首页 > 最新文献

2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)最新文献

英文 中文
Feature Drift Detection using Overlapping Window and Mann-Whitney U Test 基于重叠窗和Mann-Whitney U检验的特征漂移检测
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068710
Jafseer K T, S. S, S. A.
As data is ubiquitous in several real-world problems, data stream mining is a rapidly growing research area. It is expected that data stream sources will undergo changes in data distribution due to their ephemeral nature, which is called concept drift. There has been a very scant study of one particular type of drift, namely feature drift, so this paper aims to explore that type of drift. As a result of feature drift, learners must detect and adapt to changes in the relevant subset of features and the changing nature of the learning task itself. An approach to detecting feature drift was developed in this work. We used overlapping landmark windowing to keep the previous data's properties windows while analyzing the most recent data. Using the Mann-Whitney U test, we compare and store the distribution of each feature in two consecutive windows. Whenever the statistical properties of the window exclude a particular boundary from the distribution, drift is detected. We validated the effectiveness of our proposal by conducting experiments on real data.
由于数据在许多现实问题中无处不在,数据流挖掘是一个快速发展的研究领域。数据流源由于其短暂性,预计会发生数据分布的变化,这种变化被称为概念漂移。有一种特殊类型的漂移,即特征漂移的研究非常少,所以本文旨在探讨这种类型的漂移。由于特征漂移,学习者必须检测并适应相关特征子集的变化以及学习任务本身性质的变化。本文提出了一种检测特征漂移的方法。在分析最新数据时,我们使用重叠的地标窗口来保留以前数据的属性窗口。使用Mann-Whitney U检验,我们比较并存储每个特征在两个连续窗口中的分布。每当窗口的统计属性从分布中排除特定边界时,就会检测到漂移。我们通过对真实数据的实验来验证我们建议的有效性。
{"title":"Feature Drift Detection using Overlapping Window and Mann-Whitney U Test","authors":"Jafseer K T, S. S, S. A.","doi":"10.1109/ICITIIT57246.2023.10068710","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068710","url":null,"abstract":"As data is ubiquitous in several real-world problems, data stream mining is a rapidly growing research area. It is expected that data stream sources will undergo changes in data distribution due to their ephemeral nature, which is called concept drift. There has been a very scant study of one particular type of drift, namely feature drift, so this paper aims to explore that type of drift. As a result of feature drift, learners must detect and adapt to changes in the relevant subset of features and the changing nature of the learning task itself. An approach to detecting feature drift was developed in this work. We used overlapping landmark windowing to keep the previous data's properties windows while analyzing the most recent data. Using the Mann-Whitney U test, we compare and store the distribution of each feature in two consecutive windows. Whenever the statistical properties of the window exclude a particular boundary from the distribution, drift is detected. We validated the effectiveness of our proposal by conducting experiments on real data.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115425774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Agricultural Food supply chain Traceability using Blockchain 使用区块链的农业食品供应链可追溯性
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068564
S. Rajput, Anvita Jadhav, Janhavi Gadge, Diya Tilani, Vaibhav Dalgade
For the past few years, as the demand for food has increased due to population, Food security has emerged as a major issue, because many intermediaries alter products to gain profits which in turn degrades the quality of the product and affects the health of the population. The current agricultural food supply chains have a number of significant issues, including plenty of participants, poor communication driven by lengthy supply chains, distrust between members, and centralized systems. Developing a traceability system for the agricultural food supply chain becomes more and more important as traditional agri-food logistics patterns can no longer meet market needs. We can build a system that keeps track of the product quality and other factors throughout the supply chain by using Blockchain technology along with various other technologies like sensors which are used to gather data from the growing stages of the product, IPFS which stores this data securely at one place and the entire data can be accessed by the consumer through RFID tags. This data can be accessed by the consumer who can verify the quality of the product. This can help maintain trust in the supply chain. In this paper, we have summarized a few previous related research and proposed a system for traceability in the agricultural supply chain.
