首页 > 最新文献

2021 International Conference on Computing, Communication and Green Engineering (CCGE)最新文献

英文 中文
Flood Level Control and Management Using Instrumentation and Control 使用仪表和控制的洪水水位控制和管理
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776471
Aditya Rajput, Dinesh B. Kumbhar, Hrushikesh J. Joshi, Nandkishor M. Dhawale, Rewa H. Joshi, S. S. Patil
Flood is a extremely dangerous and harmful natural catastrophe. Various actions have been taken to reduce severity caused by flooding and flood damages. However, the problem of drainage remains one of the main challenge. Therefore, the main objective is to avoid or minimize the environmental impacts of flood hazards & to reduce the risk of flood and channel migration hazards. In order to address the problem, and to provide flood protection and decrease flood damage different types of works have been undertaken by engineers from all disciplines across the globe. This paper discusses about an interactive model illustrating the flood like situation and its solution to control and manage. The model is designed and created using instrumentation and control based hardware and software solutions to help manage the situation as well as to work like an emergency flood monitoring and warning system. This model is implemented with level monitoring and measurement system, alarm system, and use of LED's using which people can be warned and therefore help to reduce the after effects due to floods.
洪水是一种极其危险和有害的自然灾害。人们已经采取了各种措施来减轻洪水造成的严重程度和洪水造成的损害。然而,排水问题仍然是主要挑战之一。因此,主要目标是避免或尽量减少洪涝灾害对环境的影响,降低洪涝灾害和河道迁移灾害的风险。为了解决这个问题,并提供洪水保护和减少洪水损害,来自全球各个学科的工程师已经开展了不同类型的工作。本文讨论了一种描述类洪水情景的交互模型及其控制和管理方法。该模型是使用仪器仪表和基于控制的硬件和软件解决方案设计和创建的,以帮助管理情况,并像紧急洪水监测和预警系统一样工作。该模型采用水位监测和测量系统,报警系统,并使用LED灯,可以警告人们,从而有助于减少洪水造成的后遗症。
{"title":"Flood Level Control and Management Using Instrumentation and Control","authors":"Aditya Rajput, Dinesh B. Kumbhar, Hrushikesh J. Joshi, Nandkishor M. Dhawale, Rewa H. Joshi, S. S. Patil","doi":"10.1109/CCGE50943.2021.9776471","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776471","url":null,"abstract":"Flood is a extremely dangerous and harmful natural catastrophe. Various actions have been taken to reduce severity caused by flooding and flood damages. However, the problem of drainage remains one of the main challenge. Therefore, the main objective is to avoid or minimize the environmental impacts of flood hazards & to reduce the risk of flood and channel migration hazards. In order to address the problem, and to provide flood protection and decrease flood damage different types of works have been undertaken by engineers from all disciplines across the globe. This paper discusses about an interactive model illustrating the flood like situation and its solution to control and manage. The model is designed and created using instrumentation and control based hardware and software solutions to help manage the situation as well as to work like an emergency flood monitoring and warning system. This model is implemented with level monitoring and measurement system, alarm system, and use of LED's using which people can be warned and therefore help to reduce the after effects due to floods.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115248733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of System Requirements by Aspects-J Methodology 用Aspects-J方法分析系统需求
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776384
Sagar Mohite, Aditya Sarda, S. Joshi
Methodology of aspects is a combination of multiple concerns. Multiple types of concerns are facts, logic, area of interest, security, properties of systems. In the Development phase of the aspect model Aspect considers different systems concerns, aspects divide these system concerns into software modules, Different aspects modules use as a way for analysis of systems requirements. In some aspects, methodology use UML design modeling for understanding system requirements, in aspects Methodology UML class is for knowing the system necessities in modeling phases. a UML class structure is used in the Aspects process model for requirement analysis of the system. Class design in UML design consists of various types of attributes, classes, objects, methods, Join of points & Point of cut, various approaches to defining various concerns of the system. Few tools for crafting graph grammar rules for analysis system concerns, crafting G-graph grammar rules start from pre-condition G-grammar rules after that crafting post condition G-graph grammar rules, after crafting G-graph pre and post condition grammar rules G-graph transformation process done on rules in tools, next step is a method of creating a matrix, a matrix is basically cross applying rules to each other and find output, Two types of the matrix created first is a matrix of dependency and matrix of conflicts, this matrix for analysis conflict and dependency in crafted G-graph grammar rules, these G-rules apply as input to aspect methodology Tool. Next step transformation G-graph grammar, G-graph rules shows pre and post transformations of G-graph grammar rules when applying matrix of dependencies with a matrix of conflict, the conflict shows clash in G-graph rules, dependencies show requirement among the G-graph rules.
