{"title":"Automated Breast Cancer Diagnosis Based on Machine Learning Algorithm","authors":"Sayani Ghosh, Sayantan Dey, Souvik Chatterjee","doi":"10.15864/ajec.2102","DOIUrl":"https://doi.org/10.15864/ajec.2102","url":null,"abstract":"\u0000 Abstract – Breast Cancer classification is becoming more important with the increasing demand of automated applications especially interactive applications. It can be used to improve the performance of classifiers like Logistic Regression, Decision Tree, Random Forest,\u0000 SVC etc. This study is based on learning genetic patterns of patients with breast tumors and machine learning algorithms that aim to demonstrate a system to accurately differentiate between benign and malignant breast tumors. The aim of this study was to optimize different algorithm. In this\u0000 context, we applied the genetic programming technique to select the best features and perfect parameter values of the machine learning classifiers. The performance of the proposed method was based on accuracy, precision and the roc curves. The present report prepared by us proves that genetic\u0000 programming can automatically find the best model by combining feature preprocessing methods and classifier algorithms by reducing False Positive rate. In this paper, there were two challenges to automate the breast cancer diagnosis: (i) determining which model best classifies the data and\u0000 (ii) how to automatically design and adjust the parameters of the machine learning model. We have summarized the experimental studies and the obtained results, and lastly presented the main conclusion.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Spectrum Utilization in Elastic Optical Networks for Multicast Traffic Demands","authors":"P. Choudhury","doi":"10.15864/ajec.2103","DOIUrl":"https://doi.org/10.15864/ajec.2103","url":null,"abstract":"\u0000 Abstract: Elastic optical networks (EONs) have a scalable and flexible mini-grid architecture compared to the conventional fixed-grid wavelength division multiplexing optical networks. In EONs, there is scope to optimize optical resources. In this paper, the primary target is to\u0000 increase spectrum utilization efficiency for traffic demands. The approach presented here is a grooming, routing and spectrum assignment technique for multicast traffic demands in elastic optical networks for static type of traffic demands. The simulation results show better spectrum utilization.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS ON THE STATUS OF RENT OF HOUSING INDUSTRY","authors":"Madhulekha Hazra, Bikram Bhattacharya, Suryasish Sengupta, Rajesh Mandal, Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das","doi":"10.15864/ajec.2104","DOIUrl":"https://doi.org/10.15864/ajec.2104","url":null,"abstract":"\u0000 Abstract - Machine learning has been playing an active role in the past few years in several applications like image detection, spam reorganization, recommending products and in medical fields. Present machine learning algorithm helps us in enhancing security alerts, ensuring\u0000 public safety and improve medical enhancements. Determining the sale price of the house is very important nowadays as the price of the land and price of the house increases every year. So our future generation needs a simple technique to predict the house price in future. The price of house\u0000 helps the buyer to know the cost price of the house and also the right time to buy it. The right price of the house helps the customer to elect the house and go for the bidding of that house. There are several factors that affect the price of the house such as the physical condition, location,\u0000 landmark etc. Our result exhibit that our approach to the issue needs to be successful, and can process predictions that would be comparative with other house rent prediction models. This paper uses linear regression technique to predict the house price.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS","authors":"Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das, S. Das, Papiya Ghosh, Priya Gorai, Sayani Maity","doi":"10.15864/ajec.2101","DOIUrl":"https://doi.org/10.15864/ajec.2101","url":null,"abstract":"Abstract - Internet of Things (loT) is emerging as a revolutionary technology since the last double decade. Internet of things has changed many aspects of the human. loT has changed living styles and health care with the help of intelligent health care technologies like\u0000 wearable devices. loT makes use of lightweight communication with the motive of the reduction of extra overhead generated in regular internet communication. The number of multiple devices are connected and the amount of data interchanged between them is surprising and hence becoming a goal\u0000 for attack and misuse of information. Other than the obvious vulnerability of wireless connections, security in loT is difficult to earn because of the universal way of data collection, complication of cryptographic solutions for the resource-tractable equipment, characteristics of the cyber\u0000 world with the physical world, complex wideness topologies and insufficient organizational capabilities. The Internet of Things (loT) devices are becoming more popular, vulnerability counteragents are inadequate and many things have occurred. It is because there is inadequate preservation\u0000 against vulnerabilities specific to loT equipment.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116406379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Approach for Emotion Detection from Text Data using Natural Language Processing and Machine Learning","authors":"Subhodeep Banerjee, Shrivasta Goswami, A. Das, Neeloy Saha, Soumyashree Seth, Sagnik Bhattacharya, Sandip Mandal, Uem Kolkata","doi":"10.15864/ajec.2105","DOIUrl":"https://doi.org/10.15864/ajec.2105","url":null,"abstract":"\u0000 Abstract - Emotion can be expressed in many ways that can be seen such as facial expression and gestures, speech and by written text. Emotion Detection in text documents is essentially a content– based classification problem involving concepts from the domains of Natural\u0000 Language Processing as well as Machine Learning. In this paper we are proposing a solution for emotion recognition based on textual data. The emotion expressed in a blog, review or any kind of textual content remains unused until the text is analyzed and the emotion is retrieved from the data.\u0000 It is impossible to analyze the huge amount of data manually and gain information from it.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Tripathi, Jhilam Chakraborty, Sadia Anzum, Sudipta Basu Pal
