2 minute read

International Journal for Research in Applied Science & Engineering Technology (IJRASET)

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538

Volume 11 Issue I Jan 2023- Available at www.ijraset.com

Advertisement

VI.ACKNOWLEDGMENT

I would like to convey my heartfelt appreciation to my supervisor, Er. Ravinder Pal singh, Technical Head, Department of Research, Innovation and Incubation and Dr. Monika Mehra, Professor, Department of Electronics and Communication Engineering at RIMT University Mandi Gobindgarh for launching an engaging project, their dedication, stimulating debate and valuable advice. They have been a constant source of encouragement and useful direction and oversight throughout the project.

References

[1] S. Bhattacharya, and A. Singh, “Why the tremendous potential of uploading health educational material on medical institutions’ websites remains grossly underutilized in the era of the Fourth Industrial Revolution?,” J. Educ. Health Promot., vol. 9, 2020.

[2] J. Lathrop, and B. Ezell, “A systems approach to risk analysis validation for risk management,” Saf. Sci., vol. 99, pp.187-195, 2017.

[3] C.A. MacKenzie, K. Barker, and J.R. Santos, “Modeling a severe supply chain disruption and post-disaster decision making with application to the Japanese earthquake and tsunami,” IIE Trans., vol. 46, no. 12, pp.1243-1260, 2014.

[4] H. Miller, and K. Matussek, “VW executive tally in diesel scandal grows with Stadler arrest.” Automotive News. (2018, June 18).

[5] R. Nateghi, and T. Aven, “Risk analysis in the age of big data: The promises and pitfalls,” Risk Anal., vol. 41, no. 10, pp.1751-1758, 2021.

[6] A. Bilen, and A.B. Özer, “Cyber-attack method and perpetrator prediction using machine learning algorithms,” PeerJ Comput. Sci., vol. 7, p.e475, 2021.

[7] T. Ring, “Connected cars–the next target for hackers,” Netw. Secure., vol. 11, pp.11-16, 2015.

[8] D.E. Sanger, and N. Perlroth, “Pipeline attack yields urgent lessons about US cybersecurity,” The New York Times, 2021.

[9] M.U. Scherer, “Regulating artificial intelligence systems: Risks, challenges, competencies, and strategies,” Harv. JL & Tech., vol. 29, p.353, 2015.

[10] L. De Haan, and A. Ferreira, “Extreme value theory: an introduction,” Springer Science & Business Media, 2007.

[11] B.M. de Silva, D.M. Higdon, S.L. Brunton, and J.N. Kutz, “Discovery of physics from data: universal laws and discrepancies,” Front. Artif. Intell., vol. 3, p.25, 2020.

[12] D. Eisenberg, T. Seager, and D.L. Alderson, “Rethinking resilience analytics,” Risk Anal., vol. 39, no. 9, pp.1870-1884, 2019.

[13] Graham, B, Bond, R., Quinn, M. and Mulvenna, M., 2018. Using data mining to predict hospital admissions from the emergency department. IEEE Access, 6, pp.10458-10469

[14] R. Hajar, “Risk factors for coronary artery disease: historical perspectives,” Heart views: the official journal of the Gulf Heart Association, vol. 18, no. 3, p. 109, 2017.

[15] A.U. Haq, J.P. Li, M.H. Memon, S. Nazir, and R. Sun, “A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms,” Mob Inf Syst , pp. 1-21, 2018.

[16] K. He, D. Ge, and M. He, “Big data analytics for genomic medicine,” Int. J. Mol. Sci., vol. 18, no. 2, p. 412, 2017.

[17] N.G. Hedeshi, and M.S. Abadeh, “Coronary artery disease detection using a fuzzy-boosting PSO approach,” Comput. Intell. Neurosci., vol. 6, pp. 1-12, 2014

[18] K. Foy, “With lidar and artificial intelligence, road status clears up after a disaster.” MIT News. https://news.mit.edu/2020/lidarand-ai-road-status-clears-afterdisaster-0415, (2020, April 21).

[19] Y. Gil, and B. Selman, “A 20-year community roadmap for artificial intelligence research in the US.” arXiv preprint arXiv:1908.02624, 2019

[20] G. Chandrashekar, and F. Sahin, “A survey on feature selection methods,” Comput. Electr. Eng., vol. 40, no. 1, pp. 16-28, 2014

[21] N.V. Chawla, and D.A. Davis, “Bringing big data to personalized healthcare: A patient-centered framework,” J. Gen. Intern. Med., vol. 28, no. 3, pp. 660–665, 2013.

[22] N.A. Greenblatt, “Self-driving cars and the law.” IEEE Spectrum, vol. 53, no. 2, pp. 46–51, 2016

[23] B. Shneiderman, “Why algorithms urgently need independent oversight.” Proceedings of the National Academy of Sciences, vol. 113, no. 48, pp. 13538–13540, 2016.

[24] S.A. Bini, “Artificial intelligence, machine learning, deep learning, and cognitive computing: What do these terms mean and how will they impact health care?” J Arthroplasty, vol. 33, no. 8, pp. 2358– 2361, 2018

About the authors

Kamal Lekhak Department of Electronics and Communication Engineering, RIMT University, Mandi Gobindgarh, Punjab

This article is from: