HEART ARRHYTHMIA DETECTION AND CLASSIFICATION FROM ECG SIGNAL USING ARTIFICIAL NEURAL NETWORKS |
Author : Gaurav Bindal, Aditi Garg, Jahnvi Singh, and Dr. MM Tripathi |
Abstract | Full Text |
Abstract :Abnormal electrical activity of the heart results in changes in the normal rhythm of heart causing cardiac arrhythmia of various types. The effects of arrhythmia can cause irreparable damage to the heart over long period of time and can be fatal at times. Early detection of arrhythmia can reduce the damage significantly and hence, the detection of arrhythmia from ECG signals is important for the medical world. In this paper we use machine learning algorithms, Neural Network, Random Forest, Logistic Regression, Boosted Trees, SVM, Naive Bayes and Nearest Neighbour. We then compare the efficiency of these algorithms in detecting arrhythmia and classifying it into types.
|
|
SEARCH ENGINE OPTIMIZATION TOOLS AND KEYWORD FREQUENCY ANALYSIS IN ENHANCING SEARCH ENGINE EFFICACY USING ENHANCED BOYER MOORE ALGORITHM |
Author : Rishit Kalra |
Abstract | Full Text |
Abstract :Search Engine Marketing (SEM) and Search Engine Optimization(SEO), are strategies that are effectively used to grow business by attracting potential customers in an extremely competitive marketplace. This paper first revisits the working of a search engine and the most widely used search engine. Second, it includes the approach to Search Engines Marketing in order to improve website ranking. Third, a discussion about various available tools for SEO and implementation of some of
them has been illustrated. |
|
EXTRACTING OPINION FROM UNSTRUCTURED DATA |
Author : Atul Antil |
Abstract | Full Text |
Abstract :To separate and decipher general supposition from the casual portrayal of content in online life sites. Techniques: The casual portrayals containing suppositions are Tokenized, Parts of Speech Tagging, Wordsense Disambiguation, and Text Transformation/Attribute Generation are utilized. Test information relating to execution rating of cricket players was gathered from twitter |
|
EMPLOYABILIY OF BIG DATA AND HEURISTIC BASED TOOLS IN DETECTING AND MITIGATING MALWARE |
Author : Gautam Anand |
Abstract | Full Text |
Abstract :Malware is not defined in a single word. It is a collection of malicious code or instructions which spread
through the connected system or the Internet. Its used illegally for gaining economic benefits and
damaging other computers or network systems. Malware detection is an essential role in cybersecurity.
At present, some antimalware softwares are used to detect Malware; these are signature-based methods
which cannot provide an accurate result of malware attacks. Many Metamorphic and polymorphic
techniques are used to conceal the Behaviour of malicious program. These are the severe challenges to
a global security threat. Presently various malware detection techniques are available such as
Heuristic-based, Signature-based and Behaviour-based techniques. Most of the antivirus vendors use
signature-based detection techniques, which already have known and well-documented database of the
signature value. Obfuscation and polymorphism techniques impede the first stage detection. |
|
APPLICATION OF PATTERN MINING IN HOME AUTOMATION BASED ON IOT |
Author : Aryan Marwah |
Abstract | Full Text |
Abstract :This paper talks about the likelihood of perceiving and anticipating client exercises in the IoT (Internet of
Things) based shrewd condition. The action acknowledgment is typically done through two stages: movement
design bunching and action compose choice. Albeit many related works have been proposed, they had some
restricted execution since they concentrated just on one section between the two stages. This paper endeavors
to locate the best blend of an example grouping technique and an action choice calculation among different
existing works. For the initial phase, with the end goal to order so shifted and complex client exercises, we
utilize a significant and productive unsupervised learning technique called the K-design bunching calculation.
In the second step, the preparation of savvy condition for perceiving and anticipating client exercises inside
his/her own space is finished by using the fake neural system dependent on the Allens worldly relations. The
trial results demonstrate that our joined strategy gives the higher acknowledgment precision to different
exercises, as contrasted and other information mining grouping calculations. Besides, it is more fitting for a
dynamic domain like an IoT based shrewd home. |
|