{"title":"A new Modified method of Cryptography using Caesar Cipher","authors":"A. Tripathi, Jhilam Chakraborty, Sadia Anzum, Sudipta Basu Pal","doi":"10.15864/ajec1402","DOIUrl":"https://doi.org/10.15864/ajec1402","url":null,"abstract":"","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Koushik Deb, Shuvendu Das, S. Mahata, Abhishek Das
{"title":"Disease Prediction from Drug Information using Machine Learning","authors":"Koushik Deb, Shuvendu Das, S. Mahata, Abhishek Das","doi":"10.15864/ajec1403","DOIUrl":"https://doi.org/10.15864/ajec1403","url":null,"abstract":"Drug reviews play a very important role in providing crucial medical care information for both healthcare professionals and consumers. Also, in the absence of an actual practicing healthcare professional, a consumer can look for an online review of drugs before making a purchase. But these reviews are generally unstructured in nature and often do not provide concise information on the disease/nature of the disease, the drugs are prescribed for. In this scenario, a learning model that can be trained to predict the disease/type of disease, when provided witha drug name and its corresponding review, becomes very important. To mitigate the above-mentioned issue, we present and compare various machine learning-based prediction models. Also, the performance of each of the models has been quantified using metrics such as precision, recall, F1-Score, and accuracy.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Machine Learning Techniques in Cryptography for Cybersecurity","authors":"Ankita Saha, Chanda Pathak, Sourav Saha","doi":"10.15864/ajec1404","DOIUrl":"https://doi.org/10.15864/ajec1404","url":null,"abstract":"The importance of cybersecurity is on the rise as we have become more technologically dependent on the internet than ever before. Cybersecurity implies the process of protecting and recovering computer systems, networks, devices, and programs from any cyber attack. Cyber attacks are an increasingly sophisticated and evolving danger to our sensitive data, as attackers employ new methods to circumvent traditional security controls. Cryptanalysis is mainly used to crack cryptographic security systems and gain access to the contents of the encrypted messages, even if the key is unknown. It focuses on deciphering the encrypted data as it works with ciphertext, ciphers, and cryptosystems to understand how they work and find techniques for weakening them. For classical cryptanalysis, the recovery of ciphertext is difficult as the time complexity is exponential. The traditional cryptanalysis requires a significant amount of time, known plaintexts, and memory. Machine learning may reduce the computational complexity in cryptanalysis. Machine learning techniques have recently been applied in cryptanalysis, steganography, and other data-securityrelated applications. Deep learning is an advanced field of machine learning which mainly uses deep neural network architecture. Nowadays, deep learning techniques are usually explored extensively to solve many challenging problems of artificial intelligence. But not much work has been done on deep learning-based cryptanalysis. This paper attempts to summarize various machine learning based approaches for cryptanalysis along with discussions on the scope of application of deep learning techniques in cryptography.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132895660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Light-Space-Time Quantum-Computational Model of Subtle-DNA & Genetics","authors":"Pravir Malik","doi":"10.15864/ajec1401","DOIUrl":"https://doi.org/10.15864/ajec1401","url":null,"abstract":"Subtle-DNA can be thought of as a conceptual-construct consisting of a double-helix structure, arranged as a light-based downwardstrand and a time-based upward-strand. Light imagined existing at different constant speeds far greater than the known speed of c – 186,000 miles per second offers a unique view of quanta and quantum computation, and the precipitation of such light from higher to lower speeds offer insight into the conceptual downward-strand of subtle-DNA. Such a downward-strand structures an involutionary-reality that seeds space, and subsequently becomes the basis of an evolutionaryreality structured as a time-based upward-strand of subtle-DNA. Analyses of such a composite lightspace-time structure further provides a unique point of view into the origin and possibilities of genetics. Genetics can be seen as having a diverse light-based functional, as opposed to a solely form-based foundation. Genetics can also be perceived as being the output of a persistent quantum-level computation. Such a modeling provides useful hypotheses into the subtle conceptual structure of DNA, into the architecture of mutation and the likely processes of constructive and destructive mutation, and the mechanism of heredity. Further the relationship and possible impacts of the quantum-based processes of entanglement and superposition on genetics, and future possibilities due to practically infinite amount of information in antecedent layers of light can be constructed. Keywords— Genetics, Mutation, Quantum Computation, Heredity, Symmetries in Light, Superposition, Entanglement, Genetic-Type Information, Quanta, UpwardStrand, Downward-Strand, Double-Helix","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}