{"title":"Automatic Stock Market Prediction using Novel Long Short Term Memory Algorithm compared with Logistic Regression for improved F1 score","authors":"P. Sairam, Logu. K","doi":"10.1109/iciptm54933.2022.9754116","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754116","url":null,"abstract":"This work provides a comparative study of improved F1 score in stock market values using a novel long short term memory algorithm (LSTM) which is compared to Logistic Regression algorithm. Materials and Methods: Novel Long Short Term Memory ($N=10$) and logistic regression algorithm ($N=10$) were iterated to improve F1 score for stock market predicted values. Two algorithms are simulated by varying NLSTM and logistic regression parameters to optimize pH. Sample size is calculated using Gpower 80% for two groups and there are 20 samples used in this work. Results and Discussion: LSTM has notably better accuracy percentage (68.24%) compared to logistic regression accuracy (53.71%) with 0.407 ($p > 0.05$). Conclusion: Long short term memory algorithms help in predicting automatic stock market prices to improve F1 score.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"578-582"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91061851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Virtualization and Cloud Security","authors":"Rahul Rastogi, Nikhil Aggarwal","doi":"10.1109/iciptm54933.2022.9754172","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754172","url":null,"abstract":"Cloud computing is a cutting-edge innovation that will improve the design of applications in terms of elasticity, functionality, and collaborative execution. It is a computer system that mainly depends on the Internet. The most important feature of cloud computing is virtualization, which enables on-site dynamic allocation of academic computing resources or industrial resources. Virtualization can be defined as “forming a virtual version of something, such as a server, desktop, storage device, operating system, or network resource,” according to Wikipedia. The goal of this study is to demonstrate how virtualization can contribute to the improvement of cloud computing services. This study also takes a deeper look at source virtualization strategies, as well as emerging security challenges and future research goals.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"8 1","pages":"162-166"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84289228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bio-Inspired Algorithms for Prey Model Optimization(February 2022)","authors":"Ashish Rastogi, S. Taterh, B. Kumar","doi":"10.1109/iciptm54933.2022.9754200","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754200","url":null,"abstract":"Optimization means making the best use of anything or using resources effectively or achieving high quality under the constraints offered. Or at the lowest cost to achieve the optimum result. This research paper contains the algorithms all of which are inspired by the design of BAT algorithms, firefly algorithms and cuckoo algorithms. Also their improved version to optimize the various problems for example real life problems like the traveling salesman problem, manufacturing process optimization, power system stabilizer, engineering optimization etc. BAT algorithm is a type of algorithm which is on the echolocation behavior of bat and this algorithm is Meta heuristic in nature. The algorithms for the optimizations are highly inspired by the nature, behavior of the different animals, birds, wolves, fireflies, fishes etc. The old methods are actually not very efficient as they have some restrictions while these evolutionary algorithms are solving these problems and finding the optimum solution. Optimization problems are very challenging to solve either those are of single objective or of the multi objective. Also it is said that NP-hard is not possible to solve this it efficiently by any algorithm in an acceptable time period. As there were real world problems which are actually nonlinear. As these problem leads to the complexity, so to solve these types of problems is not an easy task done by any software.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"90 1","pages":"264-269"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84326039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shweta Singh, V. Srikanth, S Kumar, L. Saravanan, S. Degadwala, S. Gupta
{"title":"IOT Based Deep Learning framework to Diagnose Breast Cancer over Pathological Clinical Data","authors":"Shweta Singh, V. Srikanth, S Kumar, L. Saravanan, S. Degadwala, S. Gupta","doi":"10.1109/iciptm54933.2022.9753960","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753960","url":null,"abstract":"Metastasis of breast cancer cells is a critical element in determining a patient's prognosis. A sentinel lymph node biopsy may be used to determine metastases. The standard pathologist examination procedure, on the other hand, is redundant and time consuming, and it is easy to overlook micro metastatic lesions. At the moment, the findings of employing a convolutional neural network to research breast cancer sentinel lymph node metastases have been obtained. Nonetheless, the accuracy rate is low, and the micro metastasis detection impact is poor. A multichannel convolutional neural network model was constructed and suggested in answer to the aforesaid challenges using the sentinel lymph node pathological imaging dataset of breast cancer (PCam). The model employs stacked multichannel convolutional units and IOT based CNN modules, as well as skip cross-layer connections, a mix of conventional and depth wise separable convolutions, and a combination of sum and concatenation operations. Iteratively train 50% of the photos 35 times to produce the model weights. Then, using the accuracy and area under the curve (AUC) values, evaluate the test pictures. Accuracy is 97.32 percent and AUC is 98.05 percent. When compared to the findings of previous research and mainstream convolutional network models, the model scores first in AUC values for 49 percent, 51 percent, and 100% test sets. The findings indicate that the model is very accurate at recognizing lymph node metastasis and performs well at detecting micro metastases.