首页 > 最新文献

2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

英文 中文
Learning Analytics for Cloud-based Education Planning 基于云的教育规划学习分析
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125698
Nakayiza Hellen, Ggaliwango Marvin
The ongoing digital revolution is having a significant impact on homes and communities worldwide, affecting access to information, communication, learning, and sports. One of the most significant changes brought about by this revolution is the shift from traditional classroom-based education to virtual and hybrid online learning environments. Higher education institutions, in particular, are recognizing the value of online educational programs, which allow them to expand their digital pre se n ce, increase access to their programs, and reach students beyond their physical borders. The advancements in educational technology made possible by the 4th Industrial Revolution are also allowing for more flexible, engaging, and accessible learning experiences for both students and teachers. However, there remains a significant gap in terms of education planning, access to digital learning tools, and engagement among stakeholders. This research uses data analytics to examine cl oud-based digital learning tools, education stakeholder engagement, and education access. The findings provide insight for academic stakeholders, particularly governments, private sector, and educational investors, on ways to bridge the gaps between access and engagement for students and teachers.
正在进行的数字革命正在对世界各地的家庭和社区产生重大影响,影响到信息、通信、学习和体育的获取。这场革命带来的最重要的变化之一是从传统的基于课堂的教育向虚拟和混合在线学习环境的转变。特别是高等教育机构,正在认识到在线教育项目的价值,这使他们能够扩大自己的数字影响力,增加对课程的访问,并接触到物理边界以外的学生。第四次工业革命使教育技术的进步成为可能,也为学生和教师提供了更灵活、更有吸引力和更容易获得的学习体验。然而,在教育规划、获取数字学习工具以及利益相关者的参与方面,仍存在重大差距。本研究使用数据分析来检验基于云的数字学习工具、教育利益相关者参与和教育访问。研究结果为学术界利益相关者,特别是政府、私营部门和教育投资者提供了关于如何弥合学生和教师获取和参与之间差距的见解。
{"title":"Learning Analytics for Cloud-based Education Planning","authors":"Nakayiza Hellen, Ggaliwango Marvin","doi":"10.1109/ICOEI56765.2023.10125698","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125698","url":null,"abstract":"The ongoing digital revolution is having a significant impact on homes and communities worldwide, affecting access to information, communication, learning, and sports. One of the most significant changes brought about by this revolution is the shift from traditional classroom-based education to virtual and hybrid online learning environments. Higher education institutions, in particular, are recognizing the value of online educational programs, which allow them to expand their digital pre se n ce, increase access to their programs, and reach students beyond their physical borders. The advancements in educational technology made possible by the 4th Industrial Revolution are also allowing for more flexible, engaging, and accessible learning experiences for both students and teachers. However, there remains a significant gap in terms of education planning, access to digital learning tools, and engagement among stakeholders. This research uses data analytics to examine cl oud-based digital learning tools, education stakeholder engagement, and education access. The findings provide insight for academic stakeholders, particularly governments, private sector, and educational investors, on ways to bridge the gaps between access and engagement for students and teachers.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114762025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Chaos Sine Cosine Algorithm with Graph Convolution Network for Sarcasm Detection in Social Media 基于图卷积网络的混沌正弦余弦算法用于社交媒体讽刺语检测
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10126052
A. Palaniammal, P. Anandababu
Sarcasm is a procedure of verbal irony that is planned to convey ridicule, contempt or mockery with the aid of words that expresses the opposite of what is meant or through facial expression, tone of voice, or inflection. In another word, it is a way of saying something but meaning the opposite, often intending to be critical or humorous. Sarcasm is widely applied in social media, humour, and casual conversation. Sarcasm detection using deep learning (DL) includes training a machine learning (ML) algorithm for identifying instances of sarcasm and recognizing the pattern in language. The study presents a new Chaos Sine Cosine Algorithm with Graph Convolution Network for Sarcasm Detection (CSCA-GCNSD) technique in Social Media. The presented CSCA-GCNSD technique aims to recognize and categorize various kinds of sarcasm. Primarily, the CSCA-GCNSD technique involves different stages of data pre-processing. Next, the CSCA-GCNSD technique applies the GCN model for the detection and classification of various kinds of sarcasm. Finally, the CSCA technique is used to optimally choose the hyperparameter values of the GCN model and thereby resulting in improved detection outcomes. The simulation outcomes of the CSCA-GCNSD methodology was tested on different sarcasm datasets and the outcomes reported the betterment of the CSCA-GCNSD algorithms over other models.
