首页 > 最新文献

2023 2nd International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Deep Learning based Opinion Mining on Throat Cancer Social Media Posts 基于深度学习的喉癌社交媒体帖子意见挖掘
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212362
Anuj Mangal, Anuj Kumar
Twitter has become a popular platform for people to share their thoughts and opinions with the world. It allows users to post openly on any topic, giving them the freedom to express themselves without fear of judgment or censorship including those relevant to throat cancer. Twitter sentiment analysis is an important tool for understanding the relative sentiment of the public for certain topics or ideas present on the platform. By using Natural Language Processing (NLP) techniques on millions of tweets, Sentiment Analysis determines how likely each tweet falls into a pre-defined positive or negative classification. The tweets will be classified into three categories using the Lexicon, CNN, LSTM, and CNN-LSTM: positive, neutral, and negative. This study examined the use of text tweets from Twitter as a source of data. Curated tweets from public accounts were utilized and a total of 30002 tweets were collected. The study suggests that the use of Lexicon, CNN, LSTM, and CNN-LSTM approaches can enhance accuracy when conducting a classification task. Through this process, 82% accuracy has been obtained with 24000 positive tweets and 6000 negative tweets.
推特已经成为人们与世界分享想法和观点的热门平台。它允许用户公开发布任何话题,让他们自由地表达自己,而不用担心评判或审查,包括与咽喉癌有关的话题。Twitter情绪分析是了解公众对平台上出现的某些话题或观点的相对情绪的重要工具。通过对数百万条推文使用自然语言处理(NLP)技术,情感分析确定每条推文落入预定义的积极或消极分类的可能性。使用Lexicon, CNN, LSTM和CNN-LSTM将推文分为三类:积极,中性和消极。这项研究考察了Twitter上的文本推文作为数据来源的使用情况。利用公众号的精选推文,共收集到30002条推文。研究表明,使用Lexicon、CNN、LSTM和CNN-LSTM方法可以提高分类任务的准确性。通过这个过程,在24000条正面推文和6000条负面推文的情况下,准确率达到82%。
{"title":"Deep Learning based Opinion Mining on Throat Cancer Social Media Posts","authors":"Anuj Mangal, Anuj Kumar","doi":"10.1109/ICECAA58104.2023.10212362","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212362","url":null,"abstract":"Twitter has become a popular platform for people to share their thoughts and opinions with the world. It allows users to post openly on any topic, giving them the freedom to express themselves without fear of judgment or censorship including those relevant to throat cancer. Twitter sentiment analysis is an important tool for understanding the relative sentiment of the public for certain topics or ideas present on the platform. By using Natural Language Processing (NLP) techniques on millions of tweets, Sentiment Analysis determines how likely each tweet falls into a pre-defined positive or negative classification. The tweets will be classified into three categories using the Lexicon, CNN, LSTM, and CNN-LSTM: positive, neutral, and negative. This study examined the use of text tweets from Twitter as a source of data. Curated tweets from public accounts were utilized and a total of 30002 tweets were collected. The study suggests that the use of Lexicon, CNN, LSTM, and CNN-LSTM approaches can enhance accuracy when conducting a classification task. Through this process, 82% accuracy has been obtained with 24000 positive tweets and 6000 negative tweets.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"549 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123135396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure Communication in IoT-enabled Embedded Systems for Military Applications using Encryption 在军事应用中使用加密的支持物联网的嵌入式系统中的安全通信
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212400
B. Kannan, P. Solainayagi, H. Azath, Subbiah Murugan, C. Srinivasan
Real-time monitoring and analysis of data from various sources have been made possible due to the growth of Internet of Things (IoT)-enabled embedded systems in military applications. This has allowed improved situational awareness and the identification of potential threats. However, it is essential that the communication between these systems to be protected against illegal access and intervention to maintain their integrity. This research study investigates whether or not it is possible to have encrypted communication in embedded systems that make use of the IoT for military purposes. It gives an overview of the many security protocols and algorithms that may be used to secure communication, along with the problems and constraints that such protocols and algorithms provide. Case studies and examples of how secure transmission has been deployed in real-world military applications are covered along with the lessons learned and best practices for moving forward with the technology's development. This article emphasizes the significance of encrypted communication in military applications and its role in protecting the safety and security of soldiers and equipment.
