Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.002
Qazi Amaan, Satyam Priyam, Rohan Veerapaneni, Sudha Guru Priyanka, Vinodha K
Consumers prefer to order from apps/websites at their ease. The existing solutions have affected the local vendors by providing this ease to the customers. The authors have made a working O2O, B2B logistics system and a deployed web platform ready to deliver products at consumer's ease and provide an online presence for the vendors. OOLY is the proposed model that has remodelled the way people order, transfer items, and move by providing an online presence to the vendors. This review has proved that the Customers get local support from local vendors since the customer knows the shop/vendor. Findings have shown that the Local vendors with an online presence provide the trust for customers and transfer items at ease. The products get replaced at ease without the long existent processes. Authors have succeeded by providing an online presence for vendors and have improved customer satisfaction.
{"title":"Ooly instant logistics","authors":"Qazi Amaan, Satyam Priyam, Rohan Veerapaneni, Sudha Guru Priyanka, Vinodha K","doi":"10.1016/j.gltp.2022.04.002","DOIUrl":"10.1016/j.gltp.2022.04.002","url":null,"abstract":"<div><p>Consumers prefer to order from apps/websites at their ease. The existing solutions have affected the local vendors by providing this ease to the customers. The authors have made a working O2O, B2B logistics system and a deployed web platform ready to deliver products at consumer's ease and provide an online presence for the vendors. OOLY is the proposed model that has remodelled the way people order, transfer items, and move by providing an online presence to the vendors. This review has proved that the Customers get local support from local vendors since the customer knows the shop/vendor. Findings have shown that the Local vendors with an online presence provide the trust for customers and transfer items at ease. The products get replaced at ease without the long existent processes. Authors have succeeded by providing an online presence for vendors and have improved customer satisfaction.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 8-12"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000383/pdfft?md5=ef4694db97367dad247b35cc1cc4976b&pid=1-s2.0-S2666285X22000383-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78427154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-04DOI: 10.1016/j.gltp.2022.04.023
Balakrishna K, Rajesh N
Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.
{"title":"Design of remote monitored solar powered grasscutter robot with obstacle avoidance using IoT","authors":"Balakrishna K, Rajesh N","doi":"10.1016/j.gltp.2022.04.023","DOIUrl":"10.1016/j.gltp.2022.04.023","url":null,"abstract":"<div><p>Arduino UNO-based Solar powered Grasscutter designed to cut healthy grass in places like parks, hotels, public places, etc., The Grasscutter is designed through IoT (Internet of Things) technology, which is controlled remotely through Blynk application supported with Bluetooth module. The proposed model consists of hardware components like Arduino UNO, Solar panel, DC motor, motor driver, rechargeable batteries and Bluetooth module. The designed model is programmed through Arduino IDE to control the operation of the Grasscutter. The control mechanism and movements such as Forward movement, Backward movement, Right movement, Left movement, On mechanism, Off mechanism and Stop function for the Grasscutter prototype. An ultrasonic sensor connected to the head of the model avoids the system from colliding with obstacles while in movement.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 109-113"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000590/pdfft?md5=bc198baf89f540278d96b9d4cdb483eb&pid=1-s2.0-S2666285X22000590-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86627477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.024
Saleem S Tevaramani , Ravi J
The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.
{"title":"Image steganography performance analysis using discrete wavelet transform and alpha blending for secure communication","authors":"Saleem S Tevaramani , Ravi J","doi":"10.1016/j.gltp.2022.03.024","DOIUrl":"10.1016/j.gltp.2022.03.024","url":null,"abstract":"<div><p>The opportunities to exchange information in the current web era have risen. The increased popularity of the media has posed real challenges to security-related issues. Steganography is a technology for the secure exchange of information. A video, audio, or image intended to raise no suspicion may be the carrier. After concealing the secret information, steganography techniques produce an identical cover image. This will prevent outside observers from noticing the existence of secret information. In the proposed work, alpha is a scaling parameter. Cover and payload images of different types and dimensions, live images from a webcam, and predefined images of other formats have been normalized and preprocessed. A Haar Discrete Wavelet Transformation (DWT) is applied to both the cover and payload images. To generate a stego image, the payload image is encrypted and fused with the cover image. The result parameters such as PSNR, MSE, and Entropy are measured.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 208-214"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000309/pdfft?md5=66c93e7a2b156d6244b62ffa00cfb781&pid=1-s2.0-S2666285X22000309-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80650118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.030
Abhishek Sharma, Umesh Kumar Singh
Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing & hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.
