No. |
Title and Author |
Area |
Country |
Page |
1 |
Text Summarization: An Analysis of Open Source Online Tools
-Mrs.R.Janani ; Dr.S.Vijayarani; Ms.A.Revathi
Text Mining is used to extract interesting pattern from large database. Today’s world has generated a lot of data through online as well as offline and so much more. However, everyone desires to read the summary of long document instead of entire document. Text Summarization is used to rearrange an actual amount of data or reduce a text with less time without losing any information. Text Summarization is a way of extracting or collecting significant information from the original text document and presents that collected information in the form of summary. With the help of text summarization tools, it is possible to grasp the main concept of document with less time. The main aim of this paper is to analyze the performance of the open-source text summarization tools. For this analysis, Text Compactor, Summary Generator, Tools4Noobs, Resoomer, SMMRY, Free summarizer and Automatic Text summarizer are considered. Based on the performance analysis, it is observed that the Resoomer tool has summarized the document efficiently than other tools. Read More...
|
Advanced computing and Data Science |
India |
1-4 |
2 |
Comparative Study of Flat Slab and Conventional Salb in Various Seismic Zone Using ETABS
-Sneha Divekar ; Arti Lambat; Shraddha Wankhade; Jaya Karwate; Pranav Takey
In present era, flat slab buildings are commonly used for the construction as it has many advantages over conventional RC frame building. The flat slab allows architects to place partition wall wherever they are needed. It is widely use because it reduces weight, speed up buildings, and it is cost effective. Similarly, since its inception, the conventional slab has provided benefits such as increased stiffness, increased weight carrying ability, as well as being safe and cost effective. In present work a G+5 multistorey building having flat slab with drop, and conventional slab has been analyzed using E-TABS software for the parameters like storey displacement, storey drift, storey shear, base shear, axial force and time period. The main objective of the present work is to analyze and study the performance and behaviour of both the structures in all seismic zone of India (II, III, IV, V) and to study the effect of height of building on the performance of these type of building under seismic zone. Read More...
|
Civil Engineering |
India |
5-8 |
3 |
An Automated System for Accident Detection
-Ganesh Adhude ; Amol Shinde; Swapnil Bhosle; Aftab Sayyad; Prof. K T Mohite
We humans frequently travel from one place to another for varied reasons. One of the important modes of transport is via road. currently the vehicles are no longer a means of luxury but rather a 'need' for transportation. Day in and day out, indeed for shorter distances we tend to use our vehicles. Through the recent times, accidents are increased due the increase in the vehicles on road. Further the new generation of vehicles have surfaced which are meant to reduce the accidents caused. still, despite the perpetration of innovative ideas to reduce accidents in the ultramodern vehicles there are still chances of circumstance of accidents. It's of a lesser significance to reduce the number of accidents cases and to secure human lives. One of the major reasons for the loss of lives is the detention of medical treatment of the injured person. Due to the ignorance of the people, help to the injured person is delayed thereby going their lives. As the technology advances, the need for furnishing a more dependable system for helping the people increases. therefore, we've designed a system using IoT, GPS and smart detectors to directly send SMS to the family member of the injured person as well as nearest hospital when accident takes place. Read More...
|
Computer Engineering |
India |
9-10 |
4 |
An Analytical Survey to handle Virtual ATM through Fingerprint and Face Recognition using Deep Learning
-Prof. Pallavi S. Kohakade ; Shinde Vaishnavi Mahadev; Shinde Dhanashri Bhima; Wandhekar Aditya Vijay; Shinde Pravin Bhaguji
The improvement in the technological sector in India has been crucial for the realization of improved convenience and reliability. The banking sector has also flourished that achieved significant enhancements that have been useful to the end user. Facilities such as ATMs or Automated Teller Machines have revolutionized the transaction capabilities and reduced the chances of human error. ATMs allow the dispensing and deposition of cash at all times. The cards issued by the bank can be used for this purpose and allow for a much easier integration. But there has been an increase in fraudulent transactions and card theft that decreases the reliability and security of ATMs. Therefore, to improve the security and reliability of the Automated Teller Machines, there is a need for a methodology that identifies the user while the transaction is being performed, instead of identifying the card which is being done in the current model. The realization of the user identification through a Virtual ATM approach will require the implementation of Biometric authentication mechanism. This approach discusses the use of face recognition along with fingerprint recognition using live streaming, Channel Boosted Convolutional Neural Networks along with One Time Password implementation for achieving a highly robust and secure Virtual ATM. The approach will be elaborated in utmost detail in the upcoming research directives in the future. Read More...
