首页 > 最新文献

2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)最新文献

英文 中文
A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption 使用对称、非对称和基于DNA加密的混合密码方法
Vikas Yadav, M. Kumar
Cloud computing is simply exchanging data over a digital network to a remote location. In spite of security risks, cloud computing has become a necessity of human digital life therefore the data must be safeguard from exploiters. There are numerous algorithms widely known to secure intelligence along the new branch of data encryption evolving and forming in parallel. Presented paper combines three such branches of cryptography i.e. symmetric, asymmetric, and biological DNA cryptography. The goal is to find a balance between increasing complexity and the time taken for encryption. This paper is an attempt to unlock the future of cryptography where an amalgam of traditional ciphers used with modernera advanced biological ciphers and check their cross-functional compatibility with each other. The resulting algorithm lies between the symmetric and asymmetric cryptography on both parameters i.e. complexity and processing time. The resulting hybrid algorithm found at least 20.7398% faster than traditional RSA algorithm with bio complexity superior to AES algorithm for package greater than 200 kilobytes.
云计算只是通过数字网络将数据交换到远程位置。尽管存在安全风险,但云计算已经成为人类数字生活的必需品,因此必须保护数据免受攻击者的攻击。在数据加密的新分支并行发展和形成的过程中,有许多已知的算法来保护智能。本文结合了密码学的三个分支,即对称密码学、非对称密码学和生物DNA密码学。目标是在不断增加的复杂性和加密所花费的时间之间找到平衡。本文试图解开密码学的未来,将传统密码与现代先进的生物密码混合使用,并检查它们之间的跨功能兼容性。所得到的算法在复杂度和处理时间这两个参数上都介于对称密码和非对称密码之间。所得混合算法比传统RSA算法至少快20.7398%,生物复杂度优于AES算法,数据包大于200kb。
{"title":"A Hybrid Cryptography Approach Using Symmetric, Asymmetric and DNA Based Encryption","authors":"Vikas Yadav, M. Kumar","doi":"10.1109/ICCT56969.2023.10076124","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076124","url":null,"abstract":"Cloud computing is simply exchanging data over a digital network to a remote location. In spite of security risks, cloud computing has become a necessity of human digital life therefore the data must be safeguard from exploiters. There are numerous algorithms widely known to secure intelligence along the new branch of data encryption evolving and forming in parallel. Presented paper combines three such branches of cryptography i.e. symmetric, asymmetric, and biological DNA cryptography. The goal is to find a balance between increasing complexity and the time taken for encryption. This paper is an attempt to unlock the future of cryptography where an amalgam of traditional ciphers used with modernera advanced biological ciphers and check their cross-functional compatibility with each other. The resulting algorithm lies between the symmetric and asymmetric cryptography on both parameters i.e. complexity and processing time. The resulting hybrid algorithm found at least 20.7398% faster than traditional RSA algorithm with bio complexity superior to AES algorithm for package greater than 200 kilobytes.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125593326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counterfeit Drug Prevention in Pharma Supply Chain using Blockchain Technology 利用区块链技术预防制药供应链中的假药
Ram Krishna Jha, Parvez Alam, Nitin Priyadarshi, Mohammad Asad Ghazi, M. Bhargavi
Fake drugs are a growing serious issue related to the healthcare industry which causes extraordinary dangers to the society and the environment. Tracing the drugs at every step of the pharma supply chain is a difficult task. The goal of the research is to create a blockchain-based model that can forestall drug forging in drug store networks. The scope of the research lies where irregularities in the pharmaceutical supply chain affect public health and economy. The advanced elements of Blockchain makes it fit for complete recognizability of medications from producer to end patients, and the capacity to prevent fake prescriptions or medications. Drugs change proprietorship from producers to distributors and afterward retailers before it arrives at the client. Through the proposed model, the producer would have the option to transfer the subtleties relating to a medication, after which it will be sent for endorsement to the Government. From there on, distributors and retailers, in view of their prerequisites, can demand the endorsed drugs. Later on, in the event that a patient needs some drug, the person should demand it on the blockchain network. The solicitation will be shipped off the closest retailer/drug store and from that point, the patient can gather their medicine. Hyperledger fabric is utilized because they are permissioned and have an open source blockchain framework, meaning all the organization and pears are well known and confirmed. Our execution of the proposed blockchain based model features that the model can effectively forestall any medication being fake. This will be advantageous for the clients getting impacted with fake medications.