在过去几年中,由于人口增加,对粮食的需求增加,粮食安全已成为一个主要问题,因为许多中介机构改变产品以获得利润,这反过来又降低了产品的质量,影响了人口的健康。当前的农业食品供应链存在许多重大问题,包括参与者众多、供应链冗长导致的沟通不畅、成员之间的不信任以及集中化的系统。传统的农业食品物流模式已经不能满足市场的需求,开发农业食品供应链的可追溯系统变得越来越重要。我们可以建立一个系统,通过使用区块链技术以及各种其他技术,如用于从产品的成长阶段收集数据的传感器,IPFS将这些数据安全地存储在一个地方,消费者可以通过RFID标签访问整个数据,从而跟踪整个供应链中的产品质量和其他因素。消费者可以访问这些数据,从而验证产品的质量。这有助于维持供应链中的信任。本文在总结前人相关研究的基础上,提出了农产品供应链溯源体系。
{"title":"Agricultural Food supply chain Traceability using Blockchain","authors":"S. Rajput, Anvita Jadhav, Janhavi Gadge, Diya Tilani, Vaibhav Dalgade","doi":"10.1109/ICITIIT57246.2023.10068564","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068564","url":null,"abstract":"For the past few years, as the demand for food has increased due to population, Food security has emerged as a major issue, because many intermediaries alter products to gain profits which in turn degrades the quality of the product and affects the health of the population. The current agricultural food supply chains have a number of significant issues, including plenty of participants, poor communication driven by lengthy supply chains, distrust between members, and centralized systems. Developing a traceability system for the agricultural food supply chain becomes more and more important as traditional agri-food logistics patterns can no longer meet market needs. We can build a system that keeps track of the product quality and other factors throughout the supply chain by using Blockchain technology along with various other technologies like sensors which are used to gather data from the growing stages of the product, IPFS which stores this data securely at one place and the entire data can be accessed by the consumer through RFID tags. This data can be accessed by the consumer who can verify the quality of the product. This can help maintain trust in the supply chain. In this paper, we have summarized a few previous related research and proposed a system for traceability in the agricultural supply chain.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128991303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of a Deep Learning Model for Cyberbullying and Cyberstalking Attack Mitigation via Online Social Media Analysis 基于在线社交媒体分析的网络欺凌和网络跟踪攻击缓解深度学习模型设计
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068711
S. Kahate, A. D. Raut
Identification of cyberbullying and cyberstalking for real-time use cases is a multi domain task that involves the design of social media data extraction, sentiment analysis, sentiment pattern evaluation, and regression models. To perform this task, researchers have proposed the use of high-density feature representation models that can extract social media sentiments, and combine them with user specific parameters like age, gender, time of post, etc. But existing models are either non-comprehensive or capable of achieving limited accuracy when used for real-time scenarios. Moreover, these models are not flexible to multimodal inputs, which further limits their scalability levels. To address these concerns, this paper proposes the development of a deep learning model for cyberbullying and cyberstalking attack mitigation via social media analysis. The proposed model initially collects tweets posted by users, extracts meta data, and analyzes language features for training a Long-Short-Term Memory (LSTM) based Convolutional Neural Network (CNN), which assists in the pre-filtering of tweets. The filtered tweets are passed through a Natural Language Processing (NLP) engine that assists in sentiment identification for these texts. Sentiment data and Word Embedding capabilities are used to anticipate cyberbullying and cyberstalking attacks. This is done via CNN based pattern analysis, which assists in the efficient identification and mitigation of these attacks. Due to the integration of these models, the proposed method is able to improve attack detection accuracy by 3.5 %, while reducing the identification delay by 8.3 % in real-time scenarios.