|
Computer Engineering |
India |
11-14 |
5 |
An in-depth review on Trustworthy Freelancing Crowdsourcing using Blockchains
-Prof. Pallavi Suresh Kohakade ; Mr. Yogesh Suryabhan Sonawane; Ms. Vaishnavi Anil Barde; Mr. Mahesh Popatrao Pawar; Ms. Jayshree Sanjay Sansare
In the information era we live in today, data represents the most valuable resource. One of the greatest critical materials that enables the successful use of diverse strategies in a wide range of applications is information. A growing quantity of information is being created globally as a result of the advancement of the internet infrastructure. This information is produced on a variety of websites, including social networking platforms, e-commerce gateways, and other online services accessible over the World Wide Web. Such services are very important and have been employed by many individuals all over the world. These usages produce enormous volumes of data nearly every day, aside from the infrastructure. This data is extremely valuable and can be used for the purpose of achieving effective and useful implementations in Data mining, Machine Learning and other data intensive implementations. This is particularly useful with regards to these realizations that allow for a much effective and useful implementations of the generated data. But there are certain problems that have been noticed with regards to the reliability and security of the data being shared. This prevents optimum utilization of the data sharing by the crowd. Therefore, to improve the trustworthiness of the sharing mechanism the implementation of a reward and penalty based approach using the distributed blockchain platform is reached in this literature survey paper. This methodology will be elaborated in the upcoming editions of this research. Read More...
|
Computer Science |
India |
15-18 |
6 |
Application of Quality Tools in Process Improvement - A Study
-Pogiri Suri Babu ; Mrs. CH. Bhanusri
In this project a review of systematic use of Seven Quality Tools in Process Improvement is presented. The main aim of this Study Project is to provide an easy introduction of Seven Quality Tools and to improve the quality level of manufacturing processes by applying it. Quality Control Tools are the mean for Collecting data, analyzing data, identifying root causes, and measuring the results. These tools are related to numerical data processing. All these tools together can provide great process tracking and analysis that can be very helpful for quality improvements. These tools make quality improvements easier to see, implement and track. The work shows continuous use of these tools upgrades the personnel characteristics of the people involved. It enhances their ability to think generate ideas, solve problem, and do proper planning. The development of people improves the internal environment of the organization, which plays a major role in the total Quality Culture. Read More...
|
Production and Industrial Engineering |
India |
20-22 |
7 |
Study of Improvement of Clayey Soil by Using Red mud and GGBS in Subgrade and Minimize the Thickness of Flexible Pavement
-Mahendra Sahu ; Vinay Deulkar
Soil stabilization methods are commonly used in highway projects where high strength of sub-soil is required. In physical and chemical stabilization, an optimum amount of Red mud and GGBS is mixed with the soil to improve its quality. A practical and generally accepted approach is used to determine the optimum amount of additive to be added to the soil to get maximum efficiency. In this work, an attempt has been made to carry out experimental work, based on various results with different numbers of additives. The value of CBR increased from 8.70%% to 12.72%for (15% of Red mud + 0-6% GGBS) used and then decreased in the soil sample in un-soaked conditions. The value of CBR increased from 2.83% to 8.87% for (15% of Red mud + 0-6% GGBS) used and then decreased in the soil sample in 4days-soaked conditions. Pavement design AT CBR value of 3%:- Total pavement thickness for CBR 3 % and traffic 5.5 MSA from IRC:37 2001 PLATE 1 = 679 mm. AT CBR value of 9%: - Total pavement thickness for CBR 9% and traffic 5.5 MSA from IRC:37 2001 PLATE 1 = 481.5 mm. Read More...
