首页 > 最新文献

2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
Extracting potential Travel time information from raw GPS data and Evaluating the Performance of Public transit - a case study in Kandy, Sri Lanka 从原始GPS数据中提取潜在的旅行时间信息并评估公共交通的性能——以斯里兰卡康提为例
Shiveswarran Ratneswaran, Uthayasanker Thayasivam
The widespread use of location-enabled devices on public transportation vehicles produces a huge amount of geospatial data. The primary objective of this research study is to build a solution framework that can process a large amount of geospatial data obtained from GPS (Global Positioning System) receivers fixed on different buses on different routes, preprocess, clean, and transform that data for analysis. There are various challenges associated with the processing of GPS data, like discontinuities, non-uniformities, poor network coverage, and human errors. This study proposes two novel, simple algorithms to extract bus trip and bus stop sequences, from the crude raw data, incorporating those challenges. Moreover, the dwell times at the bus stops are estimated solely using this GPS data in three different possible scenarios in the data filtering process. When considering the previous related studies in this area, the proposed approaches are applied to GPS data obtained at a medium sample rate (for example, 15 seconds) for heterogeneous traffic conditions, and also with a unique dwell time estimation process. In addition, statistical methods are implemented to analyse a variety of novel public transit-system performance metrics, such as (i) excess journey time (EJT); (ii) excess dwelling time (EDT); (ii) excess running time (ERT); and (iv) segment idle time ratio (SITR), at different time horizons, where these metrics are developed in the absence of schedule data. These metrics facilitate the transport authorities in real-time bus monitoring, evaluating their performance, and identifying inappropriate driving behaviours. A detailed explanation is provided through a case study of two main routes in the Kandy district of Sri Lanka.
在公共交通工具上广泛使用的定位设备产生了大量的地理空间数据。本研究的主要目标是建立一个解决方案框架,该框架可以处理从不同路线的不同公交车上固定的GPS(全球定位系统)接收器获得的大量地理空间数据,并对这些数据进行预处理、清理和转换以供分析。与GPS数据处理相关的挑战有很多,比如不连续性、不均匀性、网络覆盖率差和人为错误。本研究提出了两种新颖、简单的算法,从粗糙的原始数据中提取公交行程和公交车站序列,并结合了这些挑战。此外,在数据过滤过程中,仅使用该GPS数据在三种不同的可能情况下估计公交车站的停留时间。结合以往相关研究成果,本文提出的方法适用于异构交通条件下中等采样率(例如15秒)的GPS数据,并且具有独特的停留时间估计过程。此外,采用统计方法分析各种新的公共交通系统性能指标,如(i)超额行程时间(EJT);(ii)多余停留时间;(ii)超额运行时间;(iv)分段空闲时间比(SITR),在不同的时间范围内,这些指标是在没有进度数据的情况下制定的。这些指标有助于运输当局实时监测公交车,评估其性能,并识别不适当的驾驶行为。通过对斯里兰卡康提地区两条主要路线的案例研究,提供了详细的解释。
{"title":"Extracting potential Travel time information from raw GPS data and Evaluating the Performance of Public transit - a case study in Kandy, Sri Lanka","authors":"Shiveswarran Ratneswaran, Uthayasanker Thayasivam","doi":"10.1109/ICCT56969.2023.10075789","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075789","url":null,"abstract":"The widespread use of location-enabled devices on public transportation vehicles produces a huge amount of geospatial data. The primary objective of this research study is to build a solution framework that can process a large amount of geospatial data obtained from GPS (Global Positioning System) receivers fixed on different buses on different routes, preprocess, clean, and transform that data for analysis. There are various challenges associated with the processing of GPS data, like discontinuities, non-uniformities, poor network coverage, and human errors. This study proposes two novel, simple algorithms to extract bus trip and bus stop sequences, from the crude raw data, incorporating those challenges. Moreover, the dwell times at the bus stops are estimated solely using this GPS data in three different possible scenarios in the data filtering process. When considering the previous related studies in this area, the proposed approaches are applied to GPS data obtained at a medium sample rate (for example, 15 seconds) for heterogeneous traffic conditions, and also with a unique dwell time estimation process. In addition, statistical methods are implemented to analyse a variety of novel public transit-system performance metrics, such as (i) excess journey time (EJT); (ii) excess dwelling time (EDT); (ii) excess running time (ERT); and (iv) segment idle time ratio (SITR), at different time horizons, where these metrics are developed in the absence of schedule data. These metrics facilitate the transport authorities in real-time bus monitoring, evaluating their performance, and identifying inappropriate driving behaviours. A detailed explanation is provided through a case study of two main routes in the Kandy district of Sri Lanka.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Screening of Novel ACE Inhibitors using Computational Approach 利用计算方法鉴定和筛选新型ACE抑制剂
