Divya Kapil | Graphic Era Hill University (original) (raw)
Papers by Divya Kapil
International Journal of Recent Technology and Engineering, 2020
Machine Learning is empowering many aspects of day-to-day lives from filtering the content on soc... more Machine Learning is empowering many aspects of day-to-day lives from filtering the content on social networks to suggestions of products that we may be looking for. This technology focuses on taking objects as image input to find new observations or show items based on user interest. The major discussion here is the Machine Learning techniques where we use supervised learning where the computer learns by the input data/training data and predict result based on experience. We also discuss the machine learning algorithms: Naïve Bayes Classifier, K-Nearest Neighbor, Random Forest, Decision Tress, Boosted Trees, Support Vector Machine, and use these classifiers on a dataset Malgenome and Drebin which are the Android Malware Dataset. Android is an operating system that is gaining popularity these days and with a rise in demand of these devices the rise in Android Malware. The traditional techniques methods which were used to detect malware was unable to detect unknown applications. We ha...
Green Internet of Things for Smart Cities, 2021
Lecture notes in networks and systems, 2023
INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)
Agile is a method that moves quickly, lightly, and approachable in developing a software process.... more Agile is a method that moves quickly, lightly, and approachable in developing a software process. The primary goal of agile methodology is to produce high-quality software in a quicker time. It is using this methodology for developing the Academic Resource in a system provided by software for maintaining academic and financial records of data efficiently and conveniently. The administration of any academic association must make records of students registered and the staff of the university on paper and keep them safe, which is a tedious task due to the increase in manual work that reduced the utilization of the efficiency of staff. This paper describes a systematic approach to developing a user-friendly, flexible, and easy-to-maintain environment for academic resources using agile's extreme programming. The execution of the different tasks to develop the system is used to widen the horizons in Agile Methodologies step by step.
International Journal of Engineering and Advanced Technology, 2020
Today Internet technology has become an essential part of our life for education, entertainment, ... more Today Internet technology has become an essential part of our life for education, entertainment, gaming, banking and communication. In this modern digital era, it is very easy to have any information by one click. But everything which has pros and cons, as we have any information at our tips but Internet is an attack platform also. When we use Internet to make our work easy same time many attacker try to steal information from our system. There are many means for attacking, malicious URL one of them. When a user visits a website, which is malicious then it triggers a malicious activity which is predesigned. Hence, there are various approaches to find dangerous URL on the Internet. In this paper, we are using machine learning approach to detect malicious URLs. We used ISCXURL2016 dataset and used J48, Random forest, Lazy algorithm and Bayes net classifiers. As performance metrics, we calculate accuracy, TPR, FPR, precision and recall.
International Journal of Recent Technology and Engineering (IJRTE), 2020
Reuse is the elementary and essential attribute of the component-based software engineering. Reus... more Reuse is the elementary and essential attribute of the component-based software engineering. Reusability focuses on building huge and complex software through assembling pre-fabricated software constructs. In this paper, our emphasis is on to analyze and quantify the two core notions of component-based software, that is, reusability and interaction behavior of the components with the goal of minimum complexity generation. We analyse prominent works available in the literature in the area of reuse and interaction complexities. We Analyze and Estimate reusability complexities of components in Component-Based Software Engineering and we propose efficient and useful metrics to compute the reusability of components. Reusability metrics are defined for individual components as well as overall system level. Different types of components are defined on the basis of their reusability, that is, components that can be reused as it as, and tailored components. To define the metrics we have used...
International journal of wireless and microwave technologies, Jun 8, 2022
International Journal of Wireless and Microwave Technologies
INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)
Computer technology has become a necessity in human's life in various areas like online education... more Computer technology has become a necessity in human's life in various areas like online education, financial sector, entertainment, communication, etc. But computer security is vulnerable due to malware, which are the codes to damage the computer system. Some primary tools can detect the malware, known as malware detectors, whose quality depends on the techniques used in detectors. Malware analysis is the method of investigating the intention and practicality of the samples of malware like a worm, virus, trojan horse, etc. Static, dynamic, and hybrid approaches are used for malware analysis by various researchers. The machine learning techniques are most popular that employ these approaches. The machine learning approaches are also categorized as supervised, unsupervised, and reinforcement. Researchers employ one, two, or a blend of these approaches malware detection This research paper includes a study of these malware analysis techniques, and we analyze several machine learning algorithms and demonstrate the results obtained from the different machine learning algorithms. We compare outcomes of algorithms such as J48, Logistic Regression, and Random Forest. Moreover, we also employ a voting approach and show that Random Forest works better than other algorithms.