讽刺是一种言语上的讽刺,通过表达与本意相反的语言,或通过面部表情、语调或语调变化来表达嘲笑、蔑视或嘲弄。换句话说,这是一种表达相反意思的方式,通常是为了批评或幽默。讽刺被广泛应用于社交媒体、幽默和休闲对话中。使用深度学习(DL)的讽刺检测包括训练机器学习(ML)算法来识别讽刺实例和识别语言中的模式。研究提出了一种新的基于图卷积网络的混沌正弦余弦算法(CSCA-GCNSD)用于社交媒体讽刺检测技术。本文提出的CSCA-GCNSD技术旨在识别和分类各种类型的讽刺语。首先,CSCA-GCNSD技术涉及数据预处理的不同阶段。接下来,CSCA-GCNSD技术应用GCN模型对各种讽刺语进行检测和分类。最后,利用CSCA技术对GCN模型的超参数值进行优化选择,从而提高检测结果。在不同的讽刺数据集上测试了CSCA-GCNSD方法的模拟结果,结果表明CSCA-GCNSD算法优于其他模型。
{"title":"Chaos Sine Cosine Algorithm with Graph Convolution Network for Sarcasm Detection in Social Media","authors":"A. Palaniammal, P. Anandababu","doi":"10.1109/ICOEI56765.2023.10126052","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126052","url":null,"abstract":"Sarcasm is a procedure of verbal irony that is planned to convey ridicule, contempt or mockery with the aid of words that expresses the opposite of what is meant or through facial expression, tone of voice, or inflection. In another word, it is a way of saying something but meaning the opposite, often intending to be critical or humorous. Sarcasm is widely applied in social media, humour, and casual conversation. Sarcasm detection using deep learning (DL) includes training a machine learning (ML) algorithm for identifying instances of sarcasm and recognizing the pattern in language. The study presents a new Chaos Sine Cosine Algorithm with Graph Convolution Network for Sarcasm Detection (CSCA-GCNSD) technique in Social Media. The presented CSCA-GCNSD technique aims to recognize and categorize various kinds of sarcasm. Primarily, the CSCA-GCNSD technique involves different stages of data pre-processing. Next, the CSCA-GCNSD technique applies the GCN model for the detection and classification of various kinds of sarcasm. Finally, the CSCA technique is used to optimally choose the hyperparameter values of the GCN model and thereby resulting in improved detection outcomes. The simulation outcomes of the CSCA-GCNSD methodology was tested on different sarcasm datasets and the outcomes reported the betterment of the CSCA-GCNSD algorithms over other models.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"681 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116108508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Network Intrusion Detection System for Distributed Networks using Machine Learning Technique 基于机器学习技术的分布式网络入侵检测系统
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10126055
Parveen Akhther. A, A. Maryposonia, P. S.
The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.
确保分布在多个节点上的网络的安全性是一项重要而具有挑战性的任务。由于DDoS攻击的主要目标是阻止授权节点访问服务,因此这种类型的攻击对分布式网络构成了重大威胁。为了有效地处理分布式环境中的DOS攻击,必须创建一个模块化的、可靠的NIDS,从而使分布式网络中的所有节点都可用,这一点非常重要。分布式网络中节点大数据的采集、存储和分析在检测阶段对模块化技术的要求很高,这给分布式DOS攻击的发现带来了很大的障碍。本研究提出一种基于大数据的分布式拒绝服务网络入侵检测系统来解决这些问题。所提出的入侵检测系统的重要特征包括一个用于检测网络流量的模块和另一个用于收集该流量数据的模块。在本研究中,网络采集模块采用微批数据处理进行流量特征采集,流量检测模块采用基于随机森林(Random Forest, RF)算法的分类技术进行特征选择。对于存储大量的恶意攻击,使用HDFS (Hadoop File System);对于加快数据处理速度,建议使用S park。使用NSL-KDD基准数据集对该方法进行评估,以找到准确性和许多其他参数。准确度、召回率、F1-Measure和精密度的实验结果与机器学习技术、DT(决策树)、PCA RF(主成分分析随机森林)、NB(朴素贝叶斯)、SVM(支持向量机)和LR(逻辑回归)的实验结果进行了比较。实验结果表明,所提出的检测算法的准确率分别达到99.89%。
{"title":"An Efficient Network Intrusion Detection System for Distributed Networks using Machine Learning Technique","authors":"Parveen Akhther. A, A. Maryposonia, P. S.","doi":"10.1109/ICOEI56765.2023.10126055","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126055","url":null,"abstract":"The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smartphone based Human Activity Recognition using CNNs and Autoencoder Features 基于智能手机的人类活动识别,使用cnn和自编码器特征
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10126051
Sowmen Mitra, P. Kanungoe
Recognition of human activities is essential for many applications, and the widespread availability of low-cost sensors on smartphones and wearables has enabled the development of mobile apps capable of tracking user activities “in the wild.” However, dealing with heterogeneous data from different devices and real-time scenarios presents significant challenges. In this study, a novel learning framework is proposed for Human Activity Recognition (HAR) that combines a Convolutional Neural Network (CNN) with an autoencoder for feature extraction. The study also investigates the importance of preprocessing techniques, including orientation-independent transformation, to mitigate heterogeneity when dealing with multiple types of smartphones. The results show that the proposed approach outperforms state-of-the-art methods in HAR, with an accuracy of 95.74% on the heterogeneous dataset used in this study. Furthermore, the study demonstrates that proposed framework can be effectively deployed on smartphones with limited computational resources, making it suitable for real-world applications.
