首页 > 最新文献

2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)最新文献

英文 中文
Hyper Spectral Image Clustering and Local Feature Selection using Gini Impurity 基于基尼杂质的高光谱图像聚类与局部特征选择
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125605
Prashant Kumar Mali, Hitenkumar Motiyani, Quazi Sameed, Anand Mehta
This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.
本研究提出了一种独特的基于分割的聚类算法,该算法利用k-means进行分割,进一步使用局部特征选择技术获得每个聚类的顶部波段,并在分割的高光谱图像上部署聚类。建议的方法是一个包含几个阶段的框架。K-means最初用于图像分割。从获得的片段中,使用基尼杂质识别出重要的片段。最后,将不重要的聚类与重要的聚类合并得到聚类图。该步骤还采用了新颖的局部特征选择策略。研究中使用了三组高光谱图像来评估所提出方法的效率。为了评估,标准标准化互信息和纯度得分被使用。调查结果表明,所提出的方法优于其他分割方法进行了比较。结果表明,采用带选择和冗余策略可以显著提高精度。
{"title":"Hyper Spectral Image Clustering and Local Feature Selection using Gini Impurity","authors":"Prashant Kumar Mali, Hitenkumar Motiyani, Quazi Sameed, Anand Mehta","doi":"10.1109/ICOEI56765.2023.10125605","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125605","url":null,"abstract":"This study proposes a unique segmentation-based clustering algorithm that utilises k-means for segmentation, further uses a local feature selection technique to obtain the top bands for each cluster and deploys clustering on segmented hyperspectral imagery. The suggested methodology is a framework with several stages. k-means is initially utilized for image segmentation. From the obtained segments, significant segments are identified using Gini impurity. Finally, the cluster map is obtained by merging insignificant clusters with significant clusters. This step also makes use of novel local feature selection strategy. Three sets of hyperspectral images are used in investigations to evaluate the efficiency of the proposed methodology. For assessment, the criteria Normalized Mutual Information and Purity score are utilised. The investigation findings demonstrate that the proposed methodology outperforms the other segmentation methodologies that were compared. According to the results, using band selection and redundancy strategies significantly improves accuracy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis and Implementation of Image Steganography by Using AES Algorithm 基于AES算法的图像隐写分析与实现
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125790
Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury
Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.
被称为高级加密标准(AES)的流行加密技术使互联网上的数据传输安全。它被用于各种目的,例如安全数据传输、移动电话加密和极端敏感数据的加密。它以数据块或数据块的形式进行操作。隐写术是将数据隐藏在另一种数据(如数字图像)中的过程。如果用户希望利用加密方法(如AES)在图像中隐藏加密数据,则必须确保该方法不受所有可能的攻击的影响。该研究分析了利用AES等加密技术将数据隐藏在数码照片中的可能性。AES和数据加密标准(DES)的性能比较,并给出了用于图像隐写的AES的完整Python实现。为了说明每种方法如何执行,提供了实验结果。高级加密标准可以用软件编程,也可以用纯硬件构建。
{"title":"Analysis and Implementation of Image Steganography by Using AES Algorithm","authors":"Riya Kedia, B. Kumar, Pallab Banerjee, Pooja Jha, Tannisha Kundu, Mohan Kumar Dehury","doi":"10.1109/ICOEI56765.2023.10125790","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125790","url":null,"abstract":"Popular cryptographic technology called Advanced Encryption Standard (AES) enables secure data transfer over the internet. It is used for a variety of purposes, such as secure data transfer, mobile phone encryption, and encryption of extremely sensitive data. It operates in terms of blocks, or chunks, of data. Steganography is the process of hiding data in another sort of data, such as a digital image. If a user wants to utilize a cryptographic method to conceal encrypted data in an image, such as AES, it is essential that the method be impervious to all possible attacks. This study has analyzed the possibility to hide data inside digital photos by utilizing encryption techniques like AES. The performance comparison of AES and Data Encryption Standard (DES), a full Python implementation of the AES for image steganography is also presented. To illustrate how each method performs, experimental results are provided. The Advanced Encryption Standard can be programmed in software or built with pure hardware.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131214553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Matrix for Analyzing Cloud Services in Top MNCs 一种分析顶级跨国公司云服务的新矩阵
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125916
Nidhi Bansal, Archana Jain, Manoj kumar Sharma, Manish Kumar
Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.