2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)
2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
We all know that this is a tough time of COVID-19 with which the whole world is fighting. It is a... more We all know that this is a tough time of COVID-19 with which the whole world is fighting. It is a virus that has taken many lives and affected the lack of people across the globe. It is a virus that is transmitted with close contact and droplet and is not airborne. The common symptoms include fever, cough, and fatigue. This paper focus on proposing a solution that can help detect the virus and keep people away from the infected person. The solution uses a Thermal Camera, which has a heat sensor and can detect any difference in temperature, and the camera can be integrated with access control systems in many places like Hospitals, Police stations, Factories, Universities, etc. which has staff walking in daily. The camera will not allow access to the person having high body temperature as fever is a symptom for COVID-19 and that person can be further examined for the virus. Many doctors are getting this infection while treating people, if we integrate such a solution then it can be easy to save the lives of many others up to an extent.
Virtualization technology allows abstraction and isolation of lower level functionalities and und... more Virtualization technology allows abstraction and isolation of lower level functionalities and underlying hardware. Virtual machine monitor, also called a hypervisor, which is a logical layer between underlying hardware and computational processes, and runs on the top of a given host. Virtualization provides facility to migrate virtual machine from one host (source) to another physical host (destination). Virtual Machine Migration is a useful tool for administrator of data centers. The reasons for VM migration are: Load Balancing, accomplished by migrating VMs out of overloaded / overheated servers, and Server Consolidation. Two major VM migration technologies are VMotion and XenMotion respectively supported by two major virtualization vendors-VMware and Citrix. In this paper we are comparing these two live virtual machine migration techniques.
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 2021
Nowadays, computer technology has become necessary in our day-to-day life in various aspects such... more Nowadays, computer technology has become necessary in our day-to-day life in various aspects such as communication, entertainment, education, banking, etc. In the digital era Network, security is essential, and the most challenging issue is identifying the intrusion attacks. An intrusion Detection System is a technique that monitors the network for anomalous activities and when these actions are discovered, then it generates an alert. An intrusion Detection System analyses big data due to heavy traffic and it protects data and computer networks from malicious actions. So, a fast and efficient classification technique is required to classify the normal and suspicious activities. For intrusion detection, various techniques have come into existence that leverage the machine learning approach. Various machine learning-based IDS techniques are described and categorized in this paper. Also, this research work presents a threat model in various networking layers. For experimental analysis, the NSL_KDD dataset are used and Naïve Bayes, Random forest, and J 48 classification algorithms are used and the results are shown for TPR, precision FPR, F-measure, recall parameters.
Journal of Cloud Computing, 2017
Virtualization techniques effectively handle the growing demand for computing, storage, and commu... more Virtualization techniques effectively handle the growing demand for computing, storage, and communication resources in large-scale Cloud Data Centers (CDC). It helps to achieve different resource management objectives like load balancing, online system maintenance, proactive fault tolerance, power management, and resource sharing through Virtual Machine (VM) migration. VM migration is a resource-intensive procedure as VM's continuously demand appropriate CPU cycles, cache memory, memory capacity, and communication bandwidth. Therefore, this process degrades the performance of running applications and adversely affects efficiency of the data centers, particularly when Service Level Agreements (SLA) and critical business objectives are to be met. Live VM migration is frequently used because it allows the availability of application service, while migration is performed. In this paper, we make an exhaustive survey of the literature on live VM migration and analyze the various proposed mechanisms. We first classify the types of Live VM migration (single, multiple and hybrid). Next, we categorize VM migration techniques based on duplication mechanisms (replication, de-duplication, redundancy, and compression) and awareness of context (dependency, soft page, dirty page, and page fault) and evaluate the various Live VM migration techniques. We discuss various performance metrics like application service downtime, total migration time and amount of data transferred. CPU, memory and storage data is transferred during the process of VM migration and we identify the category of data that needs to be transferred in each case. We present a brief discussion on security threats in live VM migration and categories them in three different classes (control plane, data plane, and migration module). We also explain the security requirements and existing solutions to mitigate possible attacks. Specific gaps are identified and the research challenges in improving the performance of live VM migration are highlighted. The significance of this work is that it presents the background of live VM migration techniques and an in depth review which will be helpful for cloud professionals and researchers to further explore the challenges and provide optimal solutions.
