首页 > 最新文献

2021 24th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Towards the Development of a Common Platform for Pharmacists and Medicine Companies 面向药剂师和医药公司共同平台的开发
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689886
Mohammad Monirujjaman Khan, M. Hasan, M. Mahmud, Mahedi Hassan Pranto, Istiaqqe Azad, Shariar Mahmud Duke
Access to the modern health system is not prevalent in a developing country like Bangladesh. This paper aims to create an interface between pharmacists and pharmaceutical companies by building a common platform to address this limitation. We have developed an android mobile application where pharmacists can order medications from medicine companies. Pharmacists and medicine companies can register their business (Medicine Company) with this android application (app). Both users have to login to the system using their phone numbers and passwords. The system must verify whether the user is a pharmacist or a medicine company. If the pharmacist or the medicine company is already a member of this application, they access the application by logging in with their mobile number and password. They must complete the signup form as a first-time user of the application at first entry. To build an account, pharmacists and medicine companies can use their mobile numbers once. After completing the registration process, the medicine companies can add their medication to the database. The pharmacist can see several shops with different types of drugs in their windows. He or she can order medicine and make payments through the payment gateway system of the application. This android application (app) offers a faster way to order medication in remote areas. It adds a new era to the medicine business for pharmacists and medicine companies to help the needy people of our country, like Bangladesh.
在孟加拉国这样的发展中国家,获得现代卫生系统的机会并不普遍。本文旨在通过建立一个通用平台来解决这一限制,从而在药剂师和制药公司之间创建一个接口。我们开发了一个安卓手机应用程序,药剂师可以从制药公司订购药物。药剂师和医药公司可以通过这个android应用程序(app)注册他们的企业(医药公司)。两个用户都必须使用自己的电话号码和密码登录系统。系统必须验证用户是药剂师还是医药公司。如果药剂师或医药公司已经是该应用程序的成员,他们可以使用自己的手机号码和密码登录该应用程序。他们必须在第一次使用应用程序时完成注册表单。药剂师和医药公司只需使用一次手机号码就可以开户。在完成注册流程后,医药公司可以将其药品添加到数据库中。药剂师可以看到几家商店的橱窗里摆着不同种类的药品。他或她可以通过应用程序的支付网关系统订购药品并进行支付。这个安卓应用程序(app)提供了一种更快的方式在偏远地区订购药物。它为药剂师和制药公司帮助像孟加拉国这样有需要的人的药品业务开辟了一个新时代。
{"title":"Towards the Development of a Common Platform for Pharmacists and Medicine Companies","authors":"Mohammad Monirujjaman Khan, M. Hasan, M. Mahmud, Mahedi Hassan Pranto, Istiaqqe Azad, Shariar Mahmud Duke","doi":"10.1109/ICCIT54785.2021.9689886","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689886","url":null,"abstract":"Access to the modern health system is not prevalent in a developing country like Bangladesh. This paper aims to create an interface between pharmacists and pharmaceutical companies by building a common platform to address this limitation. We have developed an android mobile application where pharmacists can order medications from medicine companies. Pharmacists and medicine companies can register their business (Medicine Company) with this android application (app). Both users have to login to the system using their phone numbers and passwords. The system must verify whether the user is a pharmacist or a medicine company. If the pharmacist or the medicine company is already a member of this application, they access the application by logging in with their mobile number and password. They must complete the signup form as a first-time user of the application at first entry. To build an account, pharmacists and medicine companies can use their mobile numbers once. After completing the registration process, the medicine companies can add their medication to the database. The pharmacist can see several shops with different types of drugs in their windows. He or she can order medicine and make payments through the payment gateway system of the application. This android application (app) offers a faster way to order medication in remote areas. It adds a new era to the medicine business for pharmacists and medicine companies to help the needy people of our country, like Bangladesh.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129452532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Feature based Face Detection in Adaptive Skin Pixel Identification Using Signal Processing Techniques 基于特征的人脸检测在自适应皮肤像素识别中的应用
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689912
A. Z. Karim, Md. Sazal Miah, G. R. A. Jamal, Nusrat Jahan, Rafatul Alam Fahima, Muhammad Towhidur Rahman
Changes in illumination can substantially impact the apparent color of the skin, jeopardizing the effectiveness of any color-based segmentation method. Our solution to this problem is to use adaptive technology to generate skin color models in real-time. We employ a Viola-Jones feature-based face detector built-in MATLAB to sample faces inside a picture in a moderate-recall, high-precision configuration. We extract a set of pixels that are likely to be from skin areas from these samples. Then, filter them based on their relative luma values to remove non-skin face characteristics, producing a set of pixels. We train a unimodal Gaussian function to model the skin color in the provided image in the normalized rg color space using this representative set–a combination of the modeling strategy and color space that aids us in various ways. Subsequently, a developed function is employed for each pixel in the picture, allowing the likelihood that each pixel represents skin to be calculated. Application of a binary threshold to the computed probabilities may used to segment the skin. We discuss various current techniques in this work, detail the methodology behind our new proposed model. Moreover, provide the outcomes of its application to random photos of individuals with recognizable faces, which we found to be quite encouraging, and explores its possibilities for usage in real-time systems.
