首页 > 最新文献

2022 International Conference on Connected Systems & Intelligence (CSI)最新文献

英文 中文
Indian Text to Speech Systems: A Short Survey 印度文本到语音系统:一个简短的调查
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924085
Jayashree Nair, Akhila Krishnan, Vrinda S
Speech and spoken words have always played a key role in everyday life. Speech synthesis is a means of artificially synthesizing speech, whereas text-to-speech (TTS) is a technology that converts written text in a human language into an analogous spoken waveform [speech form].The written form is represented by the text, a sequence of characters, whereas the verbal form is represented by the speech. TTS synthesizers are computer-based systems that read text out loud. The TTS system is divided into two phases: text processing and speech creation. Despite the availability of several TTS systems in various languages, Indian languages continue to lag behind in terms of producing high-quality speech. Acceptability and intelligibility are used to rate the quality of speech. The main objective of this paper is to perform a study on available text-to-speech technologies in Indian languages.
演讲和口语在日常生活中一直扮演着关键的角色。语音合成是一种人工合成语音的手段,而文本到语音(TTS)是一种将人类语言中的书面文本转换为类似的口头波形[语音形式]的技术。书面形式由文本(一串字符)表示,而口头形式由言语表示。TTS合成器是基于计算机的系统,可以大声朗读文本。TTS系统分为两个阶段:文本处理和语音生成。尽管有几种不同语言的TTS系统,但印度语言在产生高质量语音方面仍然落后。可接受性和可理解性是用来评价语音质量的。本文的主要目的是对印度语言中可用的文本到语音技术进行研究。
{"title":"Indian Text to Speech Systems: A Short Survey","authors":"Jayashree Nair, Akhila Krishnan, Vrinda S","doi":"10.1109/CSI54720.2022.9924085","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924085","url":null,"abstract":"Speech and spoken words have always played a key role in everyday life. Speech synthesis is a means of artificially synthesizing speech, whereas text-to-speech (TTS) is a technology that converts written text in a human language into an analogous spoken waveform [speech form].The written form is represented by the text, a sequence of characters, whereas the verbal form is represented by the speech. TTS synthesizers are computer-based systems that read text out loud. The TTS system is divided into two phases: text processing and speech creation. Despite the availability of several TTS systems in various languages, Indian languages continue to lag behind in terms of producing high-quality speech. Acceptability and intelligibility are used to rate the quality of speech. The main objective of this paper is to perform a study on available text-to-speech technologies in Indian languages.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"2009 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127323823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT) 物联网(IoT)现状下的安全挑战与前瞻性措施
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923984
Ranjith J., V. M
This paper provides a high-level review and evaluation of the present situation regarding IoT Securities. An Internet of Things design seeks to connect everyone with anything they want, whenever they want it. The perception layer, network layer, the application layer is the most important three layers which mainly make the Internet of Things. To achieve a stable IoT reality, a range of safety precautions must be imposed at each tier. The only way to assure the future of the IoT infrastructure is to address and resolve the security issues that it has. Many researchers have attempted to address the security concerns specific to IoT layers and devices by applying suitable measures. This paper provides a top level view of safety ideas, technology and security problems, possible remedies, and the IoT's future directions for securing and also in this paper, a depth evaluation of the safety associated demanding situations and raw sources of danger with inside the IoT programs have been showcased. Latter discussion on the safety issue, diverse rising and present technology centered for attaining an excessive diploma of agree with inside the IoT programs are discussed.
