V. G, Kandukuru Swaroop Krishna, Mallempati Uday Kiran, Shaik Nihal, K. V, U. Ramachandraiah
{"title":"A Comprehensive Exploration of Neural Networks for Dental Caries Detection","authors":"V. G, Kandukuru Swaroop Krishna, Mallempati Uday Kiran, Shaik Nihal, K. V, U. Ramachandraiah","doi":"10.53759/acims/978-9914-9946-9-8_22","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_22","url":null,"abstract":"Dental caries, an illness due to bacteria that worsens with time, is the most common cause of tooth loss. This occurs as an outcome of least oral hygiene, which in addition contributes to a variety of dental disorders. Children's dental health will benefit considerably if caries can be detected at an early stage via tele-dentistry technology. Because severe caries causes disease and discomfort, tooth extraction may be necessary. As a result, early detection and diagnosis of these caries are the researchers' priority priorities. Soft computing techniques are commonly employed in dentistry to simplify diagnosis and reduce screening time. The goal of this study is to employ x-ray scanned images to detect dental cavities early on so that treatment can be completed promptly and effectively. As a tele-informatic oral health care system, this classification also applies to tele-dental care. We used a convolution neural network (CNN) deep learning model in the suggested work. We trained several CNN deep learning models. Training and testing were performed on a binary dataset with and without caries photos. The classification precision of CNN models is noted.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130115432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytical Study on Shear Response of Hollow Core Slab Subjected to Elevated Temperature using Extended Finite Element Method","authors":"Jeyashree T M, Varunram C","doi":"10.53759/acims/978-9914-9946-9-8_17","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_17","url":null,"abstract":"Prestressed hollow core slabs are members without transverse reinforcement and are often exposed to shear failure, especially in elevated temperatures. The study of shear response in the precast pre-stressed hollow core slab is essential to study the tension-compression damage of the flexural member. The hollow core slab is subjected to typical shear failure loading conditions and the loading condition is simulated through the finite element model in ABAQUS. The 3D model depicting the actual shear behaviour of the hollow core slab is developed with the simple concrete damage plasticity model. Extended Finite Element Method (XFEM) analysis is used to study the propagation of cracks, from which displacement and cracking patterns are obtained for the slab with the varying depth of 200 mm, 250 mm, and 300 mm. Effect of varying depth on the shear behaviour of hollow core slab under elevated temperature are determined and the results obtained from the finite element analysis are validated for the accuracy with the ACI equation for shear behaviour and it is observed that there is good agreement in the ultimate load values obtained. The real-time behaviour of the hollow core slab under the combined effect of shear and elevated temperature is depicted with the help of crack propagation analysis. Further, the developed finite element model can be used for crack propagation study of hollow core slabs under shear failure.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124633528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Poikilocytosis using Segmentation based Approach","authors":"G. N, A. S, D. S, Akilan R, Fayaz A","doi":"10.53759/acims/978-9914-9946-9-8_25","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_25","url":null,"abstract":"Detecting a sickle cell manually is not an impossible job but it is a tedious one where the image processing is applied. It involves the analysis of cells by detecting the cells to identify the disease for proper treatment. We can make accurate detection of sickle cells by conducting a proper segmentation of such cells. Since we are dealing with the structural framework of the cell morphology which plays a crucial part in separating sickle cells from healthy blood cells and they differ from each other by structural integrity. This will substantially speed up the segregation and identification of sickle cells in healthy human blood cells. Standard validation strategies are adopted to improve the performance and yield of various methods. The methodology and techniques used in this paper are investigated and analyzed through this model.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129114139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avanthika S, Aniruthram K P, Anubama G, Sreemathy J