光照的变化会极大地影响皮肤的表观颜色,从而危及任何基于颜色的分割方法的有效性。我们的解决方案是使用自适应技术实时生成肤色模型。我们采用内置MATLAB的基于Viola-Jones特征的人脸检测器,以中等召回率、高精度配置对图片中的人脸进行采样。我们从这些样本中提取一组可能来自皮肤区域的像素。然后,根据它们的相对亮度值对它们进行过滤,去除非皮肤的面部特征,产生一组像素。我们训练一个单峰高斯函数,使用这个代表性集在归一化的rg颜色空间中对提供的图像中的皮肤颜色进行建模-建模策略和颜色空间的组合,以各种方式帮助我们。随后,对图片中的每个像素使用开发的函数,允许计算每个像素代表皮肤的可能性。对计算概率的二值阈值的应用可用于分割皮肤。我们在这项工作中讨论了各种当前的技术,详细介绍了我们新提出的模型背后的方法。此外,提供了其应用于具有可识别面孔的个人随机照片的结果,我们发现这是相当令人鼓舞的,并探索了其在实时系统中使用的可能性。
{"title":"Application of Feature based Face Detection in Adaptive Skin Pixel Identification Using Signal Processing Techniques","authors":"A. Z. Karim, Md. Sazal Miah, G. R. A. Jamal, Nusrat Jahan, Rafatul Alam Fahima, Muhammad Towhidur Rahman","doi":"10.1109/ICCIT54785.2021.9689912","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689912","url":null,"abstract":"Changes in illumination can substantially impact the apparent color of the skin, jeopardizing the effectiveness of any color-based segmentation method. Our solution to this problem is to use adaptive technology to generate skin color models in real-time. We employ a Viola-Jones feature-based face detector built-in MATLAB to sample faces inside a picture in a moderate-recall, high-precision configuration. We extract a set of pixels that are likely to be from skin areas from these samples. Then, filter them based on their relative luma values to remove non-skin face characteristics, producing a set of pixels. We train a unimodal Gaussian function to model the skin color in the provided image in the normalized rg color space using this representative set–a combination of the modeling strategy and color space that aids us in various ways. Subsequently, a developed function is employed for each pixel in the picture, allowing the likelihood that each pixel represents skin to be calculated. Application of a binary threshold to the computed probabilities may used to segment the skin. We discuss various current techniques in this work, detail the methodology behind our new proposed model. Moreover, provide the outcomes of its application to random photos of individuals with recognizable faces, which we found to be quite encouraging, and explores its possibilities for usage in real-time systems.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114729962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Based Smart Home Automation Using NodeMCU: A Smart Multi-Plug with Overload and Over Temperature Protection 使用NodeMCU的基于物联网的智能家居自动化:具有过载和过温保护的智能多插头
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689913
Md. Ibne Joha, Md. Shafiul Islam
In this modern era, internet connectivity is widespread and easily affordable. Therefore, it has become an essential part of everyday life. The Internet of Things (IoT) is a network where devices, appliances, and other items along with the sensors and software are connected to the network via the internet. This paper presents a user-friendly and straightforward approach for controlling and monitoring home appliances using the IoT-based smart multi-plug. This smart multi-plug can be accessed, monitored, and controlled through a smartphone using Wi-Fi via the smartphone Blynk framework. For this, it does not require any extra coding, irrespective of the internet connection used, making this multi-plug convenient and user-friendly. Moreover, it protects the appliances and the plugs from being damaged against overload, over-temperature. Furthermore, it offers voice command control through Google Assistant and timer setup for each plug, saving electricity, human energy, and effort.