跨国公司正在利用通过云服务提供商(CS P)提供的服务。通常可以观察到,公司向用户提供定制服务作为额外的好处,而不是使用初始服务。本研究的目的在于建立使用者与服务提供者之间的信任关系。本研究分析了几个参数,以扩大采用先进技术的方法。在本研究中,已经准备了一个矩阵,包括用户使用的水果因素的效用值。多个客户之间的兼容性连接也可以通过从特定公司获得服务来衡量。所提出的矩阵可以识别重要云计算特性的实际使用情况。
{"title":"A Novel Matrix for Analyzing Cloud Services in Top MNCs","authors":"Nidhi Bansal, Archana Jain, Manoj kumar Sharma, Manish Kumar","doi":"10.1109/ICOEI56765.2023.10125916","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125916","url":null,"abstract":"Multinational companies are taking advantage of the services provided through a cloud service provider (CS P). It is generally observed that, the companies provide customized services to the user as an added benefit rather than using the initial services. The motive of the proposed study is to build a trusted relationship between the user and service provider. This study analyzes several parameters to scale up an approach by adopting advanced technologies. In this study, a matrix has been prepared by including the utility value for the fruit factors used by the user. Compatibility connection between multiple customers are also measured by obtaining services from the particular company. The proposed matrix can identify the actual use of the significant cloud computing features.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125283554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks 基于Inception V3卷积神经网络的番茄叶片病害识别
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125758
Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka
Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.
西红柿是种植最广泛的蔬菜,被用于世界各地的各种菜肴中。继土豆和红薯之后,它是世界上第三大广泛种植的作物。然而,由于几种病害,番茄收成的质量和数量都下降了。为了最大限度地提高番茄产量,尽早发现和根除危害作物的许多疾病是很重要的。在本文中,我们研究了深度学习技术在诊断番茄叶片疾病方面的潜力。使用自动方法检测番茄叶片疾病是有帮助的,因为它减少了大规模作物农场所需的监测量,并且在植物叶片上发现的疾病迹象仍然容易治愈的早期阶段就进行了监测。该研究使用了番茄叶病的Kaggle数据集。基于卷积神经网络的疾病识别和分类技术。在这项工作中使用了深度学习模型,比如Inception V3。该系统获得了99.60%的准确率,表明即使在困难的情况下,神经网络方法也是有效的。
{"title":"Disease Identification in Tomato Leaves Using Inception V3 Convolutional Neural Networks","authors":"Srinivas Samala, Nakka Bhavith, Raghav Bang, Durshanapally Kondal Rao, C. Prasad, Srikanth Yalabaka","doi":"10.1109/ICOEI56765.2023.10125758","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125758","url":null,"abstract":"Tomatoes are the most widely grown vegetable, used in a wide variety of dishes around the world. After potatoes and sweet potatoes, it is the third most extensively cultivated crop in the world. However, due to several diseases, both the quality and quantity of tomato harvests dedine. To maximize tomato yields, it is important to identify and eradicate the many diseases that harm the crop as early as possible. In this paper, we investigate the potential of deep learning techniques for diagnosing diseases on tomato leaves. The use of automatic methods for tomato leaf disease detection is helpful because it reduces the amount of monitoring needed in large-scale crop farms and does so at a very early stage when the signs of the disease identified on plant leaves are still easy to cure. The Kaggle dataset for tomato leaf disease was used for the study. A technique based on convolutional neural networks is used for disease identification and classification. Deep learning models, such as Inception V3 are used in this work. This proposed system obtained an accuracy of 99.60% suggesting that the neural network approach is effective even under difficult situations.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126430744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
IoT based Smart Controller for Ceiling Fan 基于物联网的吊扇智能控制器
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125708
S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz
This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.
