首页 > 最新文献

Global Transitions Proceedings最新文献

英文 中文
Face mask recogniser using image processing and computer vision approach 人脸识别采用图像处理和计算机视觉的方法
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.016
A.K. Sharadhi , Vybhavi Gururaj , Sahana P. Shankar , M.S. Supriya , Neha Sanjay Chogule

The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.

随着新冠肺炎疫情的爆发,世界经历了一场卫生危机。口罩被认为是防止病毒传播最有效的方式[1]。这促使人们需要一种口罩识别器,它不仅能检测口罩的存在,还能准确地判断一个人是否戴着口罩。此外,口罩也应该从各个角度识别。本研究的目的是利用图像处理和计算机视觉方法创建一种新的改进的实时人脸识别系统。使用了一个Kaggle数据集,该数据集由带面具和不带面具的图像组成。本研究的目的是使用预训练的卷积神经网络Mobile Net V2。对给定模型的性能进行了评估。本文提出的模型能够以98%的准确率检测出口罩。该人脸识别器能够有效地检测出侧向的人脸,使其更加实用。并对现有算法的性能指标进行了比较。现在,随着传染性变异OMICRON的传播,有必要实现这样一个强大的口罩识别,以帮助控制传播。
{"title":"Face mask recogniser using image processing and computer vision approach","authors":"A.K. Sharadhi ,&nbsp;Vybhavi Gururaj ,&nbsp;Sahana P. Shankar ,&nbsp;M.S. Supriya ,&nbsp;Neha Sanjay Chogule","doi":"10.1016/j.gltp.2022.04.016","DOIUrl":"10.1016/j.gltp.2022.04.016","url":null,"abstract":"<div><p>The world saw a health crisis with the onset of the COVID-19 virus outbreak. The mask has been identified as the most efficient way to prevent the spread of virus [1]. This has driven the necessity for a face mask recogniser that not only detects the presence of a mask but also gives the accuracy to which a person is wearing the face mask. Also, the face mask should be recognised in all angles as well. The goal of this study is to create a new and improved real time face mask recogniser using image processing and computer vision approach. A Kaggle dataset which consisted of images with and without masks was used. For the purpose of this study a pre-trained convolutional neural network Mobile Net V2 was used. The performance of the given model was assessed. The model presented in this paper can detect the face mask with 98% precision. This Face mask recogniser can efficiently detect the face mask in side wise direction which makes it more useful. A comparison of the performance metrics of the existing algorithms is also presented. Now with the spread of the infectious variant OMICRON, it is necessary to implement such a robust face mask recogniser which can help control the spread.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 67-73"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000528/pdfft?md5=e7bd6ddcdbaa4b2522cc1206ed68c426&pid=1-s2.0-S2666285X22000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79592882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logistic regression technique for prediction of cardiovascular disease 预测心血管疾病的逻辑回归技术
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.008
Ambrish G, Bharathi Ganesh, Anitha Ganesh, Chetana Srinivas, Dhanraj, Kiran Mensinkal

One of the most life-threatening disease is cardiovascular disease. Its high mortality rate contributes to nearly 17 million deaths all over the world. Early diagnosis helps to treat the disease in timely manner to prevent mortality. There are several machine and deep learning techniques available to classify the presence and absence of the disease. In this research, Logistic Regression (LR) techniques is applied to UCI dataset to classify the cardiac disease. To improve the performance of the model, pre-processing of data by Cleaning the dataset, finding the missing values are done and features selection were performed by correlation with the target value for all the feature. The highly positive correlated features were selected. Then classification is performed by dividing the dataset into training. testing in the ratio of 90:10, 80:20, 70:30, 40:60 and 50:50. The splitting ratio of 90:10 gives best accuracy as listed below. The LR model obtained 87.10% accuracy.

最危及生命的疾病之一是心血管疾病。它的高死亡率导致全世界近1700万人死亡。早期诊断有助于及时治疗,防止死亡。有几种机器和深度学习技术可用于对疾病的存在和不存在进行分类。在本研究中,将Logistic回归(LR)技术应用于UCI数据集进行心脏病分类。为了提高模型的性能,对数据进行预处理,清洗数据集,寻找缺失值,并将所有特征与目标值进行关联,进行特征选择。选择高度正相关的特征。然后将数据集分成训练集进行分类。按90:10、80:20、70:30、40:60、50:50的比例进行测试。90:10的分割比例给出了如下所列的最佳精度。LR模型的准确率为87.10%。
{"title":"Logistic regression technique for prediction of cardiovascular disease","authors":"Ambrish G,&nbsp;Bharathi Ganesh,&nbsp;Anitha Ganesh,&nbsp;Chetana Srinivas,&nbsp;Dhanraj,&nbsp;Kiran Mensinkal","doi":"10.1016/j.gltp.2022.04.008","DOIUrl":"10.1016/j.gltp.2022.04.008","url":null,"abstract":"<div><p>One of the most life-threatening disease is cardiovascular disease. Its high mortality rate contributes to nearly 17 million deaths all over the world. Early diagnosis helps to treat the disease in timely manner to prevent mortality. There are several machine and deep learning techniques available to classify the presence and absence of the disease. In this research, Logistic Regression (LR) techniques is applied to UCI dataset to classify the cardiac disease. To improve the performance of the model, pre-processing of data by Cleaning the dataset, finding the missing values are done and features selection were performed by correlation with the target value for all the feature. The highly positive correlated features were selected. Then classification is performed by dividing the dataset into training. testing in the ratio of 90:10, 80:20, 70:30, 40:60 and 50:50. The splitting ratio of 90:10 gives best accuracy as listed below. The LR model obtained 87.10% accuracy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 127-130"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000449/pdfft?md5=7bc419bd4a0157463d4da7371d5bfdb4&pid=1-s2.0-S2666285X22000449-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80589189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Deepfake detection in digital media forensics 数字媒体取证中的深度造假检测
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.017
Vurimi Veera Venkata Naga Sai Vamsi , Sukanya S. Shet , Sodum Sai Mohan Reddy , Sharon S. Rose , Sona R. Shetty , S. Sathvika , Supriya M. S. , Sahana P. Shankar

With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in recent times. The rise of AI altered videos or Deepfake media has posed a great threat to media integrity and is being produced and spread widely across social media platforms, the detection of which is seen to be a major challenge. In this paper, an approach for Deepfake detection has been provided. ResNext, a Convolutional Neural Network (CNN) algorithm and Long Short-Term Memory (LSTM) is used as an approach to detect the Deepfake videos. The approach and its steps are discussed in this paper. The accuracy obtained for the developed Deep-Learning (DL) model over the Celeb-Df dataset is 91%.

随着科技的发展和虚假内容的容易产生,近年来媒体的操纵被大规模地进行。人工智能篡改视频或Deepfake媒体的兴起对媒体诚信构成了巨大威胁,并正在社交媒体平台上广泛制作和传播,对其进行检测被视为一项重大挑战。本文提出了一种用于深度造假检测的方法。ResNext使用卷积神经网络(CNN)算法和长短期记忆(LSTM)作为检测Deepfake视频的方法。本文讨论了该方法及其步骤。在Celeb-Df数据集上开发的深度学习(DL)模型获得的精度为91%。
{"title":"Deepfake detection in digital media forensics","authors":"Vurimi Veera Venkata Naga Sai Vamsi ,&nbsp;Sukanya S. Shet ,&nbsp;Sodum Sai Mohan Reddy ,&nbsp;Sharon S. Rose ,&nbsp;Sona R. Shetty ,&nbsp;S. Sathvika ,&nbsp;Supriya M. S. ,&nbsp;Sahana P. Shankar","doi":"10.1016/j.gltp.2022.04.017","DOIUrl":"10.1016/j.gltp.2022.04.017","url":null,"abstract":"<div><p>With the development of technology and ease of creation of fake content, the manipulation of media is carried out on a large scale in recent times. The rise of AI altered videos or Deepfake media has posed a great threat to media integrity and is being produced and spread widely across social media platforms, the detection of which is seen to be a major challenge. In this paper, an approach for Deepfake detection has been provided. ResNext, a Convolutional Neural Network (CNN) algorithm and Long Short-Term Memory (LSTM) is used as an approach to detect the Deepfake videos. The approach and its steps are discussed in this paper. The accuracy obtained for the developed Deep-Learning (DL) model over the Celeb-Df dataset is 91%.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 74-79"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X2200053X/pdfft?md5=2df3d71db7169b57a9eaa3250dfa26e8&pid=1-s2.0-S2666285X2200053X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78471616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Recent trends in wireless and optical fiber communication 无线和光纤通信的最新趋势
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.022
Supreet Kaur , Prabhdeep Singh , Vikas Tripathi , Rajbir Kaur

The broad spectrum of optical wireless communication meets the needs of high-speed wireless communication, which is optical wireless communication's primary advantage over traditional wireless communication technologies. Optical fiber communications, as significant use of laser technology, are vital facilitators for the contemporary information era. With the rise of new technologies such as the Internet of Things, big data, cloud computing, virtual reality, and artificial intelligence, there is an increasing need in society for high-capacity data transmission, raising the bar for optical fiber communication technology. Many new technologies are coming our way, which has made our lives a lot simpler. But now that this new technology has arrived, we've run out of patience. To do whatever in the shortest possible period. Furthermore, in today's fast-paced society, sluggish walkers are quickly left behind while the rest of the world keeps moving forward. Many innovative methods for speeding up and simplifying our work have been identified. With optical fiber technology, our scientists have achieved a breakthrough, allowing us to go from one place to another in a matter of seconds. Wireless optical fiber communication networks are discussed in this research. This study also illustrates the many difficulties that optical fiber installation and processing face.

光通信的广谱特性满足了高速无线通信的需要,这是光通信相对于传统无线通信技术的主要优势。光纤通信作为激光技术的重要应用,是当代信息时代的重要推动者。随着物联网、大数据、云计算、虚拟现实、人工智能等新技术的兴起,社会对大容量数据传输的需求日益增长,对光纤通信技术提出了更高的要求。许多新技术正在向我们走来,这使我们的生活变得简单了很多。但现在这项新技术已经到来,我们已经没有耐心了。在尽可能短的时间内做任何事。此外,在当今快节奏的社会中,懒散的步行者很快就会被抛在后面,而世界上其他地方的人却在不断前进。已经确定了许多加快和简化我们工作的创新方法。利用光纤技术,我们的科学家已经取得了突破,使我们能够在几秒钟内从一个地方到另一个地方。本文对无线光纤通信网络进行了研究。这项研究也说明了光纤安装和加工面临的许多困难。
{"title":"Recent trends in wireless and optical fiber communication","authors":"Supreet Kaur ,&nbsp;Prabhdeep Singh ,&nbsp;Vikas Tripathi ,&nbsp;Rajbir Kaur","doi":"10.1016/j.gltp.2022.03.022","DOIUrl":"10.1016/j.gltp.2022.03.022","url":null,"abstract":"<div><p>The broad spectrum of optical wireless communication meets the needs of high-speed wireless communication, which is optical wireless communication's primary advantage over traditional wireless communication technologies. Optical fiber communications, as significant use of laser technology, are vital facilitators for the contemporary information era. With the rise of new technologies such as the Internet of Things, big data, cloud computing, virtual reality, and artificial intelligence, there is an increasing need in society for high-capacity data transmission, raising the bar for optical fiber communication technology. Many new technologies are coming our way, which has made our lives a lot simpler. But now that this new technology has arrived, we've run out of patience. To do whatever in the shortest possible period. Furthermore, in today's fast-paced society, sluggish walkers are quickly left behind while the rest of the world keeps moving forward. Many innovative methods for speeding up and simplifying our work have been identified. With optical fiber technology, our scientists have achieved a breakthrough, allowing us to go from one place to another in a matter of seconds. Wireless optical fiber communication networks are discussed in this research. This study also illustrates the many difficulties that optical fiber installation and processing face.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 343-348"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000280/pdfft?md5=04120f843f9830d18812033c570d1f7a&pid=1-s2.0-S2666285X22000280-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87877020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks 无线传感器网络中恶意攻击识别与缓解的实验研究
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.04.013
Sankar Padmanabhan , R. Maruthi , R. Anitha

The Wireless Sensor Network (WSN)is applied in several networking situations. It suffers from dissimilar types of attack because of its meagre security mechanisms. The Sinkhole attack is the most destructive attack of WSN. A Reliable Self Reconfiguration (RSR) mechanism has been suggested in this work to eliminate the malicious sinkhole attack from the network. The proposed reliable reconfiguration (RSR)) system consists of two steps. The malicious node is detected and after detection it is corrected without resource loss by using the reconfiguration mechanism. In this paper, the reconfiguration mechanism for correcting sinkhole attack is applied using the C++ built simulator and factors such as Packet Delivery ratio and energy consumption are obtained for estimation The differences in the energy level have been calculated for the three scenarios i.e., Network without attack, Network with sinkhole attack and Network after Reconfiguration. The proposed Reliable Self-Reconfiguration (RSR) method outperforms the various detection mechanisms in finding and eliminating the sinkhole attack.

