首页 > 最新文献

2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)最新文献

英文 中文
Tiny Face Presence Detector using Hybrid Binary Neural Network 基于混合二元神经网络的微小人脸存在检测器
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068573
Manav Chandna, Pratishtha Bhatia, Surinder-pal Singh, Saumya Suneja
Face Detection plays a key role in “always-on” applications such as mobile phone unlock or smart doorbells. Deep learning-based face detection solutions have demonstrated state-of-art performance in terms of accuracy; however generally, the improved accuracy comes with a large computation and memory requirement overhead. This can result in high energy consumption which is a significant cost that can overrun the energy budget especially in battery powered systems. Recent solutions to this problem have advocated the use of a low power always-on sensor running a rudimentary algorithm that can merely indicate the ‘presence’ of a face with low accuracy and in turn ‘wake-up’ a more powerful device executing a high accuracy face detection algorithm. In this paper we present the design of two deeply quantized (binarized) light weight face presence detection deep learning based models that can function as wake up models. The models achieve high accuracy> 98% with a corresponding memory footprint being limited between 3KB and 100KB allowing them to be deployed in highly resource constrained ‘always-on’ embedded platforms.
面部检测在手机解锁或智能门铃等“永远在线”应用中发挥着关键作用。基于深度学习的人脸检测解决方案在准确性方面表现出了最先进的性能;然而,通常情况下,准确度的提高伴随着大量的计算和内存需求开销。这可能导致高能耗,这是一项重大成本,可能超出能源预算,特别是在电池供电的系统中。最近针对这一问题的解决方案提倡使用低功耗的永远在线传感器,该传感器运行一种基本算法,只能以低精度指示人脸的“存在”,然后反过来“唤醒”一个更强大的设备,执行高精度的人脸检测算法。在本文中,我们提出了两个深度量化(二值化)轻量级人脸存在检测深度学习模型的设计,可以作为唤醒模型。该模型实现了高达98%的高精度,相应的内存占用限制在3KB到100KB之间,允许它们部署在资源高度受限的“永远在线”嵌入式平台中。
{"title":"Tiny Face Presence Detector using Hybrid Binary Neural Network","authors":"Manav Chandna, Pratishtha Bhatia, Surinder-pal Singh, Saumya Suneja","doi":"10.1109/ICITIIT57246.2023.10068573","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068573","url":null,"abstract":"Face Detection plays a key role in “always-on” applications such as mobile phone unlock or smart doorbells. Deep learning-based face detection solutions have demonstrated state-of-art performance in terms of accuracy; however generally, the improved accuracy comes with a large computation and memory requirement overhead. This can result in high energy consumption which is a significant cost that can overrun the energy budget especially in battery powered systems. Recent solutions to this problem have advocated the use of a low power always-on sensor running a rudimentary algorithm that can merely indicate the ‘presence’ of a face with low accuracy and in turn ‘wake-up’ a more powerful device executing a high accuracy face detection algorithm. In this paper we present the design of two deeply quantized (binarized) light weight face presence detection deep learning based models that can function as wake up models. The models achieve high accuracy> 98% with a corresponding memory footprint being limited between 3KB and 100KB allowing them to be deployed in highly resource constrained ‘always-on’ embedded platforms.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126424571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Factors influenced user in Using Streaming Music Applications Using the TAM Method: Technology Acceptance Model 影响用户使用流媒体音乐应用的因素:TAM方法:技术接受模型
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068571
Fredy Jingga, Zara Handra Fitria, Julian Alfi, Andreano Dwi Kusumaiati
The development of music streaming is rapidly increasing on a global scale. The official website of the International Federation of Phonographic Industry (IFPI) states that on a global scale, in 2020, 62.1% of the music industry's revenue is due to streaming services. This study's objective is to investigate the elements that have an impact on Indonesians' use of streaming music. This research initially wanted to explore the link between advantages and convenience and consumers' behavioural intention to utilize streaming music. Using data from 117 respondents obtained from social media with the Structural Equation Modeling (PLS-SEM) method as a data processor. This research shows that benefits, features, habits, and ease of use are behavioural intentions of music streaming users in Indonesia. The findings of this study will eventually be used to advise music streaming platform providers about critical aspects affecting music streaming customers in Indonesia.
