{"title":"Prediction of breast cancer using Find-S and Candidate elimination algorithm","authors":"C. L. Nithya, Sunanda Dixit, B.I. Khodhanpur","doi":"10.1109/CSITSS47250.2019.9031046","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031046","url":null,"abstract":"Machine learning algorithms are nothing but programs in computes that try to forecast the decisions based on data driven assignment. In diagnosis of cancer the goal is to trained algorithm of machine learning that awards the appearance levels from cancer patient, can precisely predict what type and harshness of cancer they have. Breast cancer is the most delicate and deadly among all of the diseases in medicine. In this paper breast cancer classification is implemented using Find-S and Candidate elimination algorithm. These algorithms are used for the breast cancer detection. Navie Bayes Classifier is used for classification of breast cancer.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126981226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information Retrieval in Kannada using Ontology","authors":"H. C. Vijayalakshmi, Bhavana S Dixit","doi":"10.1109/CSITSS47250.2019.9031044","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031044","url":null,"abstract":"As Internet technology has become a part of the lifestyle of the common man, research efforts are extensively made in the fields of Natural Language Processing (NLP) and Information Retrieval. Studying regional languages for developing the system to store, retrieve, extract the information from the database has gained lots of prominence nowadays. Case studies show that Ontological Information Retrieval has many advantages over keyword-based approach. In this paper we have focused on the general architecture of ontology-based Information Retrieval used for Kannada.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127829675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ElGamal-based Privacy-Preseving Scheme (EPPS) for Edge-Cloud-of-Things (ECoT)","authors":"N. Jayashree, B. Babu","doi":"10.1109/CSITSS47250.2019.9031020","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031020","url":null,"abstract":"Edge-Cloud-of-Things (ECoT) is a model that facilitates the communicating nodes with the necessary resources for the data transmissions. The data transmitted in ECoT is done through the nearby IoT devices over the network. This data gets forwarded from edge devices to the heterogeneously distributed edge servers or cloud servers. Therefore, there is a need to ensure privacy of this data along the transmission path. We propose an ElGamal-based Privacy-Preserving Scheme (EPPS) for Edge-Cloud-of-Things to ensure data privacy. ElGamal encryption method is an asymmetric key cryptography based on Diffie-Hellman key exchange, in which the same data results in different ciphertext for each encryption. Due to the nature of this encryption, the privacy is believed to be increased compared to the other techniques.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"108 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post Disaster Management Using Satellite Imagery and Social Media Data","authors":"Malika Makker, Ramya Ramanathan, Sindhu Dinesh","doi":"10.1109/CSITSS47250.2019.9031042","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031042","url":null,"abstract":"Efficient post disaster management is imperative to deal with the havoc a disaster creates. Providing the disaster response agencies with the necessary tools and advanced technologies could accelerate the process of rescuing people in affected areas and providing them with the necessary assistance. Social media provides NGOs, individuals, etc., a platform to reach out to people in other parts, expressing the needs of the affected people. Using social media data, the disaster response agencies could gather all the immediate needs of the people. The solution proposed makes use of satellite imagery and social media data to assist the disaster response agencies. The system is capable of tracing usable roads in flooded areas and distinguishes areas based on the extent of damage using satellite imagery, and analyzing areas where people could be stranded and identifying items of need using social media data. Tracing of usable roads has been carried out using maximum number of connected pixels concept. Distinguishing areas based on extent of damage is carried by comparing pre and post disaster satellite images. For analyzing items of need and identifying locations of stranded people, Twitter data was filtered based on certain keywords. It's an all-in-one solution, which could be used by response agencies to gather real time information about the on-ground situation.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115383218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Shravani, Y. Prajwal, S. Prapulla, N S Girish Rao Salanke, G. Shobha, Syed Farhan Ahmad