本文对物联网证券的现状进行了高层次的回顾和评估。物联网设计旨在将每个人与他们想要的任何东西联系起来,无论他们何时想要。感知层、网络层、应用层是构成物联网最重要的三层。为了实现稳定的物联网现实,必须在每一层实施一系列安全预防措施。确保物联网基础设施未来的唯一方法是解决和解决其存在的安全问题。许多研究人员试图通过应用适当的措施来解决物联网层和设备特有的安全问题。本文提供了安全思想、技术和安全问题、可能的补救措施以及物联网未来的安全方向的顶层视图,并且在本文中,还展示了物联网程序内部与安全相关的要求情况和原始危险源的深度评估。随后讨论了安全问题,各种新兴技术和现有技术,这些技术以在物联网项目中获得更多的认可为中心。
{"title":"Security Challenges Prospective Measures In The Current Status of Internet of Things (IoT)","authors":"Ranjith J., V. M","doi":"10.1109/CSI54720.2022.9923984","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923984","url":null,"abstract":"This paper provides a high-level review and evaluation of the present situation regarding IoT Securities. An Internet of Things design seeks to connect everyone with anything they want, whenever they want it. The perception layer, network layer, the application layer is the most important three layers which mainly make the Internet of Things. To achieve a stable IoT reality, a range of safety precautions must be imposed at each tier. The only way to assure the future of the IoT infrastructure is to address and resolve the security issues that it has. Many researchers have attempted to address the security concerns specific to IoT layers and devices by applying suitable measures. This paper provides a top level view of safety ideas, technology and security problems, possible remedies, and the IoT's future directions for securing and also in this paper, a depth evaluation of the safety associated demanding situations and raw sources of danger with inside the IoT programs have been showcased. Latter discussion on the safety issue, diverse rising and present technology centered for attaining an excessive diploma of agree with inside the IoT programs are discussed.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126796388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Knowledge Graph Approach towards Re-structuring of Scientific Articles 面向科技文章重构的知识图谱方法
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923954
Nikhitha Mani, Sandhya Harikumar
With expedition of huge number of research articles published in each domain, retrieval of relevant articles based on researcher's interest and requirement have become challenging. Further, there are circumstances where a researcher may not get the specific information sought after, regardless of whether it is there in the document collection. This is since the article in database is structured only based on title and citation data while the conceptual information and algorithms described inside an article are disregarded. In this work, we propose a useful methodology for re-structuring documents in the database by considering the document as a whole and representing the keywords and key-phrases extracted from the article data using Knowledge Graphs. Clustering of nodes of graph segregate articles into different domains and sub-domains. Knowledge graph is further explored to identify most important documents using modularity and then the documents are sorted based on relevance. Thus, proper structuring of the documents helps the researchers to recognize applicable content from a large database in short span of time since database associated with the query system is improvised. This technique is beneficial to all the researchers who are trying to resolve a problem by identifying apt documents for information need.
随着各个领域发表的研究论文数量的激增,根据研究者的兴趣和需求来检索相关的文章已经成为一个挑战。此外,在某些情况下,研究人员可能无法获得所寻求的特定信息,无论它是否存在于文件集合中。这是因为数据库中的文章仅基于标题和引文数据进行结构化,而忽略了文章中描述的概念信息和算法。在这项工作中,我们提出了一种有用的方法来重构数据库中的文档,将文档视为一个整体,并使用知识图表示从文章数据中提取的关键字和关键短语。图的节点聚类将文章分离到不同的域和子域。进一步探索知识图谱,利用模块化的方法识别出最重要的文档,然后根据相关性对文档进行排序。因此,适当的文档结构有助于研究人员在短时间内从大型数据库中识别出适用的内容,因为与查询系统相关联的数据库是临时创建的。该技术对所有试图通过识别适合信息需求的文档来解决问题的研究人员都是有益的。
{"title":"A Knowledge Graph Approach towards Re-structuring of Scientific Articles","authors":"Nikhitha Mani, Sandhya Harikumar","doi":"10.1109/CSI54720.2022.9923954","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923954","url":null,"abstract":"With expedition of huge number of research articles published in each domain, retrieval of relevant articles based on researcher's interest and requirement have become challenging. Further, there are circumstances where a researcher may not get the specific information sought after, regardless of whether it is there in the document collection. This is since the article in database is structured only based on title and citation data while the conceptual information and algorithms described inside an article are disregarded. In this work, we propose a useful methodology for re-structuring documents in the database by considering the document as a whole and representing the keywords and key-phrases extracted from the article data using Knowledge Graphs. Clustering of nodes of graph segregate articles into different domains and sub-domains. Knowledge graph is further explored to identify most important documents using modularity and then the documents are sorted based on relevance. Thus, proper structuring of the documents helps the researchers to recognize applicable content from a large database in short span of time since database associated with the query system is improvised. This technique is beneficial to all the researchers who are trying to resolve a problem by identifying apt documents for information need.