在这个现代时代,互联网连接很普遍,而且很容易负担得起。因此,它已成为日常生活中必不可少的一部分。物联网(IoT)是一个网络,其中设备,电器和其他物品以及传感器和软件通过互联网连接到网络。本文介绍了一种使用基于物联网的智能多插头控制和监控家用电器的用户友好和直接的方法。这款智能多插头可以通过智能手机Blynk框架使用Wi-Fi访问、监控和控制。为此,它不需要任何额外的编码,无论使用的互联网连接,使这个多插头方便和用户友好。此外,它还可以保护电器和插头免受过载,过热的损坏。此外,它还通过谷歌助手提供语音命令控制,并为每个插头设置定时器,从而节省了电力,人力和精力。
{"title":"IoT-Based Smart Home Automation Using NodeMCU: A Smart Multi-Plug with Overload and Over Temperature Protection","authors":"Md. Ibne Joha, Md. Shafiul Islam","doi":"10.1109/ICCIT54785.2021.9689913","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689913","url":null,"abstract":"In this modern era, internet connectivity is widespread and easily affordable. Therefore, it has become an essential part of everyday life. The Internet of Things (IoT) is a network where devices, appliances, and other items along with the sensors and software are connected to the network via the internet. This paper presents a user-friendly and straightforward approach for controlling and monitoring home appliances using the IoT-based smart multi-plug. This smart multi-plug can be accessed, monitored, and controlled through a smartphone using Wi-Fi via the smartphone Blynk framework. For this, it does not require any extra coding, irrespective of the internet connection used, making this multi-plug convenient and user-friendly. Moreover, it protects the appliances and the plugs from being damaged against overload, over-temperature. Furthermore, it offers voice command control through Google Assistant and timer setup for each plug, saving electricity, human energy, and effort.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128195501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Offline Writer-independent Signature Verification System using AutoEmbedder 基于AutoEmbedder的脱机签名验证系统
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689780
Zabir Mohammad, Israt Jahan, Md. Mohsin Kabir, M. A. Ali, M. F. Mridha
Handwritten Signature is considered one of the most effective behavioral biometrics. It plays an important role in identifying and verifying persons for banking access control, criminal investigation, legal support, etc. Since the handwritten signature is used in such a high prominence, its misuse can be dangerous. Deep learning-based verification approaches are becoming extremely popular to reduce the risk of signatures misuse. Signature verification depends on pairwise constraints to verify if the person is genuine that he/she claims to be or forged. This paper proposes an Autoembedded system that uses Deep Neural Network (DNN) with the pairwise loss for signature verification. The model either generates embedding vectors closer to zero if the input pair is in the same class or generates a value greater or equal to $alpha$ (a hyperparameter) that indicates a different class. The proposed approach uses a Siamese network that computes the pairwise distance in feature learning phase. The performance has been evaluated based on CEDAR dataset in a writer-independent (WI) context, and the experimental result shows clear distance between the genuine and forged signatures and verifies genuine ones.