假药是与医疗保健行业相关的一个日益严重的问题,它对社会和环境造成了极大的危害。追踪药品供应链的每一步是一项艰巨的任务。该研究的目标是创建一个基于区块链的模型,可以防止药店网络中的药物伪造。研究的范围是药品供应链的不规范对公共健康和经济的影响。区块链的先进元素使其适合从生产者到最终患者的药物完全可识别性,以及防止假处方或药物的能力。药品在到达客户手中之前,所有权从生产商转移到分销商,然后再转移到零售商。通过拟议的模式,生产者可以选择转移与药物有关的细微之处,然后将其发送给政府批准。从那时起,分销商和零售商,鉴于他们的先决条件,可以要求批准的药物。后来,如果病人需要某种药物,这个人应该在区块链网络上提出要求。招标将从最近的零售商/药店发货,从那里,患者可以收集他们的药物。使用超级账本结构是因为它们是经过许可的,并且具有开源的区块链框架,这意味着所有的组织和梨都是众所周知的和确认的。我们提出的基于区块链的模型的执行特点是,该模型可以有效地预防任何药物是假的。这将有利于客户受到假药的影响。
{"title":"Counterfeit Drug Prevention in Pharma Supply Chain using Blockchain Technology","authors":"Ram Krishna Jha, Parvez Alam, Nitin Priyadarshi, Mohammad Asad Ghazi, M. Bhargavi","doi":"10.1109/ICCT56969.2023.10076043","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076043","url":null,"abstract":"Fake drugs are a growing serious issue related to the healthcare industry which causes extraordinary dangers to the society and the environment. Tracing the drugs at every step of the pharma supply chain is a difficult task. The goal of the research is to create a blockchain-based model that can forestall drug forging in drug store networks. The scope of the research lies where irregularities in the pharmaceutical supply chain affect public health and economy. The advanced elements of Blockchain makes it fit for complete recognizability of medications from producer to end patients, and the capacity to prevent fake prescriptions or medications. Drugs change proprietorship from producers to distributors and afterward retailers before it arrives at the client. Through the proposed model, the producer would have the option to transfer the subtleties relating to a medication, after which it will be sent for endorsement to the Government. From there on, distributors and retailers, in view of their prerequisites, can demand the endorsed drugs. Later on, in the event that a patient needs some drug, the person should demand it on the blockchain network. The solicitation will be shipped off the closest retailer/drug store and from that point, the patient can gather their medicine. Hyperledger fabric is utilized because they are permissioned and have an open source blockchain framework, meaning all the organization and pears are well known and confirmed. Our execution of the proposed blockchain based model features that the model can effectively forestall any medication being fake. This will be advantageous for the clients getting impacted with fake medications.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129655111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IHDNA: Identical Hybrid Deep Neural Networks for Alzheimer's Detection using MRI Dataset IHDNA:使用MRI数据集检测阿尔茨海默氏症的相同混合深度神经网络
Adwitiya Pratap Singh, Nisarg Upadhyay, V. G. Shankar, B. Devi
It has been ascertained in recent studies that AD (Alzheimer's disease, a neurodegenerative disorder) and its earlier stages can be detected by neuroimaging biomarkers. To the prevention, previous studies have focused on volumetric asymmetry and brain atrophy. The identification of AD in its early stages has proven to be imperative, as Alzheimer's disease cannot be cured and can only slow its progression. Developing on that idea, this study aims to use the discriminative powers of a Siamese-inspired identical hybrid neural network for the task of classification between multiple stages. The proposed method uses a homemade pipeline for preprocessing and removing other unwanted components from the MRIs that might disturb the model. Registering all the MRI images to MNI space and resampling the slices helped in normalizing the whole dataset. This study uses feature-based methods to work with low-dimensional characteristics rather than high-dimensional voxel data can lessen computing cost and time spent. We used VGG-16 style net with image-net weights for the purpose of automatic feature extraction. T1-weighted MRIs were used for the research, which were accessed from the ADNI datasets ADNI2 and ADNI3. When compared to a normal DNN, our proposed identical hybrid neural network achieved better precision and F1-score.