|
Civil Engineering |
India |
23-27 |
8 |
A Review: Laboratory Assessment of Use of Industrial Waste as a Stabilizer for Black Cotton Soil
-Niyamat Ullah Khan ; Thakur Ramji Ram Singh
In this experimental investigation, soil samples have been stabilized with varying percentages of stabilizer to Hypo-sludge by studying the effect on strength. These stabilizers propose a cost-effective preservative for problematic soil by soil stabilization techniques and also solve the conventional issues due to their disposal problems based on the performance of strength. In the past 20 years, many new road improvement techniques have revolved around the use of hypo sludge. The California bearing ratio (CBR) of these sub-grade soils has very low, resulting in more thickness of the road crust. Read More...
|
Civil Engineering |
India |
28-30 |
9 |
Laboratory Assessment of Use of Industrial Waste (Hypo Sludge Powder) As a Stabilizer for Black Cotton Soil
-Niyamat Ullah Khan ; Thakur Ramji Ram Singh
In this study, firstly the various properties of soil samples like liquid limit, plastic limit, plasticity index & identification of soil have been evaluated, and then CBR values of these soils have been improved using hypo sludge. hypo sludge is placed at different percentages of various soil samples, and then a series of California Bearing Ratio (CBR) tests were conducted to evaluate the strength of the subgrade soil. It was observed that the CBR value increases when the hypo sludge percentages increase in various soil samples. From this study, The value of CBR increased from 4.07% to 9.28% and then decreases by 8.54% for different percentages of Hypo-sludge used in the soil sample in un-soaked conditions. The value of CBR increased from 2.01% to 8.15% and then decrease by 6.35% for different percentages of Hypo-sludge used in the soil sample in 4 days of soaked condition. Therefore, from the above observed CBR values, 8% Hypo-sludge is suitable for pavement thickness. Read More...
|
Civil Engineering |
India |
31-33 |
10 |
Conversion of Kitchen Waste into Liquid Fertilizer by Composting Technique
-Sourav Sisodiya ; Dr. Kanjan Upadhyay
Composting, as a conventional solid waste treatment system, plays an essential part in carbon and nitrogen conservation, thereby reducing the loss of nutrients and energy. Still some carbon- and nitrogen - containing feasts are inescapably released during the process of composting due to the different operating conditions. Read More...
|
Environmental Management |
India |
34-39 |
11 |
An Empirical Study on Different Leadership Styles of Business University Heads & Its Influence on Academic Staffs Productivity
-Shama Parween
The purpose of this study was to determine the impact of leadership style on faculty's performance. This study looked at how different leadership philosophies affected how well employees performed at work in a few private universities in Vadodara. Universities require leaders that can adapt to diverse scenarios and have a variety of leadership styles that work in any context and at any given time if they want their employees to achieve at their highest level. All academic and non-academic workers from approximately five private universities in Vadodara were considered for the study. Using the purposive sampling method, five private universities were chosen.100 respondents were chosen by random selection method, with 20 respondents (ten academic and ten non-academic faculty) were considered for this research work. Demographic descriptive analyses were used to assess the data, and Pearson correlation are used to test the three hypotheses that were assumed for this study. At significance levels of 0.01 and 0.05, each hypothesis is evaluated. Regression analysis was conducted to analyze the data using SPSS statistical tool. Democratic leadership, Autocratic leadership and Instructional leadership styles are some of the leadership styles which are studied in this paper. The result shows that democratic and instructional leadership style has positive and significant impact on employee's performance. However, we could find that autocratic leadership style does have positive or much impact on employee's performance. As a result, from this study leaders with great knowledge & flexible attitude have a greater impact on the performance of their team members. Read More...
