{"title":"Application of Machine Learning in Disease Prediction","authors":"Pahulpreet Singh Kohli, Shriya Arora","doi":"10.1109/CCAA.2018.8777449","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777449","url":null,"abstract":"The application of machine learning in the field of medical diagnosis is increasing gradually. This can be contributed primarily to the improvement in the classification and recognition systems used in disease diagnosis which is able to provide data that aids medical experts in early detection of fatal diseases and therefore, increase the survival rate of patients significantly. In this paper, we apply different classification algorithms, each with its own advantage on three separate databases of disease (Heart, Breast cancer, Diabetes) available in UCI repository for disease prediction. The feature selection for each dataset was accomplished by backward modeling using the p-value test. The results of the study strengthen the idea of the application of machine learning in early detection of diseases.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134267649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Multisource Data Analysis using soft computing Techniques","authors":"S. A. Ansari, Aasim Zafar","doi":"10.1109/CCAA.2018.8777551","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777551","url":null,"abstract":"Nowadays, there arise a tremendous increase in the amount of data or we can say the data coming from multiple sources gather to form huge data. There are various techniques used in soft computing for Multi-Source Data analysis and its technological advancements. This paper, describes an overview of multisource data analytics, its application, advantages, and limitations and few models have reviewed with their objective, merits and so on. Moreover, there are various issues in existing storage techniques and improvements in technology. Since the existing and traditional technologies have their own issues to manage huge data, so advance technologies have been derived to manage them and to derive useful insights. Further, few research issues and future directives are presented in this paper.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126573847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Reviewers Assignment to a Research Paper Based on Allied References and Publications Weight","authors":"T. Mahmud, B. M. M. Hossain, D. Ara","doi":"10.1109/CCAA.2018.8777730","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777730","url":null,"abstract":"Everyday there may be a vast stream of research documents give in to conferences, anthologies, journals, newsletters, annual report, daily paper, and different periodicals. Numerous such publications use unbiased and exterior specialists to survey. This methodology is frequently termed peer review, in addition the assessors are named referees. but it is not always possible to pick out the best referee for reviewing. Moreover, the new fields of research are emerging in every sector and the number of research is increasing dramatically. but, to review all of these papers, every journal assign a short team of referees and maybe they are not expert in all areas. For example, a research paper in the communication technology area should be reviewed by the expert from the same field. So, it is a big challenge to efficiently select the best reviewer or referee for a research paperIn this research work, we proposed and implemented a program or software where, we used a new strategy to select the best reviewers of a research work automatically. As we already know that every research paper contains references in the end of the paper and the references are generally from same area as the paper is. In this work, first of all, we collect the references and count the authors who have at least one paper that belong to the reference section. Once, we collect the authors name, automatically browse the web to extract the research topic keywords. Then again search for finding top researchers in the specific topic field and count their h-index, i10-index and citations for first n author. After then, ranked top n authors based on ranking score and automatically browse their homepage to retrieve emails address. We also check their co-authors and colleagues from the web and discard them accordingly from the list. The remaining tops n authors (researcher) generally professor and maybe the best referees for reviewing a research paper.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130789417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating Performance of Machine Leaming Techniques used in Opinion Mining","authors":"P. Mishra, Ranjana Rajnish, Pankaj Kumar","doi":"10.1109/CCAA.2018.8777724","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777724","url":null,"abstract":"Sentiment analysis is a computational study used for interaction of humans with the computers. In the task of Opinion Mining computations are done on words and sentences used by individual for expression of their opinions. This computation is done with the help of NLP tools to determine whether the review or opinion expressed is positive, negative or neutral. Binary categorization (Positive, Negative) and Multi class categorization (Positive, Negative and Neutral) are two main text classifications used for analysis. Nowadays Opinion is not limited to an individual, it is also an important aspect for most of the organizations as it helps in intensive response from their customers regarding their product quality or about any services used. Earlier, organizations used to conduct different type of Surveys, Questionnaires in order to improve their quality or services offered. There are two widely used approach used for study of opinion mining which are dictionary based approach and machine learning approach In this paper we provided information about different machine learning approach used for task of Opinion Mining, performance overview of various approaches used, metrics used to measure opinion mining efficiency.