首页 > 最新文献

2021 International Conference on Advances in Computing and Communications (ICACC)最新文献

英文 中文
Semantic Malayalam Dialogue System For Covid-19 Question Answering Using Word Embedding And Cosine Similarity 基于词嵌入和余弦相似度的新冠肺炎语义马拉雅拉姆语问答系统
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708150
S. Liji, P. Muhamed Ilyas
Covid-19 is a global pandemic, has affected millions of people physically and mentally. The dynamic and rapidly growing situation with COVID-19 made it more difficult to discourse accurate and authoritative information about the disease, in most of the Indian local languages like Malayalam. To resolve this issue, here we propose a semantic Malayalam Dialogue System for COVID-19 related Question Answering. This is a user-friendly knowledge system to automatically deliver relevant answers to COVID-19 related queries in the Malayalam language. The proposed system proceeds in three stages; Document pre-processing, Semantic modelling using word embedding and Answer Retrieval. The NLP techniques are used for document processing, word embedding - CBOW and Skip Gram methods, Neural Network models are used for Semantic Modelling and finally, a cosine similarity measure is used to map and retrieve the answers for the user's queries. The experiment was conducted with our own Malayalam dataset; and compared the performance of two Word2Vec algorithms - CBOW and Skip Gram. The result, with our data set, shows that Skip-Gram is more efficient than CBOW and CBOW is faster than the Skip Gram model.
Covid-19是一场全球大流行,影响了数百万人的身心。COVID-19的动态和快速增长的情况使得用大多数印度当地语言(如马拉雅拉姆语)讲述有关该疾病的准确和权威信息变得更加困难。为了解决这个问题,我们提出了一个语义马拉雅拉姆语对话系统,用于COVID-19相关问答。这是一个用户友好的知识系统,可以用马拉雅拉姆语自动提供与COVID-19相关的查询的相关答案。拟议的系统分三个阶段进行;文档预处理,基于词嵌入的语义建模和答案检索。NLP技术用于文档处理,词嵌入- CBOW和跳过图方法,神经网络模型用于语义建模,最后,余弦相似度度量用于映射和检索用户查询的答案。这个实验是用我们自己的马拉雅拉姆数据集进行的;并比较了两种Word2Vec算法——CBOW和Skip Gram的性能。使用我们的数据集,结果表明Skip-Gram模型比CBOW模型更有效,CBOW模型比Skip-Gram模型更快。
{"title":"Semantic Malayalam Dialogue System For Covid-19 Question Answering Using Word Embedding And Cosine Similarity","authors":"S. Liji, P. Muhamed Ilyas","doi":"10.1109/ICACC-202152719.2021.9708150","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708150","url":null,"abstract":"Covid-19 is a global pandemic, has affected millions of people physically and mentally. The dynamic and rapidly growing situation with COVID-19 made it more difficult to discourse accurate and authoritative information about the disease, in most of the Indian local languages like Malayalam. To resolve this issue, here we propose a semantic Malayalam Dialogue System for COVID-19 related Question Answering. This is a user-friendly knowledge system to automatically deliver relevant answers to COVID-19 related queries in the Malayalam language. The proposed system proceeds in three stages; Document pre-processing, Semantic modelling using word embedding and Answer Retrieval. The NLP techniques are used for document processing, word embedding - CBOW and Skip Gram methods, Neural Network models are used for Semantic Modelling and finally, a cosine similarity measure is used to map and retrieve the answers for the user's queries. The experiment was conducted with our own Malayalam dataset; and compared the performance of two Word2Vec algorithms - CBOW and Skip Gram. The result, with our data set, shows that Skip-Gram is more efficient than CBOW and CBOW is faster than the Skip Gram model.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Copy-move Image Forgery Localization Using Deep Feature Pyramidal Network 基于深度特征金字塔网络的复制-移动图像伪造定位
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708244
M. Sabeena, L. Abraham, P. Sreelekshmi
Fake news, frequently making use of tampered photos, has currently emerged as a global epidemic, mainly due to the widespread use of social media as a present alternative to traditional news outlets. This development is often due to the swiftly declining price of advanced cameras and phones, which prompts the simple making of computerized pictures. The accessibility and usability of picture-altering softwares make picture-altering or controlling processes significantly simple, regardless of whether it is for the blameless or malicious plan. Various investigations have been utilized around to distinguish this sort of controlled media to deal with this issue. This paper proposes an efficient technique of copy-move forgery detection using the deep learning method. Two deep learning models such as Buster Net and VGG with FPN are used here to detect copy move forgery in digital images. The two models' performance is evaluated using the CoMoFoD dataset. The experimental result shows that VGG with FPN outperforms the Buster Net model for detecting forgery in images with an accuracy of 99.8% whereas the accuracy for the Buster Net model is 96.9%.