在最近的研究中已经确定,AD(阿尔茨海默病,一种神经退行性疾病)及其早期阶段可以通过神经成像生物标志物检测到。对于预防,以往的研究主要集中在体积不对称和脑萎缩。由于阿尔茨海默病无法治愈,只能减缓其进展,因此在其早期阶段识别AD已被证明是必要的。在此基础上,本研究旨在利用暹罗启发的相同混合神经网络的判别能力来完成多阶段之间的分类任务。提出的方法使用自制的管道进行预处理,并从核磁共振成像中去除可能干扰模型的其他不需要的组件。将所有MRI图像注册到MNI空间并重新采样切片有助于规范化整个数据集。本研究使用基于特征的方法来处理低维特征而不是高维体素数据,可以减少计算成本和时间。我们使用了VGG-16样式的带有图像净权重的网络来实现自动特征提取。研究使用的是来自ADNI数据集ADNI2和ADNI3的t1加权mri。与普通深度神经网络相比,我们提出的相同混合神经网络具有更好的精度和f1分数。
{"title":"IHDNA: Identical Hybrid Deep Neural Networks for Alzheimer's Detection using MRI Dataset","authors":"Adwitiya Pratap Singh, Nisarg Upadhyay, V. G. Shankar, B. Devi","doi":"10.1109/ICCT56969.2023.10075912","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075912","url":null,"abstract":"It has been ascertained in recent studies that AD (Alzheimer's disease, a neurodegenerative disorder) and its earlier stages can be detected by neuroimaging biomarkers. To the prevention, previous studies have focused on volumetric asymmetry and brain atrophy. The identification of AD in its early stages has proven to be imperative, as Alzheimer's disease cannot be cured and can only slow its progression. Developing on that idea, this study aims to use the discriminative powers of a Siamese-inspired identical hybrid neural network for the task of classification between multiple stages. The proposed method uses a homemade pipeline for preprocessing and removing other unwanted components from the MRIs that might disturb the model. Registering all the MRI images to MNI space and resampling the slices helped in normalizing the whole dataset. This study uses feature-based methods to work with low-dimensional characteristics rather than high-dimensional voxel data can lessen computing cost and time spent. We used VGG-16 style net with image-net weights for the purpose of automatic feature extraction. T1-weighted MRIs were used for the research, which were accessed from the ADNI datasets ADNI2 and ADNI3. When compared to a normal DNN, our proposed identical hybrid neural network achieved better precision and F1-score.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131630017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Decentralized Identity Management System using the amalgamation of Blockchain Technology 融合区块链技术的去中心化身份管理系统
Shreya Gupta, Amit Kumar Bairwa, Satpal Singh Kushwaha, Sandeep Joshi
In the recent past, with the advancement of tech-nologies, many changes have been made in Identity Management Systems across the globe. Identity cards have become an inextri-cable part of our lives. With time, authentication of a person's identity and data breaching has led to privacy concerns. The rapid growth of the population raises the challenge of storing large data securely. A new approach to data encryption and hashing can resolve concerns of privacy, security, data handling, and more. Blockchain Technology and the Internet Of Things will improve the current ecosystem. The devised model will be using the AES algorithm for the encryption of biometrics and demographic data. Additionally, the symmetrically distributed storage system, the InterPlanetary File System(IPFS) will be used and data will be hashed by SHA-256. Furthermore, key pairs will be assigned to IoT devices to store the data on a distributed ledger system. This paper will also introduce the merging of Blockchain and IoT, thus ensuring better security and connectivity in a decentralized manner.
