{"title":"Data Mining based Handling Missing Data","authors":"A. Dubey, A. Rasool","doi":"10.1109/I-SMAC47947.2019.9032631","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032631","url":null,"abstract":"Today, a huge amount of data are generated in many applications than ever before. However, most of the application's data are affected by the issue of missing values. This issue has gained significant attention throughout the statistical research. Several obvious examples involve repositories related to the management of equipment, business applications, and surveys. One of the usual ways to handle this issue is to fill the value using imputation. Several imputation techniques have been proposed until now to handle the missing data. With the rapidly increasing size of the dataset, a modern imputation approach algorithm is required. In this paper, we provide an extensive overview of the current imputation methods, with a special focus on algorithms utilizing the local or global correlation available within the dataset. Furthermore, the paper shows how the prediction made can be validated and some possible future directions. This paper is expected to give the researchers a good grasp of the current trends in this domain and to enable them to create a more robust and efficient algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123067191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research","authors":"A. Tiwari, Manisha L Chaudhari, Ankita Rai","doi":"10.1109/I-SMAC47947.2019.9032566","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032566","url":null,"abstract":"Multidisciplinary approach of artificial intelligence is revolutionizing the traditional technologies used in medical image computing, radiology imaging, medical diagnoses and features based disease identification [1], [2]. In this paper, overview of artificial intelligence and its application over medical images, recent challenges, deeper technological background regarding betterment/innovation healthcare, real life clinical application with parameters of diagnosis, will improve patient health and feature based disease identification. It provides methodologies in the field of medical imaging by developing self driven and intelligent algorithm that manages and extracts meaningful information out of raw data present in the images. It helps in early diagnosis and treatment of the diseases. This paper focuses on various aspects and issues on the growing role of medical image, fundamental technical advantage of AI over traditional patterns for the betterment of human lives. From this research work, reader understands deeper technological aspects for smart algorithms regarding diseases and patient care.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT Based Handy Fuel Flow Measurement","authors":"Pavan Manjunath, Pritam Gajkumar","doi":"10.1109/I-SMAC47947.2019.9032467","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032467","url":null,"abstract":"The adoption of the newer technologies for measuring the fuel flow into the vehicle fuel tank is a very feasible option, and gives accurate values without tampering the value count of the fuel flow's digital data values. With the help of digital measurement sensors the proposed Internet of Things (IoT) based fuel flow monitoring system helps to obtain a precise level of fuel count. This research paper provides an overview of the IOT based fuel flow digital measurement sensors, by sending the real-time inputs to user mobile, about how much petrol or diesel flow is pumped into vehicle tank. Therefore, it is not necessary that user should depend on the petrol pump digital machine display unit, for gauging the fuel flow into the fuel tank of the vehicle. These devices will always act as a lightweight portable device and the user can carry these lightweight portable devices anywhere and at any time.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115077972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ECG Electrodes for Smart ECG Monitoring for biomedical applications","authors":"Malti Bansal, Bani Gandhi","doi":"10.1109/I-SMAC47947.2019.9032663","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032663","url":null,"abstract":"There has been an expeditious rise in various complicated and vulnerable diseases in the world today. The most critical set of diseases are Cardiovascular Diseases (CVDs). CVDs are affecting a lot of population present across the globe. As these diseases are unpredictable in nature, medical facilities and diagnosis should be made more prompt and effective. As the world population is rapidly increasing, there is a massive burden on the healthcare industry. The healthcare systems should be portable, more connected and most importantly reliable. This can only be accomplished with the help of various technologies. First and foremost, are the sensors used to measure the Electrocardiogram (ECG) for various CVDs. Decades ago, Ag/AgCl gel based electrodes were used to measure the ECG. However, due to their various disadvantages, the medical fraternity moved on to using dry electrodes. Various dry electrodes were developed and used for this purpose. Further, in the category of dry electrodes, Carbon Nanotubes (CNTs) based ECG electrodes have shown great potential in this domain. Due to the various advantages of CNTs like flexibility, conductivity, and lighter weight, it can be used to fabricate electrodes or can be embedded into the textiles. Thus, people suffering from CVDs can incorporate these electrodes / sensors in their daily lives for early detection of the disease, and the person's life can be saved. As CNTs are smart materials, easily and readily available, and most importantly available in low costs, they can be used for fabricating smart devices. These characteristics of CNTs make them a perfect candidate for biomedical applications. This paper reviews various works related to fabrication of multiwall carbon nanotube (MWCNT) based electrodes, for ECG monitoring.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123568072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe
{"title":"CNN based speaker recognition in language and text-independent small scale system","authors":"Rohan Jagiasi, Shubham Ghosalkar, Punit Kulal, A. Bharambe","doi":"10.1109/I-SMAC47947.2019.9032667","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032667","url":null,"abstract":"Speaker Recognition is the ability of the system to recognize the speaker from the set of speaker samples available in the system. It is of 2 types, one uses a keyword, called text-dependent systems, and another one can recognize the voice in any language/text, also called as text-independent speaker recognition. In this paper, a text-independent, language-independent speaker recognition system is implemented using dense & convolutional neural networks. Speaker recognition has found several applications in upcoming electronic products like personal/home assistants, telephone banking and biometric identification. In this paper, we explore a system that uses MFCC along with DNN and CNN as the model for building a speaker recognition system.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"112 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114090198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra
{"title":"Android Application Development: A Brief Overview of Android Platforms and Evolution of Security Systems","authors":"Anirban Sarkar, Ayush Goyal, David Hicks, Debadrita Sarkar, Saikat Hazra","doi":"10.1109/I-SMAC47947.2019.9032440","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032440","url":null,"abstract":"With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly mobile platform. This open-source linux kernel-based operating system offers high flexibility due to its customization properties making it a dominant mobile operating system. Android applications are programmed in java language. Google android SDK delivers a special software stack that provides developers an easy platform to develop android applications. Moreover, developers can make use of existing java IDEs which provides flexibility to the developers. Java libraries are predominant in the process of third-party application development. Cross-platform approaches make sure that developers do not have to develop platform-dependent applications. With the help of these approaches, an application can be deployed to several platforms without the need for changes in coding. However, android is more prone to security vulnerabilities which the majority of the users do not take into account. Any android developer can upload their application on the android market which can cause a security threat to any android device. These applications do not have to go through rigorous security checks. In this paper, a layered approach for android application development along with various cross-platform approaches is discussed. Moreover, a brief introduction to new android platforms including security framework as well as security systems is discussed.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"288 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124155875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigation and classification of cyber-crimes through IDS and SVM algorithm","authors":"Hamid Zolfi, H. Ghorbani, M. Ahmadzadegan","doi":"10.1109/I-SMAC47947.2019.9032536","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032536","url":null,"abstract":"The evolution of information technology and the development of usage of the high speed internet has brought about changes in the human daily activities. And also access to a large amount of information available through Internet and network platform have led to an increase in the knowledge level of individuals. But along with these changes that have changed the quality of life, and despite all the features and capabilities of the Internet, the criminals have been able to enter the organizational computer systems, and a new type of crime known as computer crime has been emerged which has doubled the importance of tracking, detecting and dealing with these crimes. The spread of computer crime in different countries has led to the adoption of appropriate solutions through the development of relevant laws and raising public awareness and also detection and counteraction of computer crimes requires high level of knowledge, skills and technology. In this way, today intrusion detection and prevention systems along with firewalls are the main mechanisms for achieving the network security. purpose of this study is to identify meaningful patterns for categorizing computer attacks as a solution for Detecting as much as possible malicious attacks and anticipating future criminal activities by using the intrusion detection systems and focus on evidence gathering about suspicious activities and therefore increasing network security. For this purpose, the present study investigates computer crimes that occurred through the traffic network of a petrochemical subsidiary company in a given period of time through the attacks modeling using the SVM algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125603741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Detailed Motor Selection for Electric Vehicle Traction System","authors":"Mayuri S. Patil, S. Dhamal","doi":"10.1109/I-SMAC47947.2019.9032616","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032616","url":null,"abstract":"Electric vehicle is the upcoming buzz word in the coming decade. The main component driving the vehicle is motor and its driving mechanism, that efficiently utilises the power stored in the batteries. Industrially, variety of electric motors is available to be used in traction system. Along with selection of motor, proper choice of motor drive mechanism is essential for design and operation of electric vehicle. In this paper, a detailed review of various electric motors available will be judged for its suitability for vehicle applications. Also, it is essential for the traction system to access various drive mechanism for efficient operation of electric vehicle.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121454158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Enhancement Scheme in Mobile Wireless Sensor Networks Using RAPD Approach","authors":"Abhijit S. Bodhe, Jagdisha N.","doi":"10.1109/I-SMAC47947.2019.9032647","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032647","url":null,"abstract":"Now a day's social media is trending towards wireless technology for a wire-free and faster communication, especially mobile devices are interconnected together to create a complete network in an organization or even in the home, where the detection and identification of fraud devices play an important role. These devices can be a potential threat to the entire network. The proposed method focuses on identification and eradication of fake/rouge access points which is installed by mistake or intentionally by end user, using beacon frame this can possible to identify and remove such rouge devices from the network in faster and cheaper rate, without any additional hardware's, The paper will surly an extension for security enhancements with RAPD algorithm.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130072173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on IoT Standards and Suggesting a New Method to Enhance Data Security","authors":"H. Ghorbani, M. Mohammadzadeh","doi":"10.1109/I-SMAC47947.2019.9032571","DOIUrl":"https://doi.org/10.1109/I-SMAC47947.2019.9032571","url":null,"abstract":"IoT is a new phenomenon that quickly spread and has penetrated unequivocally in all areas, including economics, education, industry, entertainment, and is a very serious competitor with high abilities for other technologies. One of the pillars of the IoT is information and data in its network which includes a large variety. This diversity has been added to the importance of data protection. In the digital world, all the work is done on the basis of data and their value and these data, which play a fundamental role in the success or failure of the work. The determination of data value and data security are very important. In most articles and works in this field, all attention has been given to one dimension of security, and security has never been seen from the general viewpoint. While we need to provide security at different levels for security purposes. In this article, we refer to a method that can be used to create a ring of protection for data. This guard ring must meet the minimum requirements, which includes the five items that we refer to. On the other hand, with increased security for each item, our data security will also increase. By doing this, we can always create a minimum level of security for data.","PeriodicalId":275791,"journal":{"name":"2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131480389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}