首页 > 最新文献

2021 24th International Conference on Computer and Information Technology (ICCIT)最新文献

英文 中文
Analyzing the effect of feature mapping techniques along with the circuit depth in quantum supervised learning by utilizing quantum support vector machine 利用量子支持向量机分析特征映射技术和电路深度在量子监督学习中的作用
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689853
M. Hossain, Mohammed Sowket Ali, Reshma Ahmed Swarna, M. Hasan, Nahida Habib, M. Rahman, M. Azad, Mohammad Motiur Rahman
A quantum feature map encodes classical data to the quantum state space by using a quantum circuit. The repetition of such a circuit during encoding is a customize value known as depth. Encoding data to quantum state is a must step for applying Quantum machine learning (QML) to classical data. Utilizing different feature map techniques by varying several depths, this research uses a kernel-based quantum support vector machine (QSVM) to classify several datasets. The fundamental aim of such activities is to check whether feature map techniques can make any sense to supervised QML concerning their depths and the outcomes analysis concludes that maximum accuracy of any supervised QML model is obtained due to the selection of an essential feature map approach with appropriate circuit depth. The results also present that time consumption of any feature map technique increases linearly with the increase of feature map circuit depth. However, the outcome of this research will help anyone to estimate the feature map technique and circuit depth when executing QML.
量子特征映射利用量子电路将经典数据编码到量子态空间。这种电路在编码期间的重复是一个称为深度的自定义值。将数据编码为量子态是量子机器学习应用于经典数据的必要步骤。本研究利用不同深度的特征映射技术,利用基于核的量子支持向量机(QSVM)对多个数据集进行分类。这些活动的基本目的是检查特征图技术是否对有监督QML的深度有任何意义,结果分析得出结论,任何有监督QML模型的最大精度都是由于选择了具有适当电路深度的基本特征图方法而获得的。结果还表明,任何特征映射技术的耗时都随特征映射电路深度的增加而线性增加。然而,本研究的结果将有助于任何人在执行QML时估计特征映射技术和电路深度。
{"title":"Analyzing the effect of feature mapping techniques along with the circuit depth in quantum supervised learning by utilizing quantum support vector machine","authors":"M. Hossain, Mohammed Sowket Ali, Reshma Ahmed Swarna, M. Hasan, Nahida Habib, M. Rahman, M. Azad, Mohammad Motiur Rahman","doi":"10.1109/ICCIT54785.2021.9689853","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689853","url":null,"abstract":"A quantum feature map encodes classical data to the quantum state space by using a quantum circuit. The repetition of such a circuit during encoding is a customize value known as depth. Encoding data to quantum state is a must step for applying Quantum machine learning (QML) to classical data. Utilizing different feature map techniques by varying several depths, this research uses a kernel-based quantum support vector machine (QSVM) to classify several datasets. The fundamental aim of such activities is to check whether feature map techniques can make any sense to supervised QML concerning their depths and the outcomes analysis concludes that maximum accuracy of any supervised QML model is obtained due to the selection of an essential feature map approach with appropriate circuit depth. The results also present that time consumption of any feature map technique increases linearly with the increase of feature map circuit depth. However, the outcome of this research will help anyone to estimate the feature map technique and circuit depth when executing QML.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"294 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132269773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Multi-party Skyline Query Maintaining Privacy and Data Integrity 维护隐私和数据完整性的多方Skyline查询框架
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689854
Dola Das, K. R. Alam, Y. Morimoto
Skyline query is well-known to find out the dominant objects from a large number of datasets. While multiple organizations want to analyze their combined dataset, skyline queries can assist in this regard. Maintaining privacy along with the data integrity of participating organizations’ datasets is important because their commercial success depends on the result of these queries. This paper proposes a new framework for the multi-party skyline query that encompasses both privacy and data integrity. To ensure the privacy of participants’ datasets, it adopts commutative encryptions by employing multiple independent entities. To support the data integrity, it combines encrypted unique tags (UTs) with the encrypted datasets of all participants. In addition, to retain the anonymity of participants’ encrypted data from anyone including authorities, it exploits the re-encryption. Although the proposed framework also practices homomorphic encryption, which usually sacrifices the data integrity, here due to the usage of UTs, it is maintained. This paper is a preliminary report of the proposed framework.