Murali Mohan Mishra, Pravir Kumar
Use of acetylcholinesterase (AChE) inhibitor in treating the neurological disorders has long been studied due to its potential to cross the endothelial tight junctions, longer bioavailability, and better ability to penetrate skin. Alzheimer's disease is found to have closely related with the decline in the level of neurotransmitters which leads to deterioration of the cholinergic neurons of the neocortex and the hippocampus of the rat's brain. Impairment in the transmission of cholinergic nerve signals results in the formation of senile plaque and neurofibrillary tangles (NFT). As a result, one of the main goals for the development of therapeutic approaches for Alzheimer's disease has been to improve the cholinergic activities of the brain. The discovery of one of the most efficient acetylcholinesterase inhibitors called Donepezil was proved to be a much better approach as compared to other drugs such as physostigmine and Tacrine. In the present study we have focused on the role of 5,6-dimethoxy-2-(piperidin-4-ylmethyl)-2,3-dihydroinden-l-one as an important acetylcholinesterase in the treatment of Alzheimer's disease. We have performed molecular docking to see the interaction of ACE target protein and the inhibitory ligands and further validated the pharmacokinetic properties of the drug via ADME analysis of the drug.
由于乙酰胆碱酯酶(AChE)抑制剂具有穿过内皮细胞紧密连接、生物利用度较长、穿透皮肤能力较好的潜力,因此对其在神经系统疾病治疗中的应用研究由来已久。发现阿尔茨海默病与神经递质水平下降密切相关,导致大鼠大脑新皮层和海马的胆碱能神经元退化。胆碱能神经信号传递的障碍导致老年斑和神经原纤维缠结的形成。因此,开发阿尔茨海默病治疗方法的主要目标之一是改善大脑的胆碱能活动。发现了一种最有效的乙酰胆碱酯酶抑制剂,叫做多奈哌齐,这被证明是一种更好的方法,与其他药物,如蛇毒碱和他克林相比。在本研究中,我们重点研究了5,6-二甲氧基-2-(哌替啶-4-甲基)-2,3-二氢茚- 1作为一种重要的乙酰胆碱酯酶在阿尔茨海默病治疗中的作用。我们进行分子对接,观察ACE靶蛋白与抑制配体的相互作用,并通过药物的ADME分析进一步验证药物的药代动力学性质。
{"title":"Identification and Screening of Novel ACE Inhibitors using Computational Approach","authors":"Murali Mohan Mishra, Pravir Kumar","doi":"10.1109/ICCT56969.2023.10075941","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075941","url":null,"abstract":"Use of acetylcholinesterase (AChE) inhibitor in treating the neurological disorders has long been studied due to its potential to cross the endothelial tight junctions, longer bioavailability, and better ability to penetrate skin. Alzheimer's disease is found to have closely related with the decline in the level of neurotransmitters which leads to deterioration of the cholinergic neurons of the neocortex and the hippocampus of the rat's brain. Impairment in the transmission of cholinergic nerve signals results in the formation of senile plaque and neurofibrillary tangles (NFT). As a result, one of the main goals for the development of therapeutic approaches for Alzheimer's disease has been to improve the cholinergic activities of the brain. The discovery of one of the most efficient acetylcholinesterase inhibitors called Donepezil was proved to be a much better approach as compared to other drugs such as physostigmine and Tacrine. In the present study we have focused on the role of 5,6-dimethoxy-2-(piperidin-4-ylmethyl)-2,3-dihydroinden-l-one as an important acetylcholinesterase in the treatment of Alzheimer's disease. We have performed molecular docking to see the interaction of ACE target protein and the inhibitory ligands and further validated the pharmacokinetic properties of the drug via ADME analysis of the drug.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132980329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured Environmental Monitoring System 保安环境监察系统
Laasya Sree Talluru, Saketh Kapuganti, Yoga Bhavagna Jonnala, Jetendra Joshi