无线传感器网络(WSN)应用于多种网络环境。由于其薄弱的安全机制,它遭受了不同类型的攻击。天坑攻击是无线传感器网络中最具破坏性的攻击。本文提出了一种可靠的自重构(RSR)机制来消除网络中的恶意陷坑攻击。提出的可靠重构(RSR)系统包括两个步骤。检测到恶意节点后,通过重新配置机制在不损失资源的情况下对其进行纠正。本文利用c++构建的模拟器,应用了纠正天坑攻击的重构机制,获得了数据包传送率和能耗等因素进行估计,计算了无攻击网络、有天坑攻击网络和重构后网络三种情况下的能量等级差异。提出的可靠自重构(RSR)方法在发现和消除陷坑攻击方面优于各种检测机制。
{"title":"An experimental study to recognize and mitigate the malevolent attack in wireless sensors networks","authors":"Sankar Padmanabhan ,&nbsp;R. Maruthi ,&nbsp;R. Anitha","doi":"10.1016/j.gltp.2022.04.013","DOIUrl":"10.1016/j.gltp.2022.04.013","url":null,"abstract":"<div><p>The Wireless Sensor Network (WSN)is applied in several networking situations. It suffers from dissimilar types of attack because of its meagre security mechanisms. The Sinkhole attack is the most destructive attack of WSN. A Reliable Self Reconfiguration (RSR) mechanism has been suggested in this work to eliminate the malicious sinkhole attack from the network. The proposed reliable reconfiguration (RSR)) system consists of two steps. The malicious node is detected and after detection it is corrected without resource loss by using the reconfiguration mechanism. In this paper, the reconfiguration mechanism for correcting sinkhole attack is applied using the C++ built simulator and factors such as Packet Delivery ratio and energy consumption are obtained for estimation The differences in the energy level have been calculated for the three scenarios i.e., Network without attack, Network with sinkhole attack and Network after Reconfiguration. The proposed Reliable Self-Reconfiguration (RSR) method outperforms the various detection mechanisms in finding and eliminating the sinkhole attack.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 55-59"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000498/pdfft?md5=a0d2a40d460de08068032d900421d321&pid=1-s2.0-S2666285X22000498-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81981515","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and classification of sunspots via deep convolutional neural network 基于深度卷积神经网络的太阳黑子检测与分类
Pub Date : 2022-06-01 DOI: 10.1016/j.gltp.2022.03.006
Channabasava Chola, J V Biabl Benifa

Sunspots are known to be the most prominent feature of the solar photosphere. Solar activities play a vital role in Space weather which greatly affects the Earth's environment. The appearance of sunspots determines the solar activities and being observed from early eighteenth century. In this work, we have implemented a deep learning model which automatically detects sunspots from MDI and HMI image datasets. Proposed model uses Alexnet based deep convolutional networks to generate promising deep hierarchical features and proposed deep learning approach achieved excellent classification accuracies. Also, model has shown the improved result with MDI data set which is equal to 99.71%, 100%, 100%, and 100 for accuracy, precision, recall, and F-score respectively. This is to construct and build robust and reliable event recognition system to monitor solar activities which are crucial to understanding space weather and for physicists it is an aid for their research.