|
Human Resource management |
India |
40-48 |
12 |
Antifungal Activity of Extracted Phytochemical from Tinospora Cordifolia Stem
-Jeel Zalavadiya ; Bhumika Suthar; Dr. Kushan Parikh
Tinospora cordifolia (Giloy) is the family species of Menispermaceae, which is found mostly in Indian Ayurvedic world. Due to its medicinal applications and current trend in COVID-19 pandemic, giloy steam and its part have been used for centuries. In the current study, phytochemicals (alkaloid, tannins, saponins, etc.) have been extracted from giloy stem with the help of aqueous, aqueous + ethanol, aqueous micellar (sodium lauryl sulphate) system at 40-50℃ for 1-2 h. The yield has been obtained on an average 4-7 % due to its natural element. The extracted phytochemicals have been characterized by qualitative test and FT-IR analysis. The micellar system for giloy phytochemical extraction has been found superior compared to others. Antifungal activity of extracted phytochemicals has been obtained on Candida Albicans at control condition. The phytochemicals extracted by aqueous + ethanol system was showing positive result on fungi up to 12mm zone of inhibition. Read More...
|
Applied Science |
India |
49-52 |
13 |
High Security Data Collection Using Trust Value and Encrypted Data
-Aditya K Verma ; M.B. Limbkar; Rao Saheb Waghmare
The most important broad categories in the sector are data gathering and protection, networking and cloud computing, and cloud computing security. The vast processing and storage capacity that is made accessible by cloud computing has the potential to provide wireless sensor networks (WSNs) a new lease of life, and it has also inspired the creation of a wide variety of cutting-edge applications that are used in this industry. The limited communication capabilities of WSNs, which are especially important in applications that are sensitive to the passage of time, necessitate the need of data collection to the Cloud in order to prevent data loss. As a direct consequence of this, the growth and use of WSNs in the years to come will be restricted in a number of different ways. This research incorporates a trust-based security component into edge computing, therefore integrating the Internet of Things with this kind of computing. In order to provide a higher level of protection, this thesis offers a combination of trust values on nodes in addition to data that has been encrypted. Read More...
|
Electronics Engineering |
India |
53-58 |
14 |
Bioscrypt Security System
-Mr. Amit Appasaheb Waghmare ; Miss. Akanksha Chandrakant Mirgaonkar
Bioscrypt security is a system that relies on the physical traits of a person to authenticate their identity. These physical traits are then converted into an electronic signature, which is then used to verify their identity. This has become a popular way for institutions and businesses to secure their data and protect themselves from fraud. Bioscrypt security systems can be broken down into two main categories based on the type of bioscrypt used, or based on the technology used to capture and process the bioscrypt data. The first type of bioscrypt-based system uses fingerprint scans, iris scans, facial recognition software, and voice recognition software to identify people. The second type of system uses cameras or other sensors that “read†an individual’s features in order to identify them. This second type of system is often more accurate than the first because it can use more than one physical trait at a time to make sure there is no mistake when identifying someone. Read More...
|
Information Technology |
India |
59-62 |
15 |
Gear Teeth Cutting by Using Lathe Machine Tool - A Review Paper
-Sandeep Kumar
In this paper, the literature analysis of the Gear Cutting Machines is included. As we know the process of gear-cutting is to be done on the milling machine commonly and the milling machine is an expansive machining process & its maintenance is also high, which is quite expensive for small-scale industries. If small industries use their lathe machines instead of milling for gear cutting, this would minimize the initial expenditure of small-scale milling co companies. It would also reduce the area covered by the milling computers, and the free space can be used for other useful works in the industries. Read More...
|
Mechanical Engineering |
India |
63-64 |
16 |
Modified Wave Variable Technique for Time Delayed Bilateral Tele operation
-Vasumalaikannan A
In force reflecting Teleoperation the time delay in the loop make the system unstable. The wave variable method is one of the ways to make the system as stable for any type of varying time delay using passivity technique. In this paper a modified wave variable technique has been proposed which retain the stability guaranteed by the existing wave variable and improves the tracking performance of the system. Two new variables are added in the modified wave variable to improve the force and position tracking. The effectiveness of the proposed method is confirmed by simulation results. Read More...
