首页 > 最新文献

2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
A comparison of road network extraction from High Resolution Images 基于高分辨率图像的道路网提取方法比较
P. K. Soni, N. Rajpal, R. Mehta
Study related to high resolution remote sensing (RS) images has been applicable to many areas that are beneficial to us for information related to territory, public, weather and agriculture, the main aim of RS applications is extract appropriate information that will help us to draw meaningful conclusions. Road network extraction is an important and challenging research field, road networks are essential for humans as they provide transportation and other support systems. Distinct factors like sensor, weather, resolution and light etc., can affect the road features from a RS image which imposes the problems in road network extraction. This paper presents a comprehensive analysis of various aspects of road network extraction from RS images like road features, problems in road network extraction and finally different road network methods are classified on the basis of local and global features, automation and algorithm used. Different road extraction techniques are compared on the basis of features used in extraction, number and type of data (aerial, hyper-spectral, remote sensing, urban and semi-urban) used, performance on the basis of different qualitative parameters and the advantage and disadvantages of different methods are discussed. The comparative analysis of road extraction methods is presented emphatically and it is observable that in order to obtain precise road network from RS images only one type of feature is not sufficient. Hence, multiple road features should be combined together but it depends on type of application and data. Road network extraction from RS image is still remains a challenging and important research field.
与高分辨率遥感(RS)图像相关的研究已经适用于许多领域,对我们有益的信息涉及领土,公共,天气和农业,RS应用的主要目的是提取适当的信息,这将有助于我们得出有意义的结论。道路网络提取是一个重要且具有挑战性的研究领域,道路网络是人类必不可少的,因为它们提供了交通和其他支持系统。不同的因素,如传感器、天气、分辨率和光照等,都会影响RS图像中的道路特征,这给道路网提取带来了问题。本文综合分析了从RS图像中提取道路网的道路特征、道路网提取中存在的问题,最后根据道路网的局部特征和全局特征、自动化程度和使用的算法对不同的道路网提取方法进行了分类。根据提取的特征、使用的数据数量和类型(航空、高光谱、遥感、城市和半城市)、不同定性参数的性能以及不同方法的优缺点,对不同道路提取技术进行了比较。着重对道路提取方法进行了比较分析,发现仅利用一种特征是不能得到精确的道路网的。因此,多种道路特征应该结合在一起,但这取决于应用程序和数据的类型。从遥感图像中提取道路网仍然是一个具有挑战性和重要的研究领域。
{"title":"A comparison of road network extraction from High Resolution Images","authors":"P. K. Soni, N. Rajpal, R. Mehta","doi":"10.1109/ICSCCC.2018.8703276","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703276","url":null,"abstract":"Study related to high resolution remote sensing (RS) images has been applicable to many areas that are beneficial to us for information related to territory, public, weather and agriculture, the main aim of RS applications is extract appropriate information that will help us to draw meaningful conclusions. Road network extraction is an important and challenging research field, road networks are essential for humans as they provide transportation and other support systems. Distinct factors like sensor, weather, resolution and light etc., can affect the road features from a RS image which imposes the problems in road network extraction. This paper presents a comprehensive analysis of various aspects of road network extraction from RS images like road features, problems in road network extraction and finally different road network methods are classified on the basis of local and global features, automation and algorithm used. Different road extraction techniques are compared on the basis of features used in extraction, number and type of data (aerial, hyper-spectral, remote sensing, urban and semi-urban) used, performance on the basis of different qualitative parameters and the advantage and disadvantages of different methods are discussed. The comparative analysis of road extraction methods is presented emphatically and it is observable that in order to obtain precise road network from RS images only one type of feature is not sufficient. Hence, multiple road features should be combined together but it depends on type of application and data. Road network extraction from RS image is still remains a challenging and important research field.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134086254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Potholes and Speed Breaker on Road 路面坑洼和减速机的检测
Gurpreet Singh, Rajeev Kumar, Poonam Kashtriya
We proposed a pothole detection system to monitor road pavement. In this paper, we are focusing on earlier potholes detection systems that have been developed and introduces a worthwhile solution to recognize humps, potholes and speed breakers on road surface and give up-to-date signals to drivers to avoid vehicle damages or accidents, by giving him earlier warnings. To identify of humps, speed breaker and potholes, ultrasonic sensors are used and also to estimate their height and depth, respectively. In our proposed system, we are using global positioning system receiver (GPS receiver) for identification of geographical location coordinates of the detected potholes and speed breaker. The data which are sensed by the ultrasonic sensors includes geographical location, the height of speed breakers and depth of potholes, which is saved in the local and cloud database. This paper also considers updating the database on the regular basis so that potholes can be repaired regularly by concerned authorities.