Skyline查询以从大量数据集中找出主导对象而闻名。当多个组织想要分析他们的组合数据集时,skyline查询可以在这方面提供帮助。维护隐私以及参与组织数据集的数据完整性非常重要,因为他们的商业成功取决于这些查询的结果。本文提出了一个包含隐私和数据完整性的多方天际线查询框架。为了保证参与者数据集的保密性,采用了可交换加密,采用了多个独立实体。为了支持数据完整性,它将加密的唯一标记(ut)与所有参与者的加密数据集结合在一起。此外,为了保持参与者加密数据的匿名性,它利用了重新加密。尽管所提议的框架也采用同态加密,这通常会牺牲数据完整性,但由于使用了ut,因此它得到了维护。本文是拟议框架的初步报告。
{"title":"A Framework for Multi-party Skyline Query Maintaining Privacy and Data Integrity","authors":"Dola Das, K. R. Alam, Y. Morimoto","doi":"10.1109/ICCIT54785.2021.9689854","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689854","url":null,"abstract":"Skyline query is well-known to find out the dominant objects from a large number of datasets. While multiple organizations want to analyze their combined dataset, skyline queries can assist in this regard. Maintaining privacy along with the data integrity of participating organizations’ datasets is important because their commercial success depends on the result of these queries. This paper proposes a new framework for the multi-party skyline query that encompasses both privacy and data integrity. To ensure the privacy of participants’ datasets, it adopts commutative encryptions by employing multiple independent entities. To support the data integrity, it combines encrypted unique tags (UTs) with the encrypted datasets of all participants. In addition, to retain the anonymity of participants’ encrypted data from anyone including authorities, it exploits the re-encryption. Although the proposed framework also practices homomorphic encryption, which usually sacrifices the data integrity, here due to the usage of UTs, it is maintained. This paper is a preliminary report of the proposed framework.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114704218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Low Resolution Hand Gestures Recognition of Bengali Sign Alphabet by Using a Convolutional Neural Network 基于卷积神经网络的孟加拉手语低分辨率手势识别
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689895
Azmain Yakin Srizon, Md. Ali Hossainy, Md Rakibul Haquez
Sign language is an essential tool for the deaf and the hard of hearing community of approximately 1.33 billion people. Due to this fact, researches have been conducted for decades for near-accurate recognition of sign characters. Sensor-based approaches and vision-based approaches have been adapted so far for tackling this dilemma. Sensor-based approaches can obtain high performance but it is costly and demands physical contact to sensors. On the other hand, vision-based approaches are not costly, need no contact but have not yet been able to produce a high accuracy like sensor-based approaches. The dilemma of sign characters recognition gets more problematic for Bengali sign language as not many datasets regarding Bengali sign language are available. Moreover, not many significant contributions can be found in this domain like other popular languages such as English, Turkish, Japanese, and Indian sign language. Furthermore, one of the most popular Bengali sign language datasets, Ishara-Lipi, consists of a few low-resolution samples. This study is focused on recognizing the low-resolution hand gestures of Bengali sign language. In this research, a convolutional neural network has been proposed which is suitable for the recognition of low-resolution sign gestures. Experimental results showed that the proposed approach achieved 99.08%, 99.38%, and 99.07% overall accuracy for digits, characters, and both digits and characters of the Ishara-Lipi dataset respectively.