由于在军事应用中支持物联网(IoT)的嵌入式系统的增长,对来自各种来源的数据的实时监控和分析已经成为可能。这提高了态势感知能力和潜在威胁的识别能力。然而,至关重要的是,这些系统之间的通信必须受到保护,防止非法访问和干预,以保持其完整性。本研究调查了是否有可能在将物联网用于军事目的的嵌入式系统中进行加密通信。它概述了可用于保护通信的许多安全协议和算法,以及这些协议和算法提供的问题和约束。案例研究和安全传输如何在实际军事应用中部署的示例,以及经验教训和推动技术发展的最佳实践。本文强调了加密通信在军事应用中的意义及其在保护士兵和装备安全方面的作用。
{"title":"Secure Communication in IoT-enabled Embedded Systems for Military Applications using Encryption","authors":"B. Kannan, P. Solainayagi, H. Azath, Subbiah Murugan, C. Srinivasan","doi":"10.1109/ICECAA58104.2023.10212400","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212400","url":null,"abstract":"Real-time monitoring and analysis of data from various sources have been made possible due to the growth of Internet of Things (IoT)-enabled embedded systems in military applications. This has allowed improved situational awareness and the identification of potential threats. However, it is essential that the communication between these systems to be protected against illegal access and intervention to maintain their integrity. This research study investigates whether or not it is possible to have encrypted communication in embedded systems that make use of the IoT for military purposes. It gives an overview of the many security protocols and algorithms that may be used to secure communication, along with the problems and constraints that such protocols and algorithms provide. Case studies and examples of how secure transmission has been deployed in real-world military applications are covered along with the lessons learned and best practices for moving forward with the technology's development. This article emphasizes the significance of encrypted communication in military applications and its role in protecting the safety and security of soldiers and equipment.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125123094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Account Abstraction via Singleton Entrypoint Contract and Verifying Paymaster 通过单例入口点合同和验证出纳员进行账户抽象
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212316
Aniket Kumar Singh, Inzimam Ul Hassan, Gaganjot Kaur, Shanu Kumar, Anmol
Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.
以太坊是一种领先的加密货币,正在推进我们处理数字交易的方式。以太坊的一个重要概念是“账户抽象”,它可以在使更广泛的受众访问以太坊方面发挥关键作用。目前,以太坊有两种类型的账户:外部拥有的账户(eoa)和合同账户(ca)。eoa由公共地址和私钥控制,允许用户发起交易并与智能合约交互。但是,丢失私钥可能会导致资金损失,并且eoa不是量子安全的。另一方面,ca由编写在以太坊虚拟机(EVM)上的代码控制,并且不拥有私钥。它们依赖于网络存储,创建它们需要成本。为了增强现有技术并使其更加用户友好,在以太坊协议中提出了“帐户抽象”的建议。这一变化将使用户能够使用智能合约钱包而不是外部拥有的账户与智能合约进行交互。这将为用户帐户管理带来更大的灵活性和安全性,并为新的和创新的用户体验打开大门。
{"title":"Account Abstraction via Singleton Entrypoint Contract and Verifying Paymaster","authors":"Aniket Kumar Singh, Inzimam Ul Hassan, Gaganjot Kaur, Shanu Kumar, Anmol","doi":"10.1109/ICECAA58104.2023.10212316","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212316","url":null,"abstract":"Ethereum, a leading cryptocurrency, is advancing the way we handle digital transactions. One important concept in Ethereum is “account abstraction,” which could play a crucial role in making it accessible to a wider audience. Currently, Ethereum has two types of accounts: externally owned accounts (EOAs) and contract accounts (CAs). EOAs are controlled by a public address and private key, allowing users to initiate transactions and interact with smart contracts. However, losing the private key can result in the loss of funds, and EOAs are not quantum safe. On the other hand, CAs are controlled by the code written on the Ethereum Virtual Machine (EVM) and do not possess private keys. They rely on network storage, and their creation incurs a cost. To enhance the existing technology and make it more user-friendly, there is a proposal for “account abstraction” in the Ethereum protocol. This change would enable users to interact with smart contracts using smart contract wallets instead of externally owned accounts. This would bring greater flexibility and security to the management of user accounts, as well as open doors for new and innovative user experiences.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121529887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Recession Detective Analysis System using IoT Smart Sensor Devices 基于物联网智能传感器设备的稳健衰退检测分析系统