我们提出了一种凹坑检测系统来监测道路路面。在本文中,我们将重点放在已经开发的早期坑洼检测系统上,并介绍了一种有价值的解决方案,可以识别路面上的驼峰、坑洼和减速带,并通过早期警告向驾驶员提供最新信号,以避免车辆损坏或事故。为了识别驼峰、减速机和坑洼,使用了超声波传感器,并分别估计了它们的高度和深度。在我们提出的系统中,我们使用全球定位系统接收器(GPS接收器)来识别检测到的坑洞和减速机的地理位置坐标。超声波传感器感知的数据包括地理位置、减速机的高度和坑洼的深度,这些数据保存在本地和云数据库中。本文件亦考虑定期更新资料库,以便有关当局定期修补坑洼。
{"title":"Detection of Potholes and Speed Breaker on Road","authors":"Gurpreet Singh, Rajeev Kumar, Poonam Kashtriya","doi":"10.1109/ICSCCC.2018.8703298","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703298","url":null,"abstract":"We proposed a pothole detection system to monitor road pavement. In this paper, we are focusing on earlier potholes detection systems that have been developed and introduces a worthwhile solution to recognize humps, potholes and speed breakers on road surface and give up-to-date signals to drivers to avoid vehicle damages or accidents, by giving him earlier warnings. To identify of humps, speed breaker and potholes, ultrasonic sensors are used and also to estimate their height and depth, respectively. In our proposed system, we are using global positioning system receiver (GPS receiver) for identification of geographical location coordinates of the detected potholes and speed breaker. The data which are sensed by the ultrasonic sensors includes geographical location, the height of speed breakers and depth of potholes, which is saved in the local and cloud database. This paper also considers updating the database on the regular basis so that potholes can be repaired regularly by concerned authorities.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131831013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Sentiment Analysis using tidytext package in R 使用R中的tidytext包进行情感分析
Priyavrat, N. Sharma
Sentiment analysis is all about finding polarity (positivity and negativity) of a given text which can be a single word, a single sentence, a single document and maybe a whole book, novel or magazine. In this paper, sentiment analysis of the harry potter series is done using “tidytext” package in R. The “tidytext” package includes three lexicons and this paper discusses sentiment analysis results encountered by them on same data. This study has analyzed results of all three lexicons for the harry potter series and found that overall sentiments of the harry potter series are negative on the basis of positive and negative words present in the series.
情感分析就是找到给定文本的极性(积极和消极),这些文本可以是一个单词、一个句子、一份文件,也可能是一整本书、小说或杂志。本文使用r中的“tidytext”包对哈利波特系列进行情感分析。“tidytext”包包含三个词汇,本文讨论了它们在同一数据上遇到的情感分析结果。本研究分析了《哈利波特》系列的三个词汇的结果,发现在《哈利波特》系列中出现的正面和负面词汇的基础上,《哈利波特》系列的整体情绪是负面的。
{"title":"Sentiment Analysis using tidytext package in R","authors":"Priyavrat, N. Sharma","doi":"10.1109/ICSCCC.2018.8703296","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703296","url":null,"abstract":"Sentiment analysis is all about finding polarity (positivity and negativity) of a given text which can be a single word, a single sentence, a single document and maybe a whole book, novel or magazine. In this paper, sentiment analysis of the harry potter series is done using “tidytext” package in R. The “tidytext” package includes three lexicons and this paper discusses sentiment analysis results encountered by them on same data. This study has analyzed results of all three lexicons for the harry potter series and found that overall sentiments of the harry potter series are negative on the basis of positive and negative words present in the series.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131095578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Critical Survey of Virtual Machine Migration Techniques in Cloud Computing 云计算中虚拟机迁移技术综述
Bhagyalakshmi, Deepti Malhotra