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"19 1","pages":"731-735"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81799516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. P, S. A, R. Elavarasu, Shilpi Singhal, Shubha G. V., Ashok Kumar
{"title":"Block chain Based Secure Data Transmission among Internet of Vehicles","authors":"A. P, S. A, R. Elavarasu, Shilpi Singhal, Shubha G. V., Ashok Kumar","doi":"10.1109/iciptm54933.2022.9753890","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753890","url":null,"abstract":"To address the issues that traditional Internet of Vehicles (IoV) data is readily manipulated with and access control is inflexible, a security sharing method for IoV data is presented that utilizes blockchain technology and weighted cipher text policy attribute-based encryption. Maintain the production, verification, and storage of blocks, implement distributed data storage, and secure the integrity of data; access control of data on the chain based on characteristics to ensure that only authorized visitors may access data content; For the Internet of Vehicles data access, a multi-attribute-based hierarchical access policy formulation approach is built by mining the association relationship between points and permissions between roles. This method simplifies the complexity of access control policies. The built-in hierarchical access policy formulation approach efficiently reduces the computation and transmission overhead of cars while meeting the needs of the Internet of Vehicles scenario for access to various entities and different roles.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"49 1","pages":"765-769"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79853601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Amit Gupta, A.V.Nageswara varaha Rao, B. Raghavaiah, S. K. Dargar
{"title":"Clustering Method Response and Recovery Time Analysis with Different Temperature for different Toxic Gas","authors":"Amit Gupta, A.V.Nageswara varaha Rao, B. Raghavaiah, S. K. Dargar","doi":"10.1109/iciptm54933.2022.9754047","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754047","url":null,"abstract":"Nitrogen Dioxide sensors supported Zinc Stannate films were manufactured utilizing the splattering-pyrolysis technique. The impact of parent material pyrexia on Nitrogen Dioxide reaction was investigated. The sheets deposited at 400 °C dominate flakes like geomorphology that the blanks put forward within the superficial increase the roughness. The zinc Stannate sensor demonstrated maximum sensor reaction 29.3 at comparatively low (300 °C) functioning pyrexia regarding 40 ppm Nitrogen Dioxide concentration. The new Zinc Stannate films demonstrate excellent gas sensing characteristics and evidence extraordinary reaction and rehabilitation dynamics with no superficial variation by element or surface-active agent. The proposed work follows the use of anaconda software over spider tool (spyder-3) operation with python programming language. The Python scripts in machine learning with applied clustering techniques have valued toxic liquids. The results are close to real-time results with simulated ones at divergent functional temperatures.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"313 1","pages":"79-83"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80038982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Accuracy in Classification and Detection of White Blood Cancer Cells using Wavelet Transform over Morphological Segmentation","authors":"Burla Gopi Raju, N. S","doi":"10.1109/iciptm54933.2022.9753927","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753927","url":null,"abstract":"Aim: The ultimate aim of this research work is to improvize the accuracy & specificity of automatic counting of Cancer cells, detection, classification of cancer cells using innovative white blood cancer detection methodology. Materials and Methods: Determined sample size using GPower is 10 for each group (Power of 0.80 and alpha value of 0.05) and groups are categorized as Morphological segmentation classifier (Group 1) and Wavelet transform classifier (Group 2). 70 % of the images are utilized for training and 30 % are used for verification and validation in performance analysis. Result: Morphological segmentation algorithm achieved improved accuracy (97.77%) compared with the Wavelet transform algorithm with an accuracy of (77.77%). Independent sample T-test has been analyzed and achieved a significance of 0.0427 ($mathrm{p} < 0.05$) for accuracy and 0.006 ($mathrm{p} < 0.05$) for specificity. Conclusion: Morphological segmentation algorithm provides better accuracy compared with the wavelet algorithm.