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212166
N. P, M. V, C. Rupesh, B. Kartheek, Y. Lekhya, K. Swetha
This study suggests a wearable gadget with an autonomous fall detector that can lower risks by identifying falls and notifying care takers right away. This research study combines a heart-rate sensor and an accelerometer to create a user-adaptive fall detection system based on cluster analysis. The suggested fall detector seeks to achieve high accuracy using a simple model under a variety of circumstances. Additionally, this research study tests the efficiency of the cluster-analysis-based anomaly identification as well as the performance improvement of combining a heart rate sensor and an accelerometer. This study also demonstrates the utility of the user-adaptive approach when using both acceleration and heart rate inputs. The system will alert the carer through GSM if the user's orientation data values become aberrant in any way. The system design takes into account a straightforward, inexpensive, and power-efficient design.
这项研究提出了一种带有自动跌倒探测器的可穿戴设备,可以通过识别跌倒并立即通知护理人员来降低风险。本研究结合心率传感器和加速度计,创建了一个基于聚类分析的用户自适应跌倒检测系统。建议的跌落检测器试图在各种情况下使用一个简单的模型来实现高精度。此外,本研究还测试了基于聚类分析的异常识别效率,以及结合心率传感器和加速度传感器的性能改进。本研究还展示了用户自适应方法在同时使用加速和心率输入时的效用。如果用户的方位数据值出现任何异常,系统将通过GSM向护理人员发出警报。系统设计考虑了简单、廉价和节能的设计。
{"title":"A Robust Recession Detective Analysis System using IoT Smart Sensor Devices","authors":"N. P, M. V, C. Rupesh, B. Kartheek, Y. Lekhya, K. Swetha","doi":"10.1109/ICECAA58104.2023.10212166","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212166","url":null,"abstract":"This study suggests a wearable gadget with an autonomous fall detector that can lower risks by identifying falls and notifying care takers right away. This research study combines a heart-rate sensor and an accelerometer to create a user-adaptive fall detection system based on cluster analysis. The suggested fall detector seeks to achieve high accuracy using a simple model under a variety of circumstances. Additionally, this research study tests the efficiency of the cluster-analysis-based anomaly identification as well as the performance improvement of combining a heart rate sensor and an accelerometer. This study also demonstrates the utility of the user-adaptive approach when using both acceleration and heart rate inputs. The system will alert the carer through GSM if the user's orientation data values become aberrant in any way. The system design takes into account a straightforward, inexpensive, and power-efficient design.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123393057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation of Industry 4.0 in Supply Chain Management in the Healthcare Industry 工业4.0在医疗保健行业供应链管理中的实施
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212417
Muchai Jemimah, M. Kuruvilla, Masato Gunji, P. Prasad, Dr. G. Jaspher, Associate W Kathrine, Mr S. Kirubakaran, Mercedes Evangelina
The implementation of Industry 4.0 will assist the healthcare sector in building reliable and sustainable supply chains. This research discusses about how the current technologies can lead to improve the existing supply chain management systems and how the drugs- one of the main component circulated in the supply chain be safeguarded from being replaced by counterfeits. As a result, this research study proposes a centralized system, which includes gathering and sending purchase orders, tracking the transportation of drugs, implementing a programme for drug exchanges in collaboration with numerous hospitals, and using AI models for demand forecasting to guard against shortage or oversupply conditions. To prevent an inflow of counterfeit supplies, blockchain technology is used to monitor pharmaceuticals and other medical products. To monitor the state of pharmaceutical products in storage facilities or warehouses, IIoT is employed. This improvement guarantees improved healthcare facilities and more transparency in the procurement procedures.