In Cloud Data Centers (CDC), virtualization is achieved by parallel processing of multiple virtual machines (VM) on a single cloud server, which has led to an exponential increase in the number of cloud users. With the help of live Virtual Machine Migrations (VMM), this ascending demand for resources like storage, communication and computing can be handled effectively. Different resource management strategies have been deployed to optimize the efficiency of cloud data centers through the migration of a single or multiple VMs. The establishment of numerous CDCs is a result of the aroused interest of users in cloud computing. This paper reviews state-of-the-art of virtual machine migration schemes while investigating the critical aspects of virtual machine migration schemes through a comprehensive analysis of the existing schemes. The objectives of existing VM migration schemes are highlighted through a set of parameters derived from the literature. Finally, some of the open research issues in the VM migration domain are highlighted
在云数据中心(CDC)中,虚拟化是通过在单个云服务器上并行处理多个虚拟机(VM)来实现的,这导致了云用户数量的指数级增长。在实时虚拟机迁移(VMM)的帮助下,可以有效地处理对存储、通信和计算等资源不断增长的需求。部署了不同的资源管理策略,通过单个或多个虚拟机的迁移来优化云数据中心的效率。众多中心的建立是用户对云计算产生兴趣的结果。本文回顾了最新的虚拟机迁移方案,同时通过对现有方案的综合分析调查了虚拟机迁移方案的关键方面。现有虚拟机迁移方案的目标是通过一组从文献中得出的参数强调。最后,对虚拟机迁移领域的一些开放性研究问题进行了总结
{"title":"A Critical Survey of Virtual Machine Migration Techniques in Cloud Computing","authors":"Bhagyalakshmi, Deepti Malhotra","doi":"10.1109/ICSCCC.2018.8703322","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703322","url":null,"abstract":"In Cloud Data Centers (CDC), virtualization is achieved by parallel processing of multiple virtual machines (VM) on a single cloud server, which has led to an exponential increase in the number of cloud users. With the help of live Virtual Machine Migrations (VMM), this ascending demand for resources like storage, communication and computing can be handled effectively. Different resource management strategies have been deployed to optimize the efficiency of cloud data centers through the migration of a single or multiple VMs. The establishment of numerous CDCs is a result of the aroused interest of users in cloud computing. This paper reviews state-of-the-art of virtual machine migration schemes while investigating the critical aspects of virtual machine migration schemes through a comprehensive analysis of the existing schemes. The objectives of existing VM migration schemes are highlighted through a set of parameters derived from the literature. Finally, some of the open research issues in the VM migration domain are highlighted","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127246560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN 基于动态混合超时的SDN流表抗DDoS攻击保护方法
Balram Sooden, Mohammad Reza Abbasi
Distributed Denial of Service attacks are one of the major threats to network-based services today. Software Defined Networks (SDN) has the potential to evolve into a much more secure network paradigm than a traditional network as the whole network is controlled by a central controller having a complete view of the network. Being a considerably new concept, there are certain research problems related to SDN which are still needed to be addressed. Our work focuses on the collection of flow statistics to record the complete current and historical dynamics of the network by the controller to enable it to detect and prevent anomalous behavior in the network. Another research problem addressed in this paper is based on the Ternary Content Addressable Memory (TCAM) limitation of SDN based switches, which can be exploited with malicious hosts generating discrete network flows. To address this problem we propose the Dynamic Hybrid Timeout Method. It uses a blend of idle and hard timeout methods in addition to the Peer Support Strategy to enhance the durability of TCAM memory during flow table overloading DDoS attacks. The simulation results show that the Dynamic Hybrid Timeout Method enhances the performance of the Peer Support Strategy and adds durability in flow table memory utilization.
