2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

筛选
英文 中文
Classification Techniques Used in Sentiment Analysis & Prediction of Heart Disease using Data Mining Techniques: Review 使用数据挖掘技术进行情感分析和心脏病预测的分类技术综述
Rahul, Himanshu Bansal, Monika
{"title":"Classification Techniques Used in Sentiment Analysis & Prediction of Heart Disease using Data Mining Techniques: Review","authors":"Rahul, Himanshu Bansal, Monika","doi":"10.1109/ICICT46931.2019.8977707","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977707","url":null,"abstract":"Sentiment analysis uses data mining methods to extract information and data from the web through natural language processing. This consists of emotion artificial intelligent and text analysis. It basically helps in finding out the polarity of word data which is categorized into negative, positive and neutral. Sentiment extraction from data sources is a difficult task because some data sources may have unstructured format of data. In this review paper, we tried to summarize a number of classification techniques used in sentiment analysis stating some of their advantages and disadvantages, performance and their accuracy.In this paper, the various data mining techniques used for the prediction of the heart disease are discussed. With the help of data mining, it is very easy task to make expert system where this plays an important role in the prediction of the health related problems. This helps in solving threat of heart related issues also. Data mining is the extraction of hidden predictive information from large databases which creates enhanced knowledge in the field of pharmaceutical science which helps to predict heart disease. Various data mining techniques are applied here. It produces fast, straightforward assessment of the distinct prediction prototype with the help of Artificial Intelligent techniques.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122539009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Two Hand Indian Sign Language dataset for benchmarking classification models of Machine Learning 用于机器学习基准分类模型的双手印度手语数据集
Leela Surya Teja Mangamuri, Lakshay Jain, Abhishek Sharmay
{"title":"Two Hand Indian Sign Language dataset for benchmarking classification models of Machine Learning","authors":"Leela Surya Teja Mangamuri, Lakshay Jain, Abhishek Sharmay","doi":"10.1109/ICICT46931.2019.8977713","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977713","url":null,"abstract":"Currently, a lot of research is going in the field of sign language recognition. Recognition of gesture poses a serious challenge to the system due to inconsistent illuminance and background conditions, different skin colours of the hand and each person has his/her own trait of making the gesture. It gets even more difficult with Two Hand Indian Sign Language (THISL) due to the representation of gesture with both hands. There is no proper THISL dataset available to the public. So, we present a THISL dataset consisting of 26 gestures each representing the English alphabet. This dataset consists of 50x50 images of total 9100 in which each gesture is made of 350 images and it is divided into two parts, training and test. The training set consists of 7020 images and the test set consists of 2080 images. In this paper, THISL dataset is validated on various classification models of machine learning and overall accuracy of 91.72% is achieved. This dataset serves a very good purpose for benchmarking machine learning algorithms and it is freely available to people on request to authors.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122734021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Algorithm Based on Stockwell Transform for Processing of Communication Signal to Detect Superimposed Harmonics and Transient Disturbances 基于Stockwell变换的通信信号处理中叠加谐波和瞬态干扰检测算法
Monika Mathur, Vivek Upadhyaya, Rahul Srivastava
{"title":"Algorithm Based on Stockwell Transform for Processing of Communication Signal to Detect Superimposed Harmonics and Transient Disturbances","authors":"Monika Mathur, Vivek Upadhyaya, Rahul Srivastava","doi":"10.1109/ICICT46931.2019.8977642","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977642","url":null,"abstract":"An algorithm based on Stockwell Transform focused on processing of communication signals to detect harmonics and transient disturbances superimposed on the signals is presented in this paper. These disturbances are being superimposed on the signals in the communication channel or at the transmitter or the receiver stations. Investigated transient disturbances include impulsive transient and oscillatory transients. Communication signals incorporating harmonics or transient disturbance are decomposed with the help of Stockwell Transform and S-matrix is derived. A summation of absolute values curve, median curve and maximum absolute values plot are proposed to detect disturbances. These curves are obtained from S-matrix. On comparing these plots of signal having harmonics or transient disturbances with respective curves of pure sinusoidal communication signal, superimposed harmonics or transient disturbance have been detected successfully. Effectiveness of the proposed approach is established using the MATLAB software.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132605663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Acquiring and Analyzing Movement Detection through Image Granulation 基于图像粒化的运动检测获取与分析
