{"id":"https://openalex.org/W2810339578","doi":"https://doi.org/10.1515/jisys-2017-0353","title":"Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification","display_name":"Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification","publication_year":2018,"publication_date":"2018-06-29","ids":{"openalex":"https://openalex.org/W2810339578","doi":"https://doi.org/10.1515/jisys-2017-0353","mag":"2810339578"},"language":"en","primary_location":{"id":"doi:10.1515/jisys-2017-0353","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0353","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1515/jisys-2017-0353","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085794755","display_name":"Kiran Tangod","orcid":"https://orcid.org/0000-0002-8889-5878"},"institutions":[{"id":"https://openalex.org/I4400573169","display_name":"KLS Gogte Institute of Technology","ror":"https://ror.org/04ytecw04","country_code":null,"type":"education","lineage":["https://openalex.org/I4400573169"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kiran Tangod","raw_affiliation_strings":["Department of Information Science and Engineering , Gogte Institute of Technology , Belagavi, Karnataka , India"],"affiliations":[{"raw_affiliation_string":"Department of Information Science and Engineering , Gogte Institute of Technology , Belagavi, Karnataka , India","institution_ids":["https://openalex.org/I4400573169"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027809572","display_name":"Gururaj Kulkarni","orcid":null},"institutions":[{"id":"https://openalex.org/I106826634","display_name":"Jain University","ror":"https://ror.org/01cnqpt53","country_code":"IN","type":"education","lineage":["https://openalex.org/I106826634"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Gururaj Kulkarni","raw_affiliation_strings":["Department of Electrical and Electronics Engineering , Jain College of Engineering , Belagavi, Karnataka , India"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Electronics Engineering , Jain College of Engineering , Belagavi, Karnataka , India","institution_ids":["https://openalex.org/I106826634"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085794755"],"corresponding_institution_ids":["https://openalex.org/I4400573169"],"apc_list":{"value":1000,"currency":"EUR","value_usd":1078},"apc_paid":{"value":1000,"currency":"EUR","value_usd":1078},"fwci":0.3258,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.66667571,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"29","issue":"1","first_page":"703","last_page":"718"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9513000249862671,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11652","display_name":"Imbalanced Data Classification Techniques","score":0.9513000249862671,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9370999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9291999936103821,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7864492535591125},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7342127561569214},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4517594277858734},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4255774915218353},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3483961224555969},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.33392074704170227},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.32212167978286743},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3141672611236572},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.12404027581214905}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864492535591125},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7342127561569214},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4517594277858734},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4255774915218353},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3483961224555969},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.33392074704170227},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.32212167978286743},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3141672611236572},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.12404027581214905}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1515/jisys-2017-0353","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0353","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3be145ddbfaa41c89092576cf6e90bd5","is_oa":true,"landing_page_url":"https://doaj.org/article/3be145ddbfaa41c89092576cf6e90bd5","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Intelligent Systems, Vol 29, Iss 1, Pp 703-718 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1515/jisys-2017-0353","is_oa":true,"landing_page_url":"https://doi.org/10.1515/jisys-2017-0353","pdf_url":null,"source":{"id":"https://openalex.org/S2764846071","display_name":"Journal of Intelligent Systems","issn_l":"0334-1860","issn":["0334-1860","2191-026X"],"is_oa":false,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310315148","host_organization_name":"IlmuKomputer.Com","host_organization_lineage":["https://openalex.org/P4310315148"],"host_organization_lineage_names":["IlmuKomputer.Com"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1547999364","https://openalex.org/W1775722790","https://openalex.org/W2063870188","https://openalex.org/W2112858117","https://openalex.org/W2414590172","https://openalex.org/W2476259321","https://openalex.org/W2487594728","https://openalex.org/W2496778132","https://openalex.org/W2505553217","https://openalex.org/W2506912400","https://openalex.org/W2509983793","https://openalex.org/W2510464330","https://openalex.org/W2510972545","https://openalex.org/W2516099913","https://openalex.org/W2517165909","https://openalex.org/W2523088067","https://openalex.org/W2586626562","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W3194244812","https://openalex.org/W2940359311","https://openalex.org/W2937485214","https://openalex.org/W3022075301","https://openalex.org/W3047501180","https://openalex.org/W2495427949","https://openalex.org/W4289767914","https://openalex.org/W2952130398","https://openalex.org/W2766938955","https://openalex.org/W2757375063"],"abstract_inverted_index":{"Abstract":[0],"The":[1,125,145],"main":[2],"objective":[3],"of":[4,47,62,85,103,127],"the":[5,45,48,54,60,77,91,94,100,104,116,119,122,128],"research":[6],"is":[7,131],"to":[8,98],"provide":[9],"a":[10],"multi-agent":[11],"data":[12],"mining":[13],"system":[14],"for":[15,22,121],"diagnosing":[16,23],"diabetes.":[17],"Here,":[18],"we":[19],"use":[20],"multi-agents":[21],"diabetes":[24,101],"such":[25],"as":[26],"user":[27,55,105],"agent,":[28,30,32,35],"connection":[29,49],"updation":[31],"and":[33,66,142],"security":[34],"in":[36,151],"which":[37],"each":[38],"agent":[39,117],"performs":[40],"their":[41],"own":[42],"task":[43],"under":[44],"coordination":[46],"agent.":[50],"For":[51],"secure":[52],"communication,":[53],"symptoms":[56],"are":[57,80],"encrypted":[58,92],"with":[59],"help":[61],"Elliptic":[63],"Curve":[64],"Cryptography":[65],"Optimal":[67,72],"Advanced":[68,73],"Encryption":[69,74],"Standard.":[70],"In":[71],"Standard":[75],"algorithm,":[76],"key":[78],"values":[79],"optimally":[81],"selected":[82],"by":[83,133],"means":[84],"differential":[86],"evaluation":[87],"algorithm.":[88,112],"After":[89],"receiving":[90],"data,":[93],"suggested":[95],"method":[96,147],"needs":[97],"find":[99],"level":[102],"through":[106],"multiple":[107],"kernel":[108],"support":[109],"vector":[110],"machine":[111],"Based":[113],"on":[114],"that,":[115],"prescribes":[118],"drugs":[120],"corresponding":[123],"user.":[124],"performance":[126],"proposed":[129,146],"technique":[130],"evaluated":[132],"classification":[134],"accuracy,":[135],"sensitivity,":[136],"specificity,":[137],"precision,":[138],"recall,":[139],"execution":[140],"time":[141],"memory":[143],"value.":[144],"will":[148],"be":[149],"implemented":[150],"JAVA":[152],"platform.":[153]},"counts_by_year":[{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-12-06T23:10:59.065948","created_date":"2025-10-10T00:00:00"}