{"title":"Data Integration and Modelling using Talend","authors":"Avanthika S, Aniruthram K P, Anubama G, Sreemathy J","doi":"10.53759/acims/978-9914-9946-9-8_1","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_1","url":null,"abstract":"The world revolves entirely around data. We are unable to find even the most fundamental facts without data. Data will grow as enterprises do. You can learn a lot of things with these data. Data integration must be considered in order to access this information. Data integration has a wide range of applications and is used to combine multiple heterogeneous data sets into homogenous data. Analysis, extraction, transformation, and loading are all components of integration. ETL is a key component of data integration and takes up the majority of the work. The concept of warehousing is crucial because it describes how data that has undergone the ETL step will be loaded and used for various purposes.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Akshaya V.S., K. S, Philomina M, Pradeepa N R, Purnimah S V
{"title":"Operationalization of Design Thinking in Business Intelligence and Analysis","authors":"Akshaya V.S., K. S, Philomina M, Pradeepa N R, Purnimah S V","doi":"10.53759/acims/978-9914-9946-9-8_6","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_6","url":null,"abstract":"In Information Systems research, the majority of early studies concentrate on applying the specific toolkit to produceDesigningproductsandsystemstosolvestrategies, managerial, and operational challenges. Design Thinking has been effectively implemented in numerous domains. There is a minimal study on how Design Thinking may be supported in the context of business intelligence (BI) and also the analytics of business and integrated into the IS design- oriented aim to facilitate research (BA). How effective is Design Thinking facilitated in comparison to BI/BA to learn in a classroom setting, particularly in the proof-of-concept stage? How can it be integrated into the learning processes? Along with a guideline for the team involved in design thinking and the lessons acquired from each step of Design Thinking, a practical perspective on integrating the mentality and toolkit. As a case-based educational experience, it offers a design-thinking approach to the learning process. The findings of this study demonstrate that students may use Design Thinking techniques to frame their works and that these techniques are important alternatives for developing curriculum for teaching and learning.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131704902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AES Algorithm Based Data Possession in Cloud Using Blockchain","authors":"M. B, Reddy Prashanthi M, N. S, Prathiksha M","doi":"10.53759/acims/978-9914-9946-9-8_11","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_11","url":null,"abstract":"Remote secure data storage is key importance in cloud computing. So, for checking remote data integrity, an important paradigm called PDP schemes is introduced. There are still PDP schemes which bilinear matching can be used. One huge file can be broken into various blocks. There is much computation cost and communication cost that arises due to inefficient PDP implementation. Anyway, this is not the right solution therefore, to solve this kind of problem, we propose a new one The PDP model: a blockchain-based private PDP. This new one the solution can be leveraged using blockchain which is vital role in cryptocurrency. For this new concept, paper formalizes its system model and security model. And then a specific blockchain-based private PDP scheme is created designed using blockchain and AES. It is very much safer and we also analyze its performance two different parts: theoretical analysis and implementation the prototype was our analyzes show that the proposed PDP the system is safe, efficient and practical.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115680397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. G, Evangelin Blessy A, Jeya Aravinth S, Vignesh Prabhu M, VijayaSarathy R
{"title":"Recommendation of Music Based on Facial Emotion using Machine Learning Technique","authors":"S. G, Evangelin Blessy A, Jeya Aravinth S, Vignesh Prabhu M, VijayaSarathy R","doi":"10.53759/acims/978-9914-9946-9-8_16","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_16","url":null,"abstract":"Music plays a vital role in human life, and it is a valid therapy to potentially reduce depression, anxiety, as well as to improve mood, self-esteem, and quality of life. Music has the power to change human emotion as expressed through facial expression. It’s a difficult task to recommend music based on emotion. The existing system on emotion recognition and music recommendation is focused on depression and mental health analysis. Hence a model is proposed to recommend music based on recognition of face expression to improve or change the emotion. Face emotion recognition (FER) is implemented using YoloV5 algorithm. The output of FER is a type of emotion classified as happy, anger, sad, and neutral which is the input to music recommendation system. A Music player is created to keep track of the user’s favorite based on the emotion. If the user is new to the system, then generalized music will be suggested. The aim of the paper is to recommend music to the user according to their emotion to further improve it.