{"title":"Demographic Customer Segmentation of banking users Based on k-prototype methodology","authors":"Rishi Gupta, Horesh Kumar, Tarun Jain, Anita Shrotriya, Aditya Sinha","doi":"10.1109/confluence52989.2022.9734169","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734169","url":null,"abstract":"With the ever-increasing population size, comes an ever-increasing diversity in tastes and preferences. Catering to each of these nearly 7 billion preferences individually is an unimaginable task. Whereas providing the same service to whole population would nullify the meaning of ‘preferences. This is where customer segmentation acts as a middle ground. Customer segmentation is a way to cater to tastes and preferences of groups of individuals rather than individuals itself. Although, the individuals in these groups might not have the exact same preferences, but they lie in the same ballpark, making them more similar to each other than the individuals of other groups. Segmentation is the first step in ‘targeted marketing’, which is followed my targeting and eventually by positioning. One way of performing said segmentation is by manually segregating customers one by one, be it by using MS Excel or any query language. But this way is very cumbersome and error prone, it is also very time inefficient. Therefore, machine learning algorithms are used for big data sets. This not only eliminates the above problems, but it also increases the scope of analysis through data manipulation and visualization. The most common machine learning algorithms used for customer segmentation are the unsupervised clustering algorithms out of which k-means is the most popular one. We are going to study a variation of this k-prototype and look at how it performs when it comes to customer segmentation.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"203 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115188661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protein-protein interaction prediction from primary sequences using supervised machine learning algorithm","authors":"Monika Khandelwal, R. Rout, Saiyed Umer","doi":"10.1109/Confluence52989.2022.9734190","DOIUrl":"https://doi.org/10.1109/Confluence52989.2022.9734190","url":null,"abstract":"Protein-Protein Interactions (PPI) study is significant to comprehending cellular biological functions. Though there are different experimental techniques to predict PPIs, detecting PPIs in the lab is costly and time-consuming. Nowadays, high throughput approaches and large-scale biological techniques have achieved incredible growth. These large-scale techniques experience false positive and false negative predictions. As a result, there is a need to devise a computational technique for estimating PPI pairs, which complements laboratory techniques and offers an inexpensive way to find the interactions between proteins. Although much advancement has been achieved for PPI prediction still there is a requirement for a much more effective approach to predict PPI from protein sequences. The proposed model gives 93% accuracy, 92.9% sensitivity, 92.6% precision, 92.5% specificity, and 92.7% f1-score. The results indicate that our proposed model outperforms various predictors for PPI prediction.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129726433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detection of Malicious Cyber Fraud using Machine Learning Techniques","authors":"Parv Rastogi, Eksha Singh, Vanshika Malik, Abhishek Gupta, Surbhi Vijh","doi":"10.1109/Confluence52989.2022.9734181","DOIUrl":"https://doi.org/10.1109/Confluence52989.2022.9734181","url":null,"abstract":"As the technology and internet have come to their dawn, the rate of cyber-crimes has also increased. This increases the risk of information insecurity and the spread of crimes such as spam, farming and phishing, financial fraud, etc. Particularly, the attackers/hackers spread malicious uniform resource locators (URLs) to exploit vulnerabilities of the system and gain the personal information of the users. Thus, a study on malicious URL detection is necessary to prevent such attacks. Several studies exist which show numerous ways to determine malicious URLs based on machine learning (ML) and deep learning (DL), but there are some problems, for example, malicious features cannot be extracted efficiently. In this research, a model is proposed to ascertain malicious URLs, which is formulated on random forest, support vector machine (SVM), deep neural network (DNN), convolutional neural network (CNN). The several datasets are considered containing malicious and benign URLs to train the model to detect URL behaviour and attributes. The empirical results show that the suggested method can detect malicious URLs efficiently, based on URL behaviour and attributes. Thus, the solution may be advised as an efficient and reliable solution for the problem of malicious URL detection.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129680085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Elliptic Curve Cryptography in Cloud Security: A Survey","authors":"Mohammad Anas, Raza Imam, Faisal Anwer","doi":"10.1109/confluence52989.2022.9734138","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734138","url":null,"abstract":"Nowadays, people are using more cloud services than ever before as it provides more storage, collaborative environment, and more security than any other platform. Public Key Cryptography plays a significant role in securing the cloud applications, particularly, Elliptic Curve Cryptography, as its small key size nature is the most suitable aspect in the Cloud. Although, many contributions have been made in recent years to enhance the security aspect of Elliptic Curve approaches in Cloud service by modifications made in the algorithm or in various algorithm phases, but a review work that integrates recent studies providing research directions is missing in the literature. In this paper, we reviewed recent studies along with the various phases of Elliptic Curve Cryptography, which then follows the data analysis of various approaches and techniques. Several research directions and open research problems are derived that would efficiently assist the future relevant research.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125393632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dedicated Farm-Haystack Question Answering System for Pregnant Women and Neonates Using Corona Virus Literature","authors":"Revathi S Nambiar, Deepa Gupta","doi":"10.1109/confluence52989.2022.9734125","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734125","url":null,"abstract":"The global pandemic, COVID-19 has made it more important to quickly and precisely retrieve critical information for effective use by specialists in a wide range of fields. Domain question answering system will work or produce good results to certain extent but still favour more to the pretrained dataset. In this work we target developing a customized question answering framework that can assist the medical network with retrieval of answers to important logical questions like risk factors, effective modes of communication, various treatment options for target high-risk populaces like pregnant women and neonates.The proposed framework uses a customized Farm-Haystack question answering system and introduces a novel pipeline architecture using latent dirichlet allocation and bidirectional encoder representation from transformers for embedding the information. The system is modeled to produce the best and reliable answers for the delicate population, which requires more efficient answers rather than generic population, which can be answered using pretrained systems. In this context, the system has showed the accurate and compact answers for different inquiries related to the sensitive population.