方面的方法学是多个关注点的组合。多种类型的关注点包括事实、逻辑、感兴趣的领域、安全性、系统属性。在方面模型的开发阶段,方面考虑不同的系统关注点,方面将这些系统关注点划分为软件模块,不同的方面模块用作分析系统需求的一种方法。在某些方面,方法学使用UML设计建模来理解系统需求,在某些方面,方法学使用UML类来了解建模阶段的系统需求。在方面过程模型中使用UML类结构进行系统需求分析。UML设计中的类设计包括各种类型的属性、类、对象、方法、点的连接和切割点,以及定义系统的各种关注点的各种方法。很少有工具来制作图语法规则来分析系统关注的问题,制作g图语法规则从先决条件的g语法规则开始然后制作后条件的g图语法规则,在制作了g图前后条件的g图语法规则之后,在工具中完成了g图转换过程,下一步是创建矩阵的方法,矩阵基本上是相互交叉应用规则并找到输出,首先创建的两种类型的矩阵是依赖矩阵和冲突矩阵,该矩阵用于分析精心制作的g图语法规则中的冲突和依赖,这些g规则作为输入应用于方面方法学工具。下一步变换g -图语法,g -图规则表示用冲突矩阵应用依赖矩阵时g -图语法规则的前后变换,冲突表示g -图规则中的冲突,依赖表示g -图规则之间的需求。
{"title":"Analysis of System Requirements by Aspects-J Methodology","authors":"Sagar Mohite, Aditya Sarda, S. Joshi","doi":"10.1109/CCGE50943.2021.9776384","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776384","url":null,"abstract":"Methodology of aspects is a combination of multiple concerns. Multiple types of concerns are facts, logic, area of interest, security, properties of systems. In the Development phase of the aspect model Aspect considers different systems concerns, aspects divide these system concerns into software modules, Different aspects modules use as a way for analysis of systems requirements. In some aspects, methodology use UML design modeling for understanding system requirements, in aspects Methodology UML class is for knowing the system necessities in modeling phases. a UML class structure is used in the Aspects process model for requirement analysis of the system. Class design in UML design consists of various types of attributes, classes, objects, methods, Join of points & Point of cut, various approaches to defining various concerns of the system. Few tools for crafting graph grammar rules for analysis system concerns, crafting G-graph grammar rules start from pre-condition G-grammar rules after that crafting post condition G-graph grammar rules, after crafting G-graph pre and post condition grammar rules G-graph transformation process done on rules in tools, next step is a method of creating a matrix, a matrix is basically cross applying rules to each other and find output, Two types of the matrix created first is a matrix of dependency and matrix of conflicts, this matrix for analysis conflict and dependency in crafted G-graph grammar rules, these G-rules apply as input to aspect methodology Tool. Next step transformation G-graph grammar, G-graph rules shows pre and post transformations of G-graph grammar rules when applying matrix of dependencies with a matrix of conflict, the conflict shows clash in G-graph rules, dependencies show requirement among the G-graph rules.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"366 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122814343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study on Different Sign Language Recognition Techniques 不同手语识别技术的研究
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776399
Vinit Khetani, Yatin Gandhi, Rashmi Patil
Language is means of communicating and expressing by using sound wherein, Sign language is communicating through hand gesture, face expression, fingers movement. This sign language is for deaf and dump people. It is visual method to communicate. Very less work has been done on identification of sign language. This paper mainly focuses on comparative study of Sign Language techniques. It reviews different techniques for feature extraction and classification of Sign Language from video or images. Recognition of sign language from video is one of the challenging tasks as video has to be converted to frames and that frames can be used for identification. In future, we will propose a system which will identify gesture from Indian sign language.