对人类活动的识别对于许多应用程序来说是必不可少的,智能手机和可穿戴设备上广泛使用的低成本传感器使得能够跟踪用户活动的移动应用程序的开发成为可能。然而,处理来自不同设备和实时场景的异构数据提出了重大挑战。在这项研究中,提出了一种新的学习框架,用于人类活动识别(HAR),该框架将卷积神经网络(CNN)与用于特征提取的自编码器相结合。该研究还探讨了预处理技术的重要性,包括与方向无关的转换,以减轻处理多种类型智能手机时的异质性。结果表明,本文提出的方法优于HAR中最先进的方法,在本研究中使用的异构数据集上,准确率达到95.74%。此外,该研究表明,所提出的框架可以有效地部署在计算资源有限的智能手机上,使其适用于现实世界的应用。
{"title":"Smartphone based Human Activity Recognition using CNNs and Autoencoder Features","authors":"Sowmen Mitra, P. Kanungoe","doi":"10.1109/ICOEI56765.2023.10126051","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126051","url":null,"abstract":"Recognition of human activities is essential for many applications, and the widespread availability of low-cost sensors on smartphones and wearables has enabled the development of mobile apps capable of tracking user activities “in the wild.” However, dealing with heterogeneous data from different devices and real-time scenarios presents significant challenges. In this study, a novel learning framework is proposed for Human Activity Recognition (HAR) that combines a Convolutional Neural Network (CNN) with an autoencoder for feature extraction. The study also investigates the importance of preprocessing techniques, including orientation-independent transformation, to mitigate heterogeneity when dealing with multiple types of smartphones. The results show that the proposed approach outperforms state-of-the-art methods in HAR, with an accuracy of 95.74% on the heterogeneous dataset used in this study. Furthermore, the study demonstrates that proposed framework can be effectively deployed on smartphones with limited computational resources, making it suitable for real-world applications.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123684391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and Classification of Brain Tumors using Convolutional Neural Network 基于卷积神经网络的脑肿瘤检测与分类
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125652
Phanitha Sai Lakshmi Veeranki, Gaja Lakshmi Banavath, P. R. Devi
According to statistics from WHO, brain tumors will account for roughly 9.5 million deaths globally in the next few decades. Early identification and treatment are the best ways to stop deaths from brain cancer. Brain tumors fall into two categories: benign, which is not cancerous, and malignant, which is cancerous. A brain tumor that originates in a specific location and then metastasizes to other regions of the body, including other areas of the brain, is referred to as a primary tumor. Secondary tumors, commonly referred to as metastatic tumors, arise from primary tumors. It is now possible to more easily analyze medical pictures thanks to the quick development of image processing and soft computing technologies that aid in early detection and therapy. The use of computer-aided diagnostic (CAD) technology for diagnosing illnesses, predicting prognoses, and determining the likelihood of recurrence is expanding as a result of technological improvements. The main area of investigation in this study is the utilization of feature extraction and tumor cell classification for the automatic identification and categorization of brain tumors in magnetic resonance imaging (MRI) scans. Brain tumor detection and classification are done using CNN, and VGG-16 models. Accuracy is obtained by doing a comparative study of these two models. VGG-16 is the best-trained model.