针对实时用例识别网络欺凌和网络跟踪是一项多领域任务,涉及社交媒体数据提取、情感分析、情感模式评估和回归模型的设计。为了完成这项任务,研究人员提出了使用高密度特征表示模型来提取社交媒体情感,并将其与用户特定参数(如年龄、性别、发布时间等)相结合。但是,现有的模型要么不全面,要么在用于实时场景时只能达到有限的准确性。此外,这些模型对多模态输入不灵活,这进一步限制了它们的可伸缩性水平。为了解决这些问题,本文提出了一个深度学习模型,通过社交媒体分析来缓解网络欺凌和网络跟踪攻击。该模型首先收集用户发布的推文,提取元数据,并分析语言特征,用于训练基于长短期记忆(LSTM)的卷积神经网络(CNN),该网络有助于对推文进行预过滤。过滤后的推文通过自然语言处理(NLP)引擎传递,该引擎有助于对这些文本进行情感识别。情感数据和词嵌入功能用于预测网络欺凌和网络跟踪攻击。这是通过基于CNN的模式分析完成的,有助于有效识别和缓解这些攻击。由于这些模型的集成,该方法能够将攻击检测准确率提高3.5%,同时将实时场景下的识别延迟降低8.3%。
{"title":"Design of a Deep Learning Model for Cyberbullying and Cyberstalking Attack Mitigation via Online Social Media Analysis","authors":"S. Kahate, A. D. Raut","doi":"10.1109/ICITIIT57246.2023.10068711","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068711","url":null,"abstract":"Identification of cyberbullying and cyberstalking for real-time use cases is a multi domain task that involves the design of social media data extraction, sentiment analysis, sentiment pattern evaluation, and regression models. To perform this task, researchers have proposed the use of high-density feature representation models that can extract social media sentiments, and combine them with user specific parameters like age, gender, time of post, etc. But existing models are either non-comprehensive or capable of achieving limited accuracy when used for real-time scenarios. Moreover, these models are not flexible to multimodal inputs, which further limits their scalability levels. To address these concerns, this paper proposes the development of a deep learning model for cyberbullying and cyberstalking attack mitigation via social media analysis. The proposed model initially collects tweets posted by users, extracts meta data, and analyzes language features for training a Long-Short-Term Memory (LSTM) based Convolutional Neural Network (CNN), which assists in the pre-filtering of tweets. The filtered tweets are passed through a Natural Language Processing (NLP) engine that assists in sentiment identification for these texts. Sentiment data and Word Embedding capabilities are used to anticipate cyberbullying and cyberstalking attacks. This is done via CNN based pattern analysis, which assists in the efficient identification and mitigation of these attacks. Due to the integration of these models, the proposed method is able to improve attack detection accuracy by 3.5 %, while reducing the identification delay by 8.3 % in real-time scenarios.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121802582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting of Satellite Based Carbon-Monoxide Time-Series Data Using a Deep Learning Approach 基于卫星一氧化碳时间序列数据的深度学习预测
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068609
Abhishek Verma, Virendar Ranga, D. Vishwakarma
In last few decades one of the major problems is air pollution which has raised the eyebrows of everyone. Despite all the efforts, it still lies in the category of dangerous. In air pollution there is one of the most hazardous gases named carbon monoxide which is a matter of concern & produced mostly whenever a material burns with a lack of oxygen. This paper presents the forecasting of carbon monoxide with the help of a satellite-based sentinel 5p dataset using earth engine. Further, with the help of the deep learning approach ‘LSTM’, we forecast a time series base result. We have trained and tested the data using a deep-learning model. We have evaluated the potential results by overlapping the original and predicated values and calculating Root-mean-square (RMS) error to validate our approach. The results show that the method of LSTM is very efficient and accurate.