近年来,随着科技的进步,全球的身份管理系统发生了许多变化。身份证已经成为我们生活中不可分割的一部分。随着时间的推移,个人身份认证和数据泄露引发了隐私问题。人口的快速增长提出了安全存储大数据的挑战。一种新的数据加密和散列方法可以解决隐私、安全性、数据处理等问题。区块链技术和物联网将改善当前的生态系统。设计的模型将使用AES算法对生物特征和人口统计数据进行加密。此外,将使用对称分布式存储系统,星际文件系统(IPFS),数据将通过SHA-256进行散列。此外,密钥对将被分配给物联网设备,以将数据存储在分布式账本系统上。本文还将介绍区块链与IoT的融合,从而以分散的方式确保更好的安全性和连接性。
{"title":"Decentralized Identity Management System using the amalgamation of Blockchain Technology","authors":"Shreya Gupta, Amit Kumar Bairwa, Satpal Singh Kushwaha, Sandeep Joshi","doi":"10.1109/ICCT56969.2023.10076117","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076117","url":null,"abstract":"In the recent past, with the advancement of tech-nologies, many changes have been made in Identity Management Systems across the globe. Identity cards have become an inextri-cable part of our lives. With time, authentication of a person's identity and data breaching has led to privacy concerns. The rapid growth of the population raises the challenge of storing large data securely. A new approach to data encryption and hashing can resolve concerns of privacy, security, data handling, and more. Blockchain Technology and the Internet Of Things will improve the current ecosystem. The devised model will be using the AES algorithm for the encryption of biometrics and demographic data. Additionally, the symmetrically distributed storage system, the InterPlanetary File System(IPFS) will be used and data will be hashed by SHA-256. Furthermore, key pairs will be assigned to IoT devices to store the data on a distributed ledger system. This paper will also introduce the merging of Blockchain and IoT, thus ensuring better security and connectivity in a decentralized manner.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"10 8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132232741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Hate Speech in Hindi in Online Social Media 在线社交媒体上印地语仇恨言论的检测
Anushka Sharma, Rishabh Kaushal
Because of the rise in online hatred, the research communities of artificial intelligence, particularly natural language processing, have been developing models for identifying online hatred. Recently, code-mixing, or the usage of multiple languages in social media conversations, has made multilingual hatred a significant difficulty for automated detection. The crucial task involved in NLP is identifying inciting hatred in writings on social networking sites. This work has several relevant applications, including analysis of sentiments, cyberbullying in online world, and societal & political conflict studies. Using tweets that have been put online on Twitter, we analyze the issue of hatred detection in multilingual functionality in this paper. The tweets have the text annotations and the speech category (Normal speech or Hate speech) to which these belong. We, therefore, recommend a monitored method for detecting hatred. Additionally, the classification approach is provided, which uses certain characters level, words level, and lexicons-based features for identifying hate speech in the corpus. We obtain results of 96% accuracy in identifying posts across four classifiers. Index Terms—Hate speech, Multilingual, Code-mixing, NLP
由于网络仇恨的增加,人工智能研究团体,特别是自然语言处理,一直在开发识别网络仇恨的模型。最近,代码混合,或在社交媒体对话中使用多种语言,使多语言仇恨成为自动检测的一个重大困难。NLP的关键任务是识别社交网站上煽动仇恨的文章。这项工作有几个相关的应用,包括情绪分析,网络世界中的网络欺凌,以及社会和政治冲突研究。本文利用Twitter上发布的推文,分析了多语言功能中的仇恨检测问题。tweet具有文本注释和所属的语音类别(正常语音或仇恨语音)。因此,我们推荐一种监测仇恨的方法。此外,还提出了一种分类方法,该方法使用一定的字符级、词级和基于词典的特征来识别语料库中的仇恨言论。我们在识别四个分类器的帖子中获得了96%的准确率。索引术语-仇恨言论,多语言,代码混合,自然语言处理
{"title":"Detecting Hate Speech in Hindi in Online Social Media","authors":"Anushka Sharma, Rishabh Kaushal","doi":"10.1109/ICCT56969.2023.10075749","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075749","url":null,"abstract":"Because of the rise in online hatred, the research communities of artificial intelligence, particularly natural language processing, have been developing models for identifying online hatred. Recently, code-mixing, or the usage of multiple languages in social media conversations, has made multilingual hatred a significant difficulty for automated detection. The crucial task involved in NLP is identifying inciting hatred in writings on social networking sites. This work has several relevant applications, including analysis of sentiments, cyberbullying in online world, and societal & political conflict studies. Using tweets that have been put online on Twitter, we analyze the issue of hatred detection in multilingual functionality in this paper. The tweets have the text annotations and the speech category (Normal speech or Hate speech) to which these belong. We, therefore, recommend a monitored method for detecting hatred. Additionally, the classification approach is provided, which uses certain characters level, words level, and lexicons-based features for identifying hate speech in the corpus. We obtain results of 96% accuracy in identifying posts across four classifiers. Index Terms—Hate speech, Multilingual, Code-mixing, NLP","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"100 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134476507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-Source Software Security Challenges and Policies for Cloud Enterprises 面向云企业的开源软件安全挑战与策略
Sagar Gupta, S. Vadlamudi
Cloud computing stimulated the development of agile software. The new oil is software. More than 70-90% of the software is open-source, and its usage is inevitable. Open source encourages innovation through collaboration, reduces Time-To-Market, and fuels breakthrough technologies from the past few decades. In a way, open source is eating software or driving the Software world. Open source communities involve more contributors /developers, sometimes posing substantial security challenges. Recently, we have witnessed SolarWinds compromising the entire supply chain, Log4j allowing access to execute code with critical zero-day vulnerability remotely. The digital universe paused because these zero-day vulnerabilities exploded as an outcome. In this work, we will highlight challenges and propose an approach to help organisations protect the code base by safely consuming the Open Source.