|
Aeronautical Engineering |
India |
65-69 |
17 |
Predictive Maintenance of Motor Using Machine Learning
-Siddhesh Nandakishor Darje ; Siddhesh Darje; Premchandra Kumbhar; Nilesh Marchande; Deepak Sajnekar
Condition covering together with prophetic conservation of electric motors and other outfit used by the assiduity avoids severe profitable losses performing from unforeseen motor failures and greatly improves the system Responsibility. This paper describes a Machine knowledge cadre for prophetic conservation, grounded on Machine Learning approach. The system was tested on a real diligence illustration, by developing the data collection approach and comparing it to the simulation tool analysis. Data has been collected by colored detectors. With the help of this paper, we want to cover and increase the life span of Electric motor and other outfits. Read More...
|
Electrical Engineering |
India |
70-71 |
18 |
Privacy-Preserving Keyword Search in Cloud Computing
-Salve Pallavi Sandeep ; Sansare Komal; Tonape Gaurav; Sonavane Shaila; Prof. Sweety Wanave
whilst several information proprietors have moved their records to cloud garage to facilitate multiprocessing, personal and sensitive records should first be encrypted earlier than being processed in the cloud. keyword seek over encrypted statistics is vital in cloud computing. To prevent unauthorised records get entry to in a multi owner scheme, first-rate-grained get admission to manipulate is needed. The hidden secret is every now and then out of place via registered proprietors for a price. As a result, finding and revoking the malicious person who is exploiting the secret key should be completed as fast as viable. In this article, we gift a seek technique with an unfastened and verifiable outsourced decryption based totally on a couple of keywords. keyword seek increases machine effectiveness whilst documents are returned if the consumer's search input matches the predefined keywords precisely. Our answer is to extract the keywords, encrypt them and add them to the index. in place of store a report and the searchable index into the cloud, the proposed method could keep the document to a non-public server. This reduces community congestion and overheads, and pace of restoration and storage with the aid of the use of report compression. Read More...
|
Computer Science |
India |
72-74 |
19 |
A Review on Study of Improvement of Clayey Soil by Using Red Mud and GGBS in Subgrade and Minimize the Thickness of Flexible Pavement
-Mahendra Sahu ; Vinay Deulkar; Mr. Jitendra Chouhan
Soil stabilization methods are commonly used in highway projects where high strength of sub-soil is required. In physical and chemical stabilization, an optimum amount of Red mud and GGBS is mixed with the soil to improve its quality. A practical and generally accepted approach is used to determine the optimum amount of additive to be added to the soil to get maximum efficiency. In this work, an attempt has been made to carry out experimental work, based on various results with a different number of additives. Read More...
|
Civil Engineering |
India |
75-78 |
20 |
Emotion Recognition Using Facial Expressions
-Devang Punatar ; Aaryan Pimple; Prerak Khandelwal
This study provides an overview of the phases, methodologies, and datasets used in contemporary Facial Emotion Recognition (FER). FER has been known for decades and is an important issue in computer vision and machine learning. Automatic FER can be used in a variety of settings, including healthcare, education, criminal investigation, and Human Robot Interface (HRI). The goal of this study is to grasp the fundamentals of FER and compare recent studies. Read More...