The Internet of Things (IoT) is a new standard that has transformed the traditional way of life into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy saving, smart transportation, and smart industries are such transformations due to IoT. The IoT system tries to associate with almost all devices at any place. A broad variety of industries is deploying IoT solutions to make the next level of visibility and improved efficiencies. Attackers are forever on the lookout for brand new ways to compromise systems and gain access to information stores and systems. Mostly, gadgets are inclined to vulnerable attacks because of the straightforward and open nature of their networks. This paper gives an overview of the ongoing status and worries of Internet of things (IoT) security and we have focused on mitigating the brute-force attack and performed real-time cases to secure the readings of the sensors stored. This research presents an outline of safety security challenges, proposed countermeasures, and the future bearings for getting the IoT.
物联网(IoT)是将传统生活方式转变为高科技生活方式的新标准。智慧城市、智能家居、污染控制、节能、智能交通、智能产业等都是物联网带来的变革。物联网系统试图与任何地方的几乎所有设备相关联。各种各样的行业正在部署物联网解决方案,以提高可见性和效率。攻击者总是在寻找全新的方法来破坏系统并获得对信息存储和系统的访问权。大多数情况下,小工具容易受到攻击,因为它们的网络是直接和开放的。本文概述了物联网(IoT)安全的现状和担忧,我们专注于减轻暴力攻击,并执行实时案例来保护存储的传感器读数。本研究概述了安全挑战、提出的对策以及获得物联网的未来方向。
{"title":"Secured Environmental Monitoring System","authors":"Laasya Sree Talluru, Saketh Kapuganti, Yoga Bhavagna Jonnala, Jetendra Joshi","doi":"10.1109/ICCT56969.2023.10075967","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075967","url":null,"abstract":"The Internet of Things (IoT) is a new standard that has transformed the traditional way of life into a high-tech lifestyle. Smart cities, smart homes, pollution control, energy saving, smart transportation, and smart industries are such transformations due to IoT. The IoT system tries to associate with almost all devices at any place. A broad variety of industries is deploying IoT solutions to make the next level of visibility and improved efficiencies. Attackers are forever on the lookout for brand new ways to compromise systems and gain access to information stores and systems. Mostly, gadgets are inclined to vulnerable attacks because of the straightforward and open nature of their networks. This paper gives an overview of the ongoing status and worries of Internet of things (IoT) security and we have focused on mitigating the brute-force attack and performed real-time cases to secure the readings of the sensors stored. This research presents an outline of safety security challenges, proposed countermeasures, and the future bearings for getting the IoT.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126681083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Approach against Vampire Attack for Successful Transmission in Wireless Sensor Network 一种防止吸血鬼攻击的无线传感器网络成功传输方法
V. Juneja, Shail Kumar Dinkar
In wireless sensor network, various factors of sensor node are used for ensured delivery of packets like battery or energy, node's status, neighboring nodes etc. which are essential for successful transmission between source and destination as well as among the intermediate nodes. Open communication and lack of energy make networks vulnerable to several security attacks. During data transmission, data packets move from source to destination through many intermediate nodes that may not be trusted. In this paper, a probabilistic approach is proposed to calculate the trust of the nodes. A constant factor of energy is needed to transfer the packet from one node to another. Trust value and estimated energy consumption at every node is determined. If the calculated energy consumption of a node when compared with divided constant factor of energy using fuzzy logic is said to be the trusted node. If energy consumption matches with the estimated energy value approximately then delivery of data packet is assumed successful otherwise it is considered as Vampire Node. In this paper, an algorithm is proposed to detect Vampire Attack to save the network from extra consumption of energy consumed by a particular node. The performance of the proposed algorithm is measured and compared using various parameters such as energy and traffic load.