语言是通过声音进行交流和表达的手段,其中手语是通过手势,面部表情,手指运动进行交流。这种手语是给聋哑人用的。这是一种视觉化的沟通方式。在识别手语方面做的工作很少。本文主要对手语技术进行比较研究。回顾了从视频或图像中提取手语特征和分类的不同技术。从视频中识别手语是一项具有挑战性的任务,因为视频必须转换为帧,而这些帧可以用于识别。未来,我们将提出一个系统,将识别手势从印度手语。
{"title":"A Study on Different Sign Language Recognition Techniques","authors":"Vinit Khetani, Yatin Gandhi, Rashmi Patil","doi":"10.1109/CCGE50943.2021.9776399","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776399","url":null,"abstract":"Language is means of communicating and expressing by using sound wherein, Sign language is communicating through hand gesture, face expression, fingers movement. This sign language is for deaf and dump people. It is visual method to communicate. Very less work has been done on identification of sign language. This paper mainly focuses on comparative study of Sign Language techniques. It reviews different techniques for feature extraction and classification of Sign Language from video or images. Recognition of sign language from video is one of the challenging tasks as video has to be converted to frames and that frames can be used for identification. In future, we will propose a system which will identify gesture from Indian sign language.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129822202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Financial Impact of Internet Access Infrastructure of Online Learning Mode on Tertiary Students in Covid-19 Era in Ghana Covid-19时代加纳在线学习模式的互联网接入基础设施对大学生的财务影响
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776422
J. Wireko, Boahemaa Brenya, Ruchi Doshi
The Internet technology has had profound impact on our lives as well as changed the ways in which businesses interact with customers and has immense potential to improve the quality of education, a sustainable development goal set by the United Nations. Access to the Internet helps both educational administrators and students to reduce the costs of learning and improve the quality of education in schools and colleges. In developing countries, especially in Africa, the cost of accessing the Internet by students continues to be high and out of reach of many as one considers other key elements such as affordable broadband, computers, smartphone devices and the knowledge, skills, and competency to use the Internet technology. This paper examined the financial burden placed on students in accessing the Internet for their education at the tertiary level during the COVID-19 pandemic period. The results showed that tertiary students were financially impaired during the period as the cost of accessing the Internet (Internet data/subscription, Internet devices etc.) generally increased during the period.
互联网技术对我们的生活产生了深远的影响,改变了企业与客户互动的方式,并在提高教育质量方面具有巨大潜力,这是联合国设定的可持续发展目标。互联网的使用可以帮助教育管理者和学生降低学习成本,提高学校和大学的教育质量。在发展中国家,特别是在非洲,学生上网的成本仍然很高,而且许多人无法负担,因为人们考虑到其他关键因素,如负担得起的宽带、计算机、智能手机设备以及使用互联网技术的知识、技能和能力。本文考察了2019冠状病毒病疫情期间大学生上网接受高等教育的经济负担。调查结果显示,在这段期间内,大专学生的经济受到影响,因为上网费用(互联网数据/订阅费、互联网设备等)普遍上升。
{"title":"Financial Impact of Internet Access Infrastructure of Online Learning Mode on Tertiary Students in Covid-19 Era in Ghana","authors":"J. Wireko, Boahemaa Brenya, Ruchi Doshi","doi":"10.1109/CCGE50943.2021.9776422","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776422","url":null,"abstract":"The Internet technology has had profound impact on our lives as well as changed the ways in which businesses interact with customers and has immense potential to improve the quality of education, a sustainable development goal set by the United Nations. Access to the Internet helps both educational administrators and students to reduce the costs of learning and improve the quality of education in schools and colleges. In developing countries, especially in Africa, the cost of accessing the Internet by students continues to be high and out of reach of many as one considers other key elements such as affordable broadband, computers, smartphone devices and the knowledge, skills, and competency to use the Internet technology. This paper examined the financial burden placed on students in accessing the Internet for their education at the tertiary level during the COVID-19 pandemic period. The results showed that tertiary students were financially impaired during the period as the cost of accessing the Internet (Internet data/subscription, Internet devices etc.) generally increased during the period.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131417167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Impact Assessment of Waste Water Streams on Water Quality of River Pavana in Pimpri Chinchwad City Area 污水流对平普里钦切瓦德城区帕瓦纳河水质的影响评价