在过去的几十年里,一个主要的问题是空气污染,这已经引起了每个人的关注。尽管做出了种种努力,它仍然处于危险的范畴。在空气污染中,有一种最危险的气体叫做一氧化碳,这是一个令人关注的问题,每当一种材料在缺氧的情况下燃烧时,它就会产生。本文介绍了利用地球引擎利用卫星sentinel 5p数据对一氧化碳进行预测的方法。此外,在深度学习方法“LSTM”的帮助下,我们预测了一个时间序列基础结果。我们使用深度学习模型对数据进行了训练和测试。我们通过重叠原始值和预测值并计算均方根(RMS)误差来评估潜在结果,以验证我们的方法。结果表明,LSTM方法是一种高效、准确的方法。
{"title":"Forecasting of Satellite Based Carbon-Monoxide Time-Series Data Using a Deep Learning Approach","authors":"Abhishek Verma, Virendar Ranga, D. Vishwakarma","doi":"10.1109/ICITIIT57246.2023.10068609","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068609","url":null,"abstract":"In last few decades one of the major problems is air pollution which has raised the eyebrows of everyone. Despite all the efforts, it still lies in the category of dangerous. In air pollution there is one of the most hazardous gases named carbon monoxide which is a matter of concern & produced mostly whenever a material burns with a lack of oxygen. This paper presents the forecasting of carbon monoxide with the help of a satellite-based sentinel 5p dataset using earth engine. Further, with the help of the deep learning approach ‘LSTM’, we forecast a time series base result. We have trained and tested the data using a deep-learning model. We have evaluated the potential results by overlapping the original and predicated values and calculating Root-mean-square (RMS) error to validate our approach. The results show that the method of LSTM is very efficient and accurate.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131050557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The integration of Blockchain and AI for Web 3.0: A security Perspective 区块链和AI在Web 3.0中的集成:安全视角
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068672
Akshay Suryavanshi, A. G, M. N, Rishika M, Abdul Haq N
A decentralized and secure architecture made possible by blockchain technology is what Web 3.0 is known for. By offering a secure and trustworthy platform for transactions and data storage, this new paradigm shift in the digital world promises to transform the way we interact with the internet. Data is the new oil, thus protecting it is equally crucial. The foundation of the web 3.0 ecosystem, which provides a secure and open method of managing user data, is blockchain technology. With the launch of Web 3.0, demand for seamless communication across numerous platforms and technologies has increased. Blockchain offers a common framework that makes it possible for various systems to communicate with one another. The decentralized nature of blockchain technology almost precludes hacker access to the system, ushering in a highly secure Web 3.0. By preserving the integrity and validity of data and transactions, blockchain helps to build trust in online transactions. AI can be integrated with blockchain to enhance its capabilities and improve the overall user experience. We can build a safe and intelligent web that empowers users, gives them more privacy, and gives them more control over their online data by merging blockchain and AI. In this article, we emphasize the value of blockchain and AI technologies in achieving Web 3.0's full potential for a secure internet and propose a Blockchain and AI empowered framework. The future of technology is now driven by the power of blockchain, AI, and web 3.0, providing a secure and efficient way to manage digital assets and data.
区块链技术使分散和安全的体系结构成为可能,这就是Web 3.0的特点。通过为交易和数据存储提供一个安全可靠的平台,数字世界的这种新范式转变有望改变我们与互联网互动的方式。数据是新的石油,因此保护它同样至关重要。web 3.0生态系统的基础是区块链技术,它提供了一种安全而开放的方法来管理用户数据。随着Web 3.0的推出,对跨众多平台和技术的无缝通信的需求有所增加。区块链提供了一个公共框架,使各种系统能够相互通信。区块链技术的分散性几乎阻止了黑客对系统的访问,从而带来了高度安全的Web 3.0。通过保持数据和交易的完整性和有效性,区块链有助于在在线交易中建立信任。AI可以与区块链集成,增强其功能,改善整体用户体验。我们可以建立一个安全智能的网络,赋予用户更多的隐私,并通过合并区块链和人工智能,让他们更好地控制自己的在线数据。在本文中,我们强调区块链和AI技术在实现Web 3.0安全互联网的全部潜力方面的价值,并提出一个区块链和AI授权框架。技术的未来现在由区块链、人工智能和web 3.0的力量驱动,提供了一种安全有效的方式来管理数字资产和数据。
{"title":"The integration of Blockchain and AI for Web 3.0: A security Perspective","authors":"Akshay Suryavanshi, A. G, M. N, Rishika M, Abdul Haq N","doi":"10.1109/ICITIIT57246.2023.10068672","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068672","url":null,"abstract":"A decentralized and secure architecture made possible by blockchain technology is what Web 3.0 is known for. By offering a secure and trustworthy platform for transactions and data storage, this new paradigm shift in the digital world promises to transform the way we interact with the internet. Data is the new oil, thus protecting it is equally crucial. The foundation of the web 3.0 ecosystem, which provides a secure and open method of managing user data, is blockchain technology. With the launch of Web 3.0, demand for seamless communication across numerous platforms and technologies has increased. Blockchain