在无线传感器网络中,传感器节点的各种因素,如电池或能量、节点状态、相邻节点等,都是保证数据包在源和目的之间以及中间节点之间成功传输的必要因素。开放的通信和缺乏能量使网络容易受到几种安全攻击。在数据传输过程中,数据包通过许多可能不可信的中间节点从源移动到目的。本文提出了一种计算节点信任度的概率方法。将数据包从一个节点传输到另一个节点需要一个恒定的能量因子。确定每个节点的信任值和估计能耗。如果计算出的节点能耗与用模糊逻辑划分的能量常数因子进行比较,则称其为可信节点。如果能量消耗与估计能量值大致匹配,则认为数据包传输成功,否则认为该节点为吸血鬼节点。本文提出了一种检测吸血鬼攻击的算法,以避免网络中特定节点消耗的额外能量。利用能量和交通负荷等参数对算法的性能进行了测量和比较。
{"title":"An Approach against Vampire Attack for Successful Transmission in Wireless Sensor Network","authors":"V. Juneja, Shail Kumar Dinkar","doi":"10.1109/ICCT56969.2023.10076140","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076140","url":null,"abstract":"In wireless sensor network, various factors of sensor node are used for ensured delivery of packets like battery or energy, node's status, neighboring nodes etc. which are essential for successful transmission between source and destination as well as among the intermediate nodes. Open communication and lack of energy make networks vulnerable to several security attacks. During data transmission, data packets move from source to destination through many intermediate nodes that may not be trusted. In this paper, a probabilistic approach is proposed to calculate the trust of the nodes. A constant factor of energy is needed to transfer the packet from one node to another. Trust value and estimated energy consumption at every node is determined. If the calculated energy consumption of a node when compared with divided constant factor of energy using fuzzy logic is said to be the trusted node. If energy consumption matches with the estimated energy value approximately then delivery of data packet is assumed successful otherwise it is considered as Vampire Node. In this paper, an algorithm is proposed to detect Vampire Attack to save the network from extra consumption of energy consumed by a particular node. The performance of the proposed algorithm is measured and compared using various parameters such as energy and traffic load.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126956626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of Secure IoT Ecosystems for Healthcare 医疗安全物联网生态系统的开发
Pranav Shirgur, Sandeep Chaurasia
The Internet of Things (IoT) is a rapidly developing field of technology which entails a network of smart devices connected to each other and the internet. The TATCRB2industry is anticipated to increase by 18% to 14.4 billion active connections in 2022. There will likely be about 27 billion linked IoT devices by 2025 as supply limitations, brought about by the current global semiconductor and chip shortage - loosen and demand quickens. IoT has quickly penetrated the healthcare industry, this paper defines a framework that enables the development of secure and scalable IoT healthcare platforms/applications. These platforms will also allow for secure cloud storage and analysis of patient data, helping professionals recognize latent parameters such as patient behavioral patterns that contribute to an ailment. This ultimately will enable the study of social and economic impact of a particular disease. This will greatly cull the survivorship bias in the health care industry - especially in testing times like a pandemic.
