant (Grade 3 and Grade 4). Brain tumor can be detected with MRI images by applying image processing steps and some machine learning algorithms. Brain MRI images undergo processing by using different techniques such as image enhancement, clustering and classification for detecting the level of brain tumor. The study shows that the filtering operations, edge detection algorithms, morphological operations and clustering are some of the important steps employed for detecting the various levels of brain tumor. This paper mainly focuses on preparing the comparison review on the basis of the referenced proposed methodology, feature extraction and classification methods with its results, future scope along with the advantages and disadvantages of the research done by different professionals and compiling it into one paper. This helps to provide scope for future research directions in brain tumor classification.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126818230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Detection of Brain Tumor Using Image Processing 利用图像处理技术检测脑肿瘤
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000156
D. Suresha, N. Jagadisha, H. Shrisha, K. Kaushik
{"title":"Detection of Brain Tumor Using Image Processing","authors":"D. Suresha, N. Jagadisha, H. Shrisha, K. Kaushik","doi":"10.1109/ICCMC48092.2020.ICCMC-000156","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000156","url":null,"abstract":"Brain tumor is an accumulation of anomalous tissue in the brain. Tumors are primarily classified into malignant and benign when they develop. It can be life threatening hence it is important to recognize and identify the presence of tumors in brain image. This paper proposes a system to decide whether the brain has tumor or is it tumor-free from the MR image using combined technique of K-Means and support vector machine. In the first stage the input image is converted to grey scale using binary thresholding and the spots are detected. The recognized spots are represented in terms of their intensities to distinguish between the normal and tumor brain. The set of feature extracted are later characterized by using K-Means algorithm, then the tumor recognition is done using support vector machine.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122697071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Review on Acute Lymphoblastic Leukemia Classification Based on Hybrid Low Level Features 基于杂交低水平特征的急性淋巴细胞白血病分类研究进展
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00031
Shivani Patel, S. Degadwala, A. Mahajan
{"title":"A Review on Acute Lymphoblastic Leukemia Classification Based on Hybrid Low Level Features","authors":"Shivani Patel, S. Degadwala, A. Mahajan","doi":"10.1109/ICCMC48092.2020.ICCMC-00031","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00031","url":null,"abstract":"leukemia region unit ordered likewise whichever myelogenous (also called myeloid) or white platelet contingent upon that sorts for the influenced white platelets region unit. Leukemia happens when that bone marrow produces adolescent white cells, Furthermore leukemia happen when the marrow produces full grown phones. Intense lymphocytic leukemia (ALL) might additionally make a structure of cancellous around that those bone marrow makes excessively awful huge numbers adolescent lymphocytes (a sensibly white blood cell). Threatening Growth ailment might potentially might want an impact looking into RBC, WBC, and platelets. Every last bit is the greater part commonplace clinched alongside childhood, with a top frequency at 2–5 a considerable length of time outdated and in turn top over adulthood. The arranged approach is assessed around 3public picture databases for totally completely different aspects. The further execution measures: accuracy, specificity, and affectability. Division will furthermore order about intense lymphocytic leukemia that is frequently completed by utilizing “manage taking in” methodology.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123037861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured E-voting System Using Two-factor Biometric Authentication 使用双因素生物识别认证的安全电子投票系统
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00046
Sudeepthi Komatineni, Gowtham Lingala
{"title":"Secured E-voting System Using Two-factor Biometric Authentication","authors":"Sudeepthi Komatineni, Gowtham Lingala","doi":"10.1109/ICCMC48092.2020.ICCMC-00046","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00046","url":null,"abstract":"Building a secure voting system that offers privacy of conventional voting system with proper voter authentication & transparency has been a challenge for a due course of time. The research work proposes a secured and robust electronic voting system based on popular machine learning based facial recognition algorithms and biometric authentication methodologies for the purpose of building a secure voting system. In particular, it focuses on the potential working of face detection and recognition and bio-metric authentication namely bio-metric scan, and the implementation procedure, which improves the security and decreases the duplicate vote and fraudulent to make the system as more efficient and user friendly in nature.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"495 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127584441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping 使用蜜罐和时间戳改进基于文本的CAPTCHA挑战的安全控制
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000131
M. T. Banday, Shafiya Afzal Sheikh
{"title":"Improving Security Control of Text-Based CAPTCHA Challenges using Honeypot and Timestamping","authors":"M. T. Banday, Shafiya Afzal Sheikh","doi":"10.1109/ICCMC48092.2020.ICCMC-000131","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000131","url":null,"abstract":"The resistance to attacks aimed to break CAPTCHA challenges and the effectiveness, efficiency and satisfaction of human users in solving them called usability are the two major concerns while designing CAPTCHA schemes. User-friendliness, universality, and accessibility are related dimensions of usability, which must also be addressed adequately. With recent advances in segmentation and optical character recognition techniques, complex distortions, degradations and transformations are added to text-based CAPTCHA challenges resulting in their reduced usability. The extent of these deformations can be decreased if some additional security mechanism is incorporated in such challenges. This paper proposes an additional security mechanism that can add an extra layer of protection to any text-based CAPTCHA challenge, making it more challenging for bots and scripts that might be used to attack websites and web applications. It proposes the use of hidden text-boxes for user entry of CAPTCHA string which serves as honeypots for bots and automated scripts. The honeypot technique is used to trick bots and automated scripts into filling up input fields which legitimate human users cannot fill in. The paper reports implementation of honeypot technique and results of tests carried out over three months during which form submissions were logged for analysis. The results demonstrated great effectiveness of honeypots technique to improve security control and usability of text-based CAPTCHA challenges.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133951864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Role of Machine Learning in Detectin Heart Diseas. 机器学习在心脏病检测中的作用研究。
