Alternate Medicine Recommendation
On the Internet, where the number of choices is overwhelming, there is a need to filter, prioritize and efficiently deliver relevant information to alleviate the problem of information overload, which has created a potential problem for many Internet users. Alternate Medicine System solves this problem by searching through a large volume of medical information to provide users with filters and services. This project explores the different characteristics and potentials of different recommendation techniques in recommendation systems to serve as a compass for research and practice in the field of medical recommendation systems. In this project, we have used a dataset over 100+ medicines from different companies and brands to do recommendation based on the content of medicine and then filter it based on rating and cost-based analysis. Through experimental results, we have found that more than 95% of the medicines have a lower cost based alternative available with a higher rating.
Published by: Roshani R. Zamare, Shital P. Dhok, Sampada V. Babhulkar, Richa S. Singh, Jayshri G. Marbade, Nayan D. Bawane, Abhishek M. Shukla
Author: Roshani R. Zamare
Paper ID: V6I3-1621
Paper Status: published
Published: June 26, 2020
Optimized social media customer support using machine learning with AWS
The rising popularity of social media communication can be witnessed everywhere. Not only individuals but companies too have noticed the importance of communication via social media and persist. Associations between customers and companies can be seen via social media. Customers might choose to publicize their opinions about a service or product via social media. Twitter is exceptionally used for is such cases. In this paper, we will exhibit how everyday customers are publicizing their items or taking the criticism for their items utilizing Web-based social networking systems like Twitter. In this procedure, the framework will consumer messages (tweets) and apply machine learning techniques (SVM, Porter stemming) to analyze the nature of the tweet via sentiment analysis. The results will be shown as tweets regarding positive, negative. We likewise will provide an automated response to the tweet (if found negative) and forward the message contents to the customer care email client for quick analysis and explicit response.
Published by: Supreeth Basabattini, N. Nikitha, Risita Kumar, Mathiyalagan R.
Author: Supreeth Basabattini
Paper ID: V6I3-1611
Paper Status: published
Published: June 26, 2020
Review paper on the behavior of RC structure subjected blast load
As we know that nowadays the increase in the number of terrorist attacks especially in the last few years has shown the effect of blast load on buildings is a serious matter that should be taken into consideration in the design process. Although these kinds of attacks are exceptional cases, man-made disasters; blast loads are in fact dynamic loads that need to be carefully calculated just like earthquakes and wind loads. In that I have calculated the blast load manually by using IS code 4991-1968 and the analysis is carried out in multi-storeyed building by using STADD-Pro Software.
Published by: Diksha Menghare, Raju Bondre
Author: Diksha Menghare
Paper ID: V6I3-1608
Paper Status: published
Published: June 26, 2020
Women’s mental health as a part of health and well-being in women and sustainable development
One among’ women and sustainable development’ goal is health and wellbeing, and also the term health, WHO states health as “a state of complete physical, mental and social wellbeing and not merely the absence of disease or infirmity”. Health is one of the highest things people say matters to wellbeing, both physical health and psychological state can influence wellbeing. The effect of wellbeing on health is substantial and admires other risk factors more traditionally targeted by public health like a healthy diet. Wellbeing and psychological state are correlated with depression and anxiety, which are related to low levels of wellbeing. Psychological state and wellbeing are independent dimensions; the psychological state is not simply the other of psychological state. We will easily find a someone’ with a mental disorder; while discussing women sustainable development in India, there are some programs through health like SARTHI, and PHC to supply proper enhancement and physiological state to those in need, based upon researchers objectives we must always create and supply awareness about the importance of health and women’s psychological state among adolescents and every other through the general public health centers, schools, colleges and then, but initially Social workers and sociologists can do their own contributions to the society like build up a correct knowledge and well awareness among their family.
Published by: Rehna K.
Author: Rehna K.
Paper ID: V6I3-1331
Paper Status: published
Published: June 26, 2020
Achieving Single Sign-On (SSO) using federated repositories
Application Server Agent (ASA) & Trust Association Interceptors(TAI) set up for Single Sign-On. ASA and TAI are critical parts when implementing Single Sign-On in a multiple federated Light Weight Directory Protocol’s environments. There needs to be a presence of web agents on the web servers to intercept the web requests and an ASA agent on the Application Servers to intercept the Application Server’s requests. Then you enable TAI on your Application Servers to intercept the requests and perform Single Sign-On. We need to understand the request flow to achieve a successful Single Sign-On authentication. The key to achieve SSO is to intercept the user requests and update the HTTP headers with LTPA or other authentication tokens from Application1 to successfully authenticate onto Application2. Single-Sign-On between any two or multiple systems can be achieved in a Federated repository configuration.
Published by: Mallikarjuna Akkinapalli
Author: Mallikarjuna Akkinapalli
Paper ID: V6I3-1609
Paper Status: published
Published: June 26, 2020
A survey on various encryption techniques
Cloud computing and social network change the way of healthcare by providing real-time data sharing in a cost-effective manner. Data sharing in the cloud is a technique that allows users to conveniently access data over the cloud. The data owner outsources their data in the cloud due to construction and the great conveniences provided by cloud services. The data owner is not able to control over their data, because the cloud service provider is a third-party provider. The main crisis with data sharing in the cloud is the privacy and security issues. Various techniques are available to support user privacy and secure data sharing. This paper focuses on various schemes to deal with secure data sharing such as identity-based encryption, proxy Re-encryption, ciphertext-PolicyAttributeBasedEncryptionandattributeBased Encryption.
Published by: Abymol Thankachan, Alpha Mathew
Author: Abymol Thankachan
Paper ID: V6I3-1600
Paper Status: published
Published: June 26, 2020