物联网(IoT)是一个快速发展的技术领域,它需要一个相互连接的智能设备网络和互联网。预计到2022年,tatcrb2行业将增长18%,达到144亿活跃连接。由于目前全球半导体和芯片短缺带来的供应限制松动,需求加快,到2025年,可能会有大约270亿个联网物联网设备。物联网已经迅速渗透到医疗保健行业,本文定义了一个框架,可以开发安全和可扩展的物联网医疗保健平台/应用程序。这些平台还将允许安全的云存储和患者数据分析,帮助专业人员识别潜在的参数,如导致疾病的患者行为模式。这最终将使研究特定疾病的社会和经济影响成为可能。这将极大地消除医疗保健行业的生存偏差——尤其是在大流行这样的考验时期。
{"title":"Development of Secure IoT Ecosystems for Healthcare","authors":"Pranav Shirgur, Sandeep Chaurasia","doi":"10.1109/ICCT56969.2023.10076119","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076119","url":null,"abstract":"The Internet of Things (IoT) is a rapidly developing field of technology which entails a network of smart devices connected to each other and the internet. The TATCRB2industry is anticipated to increase by 18% to 14.4 billion active connections in 2022. There will likely be about 27 billion linked IoT devices by 2025 as supply limitations, brought about by the current global semiconductor and chip shortage - loosen and demand quickens. IoT has quickly penetrated the healthcare industry, this paper defines a framework that enables the development of secure and scalable IoT healthcare platforms/applications. These platforms will also allow for secure cloud storage and analysis of patient data, helping professionals recognize latent parameters such as patient behavioral patterns that contribute to an ailment. This ultimately will enable the study of social and economic impact of a particular disease. This will greatly cull the survivorship bias in the health care industry - especially in testing times like a pandemic.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115613688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Detection of Fraudulent Credit Card Transactions Using Machine Learning Algorithms 利用机器学习算法检测欺诈性信用卡交易的研究
Asifuddin Nasiruddin Ahmed, Ravinder Saini
Fraudulent transaction in credit cards has frequently rise in couple of years. Credit card fraud is a major issue for financial organizations, and accurate fraud detection is often difficult. Over Fifty percent of Americans have encountered a fraudulent transaction on their debit or credit card, and more than 1/3 of those who use these cards have done so repeatedly, according to 2021 yearly research. This translates to one hundred and twenty-seven million Americans who have at least once experienced credit card theft. Detection of such fraud happening over huge database is very difficult and time consuming using conventional method. By taking help of AI technology and developing an automated fraud detection system to detect and classify such mishappening using machine learning is an efficient way to deal with this kind of problem. This paper reviews various researchers work on detection of credit card frauds on highly imbalance dataset and discusses some machine learning techniques as Random Forest, Logistic Regression, SVM, Naive Bayes, XGBoost and KNN which are generally used by various researchers to build a model. The findings obtained from various researchers work showed that ensemble machine learning technique such as XGBoost and Random Forest are more capable of providing all over good performance in classifying such fraudulent and non-fraudulent transactions in credit cards.
近年来,信用卡诈骗案件不断增多。信用卡欺诈是金融机构的主要问题,准确的欺诈检测通常是困难的。根据2021年的年度研究,超过50%的美国人在借记卡或信用卡上遇到过欺诈交易,超过三分之一的使用这些卡的人多次这样做。这意味着有1.27亿美国人至少经历过一次信用卡被盗。在庞大的数据库中,使用传统方法检测此类欺诈行为非常困难且耗时。借助人工智能技术,开发自动欺诈检测系统,利用机器学习对此类错误进行检测和分类,是解决此类问题的有效途径。本文回顾了不同研究人员在高度失衡数据集上的信用卡欺诈检测工作,并讨论了一些机器学习技术,如随机森林、逻辑回归、支持向量机、朴素贝叶斯、XGBoost和KNN,这些技术通常被不同的研究人员用来建立模型。从各种研究人员的工作中获得的发现表明,集成机器学习技术(如XGBoost和Random Forest)更有能力在分类信用卡中的欺诈性和非欺诈性交易方面提供全面的性能。
{"title":"A Survey on Detection of Fraudulent Credit Card Transactions Using Machine Learning Algorithms","authors":"Asifuddin Nasiruddin Ahmed, Ravinder Saini","doi":"10.1109/ICCT56969.2023.10076122","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076122","url":null,"abstract":"Fraudulent transaction in credit cards has frequently rise in couple of years. Credit card fraud is a major issue for financial organizations, and accurate fraud detection is often difficult. Over Fifty percent of Americans have encountered a fraudulent transaction on their debit or credit card, and more than 1/3 of those who use these cards have done so repeatedly, according to 2021 yearly research. This translates to one hundred and twenty-seven million Americans who have at least once experienced credit card theft. Detection of such fraud happening over huge database is very difficult and time consuming using conventional method. By taking help of AI technology and developing an automated fraud detection system to detect and classify such mishappening using machine learning is an efficient way to deal with this kind of problem. This paper reviews various researchers work on detection of credit card frauds on highly imbalance dataset and discusses some machine learning techniques as Random Forest, Logistic Regression, SVM, Naive Bayes, XGBoost and KNN which are generally used by various researchers to build a model. The findings obtained from various researchers work showed that ensemble machine learning technique such as XGBoost and Random Forest are more capable of providing all over good performance in classifying such fraudulent and non-fraudulent transactions in credit cards.