假新闻经常利用篡改的照片,目前已成为一种全球流行病,主要原因是社交媒体被广泛使用,作为传统新闻媒体的替代品。这一发展通常是由于先进相机和手机价格的迅速下降,这促使了计算机图像的简单制作。图片更改软件的可访问性和可用性使更改或控制过程变得非常简单,无论它是出于无可指责的还是恶意的计划。为了解决这一问题,各国利用了各种调查来区分这类受控制的媒体。提出了一种利用深度学习方法进行复制-移动伪造检测的有效方法。利用Buster Net和带FPN的VGG两种深度学习模型检测数字图像中的复制移动伪造。使用CoMoFoD数据集对两种模型的性能进行了评估。实验结果表明,结合FPN的VGG检测图像伪造的准确率为99.8%,优于Buster Net模型,而Buster Net模型的准确率为96.9%。
{"title":"Copy-move Image Forgery Localization Using Deep Feature Pyramidal Network","authors":"M. Sabeena, L. Abraham, P. Sreelekshmi","doi":"10.1109/ICACC-202152719.2021.9708244","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708244","url":null,"abstract":"Fake news, frequently making use of tampered photos, has currently emerged as a global epidemic, mainly due to the widespread use of social media as a present alternative to traditional news outlets. This development is often due to the swiftly declining price of advanced cameras and phones, which prompts the simple making of computerized pictures. The accessibility and usability of picture-altering softwares make picture-altering or controlling processes significantly simple, regardless of whether it is for the blameless or malicious plan. Various investigations have been utilized around to distinguish this sort of controlled media to deal with this issue. This paper proposes an efficient technique of copy-move forgery detection using the deep learning method. Two deep learning models such as Buster Net and VGG with FPN are used here to detect copy move forgery in digital images. The two models' performance is evaluated using the CoMoFoD dataset. The experimental result shows that VGG with FPN outperforms the Buster Net model for detecting forgery in images with an accuracy of 99.8% whereas the accuracy for the Buster Net model is 96.9%.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117222344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A survey on Deep Learning Architectures for effective Crop Data Analytics 有效作物数据分析的深度学习架构研究
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708193
Neenu Johnson, M. B. Santosh Kumar, T. Dhannia
Deep learning has emerged as a precise tool for image and non-image-based data analytics in various domains. Smart farming is a major domain where deep learning approaches have been effectively applied for crop data analytics. Crop monitoring is a significant task in smart farming to enhance agricultural productivity. Accurate prediction of crop yield with limited availability of information related to environmental parameters is the main challenge. Crop diseases are often the major reason for yield loss. In developing countries, rural farmers are not equipped with modern techniques for real-time crop disease detection and thus fail to implement corrective actions. Recently, deep learning approaches have proven to be more effective in generating more accurate results in crop data analytics. In this study, research works pertaining to deep learning-based models applied in crop yield estimation and crop disease detection are reviewed.