offers a common framework that makes it possible for various systems to communicate with one another. The decentralized nature of blockchain technology almost precludes hacker access to the system, ushering in a highly secure Web 3.0. By preserving the integrity and validity of data and transactions, blockchain helps to build trust in online transactions. AI can be integrated with blockchain to enhance its capabilities and improve the overall user experience. We can build a safe and intelligent web that empowers users, gives them more privacy, and gives them more control over their online data by merging blockchain and AI. In this article, we emphasize the value of blockchain and AI technologies in achieving Web 3.0's full potential for a secure internet and propose a Blockchain and AI empowered framework. The future of technology is now driven by the power of blockchain, AI, and web 3.0, providing a secure and efficient way to manage digital assets and data.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127638583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Weighted Ensemble Model for Prediction of Dengue Occurrence in North India (Chandigarh) 预测印度北部昌迪加尔登革热疫情的加权集合模型
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068636
K. Shashvat, A. Kaur
In tropical nations, dengue fever is one of the most widespread vector-borne infections, particularly in developing countries such as India, Bangladesh, and Pakistan. Dengue fever can range from mild to severe fever cases. Dengue fever is an epidemic spread by mosquitos that affects people of all ages in over a hundred countries throughout the world. The research examines real-time series prediction and analysis using three regression models, as well as the development of a weighted average prediction model for infectious illness prediction. The integrated diseases monitoring programme of the Government of India provided monthly statistics on dengue cases from 2014 to 2017. Three regression models were used to analyse data: support vector regression, neural network, and linear regression. Mean Absolute Error, Root Mean Square Error, and Mean Square Error are some of the performance criteria that have been employed. In terms of its effectiveness, it was discovered that the postulated weighted ensemble model performed better. The primary purpose of this project is to reduce prediction errors, and we discovered that our planned weighted ensemble model is more effective in this regard.
在热带国家,登革热是最普遍的媒介传播感染之一,特别是在印度、孟加拉国和巴基斯坦等发展中国家。登革热可分为轻度至重度发热病例。登革热是一种由蚊子传播的流行病,在全世界一百多个国家影响所有年龄段的人。本研究利用三种回归模型对实时序列进行预测和分析,并建立了传染病预测的加权平均预测模型。印度政府的综合疾病监测方案提供了2014年至2017年登革热病例的月度统计数据。采用支持向量回归、神经网络回归和线性回归三种回归模型对数据进行分析。平均绝对误差、均方根误差和均方误差是一些已被采用的性能标准。在有效性方面,发现假设的加权集成模型表现得更好。这个项目的主要目的是减少预测误差,我们发现我们计划的加权集成模型在这方面更有效。
{"title":"A Weighted Ensemble Model for Prediction of Dengue Occurrence in North India (Chandigarh)","authors":"K. Shashvat, A. Kaur","doi":"10.1109/ICITIIT57246.2023.10068636","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068636","url":null,"abstract":"In tropical nations, dengue fever is one of the most widespread vector-borne infections, particularly in developing countries such as India, Bangladesh, and Pakistan. Dengue fever can range from mild to severe fever cases. Dengue fever is an epidemic spread by mosquitos that affects people of all ages in over a hundred countries throughout the world. The research examines real-time series prediction and analysis using three regression models, as well as the development of a weighted average prediction model for infectious illness prediction. The integrated diseases monitoring programme of the Government of India provided monthly statistics on dengue cases from 2014 to 2017. Three regression models were used to analyse data: support vector regression, neural network, and linear regression. Mean Absolute Error, Root Mean Square Error, and Mean Square Error are some of the performance criteria that have been employed. In terms of its effectiveness, it was discovered that the postulated weighted ensemble model performed better. The primary purpose of this project is to reduce prediction errors, and we discovered that our planned weighted ensemble model is more effective in this regard.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133799629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Driving Car: Simulation of Highly Automated Vehicle Technology using Convolution Neural Networks 自动驾驶汽车:使用卷积神经网络模拟高度自动化车辆技术
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068691
M. Mallikarjuna, Aditya Bhosle