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116522144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automated Pneumonia Detection using deep features in chest X-ray images 利用胸部x线图像的深度特征自动检测肺炎
Taoufik Ouleddroun, Ayoub Ellahyani, M. El Ansari
Pneumonia is swelling of the lungs that is usually caused by an infection. This disease is considered as one of the most common reasons for US children to be hospitalized. According to American Thoracic Society (ATS), the cost of treating pneumonia cases in hospitals reached 9.5 billion dollar. The appropriate treatment and recovery process for this disease are linked to early diagnosis. In this work a novel method is proposed for detecting the pneumonia and help the radiologists in their decision making process. First, histogram equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE) are calculated for chest X-ray images. Then, the images extracted are fed to a model consisting of two stream of Convolutional Neural Networks (CNN) that was trained on the Pneumonia Kermany dataset. Finally, several machine learning classifiers are employed to perform the detection process based on the deep features extracted. The proposed system achieves 97.86% in terms of accuracy on the Kermany dataset, which is satisfactory when compared to recently published works.
肺炎通常是由感染引起的肺部肿胀。这种疾病被认为是美国儿童住院的最常见原因之一。据美国胸科学会(ATS)统计,医院治疗肺炎的费用高达95亿美元。这种疾病的适当治疗和康复过程与早期诊断有关。本文提出了一种新的肺炎检测方法,以帮助放射科医生进行决策。首先,对胸部x线图像进行直方图均衡化(HE)和对比度有限自适应直方图均衡化(CLAHE)计算。然后,提取的图像被输入到一个由两个卷积神经网络(CNN)流组成的模型中,该模型在肺炎德国数据集上进行了训练。最后,基于提取的深度特征,使用多个机器学习分类器进行检测。该系统在德国数据集上的准确率达到了97.86%,与最近发表的作品相比,这是令人满意的。
{"title":"Automated Pneumonia Detection using deep features in chest X-ray images","authors":"Taoufik Ouleddroun, Ayoub Ellahyani, M. El Ansari","doi":"10.1109/ICCT56969.2023.10076157","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076157","url":null,"abstract":"Pneumonia is swelling of the lungs that is usually caused by an infection. This disease is considered as one of the most common reasons for US children to be hospitalized. According to American Thoracic Society (ATS), the cost of treating pneumonia cases in hospitals reached 9.5 billion dollar. The appropriate treatment and recovery process for this disease are linked to early diagnosis. In this work a novel method is proposed for detecting the pneumonia and help the radiologists in their decision making process. First, histogram equalization (HE) and Contrast Limited Adaptive Histogram Equalization (CLAHE) are calculated for chest X-ray images. Then, the images extracted are fed to a model consisting of two stream of Convolutional Neural Networks (CNN) that was trained on the Pneumonia Kermany dataset. Finally, several machine learning classifiers are employed to perform the detection process based on the deep features extracted. The proposed system achieves 97.86% in terms of accuracy on the Kermany dataset, which is satisfactory when compared to recently published works.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122078734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach to Object Detection: Object Search 一种新的目标检测方法:目标搜索
Madhavendra Singh
Most object detection algorithms attempt to detect all objects present in an image and accordingly classify them. While that approach is useful for various domains and applications, there are also many cases where we would only want to search for a particular object in a given image. For such cases, there is potential to optimize the search by focusing on the object we are looking for and ignoring the rest of the information in the image to the maximum possible extent, thereby greatly improving the computation speed. In this light, I have developed a model which can search for an object given in an image (the object image) in another image where the object mayor may not be present (the target image). The design takes inspiration from Siamese Neural Networks and techniques applied in other object detection algorithms and combines them with a novel technique and loss. I have trained and tested the model using images from the COCO dataset. It has shown improvement in computation speed compared to other state-of-the-art models for the desired task, along with appreciable accuracy.