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776355
B. Mahajan, S. Shastri, S. Londhe
Present research work was done for 23.2 Km stretch of river Pavana from Kiwale to Dapodi in District Pune, Maharashtra. In this research, discharge measurement was done for 19 waste water streams in Pimpri Chinchwad city area. These waste water streams are continuously disposing untreated waste water in River Pavana. Total pollutional load was calculated by using characteristic values such as Biochemical Oxygen Demand, Chemical Oxygen Demand, Total Suspended Solids along with the discharge measurement of waste water stream. Area velocity method was adopted for measurement of waste water stream discharge. BODmix and Degree of Treatment required were calculated for River Pavana. BODmix of river water of River Pavana (stretch from Ravet to Dapodi) was compared with raw water quality standards.
目前的研究工作是在马哈拉施特拉邦浦那区从基瓦莱到达波迪的帕瓦纳河23.2公里的河段上完成的。本研究对平普里钦杰瓦德城区19条污水流进行了排放测量。这些废水流不断地将未经处理的废水排入帕瓦纳河。利用生化需氧量、化学需氧量、总悬浮物等特征值,结合废水流的排放测量,计算出总污染负荷。采用面积速度法测量废水流量。计算了Pavana河所需的BODmix和处理程度。采用原水水质标准对Pavana河(Ravet至Dapodi段)的水质进行了比较。
{"title":"Impact Assessment of Waste Water Streams on Water Quality of River Pavana in Pimpri Chinchwad City Area","authors":"B. Mahajan, S. Shastri, S. Londhe","doi":"10.1109/CCGE50943.2021.9776355","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776355","url":null,"abstract":"Present research work was done for 23.2 Km stretch of river Pavana from Kiwale to Dapodi in District Pune, Maharashtra. In this research, discharge measurement was done for 19 waste water streams in Pimpri Chinchwad city area. These waste water streams are continuously disposing untreated waste water in River Pavana. Total pollutional load was calculated by using characteristic values such as Biochemical Oxygen Demand, Chemical Oxygen Demand, Total Suspended Solids along with the discharge measurement of waste water stream. Area velocity method was adopted for measurement of waste water stream discharge. BODmix and Degree of Treatment required were calculated for River Pavana. BODmix of river water of River Pavana (stretch from Ravet to Dapodi) was compared with raw water quality standards.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132796773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy Preserving Computation on Health Care Data 医疗保健数据的隐私保护计算
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776442
Neha Salunke, Sayali Mane, Samruddhi Kulkarni, S. Rao, Mahendra Deore
Healthcare sector is one of the fastest growing sector, which is making extensive use of technologies like IoT, Blockchain etc. Since there is rise in the use of e-healthcare system, huge amount of data is being generated so it has become necessary to protect the data from various kinds of cyber-attacks. Due to different cyber-attacks the CIA (Confidentiality, integrity, Availability) of the system can be compromised hence efficient mechanisms are required to ensure security. In this paper we have demonstrated a system which examines trust evaluation algorithm against various attacks. Simulation of the sensor cloud system is done and its results are analyzed. Trusts of individual nodes were calculated and trusted path calculation for sensors is done. Proposed system detects malicious nodes in order to protect network from insider attacks viz; black hole attack, on-off attack and replicated mobile sink attack, etc.