深度学习已经成为在各个领域进行图像和非图像数据分析的精确工具。智能农业是深度学习方法有效应用于作物数据分析的主要领域。作物监测是智能农业提高农业生产力的一项重要任务。在与环境参数有关的信息有限的情况下准确预测作物产量是主要的挑战。作物病害往往是造成产量损失的主要原因。在发展中国家,农村农民没有配备实时检测作物病害的现代技术,因此未能实施纠正行动。最近,深度学习方法已被证明在作物数据分析中产生更准确的结果更有效。本文综述了基于深度学习的模型在作物产量估计和作物病害检测中的应用。
{"title":"A survey on Deep Learning Architectures for effective Crop Data Analytics","authors":"Neenu Johnson, M. B. Santosh Kumar, T. Dhannia","doi":"10.1109/ICACC-202152719.2021.9708193","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708193","url":null,"abstract":"Deep learning has emerged as a precise tool for image and non-image-based data analytics in various domains. Smart farming is a major domain where deep learning approaches have been effectively applied for crop data analytics. Crop monitoring is a significant task in smart farming to enhance agricultural productivity. Accurate prediction of crop yield with limited availability of information related to environmental parameters is the main challenge. Crop diseases are often the major reason for yield loss. In developing countries, rural farmers are not equipped with modern techniques for real-time crop disease detection and thus fail to implement corrective actions. Recently, deep learning approaches have proven to be more effective in generating more accurate results in crop data analytics. In this study, research works pertaining to deep learning-based models applied in crop yield estimation and crop disease detection are reviewed.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117234732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Image Encryption Using Chaotic Map And Related Analysis 基于混沌映射的图像加密及其分析
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708189
D. Pradeep, A. Harsha, J. Jacob
The superior breadth of data transmission through the internet is rapidly increasing in the current scenario. The information in the form of images is really critical in the fields of Banking, Military, Medicine, etc, especially, in the medical field as people are unable to travel to different locations, they rely on telemedicine facilities available. All these fields are equally vulnerable to intruders. So, to prevent such an act, encryption of these data in the form of images can be done using chaos encryption. Chaos Encryption has its long way in the field of Secure Communication. Their Unique features offer much more security than any conventional algorithms. There are many simple chaotic maps that could be used for encryption. In this paper, at first Henon chaotic maps is used for the encryption purpose. The comparison of the algorithm with conventional algorithms is also done. Finally, a security analysis for proving the robustness of the algorithm is carried out. Also, different existing and some new versions are compared so as to check whether a new combination could produce a better result. The simulation results show that the proposed algorithm is robust and simple to be used for this application. Also, found a new combination of the map to be used for the application.
在当前情况下,通过互联网传输数据的优越广度正在迅速增加。图像形式的信息在银行、军事、医学等领域非常重要,特别是在医疗领域,由于人们无法前往不同的地点,他们依赖于可用的远程医疗设施。所有这些领域都同样容易受到入侵者的攻击。因此,为了防止这种行为,可以使用混沌加密来加密这些图像形式的数据。混沌加密在安全通信领域有很长的路要走。它们独特的特性提供了比任何传统算法更高的安全性。有许多简单的混沌映射可以用于加密。本文首先采用Henon混沌映射进行加密。并将该算法与传统算法进行了比较。最后,进行了安全性分析,证明了算法的鲁棒性。同时,比较不同的现有版本和一些新的版本,以检查新的组合是否能产生更好的结果。仿真结果表明,该算法鲁棒性好,易于应用。此外,还找到了应用程序要使用的地图的新组合。
{"title":"Image Encryption Using Chaotic Map And Related Analysis","authors":"D. Pradeep, A. Harsha, J. Jacob","doi":"10.1109/ICACC-202152719.2021.9708189","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708189","url":null,"abstract":"The superior breadth of data transmission through the internet is rapidly increasing in the current scenario. The information in the form of images is really critical in the fields of Banking, Military, Medicine, etc, especially, in the medical field as people are unable to travel to different locations, they rely on telemedicine facilities available. All these fields are equally vulnerable to intruders. So, to prevent such an act, encryption of these data in the form of images can be done using chaos encryption. Chaos Encryption has its long way in the field of Secure Communication. Their Unique features offer much more security than any conventional algorithms. There are many simple chaotic maps that could be used for encryption. In this paper, at first Henon chaotic maps is used for the encryption purpose. The comparison of the algorithm with conventional algorithms is also done. Finally, a security analysis for proving the robustness of the algorithm is carried out. Also, different existing and some new versions are compared so as to check whether a new combination could produce a better result. The simulation results show that the proposed algorithm is robust and simple to be used for this application. Also, found a new combination of the map to be used for the application.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improvement of Security in Multi-Biometric Cryptosystem by Modulus Fuzzy Vault Algorithm 用模数模糊保险库算法提高多重生物特征密码系统的安全性