手写签名被认为是最有效的行为生物识别技术之一。它在银行门禁、刑事侦查、法律支持等方面发挥着重要的身份验证作用。由于手写签名如此显眼,误用可能是危险的。基于深度学习的验证方法正变得非常流行,以降低签名误用的风险。验证签名依赖于配对约束来验证该人是否真实,他/她声称是或伪造的。本文提出了一种利用具有对损失的深度神经网络(DNN)进行签名验证的自动嵌入式系统。如果输入对在同一类中,该模型要么生成接近于零的嵌入向量,要么生成大于或等于$alpha$(一个超参数)的值,表示不同的类。该方法使用Siamese网络计算特征学习阶段的成对距离。在WI环境下,基于CEDAR数据集对该算法的性能进行了评估,实验结果显示了真实签名和伪造签名之间的明显距离,并对真实签名进行了验证。
{"title":"An Offline Writer-independent Signature Verification System using AutoEmbedder","authors":"Zabir Mohammad, Israt Jahan, Md. Mohsin Kabir, M. A. Ali, M. F. Mridha","doi":"10.1109/ICCIT54785.2021.9689780","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689780","url":null,"abstract":"Handwritten Signature is considered one of the most effective behavioral biometrics. It plays an important role in identifying and verifying persons for banking access control, criminal investigation, legal support, etc. Since the handwritten signature is used in such a high prominence, its misuse can be dangerous. Deep learning-based verification approaches are becoming extremely popular to reduce the risk of signatures misuse. Signature verification depends on pairwise constraints to verify if the person is genuine that he/she claims to be or forged. This paper proposes an Autoembedded system that uses Deep Neural Network (DNN) with the pairwise loss for signature verification. The model either generates embedding vectors closer to zero if the input pair is in the same class or generates a value greater or equal to $alpha$ (a hyperparameter) that indicates a different class. The proposed approach uses a Siamese network that computes the pairwise distance in feature learning phase. The performance has been evaluated based on CEDAR dataset in a writer-independent (WI) context, and the experimental result shows clear distance between the genuine and forged signatures and verifies genuine ones.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134283626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multiple-Input Based Convolutional Neural Network in Breast Cancer Classification from Histopathological Images 基于多输入的卷积神经网络在乳腺癌组织病理图像分类中的应用
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689856
Mohiuddin Ahmed, M. Islam
Breast cancer is considered the second most common reason for death among women. The gold standard for detecting breast cancer is the visual interpretation of histopathological images, but it is a complicated process that takes years of experience and a lot of skills of the pathologists. Sometimes, the limitations of the visual interpretation and the lack of experience result in the failure of diagnosing breast cancer. So, the computer-aided diagnosis (CAD) system can be taken into consideration as a helping tool to reduce the error of diagnosis of breast cancer. In this paper, a novel approach based on convolutional neural networks is introduced to classify breast cancer from the histopathological images of the breast tissues. In the clinical process of breast cancer diagnosis, pathologists examine the histopathological images of the breast tissue at different magnification levels. In this research, a single convolutional neural networks model is used to take the input of the same image with four different magnification levels parallelly. Our proposed approach outperformed existing state-of-the-art approaches by a substantial margin.
乳腺癌被认为是妇女死亡的第二大常见原因。检测乳腺癌的黄金标准是对组织病理学图像的视觉解释,但这是一个复杂的过程,需要多年的经验和病理学家的大量技能。有时,由于视觉解释的限制和经验的缺乏,导致乳腺癌的诊断失败。因此,可以考虑将计算机辅助诊断(CAD)系统作为减少乳腺癌诊断错误率的辅助工具。本文提出了一种基于卷积神经网络的乳腺癌组织病理图像分类方法。在乳腺癌诊断的临床过程中,病理学家在不同的放大水平下检查乳腺组织的组织病理图像。在本研究中,使用单个卷积神经网络模型对具有四个不同放大倍数的同一图像并行进行输入。我们提出的方法比现有的最先进的方法要好得多。
{"title":"A Multiple-Input Based Convolutional Neural Network in Breast Cancer Classification from Histopathological Images","authors":"Mohiuddin Ahmed, M. Islam","doi":"10.1109/ICCIT54785.2021.9689856","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689856","url":null,"abstract":"Breast cancer is considered the second most common reason for death among women. The gold standard for detecting breast cancer is the visual interpretation of histopathological images, but it is a complicated process that takes years of experience and a lot of skills of the pathologists. Sometimes, the limitations of the visual interpretation and the lack of experience result in the failure of diagnosing breast cancer. So, the computer-aided diagnosis (CAD) system can be taken into consideration as a helping tool to reduce the error of diagnosis of breast cancer. In this paper, a novel approach based on convolutional neural networks is introduced to classify breast cancer from the histopathological images of the breast tissues. In the clinical process of breast cancer diagnosis, pathologists examine the histopathological images of the breast tissue at different magnification levels. In this research, a single convolutional neural networks model is used to take the input of the same image with four different magnification levels parallelly. Our proposed approach outperformed existing state-of-the-art approaches by a substantial margin.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of Low-Cost Smart Safety Vest for the Prevention of Physical Abuse and Sexual Harassment 预防身体虐待和性骚扰的低成本智能安全背心的设计