Driver behaviour is a significant factor in the smooth driving of vehicles on the roads. 94 % of crashes and road accidents are prone to drivers' rash driving behaviour. To address issues related to road accidents and crashing of vehicles on the road, Highly Automated Vehicle (HAV) Technologies have been proposed. Self-Driving Cars are part of Highly Automated Tech-nologies having promising benefits ranging from Greater Road Safety, Greater Independence, Saving money, More Productivity, Reduced Congestion and Green House Gains. The current study focuses on the deployment of self-driving automobiles based on the Deep Learning paradigm. The automobile has been simulated on the Udacity simulator for convenience and safety. On the Udacity platform, a technique for training and simulating an unmanned vehicle model using a convolutional neural network has been developed. The data used to train the model is captured in the simulator and fed as input into the Deep CNN. Following data collection, Deep CNN is trained to have Safety Navigation by passing Steering, Throttle, Brake and Speed as Control Inputs. The use of three cameras considerably improves the precision of the navigation job. To manage the car, the steering wheel amount will be modified such that it runs in the centre of the lane. We evaluated the model using UDACITY's simulation system. The proposed model has been evaluated considering the-No of epochs vs loss calculation, as performance metrics, and was found that the proposed model has shown superiority with the existing works.
驾驶员行为是车辆在道路上平稳行驶的一个重要因素。94%的撞车和交通事故是由于司机的鲁莽驾驶行为造成的。为了解决与道路交通事故和车辆碰撞有关的问题,高度自动化车辆(HAV)技术已经被提出。自动驾驶汽车是高度自动化技术的一部分,具有更好的道路安全、更大的独立性、节省资金、更高的生产率、减少拥堵和温室效应等诸多好处。目前的研究重点是基于深度学习范式的自动驾驶汽车的部署。为了方便和安全,汽车已经在Udacity模拟器上进行了模拟。在Udacity平台上,开发了一种使用卷积神经网络训练和模拟无人驾驶汽车模型的技术。用于训练模型的数据在模拟器中捕获,并作为输入馈送到深度CNN。在数据收集之后,深度CNN通过将转向、油门、刹车和速度作为控制输入来训练安全导航。三个摄像头的使用大大提高了导航工作的精度。为了管理汽车,方向盘的数量将被修改,使其在车道的中心运行。我们使用UDACITY的仿真系统对模型进行了评估。以“epoch no”和“loss calculation”作为性能指标,对所提模型进行了评价,结果表明,所提模型与已有的模型相比具有优越性。
{"title":"Self-Driving Car: Simulation of Highly Automated Vehicle Technology using Convolution Neural Networks","authors":"M. Mallikarjuna, Aditya Bhosle","doi":"10.1109/ICITIIT57246.2023.10068691","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068691","url":null,"abstract":"Driver behaviour is a significant factor in the smooth driving of vehicles on the roads. 94 % of crashes and road accidents are prone to drivers' rash driving behaviour. To address issues related to road accidents and crashing of vehicles on the road, Highly Automated Vehicle (HAV) Technologies have been proposed. Self-Driving Cars are part of Highly Automated Tech-nologies having promising benefits ranging from Greater Road Safety, Greater Independence, Saving money, More Productivity, Reduced Congestion and Green House Gains. The current study focuses on the deployment of self-driving automobiles based on the Deep Learning paradigm. The automobile has been simulated on the Udacity simulator for convenience and safety. On the Udacity platform, a technique for training and simulating an unmanned vehicle model using a convolutional neural network has been developed. The data used to train the model is captured in the simulator and fed as input into the Deep CNN. Following data collection, Deep CNN is trained to have Safety Navigation by passing Steering, Throttle, Brake and Speed as Control Inputs. The use of three cameras considerably improves the precision of the navigation job. To manage the car, the steering wheel amount will be modified such that it runs in the centre of the lane. We evaluated the model using UDACITY's simulation system. The proposed model has been evaluated considering the-No of epochs vs loss calculation, as performance metrics, and was found that the proposed model has shown superiority with the existing works.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115234569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Expert System Techniques in Intelligent Diagnostic Digital Cytopathology System for Cervical Intraepithelial Neoplasia Detection 宫颈上皮内瘤变检测智能诊断数字细胞病理学系统中的专家系统技术
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068718
Akanksha Kapruwan, Sachin Sharma, H. Goyal
Many sectors are increasingly utilizing advanced expert system techniques to provide trustworthy answers for a range of CIN-C issues. Gaining access to prompt, high-quality medical care is one of the challenges that today's underdeveloped countries face. This is risky for patients' health. Accurate medical diagnosis is one of the most crucial steps to maintaining great health and living a long life. Adopting an expert system in diagnostic digital cytopathology system for CIN detection primary goal is to aid medical professionals in establishing diagnosis while also taking into account the information and symptoms at hand.
