Int. J. Next Gener. Comput.最新文献

筛选
英文 中文
An Intelligent Healthcare System for Automated Alzheimer's Disease Prediction and Personalized Care 用于阿尔茨海默病自动预测和个性化护理的智能医疗保健系统
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.762
Tawseef Ayoub Shaikh, Waseem Ahmad Mir, M. Izharuddin, Rashid Ali
{"title":"An Intelligent Healthcare System for Automated Alzheimer's Disease Prediction and Personalized Care","authors":"Tawseef Ayoub Shaikh, Waseem Ahmad Mir, M. Izharuddin, Rashid Ali","doi":"10.47164/IJNGC.V12I2.762","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.762","url":null,"abstract":"Alzheimer’s disease has posed the greatest threat among all the different types of neurodegenerative problems as it has assaulted humankind at quick pace than the others. Its manual revelation has become clinically insignificant because of the in expertise, high rate of false positives (FP) and false-negatives (FN). To reduce the false positive/ false negative rate, this paper frames a quick, affordable, and objective judgement of AD with a novel data mining method coalescing a global Maximum Relevance and Minimum Redundancy (MRMR) based ?lter heuristic with a globally optimised wrapper heuristic GANNIGMA with the intention of minimalising the consequence of an imbalanced healthcare dataset. The optimal feature subset yielding the best performance are utilised for model training of Decision Tree, k-NN, and SVM algorithms. The trial results on benchmark ADNI dataset using the proposed model displayed the Decision Tree attains TP rate of 0.778, and AUC of 0.798, k-NN acquires 0.764 TP Rate and 0.784 AUC, and SVM attains 0.997 TP Rate, and 0.996 as AUC. The results are far healthier than the separate results of these algorithms attained on the same dataset with fewer optimal feature subsets.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"52 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121013180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A proposed approach for Digital Identity management using Self Sovereign Identity 一种使用自我主权身份进行数字身份管理的建议方法
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.767
Shailaja Nitin Lohar, S. Babar, P. Mahalle
{"title":"A proposed approach for Digital Identity management using Self Sovereign Identity","authors":"Shailaja Nitin Lohar, S. Babar, P. Mahalle","doi":"10.47164/IJNGC.V12I2.767","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.767","url":null,"abstract":"Identity of a virtual entity must be as secure just like it is in the real world. These virtual entities are the \u0000numerous users who access the internet-based services. These services always need some digital identication to \u0000comply with the user's request. More number of users are opting for online services daily for variety of applications. \u0000The existing digital identity management systems take care of this process. A single sign on identity management \u0000system allows same credential to access dierent systems whereas user centric where the user's identication is \u0000stored on a secured device owned by the user. But none of the systems are giving user, the complete control of their \u0000digital identity. Self-sovereign identity management system is one of the promising identity management system \u0000which will make the user, the complete owner of his identity by eliminating the centralized approach of managing \u0000the identity. This paper gives an overview of existing identity management systems based on self-sovereign identity \u0000and a proposed approach for secure identity management using self-sovereign identity management system.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130607253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of Changing Distances for Extracting Image Information for Error Reduction of Mouth Features 改变距离对图像信息提取的影响,以减少嘴部特征的误差
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.763
Aparna Joshi, Vinayak D. Chavan, Parag Ravikant Kaveri
{"title":"Effect of Changing Distances for Extracting Image Information for Error Reduction of Mouth Features","authors":"Aparna Joshi, Vinayak D. Chavan, Parag Ravikant Kaveri","doi":"10.47164/IJNGC.V12I2.763","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.763","url":null,"abstract":"Verity of information of the image in the form of image features is used in different application like pattern recognition, feature matching, image segmentation, image fusion, video processing, visual surveillance, medical diagnosis, traffic safety monitoring, remote sensing, human computer interaction, etc. Image is defined precisely and uniquely with the help of features which are useful in classifying and recognition of images. Extracting information from features of the image is a complex and diverse phenomenon. Retrieval of correct image information becomes very difficult for error reduction in the image processing. Lighting effect, zoom, distance, position, color model selected, angle of the object from camera etc. are considerable factors that affects the accuracy of feature \u0000detection from the image. In this paper we studied and experimentation using Viola Jones algorithm are performed on distance and zoom for object detection for mouth feature detection on primary face database which is captured by smartphone. Analysis of the result concludes that as distance between object and camera increases, false negatives (Type II error) increase in mouth feature detection and it goes increasingly if the camera goes far away from object. These false negatives can be reduced by increasing zoom of the camera to achieve the accuracy and improve the mouth feature detection.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"306 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced video analysis framework for action detection using deep learning 增强视频分析框架的动作检测使用深度学习
