Search Results - "2022 OITS International Conference on Information Technology (OCIT)"

Refine Results
  1. 1

    Message from the General Chairs: OCIT 2022

    “…It is indeed a great pleasure to welcome all the participants to the temple city of Bhubaneswar, Odisha, India. The state of Odisha, which was known as Kalinga…”
    Get full text
    Conference Proceeding
  2. 2

    Edge Intelligence Based Mitigation of False Data Injection Attack In IoMT Framework by Sankepally, Sainath Reddy, Kosaraju, Nishoak, Reddy, Vishwambhar, Venkanna, U.

    “…IoMT is a networked infrastructure comprising services, software, hardware, and medical equipment. By removing the need for in-person visits, this type of…”
    Get full text
    Conference Proceeding
  3. 3

    A Reinforced Active Learning Sampling for Cybersecurity NER Data Annotation by Srivastava, Smita, Gupta, Deepa, Paul, Biswajit, Sahoo, Shubhashisa

    “…A vast majority of cybersecurity data comes in the form of unstructured textual data and needs to be annotated proficiently to train supervised machine…”
    Get full text
    Conference Proceeding
  4. 4

    A Framework of Customer Review Analysis Using the Aspect-Based Opinion Mining Approach by Dasgupta, Subhasis, Sen, Jaydip

    “…Opinion mining is the branch of computation that deals with opinions, appraisals, attitudes, and emotions of people and their different aspects. This field has…”
    Get full text
    Conference Proceeding
  5. 5

    An Adoptive Heart Disease Prediction Model using Machine Learning Approach by M, Chaitanya Datta, Senapati, Rajiv

    “…Cardiovascular disease also known as heart disease is commonly found among all the ages since many years. Prediction of this disease has become a critical task…”
    Get full text
    Conference Proceeding
  6. 6

    Transformer Based Technique for High Resolution Image Restoration by Banik, Debajyoty, Pal, Sangsaptak, Naskar, M. Nazma B., Bandyopadhyay, Anjan

    “…Due to the difficulty of the problem, there have been many different approaches and algorithms developed to date. Defocus deblurring, single image motion…”
    Get full text
    Conference Proceeding
  7. 7

    VocabGCN-BERT: A Hybrid Model to Classify Disaster Related Tweets by Ranjan Paul, Nayan, Sahoo, Deepak, Chandra Balabantaray, Rakesh

    “…When it comes to classifying tweets about disasters, Deep Neural Network-based models have shown great potential over conventional machine learning models. In…”
    Get full text
    Conference Proceeding
  8. 8

    PharmaChain 3.0: Blockchain Integrated Efficient QR Code Mechanism for Pharmaceutical Supply Chain by Bapatla, Anand Kumar, Mohanty, Saraju P., Kougianos, Elias, Puthal, Deepak

    “…Because of globalization, many different entities distributed across the locations were able to work together and achieve the availability of services even at…”
    Get full text
    Conference Proceeding
  9. 9

    iHELM:An IoT-Based Smart Helmet for Real-time Motorbike Accident Detection and Emergency Healthcare Services by Tiwari, Vipulesh, Das, Debanjan

    “…Road accidents are a cause of significant cause of death and morbidity around the globe. In extreme cases, they often result in property damage, severe injury,…”
    Get full text
    Conference Proceeding
  10. 10

    eSeiz 2.0: An IoMT Framework for Accurate Low-Latency Seizure Detection using Pulse Exclusion Mechanism by Sayeed, Md Abu, Nasrin, Fatahia, Mohanty, Saraju P., Kougianos, Elias

    “…Epilepsy is a neurological disorder marked by recurrent seizures. At least 3 million Americans and 1% of the global population have epilepsy, requiring a…”
    Get full text
    Conference Proceeding
  11. 11

    A YCbCr Model Based Shadow Detection and Removal Approach On Camouflaged Images by Padhy, Isha, Kanungo, Priyadarshi, Sahoo, Sampa

    “…A shadow in an image can disturb the actual outcome in computer vision and pattern recognition applications. The reason is that the shadow will act as an…”
    Get full text
    Conference Proceeding
  12. 12

    Software Fault Prediction Using Machine Learning Models by Kundu, Ayushi, Dutta, Priyanka, Ranjit, Kunal, Bidyadhar, Sthitaprajna, Gourisaria, Mahendra Kumar, Das, Himansu

    “…In recent years, computers have great role to the society for their reliability which becoms a key essential in day to day life. The role of software and its…”
    Get full text
    Conference Proceeding
  13. 13

    Somali Extractive Text Summarization by Seid, Ahmed Iman, Abdisalan, Abdiqani Abdullahi, Abdulahi, Mustafe Mohamed, Parida, Shantipriya, Dash, Satya Ranjan

    “…Somali is an Afro-asiatic language of the Cushitic family. Somali is one the most spoken languages in the Horn of Africa. It is the national language of…”
    Get full text
    Conference Proceeding
  14. 14

    Human Activity Recognition based on Stacked Autoencoder with Complex Background Conditions by Das, Aparajita, Saikia, Navajit, Rajbongshi, Subhash Ch, Sarma, Kandarpa Kumar

    “…Human activity recognition is one of the prime focus areas of computer vision having a range of current and evolving applications in the real-world environment…”
    Get full text
    Conference Proceeding
  15. 15

    Reverse ETL for Improved Scalability, Observability, and Performance of Modern Operational Analytics - A Comparative Review by Dash, Bibhu, Swayamsiddha, Swati

    “…We are on the verge of the Fourth Industrial revolution, in which data analytics and industry insights will play a critical role in data-driven, quicker, and…”
    Get full text
    Conference Proceeding
  16. 16

    Classification model for heart disease prediction using correlation and feature selection techniques by Patro, Sibo Prasad, Padhy, Neelamadhab, Sah, Rahul Deo

    “…Accurate analysis and prediction for real-time heart disease are highly significant. Many medical diagnosis difficulties have a class imbalance because the…”
    Get full text
    Conference Proceeding
  17. 17

    Using of Machine Learning Techniques to detect Credit Card Frauds by Gupta, Yogesh

    “…Today is the era of digital money and the government is also promoting it to reduce corruption. People tend to use ATM cards and various credit cards for…”
    Get full text
    Conference Proceeding
  18. 18

    Compound sentence and pronoun generation in Sanyog: An Iconic Communication System for People with Speech and Motor Impairments by Chatterjee, Pinaki Sankar

    “…Serious Speech and Motor Impairment (SSMI) affects a sizeable portion of the Indian population. They are unable to communicate normally because of their…”
    Get full text
    Conference Proceeding
  19. 19

    Fast Image Convolution and Pattern Recognition using Vedic Mathematics on Field Programmable Gate Arrays (FPGAs) by Nayak, Jagadish, Kaje, Smitha Bhat

    “…A major part of image processing involves convolution process. The pattern recognition techniques which are implemented through Convolutional Neural Networks…”
    Get full text
    Conference Proceeding
  20. 20

    Deadline-Sensitive Workflow Scheduling With On-Demand and Spot Instances in the Cloud by Tarafdar, Anurina, Das, Rajib K, Khatua, Sunirmal

    “…Due to the scalable and pay-per-use nature of Cloud computing, more and more users are deploying their workflow applications in the Cloud. Proper scheduling of…”
    Get full text
    Conference Proceeding