云计算刺激了敏捷软件的开发。新的石油是软件。超过70-90%的软件是开源的,它的使用是不可避免的。开源鼓励通过协作进行创新,缩短上市时间,并为过去几十年的突破性技术提供动力。在某种程度上,开源正在吞噬软件或推动软件世界。开源社区涉及更多的贡献者/开发人员,有时会带来重大的安全挑战。最近,我们目睹了SolarWinds破坏了整个供应链,Log4j允许访问远程执行具有关键零日漏洞的代码。数字世界暂停了,因为这些零日漏洞爆发了。在这项工作中,我们将强调挑战,并提出一种方法来帮助组织通过安全使用开源来保护代码库。
{"title":"Open-Source Software Security Challenges and Policies for Cloud Enterprises","authors":"Sagar Gupta, S. Vadlamudi","doi":"10.1109/ICCT56969.2023.10076194","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076194","url":null,"abstract":"Cloud computing stimulated the development of agile software. The new oil is software. More than 70-90% of the software is open-source, and its usage is inevitable. Open source encourages innovation through collaboration, reduces Time-To-Market, and fuels breakthrough technologies from the past few decades. In a way, open source is eating software or driving the Software world. Open source communities involve more contributors /developers, sometimes posing substantial security challenges. Recently, we have witnessed SolarWinds compromising the entire supply chain, Log4j allowing access to execute code with critical zero-day vulnerability remotely. The digital universe paused because these zero-day vulnerabilities exploded as an outcome. In this work, we will highlight challenges and propose an approach to help organisations protect the code base by safely consuming the Open Source.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121200899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Content based Video Recommendation System 基于内容的视频推荐系统
Harshal Shrimali, Rahul Saxena, Kavita
We launched a new method of recommending youTube videos. Our algorithm suggests videos based on their semantic similarity to the query using the transcripts of the videos and ranking them using natural language ranking algorithms. In terms of quality and information, our method has the potential to provide better-related videos than tag-based recommendation. This can be useful for recommending educational videos and can be used on ed-tech platforms and MOOC course platforms.
我们推出了一种推荐youTube视频的新方法。我们的算法根据视频文本与查询的语义相似度来推荐视频,并使用自然语言排序算法对其进行排序。在质量和信息方面,我们的方法有可能提供比基于标签的推荐更好的相关视频。这对推荐教育视频很有用,可以在教育技术平台和MOOC课程平台上使用。
{"title":"Content based Video Recommendation System","authors":"Harshal Shrimali, Rahul Saxena, Kavita","doi":"10.1109/ICCT56969.2023.10075906","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075906","url":null,"abstract":"We launched a new method of recommending youTube videos. Our algorithm suggests videos based on their semantic similarity to the query using the transcripts of the videos and ranking them using natural language ranking algorithms. In terms of quality and information, our method has the potential to provide better-related videos than tag-based recommendation. This can be useful for recommending educational videos and can be used on ed-tech platforms and MOOC course platforms.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122736467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Driver Drowsiness Detecion using Transfer learning 使用迁移学习的实时驾驶员困倦检测
N. Gupta, Faizan Khan, Bhavna Saini
According to statistics, drowsy driving is the leading cause of accidents worldwide that result in the loss of precious lives and worsen public health. When a driver is fatigued, cameras can be employed to detect their drowsiness and inform them well before which can help in decreasing accidents. This work employes a transfer Learning model DenseNet to identify the driver drowsiness in real time. The MRL eye dataset of 84923 images has been used and the model works well with 91.56% accuracy.