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127682641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Approach of Big Data File Classification Based on Threat Analysis for Enhancing Security","authors":"S. N","doi":"10.53759/acims/978-9914-9946-9-8_24","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_24","url":null,"abstract":"Big Data is rapidly growing domain across various real time areas like Banking, Finance, Indusrty, Medicine, Trading and so on. Due to its diversified application, handling the big data for security during data transmission or management is highly risky. Most of the researchers try to handle big data classification based on the domain of interest for increasing productivity or customer satisfaction in decision making. Whereas, this paper focuses on the classification of big data file to enhance security during the data transmission over network and management.Most of the big data applications contains valuable and confidential data. The existing data security approaches are not sufficient on handling the security for data based on the threat level. Therefore, this paper proposes a hybrid approach to classify the big data based on the threat level of the contents associated with the data under consideration into open and close. To ensure the security of big data files, they are transmitted into the Hadoop Distributed File System along with relevant information to assess the level of threat they pose. The Threat Impact Level (TIL) is then calculated as a metric to determine the threshold level required for their protection.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126548632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subha R, Suchithra, PendelaSatya Sudesh, MidhunReddy G, P. K, Mohammed Fadhil S
{"title":"A Survey on Facial Emotion Identification using Deep Learning Models","authors":"Subha R, Suchithra, PendelaSatya Sudesh, MidhunReddy G, P. K, Mohammed Fadhil S","doi":"10.53759/acims/978-9914-9946-9-8_3","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_3","url":null,"abstract":"Facial expression detection has become a part of the current industry scenario. The face detection techniques implementation range from convolutional neural network to residual network. This paper tries to take up a survey on different scenarios, to understand the efficient implementation and also try to suggest an efficient strategy usage.In this paper, a set of data is taken up for training & testing, which helps the model in the identification of facial expressions. Computer vision trains and tests the machines for identifying the object. Computer Vision but it has to do much with cameras. The data and algorithms are the retinas, optic nerves and a visual cortex of any model. Computer Vision is applied with a system model, the model may be implemented using any of the artificial intelligence algorithms. A CNN with a help of machine learning or deep learning model takes up a “look” with a breakon images which splits it up into a pixel. The pixel is added with tags or labels. Usually, the convolution model is used for predictions; the mathematical operation on two function provides a third function with an efficient outcome. The result is then the recognition of the images about what is “seen”, as such of a human. The resultant accuracy is evaluated in a series of predictions.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. S, Mohammed Abdullah S, A. J, Nawin Ram Shanker I, Selwin Isac Neilsingh J
{"title":"Multi-Access Filtering using FOG-Enivronment","authors":"G. S, Mohammed Abdullah S, A. J, Nawin Ram Shanker I, Selwin Isac Neilsingh J","doi":"10.53759/acims/978-9914-9946-9-8_14","DOIUrl":"https://doi.org/10.53759/acims/978-9914-9946-9-8_14","url":null,"abstract":"Fog computing is gaining popularity, even in traditionally conservative and delicate sectors like the Armed forces and nations.The interconnection of our community and technology breakthroughs like the IOT technology both have an impact on this. However, one of many crucial factors in fog computing adoption is guarding against privacy leaks. As a result, we present a multi-layer access filtration model in this study that safeguards privacy and was designed for such fog-based cloud environment, thus the name (FAF)fog-based access filter. The three major algorithms that make up FAF are the tuple reduction algorithm, the optimal privacy-energy-time methodology, and the access filter initialization method. The different protective aims are also distinguished using a hierarchical classification. Our experimental evaluation's conclusions show that FAF enables one to strike the perfect balance between privacy protection and computing costs.","PeriodicalId":261928,"journal":{"name":"Advances in Computational Intelligence in Materials Science","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128199255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}