工业4.0的实施将有助于医疗保健行业建立可靠和可持续的供应链。本研究讨论了当前的技术如何能够改善现有的供应链管理系统,以及如何保护在供应链中流通的主要组成部分之一的药品不被假药取代。因此,本研究提出了一个集中系统,其中包括收集和发送采购订单,跟踪药物运输,与众多医院合作实施药物交换计划,以及使用人工智能模型进行需求预测,以防止短缺或供应过剩。为了防止假冒供应品流入,区块链技术被用于监控药品和其他医疗产品。为了监测储存设施或仓库中药品的状态,采用了工业物联网。这一改进保证了医疗设施的改善和采购程序的更高透明度。
{"title":"Implementation of Industry 4.0 in Supply Chain Management in the Healthcare Industry","authors":"Muchai Jemimah, M. Kuruvilla, Masato Gunji, P. Prasad, Dr. G. Jaspher, Associate W Kathrine, Mr S. Kirubakaran, Mercedes Evangelina","doi":"10.1109/ICECAA58104.2023.10212417","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212417","url":null,"abstract":"The implementation of Industry 4.0 will assist the healthcare sector in building reliable and sustainable supply chains. This research discusses about how the current technologies can lead to improve the existing supply chain management systems and how the drugs- one of the main component circulated in the supply chain be safeguarded from being replaced by counterfeits. As a result, this research study proposes a centralized system, which includes gathering and sending purchase orders, tracking the transportation of drugs, implementing a programme for drug exchanges in collaboration with numerous hospitals, and using AI models for demand forecasting to guard against shortage or oversupply conditions. To prevent an inflow of counterfeit supplies, blockchain technology is used to monitor pharmaceuticals and other medical products. To monitor the state of pharmaceutical products in storage facilities or warehouses, IIoT is employed. This improvement guarantees improved healthcare facilities and more transparency in the procurement procedures.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124197893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting Future Sea Level Rise: A Data-driven Approach using Climate Analysis 预测未来海平面上升:利用气候分析的数据驱动方法
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212399
Vinay Nagarad Dasavandi Krishnamurthy, S. Degadwala, Dhairya Vyas
This research article presents a data-driven approach for predicting future sea level rise using climate data analysis. By employing advanced statistical techniques and machine learning algorithms, the study establishes correlations between historical climate variables and observed sea level rise. Ensemble modeling techniques are utilized to explore uncertainties and generate multiple simulations, offering a range of potential outcomes. The findings provide valuable insights for policymakers and coastal communities, enabling informed decision-making and the development of effective strategies to address the challenges posed by rising sea levels. Overall, this research contributes to the field of climate science by providing a robust framework for predicting sea level rise and preparing for its impacts in a changing climate.