手语是约13.3亿聋人和听障人士的重要工具。由于这一事实,几十年来一直在进行近乎准确的识别符号字符的研究。迄今为止,基于传感器的方法和基于视觉的方法已被用于解决这一难题。基于传感器的方法可以获得高性能,但成本高且需要与传感器进行物理接触。另一方面,基于视觉的方法成本不高,不需要接触,但还不能像基于传感器的方法那样产生高精度。由于孟加拉语手语的数据集不多,手语字符识别的困境变得更加棘手。此外,在这个领域中没有像其他流行语言(如英语、土耳其语、日语和印度手语)那样有很多重大贡献。此外,最流行的孟加拉语手语数据集之一Ishara-Lipi由一些低分辨率样本组成。本研究的重点是识别孟加拉语手语的低分辨率手势。本研究提出了一种适合于低分辨率手势识别的卷积神经网络。实验结果表明,该方法对Ishara-Lipi数据集的数字、字符和数字与字符同时识别的总体准确率分别达到99.08%、99.38%和99.07%。
{"title":"Low Resolution Hand Gestures Recognition of Bengali Sign Alphabet by Using a Convolutional Neural Network","authors":"Azmain Yakin Srizon, Md. Ali Hossainy, Md Rakibul Haquez","doi":"10.1109/ICCIT54785.2021.9689895","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689895","url":null,"abstract":"Sign language is an essential tool for the deaf and the hard of hearing community of approximately 1.33 billion people. Due to this fact, researches have been conducted for decades for near-accurate recognition of sign characters. Sensor-based approaches and vision-based approaches have been adapted so far for tackling this dilemma. Sensor-based approaches can obtain high performance but it is costly and demands physical contact to sensors. On the other hand, vision-based approaches are not costly, need no contact but have not yet been able to produce a high accuracy like sensor-based approaches. The dilemma of sign characters recognition gets more problematic for Bengali sign language as not many datasets regarding Bengali sign language are available. Moreover, not many significant contributions can be found in this domain like other popular languages such as English, Turkish, Japanese, and Indian sign language. Furthermore, one of the most popular Bengali sign language datasets, Ishara-Lipi, consists of a few low-resolution samples. This study is focused on recognizing the low-resolution hand gestures of Bengali sign language. In this research, a convolutional neural network has been proposed which is suitable for the recognition of low-resolution sign gestures. Experimental results showed that the proposed approach achieved 99.08%, 99.38%, and 99.07% overall accuracy for digits, characters, and both digits and characters of the Ishara-Lipi dataset respectively.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An ensemble learning based approach to autonomous COVID19 detection using transfer learning with the help of pre-trained Deep Neural Network models 基于集成学习的自动covid - 19检测方法,在预训练深度神经网络模型的帮助下使用迁移学习
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689825
Faiza Anan Noor, Ishrakul Munzerin, A. Iqbal, Tanima Islam, Emam Hossain
An automated means for predicting the virus is of utmost importance to help the medical personnel to detect patients, prepare reports and produce results fast and impeccably so that people can get early treatment and prevent future transmissions. In this work, we proposed a COVID19 detection method using chest x-ray images by training and testing pre-trained deep neural network models, such as VGG19, InceptionV3, and Densenet201 individually, and got an accuracy of 96.9%, 95.2%, and 96.7% respectively. Then to bolster the performance of each model, we proposed an average weighted based ensemble approach and got an accuracy of 97.5%, which surpassed the performance of each separate model.
预测病毒的自动化手段对于帮助医务人员快速、准确地发现病人、准备报告和得出结果至关重要,这样人们就可以得到早期治疗,防止未来的传播。本文通过对VGG19、InceptionV3和Densenet201等预训练深度神经网络模型进行训练和测试,提出了一种基于胸部x线图像的covid - 19检测方法,准确率分别达到96.9%、95.2%和96.7%。然后,为了加强每个模型的性能,我们提出了一种基于平均加权的集成方法,得到了97.5%的精度,超过了每个单独模型的性能。
{"title":"An ensemble learning based approach to autonomous COVID19 detection using transfer learning with the help of pre-trained Deep Neural Network models","authors":"Faiza Anan Noor, Ishrakul Munzerin, A. Iqbal, Tanima Islam, Emam Hossain","doi":"10.1109/ICCIT54785.2021.9689825","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689825","url":null,"abstract":"An automated means for predicting the virus is of utmost importance to help the medical personnel to detect patients, prepare reports and produce results fast and impeccably so that people can get early treatment and prevent future transmissions. In this work, we proposed a COVID19 detection method using chest x-ray images by training and testing pre-trained deep neural network models, such as VGG19, InceptionV3, and Densenet201 individually, and got an accuracy of 96.9%, 95.2%, and 96.7% respectively. Then to bolster the performance of each model, we proposed an average weighted based ensemble approach and got an accuracy of 97.5%, which surpassed the performance of each separate model.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126566539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multitask Learning as Question Answering with BERT 多任务学习作为BERT的问题回答
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689900
Shishir Roy, Nayeem Ehtesham, Md Saiful Islam, Sabir Ismail
Question Answering demands a deep understanding of semantic relations among question, answer, and context. Multi-Task Learning (MTL) and Meta Learning with deep neural networks have recently shown impressive performance in many Natural Language Processing (NLP) tasks, particularly when there is inadequate data for training. But a little work has been done for a general NLP architecture that spans over many NLP tasks. In this paper, we present a model that can generalize to ten different NLP tasks. We demonstrate that multi-pointer-generator decoder and pre-trained language model is key to success and suppress all previous state-of-the-art baselines by 74 decaScore which is more than 12% absolute improvement over all of the datasets.
