Neelam Joshi, K. Joshi, Manuj Mishra, Ravi Ray Chaoudhari
{"title":"MACHINE LEARNING APPLICATIONS IN MEDICAL DIAGNOSIS : A REVIEW","authors":"Neelam Joshi, K. Joshi, Manuj Mishra, Ravi Ray Chaoudhari","doi":"10.51767/jc1313","DOIUrl":"https://doi.org/10.51767/jc1313","url":null,"abstract":"Artificial Intelligence and Machine Learning are the two important techniques in the current era, playing important role in almost each and every field of our daily life. These techniques are preferred because of their accuracy and predictability. Nowadays, Machine Learning is getting importance in Medical fields also. Due to the result accuracy, Machine Learning Techniques are used in even critical medical diagnosis application. These techniques are used in prediction of various types of cancers such as brain cancer, Lung cancer, Breast cancer, in Brain MRI, in CT scan and various critical diagnoses. In this paper a review is provided on the applications of Machine Learning techniques in various medical diagnosis applications. As a future work, we will implement some approach for medical diagnosis using ML Techniques.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132704671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Brindha, K. Deepika, N. Aruna, K.S. Harini, S. Prince SahayaBrighty
{"title":"VIZHI, An AI Assistant","authors":"M. Brindha, K. Deepika, N. Aruna, K.S. Harini, S. Prince SahayaBrighty","doi":"10.51767/jc1307","DOIUrl":"https://doi.org/10.51767/jc1307","url":null,"abstract":"The main aim of artificial intelligence is to allowassignation with electronic devices and computer in a simple and practical way. Personal assistant which can do any task just by listening a phrase is trending now a days. A virtual assistant is able to understand and give reply to human commands using synthesized voices. Many organization have created Virtual Personal Assistants (VPAs) based on their requirement and domains, such as Cortina which is made by microst,Siri which is made by apple, Alexa by amazon, and Google Assistant by Google, using dialogue systems technology. User can give commands to perform task such as play the music , as well as can do the basic tasks like messages, to-do lists, and so onHowever, the generally works online but our research work can do the work in both mode online as well as offline. So here we introduce Vizhi (An AI Assistant) with Voice Commands Intelligence, who receives the user command in the form of voice or text then visit process it and give the output such as the task which is said to be completed","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134052029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART HOME MONITORING SYSTEM USING ESP32 AND IOT","authors":"M. Rahiman, D. Manohar","doi":"10.51767/jc1308","DOIUrl":"https://doi.org/10.51767/jc1308","url":null,"abstract":"In the today’s world the security of the home is the prime concern. The traditional methods of securing our home are very easy to break and lead to theft. To protect the home, we need to install the costly security system. To overcome this problem, we are presenting IoT based solution where we can setup a smart home security system.This chapter covers the installation of our own home security monitoring system. The system is built with Internet of Things modules and an ESP32 microcontroller. The system`s design, hardware components, system integration, security solutions, communication, data collection and monitoring, and cost quantification for the system`s production and deployment are all covered in this chapter. The suggested system safeguards a home by detecting an intruder, activating an alarm, documenting the event with camera photos, and transferring the information to the owner`s smart phone.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126906074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STUDENT PLACEMENT PREDICTION","authors":"PujhaShree S.B, Lekhasree R, Logasri P, Darling Jemima.D","doi":"10.51767/jc1303","DOIUrl":"https://doi.org/10.51767/jc1303","url":null,"abstract":"In an educational institution, the most important objective is the placement of students. For each and every student, the placement part is a very important one in college life because for some sets of students it is the future. The prediction of students will not be 100% accurate but it depends how the students perform in every part of the placement. So, to predict the placement package chance of current students, we can analyze the previous year’s students data. The data has been collected from the institution and certain pre-processing techniques are applied to the models. Different algorithms have different accuracy. Depending on the type of issue and dataset to be solved, different algorithms have varied levels of accuracy. As a result, we decided to assess the accuracy levels of three methods, namely Logistic Regression, Decision Tree Classifier, and Random Forest Classifier, with respect to our challenge and dataset. The efficiency/accuracy of each model is visualized and tested and based on the performance analysis, the best model results are declared.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126087644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPACT OF BLOCK CHAIN IN COMMUNICATION AND NETWORK","authors":"Anamika Ahirwar, S. Pandey","doi":"10.51767/jc1208","DOIUrl":"https://doi.org/10.51767/jc1208","url":null,"abstract":"A block chain network is a technical infrastructure that provides ledger and smart contract (chain code) services to applications. Primarily, smart contracts are used to generate transactions which are subsequently distributed to every peer node in the network where they are immutably recorded on their copy of the ledger. The users of applications might be end users using client applications or block chain network administrators. First and foremost, block chain is a public electronic ledger built around a P2P system that can be openly shared among disparate users to create an unchangeable record of transactions, each time-stamped and linked to the previous one. Every time a set of transactions is added, that data becomes another block in the chain.