本工作综述了利用android手机控制吊扇转速的设计。这个产品是提供舒适的睡眠在冬季和雨季午夜。根据温度、湿度等因素自动控制风扇转速。速度控制可以是全自动或半自动。所提出的智能控制器实现在风扇和E.B.市电之间。没有必要扰乱现有的风机安排。本研究的主要目的是单独取代现有的风机调节器。风扇的工作模式可以通过IoT/Bluetooth/Manual控制。采用PIR传感器;只有当有人在房间里时,风扇才会运转。本研究还包括一个夜间可见数字时钟和唤醒警报系统。所提出的控制器分为两个变体;一种是控制单个吊扇的附加功能,使完整的卧室解决方案具有成本效益。另一种是大功率控制器,根据因素控制大量的风扇,节省了大量的能源。
{"title":"IoT based Smart Controller for Ceiling Fan","authors":"S. Ragul, Y. S, V. Vijayabalan, B. Venkatasamy, L. Kalaivani, F. A. Jeffrey Vaz","doi":"10.1109/ICOEI56765.2023.10125708","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125708","url":null,"abstract":"This work reviews the design of controlling the ceiling Fan speed by using android mobile. This product is to provide comfortable sleeping at midnight during the winter and rainy seasons. It automatically controls the speed of the Fan based on the factors such as temperature and humidity. The speed control can be fully automatic or semi-automatic. The proposed smart controller is implemented between Fan and E.B. mains. There is no need to disturb the existing Fan arrangement. The main aim of this study is to replace the existing Fan regulator alone. The mode of operation of the Fan can be controlled by using IoT/Bluetooth/Manual. PIR sensor is incorporated; it makes the Fan run only when the people are present inside the room. This study also includes a night visible digital clock and wakeup alarm system. The proposed controller is made as two variants; one is to control a single ceiling fan with additional features that make a complete bedroom solution cost-effective. Another is a high-power controller that controls a large number of Fans based on the factors, which conserves a lot of energy.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122763630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Network Intrusion Detection System for Distributed Networks using Machine Learning Technique 基于机器学习技术的分布式网络入侵检测系统
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10126055
Parveen Akhther. A, A. Maryposonia, P. S.
The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.
确保分布在多个节点上的网络的安全性是一项重要而具有挑战性的任务。由于DDoS攻击的主要目标是阻止授权节点访问服务,因此这种类型的攻击对分布式网络构成了重大威胁。为了有效地处理分布式环境中的DOS攻击,必须创建一个模块化的、可靠的NIDS,从而使分布式网络中的所有节点都可用,这一点非常重要。分布式网络中节点大数据的采集、存储和分析在检测阶段对模块化技术的要求很高,这给分布式DOS攻击的发现带来了很大的障碍。本研究提出一种基于大数据的分布式拒绝服务网络入侵检测系统来解决这些问题。所提出的入侵检测系统的重要特征包括一个用于检测网络流量的模块和另一个用于收集该流量数据的模块。在本研究中,网络采集模块采用微批数据处理进行流量特征采集,流量检测模块采用基于随机森林(Random Forest, RF)算法的分类技术进行特征选择。对于存储大量的恶意攻击,使用HDFS (Hadoop File System);对于加快数据处理速度,建议使用S park。使用NSL-KDD基准数据集对该方法进行评估,以找到准确性和许多其他参数。准确度、召回率、F1-Measure和精密度的实验结果与机器学习技术、DT(决策树)、PCA RF(主成分分析随机森林)、NB(朴素贝叶斯)、SVM(支持向量机)和LR(逻辑回归)的实验结果进行了比较。实验结果表明,所提出的检测算法的准确率分别达到99.89%。
{"title":"An Efficient Network Intrusion Detection System for Distributed Networks using Machine Learning Technique","authors":"Parveen Akhther. A, A. Maryposonia, P. S.","doi":"10.1109/ICOEI56765.2023.10126055","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10126055","url":null,"abstract":"The task to ensure security in a network that is distributed over several nodes is a significant and challenging one. Since the primary objective of a DDoS attack is to prevent authorized nodes from gaining access to the service, this type of attack presents a significant threat to distributed networks. It is highly important that a modular and dependable NIDS must be created for handling DOS attacks in the distributed environment effectively, and in turn, all the nodes are available in the distributed network.The high need for modular techniques required in the detection phase for collecting, storing and analyzing the big data from the nodes in the distributed network poses significant hurdles in finding out the Distributed DOS attack.This research proposes a Big Data-based Distributed Denial of Service Network Intrusion Detection System to address these issues. Important features of the proposed intrusion detection system include a module for detecting network traffic and another for collecting data on that traffic. In this study, micro-batch data processing is employed for traffic feature gathering in the Network collection module and Random Forest (RF) algorithm-based classification technique is used in the traffic detection module for feature selection. For Storing a large number of wary attacks, Hadoop File System (HDFS) is used, and for accelerating the speed of data processing, S park is used as a suggested solution.The method was assessed using the NSL-KDD benchmark dataset to find the accuracy and many other parameters. Experimental results for Accuracy, Recall, F1-Measure and Precision, from the proposed work are compared to those from the machine learning techniques, DT(Decision Tree), PCA RF(Principal Component Analysis Random Forest), NB(Naive Bayes), SVM(Support Vector Machine), and LR (Logistic Regression). According to the experimental findings, the suggested detection algorithm achieved an Accuracy of 99.89%, respectively.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic Subjective Answer Grading Software Using Machine Learning 使用机器学习的自动主观答案评分软件
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125786
Rishabh Kothari, B. Rangwala, Kush Patel
One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.