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123108244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Islamophobic Tweet Detection using Transfer Learning 使用迁移学习的伊斯兰恐惧症推文检测
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923957
Mohd. Belal, Ghufran Ullah, Abdullah Ahmad Khan
Segregating Islamophobic hate speech from other instances of offensive language is a serious hurdle for automatic hate-speech detection on social media platforms such as Twitter. Because lexical detection methods classify all messages containing particular terms like hate speech, previous work using supervised learning has failed to differentiate between these categories. This task is complex due to the level of difficulty in natural language constructs. We have worked on a transfer learning approach using Universal Language Model Fine-tuning (ULMFIT), an efficient method that can be applied to classification tasks. Our method gave more than 80 percent accuracy and the confusion matrix thus formed was successfully able to classify those datasets proportionally into each block. The use of Deep learning in text classification has been underutilized. This method will contribute to solving the spread of Islamophobia which hasn't been taken into consideration when taking action against online hate
在Twitter等社交媒体平台上,将仇视伊斯兰教的仇恨言论与其他攻击性语言区分开来,是自动检测仇恨言论的一个严重障碍。由于词汇检测方法对包含仇恨言论等特定术语的所有信息进行分类,因此之前使用监督学习的工作未能区分这些类别。由于自然语言结构的难度,这项任务很复杂。我们研究了一种使用通用语言模型微调(ULMFIT)的迁移学习方法,这是一种可以应用于分类任务的有效方法。我们的方法给出了超过80%的准确率,并且由此形成的混淆矩阵能够成功地将这些数据集按比例分类到每个块中。深度学习在文本分类中的应用尚未得到充分利用。这种方法将有助于解决伊斯兰恐惧症的蔓延,而在采取行动打击网络仇恨时,这一问题并未被考虑在内
{"title":"Islamophobic Tweet Detection using Transfer Learning","authors":"Mohd. Belal, Ghufran Ullah, Abdullah Ahmad Khan","doi":"10.1109/CSI54720.2022.9923957","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923957","url":null,"abstract":"Segregating Islamophobic hate speech from other instances of offensive language is a serious hurdle for automatic hate-speech detection on social media platforms such as Twitter. Because lexical detection methods classify all messages containing particular terms like hate speech, previous work using supervised learning has failed to differentiate between these categories. This task is complex due to the level of difficulty in natural language constructs. We have worked on a transfer learning approach using Universal Language Model Fine-tuning (ULMFIT), an efficient method that can be applied to classification tasks. Our method gave more than 80 percent accuracy and the confusion matrix thus formed was successfully able to classify those datasets proportionally into each block. The use of Deep learning in text classification has been underutilized. This method will contribute to solving the spread of Islamophobia which hasn't been taken into consideration when taking action against online hate","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129226169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IOT Based Contactless Visitor Approval and Parcel Sanitization System For COVID -19 基于物联网的非接触式访客审批和包裹消毒系统
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924076
Saloni Koshe, Shreyas Neeraj Khandekar, K. Sriharipriya, R. Sujatha, G. Sumathi
The COVID-19 epidemic has claimed thousands of lives throughout the world and poses an unprecedented threat to public health, food systems, and occupational safety. The economic and societal impacts of the epidemic are severe. Along with maintaining hygiene and wearing masks, it is equally important to reduce contact with people and stay indoors to the extent possible. Keeping this precautionary measure in mind, we have created an IoT system based on a contactless guest approval using Raspberry Pi and Arduino in this article. It uses a camera to watch visits at the front door, and the entire system is automated using email notifications and image recognition. During package deliveries, an automatic package box with UV light sanitation is created to prevent contamination in the house from the outside. The entire device implements the project's various capabilities while avoiding any external contact.