|
Computer Engineering |
India |
79-82 |
21 |
Apply Lean Methodology to Improve Reliability of Crane
-Lagudu Leela Ajay Kumar ; Ch.Bhanusri
Continuous waste reduction via improvements is what LeanKaizen entails. This work demonstrates the use of the LeanKaizen concept in the seaport. Ship to shore cranesare used in container terminals at seaports. Reliability is critical since it has a direct impact on customer satisfaction and requires a substantial amount of time and money. The work's goal is to focus on current maintenance procedures, evaluate pertinent data using MAXIMO 7.5 CMMS software, and decrease variability and downtime by preventing breakdowns during vessel operations. The present condition of quay crane maintenance at a specified container terminal was documented, and a map of the current state was created. In order to bridge the discovered gap, the "5-why" technique was used to uncover root reasons, and Kaizen events were recommended as remedies. In the Lean Kaizen event, Brainstorming, DMAIC methodology, value stream map technique was applied to reduce the breakdown on container cranes by enriching the preventive maintenance plans and scheduling process. Read More...
|
M.Tech |
India |
83-86 |
22 |
Throughput Analysis of Message Digest MD5 Security Algorithm for Wireless Networks
-Vikram Patel ; Girish Kumar Tiwari
The wireless network control procedure should first and foremost guarantee the safety. The security of data in a dispersed wireless communication network is one of the current study fields. Wireless networks are vulnerable to assaults as they expand, necessitating the use of strong security measures. Finding appropriate cryptography for wireless network communication is a crucial problem because to the sensor nodes' limited energy-computational and storage resources. It is necessary to include safety features, such as the usage of data integrity codes and encryption techniques, in order to address these issues with wireless network communication. such as to get the data ready for transmission and subsequent decryption. In this research, we explain the test findings that demonstrate how the suggested approaches can strengthen the key used in the encryption and decryption of document files transmitted over wireless networks. Read More...
|
Electronics & Communication Engineering |
India |
87-91 |
23 |
Smart Bus System Using IoT
-Harshal Shirapure ; Shashank Mahajan; Harshal Shirapure; Siddhi Aringle; Roshan Warade
Smart Bus System is used for managing multiple features, but the primary feature is generated automated fee receipt according to its distance, show live location of the bus. They are analyzed for planning the bus schedules and analyzing the frequency of buses needed on a route. Our system mainly divided into three aspects 1)Student Login-Show all information about student i.e student distance, fees according to distance , Payment history. 2) Driver-Drive has access of student data, where they can see the location of every student 3)Admin-Store driver and student information in admit and they are able to mange data according to their status .Thus, smart bus is an efficient, convenient and highly reliable system which is used to reduce corruption, misused of fee receipt smart bus system has strategic planning and management, which will eventually make student journey peaceful, saving paper through digitalization and save the effort and time for planning. Read More...
|
Information Technology |
India |
92-93 |
24 |
Finite Element Analysis of C Able Stayed Bridge with Different Arrangement of Cables
-Mohammed Faizan Alam Khan ; Dr J N Vyas
The Cable Stayed Bridge is one of the modern bridges which were built for the longer spans and for better enhancement of the work in the field of aesthetic appearance and durability, therefore there is a need of study which overcomes the idea about the different possibilities in the structural arrangement in the terms of economy and aesthetical appearance. This study reveals an idea about the behaviour of the different arrangement of cables in the linear dynamic analysis of Cable Stayed Bridges under seismic load. The modelling and analysis of bridge has been carried out using SAP 2000 with vehicular interaction as per IRC & the effects of earthquake as per IS 1893: 2016 for Zone V. For the modelling of bridges, the arrangement of self anchored cable stays has been considered as semi fan type, fan type and harp type with the constant dimensions of height of pylon and span of bridge. From these results, the behaviour of the different arrangements of cables used in cable stayed bridge has been easily determined in the assumed appropriate conditions. Read More...
|
Structural Engineering |
India |
94-100 |
25 |
MEGH - A Hop Count and Energy Based Routing Protocol for Opportunistic Networking
-Vikram Jeet Singh ; Dr. Sunil Mankotia
Opportunistic Networking (OppNet) is one of the most interesting evolutions in the field of computer networking where moving devices are able to converse in the absence of a connecting route. The routes are dynamically built despite the fact that the messages are on the way between the sender and the recipient. Any potential node can be used as a relay if it brings the message closer to its destination. Such requirement makes it an interesting and highly challenging research field without any underlying predetermined network infrastructure. A novel routing protocol with the underlying concept of energy consumption is proposed, wherein the message packets are transmitted taking into consideration the node's available energy and the message hop count. Performance of the proposed protocol is then compared with the other available routing protocols to study the performance through results achieved in terms of delivery probability, overhead ratio, buffertime average, latency average and hop count average. Read More...