许多部门越来越多地利用先进的专家系统技术,为一系列CIN-C问题提供值得信赖的答案。获得及时、高质量的医疗服务是当今欠发达国家面临的挑战之一。这对病人的健康是有风险的。准确的医疗诊断是保持健康和长寿的最关键的步骤之一。在数字细胞病理学诊断系统中采用专家系统进行CIN检测的主要目的是帮助医疗专业人员在考虑手头信息和症状的同时进行诊断。
{"title":"Expert System Techniques in Intelligent Diagnostic Digital Cytopathology System for Cervical Intraepithelial Neoplasia Detection","authors":"Akanksha Kapruwan, Sachin Sharma, H. Goyal","doi":"10.1109/ICITIIT57246.2023.10068718","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068718","url":null,"abstract":"Many sectors are increasingly utilizing advanced expert system techniques to provide trustworthy answers for a range of CIN-C issues. Gaining access to prompt, high-quality medical care is one of the challenges that today's underdeveloped countries face. This is risky for patients' health. Accurate medical diagnosis is one of the most crucial steps to maintaining great health and living a long life. Adopting an expert system in diagnostic digital cytopathology system for CIN detection primary goal is to aid medical professionals in establishing diagnosis while also taking into account the information and symptoms at hand.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"159 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124445205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Analysis of User Experience on The Government Application of Indonesian Higher Education Institutional Information Systems Using Usability Method 用可用性方法分析印尼高等教育机构信息系统政府应用的用户体验
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068674
Farhah Qonita, Muhammad Fariz Budiman, Valina Mayang Sari, Natalia Limantara
The Ministry of Education, Culture, Research, and Technology is a ministry within the Government of Indonesia which administers affairs in the fields of preschool children's education, elementary education, secondary education, vocational education, higher education, cultural management, research, and the growth of technology. Universities that are going to open a new study program must submit a proposal to the Ministry of Education, Culture, Research, and Technology. The process of submitting this proposal is submitted through a system called SIAGA. This information system is used by universities to submit proposals and reviewers to evaluate and provide an assessment of the proposals submitted. The purpose of this research is to evaluate the usability of the SIAGA system. The evaluation is focused on from the reviewer's side because the reviewer is the main user of this system. The result of this study is performance assessment technique demonstrate that application pages are generally effective and pleased with the application system, but application is still inefficient in terms of evaluating characteristics. Improvements in this study focused on improving page layout and information navigation instructions when using the application.