2019冠状病毒病疫情在全球夺走了数千人的生命,对公共卫生、食品系统和职业安全构成了前所未有的威胁。这一流行病造成严重的经济和社会影响。除了保持卫生和戴口罩外,减少与人接触并尽可能呆在室内也同样重要。考虑到这一预防措施,我们在本文中使用树莓派和Arduino创建了一个基于非接触式访客审批的物联网系统。它使用摄像头监视前门的访客,整个系统通过电子邮件通知和图像识别实现自动化。在运送包裹的过程中,一个带有紫外线卫生的自动包装盒被创造出来,以防止房屋受到外界的污染。整个设备实现了项目的各种功能,同时避免了任何外部接触。
{"title":"IOT Based Contactless Visitor Approval and Parcel Sanitization System For COVID -19","authors":"Saloni Koshe, Shreyas Neeraj Khandekar, K. Sriharipriya, R. Sujatha, G. Sumathi","doi":"10.1109/CSI54720.2022.9924076","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924076","url":null,"abstract":"The COVID-19 epidemic has claimed thousands of lives throughout the world and poses an unprecedented threat to public health, food systems, and occupational safety. The economic and societal impacts of the epidemic are severe. Along with maintaining hygiene and wearing masks, it is equally important to reduce contact with people and stay indoors to the extent possible. Keeping this precautionary measure in mind, we have created an IoT system based on a contactless guest approval using Raspberry Pi and Arduino in this article. It uses a camera to watch visits at the front door, and the entire system is automated using email notifications and image recognition. During package deliveries, an automatic package box with UV light sanitation is created to prevent contamination in the house from the outside. The entire device implements the project's various capabilities while avoiding any external contact.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124507684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced edge offloading using Reinforcement learning 使用强化学习增强边缘卸载
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924023
Abhishek Jain, Neena Goveas
Internet of Things (IoT) based solutions requiring real time results from intensive computation tasks or having large scale data analysis have traditionally been designed with offloading of the work to cloud infrastructure. This has been found to be not an ideal solution due to several issues related to network uncertainties, cost of cloud usage etc. This is especially true for systems with both hard time constraints and large amount of data. Edge computing, with its hierarchical configuration has been proposed to solve these issues. This has led to researchers proposing several algorithms to optimise offloading of computation to the layers of this hierarchy. In this work we propose the use of an actor-critic based reinforcement learning mechanism to solve the offloading planning for a general hierarchical system with multiple end nodes and multiple edge servers. Our simulation based results shows that the proposed method improves the performance of the system as compared to the existing benchmark offloading policies.
传统上,基于物联网(IoT)的解决方案需要从密集的计算任务或大规模数据分析中获得实时结果,并将工作卸载到云基础设施中。由于与网络不确定性、云使用成本等相关的几个问题,这已被发现不是一个理想的解决方案。这对于既有硬性时间限制又有大量数据的系统尤其如此。为了解决这些问题,人们提出了边缘计算的分层结构。这导致研究人员提出了几种算法来优化将计算卸载到这个层次结构的各个层。在这项工作中,我们提出使用基于actor-critic的强化学习机制来解决具有多个终端节点和多个边缘服务器的通用分层系统的卸载规划。仿真结果表明,与现有的基准卸载策略相比,所提出的方法提高了系统的性能。
{"title":"Enhanced edge offloading using Reinforcement learning","authors":"Abhishek Jain, Neena Goveas","doi":"10.1109/CSI54720.2022.9924023","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924023","url":null,"abstract":"Internet of Things (IoT) based solutions requiring real time results from intensive computation tasks or having large scale data analysis have traditionally been designed with offloading of the work to cloud infrastructure. This has been found to be not an ideal solution due to several issues related to network uncertainties, cost of cloud usage etc. This is especially true for systems with both hard time constraints and large amount of data. Edge computing, with its hierarchical configuration has been proposed to solve these issues. This has led to researchers proposing several algorithms to optimise offloading of computation to the layers of this hierarchy. In this work we propose the use of an actor-critic based reinforcement learning mechanism to solve the offloading planning for a general hierarchical system with multiple end nodes and multiple edge servers. Our simulation based results shows that the proposed method improves the performance of the system as compared to the existing benchmark offloading policies.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132172972","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truth Inference in Crowdsourcing Under Adversarial Attacks 对抗性攻击下众包的真相推断
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923985
A. Kurup, G. Sajeev, Swaminathan J
Crowdsourcing is an information system that provides a cost-effective way of solving computationally challenging problems. However, it is potentially vulnerable to adversarial attacks as the service provider cannot manage workers' behavior. Malicious workers provide unreliable answers to manipulate the system. These attacks affect the truth inference process and thus leads to wrong answers for a targeted set of tasks. Eventually, this reduces the accuracy of aggregated results. Existing works have proposed various types of attacks in crowdsourcing systems and indicate that truth inference is the most affected one. So, we propose methods for defending these attacks for improving the truth inference process. We empirically evaluate the proposed truth inference method on a real and synthetic dataset. The performance of the proposed method is verified, and the results show that it is robust to adversarial attacks with comparable accuracy.
