{"title":"AN ANN MODEL FOR EARLY PREDICTION OF DIABETES","authors":"Amit Mishra","doi":"10.26483/ijarcs.v13i6.6916","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6916","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127349741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"COMPUTATIONAL LINGUISTIC MATERIAL FOR VIETNAMESE SPEECH PROCESSING: APPLYING IN VIETNAMESE TEXT-TO-SPEECH","authors":"P. V. Dong","doi":"10.26483/ijarcs.v13i6.6935","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6935","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"199 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120940645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ANALYSIS AND PREDICTION OF DATASET CATEGORIES FOR DEEP LEARNING IN FAUX NEWS DETECTION: A SYSTEMATIC REVIEW","authors":"Vaishnavi J. Deshmukh","doi":"10.26483/ijarcs.v13i6.6944","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i6.6944","url":null,"abstract":"","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124096243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EXPERIMENTAL STUDY ON PERFORMANCE OF SYMBOLIC CLASSIFIER WITH GENE SELECTION METHODS FOR MULTICLASS MICROARRAY GENE EXPRESSION DATA","authors":"Dr. Sheela T","doi":"10.26483/ijarcs.v13i5.6914","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6914","url":null,"abstract":"Microarray is a useful technique for measuring expression data of thousands of genes simultaneously. The expression level of genes is known to contain the keys to address fundamental problems relating to the prevention and cure of diseases, biological evolution mechanisms and drug discovery. Previous research has demonstrated that this technology can be useful in the classification of cancers. Most proposed cancer classification methods work well only on binary class problems and not extensible to multi-class problems. This work is an attempt to classify high dimensional, multiclass Microarray Gene expression data using symbolic classifier.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115684327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"REINFORCEMENT AND CONSOLIDATION OF THE WEAKEST RING IN INFORMATION SECURITY WITHIN ESTABLISHMENTS","authors":"K. Saeed","doi":"10.26483/ijarcs.v13i5.6909","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6909","url":null,"abstract":"Information security used to be primarily a problem for governmental organizations or organizations whose operations need a high level of security to safeguard data and infrastructure. The fact that most information is now broadcast over the air and business is conducted through communication channels means that this way of life has an impact on the security of these assets. Therefore, information security issues should be treated equally to other security issues, and both of them need to be resolved simultaneously. The elements that positively or negatively affect information security awareness are then discussed in this study, with a focus on the role of organizations, senior management, and employees as well as technological and administrative security measures. As a result of this work, information security awareness has risen to the top of the security strategy and assumed paramount importance. As a result, classification of establishments and strategy planning must be done in the future while considering information security awareness.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116962693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HYBRID ENCRYPTION USING LSB STEGANOGRAPHY AND RSA","authors":"K. Manikandan","doi":"10.26483/ijarcs.v13i5.6895","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6895","url":null,"abstract":"Computers and the internet are the two main communication tools used today to link the entire world together as one virtual space. So we can easily exchange lots of information within seconds of time, but the confidential data that needs to be transferred should be kept confidential. Thus, in order to aid this, we have proposed a new encryption technique by combining Image steganography (LSB) with the cryptographic RSA algorithm for providing more security to our data as well as imperceptibility. The expected outcome would be a properly secure combination of encryption models that uses steganography to hide the message content in a cover image, and also encrypts the message using the cryptographic algorithm, as an additional security layer, in case the content was retrieved from the cover image.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124855779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A STUDY ON PRIVACY PRESERVING BIG DATA MINING: TECHNIQUES AND CHALLENGES","authors":"Anuradha Dahiya","doi":"10.26483/ijarcs.v13i5.6906","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6906","url":null,"abstract":"The basic goal of data mining algorithms is to extract previously undiscovered patterns from the data. When mining the data, sensitive and confidential information should be secured simultaneously to protect privacy. Due to the widespread use of information technology, enormous amounts of data are being produced at an exponential rate by several organisations, including hospitals, insurance providers, banks,e-commerce, and stock exchanges, making privacy a crucial concern in data mining. Anonymization, Perturbation, Generalization, and Cryptography are some of the privacy-preserving data mining techniques that have been proposed in the literature. In this study, we have reviewed all of these state of art techniques and presented a tabular comparison of work done by different authors as well as discussed the challenges of privacy preserving data mining.