音乐流媒体的发展在全球范围内迅速增长。国际唱片业联合会(IFPI)的官方网站指出,在全球范围内,到2020年,62.1%的音乐产业收入来自流媒体服务。这项研究的目的是调查影响印尼人使用流媒体音乐的因素。这项研究最初是想探索优势和便利与消费者使用流媒体音乐的行为意愿之间的联系。使用结构方程建模(PLS-SEM)方法作为数据处理器,从社交媒体获得117名受访者的数据。这项研究表明,好处、功能、习惯和易用性是印尼音乐流媒体用户的行为意图。这项研究的结果最终将用于为音乐流媒体平台提供商提供有关影响印度尼西亚音乐流媒体客户的关键方面的建议。
{"title":"Factors influenced user in Using Streaming Music Applications Using the TAM Method: Technology Acceptance Model","authors":"Fredy Jingga, Zara Handra Fitria, Julian Alfi, Andreano Dwi Kusumaiati","doi":"10.1109/ICITIIT57246.2023.10068571","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068571","url":null,"abstract":"The development of music streaming is rapidly increasing on a global scale. The official website of the International Federation of Phonographic Industry (IFPI) states that on a global scale, in 2020, 62.1% of the music industry's revenue is due to streaming services. This study's objective is to investigate the elements that have an impact on Indonesians' use of streaming music. This research initially wanted to explore the link between advantages and convenience and consumers' behavioural intention to utilize streaming music. Using data from 117 respondents obtained from social media with the Structural Equation Modeling (PLS-SEM) method as a data processor. This research shows that benefits, features, habits, and ease of use are behavioural intentions of music streaming users in Indonesia. The findings of this study will eventually be used to advise music streaming platform providers about critical aspects affecting music streaming customers in Indonesia.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"4 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120900056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment 基于区块链的智慧城市环境数据安全存储验证算法
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068638
M. Vivekanandan, Praveen Kumar Premkamal, C. I. Johnpaul, Silambarasan Elkana Ebinazer
Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through cloud for smart cities, collaborative actions, remote activities based on the data at the source, etc., need to be secure and free from masquerading and tampering. In most of the cases the data is pushed into the cloud from access points, sensors, or remote access centers. Preventing the data access and identifying anonymous access to these sensors require an enhanced security mechanism that prevents the inconsistent data to be transferred to the cloud. We propose a blockchain based enhanced security system that protects the data from the access point it leaves for the cloud using a distributed ledger. The consensus mechanism ensures the trust of existing sources during the data transfer from the source to the cloud. The trust generated by the subsequent data blocks with the security hash key ensure the integrity of the data and validity of the actual source. This prevent the illegal access to the data sharing points. We have verified the degree of security offered by our proposed model using informal analysis. We found that our method has improved the security of data access.
基于区块链的分布式账本机制在这个时代得到了广泛的应用。安全程度的测量始终是一个瓶颈。因为有技术可以打破它。通过云实现智慧城市的数据共享、协作行动、基于数据源的远程活动等,都需要安全且不受伪装和篡改。在大多数情况下,数据是从接入点、传感器或远程访问中心推送到云中的。防止数据访问和识别对这些传感器的匿名访问需要增强的安全机制,以防止不一致的数据传输到云。我们提出了一个基于区块链的增强安全系统,该系统使用分布式账本保护数据不受其留给云的接入点的影响。共识机制确保在数据从源到云的传输过程中对现有源的信任。后续数据块使用安全哈希密钥生成的信任确保了数据的完整性和实际源的有效性。这可以防止非法访问数据共享点。我们已经使用非正式分析验证了我们提出的模型所提供的安全程度。我们发现我们的方法提高了数据访问的安全性。
{"title":"Blockchain based Secure Data Storage Verification Algorithm for Smart City Environment","authors":"M. Vivekanandan, Praveen Kumar Premkamal, C. I. Johnpaul, Silambarasan Elkana Ebinazer","doi":"10.1109/ICITIIT57246.2023.10068638","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068638","url":null,"abstract":"Blockchain based distributed ledger mechanism has got a wide range of applications in this era. The degree of security measurement is always a bottleneck. Since there are technologies to break it. Data sharing through cloud for smart cities, collaborative actions, remote activities based on the data at the source, etc., need to be secure and free from masquerading and tampering. In most of the cases the data is pushed into the cloud from access points, sensors, or remote access centers. Preventing the data access and identifying anonymous access to these sensors require an enhanced security mechanism that prevents the inconsistent data to be transferred to the cloud. We propose a blockchain based enhanced security system that protects the data from the access point it leaves for the cloud using a distributed ledger. The consensus mechanism ensures the trust of existing sources during the data transfer from the source to the cloud. The trust generated by the subsequent data blocks with the security hash key ensure the integrity of the data and validity of the actual source. This prevent the illegal access to the data sharing points. We have verified the degree of security offered by our proposed model using informal analysis. We found that our method has improved the security of data access.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116070664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exposing the Vulnerabilities of Deep Learning Models in News Classification 揭露深度学习模型在新闻分类中的漏洞