众包是一种信息系统,它提供了一种具有成本效益的方式来解决计算上具有挑战性的问题。然而,由于服务提供者无法管理工作人员的行为,因此它可能容易受到对抗性攻击。恶意工作者提供不可靠的答案来操纵系统。这些攻击会影响真理推理过程,从而导致目标任务组的错误答案。最终,这会降低聚合结果的准确性。已有的研究已经提出了众包系统中各种类型的攻击,并表明真相推断是受影响最大的一种。因此,我们提出了防御这些攻击的方法,以改善真值推理过程。我们在真实数据集和合成数据集上对所提出的真值推理方法进行了实证评估。验证了该方法的性能,结果表明该方法对对抗性攻击具有较强的鲁棒性,且精度相当。
{"title":"Truth Inference in Crowdsourcing Under Adversarial Attacks","authors":"A. Kurup, G. Sajeev, Swaminathan J","doi":"10.1109/CSI54720.2022.9923985","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923985","url":null,"abstract":"Crowdsourcing is an information system that provides a cost-effective way of solving computationally challenging problems. However, it is potentially vulnerable to adversarial attacks as the service provider cannot manage workers' behavior. Malicious workers provide unreliable answers to manipulate the system. These attacks affect the truth inference process and thus leads to wrong answers for a targeted set of tasks. Eventually, this reduces the accuracy of aggregated results. Existing works have proposed various types of attacks in crowdsourcing systems and indicate that truth inference is the most affected one. So, we propose methods for defending these attacks for improving the truth inference process. We empirically evaluate the proposed truth inference method on a real and synthetic dataset. The performance of the proposed method is verified, and the results show that it is robust to adversarial attacks with comparable accuracy.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121838438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN and Autoencoders based Hybrid Deep Learning Model for Crop Disease Detection 基于CNN和自编码器的作物病害检测混合深度学习模型
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923983
Aashish, Aditya Thakkar, Shubham Yadav, Sandeep Saini, K. Lata
Indian agriculture is quite diverse and plays a vital role in the country's economic growth. The tools and techniques used in agriculture are no more primitive. With the gradual evolution of the population, this sector is under severe pressure to produce at high efficiency. One of the significant factors in improving crop harvest is the timely detection of crop diseases. The farmers use scouting to monitor their crops, which requires extensive labor and is time-consuming. Image processing-based disease identification makes the process faster and more accurate. Recently, deep learning techniques have been deployed for automatic plant disease identification. Researchers have used Convolutional Neural Networks (CNN) to predict the type of diseases in different crops accurately. Considering the advantages of autoencoders and CNN, we have proposed and developed a hybrid deep learning model based on CNN and Autoencoders to detect multiple plant diseases. The proposed architecture is fine-tuned to detect diseases of numerous crops. The proposed model provides higher accuracy when compared with similar systems. We have tested our model using the Plant village dataset containing almost 15 different types of crops.
印度的农业相当多样化,在该国的经济增长中起着至关重要的作用。农业中使用的工具和技术也不再原始。随着人口的逐渐演变,该部门面临着高效生产的巨大压力。作物病害的及时发现是提高作物产量的重要因素之一。农民们用侦察来监视他们的庄稼,这需要大量的劳动,而且很耗时。基于图像处理的疾病识别使过程更快、更准确。近年来,深度学习技术已被应用于植物病害的自动识别。研究人员使用卷积神经网络(CNN)来准确预测不同作物的疾病类型。考虑到自编码器和CNN的优势,我们提出并开发了一种基于CNN和自编码器的混合深度学习模型来检测多种植物病害。所提出的结构经过微调,可以检测多种作物的病害。与同类系统相比,该模型具有更高的精度。我们使用包含近15种不同类型作物的Plant village数据集测试了我们的模型。
{"title":"CNN and Autoencoders based Hybrid Deep Learning Model for Crop Disease Detection","authors":"Aashish, Aditya Thakkar, Shubham Yadav, Sandeep Saini, K. Lata","doi":"10.1109/CSI54720.2022.9923983","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923983","url":null,"abstract":"Indian agriculture is quite diverse and plays a vital role in the country's economic growth. The tools and techniques used in agriculture are no more primitive. With the gradual evolution of the population, this sector is under severe pressure to produce at high efficiency. One of the significant factors in improving crop harvest is the timely detection of crop diseases. The farmers use scouting to monitor their crops, which requires extensive labor and is time-consuming. Image processing-based disease identification makes the process faster and more accurate. Recently, deep learning techniques have been deployed for automatic plant disease identification. Researchers have used Convolutional Neural Networks (CNN) to predict the type of diseases in different crops accurately. Considering the advantages of autoencoders and CNN, we have proposed and developed a hybrid deep learning model based on CNN and Autoencoders to detect multiple plant diseases. The proposed architecture is fine-tuned to detect diseases of numerous crops. The proposed model provides higher accuracy when compared with similar systems. We have tested our model using the Plant village dataset containing almost 15 different types of crops.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128652138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Augmented Reality Enabled Internet of Things- A few Case Studies 增强现实使物联网-几个案例研究
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9924014
E. Lokesh, K. Sreekar, G. V. Srikar, Raghunath Chandra, C. Reddy, A. Dash
To provide personalizationand privacy to the users of smart systems enabled with IoT technology augmented reality is very handy. Such Augmented Reality (AR) enabled IoT devices give a visually appealing and easy-to-use interface to the user. Using simple electronic components like Arduino, NodeMCU Wi-Fi module, Blynk cloud platform, relays and Vuforia open source platform API is created for operating a light, fan and monitor soil in agricultural field. A detailed step by step approach is given in this paper to create such interfaces and operate the hardware.
