American Journal of Electronics & Communication最新文献

筛选
英文 中文
Automated Breast Cancer Diagnosis Based on Machine Learning Algorithm 基于机器学习算法的乳腺癌自动诊断技术
American Journal of Electronics & Communication Pub Date : 2021-07-05 DOI: 10.15864/ajec.2102
Sayani Ghosh, Sayantan Dey, Souvik Chatterjee
{"title":"Automated Breast Cancer Diagnosis Based on Machine Learning Algorithm","authors":"Sayani Ghosh, Sayantan Dey, Souvik Chatterjee","doi":"10.15864/ajec.2102","DOIUrl":"https://doi.org/10.15864/ajec.2102","url":null,"abstract":"\u0000 Abstract – Breast Cancer classification is becoming more important with the increasing demand of automated applications especially interactive applications. It can be used to improve the performance of classifiers like Logistic Regression, Decision Tree, Random Forest,\u0000 SVC etc. This study is based on learning genetic patterns of patients with breast tumors and machine learning algorithms that aim to demonstrate a system to accurately differentiate between benign and malignant breast tumors. The aim of this study was to optimize different algorithm. In this\u0000 context, we applied the genetic programming technique to select the best features and perfect parameter values of the machine learning classifiers. The performance of the proposed method was based on accuracy, precision and the roc curves. The present report prepared by us proves that genetic\u0000 programming can automatically find the best model by combining feature preprocessing methods and classifier algorithms by reducing False Positive rate. In this paper, there were two challenges to automate the breast cancer diagnosis: (i) determining which model best classifies the data and\u0000 (ii) how to automatically design and adjust the parameters of the machine learning model. We have summarized the experimental studies and the obtained results, and lastly presented the main conclusion.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129426145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving Spectrum Utilization in Elastic Optical Networks for Multicast Traffic Demands 提高弹性光网络频谱利用率以满足组播业务需求
American Journal of Electronics & Communication Pub Date : 2021-07-05 DOI: 10.15864/ajec.2103
P. Choudhury
{"title":"Improving Spectrum Utilization in Elastic Optical Networks for Multicast Traffic Demands","authors":"P. Choudhury","doi":"10.15864/ajec.2103","DOIUrl":"https://doi.org/10.15864/ajec.2103","url":null,"abstract":"\u0000 Abstract: Elastic optical networks (EONs) have a scalable and flexible mini-grid architecture compared to the conventional fixed-grid wavelength division multiplexing optical networks. In EONs, there is scope to optimize optical resources. In this paper, the primary target is to\u0000 increase spectrum utilization efficiency for traffic demands. The approach presented here is a grooming, routing and spectrum assignment technique for multicast traffic demands in elastic optical networks for static type of traffic demands. The simulation results show better spectrum utilization.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126279741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ANALYSIS ON THE STATUS OF RENT OF HOUSING INDUSTRY 住房行业租金现状分析
American Journal of Electronics & Communication Pub Date : 2021-07-05 DOI: 10.15864/ajec.2104
Madhulekha Hazra, Bikram Bhattacharya, Suryasish Sengupta, Rajesh Mandal, Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das
{"title":"ANALYSIS ON THE STATUS OF RENT OF HOUSING INDUSTRY","authors":"Madhulekha Hazra, Bikram Bhattacharya, Suryasish Sengupta, Rajesh Mandal, Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das","doi":"10.15864/ajec.2104","DOIUrl":"https://doi.org/10.15864/ajec.2104","url":null,"abstract":"\u0000 Abstract - Machine learning has been playing an active role in the past few years in several applications like image detection, spam reorganization, recommending products and in medical fields. Present machine learning algorithm helps us in enhancing security alerts, ensuring\u0000 public safety and improve medical enhancements. Determining the sale price of the house is very important nowadays as the price of the land and price of the house increases every year. So our future generation needs a simple technique to predict the house price in future. The price of house\u0000 helps the buyer to know the cost price of the house and also the right time to buy it. The right price of the house helps the customer to elect the house and go for the bidding of that house. There are several factors that affect the price of the house such as the physical condition, location,\u0000 landmark etc. Our result exhibit that our approach to the issue needs to be successful, and can process predictions that would be comparative with other house rent prediction models. This paper uses linear regression technique to predict the house price.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS 物联网安全框架在不同应用领域的漏洞与挑战综述
American Journal of Electronics & Communication Pub Date : 2021-07-05 DOI: 10.15864/ajec.2101
Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das, S. Das, Papiya Ghosh, Priya Gorai, Sayani Maity