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068577
Ashish Bajaj, D. Vishwakarma
News websites need to divide their articles into categories that make it easier for readers to find news of their interest. Recent deep-learning models have excelled in this news classification task. Despite the tremendous success of deep learning models in NLP-related tasks, it is vulnerable to adversarial attacks, which lead to misclassification of the news category. An adversarial text is generated by changing a few words or characters in a way that retains the overall semantic similarity of news for a human reader but deceives the machine into giving inaccurate predictions. This paper presents the vulnerability in news classification by generating adversarial text using various state-of-the-art attack algorithms. We have compared and analyzed the behavior of different models, including the powerful transformer model, BERT, and the widely used Word-CNN and LSTM models trained on AG news classification dataset. We have evaluated the potential results by calculating Attack Success Rates (ASR) for each model. The results show that it is possible to automatically bypass News topic classification mechanisms, resulting in repercussions for current policy measures.
新闻网站需要将文章分类,以便读者更容易找到他们感兴趣的新闻。最近的深度学习模型在这一新闻分类任务中表现出色。尽管深度学习模型在nlp相关任务中取得了巨大的成功,但它很容易受到对抗性攻击,从而导致新闻类别的错误分类。对抗性文本是通过改变几个单词或字符来生成的,这种方式为人类读者保留了新闻的整体语义相似性,但欺骗了机器,使其给出不准确的预测。本文通过使用各种先进的攻击算法生成对抗性文本,提出了新闻分类中的漏洞。我们比较和分析了不同模型的行为,包括强大的transformer模型BERT,以及在AG新闻分类数据集上训练的广泛使用的Word-CNN和LSTM模型。我们通过计算每个模型的攻击成功率(ASR)来评估潜在的结果。结果表明,自动绕过新闻主题分类机制是可能的,从而对当前的政策措施产生影响。
{"title":"Exposing the Vulnerabilities of Deep Learning Models in News Classification","authors":"Ashish Bajaj, D. Vishwakarma","doi":"10.1109/ICITIIT57246.2023.10068577","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068577","url":null,"abstract":"News websites need to divide their articles into categories that make it easier for readers to find news of their interest. Recent deep-learning models have excelled in this news classification task. Despite the tremendous success of deep learning models in NLP-related tasks, it is vulnerable to adversarial attacks, which lead to misclassification of the news category. An adversarial text is generated by changing a few words or characters in a way that retains the overall semantic similarity of news for a human reader but deceives the machine into giving inaccurate predictions. This paper presents the vulnerability in news classification by generating adversarial text using various state-of-the-art attack algorithms. We have compared and analyzed the behavior of different models, including the powerful transformer model, BERT, and the widely used Word-CNN and LSTM models trained on AG news classification dataset. We have evaluated the potential results by calculating Attack Success Rates (ASR) for each model. The results show that it is possible to automatically bypass News topic classification mechanisms, resulting in repercussions for current policy measures.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127688298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Blockchain Based Record Management System in Hospitals 基于区块链的医院病历管理系统
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068685
Adarsh Vernekar, Akash Sakhare, Prashant Bhapkar, S. Jadhav, Rahul B. Adhao
Every industry is expanding too quickly and adjusting to this new technology as it develops. Since it has the potential to deliver more precise and economical patient care, healthcare data management has recently attracted a lot of attention. Even today, many hospitals hold their own autonomous record management system, which causes security issues. In centralized record management systems, data privacy, centralized data stewardship, and system vulnerability problems affect traditional client-server-based and cloud-based health data management systems. Blockchain technology has a promising future in the healthcare industry because of its immutability, transparency, privacy, and security properties, which can address certain critical problems with the health management system. A more patient-oriented approach in healthcare systems is required to improve the accuracy and transparency of medical data. In healthcare systems, health records are the most sensitive asset that must be unique and protected across the system. Our objective is to showcase the potential use of blockchain technology in health record management systems in hospitals. In this paper, we demonstrate a health record management system that uses blockchain technology to store the medical records of a patient across multiple hospitals. The proposed system will mainly help in maintaining consistency issues related to data along with improved security in the system.
