2018 4th International Conference on Computing Communication and Automation (ICCCA)最新文献

筛选
英文 中文
Application of Machine Learning in Disease Prediction 机器学习在疾病预测中的应用
Pahulpreet Singh Kohli, Shriya Arora
{"title":"Application of Machine Learning in Disease Prediction","authors":"Pahulpreet Singh Kohli, Shriya Arora","doi":"10.1109/CCAA.2018.8777449","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777449","url":null,"abstract":"The application of machine learning in the field of medical diagnosis is increasing gradually. This can be contributed primarily to the improvement in the classification and recognition systems used in disease diagnosis which is able to provide data that aids medical experts in early detection of fatal diseases and therefore, increase the survival rate of patients significantly. In this paper, we apply different classification algorithms, each with its own advantage on three separate databases of disease (Heart, Breast cancer, Diabetes) available in UCI repository for disease prediction. The feature selection for each dataset was accomplished by backward modeling using the p-value test. The results of the study strengthen the idea of the application of machine learning in early detection of diseases.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 95
A Review on Multisource Data Analysis using soft computing Techniques 基于软计算技术的多源数据分析综述
S. A. Ansari, Aasim Zafar
{"title":"A Review on Multisource Data Analysis using soft computing Techniques","authors":"S. A. Ansari, Aasim Zafar","doi":"10.1109/CCAA.2018.8777551","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777551","url":null,"abstract":"Nowadays, there arise a tremendous increase in the amount of data or we can say the data coming from multiple sources gather to form huge data. There are various techniques used in soft computing for Multi-Source Data analysis and its technological advancements. This paper, describes an overview of multisource data analytics, its application, advantages, and limitations and few models have reviewed with their objective, merits and so on. Moreover, there are various issues in existing storage techniques and improvements in technology. Since the existing and traditional technologies have their own issues to manage huge data, so advance technologies have been derived to manage them and to derive useful insights. Further, few research issues and future directives are presented in this paper.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Reviewers Assignment to a Research Paper Based on Allied References and Publications Weight 基于相关参考文献和出版物权重的研究论文审稿人自动分配
T. Mahmud, B. M. M. Hossain, D. Ara
{"title":"Automatic Reviewers Assignment to a Research Paper Based on Allied References and Publications Weight","authors":"T. Mahmud, B. M. M. Hossain, D. Ara","doi":"10.1109/CCAA.2018.8777730","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777730","url":null,"abstract":"Everyday there may be a vast stream of research documents give in to conferences, anthologies, journals, newsletters, annual report, daily paper, and different periodicals. Numerous such publications use unbiased and exterior specialists to survey. This methodology is frequently termed peer review, in addition the assessors are named referees. but it is not always possible to pick out the best referee for reviewing. Moreover, the new fields of research are emerging in every sector and the number of research is increasing dramatically. but, to review all of these papers, every journal assign a short team of referees and maybe they are not expert in all areas. For example, a research paper in the communication technology area should be reviewed by the expert from the same field. So, it is a big challenge to efficiently select the best reviewer or referee for a research paperIn this research work, we proposed and implemented a program or software where, we used a new strategy to select the best reviewers of a research work automatically. As we already know that every research paper contains references in the end of the paper and the references are generally from same area as the paper is. In this work, first of all, we collect the references and count the authors who have at least one paper that belong to the reference section. Once, we collect the authors name, automatically browse the web to extract the research topic keywords. Then again search for finding top researchers in the specific topic field and count their h-index, i10-index and citations for first n author. After then, ranked top n authors based on ranking score and automatically browse their homepage to retrieve emails address. We also check their co-authors and colleagues from the web and discard them accordingly from the list. The remaining tops n authors (researcher) generally professor and maybe the best referees for reviewing a research paper.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Evaluating Performance of Machine Leaming Techniques used in Opinion Mining 评价意见挖掘中机器学习技术的性能
P. Mishra, Ranjana Rajnish, Pankaj Kumar
{"title":"Evaluating Performance of Machine Leaming Techniques used in Opinion Mining","authors":"P. Mishra, Ranjana Rajnish, Pankaj Kumar","doi":"10.1109/CCAA.2018.8777724","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777724","url":null,"abstract":"Sentiment analysis is a computational study used for interaction of humans with the computers. In the task of Opinion Mining computations are done on words and sentences used by individual for expression of their opinions. This computation is done with the help of NLP tools to determine whether the review or opinion expressed is positive, negative or neutral. Binary categorization (Positive, Negative) and Multi class categorization (Positive, Negative and Neutral) are two main text classifications used for analysis. Nowadays Opinion is not limited to an individual, it is also an important aspect for most of the organizations as it helps in intensive response from their customers regarding their product quality or about any services used. Earlier, organizations used to conduct different type of Surveys, Questionnaires in order to improve their quality or services offered. There are two widely used approach used for study of opinion mining which are dictionary based approach and machine learning approach In this paper we provided information about different machine learning approach used for task of Opinion Mining, performance overview of various approaches used, metrics used to measure opinion mining efficiency.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High frequency FPAA Design using OTA in 45nm CMOS Technology 基于OTA的45纳米CMOS高频FPAA设计
Tarab Ansari, M. Y. Yasin