问答要求对问题、答案和上下文之间的语义关系有深刻的理解。最近,深度神经网络的多任务学习(MTL)和元学习在许多自然语言处理(NLP)任务中表现出了令人印象深刻的表现,特别是在训练数据不足的情况下。但是,对于跨越许多NLP任务的通用NLP架构,已经做了一些工作。在本文中,我们提出了一个可以推广到十个不同的NLP任务的模型。我们证明了多指针生成器解码器和预训练的语言模型是成功的关键,并将所有以前最先进的基线抑制了74 decaScore,这比所有数据集的绝对改进超过12%。
{"title":"Multitask Learning as Question Answering with BERT","authors":"Shishir Roy, Nayeem Ehtesham, Md Saiful Islam, Sabir Ismail","doi":"10.1109/ICCIT54785.2021.9689900","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689900","url":null,"abstract":"Question Answering demands a deep understanding of semantic relations among question, answer, and context. Multi-Task Learning (MTL) and Meta Learning with deep neural networks have recently shown impressive performance in many Natural Language Processing (NLP) tasks, particularly when there is inadequate data for training. But a little work has been done for a general NLP architecture that spans over many NLP tasks. In this paper, we present a model that can generalize to ten different NLP tasks. We demonstrate that multi-pointer-generator decoder and pre-trained language model is key to success and suppress all previous state-of-the-art baselines by 74 decaScore which is more than 12% absolute improvement over all of the datasets.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123130236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Six Programming Languages Based on Readability, Writability, and Reliability 基于可读性、可写性和可靠性的六种编程语言的比较分析
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689813
Zahin Ahmed, Farishta Jayas Kinjol, I. Ananya
In recent years, the development of programming languages has been centered around making them easily understandable and learnable to users. Hence, the readability, writability of languages is being constantly improved while trying to keep the performance reliable. These factors affect how many new users start to use a particular language and how many experienced programmers continue to use it reliably in real applications. Hence, this research has compared the readability, writability, and reliability of six mainstream programming languages, namely C, C++, Java, JavaScript, Python, and R, based on their theoretical characteristics. Furthermore, we conducted a survey determining the choice of a language among programmers and nonprogrammers, which complemented the results gathered from the study. We found that Python outperforms others in terms of its readability and writability, while Java is proven to be the most reliable of all. We reported our findings, insights, and a discussion on the future development of better evaluation metrics.