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708136
R. Sreemol, M. B. Santosh Kumar, A. Sreekumar
Numerous prevalent techniques build a Multi-Modal Biometric (MMB) system that struggles in offering security and also revocability onto the templates. This work proffered a MMB system centred on the Modulus Fuzzy Vault (MFV) aimed at resolving these issues. The methodology proposed includes Fingerprint (FP), Palmprint (PP), Ear and also Retina images. Utilizing the Boosted Double Plateau Histogram Equalization (BDPHE) technique, all images are improved. Aimed at removing the unnecessary things as of the ear and the blood vessels are segmented as of the retina images utilizing the Modified Balanced Iterative Reducing and Clustering using Hierarchy (MBIRCH) technique. Next, the input traits features are extracted; then the essential features are chosen as of the features extracted utilizing the Bidirectional Deer Hunting optimization Algorithm (BDHOA). The features chosen are merged utilizing the Normalized Feature Level and Score Level (NFLSL) fusion. The features fused are saved securely utilizing Modulus Fuzzy Vault. Upto fusion, the procedure is repeated aimed at the query image template. Next, the de-Fuzzy Vault procedure is executed aimed at the query template, and then the key is detached by matching the query template’s and input biometric template features. The key separated is analogized with the threshold that categorizes the user as genuine or else imposter. The proposed BDPHE and also MFV techniques function efficiently than the existent techniques.
许多流行的技术构建了一个多模态生物识别(MMB)系统,该系统在为模板提供安全性和可撤销性方面存在困难。这项工作提供了一个以模数模糊Vault (MFV)为中心的MMB系统,旨在解决这些问题。提出的方法包括指纹(FP),掌纹(PP),耳朵和视网膜图像。利用增强双平台直方图均衡化(BDPHE)技术,所有图像都得到了改善。利用改进的均衡迭代约简聚类技术(MBIRCH)对视网膜图像进行分割,目的是去除耳朵和血管等不必要的东西。其次,提取输入特征特征;然后利用双向猎鹿优化算法(BDHOA)从提取的特征中选择基本特征。选择的特征利用归一化特征水平和分数水平(NFLSL)融合进行合并。利用模数模糊保险库对融合的特征进行安全保存。直到融合,该过程是针对查询图像模板重复。接下来,针对查询模板执行去模糊Vault过程,然后通过匹配查询模板和输入生物识别模板的特征来分离密钥。分隔的键与将用户分类为正版或冒名顶替者的阈值类似。所提出的BDPHE和MFV技术比现有的技术更有效。
{"title":"Improvement of Security in Multi-Biometric Cryptosystem by Modulus Fuzzy Vault Algorithm","authors":"R. Sreemol, M. B. Santosh Kumar, A. Sreekumar","doi":"10.1109/ICACC-202152719.2021.9708136","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708136","url":null,"abstract":"Numerous prevalent techniques build a Multi-Modal Biometric (MMB) system that struggles in offering security and also revocability onto the templates. This work proffered a MMB system centred on the Modulus Fuzzy Vault (MFV) aimed at resolving these issues. The methodology proposed includes Fingerprint (FP), Palmprint (PP), Ear and also Retina images. Utilizing the Boosted Double Plateau Histogram Equalization (BDPHE) technique, all images are improved. Aimed at removing the unnecessary things as of the ear and the blood vessels are segmented as of the retina images utilizing the Modified Balanced Iterative Reducing and Clustering using Hierarchy (MBIRCH) technique. Next, the input traits features are extracted; then the essential features are chosen as of the features extracted utilizing the Bidirectional Deer Hunting optimization Algorithm (BDHOA). The features chosen are merged utilizing the Normalized Feature Level and Score Level (NFLSL) fusion. The features fused are saved securely utilizing Modulus Fuzzy Vault. Upto fusion, the procedure is repeated aimed at the query image template. Next, the de-Fuzzy Vault procedure is executed aimed at the query template, and then the key is detached by matching the query template’s and input biometric template features. The key separated is analogized with the threshold that categorizes the user as genuine or else imposter. The proposed BDPHE and also MFV techniques function efficiently than the existent techniques.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133893083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Attitude Control Of Launch Vehicle Using H∞ Controller 基于H∞控制器的运载火箭鲁棒姿态控制
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708352
Keziah Elizabeth George, Angel Mary, A. M. Varghese, M. Sivadas, Ambili Mohan, Akhil Santhosh
A launch vehicle(LV) or carrier rocket is a rocket-driven vehicle used to move a payload from the surface of the Earth to space. A typical LV consists of lateral and longitudinal dynamics. This paper addresses the control of a LV’s longitudinal dynamics. The control strategy focuses predominantly on the control of pitch angle. Only the rigid body dynamics of a launch vehicle system is considered. Here, an H Infinity (H∞) control method is developed for governing the pitch angle. MATLAB software is used for the simulation of the controller. The desired specifications are chosen for the nominal plant and the controller is designed by appropriate weight selection process. Later, robustness and disturbance checks were analyzed. The result of the simulation shows that the designed controller is robust and is able to handle perturbations.