每个行业都在快速扩张,并在适应新技术的同时进行调整。由于医疗保健数据管理具有提供更精确和更经济的患者护理的潜力,因此它最近引起了很多关注。即使在今天,许多医院也拥有自己的自主病历管理系统,这导致了安全问题。在集中式记录管理系统中,数据隐私、集中式数据管理和系统漏洞问题会影响传统的基于客户机-服务器和基于云的健康数据管理系统。区块链技术由于其不变性、透明性、隐私性和安全性,可以解决健康管理系统的某些关键问题,在医疗保健行业具有广阔的前景。为了提高医疗数据的准确性和透明度,需要在医疗保健系统中采用更加以患者为导向的方法。在医疗保健系统中,健康记录是最敏感的资产,必须在整个系统中保持唯一并受到保护。我们的目标是展示区块链技术在医院健康记录管理系统中的潜在用途。在本文中,我们演示了一个健康记录管理系统,该系统使用区块链技术在多家医院存储患者的医疗记录。拟议的系统将主要有助于保持与数据有关的一致性问题,并改善系统的安全性。
{"title":"Blockchain Based Record Management System in Hospitals","authors":"Adarsh Vernekar, Akash Sakhare, Prashant Bhapkar, S. Jadhav, Rahul B. Adhao","doi":"10.1109/ICITIIT57246.2023.10068685","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068685","url":null,"abstract":"Every industry is expanding too quickly and adjusting to this new technology as it develops. Since it has the potential to deliver more precise and economical patient care, healthcare data management has recently attracted a lot of attention. Even today, many hospitals hold their own autonomous record management system, which causes security issues. In centralized record management systems, data privacy, centralized data stewardship, and system vulnerability problems affect traditional client-server-based and cloud-based health data management systems. Blockchain technology has a promising future in the healthcare industry because of its immutability, transparency, privacy, and security properties, which can address certain critical problems with the health management system. A more patient-oriented approach in healthcare systems is required to improve the accuracy and transparency of medical data. In healthcare systems, health records are the most sensitive asset that must be unique and protected across the system. Our objective is to showcase the potential use of blockchain technology in health record management systems in hospitals. In this paper, we demonstrate a health record management system that uses blockchain technology to store the medical records of a patient across multiple hospitals. The proposed system will mainly help in maintaining consistency issues related to data along with improved security in the system.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132808859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrated Healthcare Monitoring System using Wireless Body Area Networks and Internet of Things 使用无线体域网络和物联网的综合医疗监测系统
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068616
M. Ezhilarasi, Anand Kumar, M. Shanmugapriya, Anshul Ghanshala, Anshika Gupta
To minimize overall healthcare costs and enhance workflows and processes, remote health monitoring solutions are needed in both clinics and at home. One of the most effective communication technologies, the Internet of Things (IoT) offers the ability of integrated data access and fusion across a variety of applications. Depending on how each person's role is defined, users and qualified professionals (like doctors and nurses in the medical industry) may be able to access data. The goal of the Internet of Things in the healthcare industry is to redefine the healthcare system by bringing together all involved authorities and cutting-edge technology makes the most of the data shared between intimately linked technologies that use the IoT platform. IoT is generally anticipated to provide an enhanced device, scheme, and application connectivity that extend over machine-to-machine communications. In the past few years, the development of wearable sensors has offered ease, simplicity, and better health. By making medical sensors smaller and less expensive, technological advancements have boosted the use of these devices. The expertise and abilities of healthcare services, such as remote health monitoring, surgery, rehabilitation, and therapy are improved through medical sensors. Fog computing techniques are also added to enhance precision medicine, obtain real-time data processing, and prevent the connection from failing. As a result, the operating environment for devices is more nimble and local. In this regard, this study suggests an architecture model for the healthcare domain that incorporates the technologies of body area networks, IoT, and Fog computing. The key contribution is to boost the capabilities and resources of IoT devices by using an intermediate Fog layer close to the edge to get beyond IoT restrictions. Experiments show that when compared to other standard architecture, the suggested model can reach a 75% faster response time. The evaluation's results supported the suggested model's ability to accomplish its objectives while maintaining application performance.