大多数物体检测算法都试图检测图像中存在的所有物体,并相应地对它们进行分类。虽然这种方法对各种领域和应用程序都很有用,但在许多情况下,我们只希望在给定图像中搜索特定对象。对于这种情况,有可能通过关注我们正在寻找的对象而最大程度地忽略图像中的其他信息来优化搜索,从而大大提高计算速度。从这个角度来看,我开发了一个模型,可以在另一个可能不存在对象的图像(目标图像)中搜索图像中给定的对象(对象图像)。该设计的灵感来自于暹罗神经网络和其他物体检测算法中应用的技术,并将它们与一种新颖的技术和损失相结合。我已经使用COCO数据集的图像训练和测试了模型。与其他最先进的模型相比,它的计算速度有所提高,并且具有可观的准确性。
{"title":"A Novel Approach to Object Detection: Object Search","authors":"Madhavendra Singh","doi":"10.1109/ICCT56969.2023.10076212","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076212","url":null,"abstract":"Most object detection algorithms attempt to detect all objects present in an image and accordingly classify them. While that approach is useful for various domains and applications, there are also many cases where we would only want to search for a particular object in a given image. For such cases, there is potential to optimize the search by focusing on the object we are looking for and ignoring the rest of the information in the image to the maximum possible extent, thereby greatly improving the computation speed. In this light, I have developed a model which can search for an object given in an image (the object image) in another image where the object mayor may not be present (the target image). The design takes inspiration from Siamese Neural Networks and techniques applied in other object detection algorithms and combines them with a novel technique and loss. I have trained and tested the model using images from the COCO dataset. It has shown improvement in computation speed compared to other state-of-the-art models for the desired task, along with appreciable accuracy.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123015409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Neural Network Based Short Time Electricity Price Prediction 基于鲁棒神经网络的短期电价预测
Anany Pandey, Manish Pandey
Price prediction and load forecasting is a difficult task for industries. Electricity price are varied according to load or demand of energy. In this article suggested a novel approach for load and price forecasting based on neural network with improved Polak-Rlbière-Polyak(PRP) learning approach. For training and testing purpose use Russian wholesale market. For the implementation and simulation of proposed approach use matrix laboratory (MATLAB) R2020a and high performance computing (HPC) lab. For the evaluation of proposed method use different result parameter mean absolute percentage error, mean square error and root mean square error. The proposed approach shows lower error rate as compare to different techniques proposed by different researchers in terms of MSE, RMSE and MAPE. For the proposed method MAPE value is 1.2069%.
价格预测和负荷预测是一项艰巨的任务。电价根据负荷或能源需求而变化。本文提出了一种基于神经网络的负荷和电价预测新方法,改进了polak - rlbi - polak (PRP)学习方法。用于培训和测试目的使用俄罗斯批发市场。采用矩阵实验室(MATLAB) R2020a和高性能计算实验室(HPC)对所提出的方法进行实现和仿真。采用不同的结果参数对所提出的方法进行评价,分别为平均绝对百分比误差、均方误差和均方根误差。与不同研究人员在MSE、RMSE和MAPE方面提出的不同方法相比,该方法的错误率较低。对于提出的方法,MAPE值为1.2069%。
{"title":"A Robust Neural Network Based Short Time Electricity Price Prediction","authors":"Anany Pandey, Manish Pandey","doi":"10.1109/ICCT56969.2023.10075993","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075993","url":null,"abstract":"Price prediction and load forecasting is a difficult task for industries. Electricity price are varied according to load or demand of energy. In this article suggested a novel approach for load and price forecasting based on neural network with improved Polak-Rlbière-Polyak(PRP) learning approach. For training and testing purpose use Russian wholesale market. For the implementation and simulation of proposed approach use matrix laboratory (MATLAB) R2020a and high performance computing (HPC) lab. For the evaluation of proposed method use different result parameter mean absolute percentage error, mean square error and root mean square error. The proposed approach shows lower error rate as compare to different techniques proposed by different researchers in terms of MSE, RMSE and MAPE. For the proposed method MAPE value is 1.2069%.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116956358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Impersonated Human Speech Chatbot with Adaptive Frequency Spectrum 具有自适应频谱的模拟人类语音聊天机器人