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.768
Saylee Begampure, P. Jadhav
{"title":"Enhanced video analysis framework for action detection using deep learning","authors":"Saylee Begampure, P. Jadhav","doi":"10.47164/IJNGC.V12I2.768","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.768","url":null,"abstract":"Video Analytics analyzes the video content and adds brains to the eyes which means analytics to the camera. It extracts contents from the video by monitoring the video in real-time. Normal and Abnormal human activity detection using deep learning models is a challenging task in computer vision. The detection of the same will help in detecting crime scenes which will help in preventing treacherous actions Proposed method focuses on classifying normal activities for humans in real-time scenarios. The pre-processing technique for redundant frame detection, elimination, and training the model e?ciently using Convolutional Neural Network for classifying the activities is the main research contribution. The proposed method shows improvement in accuracy as compared to the reference method which can be further implemented for on edge embedded platforms for real-time applications","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131787228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A systematic review of Machine learning techniques for Heart disease prediction 心脏疾病预测的机器学习技术系统综述
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.783
Shivganga Udhan, B. Patil
{"title":"A systematic review of Machine learning techniques for Heart disease prediction","authors":"Shivganga Udhan, B. Patil","doi":"10.47164/IJNGC.V12I2.783","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.783","url":null,"abstract":"Machine learning includes articial intelligence, which is implemented to solve a number of data science problems. The prediction of outcomes based on existing data is a common machine learning application.Different data mining strategies for the prediction of heart disease have been proposed with varying degrees of effectiveness and accuracy. In this paper, author provide an in-depth literature survey on systems for predicting risk of heart disease.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121343833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hassle - Free and Secure e-KYC System Using Distributed Ledger Technology 使用分布式账本技术的无麻烦和安全的电子kyc系统
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.754
Bharti Pralhad Rankhambe, H. Khanuja
{"title":"Hassle - Free and Secure e-KYC System Using Distributed Ledger Technology","authors":"Bharti Pralhad Rankhambe, H. Khanuja","doi":"10.47164/IJNGC.V12I2.754","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.754","url":null,"abstract":"The blockchain technology is a prominent, reliable and secure technology which is getting into almost every industry. The fundamental essence of blockchain technology offers features like transparency, decentralization, immutability, resilience, disintermediation, collaboration, security and trust. In this paper, we have focused on \u0000how the present banking industry, especially the KYC document verification process, can be impacted after using blockchain to store and track the records. The current day banking KYC processes are highly reliable on paper which is an outworn process. It is utmost essential today to have an upgraded KYC system, embedded with a reliable and trustable technology like blockchain, that could withstand frauds, and resolve the scalability and security issues. In the proposed system, the use of blockchain in KYC process restricts the presence of middlemen. This results in a reduction of fraudulent activities and errors that may occur when there are a lot of manual activities involved. Furthermore, the document verification process is only conducted only one time, no matter what is the number of financial institutions with which the customer is working with. This system provides more efficiency, reduction in costs, enhanced customer rendezvous and end-to-end transparency during the process of integrating the customer documents into the bank database. \u0000Keywords: Blockchain, KYC, Smart Contracts, Decentralization, Security","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133066143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Smart Cervix Monitoring of Pregnant Women 智能宫颈监测孕妇
Int. J. Next Gener. Comput. Pub Date : 2021-04-27 DOI: 10.47164/IJNGC.V12I2.785
S. More, Dipti D. Patil
{"title":"Smart Cervix Monitoring of Pregnant Women","authors":"S. More, Dipti D. Patil","doi":"10.47164/IJNGC.V12I2.785","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I2.785","url":null,"abstract":"Health monitoring can be achieved by using different sensors for measuring the health parameters like heart rate, blood pressure, baby's position, sleeping posture, number of steps, pulse, body temperature change. The problems such as preterm birth, cesarean deliveries, infections, sudden infant death syndrome, false alarms can be avoided using this system. The changes during pregnancy are position shifts, density changes, cervical mucus changes & cervical length becomes measurable and during labor, cervix changes include stages such as effacement, dilation, the baby moves through the birth canal, after birth and recovery. The cervix monitoring can be done by using dilation sensors where the fetal movements and uterine contractions can be measured which is useful for avoiding the risk of cesarean deliveries, preterm birth, or preterm labor. During labor, it is also very important to check the position of fetal head for birth, so deep neural networks are used for measuring the fetal head biometric parameters such as head circumference and biparietal diameter. Health monitoring sensors can be fitted in the wearable devices, so it becomes easy for pregnant women, her family and doctors to continuously track the report of her for avoiding any unnecessary complications.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130917025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Orientation from Code-mixed Social Media Data 来自代码混合社交媒体数据的情感取向