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129392027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SIGNIFICANT ROLE OF AI & ML TECHNIQUES USED IN IMPROVEMENT OF CYBER SECURITY","authors":"Muskan Kumari","doi":"10.51767/jc1209","DOIUrl":"https://doi.org/10.51767/jc1209","url":null,"abstract":"Cyber Security has become an arising challenge for business information system in current era. AI (Artificial Intelligence) is broadly utilized in various field, however it is still generally new in cyber security. Nonetheless, the applications in network protection are significant for everybody`s day by day life. In this paper, we present the current status of AI in cyber security field, and afterward portray a few contextual investigations and uses of AI to help the community including engineering managers, teachers, educators, business people, and understudies to more readily comprehend this field, for example, the difficulties and uncertain issues of AI in online protection. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of Cyber Attacks. Cyber security is a vital danger for any business as the quantity of attacks is expanding. Developing of attacks on cyber security is undermining our reality. AI (Artificial Intelligence) and ML (Machine Leaning) can help identify dangers and give proposals to cyber Analyst. Advancement of appropriation of AI/ML applied to cyber security requires banding together of industry, the scholarly community, and government on a worldwide scale. We also discuss future research opportunities associated with the development of AI techniques in the cyber security ?eld across a scope of utilization areas.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130562573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPACT OF CLOUD COMPUTING ON BUSINESS","authors":"Anamika Ahirwar, Anshu Singh Parihar","doi":"10.51767/jc1210","DOIUrl":"https://doi.org/10.51767/jc1210","url":null,"abstract":"Cloud computing is very helpful for a business just because cloud computing helps the small and large business to start a digital business. Due to the rapid growth of computing resources over the past years, cloud computing has been treated as a prominent research field and this technology appeared as a new solution in the IT field. Many businesses including small, medium, and enterprise are migrating to this technology for so many reasons such as availability of computing resources, reduced total cost of ownership, on- demand services, increased revenue, and many more. Cloud Computing offers a number of advantages of cloud migration that motivated business enterprises to adopt this change. Our Prime Minister Mr. Narendra Modi Ji dreams to make a digital India and the cloud could help to make India digital.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"422 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ENHANCED APPROACH FOR SOIL CLASSIFICATION USING BOOSTED C5.0 DECISION TREE ALGORITHM","authors":"Senthil Kumar Seethapathy, C.Naveeth Babu","doi":"10.51767/jc1202","DOIUrl":"https://doi.org/10.51767/jc1202","url":null,"abstract":"Data mining includes the utilization of erudite data analysis tools to discover previously unidentified, suitable patterns and relationships in enormous data sets. Data mining tools can incorporate statistical models, machine learning methods such as neural networks or decision trees, and mathematical algorithms. As a result data mining comprises of more process. This performs analysis and prediction than collecting and managing data. The main objective of data mining is to identify valid, potentially useful, novel and understandable correlations and patterns in existing data. Finding and analyzing useful patterns in data is known by different names (e.g., knowledge extraction, information discovery, information harvesting, data archaeology, and data pattern processing). The term data mining is basically utilized by statisticians, database researchers, and the business communities.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129628926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"AN IMPLEMENTATION OF EFFICIENT PATH SELECTION METHOD FOR SUCCESSFUL DATA TRANSMISSION IN MOBILE AD HOC NETWORKS","authors":"Arjun Jadhaw, Vikrant Sharma","doi":"10.51767/jc1205","DOIUrl":"https://doi.org/10.51767/jc1205","url":null,"abstract":"Routing is a process of forwarding the data from a known source to the destination. In this procedure, the data might travel during some in-between paths, and there exist a required to select the best probable best possible nodes to forward the data. This best selection of nodes will permit to achieve a high presentation in the network. Big amount of worked has been carried out to find the best pathway in the network routing to progress its effectiveness and to eliminate overcrowding problems. A good routing algorithm should be able to find an optimal path and it must be simple. It also must have low overhead, and be robust and stable, converging rapidly, and must remain flexible. Routing in MANET by means of the direct pathway metric is not a sufficient situation to construct high quality pathway, since minimum hop count routing frequently chooses routes that have considerably less capacity than the best pathway that live in the network. In this article, we suggest a mechanism to prefer the routing protocol based on manifold measure like Throughput, PDR, energy expenditure etc. These paths are quite resourceful. Network presentation will be raise by using these paths. The efficiency of our mechanism is illustrated by simulations conducted using network simulator ns-2.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124067079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CONTRIBUTION OF AI TO THE CONSTRUCTION WORLD","authors":"Kanhaiya Kumar, Muskan Kumari","doi":"10.51767/jc1207","DOIUrl":"https://doi.org/10.51767/jc1207","url":null,"abstract":"Artificial intelligence is a department of computer science and information technological know-how, involved in the research, layout, and application of intelligent computer. Conventional techniques for modeling and optimizing complicated structure systems require big amounts of computing assets, and artificial-intelligence-primarily based solutions can frequently provide treasured alternatives for successfully solving problems inside the civil engineering. This paper summarizes currently evolved methods and theories within the growing path for programs of synthetic intelligence in civil engineering, such as evolutionary computation, neural networks, fuzzy systems, professional machine, reasoning, type, and learning, in addition to others like chaos theory, cuckoo seek, firefly algorithm, know-how-based engineering, and simulated annealing. The primary studies tendencies are also talked about in the end. The paper presents an overview of the advances of synthetic intelligence carried out in civil engineering.","PeriodicalId":408370,"journal":{"name":"BSSS Journal of Computer","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131234003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}