Neelam Rawat, J. Sodhi, R. Tyagi
{"title":"Acquiring and Analyzing Movement Detection through Image Granulation","authors":"Neelam Rawat, J. Sodhi, R. Tyagi","doi":"10.1109/ICICT46931.2019.8977703","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977703","url":null,"abstract":"Detection of moving object is a challenging task for any video surveillance. Generally, a video surveillance consists of three levels of processing – moving object extraction, recognition and tracking – that further process for decision of the corresponding activities. As pre- and post-processing of the video might be necessary to improve the detection of moving objects, we have proposed a method that uses the coordinates of the boundary of an object with a thick white line. This paper basically shows the results through which we specify the initial search condition, the connectivity and how many pixels should be returned and the direction in which to perform the search. Further traces the exterior boundaries of objects.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115528150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study Indian Electoral Reforms in Indian Context 印度语境下的印度选举改革比较研究
Jayesh R Solanki, Divykant Meva
{"title":"Comparative Study Indian Electoral Reforms in Indian Context","authors":"Jayesh R Solanki, Divykant Meva","doi":"10.1109/ICICT46931.2019.8977657","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977657","url":null,"abstract":"The world’s largest democracy has adopted electoral reforms in Assembly as well as Parliamentary elections. Electronic Voting Machine (EVM) has replaced the paper ballot system. However, there are serious concerns being raised with regards to the credibility and reliability of the EVM’s. This resulted in Voter Verified Paper Audit Trail (VVPAT) being attached to the EVM, which was found to be unverifiable and non-auditable. The primary focus of this paper is to provide a comparison between Ballot Paper Voting System and EVM highlighting the various challenges of the existing electoral system. This paper provides an insight into Block chain technology, its impact and revolution it can bring in the field of Electoral reforms in India. The comparison parameters like Time, Cost, Transparency, Risk factor, Verification/Auditing process, Authentication etc. are considered for evaluation of the different methodology discussed.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128927448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Leukemia Diagnosis using Computational Intelligence 利用计算智能诊断白血病
Sunita Chand, V. P. Vishwakarma
{"title":"Leukemia Diagnosis using Computational Intelligence","authors":"Sunita Chand, V. P. Vishwakarma","doi":"10.1109/ICICT46931.2019.8977709","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977709","url":null,"abstract":"Leukemia is a fatal disease that is commonly found in children and also in adults above 55 years of age. It is also known as cancer of blood or bone marrow. [1] It can be categorized into myelogenous leukemia or lymphocytic on the basis of the cells affected by the disease. As the symptoms of the disease are very common like fever, fatigue and body ache, it is not easily detectable at early stages which prove fatal at later stages. So diagnosing it at early stage is crucial for the better prognosis of disease. The paper presents a comparative analysis of extensively used machine learning (ML) algorithm SVM and the relatively new ML algorithm i.e., extreme learning machine for predicting Leukemia. The classification is based on the segmentation of blood smear images publically available dataset ALL-IDB1. The results shows that ELM with an accuracy of 92.2448% outperforms SVM with accuracy 86.3636%.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128928205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hiding Text In Color Image Using YCbCr Color Model: An Image Steganography approach 使用YCbCr颜色模型隐藏彩色图像中的文本:一种图像隐写方法
Deepak Kumar