{"title":"Modelling of smart risk assessment approach for cloud computing environment using AI & supervised machine learning algorithms","authors":"Abhishek Sharma, Umesh Kumar Singh","doi":"10.1016/j.gltp.2022.03.030","DOIUrl":"10.1016/j.gltp.2022.03.030","url":null,"abstract":"<div><p>Major backbone of today's competitive and upcoming market is definitely becoming Cloud computing & hence corporate utilize capabilities of cloud computing services. To improve security initiatives by cloud computing service or CRPs, novel types of tools and protocols finds themselves always in demand. In order to build comprehensive risk assessment methodology, extensive literature review was conducted to identify risk factors that may affect cloud computing adoption. In this context various risk factors were identified. After feature selection and identification of risk factors, utilized to select most effective features using linear regression algorithms. Then AI-ML techniques like Decision Tree (DTC), Randomizable Filter Classifier, k-star with RMSE method is used to analyse threats within CC environment. Experimental outcomes depicted that division of dataset to (95%-5%) provided best result out of every remaining partitioning and moreover put forth that DTC algorithm provided best outcomes out of entire data set used in experimental setups.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 243-250"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200036X/pdfft?md5=da30c7c469672403b680e1e34ac54ba2&pid=1-s2.0-S2666285X2200036X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81997939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reversible logic is also called information lossless logic, since the information embedded in the circuits can be recovered, if lost. Research carried out by Landauer and Bennett proved that the energy dissipation would not occur if computation is made reversible. With this aim a number of reversible gates were designed and invented. As examples like- the Fredkin gate, the Toffoli gate, the Peres gate, and the Feynman gate. Reversible logic has extensive applications and is considered as one of the futuristic technologies. But the logic circuit designing is based on logic gates, which are non-reversible. This paper presents design of logic gates using reversible gates. These logic gates help in future implementation of higher end circuits. In this paper an attempt is made to design logic gates using reversible gates and some of the higher end circuits are also designed such as Binary-to-Grey, grey-to-Binary, Adder, Subtractor etc.
{"title":"Design of logic gates using reversible gates with reduced quantum cost","authors":"S.Saniya Samrin, Rachamma Patil, Sumangala Itagi, Smita C Chetti, Afiya Tasneem","doi":"10.1016/j.gltp.2022.04.011","DOIUrl":"10.1016/j.gltp.2022.04.011","url":null,"abstract":"<div><p>Reversible logic is also called information lossless logic, since the information embedded in the circuits can be recovered, if lost. Research carried out by Landauer and Bennett proved that the energy dissipation would not occur if computation is made reversible. With this aim a number of reversible gates were designed and invented. As examples like- the Fredkin gate, the Toffoli gate, the Peres gate, and the Feynman gate. Reversible logic has extensive applications and is considered as one of the futuristic technologies. But the logic circuit designing is based on logic gates, which are non-reversible. This paper presents design of logic gates using reversible gates. These logic gates help in future implementation of higher end circuits. In this paper an attempt is made to design logic gates using reversible gates and some of the higher end circuits are also designed such as Binary-to-Grey, grey-to-Binary, Adder, Subtractor etc.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 136-141"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000474/pdfft?md5=f26083feeba8465d5465b76c92ad5aad&pid=1-s2.0-S2666285X22000474-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78879434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.014
Praveen M Kulkarni , L. V Appasaba , Prayag Gokhale , Basavaraj Tigadi
The development in the digital world has influenced training programs for the employees; this indicates that skills and information provided by the traditional training programs need up-gradation in the digital environment. Tools of digital technology act handy in the training programs of the employees. These digital technologies such as simulation in training promote creativity and high order thinking among the employees. The main focus of the present study is to indicate the level of effectiveness of digital simulation methods of trainingin the organization. The study was conducted on two groups of employees from information technology companies based in Bangalore. The first group responded with regards to the training method and the second group of trainees included the digital simulation method of training. The results indicated that the digital simulation method of training was more effective than the traditional method of training. This suggests that the application of digital simulation training tools assists in training programs to train employees in the digital economy.