{"title":"High frequency FPAA Design using OTA in 45nm CMOS Technology","authors":"Tarab Ansari, M. Y. Yasin","doi":"10.1109/CCAA.2018.8777611","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777611","url":null,"abstract":"This paper aims at developing a modified yet general purpose FPAA CAB (configurable analog block) architecture which is dedicated to analog signal processing applications, based on OTA (operational transconductance amplifier). The OTA is a low voltage, low power and wide bandwidthcurrent mode device which can allow high frequency operation with an ease of stability. OTA has already established as a convenient analog device which usually simplifies circuit designs. The CAB design is aimed at aimed at achieving a wider range of functions by local programming facilities available. A CAB may contain one or more active devices and a set of switches. Here we concentrate on the design of a two OTA-CAB. The OTA is realized in 45nm bulk CMOS adopting a simple architecture, and biased by ±1V sources. HSPICE is used for simulation work. Theresults are quite satisfactory and are presented.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133427609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Security: A Major Challenge in India 网络安全:印度面临的重大挑战
Shivansh Sharma, Mukul Khadke
{"title":"Network Security: A Major Challenge in India","authors":"Shivansh Sharma, Mukul Khadke","doi":"10.1109/CCAA.2018.8777642","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777642","url":null,"abstract":"As the Internet has expanded in India over the last couple of decades, the challenge of providing security to the network is a major issue of concern. Network security consists of policies adopted by the user and the practice of securing and monitoring the network infrastructure from any unauthorized source of networks. Network security is used in both private and public networks of India for communications and transactions. In the last few years, both the public and private networks of India have faced major network attacks from unauthorized networks. In this paper we will study the network infrastructure and policies of India and the types of attacks that India faces in the security of the network, also we will suggest the latest technologies that India must adopt for making its network security infrastructure stronger.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Pre Disaster Management Using ICT Technology 利用信息通信技术进行灾前管理
Hemlata Dalmia, Ch V S S Nikil, S. Rani, Sandeep Kumar
{"title":"Pre Disaster Management Using ICT Technology","authors":"Hemlata Dalmia, Ch V S S Nikil, S. Rani, Sandeep Kumar","doi":"10.1109/CCAA.2018.8777699","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777699","url":null,"abstract":"A good saying “Precaution is better than cure”. For emergency situations, the victims can be cautioned prior to the disaster occurs. And the emergency never comes with a prior notice. In this paper, ICT as a new technology in disaster management &Information Technology in Emergency Preparedness and Response is proposed. Disaster preparedness and awareness is the only effective way of mitigating the impact of future disasters. The development in the field of information and communication technology can help a great deal in the planning and implementation of disaster mitigation schemes.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparision Study on Various Face Detection Techniques 各种人脸检测技术的比较研究
Kone Srikrishnaswetha, Sandeep Kumar, P. Johri
{"title":"Comparision Study on Various Face Detection Techniques","authors":"Kone Srikrishnaswetha, Sandeep Kumar, P. Johri","doi":"10.1109/CCAA.2018.8777656","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777656","url":null,"abstract":"Nowadays research has been developed by many security facilities such as fingerprint, palm biometric and different biometrics. This information contains about comparisons of face detection techniques, which are very useful for identifying the people in any situation. The face biometrics is more secured because of its unique characteristics which gives advantages over other biometrics i.e. palm and fingerprint. In this paper, we discussed various existing techniques based on their accuracy on different kind of databases.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme 一种新的抗肩冲浪图形认证方案
M. Siddiqui, M. S. Umar, M. Siddiqui
{"title":"A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme","authors":"M. Siddiqui, M. S. Umar, M. Siddiqui","doi":"10.1109/CCAA.2018.8777630","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777630","url":null,"abstract":"In today’s fast-paced world of computers, where every information is transforming into digital form, the user authentication has become a major challenge. To ensure the information access to genuine user and keeping the unauthorized users/intruders at bay, some authentication mechanism is required. The most used method of user authentication is the login-password system. In this paper, a novel graphical user authentication scheme has been proposed. This scheme is a hybrid scheme which makes the use of images along with the text password. The proposed scheme does not require any sophisticated hardware and can be used as an extra level of security.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114916882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Wellness Sensor Network for modeling Activity of Daily Livings – Proposal and Off-Line Preliminary Analysis 用于日常生活活动建模的健康传感器网络-建议和离线初步分析
H. Ghayvat, Sharnil Pandya
{"title":"Wellness Sensor Network for modeling Activity of Daily Livings – Proposal and Off-Line Preliminary Analysis","authors":"H. Ghayvat, Sharnil Pandya","doi":"10.1109/CCAA.2018.8777700","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777700","url":null,"abstract":"The implementation of the smart home system being motivated by technology push rather than demand pull. This impractical approach has disappointed many users especially in term of feasibility and affordability in conjunction with many other issues. The present had developed a practical smart home solution, named wellness protocol. Present research is to extend the work on wellness protocol’s smart home system, to implement in the context of economical dense sensing, targeting to be practically used by an individual and to understand human lifestyle for activity pattern. The system uses large sensory data for training and testing, the oldest dataset of this system comes from the year 2013. In smart aging to generate the behavioral pattern, more the datasets better the accuracy of behavioral pattern recognition and forecasting.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信