本文提出了一种利用气候数据分析预测未来海平面上升的数据驱动方法。通过采用先进的统计技术和机器学习算法,该研究建立了历史气候变量与观测到的海平面上升之间的相关性。集成建模技术用于探索不确定性并生成多个模拟,提供一系列潜在的结果。这些发现为决策者和沿海社区提供了有价值的见解,有助于制定明智的决策和有效的战略,以应对海平面上升带来的挑战。总的来说,这项研究为预测海平面上升提供了一个强有力的框架,并为海平面上升对气候变化的影响做好准备,从而对气候科学领域做出了贡献。
{"title":"Forecasting Future Sea Level Rise: A Data-driven Approach using Climate Analysis","authors":"Vinay Nagarad Dasavandi Krishnamurthy, S. Degadwala, Dhairya Vyas","doi":"10.1109/ICECAA58104.2023.10212399","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212399","url":null,"abstract":"This research article presents a data-driven approach for predicting future sea level rise using climate data analysis. By employing advanced statistical techniques and machine learning algorithms, the study establishes correlations between historical climate variables and observed sea level rise. Ensemble modeling techniques are utilized to explore uncertainties and generate multiple simulations, offering a range of potential outcomes. The findings provide valuable insights for policymakers and coastal communities, enabling informed decision-making and the development of effective strategies to address the challenges posed by rising sea levels. Overall, this research contributes to the field of climate science by providing a robust framework for predicting sea level rise and preparing for its impacts in a changing climate.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"104 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127999113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated Learning for Image Captioning: A Comprehensive Review of Privacy-Preserving Collaborative Model Training in Distributed Environments 图像字幕的联合学习:分布式环境中保护隐私的协作模型训练综述
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212161
Roshni Padate, M. Kalla, Ashutosh Gupta, Arvind Sharma
This study presents a comprehensive review of the use of federated learning in the context of image captioning in distributed environments. It focuses on key aspects such as privacy preservation, data locality, and collaborative model training. The evolution of federated learning and its unique characteristics are explored, along with an examination of available open-source frameworks specific to image captioning. The study categorizes different approaches to federated learning for image captioning and showcases recent applications in diverse domains, including medical imaging, edge computing, autonomous vehicles, social media, and cross-domain image analysis. Additionally, optimization techniques, security analysis, and research challenges are discussed, encompassing data heterogeneity, privacy preservation, communication efficiency, limited labeling, scalability, and robustness against adversarial attacks. This comprehensive review contributes to a deeper understanding of federated learning for image captioning and highlights areas for further research and advancement in the field.
本研究全面回顾了联合学习在分布式环境下图像字幕制作中的应用。研究重点关注隐私保护、数据位置性和协作模型训练等关键方面。研究探讨了联合学习的发展及其独特性,同时还研究了专门针对图像字幕的可用开源框架。该研究对用于图像字幕的联合学习的不同方法进行了分类,并展示了最近在不同领域的应用,包括医疗成像、边缘计算、自动驾驶汽车、社交媒体和跨领域图像分析。此外,还讨论了优化技术、安全分析和研究挑战,包括数据异构性、隐私保护、通信效率、有限标记、可扩展性和对抗恶意攻击的鲁棒性。这篇全面的综述有助于加深对用于图像字幕的联合学习的理解,并强调了该领域有待进一步研究和推进的领域。
{"title":"Federated Learning for Image Captioning: A Comprehensive Review of Privacy-Preserving Collaborative Model Training in Distributed Environments","authors":"Roshni Padate, M. Kalla, Ashutosh Gupta, Arvind Sharma","doi":"10.1109/ICECAA58104.2023.10212161","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212161","url":null,"abstract":"This study presents a comprehensive review of the use of federated learning in the context of image captioning in distributed environments. It focuses on key aspects such as privacy preservation, data locality, and collaborative model training. The evolution of federated learning and its unique characteristics are explored, along with an examination of available open-source frameworks specific to image captioning. The study categorizes different approaches to federated learning for image captioning and showcases recent applications in diverse domains, including medical imaging, edge computing, autonomous vehicles, social media, and cross-domain image analysis. Additionally, optimization techniques, security analysis, and research challenges are discussed, encompassing data heterogeneity, privacy preservation, communication efficiency, limited labeling, scalability, and robustness against adversarial attacks. This comprehensive review contributes to a deeper understanding of federated learning for image captioning and highlights areas for further research and advancement in the field.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130315831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Natural Language Processing Models: A Comparative Perspective 自然语言处理模型:比较视角
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212389
Bianchi Sangma, Vandana Sharma
Natural Language Processing is a thriving branch of artificial intelligence with diverse applications across multiple domains. In recent years, advances in machine learning models for NLP tasks have resulted in a parallel development in NLP methodologies. These models are capable of performing complicated NLP tasks such language translation, sentiment analysis, text categorization, and text production. This study reviews the NLP models by analyzing the traditional models, such as rule-based systems and statistical models, and then move on to the recent neural network and deep learning models. Natural Language Processing (NLP) is a branch of artificial intelligence with diverse applications across multiple domains. In recent years, advances in machine learning models for NLP tasks have resulted in a parallel development of NLP methodologies. These models are capable of performing complicated NLP tasks such as language translation, sentiment analysis, text categorization, and text production.