{"title":"REVIEW ON VULNERABILITIES AND CHALLENGES ON IOT SECURITY FRAMEWORKS IN DIVERSIFIED FIELDS OF APPLICATIONS","authors":"Poojarini Mitra, Kaustuv Bhattacharjee, Anirban Das, S. Das, Papiya Ghosh, Priya Gorai, Sayani Maity","doi":"10.15864/ajec.2101","DOIUrl":"https://doi.org/10.15864/ajec.2101","url":null,"abstract":"Abstract - Internet of Things (loT) is emerging as a revolutionary technology since the last double decade. Internet of things has changed many aspects of the human. loT has changed living styles and health care with the help of intelligent health care technologies like\u0000 wearable devices. loT makes use of lightweight communication with the motive of the reduction of extra overhead generated in regular internet communication. The number of multiple devices are connected and the amount of data interchanged between them is surprising and hence becoming a goal\u0000 for attack and misuse of information. Other than the obvious vulnerability of wireless connections, security in loT is difficult to earn because of the universal way of data collection, complication of cryptographic solutions for the resource-tractable equipment, characteristics of the cyber\u0000 world with the physical world, complex wideness topologies and insufficient organizational capabilities. The Internet of Things (loT) devices are becoming more popular, vulnerability counteragents are inadequate and many things have occurred. It is because there is inadequate preservation\u0000 against vulnerabilities specific to loT equipment.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116406379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach for Emotion Detection from Text Data using Natural Language Processing and Machine Learning 基于自然语言处理和机器学习的文本数据情感检测新方法
American Journal of Electronics & Communication Pub Date : 2021-07-05 DOI: 10.15864/ajec.2105
Subhodeep Banerjee, Shrivasta Goswami, A. Das, Neeloy Saha, Soumyashree Seth, Sagnik Bhattacharya, Sandip Mandal, Uem Kolkata
{"title":"A Novel Approach for Emotion Detection from Text Data using Natural Language Processing and Machine Learning","authors":"Subhodeep Banerjee, Shrivasta Goswami, A. Das, Neeloy Saha, Soumyashree Seth, Sagnik Bhattacharya, Sandip Mandal, Uem Kolkata","doi":"10.15864/ajec.2105","DOIUrl":"https://doi.org/10.15864/ajec.2105","url":null,"abstract":"\u0000 Abstract - Emotion can be expressed in many ways that can be seen such as facial expression and gestures, speech and by written text. Emotion Detection in text documents is essentially a content– based classification problem involving concepts from the domains of Natural\u0000 Language Processing as well as Machine Learning. In this paper we are proposing a solution for emotion recognition based on textual data. The emotion expressed in a blog, review or any kind of textual content remains unused until the text is analyzed and the emotion is retrieved from the data.\u0000 It is impossible to analyze the huge amount of data manually and gain information from it.\u0000","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115867164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An API in JAVA Which Render Ease at Programming for Developers 一个JAVA API,为开发人员简化了编程
American Journal of Electronics & Communication Pub Date : 2021-06-07 DOI: 10.15864/ajec1405
Bhuvan Agarwal, Soumyajeet Bhattacharjee, Sima Kar, Madhurima Saha, Vijay Kumar, Sandip Mandal, Uem Kolkata
{"title":"An API in JAVA Which Render Ease at Programming for Developers","authors":"Bhuvan Agarwal, Soumyajeet Bhattacharjee, Sima Kar, Madhurima Saha, Vijay Kumar, Sandip Mandal, Uem Kolkata","doi":"10.15864/ajec1405","DOIUrl":"https://doi.org/10.15864/ajec1405","url":null,"abstract":"","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130343240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new Modified method of Cryptography using Caesar Cipher 一种新的改进的凯撒密码方法
American Journal of Electronics & Communication Pub Date : 2021-06-07 DOI: 10.15864/ajec1402
A. Tripathi, Jhilam Chakraborty, Sadia Anzum, Sudipta Basu Pal
{"title":"A new Modified method of Cryptography using Caesar Cipher","authors":"A. Tripathi, Jhilam Chakraborty, Sadia Anzum, Sudipta Basu Pal","doi":"10.15864/ajec1402","DOIUrl":"https://doi.org/10.15864/ajec1402","url":null,"abstract":"","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130777719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Disease Prediction from Drug Information using Machine Learning 利用机器学习从药物信息中预测疾病
American Journal of Electronics & Communication Pub Date : 2021-06-07 DOI: 10.15864/ajec1403
Koushik Deb, Shuvendu Das, S. Mahata, Abhishek Das