2017 International Conference on Green Informatics (ICGI), 2017
The computational world has become very large and complex. Cloud is an emerging technology in the... more The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation and live migration. In this paper we present an overview of cloud computing and also describe about its key technology "virtualization". We are also presenting research challenges in cloud computing.
2013 International Conference on Cloud Computing and Big Data, 2013
The rise of cloud computing has been driven by the benefits, the cheapest purveyor of application... more The rise of cloud computing has been driven by the benefits, the cheapest purveyor of application hosting, storage, infrastructure, huge cost savings with low initial investment, elasticity and scalability, ease of adoption, operational efficiency, on-demand resources, and the use of equipment that is largely abstracted from the user and enterprise and how the virtualization has changed the foundation of computing. In other terms the virtualization is the process that turns the hardware bound entity in to software based component and the end result comes in to the form of VM. Current virtualization software supports transparent VM migration between physical servers on the same LAN but WAN migration remains a challenge due to the need for network reconfiguration and storage migration. With this paper our main concern is to present the virtual machine portability (VMP) is one of the most important futuristic aspects of Virtual machine migration, the term VMP requires that cloud customers can keep their VM including the prefix-when migrate from one cloud services provider to another avoiding the costs of switching to new VM configuration.
Virtualization technology was invented to maximize the utilization of hardware resource by IBM in... more Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide service. It splits up a physical machine into several virtual machines. A virtual machine can be defined as, “It is a software implementation of a computing environment in which an operating system or application can be installed and run. As hardware cost went down, the need for virtualization faded out. More recently, virtualization become important again to improve availability, security, cost reducing, reliability and flexibility. This paper describes Virtualization technology concept. And also a case study on live virtual machine migration is used to explain the points. Keywords— Virtualization, Virtual machine, Live virtual machine migration, cloud computing
2013 3rd IEEE International Advance Computing Conference (IACC), 2013
Cloud is an emerging technology in the world of information technology and is built on the key co... more Cloud is an emerging technology in the world of information technology and is built on the key concept of virtualization. Virtualization separates hardware from software and has benefits of server consolidation and live migration. Live migration is a useful tool for migrating OS instances across distant physical of data centers and clusters. It facilitates load balancing, fault management, low-level system maintenance and reduction in energy consumption. In this paper, we survey the major issues of virtual machine live migration. We discuss how the key performance metrics e.g downtime, total migration time and transferred data are affected when a live virtual machine is migrated over WAN, with heavy workload or when VMs are migrated together. We classify the techniques and compare the various techniques in a particular class.
International Journal of Recent Technology and Engineering
Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics... more Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics and pandemics. Despite the advances in medication and drugs , virus generated infectious diseases are one of the main reason behind death worldwide, particularly in low-income countries .Machine learning and computing are widely utilized in diagnose certain types of cancer from imaging knowledge/data and also in other clinical imaging data based diseases. This paper aims to investigate and compare machine learning classifiers for Ebola Virus Disease. The Kaggle data set for Ebola Virus diseases, containing 2486 instances, has been used as the database for the training and testing. For experimental analysis, we use Naïve Bayes, Random forest, and J 48 classification algorithms and show the results for TPR, precision FPR, F-measure, recall and ROC curve.