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689868
Kazi Rumman Reswan Turjo, Partho Anthony D'Costa, Surjo Bhowmick, A. Galib, Sami Raian, Mst. Shapna Akter, Nova Ahmed, M. Mahdy
Physical abuse and sexual harassment are serious issues all over the world. In Bangladesh, India, and other south Asian countries, crimes of these natures have risen to a substantial number during the past decade. We have designed an Arduino-based simple safety-vest device by using E-Textiles as pressure sensing fabric and incorporated a mobile application for women. This paper explains the details of the proposed smart device, which is cost-effective and re-usable as an undergarment, and the smartphone application with which the device is incorporated. The aim of this idea is to provide a device as a sense of protection for women at an affordable range. This smart vest has been designed by conducting various real-life experiments to make the device efficient and accurate. It has been designed with the target of commercial use. The device has also been beta-tested to get some insights from the people who will be using this cost-effective device as a sense of protection. It has eventually helped to make the vest more reliable and user-friendly for future commercialization.
身体虐待和性骚扰是世界各地的严重问题。在孟加拉国、印度和其他南亚国家,这些性质的犯罪在过去十年中已经上升到相当数量。我们设计了一个基于arduino的简易安全背心装置,使用E-Textiles作为压力感应织物,并结合了一个女性移动应用程序。本文解释了所提出的智能设备的细节,它具有成本效益和可重复使用的内衣,以及该设备所包含的智能手机应用程序。这个想法的目的是为女性提供一种负担得起的保护装置。这个智能背心是通过进行各种现实生活中的实验来设计的,以使设备高效和准确。它的设计目标是商业用途。该设备还进行了beta测试,以便从那些将使用这种具有成本效益的设备作为保护意识的人那里获得一些见解。它最终有助于使背心更加可靠和用户友好,以实现未来的商业化。
{"title":"Design of Low-Cost Smart Safety Vest for the Prevention of Physical Abuse and Sexual Harassment","authors":"Kazi Rumman Reswan Turjo, Partho Anthony D'Costa, Surjo Bhowmick, A. Galib, Sami Raian, Mst. Shapna Akter, Nova Ahmed, M. Mahdy","doi":"10.1109/ICCIT54785.2021.9689868","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689868","url":null,"abstract":"Physical abuse and sexual harassment are serious issues all over the world. In Bangladesh, India, and other south Asian countries, crimes of these natures have risen to a substantial number during the past decade. We have designed an Arduino-based simple safety-vest device by using E-Textiles as pressure sensing fabric and incorporated a mobile application for women. This paper explains the details of the proposed smart device, which is cost-effective and re-usable as an undergarment, and the smartphone application with which the device is incorporated. The aim of this idea is to provide a device as a sense of protection for women at an affordable range. This smart vest has been designed by conducting various real-life experiments to make the device efficient and accurate. It has been designed with the target of commercial use. The device has also been beta-tested to get some insights from the people who will be using this cost-effective device as a sense of protection. It has eventually helped to make the vest more reliable and user-friendly for future commercialization.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114812937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Identification of Autism Spectrum Disorder through Feature Selection-based Machine Learning 基于特征选择的机器学习识别自闭症谱系障碍
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689805
M. B. Mohammed, Lubaba Salsabil, Mahir Shahriar, Sabrina Sultana Tanaaz, Ahmed Fahmin
Autism Spectrum Disorder (ASD) is a developmental disability that is likely to be perceived at a young age, persisting throughout a lifetime. The goal of this study is to detect ASD more efficiently with the use of Machine Learning methods. In our paper, we worked with the AQ-10 Adult dataset. Multiple steps have been taken to perform the data preprocessing. We have used different data synthesization techniques and a few feature selection techniques and eventually implemented them with other classifiers. Although throughout our analysis, we can see that the usage of Neural Network has some significant effect due to a smaller data set, the best-performance was provided by the combination of classifiers and feature selection methods to develop the prediction model. After evaluation, We deduced that a model with Principal Component Analysis (PCA) feature selection method using the AdaBoost classifier gave the best results.