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"29 1","pages":"622-627"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83858096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real Time Energy Meter Fault Detection System using Camera comparing with Conventional Fault Detection Technique","authors":"A. Rakesh, N. Bhavani","doi":"10.1109/iciptm54933.2022.9754186","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754186","url":null,"abstract":"AIM: The study's major goal is to compare a real-time energy meter fault detection approach to a traditional fault detection technique using a new proposed system of unique remote application. MATERIALS AND METHODS: Designing a novel remote application using android studio and python software with 10 samples compared with conventional fault detection technique and significance value is 0.03. The G power is 0.8, the alpha is 0.05, the beta is 0.2 RESULTS: Through this study it is found that a real time energy meter fault detection technique with a novel remote application has better statistical significance value (p<0.05). CONCLUSION: A novel remote application of real time energy meter fault detection technique gives significantly better results.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"20 1","pages":"646-650"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87245826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards 6G: Network Evolution beyond 5G & Indian Scenario","authors":"Mandeep Malik, S. Garg","doi":"10.1109/iciptm54933.2022.9753847","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9753847","url":null,"abstract":"Arguably, the story of human evolution is going on for lots of years and so is the evolution of technology. With each passing year, people are striving for development and higher fantastic of life. As part of improvement in wireless communication, data rates have been increased with every successive generation of wireless telephony from 384kbps in 2G to 56Mbps in 3G, 1Gbps in 4G and 20 Gbps in 5G. Humans are also looking for multiple other services, such as enhanced high speed mobile broadband, virtual reality, augmented reality, mix reality, automated driving, and next generation Internet of Things (IoT). 5G has been able to take care of all these requirements and provides a lean and ultra-agile design of communication networks. However, taking into account the ever rising demand for new requirements and data dependent human society, it makes sense to move towards the next generation and prepare vision beyond 5G, designing an innovative 6G substrate which will include latest ground-breaking technologies and designs to satisfy new data and connectivity based aspirations of individuals, businesses and societies. Idea of this paper is to provide deep insight into the services, enablers, use cases and technologies of 6G and also motivate researchers to work towards 6G cellular mobile communication network. As a start point gap analysis of 5G is carried out in comparison to 6G, aspirations in relation to data rates, connectivity are taken and a new design is proposed with future use cases. As seen with 5G networks, a technology requires a blend and fusion with other leading technologies of future like 6G will be amalgamated with path breaking technologies like holographic communications, high-precision manufacturing, a fusion of artificial intelligence (AI) and IoT / IoMT, and the integration of new technologies, such as visible light communication (VLC) or sub-terahertz, in a truly real 3D coverage scenario. Framework proposed for 6G has to be heterogeneous in nature and will be integrating Satellite, terrestrial and aerial radio access points (UAVs) to form a network with responsive cloud functionalities and thus providing services on the go as well as on demand.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"36 1","pages":"123-127"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86509065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A quick look at Cryptocurrency Mining: Proof of Work","authors":"R. Beer, Tarun Sharma","doi":"10.1109/iciptm54933.2022.9754144","DOIUrl":"https://doi.org/10.1109/iciptm54933.2022.9754144","url":null,"abstract":"Cryptocurrency, a name heard in the news as well as social media. But what exactly is cryptocurrency? Cryptocurrency is a decentralized digital asset on the blockchain, which means, that it is not controlled by an entity or an institution. Therefore, users of cryptocurrency enjoy financial freedom. But how are most of the transactions related to cryptocurrency processed on the blockchain? There is a term called proof of work as well as proof of stake. This paper has focused on the proof of work aspect of processing the cryptocurrency transactions, also specified the currencies that support the proof of work consensus. It also distinguishes between the two types of hardware that can be used to mine the currencies, and also using the past one-year data recorded by the author to analyze whether mining can be fruitful with any hardware in the future. Also, commenting on which type hardware can yield the best ROI. This type of thorough research on PoW consensus has not been found, so this paper is the first of its kind. A prediction has also been made using Python, whether mining in the near future will be of great potential or not. Also highlighted why mining revenue fluctuates.","PeriodicalId":6810,"journal":{"name":"2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"8 1","pages":"651-656"},"PeriodicalIF":0.0,"publicationDate":"2022-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80549520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}