运载火箭(LV)或运载火箭是一种火箭驱动的运载工具,用于将有效载荷从地球表面移动到太空。典型的左室由横向和纵向动力学组成。本文研究了轻型汽车纵向动力学控制问题。控制策略主要集中在俯仰角的控制上。本文只考虑了运载火箭系统的刚体动力学。本文提出了一种控制俯仰角的H∞(H∞)控制方法。采用MATLAB软件对控制器进行仿真。为标称装置选择所需的规格,并通过适当的重量选择过程设计控制器。然后进行鲁棒性和扰动检验。仿真结果表明,所设计的控制器具有较强的鲁棒性和抗干扰能力。
{"title":"Robust Attitude Control Of Launch Vehicle Using H∞ Controller","authors":"Keziah Elizabeth George, Angel Mary, A. M. Varghese, M. Sivadas, Ambili Mohan, Akhil Santhosh","doi":"10.1109/ICACC-202152719.2021.9708352","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708352","url":null,"abstract":"A launch vehicle(LV) or carrier rocket is a rocket-driven vehicle used to move a payload from the surface of the Earth to space. A typical LV consists of lateral and longitudinal dynamics. This paper addresses the control of a LV’s longitudinal dynamics. The control strategy focuses predominantly on the control of pitch angle. Only the rigid body dynamics of a launch vehicle system is considered. Here, an H Infinity (H∞) control method is developed for governing the pitch angle. MATLAB software is used for the simulation of the controller. The desired specifications are chosen for the nominal plant and the controller is designed by appropriate weight selection process. Later, robustness and disturbance checks were analyzed. The result of the simulation shows that the designed controller is robust and is able to handle perturbations.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time Vision-based Bangla Sign Language Detection using Convolutional Neural Network 基于卷积神经网络的实时视觉孟加拉语手语检测
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708141
Riyad Bin Rafiq, S. Hakim, Thasina Tabashum
Sign Language is an essential means of communication for people with speech and hearing impairment. In spite of this, there are no effective tools to assist the social interaction between Bangla sign language speakers and non-sign language speakers. Our main objective is to implement an automated translation system that is capable of translating Bangla sign language to Bangla text using common computing environments such as a computer and a generic webcam. The dataset has been created for this project with 1500 images for 10 signs. A seven-layered custom sequential CNN model has been trained and validated with the processed dataset. For real-time detection, we have extracted the region of interest and then detected the specified sign. The system runs in real-time and can provide output from a video feed with a time delay of 120.6 ms. Our system has been tested for an accuracy of 97.0%.
手语是有语言和听力障碍的人交流的重要手段。尽管如此,没有有效的工具来帮助孟加拉语手语使用者和非手语使用者之间的社会互动。我们的主要目标是实现一个自动翻译系统,该系统能够使用普通的计算环境(如计算机和通用网络摄像头)将孟加拉语手语翻译成孟加拉语文本。这个数据集已经为这个项目创建了1500个图像,有10个标志。使用处理后的数据集训练并验证了一个七层自定义顺序CNN模型。为了实时检测,我们提取了感兴趣的区域,然后检测指定的符号。该系统是实时运行的,可以提供时间延迟为120.6 ms的视频输出。经过测试,我们的系统的准确率为97.0%。
{"title":"Real-time Vision-based Bangla Sign Language Detection using Convolutional Neural Network","authors":"Riyad Bin Rafiq, S. Hakim, Thasina Tabashum","doi":"10.1109/ICACC-202152719.2021.9708141","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708141","url":null,"abstract":"Sign Language is an essential means of communication for people with speech and hearing impairment. In spite of this, there are no effective tools to assist the social interaction between Bangla sign language speakers and non-sign language speakers. Our main objective is to implement an automated translation system that is capable of translating Bangla sign language to Bangla text using common computing environments such as a computer and a generic webcam. The dataset has been created for this project with 1500 images for 10 signs. A seven-layered custom sequential CNN model has been trained and validated with the processed dataset. For real-time detection, we have extracted the region of interest and then detected the specified sign. The system runs in real-time and can provide output from a video feed with a time delay of 120.6 ms. Our system has been tested for an accuracy of 97.0%.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131349449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vulnerability Analysis and Testing of Wireless Networks through Warstorming 基于Warstorming的无线网络漏洞分析与测试
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708344
Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya
With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.