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131090446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High frequency FPAA Design using OTA in 45nm CMOS Technology","authors":"Tarab Ansari, M. Y. Yasin","doi":"10.1109/CCAA.2018.8777611","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777611","url":null,"abstract":"This paper aims at developing a modified yet general purpose FPAA CAB (configurable analog block) architecture which is dedicated to analog signal processing applications, based on OTA (operational transconductance amplifier). The OTA is a low voltage, low power and wide bandwidthcurrent mode device which can allow high frequency operation with an ease of stability. OTA has already established as a convenient analog device which usually simplifies circuit designs. The CAB design is aimed at aimed at achieving a wider range of functions by local programming facilities available. A CAB may contain one or more active devices and a set of switches. Here we concentrate on the design of a two OTA-CAB. The OTA is realized in 45nm bulk CMOS adopting a simple architecture, and biased by ±1V sources. HSPICE is used for simulation work. Theresults are quite satisfactory and are presented.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133427609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Security: A Major Challenge in India","authors":"Shivansh Sharma, Mukul Khadke","doi":"10.1109/CCAA.2018.8777642","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777642","url":null,"abstract":"As the Internet has expanded in India over the last couple of decades, the challenge of providing security to the network is a major issue of concern. Network security consists of policies adopted by the user and the practice of securing and monitoring the network infrastructure from any unauthorized source of networks. Network security is used in both private and public networks of India for communications and transactions. In the last few years, both the public and private networks of India have faced major network attacks from unauthorized networks. In this paper we will study the network infrastructure and policies of India and the types of attacks that India faces in the security of the network, also we will suggest the latest technologies that India must adopt for making its network security infrastructure stronger.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132283163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hemlata Dalmia, Ch V S S Nikil, S. Rani, Sandeep Kumar
{"title":"Pre Disaster Management Using ICT Technology","authors":"Hemlata Dalmia, Ch V S S Nikil, S. Rani, Sandeep Kumar","doi":"10.1109/CCAA.2018.8777699","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777699","url":null,"abstract":"A good saying “Precaution is better than cure”. For emergency situations, the victims can be cautioned prior to the disaster occurs. And the emergency never comes with a prior notice. In this paper, ICT as a new technology in disaster management &Information Technology in Emergency Preparedness and Response is proposed. Disaster preparedness and awareness is the only effective way of mitigating the impact of future disasters. The development in the field of information and communication technology can help a great deal in the planning and implementation of disaster mitigation schemes.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131671269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparision Study on Various Face Detection Techniques","authors":"Kone Srikrishnaswetha, Sandeep Kumar, P. Johri","doi":"10.1109/CCAA.2018.8777656","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777656","url":null,"abstract":"Nowadays research has been developed by many security facilities such as fingerprint, palm biometric and different biometrics. This information contains about comparisons of face detection techniques, which are very useful for identifying the people in any situation. The face biometrics is more secured because of its unique characteristics which gives advantages over other biometrics i.e. palm and fingerprint. In this paper, we discussed various existing techniques based on their accuracy on different kind of databases.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114850691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Shoulder-Surfing Resistant Graphical Authentication Scheme","authors":"M. Siddiqui, M. S. Umar, M. Siddiqui","doi":"10.1109/CCAA.2018.8777630","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777630","url":null,"abstract":"In today’s fast-paced world of computers, where every information is transforming into digital form, the user authentication has become a major challenge. To ensure the information access to genuine user and keeping the unauthorized users/intruders at bay, some authentication mechanism is required. The most used method of user authentication is the login-password system. In this paper, a novel graphical user authentication scheme has been proposed. This scheme is a hybrid scheme which makes the use of images along with the text password. The proposed scheme does not require any sophisticated hardware and can be used as an extra level of security.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114916882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wellness Sensor Network for modeling Activity of Daily Livings – Proposal and Off-Line Preliminary Analysis","authors":"H. Ghayvat, Sharnil Pandya","doi":"10.1109/CCAA.2018.8777700","DOIUrl":"https://doi.org/10.1109/CCAA.2018.8777700","url":null,"abstract":"The implementation of the smart home system being motivated by technology push rather than demand pull. This impractical approach has disappointed many users especially in term of feasibility and affordability in conjunction with many other issues. The present had developed a practical smart home solution, named wellness protocol. Present research is to extend the work on wellness protocol’s smart home system, to implement in the context of economical dense sensing, targeting to be practically used by an individual and to understand human lifestyle for activity pattern. The system uses large sensory data for training and testing, the oldest dataset of this system comes from the year 2013. In smart aging to generate the behavioral pattern, more the datasets better the accuracy of behavioral pattern recognition and forecasting.","PeriodicalId":334473,"journal":{"name":"2018 4th International Conference on Computing Communication and Automation (ICCCA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114927126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}