分布式拒绝服务攻击是当今基于网络的服务的主要威胁之一。软件定义网络(SDN)有可能发展成为比传统网络更安全的网络范例,因为整个网络由具有完整网络视图的中央控制器控制。SDN作为一个相当新的概念,存在着一些需要解决的研究问题。我们的工作重点是收集流量统计数据,通过控制器记录网络的完整当前和历史动态,使其能够检测和防止网络中的异常行为。本文研究的另一个问题是基于SDN交换机的三元内容可寻址内存(TCAM)限制,这可能被恶意主机利用,产生离散的网络流。为了解决这个问题,我们提出了动态混合超时方法。除了对等支持策略外,它还混合使用空闲超时和硬超时方法来增强流表过载DDoS攻击期间TCAM内存的持久性。仿真结果表明,动态混合超时方法提高了对等支持策略的性能,增加了流表内存利用率的持久性。
{"title":"A Dynamic Hybrid Timeout Method to Secure Flow Tables Against DDoS Attacks in SDN","authors":"Balram Sooden, Mohammad Reza Abbasi","doi":"10.1109/ICSCCC.2018.8703307","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703307","url":null,"abstract":"Distributed Denial of Service attacks are one of the major threats to network-based services today. Software Defined Networks (SDN) has the potential to evolve into a much more secure network paradigm than a traditional network as the whole network is controlled by a central controller having a complete view of the network. Being a considerably new concept, there are certain research problems related to SDN which are still needed to be addressed. Our work focuses on the collection of flow statistics to record the complete current and historical dynamics of the network by the controller to enable it to detect and prevent anomalous behavior in the network. Another research problem addressed in this paper is based on the Ternary Content Addressable Memory (TCAM) limitation of SDN based switches, which can be exploited with malicious hosts generating discrete network flows. To address this problem we propose the Dynamic Hybrid Timeout Method. It uses a blend of idle and hard timeout methods in addition to the Peer Support Strategy to enhance the durability of TCAM memory during flow table overloading DDoS attacks. The simulation results show that the Dynamic Hybrid Timeout Method enhances the performance of the Peer Support Strategy and adds durability in flow table memory utilization.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124657630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Internet of Things – Architecture, Applications, and Future Trends 物联网调查——架构、应用和未来趋势
Karandeep Kaur
Internet of things can be defined as things which are belonging to the internet. IOT is actually merging of internet with RFID’s, various sensors (like ambient, wearable) and smart objects (things) around us. Day by day billions of devices are expected to join the internet and acquire the state of `being connected’, which will process the data collected from different sensors and hence transmit the information collected so as to make meaningful decisions from them. In the upcoming years, IOT is expected to become main hub between technologies. IoT is the now a days has become a blessing but still is lacking due to many challenges. This paper presents an introduction on internet of things and discusses on the architecture, various application areas of it.
物联网可以定义为属于互联网的事物。物联网实际上是互联网与RFID、各种传感器(如环境、可穿戴)和我们周围的智能物体(事物)的融合。每天都有数十亿的设备有望加入互联网并获得“连接”状态,这将处理从不同传感器收集的数据,从而传输收集到的信息,从而做出有意义的决策。在未来几年,物联网有望成为技术之间的主要枢纽。物联网是现在的一种福气,但由于许多挑战仍然缺乏。本文介绍了物联网的概念,讨论了物联网的体系结构及其应用领域。
{"title":"A Survey on Internet of Things – Architecture, Applications, and Future Trends","authors":"Karandeep Kaur","doi":"10.1109/ICSCCC.2018.8703341","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703341","url":null,"abstract":"Internet of things can be defined as things which are belonging to the internet. IOT is actually merging of internet with RFID’s, various sensors (like ambient, wearable) and smart objects (things) around us. Day by day billions of devices are expected to join the internet and acquire the state of `being connected’, which will process the data collected from different sensors and hence transmit the information collected so as to make meaningful decisions from them. In the upcoming years, IOT is expected to become main hub between technologies. IoT is the now a days has become a blessing but still is lacking due to many challenges. This paper presents an introduction on internet of things and discusses on the architecture, various application areas of it.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131008910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Security Vulnerabilities in Handover Authentication Mechanism of 5G Network 5G网络切换认证机制中的安全漏洞
Shubham Gupta, Balu L. Parne, N. Chaudhari
The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.