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)
International Journal of Recent Technology and Engineering, 2020
Machine Learning is empowering many aspects of day-to-day lives from filtering the content on soc... more Machine Learning is empowering many aspects of day-to-day lives from filtering the content on social networks to suggestions of products that we may be looking for. This technology focuses on taking objects as image input to find new observations or show items based on user interest. The major discussion here is the Machine Learning techniques where we use supervised learning where the computer learns by the input data/training data and predict result based on experience. We also discuss the machine learning algorithms: Naïve Bayes Classifier, K-Nearest Neighbor, Random Forest, Decision Tress, Boosted Trees, Support Vector Machine, and use these classifiers on a dataset Malgenome and Drebin which are the Android Malware Dataset. Android is an operating system that is gaining popularity these days and with a rise in demand of these devices the rise in Android Malware. The traditional techniques methods which were used to detect malware was unable to detect unknown applications. We ha...
Green Internet of Things for Smart Cities, 2021
Lecture notes in networks and systems, 2023
INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)
Agile is a method that moves quickly, lightly, and approachable in developing a software process.... more Agile is a method that moves quickly, lightly, and approachable in developing a software process. The primary goal of agile methodology is to produce high-quality software in a quicker time. It is using this methodology for developing the Academic Resource in a system provided by software for maintaining academic and financial records of data efficiently and conveniently. The administration of any academic association must make records of students registered and the staff of the university on paper and keep them safe, which is a tedious task due to the increase in manual work that reduced the utilization of the efficiency of staff. This paper describes a systematic approach to developing a user-friendly, flexible, and easy-to-maintain environment for academic resources using agile's extreme programming. The execution of the different tasks to develop the system is used to widen the horizons in Agile Methodologies step by step.
International Journal of Engineering and Advanced Technology, 2020
Today Internet technology has become an essential part of our life for education, entertainment, ... more Today Internet technology has become an essential part of our life for education, entertainment, gaming, banking and communication. In this modern digital era, it is very easy to have any information by one click. But everything which has pros and cons, as we have any information at our tips but Internet is an attack platform also. When we use Internet to make our work easy same time many attacker try to steal information from our system. There are many means for attacking, malicious URL one of them. When a user visits a website, which is malicious then it triggers a malicious activity which is predesigned. Hence, there are various approaches to find dangerous URL on the Internet. In this paper, we are using machine learning approach to detect malicious URLs. We used ISCXURL2016 dataset and used J48, Random forest, Lazy algorithm and Bayes net classifiers. As performance metrics, we calculate accuracy, TPR, FPR, precision and recall.
International Journal of Recent Technology and Engineering (IJRTE), 2020
Reuse is the elementary and essential attribute of the component-based software engineering. Reus... more Reuse is the elementary and essential attribute of the component-based software engineering. Reusability focuses on building huge and complex software through assembling pre-fabricated software constructs. In this paper, our emphasis is on to analyze and quantify the two core notions of component-based software, that is, reusability and interaction behavior of the components with the goal of minimum complexity generation. We analyse prominent works available in the literature in the area of reuse and interaction complexities. We Analyze and Estimate reusability complexities of components in Component-Based Software Engineering and we propose efficient and useful metrics to compute the reusability of components. Reusability metrics are defined for individual components as well as overall system level. Different types of components are defined on the basis of their reusability, that is, components that can be reused as it as, and tailored components. To define the metrics we have used...
International journal of wireless and microwave technologies, Jun 8, 2022
International Journal of Wireless and Microwave Technologies
INTERNATIONAL SCIENTIFIC AND PRACTICAL CONFERENCE “TECHNOLOGY IN AGRICULTURE, ENERGY AND ECOLOGY” (TAEE2022)
Computer technology has become a necessity in human's life in various areas like online education... more Computer technology has become a necessity in human's life in various areas like online education, financial sector, entertainment, communication, etc. But computer security is vulnerable due to malware, which are the codes to damage the computer system. Some primary tools can detect the malware, known as malware detectors, whose quality depends on the techniques used in detectors. Malware analysis is the method of investigating the intention and practicality of the samples of malware like a worm, virus, trojan horse, etc. Static, dynamic, and hybrid approaches are used for malware analysis by various researchers. The machine learning techniques are most popular that employ these approaches. The machine learning approaches are also categorized as supervised, unsupervised, and reinforcement. Researchers employ one, two, or a blend of these approaches malware detection This research paper includes a study of these malware analysis techniques, and we analyze several machine learning algorithms and demonstrate the results obtained from the different machine learning algorithms. We compare outcomes of algorithms such as J48, Logistic Regression, and Random Forest. Moreover, we also employ a voting approach and show that Random Forest works better than other algorithms.