随着世界迅速转向数字和无线技术,为了避免冲突和保护数据,必须考虑可见性和脆弱性,因为安全是需要解决的主要问题。该系统通过编程的无人机系统(UAS)测试无线网络,该系统检测并帮助分析获得的数据集,例如接入点的位置、媒体访问控制(MAC)地址、身份验证、电源、隐私和密码设置,然后对其进行过滤和分类,以热图和柱状图的形式直观地表示。该模型的后一种工作涉及各种攻击,如去认证攻击、信标攻击、探针攻击和流氓接入点,这些攻击有助于通信干扰、拒绝服务(DoS)、接入点复制和相同的日志数据;这些展示了安全性的强度,并且可以开发用于防御目的和威胁分析。
{"title":"Vulnerability Analysis and Testing of Wireless Networks through Warstorming","authors":"Mohit Taneja, S. Bhiwapurkar, N. Mohanty, B. Bhattacharyya","doi":"10.1109/ICACC-202152719.2021.9708344","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708344","url":null,"abstract":"With the world rapidly shifting towards digital and wireless technology, visibility and vulnerability are to be taken into consideration in order to avoid conflict and protect one’s data since security is a major concern to be addressed. The proposed system tests wireless networks through a programmed Unmanned Aircraft System (UAS) which detects and helps analyze datasets obtained such as locations of Access Points, Media Access Control (MAC) addresses, authentication, power, privacy, and cipher settings, which are then filtered and sorted to be represented visually in the form of heatmap and bar charts. The latter working of the model involves various attacks like Deauthentication attack, Beacon attack, Probe attack and Rogue Access Points which contribute to communication jamming, Denial of Service (DoS), replication of Access Points and logging data of the same; These showcase strength of security and can be developed to contribute in defense purposes and threat analysis.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review on Battery Management system and its Application in Electric vehicle 电池管理系统及其在电动汽车中的应用综述
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708114
Smaranika Mishra, S. Swain, Rajat Kumar Samantaray
Presently electric vehicles (EVs) are considered as most propitious solution for the replacement of internal combustion (IC) engine-based vehicle. The development of EV technologies is growing rapidly and the battery technology is an important concept for development of the electric vehicles. The EV performance mainly relies on the battery performance and battery management system (BMS). Recently, the Lithium-ion (Li-ion) battery is mainly used as a battery in EVs due to smaller weight, high energy density and capability of fast charging and discharging. Considering the dynamic performance, economy, safety friendliness to the environment of the EVs, the BMS is designed such a way to meet the challenges like the energy management of battery, reduction of heating-time at low temperature and enhancing remaining-useful life (RUL) with accuracy of prediction. The battery is managed and controlled by BMS and it is mainly focused to maintain the reliability and safety. The state estimation of the battery is essential for vehicle control and management of energy. The paper gives review on the strategies like battery modeling, state estimation and prediction. The state estimation for State of charge (SOC), State of power (SOP), State of health (SOH) and prediction of RUL are overviewed.