第三代合作伙伴计划(3GPP)的主要目标是随着第五代(5G)移动通信技术的发展,满足基于物联网的应用日益增长的安全需求。2018年6月,3GPP发布了《5G通信网络中的切换架构和安全功能研究报告》。本文讨论了5G密钥切换机制及其密钥层次结构。此外,对5G通信网络中gnb间切换认证机制进行了分析,识别出假基站攻击、反同步攻击、密钥泄露等安全漏洞。此外,由于信令开销高,切换机制的身份验证复杂性较大。为了克服这些问题,我们提出了通信实体的预认证、认证授权和密钥的预分发等对策。这是5G移交安全分析中的第一项工作。我们预计上述安全问题和关键弹性问题可以从提出的解决方案中避免。
{"title":"Security Vulnerabilities in Handover Authentication Mechanism of 5G Network","authors":"Shubham Gupta, Balu L. Parne, N. Chaudhari","doi":"10.1109/ICSCCC.2018.8703355","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703355","url":null,"abstract":"The main objective of the Third Generation Partnership Project (3GPP) is to fulfill the increasing security demands of IoT-based applications with the evolution of Fifth Generation (5G) mobile telecommunication technology. In June 2018, the 3GPP has published the study report of the handover architecture and security functions of in 5G communication network. In this paper, we discuss the 5G handover key mechanism with its key hierarchy. In addition, the inter-gNB handover authentication mechanism in 5G communication network is analyzed and identify the security vulnerabilities such as false base-station attack, de-synchronization attack, key compromise, etc. In addition, the handover mechanism suffers from authentication complexity due to high signaling overhead. To overcome these problems, we recommend some countermeasures as pre-authentication of communication entities, delegation of authentication and predistribution of secret keys. This is first work in the 5G handover security analysis. We anticipate that the above security issues and key resilience problem can be avoided from the proposed solutions.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121296055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Movie Success Prediction using Machine Learning Algorithms and their Comparison 电影成功预测使用机器学习算法及其比较
Rijul Dhir, A. Raj
The number of movies produced in the world is growing at an exponential rate and success rate of movie is of utmost importance since billions of dollars are invested in the making of each of these movies. In such a scenario, prior knowledge about the success or failure of a particular movie and what factor affect the movie success will benefit the production houses since these predictions will give them a fair idea of how to go about with the advertising and campaigning, which itself is an expensive affair altogether. So, the prediction of the success of a movie is very essential to the film industry. In this proposed research, we give our detailed analysis of the Internet Movie Database (IMDb) and predict the IMDb score. This database contains categorical and numerical information such as IMDb score, director, gross, budget and so on and so forth. This research proposes a way to predict how successful a movie will be prior to its arrival at the box office instead of listening to critics and others on whether a movie will be successful or not. The proposed research provides a quite efficient approach to predict IMDb score on IMDb Movie Dataset. We will try to unveil the important factors influencing the score of IMDb Movie Data. We have used different algorithms in the research work for analysis but among all Random forest gave the best prediction accuracy which is better in comparison to the previous studies. In the exploratory analysis we found that number of voted users, number of critics for reviews, number of Facebook likes, duration of the movie and gross collection of movie affect the IMDb score strongly. Drama and Biopic movies are best in genres.
世界上制作的电影数量正以指数速度增长,电影的成功率至关重要,因为每一部电影的制作都投入了数十亿美元。在这种情况下,关于一部特定电影的成功或失败以及影响电影成功的因素的先验知识将使制作公司受益,因为这些预测将使他们对如何进行广告和活动有一个合理的想法,这本身就是一件昂贵的事情。所以,预测一部电影的成功对电影行业来说是非常重要的。在本研究中,我们对互联网电影数据库(IMDb)进行了详细的分析,并预测了IMDb的评分。该数据库包含分类和数字信息,如IMDb评分,导演,总,预算等。这项研究提出了一种方法,可以在电影到达票房之前预测电影的成功程度,而不是听评论家和其他人谈论电影是否会成功。本研究提供了一种非常有效的方法来预测IMDb电影数据集上的IMDb评分。我们将尝试揭示影响IMDb Movie Data评分的重要因素。我们在研究工作中使用了不同的算法进行分析,但其中随机森林给出了最好的预测精度,与以往的研究相比要好得多。在探索性分析中,我们发现投票用户数量、评论评论者数量、Facebook点赞数量、电影时长和电影总收藏对IMDb评分有很大影响。剧情片和传记片在类型上最好。
{"title":"Movie Success Prediction using Machine Learning Algorithms and their Comparison","authors":"Rijul Dhir, A. Raj","doi":"10.1109/ICSCCC.2018.8703320","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703320","url":null,"abstract":"The number of movies produced in the world is growing at an exponential rate and success rate of movie is of utmost importance since billions of dollars are invested in the making of each of these movies. In such a scenario, prior knowledge about the success or failure of a particular movie and what factor affect the movie success will benefit the production houses since these predictions will give them a fair idea of how to go about with the advertising and campaigning, which itself is an expensive affair altogether. So, the prediction of the success of a movie is very essential to the film industry. In this proposed research, we give our detailed analysis of the Internet