自然语言处理是人工智能的一个蓬勃发展的分支,在多个领域有不同的应用。近年来,用于NLP任务的机器学习模型的进步导致了NLP方法的并行发展。这些模型能够执行复杂的NLP任务,如语言翻译、情感分析、文本分类和文本生成。本研究通过分析传统的基于规则的系统和统计模型来回顾NLP模型,然后转向最近的神经网络和深度学习模型。自然语言处理(NLP)是人工智能的一个分支,在多个领域有着广泛的应用。近年来,NLP任务的机器学习模型的进步导致了NLP方法的并行发展。这些模型能够执行复杂的NLP任务,如语言翻译、情感分析、文本分类和文本生成。
{"title":"Natural Language Processing Models: A Comparative Perspective","authors":"Bianchi Sangma, Vandana Sharma","doi":"10.1109/ICECAA58104.2023.10212389","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212389","url":null,"abstract":"Natural Language Processing is a thriving branch of artificial intelligence with diverse applications across multiple domains. In recent years, advances in machine learning models for NLP tasks have resulted in a parallel development in NLP methodologies. These models are capable of performing complicated NLP tasks such language translation, sentiment analysis, text categorization, and text production. This study reviews the NLP models by analyzing the traditional models, such as rule-based systems and statistical models, and then move on to the recent neural network and deep learning models. Natural Language Processing (NLP) is a branch of artificial intelligence with diverse applications across multiple domains. In recent years, advances in machine learning models for NLP tasks have resulted in a parallel development of NLP methodologies. These models are capable of performing complicated NLP tasks such as language translation, sentiment analysis, text categorization, and text production.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128745130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Extraction and Mining Methods Used in Data Science 用于数据科学的文本提取和挖掘方法
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212101
K. Deepa, P. Perumal, B. Mathivanan
Online Customer Reviews (OCRs) make it difficult for firms to examine them due to their number, diversity, pace, and validity. The big data analytics study predicts OCR reading and its usefulness. Titles with positive emotion and sentimental reviews with neutral polarity attract more readers. Online merchants may use this work to build scale automated processes for sorting and categorizing huge OCR data, benefiting vendors and consumers. Current OCR sorting approaches may prejudice readership and usefulness. Python crawled, processed, and displayed data using Natural Language Processing (NLP). The crawling dataset collected literature using a Pubmed Application Programming Interface (API) module. Natural Language Toolkit (NLTK) processed text data. Tokens were processed into bigrams and trigrams using n-grams. According to study abstracts, West Java has the most stunting research. Text mining and NLP may enhance oral history and historical archaeology. Text mining algorithms were intended for enormous data and public texts, making them inappropriate for historical and archaeological interpretation. Text analysis can effectively handle and evaluate vast amounts of data, which may substantially enrich historical archaeology study, especially when dealing with digital data banks or extensive texts.