据统计,疲劳驾驶是世界范围内交通事故的主要原因,造成宝贵生命的损失,并恶化公共卫生。当司机疲劳时,摄像头可以检测到他们的困倦状态,并提前通知他们,这有助于减少事故。这项工作采用了一个迁移学习模型DenseNet来实时识别驾驶员的困倦状态。利用MRL眼睛数据集84923张图像,模型运行良好,准确率为91.56%。
{"title":"Real Time Driver Drowsiness Detecion using Transfer learning","authors":"N. Gupta, Faizan Khan, Bhavna Saini","doi":"10.1109/ICCT56969.2023.10075913","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075913","url":null,"abstract":"According to statistics, drowsy driving is the leading cause of accidents worldwide that result in the loss of precious lives and worsen public health. When a driver is fatigued, cameras can be employed to detect their drowsiness and inform them well before which can help in decreasing accidents. This work employes a transfer Learning model DenseNet to identify the driver drowsiness in real time. The MRL eye dataset of 84923 images has been used and the model works well with 91.56% accuracy.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132498530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Comparative Study on Deep Learning Techniques for Bird Species Recognition 鸟类物种识别的深度学习技术比较研究
Samparthi V S Kumar, Hari Kishan Kondaveerti
Naturally, birds appear around us at different locations in a variety of sizes, shapes, and colors. Bird species recognition provides crucial information on the state of the environment. Manual collection and processing of bird species data for the identification of birds is a huge task for ornithologists. Automatic bird recognition systems reduce their burden to some extent by collecting, processing bird related information and identifying the birds automatically. In this view, this paper presents a comparative study of the performances of MobileNet, AlexNet, InceptionResNet V2, Inception V3, and EfficientNet on bird species recognition. We gathered 11488 images of 200 bird species from the Kaggle dataset and increased the number of images to 40000 using data augmentation techniques. The experiment results shows that MobileNet and EfficientNet are the quickest training models. EfficientNet is outperforming the other models with test accuracy of 87.13%.
自然地,鸟类以各种大小、形状和颜色出现在我们周围的不同位置。鸟类种类的识别提供了关于环境状况的重要信息。人工收集和处理鸟类物种数据以识别鸟类是鸟类学家的一项艰巨任务。鸟类自动识别系统通过对鸟类相关信息的采集、处理和自动识别,在一定程度上减轻了鸟类识别人员的负担。在此基础上,本文对MobileNet、AlexNet、Inception resnet V2、Inception V3和EfficientNet在鸟类物种识别方面的性能进行了比较研究。我们从Kaggle数据集中收集了200种鸟类的11488张图像,并使用数据增强技术将图像数量增加到40000张。实验结果表明,MobileNet和EfficientNet是最快的训练模型。效率网的测试准确率为87.13%,优于其他模型。
{"title":"A Comparative Study on Deep Learning Techniques for Bird Species Recognition","authors":"Samparthi V S Kumar, Hari Kishan Kondaveerti","doi":"10.1109/ICCT56969.2023.10075901","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10075901","url":null,"abstract":"Naturally, birds appear around us at different locations in a variety of sizes, shapes, and colors. Bird species recognition provides crucial information on the state of the environment. Manual collection and processing of bird species data for the identification of birds is a huge task for ornithologists. Automatic bird recognition systems reduce their burden to some extent by collecting, processing bird related information and identifying the birds automatically. In this view, this paper presents a comparative study of the performances of MobileNet, AlexNet, InceptionResNet V2, Inception V3, and EfficientNet on bird species recognition. We gathered 11488 images of 200 bird species from the Kaggle dataset and increased the number of images to 40000 using data augmentation techniques. The experiment results shows that MobileNet and EfficientNet are the quickest training models. EfficientNet is outperforming the other models with test accuracy of 87.13%.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125884111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Review On: Autism Spectrum Disorder Detection by Machine Learning Using Small Video 基于小视频的机器学习检测自闭症谱系障碍研究进展
Khushbu Garg, N. N. Das, Gaurav Aggrawal
Autism spectrum disorder (ASD) is a mental ailment that can be diagnosed by the study of social media data and biopsy. Those with autism spectrum disorder (ASD), a neurodevelopment condition, may experience permanent changes to their facial appearance over time. The faces of children with ASD are easily identifiable from those of normally developing (TD) children. After the toddler years, specialists will typically look at a child's behaviour patterns to make a diagnosis of autism spectrum disorders (ASD). Quicker intervention and better long-term outcomes are possible after an early diagnosis of autism spectrum disorder. Machine learning uses data science to facilitate early autism diagnoses. This literature review aims to bridge a gap in understanding by bringing together the results of recent studies and technologies that use machine learning based approaches for ASD screening in infants and children younger than 18 months. Individuals on the autism spectrum have restricted interests and behaviors and struggle to communicate and interact socially with others. The prevalence of ASD has increased in recent years. The potential for innovative methods like machine learning to be integrated into established therapeutic practices is quite encouraging. How computers can be taught to recognize patterns in data is the focus of machine learning research. Artificially intelligent technologies can identify signs and symptoms, organize data, make diagnoses, and forecast outcomes. Machine learning is an area of artificial intelligence that focuses on teaching computers new behaviors by observing how they interact with the world. These days, there are a wide variety of machine learning methods available. In this piece, we look at the existing literature on the frequency of ASD in the general community. The main interest of this paper is the academic literature were sought by searching numerous databases.