自闭症谱系障碍(ASD)是一种发育障碍,很可能在年轻时就被发现,并持续一生。本研究的目的是使用机器学习方法更有效地检测ASD。在我们的论文中,我们使用了AQ-10成人数据集。已经采取了多个步骤来执行数据预处理。我们使用了不同的数据合成技术和一些特征选择技术,并最终将它们与其他分类器一起实现。尽管在整个分析过程中,我们可以看到由于数据集较小,使用神经网络有一些显着的效果,但将分类器和特征选择方法相结合来开发预测模型提供了最好的性能。经过评估,我们推断使用AdaBoost分类器的主成分分析(PCA)特征选择方法的模型效果最好。
{"title":"Identification of Autism Spectrum Disorder through Feature Selection-based Machine Learning","authors":"M. B. Mohammed, Lubaba Salsabil, Mahir Shahriar, Sabrina Sultana Tanaaz, Ahmed Fahmin","doi":"10.1109/ICCIT54785.2021.9689805","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689805","url":null,"abstract":"Autism Spectrum Disorder (ASD) is a developmental disability that is likely to be perceived at a young age, persisting throughout a lifetime. The goal of this study is to detect ASD more efficiently with the use of Machine Learning methods. In our paper, we worked with the AQ-10 Adult dataset. Multiple steps have been taken to perform the data preprocessing. We have used different data synthesization techniques and a few feature selection techniques and eventually implemented them with other classifiers. Although throughout our analysis, we can see that the usage of Neural Network has some significant effect due to a smaller data set, the best-performance was provided by the combination of classifiers and feature selection methods to develop the prediction model. After evaluation, We deduced that a model with Principal Component Analysis (PCA) feature selection method using the AdaBoost classifier gave the best results.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127135223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Watermarking Approach for Ensuring Patient Data Authentication over a Low-quality Communication Environment 一种保证低质量通信环境下患者数据认证的新水印方法
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689806
Subrata Kumar Das, Mohammad Zahidur Rahman
Healthcare data management has improved in the last decade with increasing data volume due to the advancement of information technologies. While the digital patient data are accessed through a bad network from a remote place, data could be altered. Any modification of transferring data over the networks may create security issues like data integrity and authentication. The solution to these security problems is significant because they may cause sensitive data loss can hamper medical diagnoses. Watermarking is an effective method to provide such data security, which has attracted the researcher’s attention with a cheaper computational cost. Different watermarking techniques had applied to secure medical data, especially for images, in the healthcare system. Watermarking text data is a task that ensures authenticity and integrity on text patient data. It has become difficult for the lack of proper techniques. This paper proposes a new watermarking approach for real-time text patient data to provide their authentication and integrity. Both robust and fragile watermarks are used to detect reliable source information and any data alternation. Experiment results show that our proposed algorithm can identify the source information correctly and provide expected accuracy against possible attacks. The proposed technique could help to serve authentic data to the recipient from the geographically trustworthy distant source without any data manipulation.