近年来,编程语言的发展一直围绕着使它们易于用户理解和学习。因此,在保持性能可靠的同时,语言的可读性和可写性也在不断提高。这些因素会影响有多少新用户开始使用特定语言,以及有多少有经验的程序员继续在实际应用程序中可靠地使用它。因此,本研究根据C、c++、Java、JavaScript、Python和R这六种主流编程语言的理论特点,对它们的可读性、可写性和可靠性进行了比较。此外,我们进行了一项调查,以确定程序员和非程序员之间对语言的选择,这补充了从研究中收集到的结果。我们发现Python在可读性和可写性方面优于其他语言,而Java被证明是最可靠的。我们报告了我们的发现、见解,并讨论了更好的评估指标的未来发展。
{"title":"Comparative Analysis of Six Programming Languages Based on Readability, Writability, and Reliability","authors":"Zahin Ahmed, Farishta Jayas Kinjol, I. Ananya","doi":"10.1109/ICCIT54785.2021.9689813","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689813","url":null,"abstract":"In recent years, the development of programming languages has been centered around making them easily understandable and learnable to users. Hence, the readability, writability of languages is being constantly improved while trying to keep the performance reliable. These factors affect how many new users start to use a particular language and how many experienced programmers continue to use it reliably in real applications. Hence, this research has compared the readability, writability, and reliability of six mainstream programming languages, namely C, C++, Java, JavaScript, Python, and R, based on their theoretical characteristics. Furthermore, we conducted a survey determining the choice of a language among programmers and nonprogrammers, which complemented the results gathered from the study. We found that Python outperforms others in terms of its readability and writability, while Java is proven to be the most reliable of all. We reported our findings, insights, and a discussion on the future development of better evaluation metrics.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127675844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lane Detection for Autonomous Vehicle Management: PHT Approach 自动驾驶车辆管理的车道检测:PHT方法
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689883
M. N. Rahaman, M. S. Biswas, S. Chaki, M. M. Hossain, Shamim Ahmed, M. Biswas
Road region extraction is a crucial part of the vision-based driver assistance system of intelligent vehicles. This driver assistance system reduces road accidents, enhances safety, and improves traffic conditions. Autonomous Guided Vehicles are capable of performing required tasks in a defined environment without continuous human guidance. This research paper presents the design of a prototype autonomous guided vehicle which will detect and follow the lanes using the Probabilistic Hough Transform (PHT) algorithm. To do so, We convert our RGB road images into an HSV color model and then apply Gaussian smoothing to the converted grayscale image. For detection purposes, we process our region of interest (ROI) using a polygon clipping algorithm. Then, we apply Probabilistic Hough Transform upon the ROI image while setting all the parameters in our proposed lane detection algorithm. We present a robust real-time approach to extract road regions even in critical conditions like urban roads, unmarked roads. We have applied our proposed framework on the CALTECH dataset and gained 94.7% detection accuracy results in our experimental setup.
道路区域提取是基于视觉的智能汽车驾驶辅助系统的重要组成部分。这个驾驶员辅助系统减少了道路事故,提高了安全性,改善了交通状况。自动制导车辆能够在没有人类持续引导的情况下在指定的环境中执行所需的任务。本文提出了一种基于概率霍夫变换(PHT)算法的自动驾驶车辆的原型设计。为此,我们将RGB道路图像转换为HSV颜色模型,然后对转换后的灰度图像应用高斯平滑。为了检测目的,我们使用多边形裁剪算法处理感兴趣区域(ROI)。然后,我们对感兴趣区域图像进行概率霍夫变换,同时设置我们提出的车道检测算法的所有参数。我们提出了一种强大的实时方法来提取道路区域,即使在城市道路,无标记道路等关键条件下。我们在CALTECH数据集上应用了我们提出的框架,在我们的实验设置中获得了94.7%的检测精度结果。
{"title":"Lane Detection for Autonomous Vehicle Management: PHT Approach","authors":"M. N. Rahaman, M. S. Biswas, S. Chaki, M. M. Hossain, Shamim Ahmed, M. Biswas","doi":"10.1109/ICCIT54785.2021.9689883","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689883","url":null,"abstract":"Road region extraction is a crucial part of the vision-based driver assistance system of intelligent vehicles. This driver assistance system reduces road accidents, enhances safety, and improves traffic conditions. Autonomous Guided Vehicles are capable of performing required tasks in a defined environment without continuous human guidance. This research paper presents the design of a prototype autonomous guided vehicle which will detect and follow the lanes using the Probabilistic Hough Transform (PHT) algorithm. To do so, We convert our RGB road images into an HSV color model and then apply Gaussian smoothing to the converted grayscale image. For detection purposes, we process our region of interest (ROI) using a polygon clipping algorithm. Then, we apply Probabilistic Hough Transform upon the ROI image while setting all the parameters in our proposed lane detection algorithm. We present a robust real-time approach to extract road regions even in critical conditions like urban roads, unmarked roads. We have applied our proposed framework on the CALTECH dataset and gained 94.7% detection accuracy results in our experimental setup.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121399608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Credit card fraudulence detection using Salient Feature Extraction Technique with Adaptive Synthetic Oversampling Models 基于自适应合成过采样模型的显著特征提取技术的信用卡欺诈检测
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689888
Md. Kaviul Hossain, Tasmim Promi, Piash Paul
Credit card fraudulence is a federal offense that takes place frequently in recent times. The phenomenon where an imposter or a scammer tries to make an illegal purchase or transfer of money from one account to another using a credit card that does not belong to him/her, is coined as Credit Card Fraudulence. In modern world, credit card fraud or any type of payment card fraud is a very common but serious crime that occurs both offline and online. But with the help of machine learning algorithms and Salient Feature Extraction Technique (SFET) we can easily detect such offense and help in further investigations. From time to time many data scientists, data analysts, machine learning engineers and other researchers have designed many algorithms to detect credit card frauds. By extracting the most relevant and important features of a transaction, it is quite possible to detect credit card fraud very quickly & efficiently. In this paper, we have shown such an improved way by using Adaptive Synthetic oversampling (ADASYN) model with five notable supervised machine learning models namely Random Forest, Support Vector Machine, Naive Bayes, Logistics Regression and K-Nearest Neighbour. Out of these five machine learning models, K-Nearest Neighbour has shown the best precision, recall, specificity & accuracy. The performance accuracy of Random Forest, Logistic Regression, K-Nearest Neighbour, Naive Bayes & Support Vector Machines are 96.04%, 81.31%, 96.22%, 79.22% & 50.06% respectively.
信用卡诈骗是近年来经常发生的联邦犯罪行为。冒名顶替者或诈骗者试图使用不属于自己的信用卡进行非法购物或将钱从一个账户转移到另一个账户的现象被称为信用卡欺诈。在现代社会,信用卡欺诈或任何类型的支付卡欺诈是一种非常常见但严重的犯罪,发生在线下和线上。但借助机器学习算法和显著特征提取技术(sset),我们可以很容易地检测到这种攻击,并有助于进一步的调查。不时地,许多数据科学家、数据分析师、机器学习工程师和其他研究人员设计了许多算法来检测信用卡欺诈。通过提取交易中最相关和最重要的特征,可以非常快速有效地检测信用卡欺诈。在本文中,我们通过使用自适应合成过采样(ADASYN)模型和五个著名的监督机器学习模型,即随机森林、支持向量机、朴素贝叶斯、物流回归和k近邻,展示了这种改进的方法。在这五种机器学习模型中,k近邻模型显示出最好的精度、召回率、特异性和准确性。随机森林、逻辑回归、k近邻、朴素贝叶斯和支持向量机的性能准确率分别为96.04%、81.31%、96.22%、79.22%和50.06%。
{"title":"Credit card fraudulence detection using Salient Feature Extraction Technique with Adaptive Synthetic Oversampling Models","authors":"Md. Kaviul Hossain, Tasmim Promi, Piash Paul","doi":"10.1109/ICCIT54785.2021.9689888","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689888","url":null,"abstract":"Credit card fraudulence is a federal offense that takes place frequently in recent times. The phenomenon where an imposter or a scammer tries to make an illegal purchase or transfer of money from one account to another using a credit card that does not belong to him/her, is coined as Credit Card Fraudulence. In modern world, credit card fraud or any type of payment card fraud is a very common but serious crime that occurs both offline and online. But with the help of machine learning algorithms and Salient Feature Extraction Technique (SFET) we can easily detect such offense and help in further investigations. From time to time many data scientists, data analysts, machine learning engineers and other researchers have designed many algorithms to detect credit card frauds. By extracting the most relevant and important features of a transaction, it is quite possible to detect credit card fraud very quickly & efficiently. In this paper, we have shown such an improved way by using Adaptive Synthetic oversampling (ADASYN) model with five notable supervised machine learning models namely Random Forest, Support Vector Machine, Naive Bayes, Logistics Regression and K-Nearest Neighbour. Out of these five machine learning models, K-Nearest Neighbour has shown the best precision, recall, specificity & accuracy. The performance accuracy of Random Forest, Logistic Regression, K-Nearest Neighbour, Naive Bayes & Support Vector Machines are 96.04%, 81.31%, 96.22%, 79.22% & 50.06% respectively.