在线客户评论(ocr)由于其数量、多样性、速度和有效性,使得公司很难对其进行检查。大数据分析研究预测了OCR阅读及其有用性。具有积极情感的标题和中性极性的感伤评论吸引更多的读者。在线商家可以利用这项工作来构建大规模的自动化流程,对大量的OCR数据进行分类和分类,从而使供应商和消费者受益。目前的OCR分类方法可能会影响读者和有用性。Python使用自然语言处理(NLP)抓取、处理和显示数据。爬行数据集使用Pubmed应用程序编程接口(API)模块收集文献。自然语言工具包(NLTK)处理文本数据。符号使用n-gram被处理成双字母和三字母。根据研究摘要,西爪哇的研究最为迟缓。文本挖掘和自然语言处理可以增强口述历史和历史考古学。文本挖掘算法是为海量数据和公共文本设计的,这使得它们不适合用于历史和考古解释。文本分析可以有效地处理和评估大量的数据,可以极大地丰富历史考古研究,特别是在处理数字数据库或广泛的文本时。
{"title":"Text Extraction and Mining Methods Used in Data Science","authors":"K. Deepa, P. Perumal, B. Mathivanan","doi":"10.1109/ICECAA58104.2023.10212101","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212101","url":null,"abstract":"Online Customer Reviews (OCRs) make it difficult for firms to examine them due to their number, diversity, pace, and validity. The big data analytics study predicts OCR reading and its usefulness. Titles with positive emotion and sentimental reviews with neutral polarity attract more readers. Online merchants may use this work to build scale automated processes for sorting and categorizing huge OCR data, benefiting vendors and consumers. Current OCR sorting approaches may prejudice readership and usefulness. Python crawled, processed, and displayed data using Natural Language Processing (NLP). The crawling dataset collected literature using a Pubmed Application Programming Interface (API) module. Natural Language Toolkit (NLTK) processed text data. Tokens were processed into bigrams and trigrams using n-grams. According to study abstracts, West Java has the most stunting research. Text mining and NLP may enhance oral history and historical archaeology. Text mining algorithms were intended for enormous data and public texts, making them inappropriate for historical and archaeological interpretation. Text analysis can effectively handle and evaluate vast amounts of data, which may substantially enrich historical archaeology study, especially when dealing with digital data banks or extensive texts.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128344744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Speech Enhancement: A Survey of Approaches and Applications 语音增强:方法与应用综述
Pub Date : 2023-07-19 DOI: 10.1109/ICECAA58104.2023.10212180
Siddharth Chhetri, M. Joshi, C. Mahamuni, Repana Naga Sangeetha, Tushar Roy
The paper provides a comprehensive overview of speech enhancement techniques and their applications. It discusses challenges in non-stationary noise, reverberation, and overlapping speech. Approaches like comb filtering, LPC-based filtering, and adaptive filtering, HMM filtering, Wiener filtering, ML estimation, Bayesian estimation, MMSE estimation, and transform domain methods, AI-based approaches are explored. The effectiveness and challenges of each approach are discussed. Applications in telecommunications, voice-controlled systems, hearing aids, speech recognition, and audio restoration are highlighted. The paper presents outcomes and advancements in speech enhancement. Valuable insights are provided for researchers, engineers, and practitioners in the field. The findings aid in selecting suitable techniques for improved speech quality and intelligibility.
本文对语音增强技术及其应用进行了综述。它讨论了非平稳噪声、混响和重叠语音的挑战。探索了梳状滤波、基于lpc的滤波、自适应滤波、HMM滤波、维纳滤波、ML估计、贝叶斯估计、MMSE估计、变换域方法、基于人工智能的方法。讨论了每种方法的有效性和挑战。重点介绍了在电信、语音控制系统、助听器、语音识别和音频恢复方面的应用。本文介绍了语音增强的成果和进展。为该领域的研究人员、工程师和实践者提供了有价值的见解。研究结果有助于选择合适的技术来提高语音质量和可理解性。
{"title":"Speech Enhancement: A Survey of Approaches and Applications","authors":"Siddharth Chhetri, M. Joshi, C. Mahamuni, Repana Naga Sangeetha, Tushar Roy","doi":"10.1109/ICECAA58104.2023.10212180","DOIUrl":"https://doi.org/10.1109/ICECAA58104.2023.10212180","url":null,"abstract":"The paper provides a comprehensive overview of speech enhancement techniques and their applications. It discusses challenges in non-stationary noise, reverberation, and overlapping speech. Approaches like comb filtering, LPC-based filtering, and adaptive filtering, HMM filtering, Wiener filtering, ML estimation, Bayesian estimation, MMSE estimation, and transform domain methods, AI-based approaches are explored. The effectiveness and challenges of each approach are discussed. Applications in telecommunications, voice-controlled systems, hearing aids, speech recognition, and audio restoration are highlighted. The paper presents outcomes and advancements in speech enhancement. Valuable insights are provided for researchers, engineers, and practitioners in the field. The findings aid in selecting suitable techniques for improved speech quality and intelligibility.","PeriodicalId":114624,"journal":{"name":"2023 2nd International Conference on Edge Computing and Applications (ICECAA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117087983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2023 2nd International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1