{"title":"A Machine Learning Approach to Water Leak Localization","authors":"D. Shravani, Y. Prajwal, S. Prapulla, N S Girish Rao Salanke, G. Shobha, Syed Farhan Ahmad","doi":"10.1109/CSITSS47250.2019.9031010","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031010","url":null,"abstract":"A smart water management system is proposed in this paper to identify leakages and predict the location of leakages in pipelines. The system determines leakages by utilizing the flow rates of water in pipelines and predicts the location of the leakages by applying machine learning (ML) techniques. To predict the location of the leakages in the pipeline, different ML approaches have been developed and tested. A comparison of these models is performed to obtain the best model for location prediction. A prototype has been developed in STAR-CCM+, a Computational Fluid Dynamics (CFD) software, to test the proposed system. The results show that amongst the machine learning based location prediction models, the Multi-Layer Perceptron (MLP) performs the best with an accuracy of 94.47% and an F1 score of 0.95.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124766176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel utility metric to measure information loss for generalization and suppression techniques in Privacy Preserving Data publishing","authors":"Veena Gadad, C. Sowmyarani","doi":"10.1109/CSITSS47250.2019.9031014","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031014","url":null,"abstract":"Privacy has become a prime importance in this digital era. Personally Identifiable Information (PII) gets collected in various firms such as educational institutions, government organizations, hospitals etc‥ The collected data is often published and utilized for the purpose of analysis, research, decision making, advertisement or for the purpose of business. It is the duty of the data curator to store and to publish the data safely. A person who is having accessibility to the data that is published must not be able to identify or learn any new personal or sensitive information of an individual. Statistical Disclosure Control(SDC) is a suite of anonymization techniques. The aim of SDC is post processing the data containing sensitive or personal information and effectively protect the privacy of the participating data subject. However these techniques leads to “information loss”, i.e., any analysis or research carried on such a data might not give a appropriate result. This paper aims to discuss various metrics available to assess the information loss in the processed data and an attempt has been made to propose our technique for measuring the loss.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129302566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis and Prediction of Earthquake Impact-a Machine Learning approach","authors":"Anmol Gaba, Arnab Jana, Rahul Subramaniam, Yash Agrawal, Merin Meleet","doi":"10.1109/CSITSS47250.2019.9031026","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031026","url":null,"abstract":"An earthquake is a natural disaster known on account of the devastating effect it has on naturally occurring structures and manmade structures such as buildings, bungalows and residential locations to name a few. Earthquakes are measured using seismometers, that detect the vibrations due to seismic waves travelling through the earth's crust. In this work, the damage that is caused by an earthquake was classified into damage grades, ranging in values from one to five. A previously acquired data set was used, wherein a series of parameters were taken into consideration to predict the damage grade of a given building, which is associated with a Unique Identification String. The prediction was done using a survey of existing machine learning classifier algorithms. The machine learning algorithms used in this work were Logistic Regression, Naive Bayes Classifier, Random Forest Classifier and K-Nearest Neighbors. Based on an evaluation of a set of attributes, the most appropriate algorithm was considered. A detailed analysis was done on the predicted attribute by the given algorithm, followed by data analysis that provided details that could help mitigate the impact of an earthquake in future.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131225276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramshankar Yadhunath, S. Srikanth, A. Sudheer, Suja Palaniswamy
{"title":"Identification of Criminal Activity Hotspots using Machine Learning to Aid in Effective Utilization of Police Patrolling in Cities with High Crime Rates","authors":"Ramshankar Yadhunath, S. Srikanth, A. Sudheer, Suja Palaniswamy","doi":"10.1109/CSITSS47250.2019.9031057","DOIUrl":"https://doi.org/10.1109/CSITSS47250.2019.9031057","url":null,"abstract":"Criminal activity has always been a major deterrent in human progress and the constant presence of criminal activities stemming out of multifarious causes has been a hindrance for human sustainable living. The problem further aggravates when there is a dearth of police force to prevent crime. In countries like India where the police to population ratio is much less than the United Nations' Standard, the need of the hour is to efficiently utilize the existing force to prevent crimes. In this paper, we propose a solution that would facilitate effective distribution of police forces in a city among multiple districts based on the extent to which each district is prone to crime at a given hour, in a given day, for a given month. We have used the Chicago Crime Dataset in this work. The problem has been modelled as an imbalanced classification problem and supervised machine learning algorithms such as Logistic Regression, Naive Bayes, K Nearest Neighbours, Support Vector Machines, Decision Trees, Random Forests, Gradient Boosting Trees have been employed and their performances have been evaluated. In particular, the Gradient Boosting Tree has achieved the best performance in our case.","PeriodicalId":236457,"journal":{"name":"2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121497802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}