为了最大限度地降低总体医疗保健成本并增强工作流程和流程,诊所和家庭都需要远程健康监控解决方案。作为最有效的通信技术之一,物联网(IoT)提供了跨各种应用集成数据访问和融合的能力。根据如何定义每个人的角色,用户和合格的专业人员(如医疗行业的医生和护士)可能能够访问数据。医疗行业物联网的目标是通过汇集所有相关部门和尖端技术来重新定义医疗保健系统,从而充分利用使用物联网平台的密切相关技术之间共享的数据。物联网通常被期望提供增强的设备、方案和应用连接,扩展到机器对机器通信。在过去的几年里,可穿戴传感器的发展提供了方便、简单和更好的健康。通过使医疗传感器更小、更便宜,技术进步促进了这些设备的使用。医疗传感器提高了远程健康监测、手术、康复和治疗等医疗保健服务的专业知识和能力。雾计算技术也被加入,以增强精准医疗,获得实时数据处理,并防止连接失败。因此,设备的操作环境更加灵活和本地化。在这方面,本研究提出了一个医疗保健领域的架构模型,该模型结合了身体区域网络、物联网和雾计算技术。关键贡献是通过使用靠近边缘的中间雾层来超越物联网限制,从而提高物联网设备的功能和资源。实验表明,与其他标准体系结构相比,该模型的响应时间提高了75%。评估的结果支持建议的模型在保持应用程序性能的同时实现其目标的能力。
{"title":"Integrated Healthcare Monitoring System using Wireless Body Area Networks and Internet of Things","authors":"M. Ezhilarasi, Anand Kumar, M. Shanmugapriya, Anshul Ghanshala, Anshika Gupta","doi":"10.1109/ICITIIT57246.2023.10068616","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068616","url":null,"abstract":"To minimize overall healthcare costs and enhance workflows and processes, remote health monitoring solutions are needed in both clinics and at home. One of the most effective communication technologies, the Internet of Things (IoT) offers the ability of integrated data access and fusion across a variety of applications. Depending on how each person's role is defined, users and qualified professionals (like doctors and nurses in the medical industry) may be able to access data. The goal of the Internet of Things in the healthcare industry is to redefine the healthcare system by bringing together all involved authorities and cutting-edge technology makes the most of the data shared between intimately linked technologies that use the IoT platform. IoT is generally anticipated to provide an enhanced device, scheme, and application connectivity that extend over machine-to-machine communications. In the past few years, the development of wearable sensors has offered ease, simplicity, and better health. By making medical sensors smaller and less expensive, technological advancements have boosted the use of these devices. The expertise and abilities of healthcare services, such as remote health monitoring, surgery, rehabilitation, and therapy are improved through medical sensors. Fog computing techniques are also added to enhance precision medicine, obtain real-time data processing, and prevent the connection from failing. As a result, the operating environment for devices is more nimble and local. In this regard, this study suggests an architecture model for the healthcare domain that incorporates the technologies of body area networks, IoT, and Fog computing. The key contribution is to boost the capabilities and resources of IoT devices by using an intermediate Fog layer close to the edge to get beyond IoT restrictions. Experiments show that when compared to other standard architecture, the suggested model can reach a 75% faster response time. The evaluation's results supported the suggested model's ability to accomplish its objectives while maintaining application performance.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133906551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine Learning based framework for Drone Detection and Identification using RF signals 基于机器学习的无人机射频信号检测与识别框架
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068637
Kalit Naresh Inani, K. S. Sangwan, Dhiraj
The recent advancement in the state of art technologies for drones and their reduced cost have made them highly accessible to the general public. Though their application is increasing in several domains, they raise security and privacy issues for military bases and civilians. To prevent this, drone detection and identification using RF signals is explored. The dataset considered in this experimental study is DroneRF dataset. Initially, the raw RF data is preprocessed to extract most relevant features using power spectral density technique which are further utilized for training machine learning classifiers such as XGBoost which gave the best accuracy for 2,4 and 10 category. The XGBoost algorithm with PSD features provides 100%, 100%, and 99.73% accuracy for 2, 4 and 10 category based data. To explore the possibility of feature fusion, another experiment was done XGBoost gave 99.13%, 99.11%, and 93.84% accuracy for 2,4 and 10 class problem. To investigate the usage of deep learning techniques, 1DCNN was used which provides 100%, 94.31%, and 86.29% accuracy scores. The final experiment was done using a Hybrid approach where 1DCNN based feature extractor and XGBoost classifier provides 100%, 99.82%, and 99.51% accuracies.