目前,电动汽车被认为是替代内燃机汽车的最有利的解决方案。电动汽车技术发展迅速,电池技术是电动汽车发展的重要概念。电动汽车的性能主要取决于电池性能和电池管理系统(BMS)。近年来,锂离子(Li-ion)电池以其重量轻、能量密度高、快速充放电能力强等优点被广泛应用于电动汽车的电池中。考虑到电动汽车的动力性、经济性、安全环保性,BMS的设计旨在满足电池能量管理、减少低温加热时间、提高剩余使用寿命(RUL)和预测精度等方面的挑战。电池是由BMS管理和控制的,主要是维护电池的可靠性和安全性。电池的状态估计是车辆能量控制和管理的关键。本文对电池建模、状态估计和预测等策略进行了综述。综述了荷电状态(SOC)、电量状态(SOP)、健康状态(SOH)的状态估计和RUL的预测。
{"title":"A Review on Battery Management system and its Application in Electric vehicle","authors":"Smaranika Mishra, S. Swain, Rajat Kumar Samantaray","doi":"10.1109/ICACC-202152719.2021.9708114","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708114","url":null,"abstract":"Presently electric vehicles (EVs) are considered as most propitious solution for the replacement of internal combustion (IC) engine-based vehicle. The development of EV technologies is growing rapidly and the battery technology is an important concept for development of the electric vehicles. The EV performance mainly relies on the battery performance and battery management system (BMS). Recently, the Lithium-ion (Li-ion) battery is mainly used as a battery in EVs due to smaller weight, high energy density and capability of fast charging and discharging. Considering the dynamic performance, economy, safety friendliness to the environment of the EVs, the BMS is designed such a way to meet the challenges like the energy management of battery, reduction of heating-time at low temperature and enhancing remaining-useful life (RUL) with accuracy of prediction. The battery is managed and controlled by BMS and it is mainly focused to maintain the reliability and safety. The state estimation of the battery is essential for vehicle control and management of energy. The paper gives review on the strategies like battery modeling, state estimation and prediction. The state estimation for State of charge (SOC), State of power (SOP), State of health (SOH) and prediction of RUL are overviewed.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Object Classification in Underwater SONAR Images using Transfer Learning Based Ensemble Model 基于迁移学习集成模型的水下声纳图像目标分类
Pub Date : 2021-10-21 DOI: 10.1109/ICACC-202152719.2021.9708373
G. Divyabarathi, S. Shailesh, M. V. Judy
Advancements in machine learning and deep learning avails the opportunity to enhance our customisation to crucial problems widely in any domain. Object detection in underwater sonar is evolving and deep learning provides reliable techniques. In our experiments we approached the sonar object classification with transfer learning and ensemble approach which produced better results than single machine learning and deep learning algorithms for the task. The preliminary step of feature extraction preserves complex and significant structures from the image data and improves classification performance. Also experiment model overcomes the scarce training data with predefined model, ResNet50. Optimized classification results achieved with ensemble classifiers for the sonar objects.
机器学习和深度学习的进步使我们有机会对任何领域的关键问题进行广泛的定制。水下声纳的目标检测正在不断发展,而深度学习提供了可靠的技术。在我们的实验中,我们使用迁移学习和集成方法来处理声纳目标分类,这比单一的机器学习和深度学习算法产生了更好的结果。特征提取的初步步骤保留了图像数据中复杂和重要的结构,提高了分类性能。实验模型利用预定义模型ResNet50克服了训练数据稀缺的问题。集成分类器对声纳目标的分类效果进行了优化。
{"title":"Object Classification in Underwater SONAR Images using Transfer Learning Based Ensemble Model","authors":"G. Divyabarathi, S. Shailesh, M. V. Judy","doi":"10.1109/ICACC-202152719.2021.9708373","DOIUrl":"https://doi.org/10.1109/ICACC-202152719.2021.9708373","url":null,"abstract":"Advancements in machine learning and deep learning avails the opportunity to enhance our customisation to crucial problems widely in any domain. Object detection in underwater sonar is evolving and deep learning provides reliable techniques. In our experiments we approached the sonar object classification with transfer learning and ensemble approach which produced better results than single machine learning and deep learning algorithms for the task. The preliminary step of feature extraction preserves complex and significant structures from the image data and improves classification performance. Also experiment model overcomes the scarce training data with predefined model, ResNet50. Optimized classification results achieved with ensemble classifiers for the sonar objects.","PeriodicalId":198810,"journal":{"name":"2021 International Conference on Advances in Computing and Communications (ICACC)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124645392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Advances in Computing and Communications (ICACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1