{"title":"Disease Prediction from Drug Information using Machine Learning","authors":"Koushik Deb, Shuvendu Das, S. Mahata, Abhishek Das","doi":"10.15864/ajec1403","DOIUrl":"https://doi.org/10.15864/ajec1403","url":null,"abstract":"Drug reviews play a very important role in providing crucial medical care information for both healthcare professionals and consumers. Also, in the absence of an actual practicing healthcare professional, a consumer can look for an online review of drugs before making a purchase. But these reviews are generally unstructured in nature and often do not provide concise information on the disease/nature of the disease, the drugs are prescribed for. In this scenario, a learning model that can be trained to predict the disease/type of disease, when provided witha drug name and its corresponding review, becomes very important. To mitigate the above-mentioned issue, we present and compare various machine learning-based prediction models. Also, the performance of each of the models has been quantified using metrics such as precision, recall, F1-Score, and accuracy.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133486142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Study of Machine Learning Techniques in Cryptography for Cybersecurity 网络安全密码学中的机器学习技术研究
American Journal of Electronics & Communication Pub Date : 2021-06-07 DOI: 10.15864/ajec1404
Ankita Saha, Chanda Pathak, Sourav Saha
{"title":"A Study of Machine Learning Techniques in Cryptography for Cybersecurity","authors":"Ankita Saha, Chanda Pathak, Sourav Saha","doi":"10.15864/ajec1404","DOIUrl":"https://doi.org/10.15864/ajec1404","url":null,"abstract":"The importance of cybersecurity is on the rise as we have become more technologically dependent on the internet than ever before. Cybersecurity implies the process of protecting and recovering computer systems, networks, devices, and programs from any cyber attack. Cyber attacks are an increasingly sophisticated and evolving danger to our sensitive data, as attackers employ new methods to circumvent traditional security controls. Cryptanalysis is mainly used to crack cryptographic security systems and gain access to the contents of the encrypted messages, even if the key is unknown. It focuses on deciphering the encrypted data as it works with ciphertext, ciphers, and cryptosystems to understand how they work and find techniques for weakening them. For classical cryptanalysis, the recovery of ciphertext is difficult as the time complexity is exponential. The traditional cryptanalysis requires a significant amount of time, known plaintexts, and memory. Machine learning may reduce the computational complexity in cryptanalysis. Machine learning techniques have recently been applied in cryptanalysis, steganography, and other data-securityrelated applications. Deep learning is an advanced field of machine learning which mainly uses deep neural network architecture. Nowadays, deep learning techniques are usually explored extensively to solve many challenging problems of artificial intelligence. But not much work has been done on deep learning-based cryptanalysis. This paper attempts to summarize various machine learning based approaches for cryptanalysis along with discussions on the scope of application of deep learning techniques in cryptography.","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132895660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Light-Space-Time Quantum-Computational Model of Subtle-DNA & Genetics 精细dna与遗传学的光-时空-量子计算模型
American Journal of Electronics & Communication Pub Date : 2021-06-07 DOI: 10.15864/ajec1401
Pravir Malik
{"title":"Light-Space-Time Quantum-Computational Model of Subtle-DNA & Genetics","authors":"Pravir Malik","doi":"10.15864/ajec1401","DOIUrl":"https://doi.org/10.15864/ajec1401","url":null,"abstract":"Subtle-DNA can be thought of as a conceptual-construct consisting of a double-helix structure, arranged as a light-based downwardstrand and a time-based upward-strand. Light imagined existing at different constant speeds far greater than the known speed of c – 186,000 miles per second offers a unique view of quanta and quantum computation, and the precipitation of such light from higher to lower speeds offer insight into the conceptual downward-strand of subtle-DNA. Such a downward-strand structures an involutionary-reality that seeds space, and subsequently becomes the basis of an evolutionaryreality structured as a time-based upward-strand of subtle-DNA. Analyses of such a composite lightspace-time structure further provides a unique point of view into the origin and possibilities of genetics. Genetics can be seen as having a diverse light-based functional, as opposed to a solely form-based foundation. Genetics can also be perceived as being the output of a persistent quantum-level computation. Such a modeling provides useful hypotheses into the subtle conceptual structure of DNA, into the architecture of mutation and the likely processes of constructive and destructive mutation, and the mechanism of heredity. Further the relationship and possible impacts of the quantum-based processes of entanglement and superposition on genetics, and future possibilities due to practically infinite amount of information in antecedent layers of light can be constructed. Keywords— Genetics, Mutation, Quantum Computation, Heredity, Symmetries in Light, Superposition, Entanglement, Genetic-Type Information, Quanta, UpwardStrand, Downward-Strand, Double-Helix","PeriodicalId":245653,"journal":{"name":"American Journal of Electronics & Communication","volume":"183 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115763927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信