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.683
K. Asnani
{"title":"Sentiment Orientation from Code-mixed Social Media Data","authors":"K. Asnani","doi":"10.47164/IJNGC.V12I1.683","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.683","url":null,"abstract":"Collecting and evaluating data is becoming an effectively admissible challenge in the highly connected world. In the 21st century, with the advent of social networks getting popular, the social media information is getting archived at alarming rates. The use of local language in informal fashion is very common on social media platform. In natural language processing, Sentiment Analysis (SA) is a specialized process of determining user orientation from opinion data floating on social web. Code-mixed social media data in specific is challenging to process, due to mixing of varied languages used to portray the linguistic efficiency. In this paper, we propose a model called Code-mixed Sentiment Analyzer (cmSentiAnalyzer) to derive sentiment orientation from code-mixed sentences. Our proposed model has used language features across code-mixed languages to map the words occurring in different languages to a common space. Our experiments reveal that cmSentiAnalyzer outperforms baseline approaches in sentiment analysis for code-mixed text by 2% in accuracy and 89% of average precision.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125358414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DNA Based Computational Algorithm for Timetable Problem 基于DNA的时间表问题计算算法
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.681
Kuntala Boruah, M. K. Pathak, R. Sarmah
{"title":"A DNA Based Computational Algorithm for Timetable Problem","authors":"Kuntala Boruah, M. K. Pathak, R. Sarmah","doi":"10.47164/IJNGC.V12I1.681","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.681","url":null,"abstract":"Deoxyribonucleic acid (DNA) computing believed to have the potential to offer an effective approach to reduce any NP problem from exponential to polynomial time. In this paper a theoretical proof of concept algorithm is proposed to address timetable scheduling problem which is a classical NP complete problem. The efficiency of this algorithm owes to the parallelism property of DNA. Information relating to resources like the set of classes, teachers, time slots and subjects are encoded in the form of unique DNA sequences. Initially all the possible(valid as well as invalid) allocations are generated and in each step the illegal sequences are discarded until finally left out with one or more potential solutions which satisfies the given constraints. The time complexity of the proposed algorithm is independent of the size of the problem. Moreover the proposed algorithm can be applied to solve several other scheduling problems with necessary modifications.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"47 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114002764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative study on load balancing and service broker algorithms in Cloud computing using cloud analyst tool 利用云分析工具对云计算中的负载均衡和服务代理算法进行比较研究
Int. J. Next Gener. Comput. Pub Date : 2021-04-03 DOI: 10.47164/IJNGC.V12I1.707
P. Payaswini
{"title":"Comparative study on load balancing and service broker algorithms in Cloud computing using cloud analyst tool","authors":"P. Payaswini","doi":"10.47164/IJNGC.V12I1.707","DOIUrl":"https://doi.org/10.47164/IJNGC.V12I1.707","url":null,"abstract":"In recent years, there has been a large increase in the number of cloud users as it provides an easy and flexible way to manage user data and applications. With the emerging technologies such as the Internet of things, cloud computing being the backbone, the load on the cloud servers has increased. The cloud data centers consist of servers hosting multiple virtual machines. One of the main challenges in cloud computing is to efficiently distribute the user service requests to different virtual machines in order to reduce the request processing time and to provide more user satisfaction. Load balancing algorithms basically address two issues: the selection of the data center and the distribution of the load on different virtual machines. Data center selection is handled by service broker policy and distribution of the load on virtual machines handled by VM load balancer. Load balancing techniques play a vital role in minimizing the response time and maximizing throughput and also ensure scalability and reliability. Hence, it has become an important research topic in the field of cloud computing. Cloud-analyst, a java based open source toolkit, is useful to simulate and analyze the load balancing algorithms. In this paper, a comparative study on different service broker policies and VM load balancing algorithms for cloud computing is presented with simulation results. The aim of this comparative study is to find the performance of different service broker policies and the load balancing algorithm tested on different scenarios.","PeriodicalId":351421,"journal":{"name":"Int. J. Next Gener. Comput.","volume":"35 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130748748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信