教育、文化、研究和技术部是印度尼西亚政府的一个部门,负责管理学前儿童教育、初等教育、中等教育、职业教育、高等教育、文化管理、研究和技术发展等领域的事务。开设新课程的大学必须向教育文化研究技术部提交计划书。提交该提案的过程是通过一个名为SIAGA的系统提交的。该信息系统用于大学提交提案,并由审稿人对提交的提案进行评估和评估。本研究的目的是评估SIAGA系统的可用性。由于审稿人是该系统的主要用户,因此评估主要是从审稿人的角度进行的。本研究的绩效评估技术结果表明,应用程序页面总体上是有效的,并且对应用程序系统感到满意,但应用程序在评估特征方面仍然效率低下。本研究的改进主要集中在使用应用程序时改进页面布局和信息导航说明。
{"title":"Analysis of User Experience on The Government Application of Indonesian Higher Education Institutional Information Systems Using Usability Method","authors":"Farhah Qonita, Muhammad Fariz Budiman, Valina Mayang Sari, Natalia Limantara","doi":"10.1109/ICITIIT57246.2023.10068674","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068674","url":null,"abstract":"The Ministry of Education, Culture, Research, and Technology is a ministry within the Government of Indonesia which administers affairs in the fields of preschool children's education, elementary education, secondary education, vocational education, higher education, cultural management, research, and the growth of technology. Universities that are going to open a new study program must submit a proposal to the Ministry of Education, Culture, Research, and Technology. The process of submitting this proposal is submitted through a system called SIAGA. This information system is used by universities to submit proposals and reviewers to evaluate and provide an assessment of the proposals submitted. The purpose of this research is to evaluate the usability of the SIAGA system. The evaluation is focused on from the reviewer's side because the reviewer is the main user of this system. The result of this study is performance assessment technique demonstrate that application pages are generally effective and pleased with the application system, but application is still inefficient in terms of evaluating characteristics. Improvements in this study focused on improving page layout and information navigation instructions when using the application.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124561813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Perception and Prediction 网络钓鱼感知与预测
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068585
Ashwitha Noble P, Hubert Veyannie V, S. H
A practice known as URL phishing involves cybercriminals creating fake websites in order to lure victims and steal sensitive information. The attacker disguises themselves in an email, instant message, or text message, pose as a reliable source to persuade the recipient to open it. Once the recipient clicks the link, they realize they were deceived into clicking a potentially dangerous link. In this case, ransomware can be set up on the recipient's PC using a malware that can be used to lock it down or even worse the private data can be released. In spite of the fact that fraudulent websites often resemble the real thing, checking for warning signals alone is not enough to prevent URL phishing. A study found that around 90% of the data breach is due to phishing. The variety of phishing schemes has expanded over the years and they may now be more dangerous than ever before.
一种被称为URL网络钓鱼的做法是网络犯罪分子创建虚假网站,以引诱受害者并窃取敏感信息。攻击者将自己伪装成电子邮件、即时消息或文本消息,假装成可靠来源,说服收件人打开它。一旦收件人点击了链接,他们就会意识到自己被骗点击了一个潜在的危险链接。在这种情况下,勒索软件可以使用恶意软件在收件人的PC上设置,可以用来锁定它,甚至更糟糕的是可以释放私人数据。尽管欺诈性网站经常与真实网站相似,但仅检查警告信号不足以防止URL网络钓鱼。一项研究发现,大约90%的数据泄露是由网络钓鱼造成的。多年来,各种各样的网络钓鱼计划已经扩大,它们现在可能比以往任何时候都更加危险。
{"title":"Phishing Perception and Prediction","authors":"Ashwitha Noble P, Hubert Veyannie V, S. H","doi":"10.1109/ICITIIT57246.2023.10068585","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068585","url":null,"abstract":"A practice known as URL phishing involves cybercriminals creating fake websites in order to lure victims and steal sensitive information. The attacker disguises themselves in an email, instant message, or text message, pose as a reliable source to persuade the recipient to open it. Once the recipient clicks the link, they realize they were deceived into clicking a potentially dangerous link. In this case, ransomware can be set up on the recipient's PC using a malware that can be used to lock it down or even worse the private data can be released. In spite of the fact that fraudulent websites often resemble the real thing, checking for warning signals alone is not enough to prevent URL phishing. A study found that around 90% of the data breach is due to phishing. The variety of phishing schemes has expanded over the years and they may now be more dangerous than ever before.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130506815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1