太阳黑子是太阳光球层最显著的特征。太阳活动在空间天气中起着至关重要的作用,极大地影响着地球的环境。太阳黑子的出现决定了太阳的活动,并从18世纪初开始被观测到。在这项工作中,我们实现了一个深度学习模型,可以自动从MDI和HMI图像数据集中检测太阳黑子。该模型使用基于Alexnet的深度卷积网络生成有前景的深度层次特征,并且所提出的深度学习方法取得了优异的分类精度。在MDI数据集上,模型的准确率、精密度、召回率和F-score分别达到99.71%、100%、100%和100。这是为了构建和建立强大可靠的事件识别系统来监测太阳活动,这对了解空间天气至关重要,对物理学家来说是他们研究的辅助工具。
{"title":"Detection and classification of sunspots via deep convolutional neural network","authors":"Channabasava Chola,&nbsp;J V Biabl Benifa","doi":"10.1016/j.gltp.2022.03.006","DOIUrl":"10.1016/j.gltp.2022.03.006","url":null,"abstract":"<div><p>Sunspots are known to be the most prominent feature of the solar photosphere. Solar activities play a vital role in Space weather which greatly affects the Earth's environment. The appearance of sunspots determines the solar activities and being observed from early eighteenth century. In this work, we have implemented a deep learning model which automatically detects sunspots from MDI and HMI image datasets. Proposed model uses Alexnet based deep convolutional networks to generate promising deep hierarchical features and proposed deep learning approach achieved excellent classification accuracies. Also, model has shown the improved result with MDI data set which is equal to 99.71%, 100%, 100%, and 100 for accuracy, precision, recall, and F-score respectively. This is to construct and build robust and reliable event recognition system to monitor solar activities which are crucial to understanding space weather and for physicists it is an aid for their research.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"3 1","pages":"Pages 177-182"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666285X22000103/pdfft?md5=d7996f27757c5666a033ae37f1b5b22b&pid=1-s2.0-S2666285X22000103-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88609559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
IoT-Enabled smart doors for monitoring body temperature and face mask detection 支持物联网的智能门,用于监测体温和口罩检测
Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.071
B Varshini, HR Yogesh, Syed Danish Pasha, Maaz Suhail, V Madhumitha, Archana Sasi

COVID 19 pandemic is causing a global health epidemic. The most powerful safety tool is wearing a face mask in public places and everywhere else. The COVID 19 outbreak forced governments around the world to implement lockdowns to deter virus transmission. According to survey reports, wearing a face mask at public places reduces the risk of transmission significantly. In this paper, an IoT-enabled smart door that uses a machine learning model for monitoring body temperature and face mask detection. The proposed model can be used for any shopping mall, hotel, apartment entrance, etc. As an outcome a cost-effective and reliable method of using AI and sensors to build a healthy environment. Evaluation of the proposed framework is done by the Face Mask Detection algorithm using the TensorFlow software library. Besides, the body temperature of the individual is monitored using a non-contact temperature sensor. This proposed system can detect the users from COVID 19 by enabling the Internet of Things (IoT) technology.

COVID - 19大流行正在引发全球卫生流行病。最有效的安全工具是在公共场所和其他任何地方戴口罩。COVID - 19的爆发迫使世界各国政府实施封锁以阻止病毒传播。根据调查报告,在公共场所佩戴口罩可显著降低传播风险。在本文中,一个物联网智能门使用机器学习模型来监测体温和口罩检测。所提出的模型可用于任何购物中心、酒店、公寓入口等。因此,使用人工智能和传感器建立健康环境的成本效益高且可靠的方法。使用TensorFlow软件库的人脸检测算法对所提出的框架进行评估。此外,使用非接触式温度传感器监测个体的体温。该系统可以通过启用物联网(IoT)技术来检测COVID - 19用户。
{"title":"IoT-Enabled smart doors for monitoring body temperature and face mask detection","authors":"B Varshini,&nbsp;HR Yogesh,&nbsp;Syed Danish Pasha,&nbsp;Maaz Suhail,&nbsp;V Madhumitha,&nbsp;Archana Sasi","doi":"10.1016/j.gltp.2021.08.071","DOIUrl":"10.1016/j.gltp.2021.08.071","url":null,"abstract":"<div><p>COVID 19 pandemic is causing a global health epidemic. The most powerful safety tool is wearing a face mask in public places and everywhere else. The COVID 19 outbreak forced governments around the world to implement lockdowns to deter virus transmission. According to survey reports, wearing a face mask at public places reduces the risk of transmission significantly. In this paper, an IoT-enabled smart door that uses a machine learning model for monitoring body temperature and face mask detection. The proposed model can be used for any shopping mall, hotel, apartment entrance, etc. As an outcome a cost-effective and reliable method of using AI and sensors to build a healthy environment. Evaluation of the proposed framework is done by the Face Mask Detection algorithm using the TensorFlow software library. Besides, the body temperature of the individual is monitored using a non-contact temperature sensor. This proposed system can detect the users from COVID 19 by enabling the Internet of Things (IoT) technology.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 246-254"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.071","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84480101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Identification of aromatic coconuts using image processing and machine learning techniques 使用图像处理和机器学习技术识别芳香椰子
Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.037
Shrihari Kallapur, Mahith Hegde, Adithya D. Sanil, Raghavendra Pai, Sneha NS