Movie Database (IMDb) and predict the IMDb score. This database contains categorical and numerical information such as IMDb score, director, gross, budget and so on and so forth. This research proposes a way to predict how successful a movie will be prior to its arrival at the box office instead of listening to critics and others on whether a movie will be successful or not. The proposed research provides a quite efficient approach to predict IMDb score on IMDb Movie Dataset. We will try to unveil the important factors influencing the score of IMDb Movie Data. We have used different algorithms in the research work for analysis but among all Random forest gave the best prediction accuracy which is better in comparison to the previous studies. In the exploratory analysis we found that number of voted users, number of critics for reviews, number of Facebook likes, duration of the movie and gross collection of movie affect the IMDb score strongly. Drama and Biopic movies are best in genres.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Deep Neural Network for Transformation Zone Classification 变换区域分类的深度神经网络
Mamta Arora, Sanjeev Dhawan, Kulvinder Singh
The type of the treatment that a patient undergoes depends on the type of transformation zone of the cervix of patient. It is difficult to identify the thin line difference between the various types of transformation zones using naked eyes. The application of deep learning can help medical practitioners for identifying the type with confidence. The survival rate of cancer patient will be higher if the affected cervix is diagnosed early in pre-cancerous stage. In this paper we present our work in developing a ConvNet (Convolutional Neural Network) to classify the transformation zones using cervix images provided by Kaggle. Our proposed model uses fine tuned transfer learning approach. We suspect more image augmentation methods can help to improve the overall performance of the model.
患者接受的治疗类型取决于患者宫颈转化区的类型。用肉眼很难识别各类变换区的细线差别。深度学习的应用可以帮助医疗从业者更自信地识别类型。如果受影响的子宫颈在癌前阶段得到早期诊断,癌症患者的存活率会更高。在本文中,我们介绍了我们在使用Kaggle提供的宫颈图像开发卷积神经网络(卷积神经网络)来分类变换区域的工作。我们提出的模型使用微调迁移学习方法。我们怀疑更多的图像增强方法可以帮助提高模型的整体性能。
{"title":"Deep Neural Network for Transformation Zone Classification","authors":"Mamta Arora, Sanjeev Dhawan, Kulvinder Singh","doi":"10.1109/ICSCCC.2018.8703327","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703327","url":null,"abstract":"The type of the treatment that a patient undergoes depends on the type of transformation zone of the cervix of patient. It is difficult to identify the thin line difference between the various types of transformation zones using naked eyes. The application of deep learning can help medical practitioners for identifying the type with confidence. The survival rate of cancer patient will be higher if the affected cervix is diagnosed early in pre-cancerous stage. In this paper we present our work in developing a ConvNet (Convolutional Neural Network) to classify the transformation zones using cervix images provided by Kaggle. Our proposed model uses fine tuned transfer learning approach. We suspect more image augmentation methods can help to improve the overall performance of the model.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"741 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122956930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Literature Survey on various Image Encryption & Steganography Techniques 各种图像加密与隐写技术的文献综述
Madhu Dahiya, Raman Kumar
In the current world when entire web contains most of multimedia data then protection of that data is our major concern. Different techniques are discovered and developed from time to time to encrypt and decrypt the images for making them more secure. Most of the encryption technique uses secret key to prevent the data from an unauthorized access. In this paper, we study different research papers on various encryption and steganography techniques. Encryption and steganography techniques provides security of images from intruder.
在当今世界,当整个网络包含大多数多媒体数据时,数据的保护是我们主要关注的问题。人们不时发现和开发不同的技术来加密和解密图像,以使它们更加安全。大多数加密技术使用秘密密钥来防止数据被未经授权的访问。在本文中,我们研究了各种加密和隐写技术的不同研究论文。加密和隐写技术提供了图像的安全性。
{"title":"A Literature Survey on various Image Encryption & Steganography Techniques","authors":"Madhu Dahiya, Raman Kumar","doi":"10.1109/ICSCCC.2018.8703368","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703368","url":null,"abstract":"In the current world when entire web contains most of multimedia data then protection of that data is our major concern. Different techniques are discovered and developed from time to time to encrypt and decrypt the images for making them more secure. Most of the encryption technique uses secret key to prevent the data from an unauthorized access. In this paper, we study different research papers on various encryption and steganography techniques. Encryption and steganography techniques provides security of images from intruder.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1