{"title":"Computational Intelligence in WSN for Network Life Optimization","authors":"R. Singh, Ajay Kumar Bharti","doi":"10.5220/0010567300003161","DOIUrl":"https://doi.org/10.5220/0010567300003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131936086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification and Prediction of High and Low Maintainable Class of Object Oriented Systems at Design Level using Machine Learning Techniques","authors":"Anshita Malviya","doi":"10.5220/0010564700003161","DOIUrl":"https://doi.org/10.5220/0010564700003161","url":null,"abstract":": In software engineering, maintenance is the one of the most crucial, costly and difficult activity. Numerous research works are still going on in this area to reduce and measure the maintenance cost. The maintenance consumes up to 80% of the total software development cost. There is a trend of developing software using object oriented techniques due to obvious reasons. In this paper, we proposed a classification model to identify high and low maintainable class at design level of Object Oriented Software development process. This model is implemented in python using Machine Learning Techniques. Experiment is simulated on Jupyter Notebook.","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125678578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic Analysis of Chest X-ray using an Attention-based CNN Technique","authors":"Rishabh Dhenkawat, Snehal Saini, Nagendra Pratap Singh","doi":"10.5220/0010567200003161","DOIUrl":"https://doi.org/10.5220/0010567200003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122181449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fake News Detection in Social Networks using Machine Learning: A Review","authors":"Sonali Raturi, A. Mishra, Srabanti Maji","doi":"10.5220/0010564800003161","DOIUrl":"https://doi.org/10.5220/0010564800003161","url":null,"abstract":"Fake News is spreading so rapidly these days. This is low-quality news that is generated to targeted someone. This could be created for financial gain or political gain. In no time, millions of tweets are generated and that could be false, people start believing in fake news when there is not enough information available to examine whether the information or the tweet that has been created is true or false and also people start believing in the information that they hear frequently and that could be false. It has been continuing since traditional media but now it is easier in social media to share or comment on such false information. With the growth of this false news or information, it is impossible to manually filter such news. So, there is some computational approach to recognize fake news with different Machine Learning Algorithms like SVM, Naïve Bayes, etc. This review paper mentioned different types of techniques required to detect hoax news. Also discussed different methods used in existing models with their accuracy.","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116875980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Blind Noise Estimation and Removal in Histopathological Images","authors":"Shiksha Singh, Rajesh Kumar","doi":"10.5220/0010562700003161","DOIUrl":"https://doi.org/10.5220/0010562700003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129685145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Quality Assurance in VANET","authors":"B. Chaurasia, S. Gupta","doi":"10.5220/0010564300003161","DOIUrl":"https://doi.org/10.5220/0010564300003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121174980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design Strategies for Mobile Ad-hoc Network to Prevent from Attack","authors":"Puneet Singh, A. Singh, Abhilasha Gupta","doi":"10.5220/0010566800003161","DOIUrl":"https://doi.org/10.5220/0010566800003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124043187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shade Dispersion using TCT Configuration of PV Array System under Non-uniform Irradiation: Experimental Study","authors":"S. Rawat, Reetu Naudiyal, Y. Chauhan, R. Pachauri","doi":"10.5220/0010567800003161","DOIUrl":"https://doi.org/10.5220/0010567800003161","url":null,"abstract":": An experimental analysis to evaluate the depletion of solar photovoltaic (PV) system under the weather.exploring the effects of blurring on the PV system under varying degrees of solar radiation In the present study, four panels of PV solar modules (20W, Manf: Usha Solar)subject to parallel (SP) weather forecast and cross-sectional rate-arrested (TCT). The test set contains an electrical performance ratingdevices with a flexible load to test the performance of the PV system under artificial lighting fixtures. In addition, performance similarities were performed over PV modules programmed into the SP and TCT modified PV modules under the shading I-II test case. The abnormal behavior of current-voltage (V-V) and power-voltage (P-V) curves in the presence ofmultiple power points such as ground mass points (GMPPT) and local maximum power points (LMPP) help to obtain a comprehensive analysis. In addition, performance indicator parameters suchas GMPP power, low power loss and fill factor (FF) were tested in both PV power assumption under separating shadow cases.","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"5 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116043707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. S. Rajput, Rakshita Mall, Anand Shankar Tiwari, A. Tiwari
{"title":"State-of-the-Art Review of Deep Learning Techniques in Recommendation System","authors":"I. S. Rajput, Rakshita Mall, Anand Shankar Tiwari, A. Tiwari","doi":"10.5220/0010564900003161","DOIUrl":"https://doi.org/10.5220/0010564900003161","url":null,"abstract":"","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131768370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Application of Detecting Faces with Mask and without Mask using Deep Learning Model","authors":"R. Shukla, A. Tiwari","doi":"10.5220/0010562500003161","DOIUrl":"https://doi.org/10.5220/0010562500003161","url":null,"abstract":": The proposed model is stronger as it naturally will identify people with masks and without mask. This approach reduces the deep learning process to a single stage and the mask detector model is added to identify with mask and without mask. What we need to do is to use the learning algorithm to provide us with bounding cases in one forward network pass for both people with masks and without masks. The Keras classifier is based on the MobileNetV2 neural net architecture. This model was tested in real time with pictures and video streams. Although the exactness of the prototype is around 98% and model optimisation is a continuous process by setting the hyper-parameters. We are finding a highly precise solution. Size and computer costs are highly optimized and tailored for object detection tasks on-device such as a cell phone or camera streams.","PeriodicalId":146672,"journal":{"name":"Proceedings of the 3rd International Conference on Advanced Computing and Software Engineering","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128797846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}