2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)最新文献

筛选
英文 中文
Natural Language Processing for Sentiment Analysis in Social Media Marketing 社交媒体营销中情感分析的自然语言处理
K. Pandey, Madhuri B. Thorat, Abhishek Joshi, Srinivas D, Ali Hussein, M. Alazzam
{"title":"Natural Language Processing for Sentiment Analysis in Social Media Marketing","authors":"K. Pandey, Madhuri B. Thorat, Abhishek Joshi, Srinivas D, Ali Hussein, M. Alazzam","doi":"10.1109/ICACITE57410.2023.10182590","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182590","url":null,"abstract":"In recent years, more and more people have been using social media as a way to market their business. But because social media platforms generate so much data, it can be hard for businesses to analyze and use this data in the best way. Natural Language Processing (NLP) techniques can be used to figure out how people feel about posts on social media and get useful information for marketing on social media. This research paper gives an overview of how NLP techniques are used in social media marketing to analyze how people feel about things. The paper talks about the different NLP techniques, such as those based on dictionaries, rules, and machine learning. The paper also shows a case study of how NLP can be used to figure out how people feel about a certain product or brand in social media posts. The results of the case study show that NLP works well for analyzing sentiment and has the potential to help social media marketing in important ways. At the end of the paper, we talk about some of the problems with using NLP for sentiment analysis in social media marketing and where it could go in the future.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115459561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Smart Chabot in the Field of Trading using Smart Artificial Intelligence Informal Technology 利用智能人工智能非正式技术在交易领域开发智能聊天机器人
Nachaat Mohamed, S. Ninoria, C. krishnan, Suresh Babu Rajasekaran, B. Alfurhood, D. P. Singh
{"title":"Development of Smart Chabot in the Field of Trading using Smart Artificial Intelligence Informal Technology","authors":"Nachaat Mohamed, S. Ninoria, C. krishnan, Suresh Babu Rajasekaran, B. Alfurhood, D. P. Singh","doi":"10.1109/ICACITE57410.2023.10182528","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182528","url":null,"abstract":"Artificial Intelligence (AI) and Natural Language Processing (NLP) calculations are being used to create a sophisticated system known as a chatbot. It answers questions from customers and successfully communicates with them. Discourse/discussion administrators are most frequently used by organizations, official affiliations, and fictitious affiliations. Organizations that deal with money, like banks, charge card companies, associations with online retailers, and new businesses, frequently disseminate them. These conversational specialists work for a variety of companies, from huge associations to tiny, new businesses. There are chatbot advancement frameworks on the market that are both interface-and code-based. They do their best to avoid being nimble and adaptable when starting sincere conversations though. There are several well-known intelligent personal assistants, including \"Amazon's Alexa, Google's Google Assistant, and Microsoft's Cortana.\" These experts only have a few components. The current chatbots don't deliver satisfactory results, regardless of whether they were developed using recovery-based strategies, rule-based tactics, or basic AI computations. This article offers a basic audit of chatbots and carefully examines and discusses the available strategies.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125237729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Infant Growth using the Random Forest Algorithm 用随机森林算法预测婴儿生长
T.M.Saravanan, S. Saravanakumar, Srinivas Dandu, D. Vinotha, Ahmed Karim Kadhim, Haider Al-Chlidi
{"title":"Prediction of Infant Growth using the Random Forest Algorithm","authors":"T.M.Saravanan, S. Saravanakumar, Srinivas Dandu, D. Vinotha, Ahmed Karim Kadhim, Haider Al-Chlidi","doi":"10.1109/ICACITE57410.2023.10182723","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182723","url":null,"abstract":"Every parent is curious about their child's internal and exterior development. Childhood is the first stage of a person's existence. To comprehend and better explain many elements of action, including the emotional, physical, social, intellectual, perceptual, and personality development, extensive research has been done in the past. Child development analysis is a scientific approach to evaluate growth, change, and stability. By learning more about how and why individuals develop and grow, one may better understand and meet a child's needs, allowing them to realize their full potential. Child development has a broad scope and a general purpose. However, just a few studies on early childhood development have been conducted. The project's objective is to use machine learning algorithm to forecast a child's future learning behavior and talents using a random forest algorithm and data-mining approach.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116792627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Genetic Algorithm-Based Data Allocation in Multi Media Using Cloud Computing 基于遗传算法的云计算多媒体数据分配
Surendra Yadav, Manpreet Kaur
{"title":"Genetic Algorithm-Based Data Allocation in Multi Media Using Cloud Computing","authors":"Surendra Yadav, Manpreet Kaur","doi":"10.1109/ICACITE57410.2023.10183005","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10183005","url":null,"abstract":"The recent growth of Internet-of-Things (IoT) applications using cloud computing has been amazing. One of the advancements is heterogeneous cloud computing, which has made it possible to use the cloud for a range of infrastructure solutions, including multimedia big data. The optimizations of on-premise heterogeneous memory have been the subject of several past studies. However, the performance and financial limits brought on by hardware distributions and manipulative techniques are placing restrictions on the heterogeneous cloud memory. It is an NP-hard combinatorial issue to distribute data jobs across dispersed memory with different capacities. In order to provide high performance cloud-based heterogeneous memory service offerings, this study focuses on this problem and suggests a unique solution called Cost-Aware Heterogeneous Cloud Memory Model. It allocates data to the cloud-based memory via genetic programming. In our suggested method, we take into account a number of important elements that have a significant influence on how well Communication expenses, data transfer operating costs, energy performance, and time constraints all play a role in how cloud memories operate. Finally, we put our suggested paradigm to the test via experimental assessments. The trial findings have demonstrated the viability and scalability of our technique as a cost-conscious cloud-based solution.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"48 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120941016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deepflow: A Software-Defined Measurement System for Deep Learning Deepflow:一个软件定义的深度学习测量系统
Prasanna Kumar Lakineni, Saurabh Kumar, Sanjay Modi, K. Joshi, V. Mareeskannan, Jayapal Lande
{"title":"Deepflow: A Software-Defined Measurement System for Deep Learning","authors":"Prasanna Kumar Lakineni, Saurabh Kumar, Sanjay Modi, K. Joshi, V. Mareeskannan, Jayapal Lande","doi":"10.1109/icacite57410.2023.10182469","DOIUrl":"https://doi.org/10.1109/icacite57410.2023.10182469","url":null,"abstract":"Delivering perfectly alright real-time traffic information is crucial for managing a wide range of networks, particularly vehicular communications, anomaly analysis, networking accounting, and available bandwidth. Application networking might be able to give fine-grained evaluation by offering details for each sent rules of just an Open circulation switching. Providing absolutely adequate real-time traffic information in hardware switches also poses serious problems because of the size constraints of TCAMs that can only accommodate a minimal number of rules in contrast to the number of current fluxes in the networks. Inside this editorial, we initiate Intense Flow going, a scheme for modular app assessing that's also premised on an efficient method that a) flexibly senses the channel's highest traffic references and locations prefixes, b) collects coarse-grained stream size readings for less energetic identifiers and perfectly alright metrics for the more engaged users; c) includes historical metrics to coach a cloud-based a profound learners model that has the potential to create short forecasts anytime precise f Due to the lack of the need for additional flow sampling methods that compromise accuracy, a large increase in the number of totally acceptable flows that may be recorded is now possible. . Deep Flowing can provide incredibly high accuracy for estimating flow quantities at various hierarchy levels, according to a rigorous experimental analysis using a prototype versions and actual networking signals.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127161495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Conjunctional Approach for Enhanced and Extended Security in Big data Environment 大数据环境下增强和扩展安全的联合途径
V. S, D. Benitta, Marzouq Yasser Atab, A. M. Shareef, Aqeel Ali, Mustafa Al-Tahee
{"title":"A Conjunctional Approach for Enhanced and Extended Security in Big data Environment","authors":"V. S, D. Benitta, Marzouq Yasser Atab, A. M. Shareef, Aqeel Ali, Mustafa Al-Tahee","doi":"10.1109/ICACITE57410.2023.10182873","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182873","url":null,"abstract":"Today people’s live in the \"Era of Data\". The data has been tortured and indulged in confession in many ways. The term big data deals with large volumes of data that streams in a fraction of a second and of-course in the format of unstructured data. As the data are big the challenges are high and the process of handling data is becoming so daunting. And the security issues of big data are becoming a great threat to the data which is very critical for the development of many organizations. As the security solution cannot be given as a one-stop solution a layered methodology has been proposed in this work for securing confidential data. It is a combination of heavy encryption traditional algorithm RSA and data masking technique which will lead to better security for the data. The reason why the RSA algorithm is proposed is that by using this algorithm it is very safe to exchange data over the internet, it maintains the confidentiality of the data to a high extent and this algorithm will maintain high toughness because breaking the keys through interceptors is difficult. The results and discussions of our proposed methodology will lead to an enhanced security system with fuzzy procedures which efficiently strengthen the system.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127233600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Machine Learning and Artificial Intelligence in Health Care 医疗保健中的机器学习和人工智能综述
Syed Mohtashim Mian, M. Sushma