医疗保健行业是增长最快的行业之一,它正在广泛使用物联网、区块链等技术。由于电子医疗系统的使用越来越多,产生了大量的数据,因此有必要保护数据免受各种网络攻击。由于不同的网络攻击,系统的CIA(保密性,完整性,可用性)可能会受到损害,因此需要有效的机制来确保安全。在本文中,我们展示了一个系统来检查信任评估算法对各种攻击。对传感器云系统进行了仿真并对仿真结果进行了分析。计算了各个节点的信任度,并对传感器的信任路径进行了计算。该系统检测恶意节点,以保护网络免受内部攻击,即;黑洞攻击、开关攻击、复制移动汇聚攻击等。
{"title":"Privacy Preserving Computation on Health Care Data","authors":"Neha Salunke, Sayali Mane, Samruddhi Kulkarni, S. Rao, Mahendra Deore","doi":"10.1109/CCGE50943.2021.9776442","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776442","url":null,"abstract":"Healthcare sector is one of the fastest growing sector, which is making extensive use of technologies like IoT, Blockchain etc. Since there is rise in the use of e-healthcare system, huge amount of data is being generated so it has become necessary to protect the data from various kinds of cyber-attacks. Due to different cyber-attacks the CIA (Confidentiality, integrity, Availability) of the system can be compromised hence efficient mechanisms are required to ensure security. In this paper we have demonstrated a system which examines trust evaluation algorithm against various attacks. Simulation of the sensor cloud system is done and its results are analyzed. Trusts of individual nodes were calculated and trusted path calculation for sensors is done. Proposed system detects malicious nodes in order to protect network from insider attacks viz; black hole attack, on-off attack and replicated mobile sink attack, etc.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132089129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Color Recognition for Video Game Controller 视频游戏控制器的动态颜色识别
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776403
Anjali Saner, Ashish Sharma, Atharva Patil, Avinash Soni, Pranav More
In this paper, we have introduce a real-time color recognition framework using openCv and PyObjC API. Hand Gestures with color detection are a natural form of communication between humans as well as between humans and machines. They are also useful in fields like sign language recognition, human-machine interface, and behavior understanding. The focus of creating colors recognition to create better communication between humans and computers for conveying information. The proposed project aims to create a video game controller wherein we can use our color detection and play the video Game on the computer. Several combinations of hand motions can be detected using deep learning and neural networks, rather than simple image processing and machine learning.
在本文中,我们介绍了一个使用openCv和PyObjC API的实时颜色识别框架。带有颜色检测的手势是人类之间以及人类与机器之间的一种自然的交流形式。它们在手语识别、人机界面和行为理解等领域也很有用。创造颜色识别的重点是创造人类和计算机之间更好的沟通,以传达信息。提出的项目旨在创建一个视频游戏控制器,其中我们可以使用我们的颜色检测并在计算机上玩视频游戏。可以使用深度学习和神经网络来检测手部动作的几种组合,而不是简单的图像处理和机器学习。
{"title":"Dynamic Color Recognition for Video Game Controller","authors":"Anjali Saner, Ashish Sharma, Atharva Patil, Avinash Soni, Pranav More","doi":"10.1109/CCGE50943.2021.9776403","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776403","url":null,"abstract":"In this paper, we have introduce a real-time color recognition framework using openCv and PyObjC API. Hand Gestures with color detection are a natural form of communication between humans as well as between humans and machines. They are also useful in fields like sign language recognition, human-machine interface, and behavior understanding. The focus of creating colors recognition to create better communication between humans and computers for conveying information. The proposed project aims to create a video game controller wherein we can use our color detection and play the video Game on the computer. Several combinations of hand motions can be detected using deep learning and neural networks, rather than simple image processing and machine learning.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132720705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vision based Lip Reading System using Deep Learning 基于视觉的深度学习唇读系统
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776430
Nikita Deshmukh, Anamika Ahire, S. Bhandari, Apurva Mali, Kalyani Warkari
Lip reading is an approach for understanding speech by visually interpreting lip movements. Vision based lip leading system takes a video (without audio) as an input of a person speaking some word or phrase and provides the predicted word or phrase the person is speaking as output. This paper presents the method for Vision based Lip Reading system that uses convolutional neural network (CNN) with attention-based Long Short-Term Memory (LSTM). The dataset includes video clips pronouncing single digits. The pretrained CNN is used for extracting features from pre-processed video frames which then are processed for learning temporal characteristics by LSTM. The SoftMax layer of architecture provides the result of lip reading. In the present work experiments are performed with two pre-trained models namely VGG19 and ResNet50 and the results are compared. To further improve the performance of the system ensembled learning is also used. The system provides 85% accuracy using ResNet50 and ensemble learning.