根据世界卫生组织的统计数据,在未来几十年里,脑肿瘤将导致全球约950万人死亡。早期发现和治疗是阻止脑癌死亡的最好方法。脑肿瘤分为两类:良性的,不是癌变的;恶性的,是癌变的。脑肿瘤起源于一个特定的位置,然后转移到身体的其他区域,包括大脑的其他区域,被称为原发性肿瘤。继发性肿瘤,通常被称为转移性肿瘤,起源于原发性肿瘤。由于图像处理和软计算技术的快速发展,有助于早期发现和治疗,现在可以更容易地分析医学图像。由于技术的进步,计算机辅助诊断(CAD)技术在诊断疾病、预测预后和确定复发可能性方面的应用正在扩大。本研究的主要研究领域是利用特征提取和肿瘤细胞分类在磁共振成像(MRI)扫描中对脑肿瘤进行自动识别和分类。采用CNN、VGG-16模型对脑肿瘤进行检测和分类。通过对这两种模型的比较研究,获得了精度。VGG-16是训练最好的模型。
{"title":"Detection and Classification of Brain Tumors using Convolutional Neural Network","authors":"Phanitha Sai Lakshmi Veeranki, Gaja Lakshmi Banavath, P. R. Devi","doi":"10.1109/ICOEI56765.2023.10125652","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125652","url":null,"abstract":"According to statistics from WHO, brain tumors will account for roughly 9.5 million deaths globally in the next few decades. Early identification and treatment are the best ways to stop deaths from brain cancer. Brain tumors fall into two categories: benign, which is not cancerous, and malignant, which is cancerous. A brain tumor that originates in a specific location and then metastasizes to other regions of the body, including other areas of the brain, is referred to as a primary tumor. Secondary tumors, commonly referred to as metastatic tumors, arise from primary tumors. It is now possible to more easily analyze medical pictures thanks to the quick development of image processing and soft computing technologies that aid in early detection and therapy. The use of computer-aided diagnostic (CAD) technology for diagnosing illnesses, predicting prognoses, and determining the likelihood of recurrence is expanding as a result of technological improvements. The main area of investigation in this study is the utilization of feature extraction and tumor cell classification for the automatic identification and categorization of brain tumors in magnetic resonance imaging (MRI) scans. Brain tumor detection and classification are done using CNN, and VGG-16 models. Accuracy is obtained by doing a comparative study of these two models. VGG-16 is the best-trained model.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121711147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT based Smart Controller for Ceiling Fan 基于物联网的吊扇智能控制器
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125708
S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz
This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.
本工作综述了利用android手机控制吊扇转速的设计。这个产品是提供舒适的睡眠在冬季和雨季午夜。根据温度、湿度等因素自动控制风扇转速。速度控制可以是全自动或半自动。所提出的智能控制器实现在风扇和E.B.市电之间。没有必要扰乱现有的风机安排。本研究的主要目的是单独取代现有的风机调节器。风扇的工作模式可以通过IoT/Bluetooth/Manual控制。采用PIR传感器;只有当有人在房间里时,风扇才会运转。本研究还包括一个夜间可见数字时钟和唤醒警报系统。所提出的控制器分为两个变体;一种是控制单个吊扇的附加功能,使完整的卧室解决方案具有成本效益。另一种是大功率控制器,根据因素控制大量的风扇,节省了大量的能源。
{"title":"IoT based Smart Controller for Ceiling Fan","authors":"S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz","doi":"10.1109/ICOEI56765.2023.10125708","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125708","url":null,"abstract":"This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Study and Analysis of DWT-SPIHT with DWT-EZW Method for Image Compression DWT-SPIHT与DWT-EZW图像压缩方法的比较研究与分析
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125692
Dikendra K. Verma, Garima Singh, Saurabh Pargaien, Purushottam Das, Sashank Chaube, Upendra Bhatt
The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).