在过去十年中,由于信息技术的进步,随着数据量的增加,医疗保健数据管理得到了改进。当病人的数字数据通过一个坏的网络从远程访问时,数据可能会被改变。通过网络传输数据的任何修改都可能产生数据完整性和身份验证等安全问题。这些安全问题的解决方案非常重要,因为它们可能导致敏感数据丢失,从而妨碍医疗诊断。水印技术作为一种有效的数据安全手段,以其较低的计算成本吸引了研究者的注意。在医疗保健系统中,不同的水印技术被应用于保护医疗数据,特别是图像。文本数据水印是一项确保文本患者数据真实性和完整性的任务。由于缺乏适当的技术,它变得很困难。本文提出了一种新的实时文本患者数据水印方法,以保证文本数据的真实性和完整性。鲁棒和脆弱水印用于检测可靠的源信息和任何数据变化。实验结果表明,本文提出的算法能够正确地识别源信息,并提供预期的准确率来抵御可能的攻击。所提出的技术可以帮助从地理上可信的遥远来源向接收者提供真实的数据,而无需任何数据操作。
{"title":"A New Watermarking Approach for Ensuring Patient Data Authentication over a Low-quality Communication Environment","authors":"Subrata Kumar Das, Mohammad Zahidur Rahman","doi":"10.1109/ICCIT54785.2021.9689806","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689806","url":null,"abstract":"Healthcare data management has improved in the last decade with increasing data volume due to the advancement of information technologies. While the digital patient data are accessed through a bad network from a remote place, data could be altered. Any modification of transferring data over the networks may create security issues like data integrity and authentication. The solution to these security problems is significant because they may cause sensitive data loss can hamper medical diagnoses. Watermarking is an effective method to provide such data security, which has attracted the researcher’s attention with a cheaper computational cost. Different watermarking techniques had applied to secure medical data, especially for images, in the healthcare system. Watermarking text data is a task that ensures authenticity and integrity on text patient data. It has become difficult for the lack of proper techniques. This paper proposes a new watermarking approach for real-time text patient data to provide their authentication and integrity. Both robust and fragile watermarks are used to detect reliable source information and any data alternation. Experiment results show that our proposed algorithm can identify the source information correctly and provide expected accuracy against possible attacks. The proposed technique could help to serve authentic data to the recipient from the geographically trustworthy distant source without any data manipulation.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126858136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Steganography System based on Hybrid Edge Detector 基于混合边缘检测器的图像隐写系统
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689777
Habiba Sultana, A. Kamal
In the field of image steganography, edge detection based implantation methods play vital rules in providing stronger security of hided data. In this arena, researcher applies a suitable edge detection method to detect edge pixels in an image. Those detected pixels then conceive secret message bits. A very recent trend is to employ multiple edge detection methods to increase edge pixels in an image and thus to enhance the embedding capacity. The uses of multiple edge detectors additionally boost up the data security. Like as the demand for embedding capacity, many applications need to have the modified image, i.e., stego image, with good quality. Indeed, when the message payload is low, it will not be a better idea to finds more local pixels for embedding that small payload. Rather, the image quality will look better, visually and statistically, if we could choose a part but sufficient pixels to implant bits. In this article, we propose an algorithm that uses multiple edge detection algorithms to find edge pixels separately and then selects pixels which are common to all edges. This way, the proposed method decreases the number of embeddable pixels and thus, increases the image quality. The experimental results provide promising output.
在图像隐写领域,基于边缘检测的植入方法对于增强隐藏数据的安全性起着至关重要的作用。在这一领域,研究者采用一种合适的边缘检测方法来检测图像中的边缘像素。这些被检测到的像素然后孕育出秘密信息位。最近的一个趋势是采用多种边缘检测方法来增加图像中的边缘像素,从而提高嵌入能力。多个边缘检测器的使用也提高了数据的安全性。就像对嵌入容量的需求一样,许多应用都需要得到质量好的修改后的图像,即隐写图像。实际上,当消息有效负载较低时,寻找更多的本地像素来嵌入小的有效负载并不是一个更好的主意。相反,如果我们可以选择一个部分,但有足够的像素来植入比特,那么图像质量在视觉上和统计上都会看起来更好。在本文中,我们提出了一种算法,该算法使用多个边缘检测算法分别找到边缘像素,然后选择所有边缘共有的像素。这样,该方法减少了可嵌入像素的数量,从而提高了图像质量。实验结果提供了令人满意的输出。
{"title":"Image Steganography System based on Hybrid Edge Detector","authors":"Habiba Sultana, A. Kamal","doi":"10.1109/ICCIT54785.2021.9689777","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689777","url":null,"abstract":"In the field of image steganography, edge detection based implantation methods play vital rules in providing stronger security of hided data. In this arena, researcher applies a suitable edge detection method to detect edge pixels in an image. Those detected pixels then conceive secret message bits. A very recent trend is to employ multiple edge detection methods to increase edge pixels in an image and thus to enhance the embedding capacity. The uses of multiple edge detectors additionally boost up the data security. Like as the demand for embedding capacity, many applications need to have the modified image, i.e., stego image, with good quality. Indeed, when the message payload is low, it will not be a better idea to finds more local pixels for embedding that small payload. Rather, the image quality will look better, visually and statistically, if we could choose a part but sufficient pixels to implant bits. In this article, we propose an algorithm that uses multiple edge detection algorithms to find edge pixels separately and then selects pixels which are common to all edges. This way, the proposed method decreases the number of embeddable pixels and thus, increases the image quality. The experimental results provide promising output.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123283772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Churn Predictive Models and Factor Identification in Telecom Industry 电信行业客户流失预测模型与因素识别的比较分析