自闭症谱系障碍(ASD)是一种可以通过研究社交媒体数据和活检来诊断的精神疾病。自闭症谱系障碍(ASD)是一种神经发育疾病,随着时间的推移,他们的面部外观可能会发生永久性的变化。自闭症儿童的脸很容易从正常发育的儿童(TD)中识别出来。在蹒跚学步之后,专家通常会通过观察孩子的行为模式来诊断自闭症谱系障碍(ASD)。在早期诊断出自闭症谱系障碍后,更快的干预和更好的长期结果是可能的。机器学习使用数据科学来促进早期自闭症诊断。这篇文献综述的目的是通过将最近的研究结果和技术结合起来,在婴儿和18个月以下的儿童中使用基于机器学习的方法进行ASD筛查,从而弥合理解上的差距。自闭症患者的兴趣和行为受到限制,很难与他人沟通和互动。近年来,自闭症谱系障碍的患病率有所上升。像机器学习这样的创新方法被整合到现有的治疗实践中的潜力是相当令人鼓舞的。如何教会计算机识别数据中的模式是机器学习研究的重点。人工智能技术可以识别体征和症状,组织数据,进行诊断并预测结果。机器学习是人工智能的一个领域,专注于通过观察计算机如何与世界互动来教授计算机新的行为。如今,有各种各样的机器学习方法可用。在这篇文章中,我们看一下现有的关于一般社区中自闭症发病率的文献。本文的主要兴趣是通过检索大量数据库来寻找学术文献。
{"title":"A Review On: Autism Spectrum Disorder Detection by Machine Learning Using Small Video","authors":"Khushbu Garg, N. N. Das, Gaurav Aggrawal","doi":"10.1109/ICCT56969.2023.10076139","DOIUrl":"https://doi.org/10.1109/ICCT56969.2023.10076139","url":null,"abstract":"Autism spectrum disorder (ASD) is a mental ailment that can be diagnosed by the study of social media data and biopsy. Those with autism spectrum disorder (ASD), a neurodevelopment condition, may experience permanent changes to their facial appearance over time. The faces of children with ASD are easily identifiable from those of normally developing (TD) children. After the toddler years, specialists will typically look at a child's behaviour patterns to make a diagnosis of autism spectrum disorders (ASD). Quicker intervention and better long-term outcomes are possible after an early diagnosis of autism spectrum disorder. Machine learning uses data science to facilitate early autism diagnoses. This literature review aims to bridge a gap in understanding by bringing together the results of recent studies and technologies that use machine learning based approaches for ASD screening in infants and children younger than 18 months. Individuals on the autism spectrum have restricted interests and behaviors and struggle to communicate and interact socially with others. The prevalence of ASD has increased in recent years. The potential for innovative methods like machine learning to be integrated into established therapeutic practices is quite encouraging. How computers can be taught to recognize patterns in data is the focus of machine learning research. Artificially intelligent technologies can identify signs and symptoms, organize data, make diagnoses, and forecast outcomes. Machine learning is an area of artificial intelligence that focuses on teaching computers new behaviors by observing how they interact with the world. These days, there are a wide variety of machine learning methods available. In this piece, we look at the existing literature on the frequency of ASD in the general community. The main interest of this paper is the academic literature were sought by searching numerous databases.","PeriodicalId":128100,"journal":{"name":"2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129872817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 3rd International Conference on Intelligent Communication and Computational Techniques (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1