Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabet...
详细信息
Diabetes Mellitus is one of the most severe diseases,and many studies have been conducted to anticipate *** research aimed to develop an intelligent mobile application based on machine learning to determine the diabetic,pre-diabetic,or non-diabetic without the assistance of any physician or medical *** study’s methodology was classified into two the Diabetes Prediction Approach and the Proposed System Architecture *** Diabetes Prediction Approach uses a novel approach,Light Gradient Boosting Machine(LightGBM),to ensure a faster *** Proposed System ArchitectureDesign has been combined into sevenmodules;the Answering Question Module is a natural language processing Chabot that can answer all kinds of questions related to *** Doctor Consultation Module ensures free treatment related to *** this research,90%accuracy was obtained by performing K-fold cross-validation on top of the K nearest neighbor’s algorithm(KNN)&*** evaluate the model’s performance,Receiver Operating Characteristics(ROC)Curve and Area under the ROC Curve(AUC)were applied with a value of 0.948 and 0.936,*** manuscript presents some exploratory data analysis,including a correlation matrix and survey ***,the proposed solution can be adjustable in the daily activities of a diabetic patient.
A sophisticated type of symmetric encryption is called Multiuser Dynamic Searchable Symmetric Encryption. It expands the capabilities of conventional symmetric encryption to enable actions such as adding and removing ...
详细信息
With the advent of Industry 4.0, Ambient Intelligence, and other related technologies, self-Adaptation has been seen in modern systems. In this sense, Human-computer Interaction (HCI) requires an approach focused on t...
详细信息
The idea behind layered design is the foundation of the Internet of Things. Each tier uses a variety of technologies for capacity, preparation, and information transmission. With regard to the risks and vulnerabilitie...
详细信息
Business Intelligence (BI) tools can provide benefits to various stakeholders in Higher Education Institutions (HEI) and support the academic process. We use BI tools to visualize data produced from learning analytics...
详细信息
A new parallel file system and multi-core processor-based dynamic multimedia encryption method is presented in this study. Multimedia encryption efficiency and security were the main goals, addressing massive data set...
详细信息
作者:
PrathyakshiniPrathwiniPratheeksha Hegde, N.VaishaliRashmi, N.Kumar, Archana Praveen
NMAM Institute of Technology Department of Information Science and Engineering Karkala Nitte India
NMAM Institute of Technology Department of Master of Computer Applications Karkala Nitte India
NMAM Institute of Technology Department of Computer Science and Engineering Karkala Nitte India Manipal Academy of Education
Manipal Institute of Technology Department of Computer Science and Engineering India
Speech recognition systems play an integral role in numerous applications, from virtual assistants to accessibility tools. This paper offers a new viewpoint to speech recognition utilizing computer vision and deep lea...
详细信息
Since cameras are so widely available, taking pictures has become more and more common. In order to gain more information, it is frequently necessary to enhance photographs, which are crucial in our daily lives as mem...
详细信息
The Internet of Things (IoT) has significantly impacted many facets of contemporary life, and several sophisticated IoT applications and services are already being developed. Recently, the concept of federated learnin...
详细信息
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing onlin...
详细信息
Since its launch in 2014,Amazon Echo family of devices has seen a considerable increase in adaptation in consumer homes and *** a market worth millions of dollars,Echo is used for diverse tasks such as accessing online information,making phone calls,purchasing items,and controlling the smart *** offers user-friendly voice interaction to automate everyday tasks making it a massive *** many people view Amazon Echo as a helpful assistant at home or office,few know its underlying security and privacy *** this paper,we present the findings of our research on Amazon Echo’s security and privacy *** findings are divided into different categories by vulnerability or *** proposed mitigation(s)to the vulnerabilities are also presented in the *** conclude that though numerous privacy concerns and security vulnerabilities associated with the device are mitigated,many vulnerabilities still need to be addressed.
暂无评论