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689881
A. Siddika, Aifa Faruque, Abdul Kadar Muhammad Masum
Continual advancement in technology has led an initiative to the competitive environment among the institutes relating to the technological domain. The telecommunication industry is no exception in such cases. There exists immense competition among the telecom service providers for maximization of profit and expansion of market interest by attracting new clients. However, the retention of existing customers is easier and cheaper than acquiring new ones. As the customers are more concerned about the quality of services provided by the institutions it becomes challenging for companies to maintain client satisfaction. The CRM as well as analysts need to recognize the potential churners and the cause of their migration. This paper suggests a framework that employs machine learning and deep learning techniques for determining churn customers as well as distinguishes notable factors that typically govern the customer towards churn. Firstly, the classification between churn and non-churn customers is conducted utilizing both machine learning and deep learning algorithms where Random Forest achieved supremacy over others and followed by the deep learning models CNN and MLP. Besides the work deduced the significant factors affecting the churning procedure by applying Attribute Selection Techniques. The experimentation results unveil the prediction models that recognize the potential churners with optimal accuracy and the important factors that show impact over the churning of the customer. The findings acquired from this research are hoped to be lucrative for the companies in the present world for taking an effective decision and acting accurately in terms of customer retention.
技术的不断进步导致了与技术领域有关的研究所之间的竞争环境的主动。在这种情况下,电信行业也不例外。电信服务提供商之间存在着巨大的竞争,以实现利润最大化,并通过吸引新客户来扩大市场利益。然而,留住现有客户比获得新客户更容易,成本也更低。随着客户越来越关注机构提供的服务质量,保持客户满意度对公司来说变得具有挑战性。客户关系管理和分析师需要认识到潜在的流失和他们迁移的原因。本文提出了一个框架,该框架采用机器学习和深度学习技术来确定流失客户,并区分通常导致客户流失的显着因素。首先,利用机器学习和深度学习算法对流失客户和非流失客户进行分类,其中Random Forest优于其他算法,其次是深度学习模型CNN和MLP。此外,运用属性选择技术推导了影响搅拌过程的重要因素。实验结果揭示了以最佳精度识别潜在流失的预测模型和影响客户流失的重要因素。从这项研究中获得的发现希望对当今世界的公司有利可图,因为它们可以在客户保留方面做出有效的决策和准确的行动。
{"title":"Comparative Analysis of Churn Predictive Models and Factor Identification in Telecom Industry","authors":"A. Siddika, Aifa Faruque, Abdul Kadar Muhammad Masum","doi":"10.1109/ICCIT54785.2021.9689881","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689881","url":null,"abstract":"Continual advancement in technology has led an initiative to the competitive environment among the institutes relating to the technological domain. The telecommunication industry is no exception in such cases. There exists immense competition among the telecom service providers for maximization of profit and expansion of market interest by attracting new clients. However, the retention of existing customers is easier and cheaper than acquiring new ones. As the customers are more concerned about the quality of services provided by the institutions it becomes challenging for companies to maintain client satisfaction. The CRM as well as analysts need to recognize the potential churners and the cause of their migration. This paper suggests a framework that employs machine learning and deep learning techniques for determining churn customers as well as distinguishes notable factors that typically govern the customer towards churn. Firstly, the classification between churn and non-churn customers is conducted utilizing both machine learning and deep learning algorithms where Random Forest achieved supremacy over others and followed by the deep learning models CNN and MLP. Besides the work deduced the significant factors affecting the churning procedure by applying Attribute Selection Techniques. The experimentation results unveil the prediction models that recognize the potential churners with optimal accuracy and the important factors that show impact over the churning of the customer. The findings acquired from this research are hoped to be lucrative for the companies in the present world for taking an effective decision and acting accurately in terms of customer retention.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121133445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 24th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1