|
Computer Science and Engineering |
India |
101-105 |
26 |
Extended Soft Rough Set
-Manamohan Maharana ; Dr.Debadutta Mohanty
The present treatise attempts to introduce the new concept of ‘Extended soft rough set’ based on the union of two soft sets. As an extended model increasing the scope and range, we proposes extended soft approximation space .Basic properties of the extended soft approximations are presented and extended soft approximation are not dual with soft approximation space is established and some examples are shown. We have established the accuracy of suggested approximation is more accurate than soft approximation space through examples. Moreover, we explain the ‘full extended soft rough set as well as examine some propositions based on that. We have established, extended soft rough set can be seen as a generalized model of soft rough sets. Read More...
|
Mathematics |
India |
106-110 |
27 |
Blockchain Based Decentralized Transaction Settlement System
-Chetan Himmat Deshmukh ; Ashutosh Babasaheb Chikane; Satyam Raosaheb Chavan; Vikas Suresh Ashtekar; Prof. Rahul M. Raut
Potential threats from viruses, malware, adware and hackers are constant. In the last couple of years, many massive global companies were hacked and compromised. In some cases, this has led to the leakage of confidential and private information, including bank details, addresses, and transactions etc., with a strong security system in place where these things can be stopped before they are close to the data private of the company. This is not only important in terms of confidentiality, but also to avoid the expensive fines that are imposed on companies that do not successfully protect customer information. The project is a verification system that verifies the user to access the system only when they have the correct input credentials. The project involves user certificates i.e. Modules. There are many types of security credentials are available. So in this proposed system we implement custom blockchain for baking security and user authentication purpose. By using this level of authentications, there is less chance for hacking and loss of confidential data. Also in today’s scenario safer bank transactions is required, as the technology is improved in the field of security. They have also entered the fields like industry, medicine, telecommunication and home automation, etc. Blockchain is basically a distributed ledger. It can store facts like, who owns a particular piece of land or say a bond. The technology can be used to keep an immutable record of ownership and enable transaction of the asset amongst distrusting parties. Read More...
|
Information Technology |
India |
111-114 |
28 |
Covid 19 Survival Prediction through CNN and LSTM Deep Learning Models
-Prof Y.A.Sisodia ; Bhagat Divya Ravindra; Adamane Priti Ashok; Ghule Nikita Balasaheb; Dolase Nikita Balasaheb
The COVID-19 global epidemic, also known as the coronavirus infection, constitutes one of the most difficult issues that the world is now dealing with. SARS-COV-2, also known as the severe acute respiratory syndrome coronavirus 2, is the cause of COVID-19, a new and very infectious pulmonary illness. For identifying and controlling health hazards, public health initiatives and configuration management are crucial. In contrast to detecting, detecting, and addressing to instances, particularly contagious illness epidemics, these initiatives place a greater emphasis on counteractive action. A reliable estimation of the disease's location, dissemination, potential course, and statistical count is required to design effective preventative efforts. Accordingly, accurate quantitative prescriptive analytics is a crucial component of public health programs, primarily for contagious illnesses. Therefore, this research article outlines an effective and useful mechanism for the purpose of achieving covid-19 survival rate prediction through the use of deep learning methodologies. For this reason a number of different approaches on Covid-19 infection rate prediction are studied in this research article to achieve our approach. Our approach utilizes, Pearson correlation, K Nearest Neighbor, along with CNN-LSTM and Decision Tree to achieve covid19 survival rate prediction. The approach will be quantified in the next research paper on this topic. Read More...
|
Computer Science |
India |
115-118 |