随着数码技术的发展,数码照片的使用也越来越多。由于数码照片所包含的信息量巨大,因此需要很大的存储空间,需要更大的传输带宽和更长的传输时间。因此,在压缩图像时,被测试图像中存在的所有冗余信息位都被删除,而只保留稍后重建图像所需的基本信息。在本研究中,引入了DWT-SPIHT技术,该技术可用于跨小波族进行不同程度的小波分解压缩和重建图像,这些小波族最初是MATLAB小波族的细分。在此过程中对Cameraman图像进行了不同分辨率、不同分解层次和不同阈值化技术的仿真,证明了该算法的有效性,并为我们提供了良好的图像重建质量。仿真结果表明,与DWT-EZW算法相比,所提出的DWT-SPIHT算法在高压缩比(CR)和低像素比特值(BPP)下,在峰值信噪比(PSNR)、均方误差(MSE)和视觉感知等评价参数方面表现明显更好。
{"title":"Comparative Study and Analysis of DWT-SPIHT with DWT-EZW Method for Image Compression","authors":"Dikendra K. Verma, Garima Singh, Saurabh Pargaien, Purushottam Das, Sashank Chaube, Upendra Bhatt","doi":"10.1109/ICOEI56765.2023.10125692","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125692","url":null,"abstract":"The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Matrix for Analyzing Cloud Services in Top MNCs 一种分析顶级跨国公司云服务的新矩阵
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125916
Nidhi Bansal, Archana Jain, Manoj kumar Sharma, Manish Kumar
Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.
跨国公司正在利用通过云服务提供商(CS P)提供的服务。通常可以观察到,公司向用户提供定制服务作为额外的好处,而不是使用初始服务。本研究的目的在于建立使用者与服务提供者之间的信任关系。本研究分析了几个参数,以扩大采用先进技术的方法。在本研究中,已经准备了一个矩阵,包括用户使用的水果因素的效用值。多个客户之间的兼容性连接也可以通过从特定公司获得服务来衡量。所提出的矩阵可以识别重要云计算特性的实际使用情况。
{"title":"A Novel Matrix for Analyzing Cloud Services in Top MNCs","authors":"Nidhi Bansal, Archana Jain, Manoj kumar Sharma, Manish Kumar","doi":"10.1109/ICOEI56765.2023.10125916","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125916","url":null,"abstract":"Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Subjective Answer Grading Software Using Machine Learning 使用机器学习的自动主观答案评分软件
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125786
Rishabh Kothari, B. Rangwala, Kush Patel
One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.
在线考试的主要挑战之一是对答案的评估,特别是主观类型的评估。主观回答测试学生记忆信息和用自然语言表达信息的能力。客观问题有一个固定的正确答案,而主观问题可以有多个正确答案。这些答案可以用完全不同的语言和语法表达同样的信息。这使得评分主观问题的过程很难自动化,并且需要大量的人工工作时间。本研究旨在使用机器学习(ML)和自然语言处理(NLP)实现主观问题评分的自动化过程。该研究将主观答案与提出问题的权威机构提供的理想答案进行了比较。根据两个答案之间的相似性,生成一个分数,可以将其映射到适当的等级。作者提供了一个使用Django框架的web应用程序,供人们进行在线考试,并在接近实时的情况下自动评分。没有机器学习模型可以100%准确,所以管理员有一个功能来编辑成绩。
{"title":"Automatic Subjective Answer Grading Software Using Machine Learning","authors":"Rishabh Kothari, B. Rangwala, Kush Patel","doi":"10.1109/ICOEI56765.2023.10125786","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125786","url":null,"abstract":"One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyper Spectral Image Clustering and Local Feature Selection using Gini Impurity 基于基尼杂质的高光谱图像聚类与局部特征选择
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125605
Prashant Kumar Mali, Hitenkumar Motiyani, Quazi Sameed, Anand Mehta
This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.
本研究提出了一种独特的基于分割的聚类算法,该算法利用k-means进行分割,进一步使用局部特征选择技术获得每个聚类的顶部波段,并在分割的高光谱图像上部署聚类。建议的方法是一个包含几个阶段的框架。K-means最初用于图像分割。从获得的片段中,使用基尼杂质识别出重要的片段。最后,将不重要的聚类与重要的聚类合并得到聚类图。该步骤还采用了新颖的局部特征选择策略。研究中使用了三组高光谱图像来评估所提出方法的效率。为了评估,标准标准化互信息和纯度得分被使用。调查结果表明,所提出的方法优于其他分割方法进行了比较。结果表明,采用带选择和冗余策略可以显著提高精度。
{"title":"Hyper Spectral Image Clustering and Local Feature Selection using Gini Impurity","authors":"Prashant Kumar Mali, Hitenkumar Motiyani, Quazi Sameed, Anand Mehta","doi":"10.1109/ICOEI56765.2023.10125605","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125605","url":null,"abstract":"This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1