{"title":"Role of digital simulation in employee training","authors":"Praveen M Kulkarni , L. V Appasaba , Prayag Gokhale , Basavaraj Tigadi","doi":"10.1016/j.gltp.2022.04.014","DOIUrl":"10.1016/j.gltp.2022.04.014","url":null,"abstract":"<div><p>The development in the digital world has influenced training programs for the employees; this indicates that skills and information provided by the traditional training programs need up-gradation in the digital environment. Tools of digital technology act handy in the training programs of the employees. These digital technologies such as simulation in training promote creativity and high order thinking among the employees. The main focus of the present study is to indicate the level of effectiveness of digital simulation methods of trainingin the organization. The study was conducted on two groups of employees from information technology companies based in Bangalore. The first group responded with regards to the training method and the second group of trainees included the digital simulation method of training. The results indicated that the digital simulation method of training was more effective than the traditional method of training. This suggests that the application of digital simulation training tools assists in training programs to train employees in the digital economy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 149-156"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000504/pdfft?md5=72554db41b75d2c32e229c5d06007e24&pid=1-s2.0-S2666285X22000504-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79517358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.004
Ravi N, Veena MB
Quantum-dot cellular automata (QCA) is a raising nanotechnology with the potential for quicker speed, smaller size and low power consumption than CMOS based technology. This paper proposes the design of functional blocks for Arithmetic Logic Unit (ALU) and for majority gate (MV) using certain unique QCA characteristics. Previous works were based on the conventional design and have different approaches when compared with QCA method. This paper helps to resolve the conventional method by converting all Boolean logics into a NAND and NOR based majority voter by fixing one of the inputs. The proposed work presents a significant amount of reduction in the cell count, area of the cell, and clock delay phase, compared to previous work in QCA. The experimental result shows a reduction in number of cells is by 35.40%, Area of cells (um2) by 15.88% and clock delay phase by 48.21%. Simulations indicate an appealing performance in terms of area, delay, and complexity. Simulation results are validated using the quantum-dot cellular automata (QCA) Designer 2.0.3 tool.
{"title":"Design of an efficient ALU blocks in quantum dot cellular automata (QCA)","authors":"Ravi N, Veena MB","doi":"10.1016/j.gltp.2022.03.004","DOIUrl":"10.1016/j.gltp.2022.03.004","url":null,"abstract":"<div><p>Quantum-dot cellular automata (QCA) is a raising nanotechnology with the potential for quicker speed, smaller size and low power consumption than CMOS based technology. This paper proposes the design of functional blocks for Arithmetic Logic Unit (ALU) and for majority gate (MV) using certain unique QCA characteristics. Previous works were based on the conventional design and have different approaches when compared with QCA method. This paper helps to resolve the conventional method by converting all Boolean logics into a NAND and NOR based majority voter by fixing one of the inputs. The proposed work presents a significant amount of reduction in the cell count, area of the cell, and clock delay phase, compared to previous work in QCA. The experimental result shows a reduction in number of cells is by 35.40%, Area of cells (um2) by 15.88% and clock delay phase by 48.21%. Simulations indicate an appealing performance in terms of area, delay, and complexity. Simulation results are validated using the quantum-dot cellular automata (QCA) Designer 2.0.3 tool.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 157-168"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000048/pdfft?md5=b375f0669cd474777951f5bb75b55047&pid=1-s2.0-S2666285X22000048-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88249127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.03.026
Sanjay M Belgaonkar , Vipula Singh
Compressive sensing (CS) is a new branch of research with applications in signal processing, medical imaging, seismology, communications, and a variety of other fields. It assures successful data compression and faithful reconstruction by considering a smaller number of linear measurements compared to its dimensions. In this paper, we have shown CS paradigm for image compression and reconstruction. We have considered the Basis Pursuit (BP), Lp – Reweighted (Least Squares Method), Orthogonal Matching Pursuit (OMP) and Fusion of OMP & BP algorithms to obtain the compressive measurements and faithful reconstruction. The results are analyzed by varying sparsity level and Compression Ratio (CR) and then calculating the Peak Signal to Noise Ratio (PSNR) value. The obtained results show that OMP performs better for standard test images & satellite images and Fusion of OMP & BP performs better for biomedical images.