The paper develops an efficient and accurate method for detecting fresh aromatic coconuts. Coconuts have a nearly cosmopolitan distribution due to human action in using them for agriculture. At present, the only way to determine whether a coconut is aromatic or not is by tasting it. By implementing the IAC (Identification of Aromatic Coconuts) method as proposed in this research, it is possible to identify the aromacy through non-invasive mechanisms with the help of image-processing techniques. The brightness of the image has to be adjusted accordingly for actual implementation. The underlying principle is that the color of the region of interest at the bottom part of the coconut shell is correlated to its age. Segmentation is done on the image via K-Means. The region of interest in RGB color is converted in to HSV and the Threshold is applied to it. After that the amount of white pixels in each layer on the image are measured using Polynomial Regression to obtain the predicted value of aromacy.

本文建立了一种高效、准确的鲜香椰子检测方法。由于人类将椰子用于农业,椰子几乎分布在世界各地。目前,判断椰子是否芳香的唯一方法是品尝它。通过本研究提出的IAC (Identification of Aromatic Coconuts)方法,可以在图像处理技术的帮助下,通过非侵入性机制来识别椰子的芳香性。为了实际实现,图像的亮度必须进行相应的调整。其基本原理是,椰子壳底部感兴趣区域的颜色与其年龄相关。通过K-Means对图像进行分割。将RGB颜色中感兴趣的区域转换为HSV,并对其应用阈值。然后利用多项式回归对图像上每一层的白像素量进行测量,得到芳香度的预测值。
{"title":"Identification of aromatic coconuts using image processing and machine learning techniques","authors":"Shrihari Kallapur,&nbsp;Mahith Hegde,&nbsp;Adithya D. Sanil,&nbsp;Raghavendra Pai,&nbsp;Sneha NS","doi":"10.1016/j.gltp.2021.08.037","DOIUrl":"10.1016/j.gltp.2021.08.037","url":null,"abstract":"<div><p>The paper develops an efficient and accurate method for detecting fresh aromatic coconuts. Coconuts have a nearly cosmopolitan distribution due to human action in using them for agriculture. At present, the only way to determine whether a coconut is aromatic or not is by tasting it. By implementing the IAC (Identification of Aromatic Coconuts) method as proposed in this research, it is possible to identify the aromacy through non-invasive mechanisms with the help of image-processing techniques. The brightness of the image has to be adjusted accordingly for actual implementation. The underlying principle is that the color of the region of interest at the bottom part of the coconut shell is correlated to its age. Segmentation is done on the image via K-Means. The region of interest in RGB color is converted in to HSV and the Threshold is applied to it. After that the amount of white pixels in each layer on the image are measured using Polynomial Regression to obtain the predicted value of aromacy.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 441-447"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.037","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81373759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Exploring user requirements of network forensic tools 探索网络取证工具的用户需求
Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.043
Kousik Barik, Saptarshi Das, Karabi Konar, Bipasha Chakrabarti Banik, Archita Banerjee

Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.