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133265974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Handling Imbalanced Data for Credit Card Fraud Detection 处理不平衡数据的信用卡欺诈检测
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689866
Istiak Ahmed Mondal, Md. Enamul Haque, Al-Maruf Hassan, Swakkhar Shatabda
With the rising trend in online transactions, the threat of financial fraud is also rising. This makes the necessity for an effective Fraud Detection System (FDS) more than ever before. To develop such a system the financial institutes are moving towards machine learning-based approaches due to their effectiveness. Machine learning-based systems need historical data to learn. As fraud cases take place rarely, the number of positive labeled classes in financial fraud datasets are very small and the datasets remain imbalanced. For this, the possibility for machine learning-based FDS to produce misleading results is high. To counter this problem Machine Learning (ML) researchers use multiple solutions from the perspective of data-level approach, algorithm-level approach, feature engineering, ensemble models, or any combination of them. In this paper, we propose to use Generative Adversarial Network (GAN) based synthetic data generation to handle the data imbalance problem followed by an ensemble classifier for classification. We have used a standard benchmark dataset of credit card fraud data. In our experiments, we have used both traditional oversampling/undersampling and GAN-based techniques from the data-level approach and investigated their effectiveness using ML algorithms and ensemble models. We have found Generative Adversarial Network (GAN) to be more effective and stable in performance compared to traditional oversampling techniques for both ML and ensemble models. Experiments also suggest that the combination of GAN-based sampling and ensemble models provides the best results. We also have found Synthetic Minority Oversampling Technique (SMOTE) to provide more stable results compared to Adaptive Synthetic Sample (ADASYN) from the traditional oversampling technique.
随着网上交易的增长趋势,金融诈骗的威胁也在上升。这使得一个有效的欺诈检测系统(FDS)比以往任何时候都更加必要。为了开发这样一个系统,由于其有效性,金融机构正在转向基于机器学习的方法。基于机器学习的系统需要历史数据来学习。由于欺诈案件很少发生,金融欺诈数据集中正标记类的数量非常少,数据集仍然不平衡。因此,基于机器学习的FDS产生误导性结果的可能性很高。为了解决这个问题,机器学习(ML)研究人员从数据级方法、算法级方法、特征工程、集成模型或它们的任何组合的角度使用多种解决方案。在本文中,我们提出使用基于生成对抗网络(GAN)的合成数据生成来处理数据不平衡问题,然后使用集成分类器进行分类。我们使用了信用卡欺诈数据的标准基准数据集。在我们的实验中,我们使用了传统的过采样/欠采样和基于gan的数据级方法,并使用ML算法和集成模型研究了它们的有效性。我们发现生成对抗网络(GAN)在性能上比传统的ML和集成模型的过采样技术更有效和稳定。实验还表明,基于gan的采样和集成模型相结合可以获得最好的结果。我们还发现,与传统过采样技术的自适应合成样本(ADASYN)相比,合成少数派过采样技术(SMOTE)提供了更稳定的结果。
{"title":"Handling Imbalanced Data for Credit Card Fraud Detection","authors":"Istiak Ahmed Mondal, Md. Enamul Haque, Al-Maruf Hassan, Swakkhar Shatabda","doi":"10.1109/ICCIT54785.2021.9689866","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689866","url":null,"abstract":"With the rising trend in online transactions, the threat of financial fraud is also rising. This makes the necessity for an effective Fraud Detection System (FDS) more than ever before. To develop such a system the financial institutes are moving towards machine learning-based approaches due to their effectiveness. Machine learning-based systems need historical data to learn. As fraud cases take place rarely, the number of positive labeled classes in financial fraud datasets are very small and the datasets remain imbalanced. For this, the possibility for machine learning-based FDS to produce misleading results is high. To counter this problem Machine Learning (ML) researchers use multiple solutions from the perspective of data-level approach, algorithm-level approach, feature engineering, ensemble models, or any combination of them. In this paper, we