在线考试的主要挑战之一是对答案的评估,特别是主观类型的评估。主观回答测试学生记忆信息和用自然语言表达信息的能力。客观问题有一个固定的正确答案,而主观问题可以有多个正确答案。这些答案可以用完全不同的语言和语法表达同样的信息。这使得评分主观问题的过程很难自动化,并且需要大量的人工工作时间。本研究旨在使用机器学习(ML)和自然语言处理(NLP)实现主观问题评分的自动化过程。该研究将主观答案与提出问题的权威机构提供的理想答案进行了比较。根据两个答案之间的相似性,生成一个分数,可以将其映射到适当的等级。作者提供了一个使用Django框架的web应用程序,供人们进行在线考试,并在接近实时的情况下自动评分。没有机器学习模型可以100%准确,所以管理员有一个功能来编辑成绩。
{"title":"Automatic Subjective Answer Grading Software Using Machine Learning","authors":"Rishabh Kothari, B. Rangwala, Kush Patel","doi":"10.1109/ICOEI56765.2023.10125786","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125786","url":null,"abstract":"One of the major challenges during online examinations is the assessment of answers, particularly of the subjective type. Subjective answers test a student's ability to retain information and express it in natural language. While objective questions have a correct fixed answer, subjective questions can have multiple correct answers. These answers can convey the same information while using a completely different language and grammatical syntax. This makes it difficult to automate the process of grading subjective questions and requires a lot of manual work hours. This study intends to automate the process of grading subjective questions using Machine Learning (ML) and Natural Language Processing (NLP). The study has compared the subjective answer with an ideal answer that is provided by the authority that creates the question. Based on the similarity between the two answers, a score is generated which can be mapped to an appropriate grade. The authors have provided a web application made using the Django framework for people to give online examinations and be automatically graded in near real-time. No machine learning model can be 100% accurate, so there is a functionality for admins to edit the grades.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125798625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective Security Testing of Mobile Applications for Building Trust in the Digital World 在数字世界中建立信任的有效移动应用安全测试
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125814
Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia
In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.
近年来,移动应用程序变得越来越重要。这些应用程序与桌面和web应用程序有很大的不同,并且越来越多地用于各种企业领域。因此,这促使移动行业增加移动应用的可访问性,并在多个平台(包括Android和iPhone)上进行开发。本研究讨论了印度首个本土应用商店“mSeva AppStore”的安全测试程序和特点。为了确保托管移动应用程序的质量,需要不同的技术和有效的测试方法。在mSeva AppStore上托管应用程序之前,我们在所有方面进行了回归测试,如不安全的权限、数据存储、安全逻辑、适当的平台算法等。然而,在目前的手机应用测试场景中,其他AppStore在托管应用之前并没有考虑到所有的因素,这是非常必要的。本研究重点介绍了移动应用程序测试和质量参数的关键术语。此外,还演示了在对各种应用程序进行安全测试期间获得的实际结果。与此同时,提供了关于移动应用程序测试中常见工件的第一个基于通用弱点枚举(CWE)的分类。关于移动应用程序和安全托管环境下的测试要求的特性讨论将有助于该领域的相关研究人员和利益相关者。
{"title":"Effective Security Testing of Mobile Applications for Building Trust in the Digital World","authors":"Kapil Kant Kamal, Padmaja Joshi, A. Bang, Kavita Bhatia","doi":"10.1109/ICOEI56765.2023.10125814","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125814","url":null,"abstract":"In recent years, mobile applications have become increasingly important. These applications differ significantly from desktop and web applications, and being used increasingly in various enterprise domains. Accordingly, this motivates the mobile industries to increase the accessibility of mobile applications and their development across many platforms, including Android and iPhone. This research work discusses the security testing procedure and features of India's first indigenous AppStore “mSeva AppStore”. To ensure the quality of the hosted mobile applications, distinct techniques, and effective testing approaches are required. Before hosting the application on mSeva AppStore regressive testing is performed in all aspects like insecure permissions, data storage, secure logic, proper platform algorithms, etc. However, in the current mobile application testing scenario, other AppStore does not consider all factors before hosting the applications, which is quite necessary. This study highlights the key terminologies of mobile application testing and quality parameters. Further, demonstrates the actual results that are obtained during the security testing of various applications. Along with this, the first-ever Common Weakness Enumeration (CWE) based classification regarding common artifacts in mobile application testing is provided. The peculiarities discussed with respect to mobile applications and the testing requirements in the context of secure hosting will help the relevant researcher and stakeholders in this field.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121624775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Need of Cyber Security, Tools, Uses and Future Research 网络安全的需求、工具、用途和未来研究
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125792
P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh
Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.