{"title":"Image compression and reconstruction in compressive sensing paradigm","authors":"Sanjay M Belgaonkar , Vipula Singh","doi":"10.1016/j.gltp.2022.03.026","DOIUrl":"10.1016/j.gltp.2022.03.026","url":null,"abstract":"<div><p>Compressive sensing (CS) is a new branch of research with applications in signal processing, medical imaging, seismology, communications, and a variety of other fields. It assures successful data compression and faithful reconstruction by considering a smaller number of linear measurements compared to its dimensions. In this paper, we have shown CS paradigm for image compression and reconstruction. We have considered the Basis Pursuit (BP), Lp – Reweighted (Least Squares Method), Orthogonal Matching Pursuit (OMP) and Fusion of OMP & BP algorithms to obtain the compressive measurements and faithful reconstruction. The results are analyzed by varying sparsity level and Compression Ratio (CR) and then calculating the Peak Signal to Noise Ratio (PSNR) value. The obtained results show that OMP performs better for standard test images & satellite images and Fusion of OMP & BP performs better for biomedical images.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 220-224"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000322/pdfft?md5=fa57e82fc41ee84d1855dab324cea073&pid=1-s2.0-S2666285X22000322-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88907420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-02DOI: 10.1016/j.gltp.2022.04.003
Ayesha Heena , Nagashettappa Biradar , Najmuddin M Maroof , Vishwanath P
This article is mainly focused to accurately detecting any abnormality of heart if present using echocardiographic image of the patient. Heart abnormalities are now a days very common not only in India but all over the globe irrespective of age and gender. The detection of abnormality is achieved by using Artificial neural network (ANN) Classifier. However, processing of the image is achieved through preprocessing, segmentation, feature extraction and then achieving classification. Processing of image for removal of noise and enhancement is carried out as Preprocessing of image followed by segmentation. The most significant processing task is segmentation which is discussed in detail and preferable algorithm which overcomes the drawbacks and limitations of previous algorithms is proposed. This algorithm is a solution to all problems faced in previous algorithms. carried out using different techniques, three different segmentation techniques are discussed where algorithm proposed Reaction Diffusion Level Set Segmentation (RDLSS) is better than other three methods also overcome the problems faced in previous algorithms, then feature extraction is done to extract energy features where the novelty of the research is use of symlet, Debauches and Bio orthogonal filters for feature extraction and these features are used to classify the images as normal or abnormal using ANN classifier. The ANN classifier is effective and efficient resulting in accuracies of greater than 98%. The results are also clinically validated by doctors.
{"title":"Processing of echocardiographic images using segmentation, feature extraction and classification for detection of heart abnormality","authors":"Ayesha Heena , Nagashettappa Biradar , Najmuddin M Maroof , Vishwanath P","doi":"10.1016/j.gltp.2022.04.003","DOIUrl":"10.1016/j.gltp.2022.04.003","url":null,"abstract":"<div><p>This article is mainly focused to accurately detecting any abnormality of heart if present using echocardiographic image of the patient. Heart abnormalities are now a days very common not only in India but all over the globe irrespective of age and gender. The detection of abnormality is achieved by using Artificial neural network (ANN) Classifier. However, processing of the image is achieved through preprocessing, segmentation, feature extraction and then achieving classification. Processing of image for removal of noise and enhancement is carried out as Preprocessing of image followed by segmentation. The most significant processing task is segmentation which is discussed in detail and preferable algorithm which overcomes the drawbacks and limitations of previous algorithms is proposed. This algorithm is a solution to all problems faced in previous algorithms. carried out using different techniques, three different segmentation techniques are discussed where algorithm proposed Reaction Diffusion Level Set Segmentation (RDLSS) is better than other three methods also overcome the problems faced in previous algorithms, then feature extraction is done to extract energy features where the novelty of the research is use of symlet, Debauches and Bio orthogonal filters for feature extraction and these features are used to classify the images as normal or abnormal using ANN classifier. The ANN classifier is effective and efficient resulting in accuracies of greater than 98%. The results are also clinically validated by doctors.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 13-19"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000395/pdfft?md5=c7df2dafb7ed4ee14aa186096fa6f0e4&pid=1-s2.0-S2666285X22000395-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85074601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-01Epub Date: 2022-04-03DOI: 10.1016/j.gltp.2022.04.016
A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule
The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.
随着新冠肺炎疫情的爆发,世界经历了一场卫生危机。口罩被认为是防止病毒传播最有效的方式[1]。这促使人们需要一种口罩识别器,它不仅能检测口罩的存在,还能准确地判断一个人是否戴着口罩。此外,口罩也应该从各个角度识别。本研究的目的是利用图像处理和计算机视觉方法创建一种新的改进的实时人脸识别系统。使用了一个Kaggle数据集,该数据集由带面具和不带面具的图像组成。本研究的目的是使用预训练的卷积神经网络Mobile Net V2。对给定模型的性能进行了评估。本文提出的模型能够以98%的准确率检测出口罩。该人脸识别器能够有效地检测出侧向的人脸,使其更加实用。并对现有算法的性能指标进行了比较。现在,随着传染性变异OMICRON的传播,有必要实现这样一个强大的口罩识别,以帮助控制传播。
{"title":"Face mask recogniser using image processing and computer vision approach","authors":"A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule","doi":"10.1016/j.gltp.2022.04.016","DOIUrl":"10.1016/j.gltp.2022.04.016","url":null,"abstract":"<div><p>The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 67-73"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000528/pdfft?md5=e7bd6ddcdbaa4b2522cc1206ed68c426&pid=1-s2.0-S2666285X22000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}