Gautam Chettiar, A. Shukla, Preet Nalwaya, K. Sethi, Surya Prakash
Recent trends in artificial intelligence and natural language processing models have led to the generation of highly efficient and versatile intelligent chatbot models., which have the potential to supplant human speech to the level of conversational proficiency. The proposed method creates a chatbot model that trains itself on open conversation datasets and aims to impersonate without compromising the emotional sentiments in the voice. These datasets extract from the applications such as WhatsApp., Telegram., Messenger., or any other chatting platform. Datasets convert to a machine-readable format., which is dynamically updated in real-time during the conversation., and then using speech conversion algorithms convert the reply into the desired individual's voice. The proposed model's conversational ability depends on the amount of conversation data., which gives the output in the person's voice frequency. By using an NLP-based chatbot trained on personalized data using KNN., and handling misses by pipelining the chatbot inputs to the GPT-2 model., the model can generate human-like replies even if there is data insufficiency. The natural replies are complemented with matching human voice and tone characteristics by using the vocoder model., which matches the spectral characteristics of the target voice onto the required voice. This opens a plethora of commercial and therapeutic applications that provide excellent insights into implementing natural communication models for humanoid and robotics innovations.
人工智能和自然语言处理模型的最新趋势导致了高效、通用的智能聊天机器人模型的产生。它们有可能取代人类的语言,达到对话的熟练程度。该方法创建了一个聊天机器人模型,该模型在开放的对话数据集上进行自我训练,旨在在不影响语音情感的情况下进行模拟。这些数据集是从WhatsApp等应用程序中提取的。电报。信使。,或其他聊天平台。数据集转换为机器可读的格式。,在对话过程中实时动态更新。,然后使用语音转换算法将回复转换为所需个人的声音。该模型的会话能力取决于会话数据的数量。,它以人的声音频率输出。通过使用基于nlp的聊天机器人,使用KNN对个性化数据进行训练。,并通过将聊天机器人的输入流水线化到GPT-2模型来处理失误。,即使在数据不足的情况下,该模型也能生成类似人类的回答。通过使用声码器模型,将自然回复与匹配的人声和音调特征相辅相成。,将目标语音的频谱特征与所需语音相匹配。这打开了大量的商业和治疗应用,为实现人形和机器人创新的自然通信模型提供了极好的见解。
{"title":"Impersonated Human Speech Chatbot with Adaptive Frequency Spectrum","authors":"Gautam Chettiar, A. Shukla, Preet Nalwaya, K. Sethi, Surya Prakash","doi":"10.1109/ICCT56969.2023.10076120","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076120","url":null,"abstract":"Recent trends in artificial intelligence and natural language processing models have led to the generation of highly efficient and versatile intelligent chatbot models., which have the potential to supplant human speech to the level of conversational proficiency. The proposed method creates a chatbot model that trains itself on open conversation datasets and aims to impersonate without compromising the emotional sentiments in the voice. These datasets extract from the applications such as WhatsApp., Telegram., Messenger., or any other chatting platform. Datasets convert to a machine-readable format., which is dynamically updated in real-time during the conversation., and then using speech conversion algorithms convert the reply into the desired individual's voice. The proposed model's conversational ability depends on the amount of conversation data., which gives the output in the person's voice frequency. By using an NLP-based chatbot trained on personalized data using KNN., and handling misses by pipelining the chatbot inputs to the GPT-2 model., the model can generate human-like replies even if there is data insufficiency. The natural replies are complemented with matching human voice and tone characteristics by using the vocoder model., which matches the spectral characteristics of the target voice onto the required voice. This opens a plethora of commercial and therapeutic applications that provide excellent insights into implementing natural communication models for humanoid and robotics innovations.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131605715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1