网络取证工具使安全专业人员能够监视网络性能和危害。这些工具用于监控内部和外部网络攻击。技术的进步使犯罪分子能够清除网络犯罪的痕迹,以逃避改变。网络取证过程通过跟踪网络中生成的每个原始数据包和事件,使用进程来加速调查。市场上有许多网络取证工具,既有开源版本,也有商业版本。在这项工作中,介绍了由开源网络取证工具的不同专家参与的调查结果。指出了这类工具的优势、挑战和必要性。研究了一些开源网络取证工具,并基于六个关键参数进行了比较分析。此外,使用开源工具分析两个恶意软件数据集进行调查,并提供全面的网络取证分析,包括IO图,流图,TCP流,UDP多播流,基于mac的分析和操作系统分析。
{"title":"Exploring user requirements of network forensic tools","authors":"Kousik Barik,&nbsp;Saptarshi Das,&nbsp;Karabi Konar,&nbsp;Bipasha Chakrabarti Banik,&nbsp;Archita Banerjee","doi":"10.1016/j.gltp.2021.08.043","DOIUrl":"10.1016/j.gltp.2021.08.043","url":null,"abstract":"<div><p>Network forensic tools enable security professionals to monitor network performance and compromises. These tools are used to monitor internal and external network attacks. Technological improvements have enabled criminals to wipe out tracks of cybercrime to elude alterations. Network forensics procedures use processes to expedite investigation by tracking each original packet and event that is generated in the network. There are many network forensic tools, both open source and commercial versions available in the market. In this work, the result of a survey participated by different experts in open source network forensic tools have been presented. The advantages, challenges, and necessities have been identified for network forensic investigation of such tools. A few open source network forensic tools have been studied and performed a comparative analysis based on six key parameters. Further, two malware datasets are analyzed using open source tools to perform investigation and present a comprehensive network forensic analysis comprising IO graphs, Flow graphs, TCP stream, UDP multicast stream, mac-based analysis, and operating system analysis.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 350-354"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82322685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IoT in smart cities: A contemporary survey 智慧城市中的物联网:当代调查
Pub Date : 2021-11-01 DOI: 10.1016/j.gltp.2021.08.069
Janani RP , Renuka K , Aruna A , Lakshmi Narayanan K

Smart cities are an important domain that is reaching great heights nowadays. IoT plays an important role in the implementation of smart cities. The people of the country which contains smart cities will be well developed socially, economically and the quality of their knowledge and living will also be developed a lot. The human efforts and time that are spent on doing the works manually will be reduced by bringing up smart cities. The people can be protected from any disaster, natural calamities, and any difficult situations by smart city ecosystem. The construction of smart cities will avoid time wastage in our day-to-day lives by all means. This paper mainly describes on what a smart city is, how it is created, uses, challenges, real-time applications, future scope for smart cities, etc. The IoT technologies used in implementing smart cities, the devices used to implement them are also discussed.

智慧城市是当今发展的一个重要领域。物联网在智慧城市的实施中发挥着重要作用。拥有智慧城市的国家的人民将在社会、经济上得到很好的发展,他们的知识和生活质量也将得到很大的发展。智慧城市的出现将减少人工工作所花费的人力和时间。智慧城市生态系统可以保护人们免受任何灾难、自然灾害和任何困境。智慧城市的建设将通过各种方式避免我们日常生活中的时间浪费。本文主要介绍了智慧城市是什么,如何创建,用途,挑战,实时应用,未来智慧城市的范围等。还讨论了用于实施智慧城市的物联网技术,以及用于实施这些技术的设备。
{"title":"IoT in smart cities: A contemporary survey","authors":"Janani RP ,&nbsp;Renuka K ,&nbsp;Aruna A ,&nbsp;Lakshmi Narayanan K","doi":"10.1016/j.gltp.2021.08.069","DOIUrl":"10.1016/j.gltp.2021.08.069","url":null,"abstract":"<div><p>Smart cities are an important domain that is reaching great heights nowadays. IoT plays an important role in the implementation of smart cities. The people of the country which contains smart cities will be well developed socially, economically and the quality of their knowledge and living will also be developed a lot. The human efforts and time that are spent on doing the works manually will be reduced by bringing up smart cities. The people can be protected from any disaster, natural calamities, and any difficult situations by smart city ecosystem. The construction of smart cities will avoid time wastage in our day-to-day lives by all means. This paper mainly describes on what a smart city is, how it is created, uses, challenges, real-time applications, future scope for smart cities, etc. The IoT technologies used in implementing smart cities, the devices used to implement them are also discussed.</p></div>","PeriodicalId":100588,"journal":{"name":"Global Transitions Proceedings","volume":"2 2","pages":"Pages 187-193"},"PeriodicalIF":0.0,"publicationDate":"2021-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.gltp.2021.08.069","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87468360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
Global Transitions Proceedings
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1