2022 International Conference on Computational Intelligence and Sustainable Engineering Solutions (CISES)
2021 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence)
We all know that this is a tough time of COVID-19 with which the whole world is fighting. It is a... more We all know that this is a tough time of COVID-19 with which the whole world is fighting. It is a virus that has taken many lives and affected the lack of people across the globe. It is a virus that is transmitted with close contact and droplet and is not airborne. The common symptoms include fever, cough, and fatigue. This paper focus on proposing a solution that can help detect the virus and keep people away from the infected person. The solution uses a Thermal Camera, which has a heat sensor and can detect any difference in temperature, and the camera can be integrated with access control systems in many places like Hospitals, Police stations, Factories, Universities, etc. which has staff walking in daily. The camera will not allow access to the person having high body temperature as fever is a symptom for COVID-19 and that person can be further examined for the virus. Many doctors are getting this infection while treating people, if we integrate such a solution then it can be easy to save the lives of many others up to an extent.
Virtualization technology allows abstraction and isolation of lower level functionalities and und... more Virtualization technology allows abstraction and isolation of lower level functionalities and underlying hardware. Virtual machine monitor, also called a hypervisor, which is a logical layer between underlying hardware and computational processes, and runs on the top of a given host. Virtualization provides facility to migrate virtual machine from one host (source) to another physical host (destination). Virtual Machine Migration is a useful tool for administrator of data centers. The reasons for VM migration are: Load Balancing, accomplished by migrating VMs out of overloaded / overheated servers, and Server Consolidation. Two major VM migration technologies are VMotion and XenMotion respectively supported by two major virtualization vendors-VMware and Citrix. In this paper we are comparing these two live virtual machine migration techniques.
2021 International Conference on Artificial Intelligence and Smart Systems (ICAIS), 2021
Nowadays, computer technology has become necessary in our day-to-day life in various aspects such... more Nowadays, computer technology has become necessary in our day-to-day life in various aspects such as communication, entertainment, education, banking, etc. In the digital era Network, security is essential, and the most challenging issue is identifying the intrusion attacks. An intrusion Detection System is a technique that monitors the network for anomalous activities and when these actions are discovered, then it generates an alert. An intrusion Detection System analyses big data due to heavy traffic and it protects data and computer networks from malicious actions. So, a fast and efficient classification technique is required to classify the normal and suspicious activities. For intrusion detection, various techniques have come into existence that leverage the machine learning approach. Various machine learning-based IDS techniques are described and categorized in this paper. Also, this research work presents a threat model in various networking layers. For experimental analysis, the NSL_KDD dataset are used and Naïve Bayes, Random forest, and J 48 classification algorithms are used and the results are shown for TPR, precision FPR, F-measure, recall parameters.
Journal of Cloud Computing, 2017
Virtualization techniques effectively handle the growing demand for computing, storage, and commu... more Virtualization techniques effectively handle the growing demand for computing, storage, and communication resources in large-scale Cloud Data Centers (CDC). It helps to achieve different resource management objectives like load balancing, online system maintenance, proactive fault tolerance, power management, and resource sharing through Virtual Machine (VM) migration. VM migration is a resource-intensive procedure as VM's continuously demand appropriate CPU cycles, cache memory, memory capacity, and communication bandwidth. Therefore, this process degrades the performance of running applications and adversely affects efficiency of the data centers, particularly when Service Level Agreements (SLA) and critical business objectives are to be met. Live VM migration is frequently used because it allows the availability of application service, while migration is performed. In this paper, we make an exhaustive survey of the literature on live VM migration and analyze the various proposed mechanisms. We first classify the types of Live VM migration (single, multiple and hybrid). Next, we categorize VM migration techniques based on duplication mechanisms (replication, de-duplication, redundancy, and compression) and awareness of context (dependency, soft page, dirty page, and page fault) and evaluate the various Live VM migration techniques. We discuss various performance metrics like application service downtime, total migration time and amount of data transferred. CPU, memory and storage data is transferred during the process of VM migration and we identify the category of data that needs to be transferred in each case. We present a brief discussion on security threats in live VM migration and categories them in three different classes (control plane, data plane, and migration module). We also explain the security requirements and existing solutions to mitigate possible attacks. Specific gaps are identified and the research challenges in improving the performance of live VM migration are highlighted. The significance of this work is that it presents the background of live VM migration techniques and an in depth review which will be helpful for cloud professionals and researchers to further explore the challenges and provide optimal solutions.