{"title":"Review of Machine Learning and Artificial Intelligence in Health Care","authors":"Syed Mohtashim Mian, M. Sushma","doi":"10.1109/ICACITE57410.2023.10183193","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10183193","url":null,"abstract":"ML has made considerable strides in recent years, with applications in many different fields of study and industry. The prospective applications of machine learning technology in healthcare are discussed in this article, along with a number of industry-wide projects. Advanced ml has become a significant industrial trend with highly specialized implications. Machine learning is a real thing with much potential. It is significant in a variety of industries, including banking, medical, and defense. To better anticipate diseases, it analyses medical data sources for trends using machine learning. In this paper, we discuss various machine learning algorithms used to develop efficient decision support for medical applications.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125161207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recent Advances in DL-based Text Summarization: A Systematic Review 基于dl的文本摘要研究进展
Utkarsh Dixit, Sonam Gupta, A. Yadav, Divakar Yadav
{"title":"Recent Advances in DL-based Text Summarization: A Systematic Review","authors":"Utkarsh Dixit, Sonam Gupta, A. Yadav, Divakar Yadav","doi":"10.1109/ICACITE57410.2023.10183122","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10183122","url":null,"abstract":"The technique of creating a brief and relevant summary of a lengthy piece of text while retaining its vital content and overall relevance is known as text summarization. It involves condensing the original text while retaining its core message. In today's age of information overload, text summarization has gained immense significance as we encounter an excessive amount of textual information on a daily basis. Text summarization can be done manually by humans, but it can also be automated using ML techniques. DL models have demonstrated promising results in text summarization in recent years, and have become a major study area in the field of NLP. This study offers a synopsis of literature on the use of DL approaches for text summarization. The review covers various techniques such as CNN, RNN, LSTM, DeepSum, GA2C, Pointer Generator, and BERT, as well as various datasets such as CNN/Daily Mail and Arabic datasets. The ROUGE Score was used to assess the efficacy of text summarizing approaches, and BERT received the highest score of 98%. This study gives a detail examination of the current advantage in DL approaches for text summarization. Furthermore, it indicates possible new study areas in this subject.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125399595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determination of Accuracy of Neural Network Method Using Magnetic Resonance Images in Finding Liver Cancer Level 神经网络方法在磁共振图像中发现肝癌水平准确性的测定
V. Vekariya, Tanmay Goswami, Sajjan Singh, Kanishka Ghodke, Imad Saeed Abdulrahman, Anshul Jain
{"title":"Determination of Accuracy of Neural Network Method Using Magnetic Resonance Images in Finding Liver Cancer Level","authors":"V. Vekariya, Tanmay Goswami, Sajjan Singh, Kanishka Ghodke, Imad Saeed Abdulrahman, Anshul Jain","doi":"10.1109/ICACITE57410.2023.10182903","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182903","url":null,"abstract":"This paper proposes the detection of lever cancer by image segmentation via Convolutional Neural Network and comparing accuracy and sensitivity with K-Nearest Neighbor Classifier. 40 samples have been considered for this work. Convolutional Neural Network contains 20 samples in group 1 and group 2 has 20 samples for K-Nearest Neighbor Classifier. With a pretest power of 80%, an independent sample T-test were performed for both the groups. An accuracy of 96.29% is achieved by Convolutional Neural Network and K-Nearest Neighbor achieves an accuracy of 89.96% with significance of p<0.05. The Sensitivity of 97.61% and 95.38% with significance of p<0.05 is achieved by convolutional Neural Network and K-Nearest Neighbor respectively. Convolutional Neural Network accomplishescomparatively better sensitivity and accuracy in cancer segmentation of liver when compared with K-Nearest Neighbor classifier.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125580659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Change Detection Analysis Criteria and Techniques used for Land Use and Land Cover Classification in Agriculture 用于农业土地利用和土地覆盖分类的数字变化检测分析标准和技术
Nisha Sharma, Sachin Chawla
{"title":"Digital Change Detection Analysis Criteria and Techniques used for Land Use and Land Cover Classification in Agriculture","authors":"Nisha Sharma, Sachin Chawla","doi":"10.1109/ICACITE57410.2023.10182604","DOIUrl":"https://doi.org/10.1109/ICACITE57410.2023.10182604","url":null,"abstract":"The term \"Land Cover\" (LC) refers to the physical characteristics of the land, such as flora, water bodies, building areas, and forests. Identifying them using a remote sensing dataset is called land cover mapping. Land Use (LU) is a series of activities carried out on land by humans to obtain products. Land use classification examples include cropland, a built-up region used for business or industrial needs. Mapping and monitoring both land use and land cover (LULC) can be carried out using remote sensing datasets like Sentinal-2 Landsat-8 etc. Compared to algebra-based change detection techniques, the change vector analysis method offers a higher level of accuracy, according to the current study. This paper discussed the change detection analysis criteria and techniques which can be used for detecting the change and also compared the accuracy of different classifiers used for land use land cover in Agriculture.","PeriodicalId":313913,"journal":{"name":"2023 3rd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122434660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信