无人机技术的最新进展及其成本的降低使其高度接近公众。虽然它们在一些领域的应用正在增加,但它们给军事基地和平民带来了安全和隐私问题。为了防止这种情况,探索了使用射频信号的无人机检测和识别。本实验研究考虑的数据集为DroneRF数据集。首先,使用功率谱密度技术对原始RF数据进行预处理以提取最相关的特征,这些特征进一步用于训练机器学习分类器,如XGBoost,它为2、4和10类别提供了最好的精度。具有PSD特性的XGBoost算法为基于2、4和10类的数据提供100%、100%和99.73%的准确率。为了探索特征融合的可能性,在另一个实验中,XGBoost对2、4和10类问题的准确率分别为99.13%、99.11%和93.84%。为了研究深度学习技术的使用情况,我们使用了1DCNN,它提供了100%、94.31%和86.29%的准确率分数。最后的实验是使用混合方法完成的,其中基于1DCNN的特征提取器和XGBoost分类器提供100%,99.82%和99.51%的准确率。
{"title":"Machine Learning based framework for Drone Detection and Identification using RF signals","authors":"Kalit Naresh Inani, K. S. Sangwan, Dhiraj","doi":"10.1109/ICITIIT57246.2023.10068637","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068637","url":null,"abstract":"The recent advancement in the state of art technologies for drones and their reduced cost have made them highly accessible to the general public. Though their application is increasing in several domains, they raise security and privacy issues for military bases and civilians. To prevent this, drone detection and identification using RF signals is explored. The dataset considered in this experimental study is DroneRF dataset. Initially, the raw RF data is preprocessed to extract most relevant features using power spectral density technique which are further utilized for training machine learning classifiers such as XGBoost which gave the best accuracy for 2,4 and 10 category. The XGBoost algorithm with PSD features provides 100%, 100%, and 99.73% accuracy for 2, 4 and 10 category based data. To explore the possibility of feature fusion, another experiment was done XGBoost gave 99.13%, 99.11%, and 93.84% accuracy for 2,4 and 10 class problem. To investigate the usage of deep learning techniques, 1DCNN was used which provides 100%, 94.31%, and 86.29% accuracy scores. The final experiment was done using a Hybrid approach where 1DCNN based feature extractor and XGBoost classifier provides 100%, 99.82%, and 99.51% accuracies.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130039831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web Scrapping Tools and Techniques: A Brief Survey 网页抓取工具和技术:简要调查
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068666
Ruchitaa Raj N R, Nandhakumar Raj S, V. M
Web scraping can be done using many languages such as C++, Java, JavaScript, PhP, Python, Ruby, etc. Among them, Python stands to be the most powerful language with lots of inbuilt libraries that supports web scraping, extensive support for third-party open-source libraries, and higher speeds compared to other languages. Python libraries for web scraping are designed for fast and highly accurate data extraction. There are many libraries available for web scraping and the developer can choose the respective library in accordance with their scraping application. This paper focuses on the study of several web scraping tools and techniques and analyze the performance of those tools and present the statistical significance of the results.