2017 International Conference on Green Informatics (ICGI), 2017
The computational world has become very large and complex. Cloud is an emerging technology in the... more The computational world has become very large and complex. Cloud is an emerging technology in the world of Information Technology. Cloud computing offers IT capabilities as services. Cloud based services are on demand, scalable, device independent and reliable. Cloud computing is built on the virtualization concept. Virtualization separates hardware from software and has benefits of server consolidation and live migration. In this paper we present an overview of cloud computing and also describe about its key technology "virtualization". We are also presenting research challenges in cloud computing.
2013 International Conference on Cloud Computing and Big Data, 2013
The rise of cloud computing has been driven by the benefits, the cheapest purveyor of application... more The rise of cloud computing has been driven by the benefits, the cheapest purveyor of application hosting, storage, infrastructure, huge cost savings with low initial investment, elasticity and scalability, ease of adoption, operational efficiency, on-demand resources, and the use of equipment that is largely abstracted from the user and enterprise and how the virtualization has changed the foundation of computing. In other terms the virtualization is the process that turns the hardware bound entity in to software based component and the end result comes in to the form of VM. Current virtualization software supports transparent VM migration between physical servers on the same LAN but WAN migration remains a challenge due to the need for network reconfiguration and storage migration. With this paper our main concern is to present the virtual machine portability (VMP) is one of the most important futuristic aspects of Virtual machine migration, the term VMP requires that cloud customers can keep their VM including the prefix-when migrate from one cloud services provider to another avoiding the costs of switching to new VM configuration.
Virtualization technology was invented to maximize the utilization of hardware resource by IBM in... more Virtualization technology was invented to maximize the utilization of hardware resource by IBM in 1960s. Virtualization is the abstraction of the physical resources needed to complete a request and underlying hardware used to provide service. It splits up a physical machine into several virtual machines. A virtual machine can be defined as, “It is a software implementation of a computing environment in which an operating system or application can be installed and run. As hardware cost went down, the need for virtualization faded out. More recently, virtualization become important again to improve availability, security, cost reducing, reliability and flexibility. This paper describes Virtualization technology concept. And also a case study on live virtual machine migration is used to explain the points. Keywords— Virtualization, Virtual machine, Live virtual machine migration, cloud computing
2013 3rd IEEE International Advance Computing Conference (IACC), 2013
Cloud is an emerging technology in the world of information technology and is built on the key co... more Cloud is an emerging technology in the world of information technology and is built on the key concept of virtualization. Virtualization separates hardware from software and has benefits of server consolidation and live migration. Live migration is a useful tool for migrating OS instances across distant physical of data centers and clusters. It facilitates load balancing, fault management, low-level system maintenance and reduction in energy consumption. In this paper, we survey the major issues of virtual machine live migration. We discuss how the key performance metrics e.g downtime, total migration time and transferred data are affected when a live virtual machine is migrated over WAN, with heavy workload or when VMs are migrated together. We classify the techniques and compare the various techniques in a particular class.
International Journal of Recent Technology and Engineering
Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics... more Diseases generated by viruses area unit transmitted, directly and indirectly will cause epidemics and pandemics. Despite the advances in medication and drugs , virus generated infectious diseases are one of the main reason behind death worldwide, particularly in low-income countries .Machine learning and computing are widely utilized in diagnose certain types of cancer from imaging knowledge/data and also in other clinical imaging data based diseases. This paper aims to investigate and compare machine learning classifiers for Ebola Virus Disease. The Kaggle data set for Ebola Virus diseases, containing 2486 instances, has been used as the database for the training and testing. For experimental analysis, we use Naïve Bayes, Random forest, and J 48 classification algorithms and show the results for TPR, precision FPR, F-measure, recall and ROC curve.
2021 Thirteenth International Conference on Contemporary Computing (IC3-2021)