{"title":"Hiding Text In Color Image Using YCbCr Color Model: An Image Steganography approach","authors":"Deepak Kumar","doi":"10.1109/ICICT46931.2019.8977644","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977644","url":null,"abstract":"For the security related issues over internet two main techniques are used first is Cryptography and second is Steganography. Both are basically used for data security. Cryptography transforms the data from one form to another form while steganography hide data in an image in such a way that it cannot be detected by human eyes. This paper introduces an image steganography method using YCbCr color model based on Least Significant Bit (LSB). In this paper proposed method convert the image from RGB to YCbCr color space then secret data is hidden inside YCbCr color space using least significant bit and after hiding the data, convert it back to RGB color space. The proposed technique is evaluated by objective analysis. Different techniques of cryptography are compared using Mean Square Error (MSE) and Peak Signal to Noise Ratio (PSNR). It is observed that the proposed method has high PSNR and low MSE which shows the proposed approach is very efficient to hide data in an image","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127927181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Approach for Predicting Drug Target Interactions 预测药物靶标相互作用的改进方法
Kanica Sachdev, M. Gupta
{"title":"An Improved Approach for Predicting Drug Target Interactions","authors":"Kanica Sachdev, M. Gupta","doi":"10.1109/ICICT46931.2019.8977697","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977697","url":null,"abstract":"The identification of drug protein associations assists the exploration of novel drugs, drug repurposing and drug side effect identification. The experimental evaluation of these interactions requires extensive capital and money. Thus, in-silico computational methods are being developed to aid the interaction prediction. These techniques have been broadly grouped into similarity based approaches and feature based approaches. This paper proposes a novel feature based approach to identify the probable drug protein communications. The method is based on Support Vector Machine classifier. Support Vector Machines have shown a satisfactory performance in many applications related to the pharmacology domain. To further improve the accuracy and reduce the computational complexity, dimensionality reduction by PCA has been proposed. The proposed technique achieves an AUC score of 0.822. The method has been compared to various other state of the art methods based on their respective AUC scores. The comparison has shown that the proposed approach has a better performance in contrast to the other techniques.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"407 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121005750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Resampling Techniques under Noisy Imbalanced Datasets 噪声不平衡数据下重采样技术的比较分析
Arjun Puri, M. Gupta
{"title":"Comparative Analysis of Resampling Techniques under Noisy Imbalanced Datasets","authors":"Arjun Puri, M. Gupta","doi":"10.1109/ICICT46931.2019.8977650","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977650","url":null,"abstract":"Classification is mainly challenged by the problems in the dataset. When dataset have uneven distribution of data among classes, then class imbalance problem arise. Class imbalance with noise creates immense effect on classification of instances of classes. The main focus of this article is to provide the detail comparative analysis of seven Resampling techniques under 16 noisy imbalanced datasets using C4.5 classifier. The performance evaluation is done by using AUC, F1 score, G-mean. Based on the evaluation, article inferred that SMOTE-ENN perform better than rest of resampling techniques.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121502388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Defect Segmentation in Surfaces using Deep Learning 基于深度学习的曲面缺陷分割
Somit Mittal, Chahes Chopra, A. Trivedi, P. Chanak
{"title":"Defect Segmentation in Surfaces using Deep Learning","authors":"Somit Mittal, Chahes Chopra, A. Trivedi, P. Chanak","doi":"10.1109/ICICT46931.2019.8977696","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977696","url":null,"abstract":"Surface inspection is one of the most challenging tasks in the manufacturing industry. Defect classification and segmentation are the two main tasks associated with surface inspection. The major challenge lies in the collection of the dataset as it is a very costly procedure and the occurrences of defected samples are very less as compared to non defective samples. Therefore, it becomes important to devise a method that can leverage the limited data available and can also handle the class imbalance between the defected and non defected samples. In this paper, a deep learning approach is proposed that uses pertained networks to perform defect segmentation on industrial surfaces. The deep learning approach consists of an encoder and decoder architecture where on the encoder side, VGG is used with pertained imagenet weights for faster training of the model and on the decoder side, the UNet decoder model is used. The evaluation of the approach shows that the proposed method can be used for surface inspection in various industrial applications.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126800615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信