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128848400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"HYBRID INTRUSION DETECTION METHOD BASED ON IMPROVED ADABOOST AND ENHANCED SVM FOR ANOMALY DETECTION IN WIRELESS SENSOR NETWORKS","authors":"M. Sirajuddin","doi":"10.26483/ijarcs.v13i5.6912","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6912","url":null,"abstract":"The utilisation of Wireless Sensor Networks is quickly rising due to the fast progress of wireless sensor technologies. Due to limited resources, infrastructureless nature, and other factors, it faces major security difficulties. This study describes a hybrid IDS based on an improved AdaBoost and Enhanced SVM strategy for detecting network intrusions and monitoring node activity while classifying it as normal or abnormal. AdaBoost is used in combination with an SVM classifier to identify and classify intrusions. The suggested IDS considerably enhanced the network performance by recognising and eliminating malicious nodes from the network and avoiding DoS and sinkhole attacks. Results oproved that it performes better than other state of art methods in terms of transmission delay, detection rate, energy consumption, packet delivery rate. It also has the advantages of a simple structure and quick computation times.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115969791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PROACTIVE MONITORING FOR SMEs USING APPINSIGHT","authors":"A. Buja","doi":"10.26483/ijarcs.v13i5.6901","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6901","url":null,"abstract":"Data Security is a worldwide concern mostly for small medium enterprise (SMEs) and frameworks, approaches, methods are constantly evolving that has a connection with cloud computing, information systems, artificial intelligence, blockchain. Many developers, administrators or product teams running blind. Those are not knowing of problems with their application or do not have the information to fix the problems. The things which can go wrong with web and mobile applications or services is unlimited like dependency failures, resources, and crashes. Main argument is an evaluation of benefits by using Cloud as infrastructure and application on proactive monitoring called Azure Application Insights (AppInsight) towards target like web application, web API, PKI etc. The findings, demonstration of the study should reveal and support our main hypothesis that there is direct link between the proactive monitoring and the main factors that affects utilizing the cloud services. To address this need, in this paper, we introduce AppInsight, the best practice and a model of proactive approach to monitor different targets using Microsoft technology on Azure Cloud services. AppInsight – a model of proactive monitoring includes several functionalities: (1) identifying availability, (2) failures dependencies, (3) performance and (4) using telemetry data generates ad-hoc solution to fix potential failure of web application, web API etc. AppInsight a feature of Azure Monitor used to monitor live applications. AppInsight will automatically detect performance anomalies, and includes powerful analytics tools to help you diagnose issues. You will get a range of telemetry data of analytics of your target which is monitored by AppInsight. To evaluate this tool, we conduct an empirical evaluation by comparing data from actual live monitoring of Y target. Demo Video: https://www.youtube.com/watch?v=q7R8-c0ge7M","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124942377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN ONLINE SQL VULNERABILITY ASSESSMENT TOOL AND IT’S IMPACT ON SMEs","authors":"A. Buja","doi":"10.26483/ijarcs.v13i5.6903","DOIUrl":"https://doi.org/10.26483/ijarcs.v13i5.6903","url":null,"abstract":"Information security has received everyone's attention, especially in the case of the global Covid-19 pandemic. SMEs are looking for solutions that offer greater security and a normal functioning of activities. Our research is aiming to measure the benefits from the usage of an online Vulnerability Assessment SQL tool (VA SQL). In the study, through an experiment of various tools used we can see different results in the findings. We present the best practice and a model of proactive approach to analyze database security using Microsoft technology. Currently, we need to have and use a lot of scripts or external tools to identify and fix the vulnerabilities. The findings, demonstration of the study should reveal and support our main hypothesis that there is direct link between the database security and the main factors that threat and risk the data. In this paper, we present VA SQL – a model for discovery, track and fix potential database security gaps of different information systems and web application databases.","PeriodicalId":287911,"journal":{"name":"International Journal of Advanced Research in Computer Science","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}