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"00 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123976603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Mask detection using Convolutional Neural Network","authors":"Vaibhavi Srivastava, Surbhi Vijh","doi":"10.1109/confluence52989.2022.9734156","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734156","url":null,"abstract":"The ever expanding research with advancement in the field of computer vision provided an innovative solution to face mask detection. An outbreak of infectious disease coronavirus causes severe acute respiratory syndrome. The pandemic diseases at initial stages included the symptoms of cough, fever, dizziness, shortness of breath and fatigue. Although being highly contagious (spread or transmission) this disease has a low rate of mortality with around 80% experiencing a mild effect and 15-20% as high/severe effects, there are no vaccines or specific antiviral medicine available yet but few are in initial stages. Therefore, face mask detectors have become a very important problem in image processing and computer vision. Several recent algorithms have been designed using convolutional architectures to make the algorithm as precise as possible. In this approach, convolutional neural network architecture is applied to design a face mask detector that can detect face in the frame and then label it as “with mask” or “without a mask” The experiments were performed and reached a validation precision of 93.55 after model training.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133812963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Learning Based Influence Maximization across Multiple Social Networks","authors":"Nida Shakeel, Rajendra Kumar Dwivedi","doi":"10.1109/Confluence52989.2022.9734145","DOIUrl":"https://doi.org/10.1109/Confluence52989.2022.9734145","url":null,"abstract":"Social networks play a significant role in spreading data in individuals' day-to-day existence. In viral advertising, organizations desire to communicate their items by utilizing the network organization and qualities of influence propagation. In particular, they need to give items at no cost to the chosen clients (seed nodes), permit them to promote them throughout the network and maximize the acquisition. There should be a spreading plan of the free-of-charge items with the objective of the organizations to choose the ideal seed set to boost the influence spread. This issue is known as influence maximization (IM) and has a broad scope viz., suggestion frameworks, link prediction, and data diffusion. In this paper, we worked on finding a connection between the model execution and the size of the chart and finding the seed hub. Impact Maximization (IM) is a principal issue to recognize a tiny arrangement of people which contain maximal impact increase within the community system.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129290658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Sentiment Analysis for Arabic Tweets on Covid-19 Using Computational Techniques","authors":"Surbhi Bhatia, Malak Alhaider, Maitha Alarjani","doi":"10.1109/confluence52989.2022.9734188","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734188","url":null,"abstract":"The Coronavirus pandemic has affected the regular course of life. Usage of social media like Twitter is rapidly increasing in Arab’s world regarding this phenomenon that has taken over the world by storm. This platform allows Arabian to easily write comments and share their feelings, thoughts and suggestions that can be positive or negative comments. This paper examines the Arabic sentiment analysis of Coronavirus-related tweets, as well as how Arab sentiment has changed over time in various countries. The goal of this study is to extract Arabic tweets from different periods of the pandemic and apply various preprocessing operations to them. Furthermore, the different state-of-art deep learning and machine learning classifiers are applied on the dataset and the accuracy of the classifiers are evaluated using several visualization tools. This paper focused on predictive modelling of tweets to find how the people’s opinion keeps on dwindling with the change of time during the course of time before, during and post pandemic. It also analyzes the different facts reveled before and after lockdown post pandemic, performing sentiment analysis to justify the claims that social media is not the reliable source to take preventive measures by the government agencies, imposing any decision. Deep learning algorithm has achieved more accuracy than machine learning in both periods, in the peck pandemic period, the RFC accuracy was around 83% where the DNN had 84%.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123257595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Approach of Categorization and Summarization of News using Topic Modeling","authors":"Uttara Behera, Sumita Gupta","doi":"10.1109/confluence52989.2022.9734216","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734216","url":null,"abstract":"The increasing demand/availability of online content has triggered intensive research in the automatic text summarization. Text summarization is the process of removing less useful text from the document to find the required news quickly. Likewise, text summarization, news summarization is also the process of picking the news content which is most important in perspective of online readers and gives the clear idea of the proposed news. Various traditional algorithms are available that can be used to summarize the text. In this paper, an automatic text summarizer using extractive summarization approach is proposed and implemented by considering topic modelling for categorization of news content and text rank algorithm for summarization. In order to evaluate accuracy, F-measure and recall of the produced summary, various machine learning algorithms are applied. The result produced 99.8% of accuracy using topic modelling over K-means clustering.","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121791261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Appraisal of the Attraction of Technological Talents in the Shuangcheng Economic Circle of Chengdu-Chongqing Region","authors":"Lida Hu, Asif Khan, Amit Yadav, Hong Liu","doi":"10.1109/confluence52989.2022.9734224","DOIUrl":"https://doi.org/10.1109/confluence52989.2022.9734224","url":null,"abstract":"This article first builds an evaluation index system for the attractiveness of scientific and technological talents based on the analysis and summary of existing research and related theories at home and abroad. Secondly, this article takes the Chengdu-Chongqing area double-city economic circle as an example, briefly analyzes its talent status, and after collecting and sorting out the statistical data of related indicators, it uses factor analysis and entropy method to comprehensively analyze its talent attraction. The empirical evaluation gives a comprehensive evaluation of the attractiveness of science and technology talents in the Chengdu-Chongqing Double-city Economic Circle and the specific sub-item comparative evaluation results of each city. Finally, based on the evaluation results, it puts forward countermeasures and suggestions to improve the attractiveness of talents [1].","PeriodicalId":261941,"journal":{"name":"2022 12th International Conference on Cloud Computing, Data Science & Engineering (Confluence)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121879315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}