网络安全用于保护计算机系统、网络和其他数字设备免受损害。黑客总是试图使用先进的工具来混淆他们的检测,并发起新的网络攻击。因此,需要一些先进的网络安全工具来检查系统的安全性。在本文中,提供了一些潜在的网络安全工具及其用途的细节。提供了有关它们的功能、许可和在线链接的信息。此外,还解释了网络安全的必要性。最后,提出了与网络安全相关的一些潜在研究方向。
{"title":"Need of Cyber Security, Tools, Uses and Future Research","authors":"P. Pandey, M. Wazid, A. Mishra, N. Mohd., D. P. Singh","doi":"10.1109/ICOEI56765.2023.10125792","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125792","url":null,"abstract":"Cyber security is used to safeguard computer systems, networks and other digital devices from the damage. Hackers always try to use advance tool to obfuscate their detection and launch a new cyber attack. Therefore, some advance cyber security tools to check the security of the systems are required. In this paper, the details of some of potential cyber security tools and their uses are provided. The information about their functionalities, licensing and online links are given. Moreover, the need of cyber security is explained. Finally, some of the potential research directions related to cyber security are provided.","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121819549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Comparative Study and Analysis of DWT-SPIHT with DWT-EZW Method for Image Compression DWT-SPIHT与DWT-EZW图像压缩方法的比较研究与分析
Pub Date : 2023-04-11 DOI: 10.1109/ICOEI56765.2023.10125692
Dikendra K. Verma, Garima Singh, Saurabh Pargaien, Purushottam Das, Sashank Chaube, Upendra Bhatt
The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).
随着数码技术的发展,数码照片的使用也越来越多。由于数码照片所包含的信息量巨大,因此需要很大的存储空间,需要更大的传输带宽和更长的传输时间。因此,在压缩图像时,被测试图像中存在的所有冗余信息位都被删除,而只保留稍后重建图像所需的基本信息。在本研究中,引入了DWT-SPIHT技术,该技术可用于跨小波族进行不同程度的小波分解压缩和重建图像,这些小波族最初是MATLAB小波族的细分。在此过程中对Cameraman图像进行了不同分辨率、不同分解层次和不同阈值化技术的仿真,证明了该算法的有效性,并为我们提供了良好的图像重建质量。仿真结果表明,与DWT-EZW算法相比,所提出的DWT-SPIHT算法在高压缩比(CR)和低像素比特值(BPP)下,在峰值信噪比(PSNR)、均方误差(MSE)和视觉感知等评价参数方面表现明显更好。
{"title":"Comparative Study and Analysis of DWT-SPIHT with DWT-EZW Method for Image Compression","authors":"Dikendra K. Verma, Garima Singh, Saurabh Pargaien, Purushottam Das, Sashank Chaube, Upendra Bhatt","doi":"10.1109/ICOEI56765.2023.10125692","DOIUrl":"https://doi.org/10.1109/ICOEI56765.2023.10125692","url":null,"abstract":"The use of digital photographs has increased along with the development of digital technologies. Due to the vast amounts of information it contains, digital photographs need a lot of storage space, as well as bigger transmission bandwidths and longer transmission times. Therefore, on compressing the images all the redundant bits of information present in the image under test are removed while keeping only the essential information needed to reconstruct the image later on. In this study, DWT-SPIHT technique is introduced, which may be used to compress and reconstruct images at various degrees of wavelet decomposition across wavelet families that were initially a subdivision of the MATLAB wavelet family. Simulations have been conducted on Cameraman Image during this work of different resolution at different levels of decomposition and for different types of thresholding techniques to prove that this algorithm works well and provide us with the good reconstruction quality of the image. The simulation results demonstrate that, when compared to the DWT-EZW algorithm, the proposed DWT-SPIHT algorithm performs significantly better in terms of evaluation parameters like peak signal to noise ratio (PSNR), mean square error (MSE), and visual perception at higher compression ratios (CR) and low bit per pixel values (BPP).","PeriodicalId":168942,"journal":{"name":"2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122932001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 7th International Conference on Trends in Electronics and Informatics (ICOEI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1