Tamanna Siddiqui - IEEE Xplore Author Profile

Showing 1-11 of 11 results

Filter Results

Show

Results

Cardiovascular disease (CVD) is the most prevalent cause of mortality on a global scale. The possibility of preventing cardiac diseases is dependent on early-stage intervention. At this point, the electrocardiogram (ECG) emerges as a critical modality for detecting and predicting future cardiac abnormalities. Numerous machine-learning techniques have been used to improve result precision, computat...Show More
The electrocardiogram (ECG) time series signal is a vital diagnostic tool for detecting cardiovascular diseases. The signals have widely been used in the healthcare industry to assess the health of the human heart. Typically, medical professionals manually analyze the resulting time series signal to identify any arrhythmia in the patient. Numerous research efforts have been made to automate the an...Show More
Online social networks(OSNs) facilitate their users in real-time communication but also open the door for several challenging problems like hate speech and fake news. This study discusses hate speech on OSNs and presents an automatic method to identify hate messages. We introduce an attentional multi-channel convolutional-BiLSTM network for the classification of hateful content. Our model uses exi...Show More
With the rapid pace of adoption of Container technology for applications development, it becomes imperative that all container-based applications should be categorized for their performance. Getting certified can be primarily done by its user after it goes live or before go-live, by unbiased authorities before it goes to production for end-user consumption. Before it goes to production, one of the...Show More
Cloud computing (CC) is a form of computing that uses the internet to distribute computer resources. This method has massive flaws. Load balancing is one of the most complex things. As a result of all this, the unwelcomed variable local workload would most likely be dispersed evenly over overall cloud nodes. This study covers existing cloud load balancing approaches and compares them based on vari...Show More
Container applications development is rapidly being adopted by application developers across domains. This is because of the efficiency and ease of maintenance that comes along with containerized applications. Although exponential acceptance of containerized solution has also brought in the complexity of the overall eco system that plays a bigger part in keeping container-based application product...Show More
Containers is the new buzz word within the computer technology space. With the technology growing at an exponential pace and within a short span of time, the industry has evolved from native to virtualized, to cloud and now to container technology. This evolution is focused more on decoupling the software with the hardware and making software or applications more lean and agile. Containers has don...Show More
Criminal activity detection in social network by text mining is the process of finding criminal activity by the criminals and help law text mining technique, the ability to detect hidden text from corpus documents. Text mining is process of transforming data from unstructured text to structured text which is easily perceived and processed by humans, but hard for machines to understand without desi...Show More
Clustering, a component of data mining is the process of grouping objects into several clusters such that objects in the same cluster have maximum similarity while the objects in different clusters has maximum dissimilarity. Clustering has been used in diverse fields including Text Mining, Pattern recognition, Image analysis, Bioinformatics, Machine Learning, Voice mining, Image processing, Web cl...Show More
The goal of KDD is broader and it is always interesting to discover exceptions, as they challenge the existing knowledge and often lead to the growth of knowledge in new directions. In proposed work a KDD system has been presented for the discovery of knowledge base which is a collection of quantified exception rules in the form of P→ D unless C: α, β, γ , δ Where α, β, γ , δ are quantified values...Show More
In this paper a Fusion algorithm is suggested in between two knowledge bases for discovery of QHCPR. HCPR system is capable of handling trade-off between the precision of an inference and its computational efficiency leading to trade-off between the certainty of a conclusion and its specificity. It is an attempt to use Dempster-Shafer interpretation of the HCPRs for the quantification to discover ...Show More