网页抓取可以使用多种语言完成,如c++、Java、JavaScript、PhP、Python、Ruby等。其中,Python是最强大的语言,拥有许多支持web抓取的内置库,对第三方开源库的广泛支持,以及与其他语言相比更高的速度。用于网页抓取的Python库是为快速和高度准确的数据提取而设计的。有许多库可用于web抓取,开发人员可以根据他们的抓取应用程序选择相应的库。本文重点研究了几种网络抓取工具和技术,分析了这些工具的性能,并给出了结果的统计显著性。
{"title":"Web Scrapping Tools and Techniques: A Brief Survey","authors":"Ruchitaa Raj N R, Nandhakumar Raj S, V. M","doi":"10.1109/ICITIIT57246.2023.10068666","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068666","url":null,"abstract":"Web scraping can be done using many languages such as C++, Java, JavaScript, PhP, Python, Ruby, etc. Among them, Python stands to be the most powerful language with lots of inbuilt libraries that supports web scraping, extensive support for third-party open-source libraries, and higher speeds compared to other languages. Python libraries for web scraping are designed for fast and highly accurate data extraction. There are many libraries available for web scraping and the developer can choose the respective library in accordance with their scraping application. This paper focuses on the study of several web scraping tools and techniques and analyze the performance of those tools and present the statistical significance of the results.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130787149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Universal Adversarial Perturbation Attack on the Inception-Resnet-v1 model and the Effectiveness of Adversarial Retraining as a Suitable Defense Mechanism Inception-Resnet-v1模型的普遍对抗性摄动攻击及对抗性再训练作为一种合适防御机制的有效性
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068722
Rithvik Senthil, Lakshana Ravishankar, Snofy D. Dunston, M. V
In this study, we analyse the impact of the Universal Adversarial Perturbation Attack on the Inception-ResNet-v1 model using the lung CT scan dataset for COVID-19 classification and the retinal OCT scan dataset for Diabetic Macular Edema (DME) classification. The effectiveness of adversarial retraining as a suitable defense mechanism against this attack is examined. This study is categorised into three sections - the implementation of the Inception-ResNet-v1 model, the effect of the attack and the adversarial retraining.
在本研究中,我们使用肺部CT扫描数据集用于COVID-19分类和视网膜OCT扫描数据集用于糖尿病性黄斑水肿(DME)分类,分析了通用对抗性扰动攻击对Inception-ResNet-v1模型的影响。对抗性再训练作为一种合适的防御机制的有效性进行了检验。本研究分为三个部分——Inception-ResNet-v1模型的实施、攻击的效果和对抗性再训练。
{"title":"Universal Adversarial Perturbation Attack on the Inception-Resnet-v1 model and the Effectiveness of Adversarial Retraining as a Suitable Defense Mechanism","authors":"Rithvik Senthil, Lakshana Ravishankar, Snofy D. Dunston, M. V","doi":"10.1109/ICITIIT57246.2023.10068722","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068722","url":null,"abstract":"In this study, we analyse the impact of the Universal Adversarial Perturbation Attack on the Inception-ResNet-v1 model using the lung CT scan dataset for COVID-19 classification and the retinal OCT scan dataset for Diabetic Macular Edema (DME) classification. The effectiveness of adversarial retraining as a suitable defense mechanism against this attack is examined. This study is categorised into three sections - the implementation of the Inception-ResNet-v1 model, the effect of the attack and the adversarial retraining.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132107635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pedestrian Direction Estimation: An Approach via Perspective Distortion Patterns 行人方向估计:一种基于视角失真模式的方法
Pub Date : 2023-02-11 DOI: 10.1109/ICITIIT57246.2023.10068588
Sukesh Babu V S, Rahul Raman
Knowledge of pedestrian's walking direction is very crucial in multiple domains of video processing. This paper proposes a graph based, robust and light weighted model for direction estimation of pedestrian's walk by using the property of perspective distortion. Here perspective distortion pattern is used as an advantage in estimation of direction. The graph-based solution uses 3 parallel approaches for estimating the direction: Perspective Distortion Graph, Centroid Displacement and Clustering of Vanishing point. A pedestrian in a frame can be identified by bounding boxes. The temporal dimensional features of bounding boxes are height and width and these features changes for a particular object from frame to frame as the objects moves. These changes are unique for each direction for each object. These changes in dimension along with clustering of vanishing point and centroid displacement is used for the assesment of the pedestrian's walk direction. All the existing approaches need some sort of pre-processing on the frames, which makes the model more complex and time consuming. In the proposed model, the video sequence is applied on YOLO V4 algorithm and bounding boxes are obtained. By analysing the changes from frame to frame for the dimensions, graphs are plotted and minimum and maximum extremas are detected form the graph by eliminating soft extremas. After that envelope is placed for the graph and an average line is drawn based on the envelope, which will give the inference about the direction of walk of the pedestrian. The perspective distortion graph will not give accurate estimation for all directions. So, Centroid displacement and clustering of vanishing point are also used for direction estimation. The result obtained from the three methods are combined and form a robust model. For accurately estimating walk direction, the movement is limited to 8 different directions. For experiment, NITR Conscious Walk dataset and self-acquired dataset are used. With balanced accuracy of 97.003% and 96.25% and a false positive rate of 0.63% and 0.65%, respectively, the model produces good results for the above dataset.