唇读是一种通过视觉解读唇动来理解言语的方法。基于视觉的唇导系统将视频(没有音频)作为一个人说某个单词或短语的输入,并提供该人正在说的预测单词或短语作为输出。本文提出了一种基于卷积神经网络(CNN)和基于注意的长短期记忆(LSTM)的基于视觉的唇读系统的方法。该数据集包括发音为个位数的视频片段。使用预训练好的CNN从预处理的视频帧中提取特征,然后通过LSTM对这些特征进行处理,学习时间特征。SoftMax架构层提供唇读结果。本文采用VGG19和ResNet50两种预训练模型进行了实验,并对实验结果进行了比较。为了进一步提高系统的性能,还采用了集成学习的方法。系统使用ResNet50和集成学习提供85%的准确率。
{"title":"Vision based Lip Reading System using Deep Learning","authors":"Nikita Deshmukh, Anamika Ahire, S. Bhandari, Apurva Mali, Kalyani Warkari","doi":"10.1109/CCGE50943.2021.9776430","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776430","url":null,"abstract":"Lip reading is an approach for understanding speech by visually interpreting lip movements. Vision based lip leading system takes a video (without audio) as an input of a person speaking some word or phrase and provides the predicted word or phrase the person is speaking as output. This paper presents the method for Vision based Lip Reading system that uses convolutional neural network (CNN) with attention-based Long Short-Term Memory (LSTM). The dataset includes video clips pronouncing single digits. The pretrained CNN is used for extracting features from pre-processed video frames which then are processed for learning temporal characteristics by LSTM. The SoftMax layer of architecture provides the result of lip reading. In the present work experiments are performed with two pre-trained models namely VGG19 and ResNet50 and the results are compared. To further improve the performance of the system ensembled learning is also used. The system provides 85% accuracy using ResNet50 and ensemble learning.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124852420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security of User Credentials on Web Portals Web门户上用户凭据的安全性
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776476
Amit Hire, J. Katti
The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.
最普遍的身份验证或计算机系统入侵保护形式是使用字母数字用户名和密码。传统上,强大的密码方案提供了一定程度的保护,但它们很复杂,很难记住,这促使它们的主人把它们写在纸上。因此,保护受到了损害。增加信息共享、互联网使用、数据传输、密码保护和验证已成为重大挑战。因此,许多程序使用不同的散列和腌制算法在数据库中存储密码文件。另一方面,攻击者不认为密码哈希是安全的,因为他们使用暴力攻击、猜密码攻击和其他方法从数据库的密码日志中获取用户的密码。为了防止黑客的攻击,一些系统使用honeyword或利用honeyword生成技术生成的伪密码存储在数据库中。在我们推荐的方法中,使用不同的散列机制保存密码,时间复杂度较低,其中大多数进程需要基于二进制的基本操作。
{"title":"Security of User Credentials on Web Portals","authors":"Amit Hire, J. Katti","doi":"10.1109/CCGE50943.2021.9776476","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776476","url":null,"abstract":"The most prevalent form of authentication or computer system intrusion protection is the use of alphanumeric usernames and passwords. Strong password schemes have traditionally provided a certain level of protection, but they are complicated and difficult to remember, prompting their owners to write them down on paper. As a consequence, protection is jeopardized.Increasing the sharing of information, internet use, data transfer, protection and validation of passwords have become significant challenges.As a result, many programmes use different hashing and salting algorithms to store password files in databases.Attackers, on the other hand, do not consider password hashing to be safe since they use brute force attacks, password guessing attacks, and other methods to obtain the user's password from the database's password log.Some systems store passwords in databases using honeywords or bogus passwords generated using the generation technique for honeywords to prevent hacker attacks.In our recommended approach, passwords are saved using a distinct hashing mechanism with a less complexity of time in which majority of the processes need basic operation based on binarys.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Handwritten Devanagari Word Recognition using Customized Convolution Neural Network 手写体Devanagari字识别使用自定义卷积神经网络
Pub Date : 2021-09-23 DOI: 10.1109/CCGE50943.2021.9776351