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00037
P. Kaur
{"title":"A Study on Role of Machine Learning in Detectin Heart Diseas.","authors":"P. Kaur","doi":"10.1109/ICCMC48092.2020.ICCMC-00037","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00037","url":null,"abstract":"A fist size muscle occupies an important in the human body by supplying oxygen to all the body organs. According to study of demography from WHO (World Health organization), the main cause of increasing death rate is due to the cardiac failure of human being. The main challenge for data analysis is to predict and prevent the heart disease. Machine learning has been developed to perform impressive predictions and make appropriate decision from abundant data originated by healthcare centres. In this paper numerous machine learning techniques are surveyed by using the knowledge collected from preprocessing data (clinical knowledge), which comprises many medical features to perform heart disease detection. The comparative study states that the prediction of heart disease has been improved by combining various machine learning algorithms to perform early disease investigation in a cost effective manner. The proposed research work primarily focuses on preparing a review of the research done by different professionals and compiling it into one paper and creating a direction for future research in this domain. In this paper many techniques are surveyed where best predictions are performed for heart disease.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133996321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study of Wavelength Converter Placement in p(pre-configured)-Cycle Protection 波长转换器在p(预配置)周期保护中的放置研究
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00086
Vidhi Gupta, R. Asthana
{"title":"Study of Wavelength Converter Placement in p(pre-configured)-Cycle Protection","authors":"Vidhi Gupta, R. Asthana","doi":"10.1109/ICCMC48092.2020.ICCMC-00086","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00086","url":null,"abstract":"The wavelength division multiplexed (WDM) networks can be efficiently protected with high speed using preconfigured protection cycles (p-cycles). p-Cycles can be introduced in any network with or without wavelength converters. As wavelength converters are costlier devices, fully equipping the networks with wavelength converters make it highly expensive. Thus we have compared the spare capacity, in terms of route km of fiber length required, for providing p-cycle protection by placing wavelength converters at some node positions. We have also introduced optimum position for placement of converters at high traversing (HT) nodes. By placing converters at these nodes the required spare capacity is least among all the cases studied.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132132673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study on Different Approaches in Keyword Extraction 关键词提取方法的比较研究
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-00013
Edu Gopan, Sanjay Rajesh, Vishnu Gr, Akhil Raj R, M. Thushara
{"title":"Comparative Study on Different Approaches in Keyword Extraction","authors":"Edu Gopan, Sanjay Rajesh, Vishnu Gr, Akhil Raj R, M. Thushara","doi":"10.1109/ICCMC48092.2020.ICCMC-00013","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-00013","url":null,"abstract":"Since there is an increasing number of research documents published every year, the documents available on the Internet will also be increasing rapidly. This poses the need to categorize the available research articles into their respective domain to ease the search process and find their research documents under the specific domain. This classification is a tiresome and prolonged process, which can be avoided by using keywords and keyphrases. Keywords or keyphrases provides a summary or information described in a research document. The domain of a research paper can be determined based on extracted keywords and keyphrases. It is monotonous to manually extract keywords and key phrases [4]. Automatic extraction of keyword techniques helps to overcome this challenging task. The classification of these research papers can be achieved more efficiently by using the keywords applicable to a particular domain. This paper aims to compare key extraction algorithms such as TextRank, PositionRank, keyphrase extraction algorithm (KEA) and Multi-purpose automatic topic indexing (MAUI).","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114591566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Sentimental Analysis (Opinion Mining) in Social Network by Using Svm Algorithm 基于Svm算法的社交网络情感分析(意见挖掘
2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC) Pub Date : 2020-03-01 DOI: 10.1109/ICCMC48092.2020.ICCMC-000159
T. Sathis Kumar, P. Mohamed Nabeem, C. K. Manoj, K. Jeyachandran
{"title":"Sentimental Analysis (Opinion Mining) in Social Network by Using Svm Algorithm","authors":"T. Sathis Kumar, P. Mohamed Nabeem, C. K. Manoj, K. Jeyachandran","doi":"10.1109/ICCMC48092.2020.ICCMC-000159","DOIUrl":"https://doi.org/10.1109/ICCMC48092.2020.ICCMC-000159","url":null,"abstract":"Web discussions are as often as possible utilized as stages for the trading of data and assessments just as publicity dispersal. The client produced content on the web develops quickly right now age. The transformative changes in innovation utilize such data to catch just the client’s substance lastly the valuable data are presented to data searchers. The majority of the current research on content data preparing, centers in the genuine area as opposed to the assessment space. Content mining assumes a fundamental job in online gathering feeling mining. Be that as it may, feeling mining from online discussion is significantly more troublesome than unadulterated content procedure because of their semi organized qualities. Order dependent on opinions has become another outskirts to content mining network. The assignment of assumption arrangement is to decide the semantic directions of words, sentences or records. Notion investigation is about conclusion mining. Break down feelings, attributes and assessments of clients about any items, subjects, or issue. For the popular feeling, web is turning into a spreading and exceptionally wide stage where online gatherings, social locales, websites and different destinations contains sentiment and audit of individuals in type of remarks and posted messages. Presently a days the information acquired from these destinations, online journals and remarks and publication is helpful for advertising research. Right now propose an extraction method to score the audits and condense the suppositions to end client. In light of conclusions mined it is chosen as whether to break down the slant of client feed backs and furthermore channel the sentiments dependent on client areas. This venture for the most part centers on giving a system to mining the feelings utilizing nonexclusive client centered surveys utilizing common language preparing steps. We can actualize this system progressively situations and furthermore improve the precision in feeling mining in python structure.","PeriodicalId":130581,"journal":{"name":"2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117291786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信