propose to use Generative Adversarial Network (GAN) based synthetic data generation to handle the data imbalance problem followed by an ensemble classifier for classification. We have used a standard benchmark dataset of credit card fraud data. In our experiments, we have used both traditional oversampling/undersampling and GAN-based techniques from the data-level approach and investigated their effectiveness using ML algorithms and ensemble models. We have found Generative Adversarial Network (GAN) to be more effective and stable in performance compared to traditional oversampling techniques for both ML and ensemble models. Experiments also suggest that the combination of GAN-based sampling and ensemble models provides the best results. We also have found Synthetic Minority Oversampling Technique (SMOTE) to provide more stable results compared to Adaptive Synthetic Sample (ADASYN) from the traditional oversampling technique.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133071370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Broadband Corrugated Modified Vivaldi Antenna for Microwave based Imaging Applications 用于微波成像的宽带波形改进维瓦尔第天线
Pub Date : 2021-12-18 DOI: 10.1109/ICCIT54785.2021.9689778
Md Siam Talukder, M. Samsuzzaman, L. Paul, Md. Abdul Masud, R. Azim, M. Moniruzzaman
This paper explored a Broadband Corrugated Modified Vivaldi Antenna for head imaging applications using microwaves. The antenna is made up of a tapered feeding circular slotted patch and a rectangular modified wing shape ground with an electrical dimension of $0.49lambdatimes 0.41lambdatimes 0.009lambda$ at lower frequency of 1.67 GHz. Front and back radiator are placed on a substrate of FR-4 material having a permittivity of 4.3 and a thickness of 1.5 mm, which are less expensive and more widely accessible. The designed antenna works between 1.67 and 6.37 GHz, allowing the imaging system to function over a large fractional bandwidth of about 116.92 %. With an appropriate impedance matching and a directionally stable radiation characteristics, the antenna has a decent gain of 9 dBi. A 50$Omega$ microstrip line feeds the antenna. The simulation tools CST was used to evolve and optimize the design.
本文研究了一种用于微波头部成像的宽带波形改进维瓦尔第天线。该天线由锥形馈电圆形开槽贴片和矩形修正翼形地面组成,低频为1.67 GHz,电尺寸为$0.49lambdatimes 0.41lambdatimes 0.009lambda$。前后散热器放置在介电常数为4.3,厚度为1.5 mm的FR-4材料的基板上,这种材料更便宜,更容易获得。设计的天线工作在1.67和6.37 GHz之间,允许成像系统在大约116.92的大分数带宽上工作 %. With an appropriate impedance matching and a directionally stable radiation characteristics, the antenna has a decent gain of 9 dBi. A 50$Omega$ microstrip line feeds the antenna. The simulation tools CST was used to evolve and optimize the design.
{"title":"Broadband Corrugated Modified Vivaldi Antenna for Microwave based Imaging Applications","authors":"Md Siam Talukder, M. Samsuzzaman, L. Paul, Md. Abdul Masud, R. Azim, M. Moniruzzaman","doi":"10.1109/ICCIT54785.2021.9689778","DOIUrl":"https://doi.org/10.1109/ICCIT54785.2021.9689778","url":null,"abstract":"This paper explored a Broadband Corrugated Modified Vivaldi Antenna for head imaging applications using microwaves. The antenna is made up of a tapered feeding circular slotted patch and a rectangular modified wing shape ground with an electrical dimension of $0.49lambdatimes 0.41lambdatimes 0.009lambda$ at lower frequency of 1.67 GHz. Front and back radiator are placed on a substrate of FR-4 material having a permittivity of 4.3 and a thickness of 1.5 mm, which are less expensive and more widely accessible. The designed antenna works between 1.67 and 6.37 GHz, allowing the imaging system to function over a large fractional bandwidth of about 116.92 %. With an appropriate impedance matching and a directionally stable radiation characteristics, the antenna has a decent gain of 9 dBi. A 50$Omega$ microstrip line feeds the antenna. The simulation tools CST was used to evolve and optimize the design.","PeriodicalId":166450,"journal":{"name":"2021 24th International Conference on Computer and Information Technology (ICCIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133252016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 24th International Conference on Computer and Information Technology (ICCIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1