D. Salunke, Pooja Sabne, Hitesh Saini, Vivekanand Shivanagi, Pradnya Jadhav
Devanagari language comprises 47 primary characters that include 14 vowels and 33 consonants. Nearly 120 scripts have been developed from it like Marathi, Hindi, Bengali, etc. This paper deals with a Marathi handwritten word recognition system. Marathi is an Indian language that is spoken primarily in the state of Maharashtra, most of the government paperwork is done in this language only. This system will mainly be used in recognizing various handwritten words present in the titles of different municipal documents. The main concern regarding these documents was the task of storing them digitally. The existing works have used the method of segmentation and have proposed a hidden Markov model to recognize pseudo characters, but the accuracy can be increased. We have devised a system that will overcome this limitation. In our system, a dataset is created for 2000 samples and by applying different augmentation techniques the dataset size is further increased to 12000 images. The proposed system is implemented using deep learning based Customized Convolution Neural Network which is pre-trained on a manually collected dataset containing various Marathi handwritten words. Out of which 75% of the dataset is used for training and 25% for testing purposes. This system has proved better results on augmented data with 94% accuracy.
梵语由47个主要字符组成,其中包括14个元音和33个辅音。从它发展出了近120个脚本,如马拉地语、印地语、孟加拉语等。本文研究了一个马拉地语手写单词识别系统。马拉地语是一种印度语言,主要在马哈拉施特拉邦使用,大多数政府文书工作都是用这种语言完成的。该系统将主要用于识别不同市政文件标题中出现的各种手写文字。对这些文档的主要关注是数字化存储它们的任务。现有的工作都是使用分割的方法,并提出了一种隐马尔可夫模型来识别伪字符,但精度还有待提高。我们已经设计了一个系统来克服这个限制。在我们的系统中,为2000个样本创建了一个数据集,通过应用不同的增强技术,数据集的大小进一步增加到12000个图像。该系统使用基于深度学习的自定义卷积神经网络实现,该神经网络在手动收集的包含各种马拉地语手写单词的数据集上进行预训练。其中75%的数据集用于训练,25%用于测试。该系统在增强数据上取得了较好的效果,准确率达到94%。
{"title":"Handwritten Devanagari Word Recognition using Customized Convolution Neural Network","authors":"D. Salunke, Pooja Sabne, Hitesh Saini, Vivekanand Shivanagi, Pradnya Jadhav","doi":"10.1109/CCGE50943.2021.9776351","DOIUrl":"https://doi.org/10.1109/CCGE50943.2021.9776351","url":null,"abstract":"Devanagari language comprises 47 primary characters that include 14 vowels and 33 consonants. Nearly 120 scripts have been developed from it like Marathi, Hindi, Bengali, etc. This paper deals with a Marathi handwritten word recognition system. Marathi is an Indian language that is spoken primarily in the state of Maharashtra, most of the government paperwork is done in this language only. This system will mainly be used in recognizing various handwritten words present in the titles of different municipal documents. The main concern regarding these documents was the task of storing them digitally. The existing works have used the method of segmentation and have proposed a hidden Markov model to recognize pseudo characters, but the accuracy can be increased. We have devised a system that will overcome this limitation. In our system, a dataset is created for 2000 samples and by applying different augmentation techniques the dataset size is further increased to 12000 images. The proposed system is implemented using deep learning based Customized Convolution Neural Network which is pre-trained on a manually collected dataset containing various Marathi handwritten words. Out of which 75% of the dataset is used for training and 25% for testing purposes. This system has proved better results on augmented data with 94% accuracy.","PeriodicalId":130452,"journal":{"name":"2021 International Conference on Computing, Communication and Green Engineering (CCGE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127983583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computing, Communication and Green Engineering (CCGE)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1