行人的行走方向信息在视频处理的多个领域中都是至关重要的。本文利用透视失真的特性,提出了一种基于图的、鲁棒的、轻权重的行人行走方向估计模型。在这里,透视畸变模式被用作方向估计的优势。基于图的解决方案使用3种并行方法来估计方向:透视失真图、质心位移和消失点聚类。框架中的行人可以通过边界框来识别。边界框的时间维度特征是高度和宽度,随着对象的移动,这些特征会随着特定对象在不同帧之间的移动而变化。这些变化对于每个对象的每个方向都是唯一的。这些维数的变化以及消失点的聚类和质心位移用于行人行走方向的评估。现有的方法都需要对帧进行预处理,这使得模型更加复杂和耗时。在该模型中,将视频序列应用于YOLO V4算法,得到边界框。通过分析各帧之间的维数变化,绘制图形,并通过消除软极值来检测图形的最小和最大极值。然后为图形设置包络,并根据包络绘制一条平均线,从而推断出行人的行走方向。透视畸变图不能对所有方向给出准确的估计。因此,还使用质心位移和消失点聚类进行方向估计。将三种方法得到的结果结合起来,形成一个鲁棒模型。为了准确估计行走方向,运动被限制在8个不同的方向。实验使用了NITR有意识行走数据集和自获取数据集。该模型的平衡准确率分别为97.003%和96.25%,假阳性率分别为0.63%和0.65%,对上述数据集产生了良好的效果。
{"title":"Pedestrian Direction Estimation: An Approach via Perspective Distortion Patterns","authors":"Sukesh Babu V S, Rahul Raman","doi":"10.1109/ICITIIT57246.2023.10068588","DOIUrl":"https://doi.org/10.1109/ICITIIT57246.2023.10068588","url":null,"abstract":"Knowledge of pedestrian's walking direction is very crucial in multiple domains of video processing. This paper proposes a graph based, robust and light weighted model for direction estimation of pedestrian's walk by using the property of perspective distortion. Here perspective distortion pattern is used as an advantage in estimation of direction. The graph-based solution uses 3 parallel approaches for estimating the direction: Perspective Distortion Graph, Centroid Displacement and Clustering of Vanishing point. A pedestrian in a frame can be identified by bounding boxes. The temporal dimensional features of bounding boxes are height and width and these features changes for a particular object from frame to frame as the objects moves. These changes are unique for each direction for each object. These changes in dimension along with clustering of vanishing point and centroid displacement is used for the assesment of the pedestrian's walk direction. All the existing approaches need some sort of pre-processing on the frames, which makes the model more complex and time consuming. In the proposed model, the video sequence is applied on YOLO V4 algorithm and bounding boxes are obtained. By analysing the changes from frame to frame for the dimensions, graphs are plotted and minimum and maximum extremas are detected form the graph by eliminating soft extremas. After that envelope is placed for the graph and an average line is drawn based on the envelope, which will give the inference about the direction of walk of the pedestrian. The perspective distortion graph will not give accurate estimation for all directions. So, Centroid displacement and clustering of vanishing point are also used for direction estimation. The result obtained from the three methods are combined and form a robust model. For accurately estimating walk direction, the movement is limited to 8 different directions. For experiment, NITR Conscious Walk dataset and self-acquired dataset are used. With balanced accuracy of 97.003% and 96.25% and a false positive rate of 0.63% and 0.65%, respectively, the model produces good results for the above dataset.","PeriodicalId":170485,"journal":{"name":"2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133796798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 4th International Conference on Innovative Trends in Information Technology (ICITIIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1