为启用物联网技术的智能系统的用户提供个性化和隐私,增强现实非常方便。这种支持增强现实(AR)的物联网设备为用户提供了一个视觉上吸引人且易于使用的界面。使用简单的电子元件,如Arduino, NodeMCU Wi-Fi模块,Blynk云平台,继电器和Vuforia开源平台API,用于在农业领域操作灯,风扇和监测土壤。本文给出了一个详细的一步一步的方法来创建这样的接口和操作硬件。
{"title":"Augmented Reality Enabled Internet of Things- A few Case Studies","authors":"E. Lokesh, K. Sreekar, G. V. Srikar, Raghunath Chandra, C. Reddy, A. Dash","doi":"10.1109/CSI54720.2022.9924014","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9924014","url":null,"abstract":"To provide personalizationand privacy to the users of smart systems enabled with IoT technology augmented reality is very handy. Such Augmented Reality (AR) enabled IoT devices give a visually appealing and easy-to-use interface to the user. Using simple electronic components like Arduino, NodeMCU Wi-Fi module, Blynk cloud platform, relays and Vuforia open source platform API is created for operating a light, fan and monitor soil in agricultural field. A detailed step by step approach is given in this paper to create such interfaces and operate the hardware.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121499846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Noisy Sonar Image Segmentation using Reptile Search Algorithm 基于爬虫类搜索算法的噪声声纳图像分割
Pub Date : 2022-08-31 DOI: 10.1109/CSI54720.2022.9923950
Shweta Rajput, Resham Chawra, Palash Shirish Wani, S. Nanda
Due to the low energy attenuation of an acoustic wave in water, the side-scan sonar imaging technique is popularly used for underwater exploration. The images collected in this process contain a high amount of noise, which poses a challenge to accurately detecting underwater objects. In this paper, the de-noising of such images is carried out through a non-local means filtering algorithm. The obtained denoised images are further segmented to effectively determine the object, shadow, and background. The segmentation task is formulated as a clustering problem, and a recently reported nature-inspired algorithm known as Reptile Search Algorithm (RSA) is used. The RSA is based on the hunting behavior of crocodiles in a specific region. The Davies-Bouldin index is used as the fitness function to perform the clustering. The performance of the proposed method is evaluated on four plane and four-ship images collected from the benchmark KLSG-II dataset. The obtained results are compared with the image segmentation performed by particle swarm optimization and genetic algorithm. Comparative results reveal that the proposed RSA-based model obtained better results in de-noising and effectively segmenting the eight images.
由于声波在水中具有较低的能量衰减,侧扫声纳成像技术在水下探测中得到了广泛的应用。在此过程中采集的图像含有大量的噪声,这对准确探测水下目标提出了挑战。本文通过非局部均值滤波算法对这类图像进行去噪。对去噪后的图像进行进一步分割,有效确定目标、阴影和背景。分割任务被制定为一个聚类问题,并使用了最近报道的一种受自然启发的算法,即爬行动物搜索算法(RSA)。RSA是基于鳄鱼在特定地区的狩猎行为。采用Davies-Bouldin指数作为适应度函数进行聚类。在KLSG-II基准数据集中收集的四幅飞机和四艘船图像上对该方法的性能进行了评估。将所得结果与粒子群算法和遗传算法进行了比较。对比结果表明,基于rsa的模型在去噪和有效分割8幅图像方面取得了较好的效果。
{"title":"Noisy Sonar Image Segmentation using Reptile Search Algorithm","authors":"Shweta Rajput, Resham Chawra, Palash Shirish Wani, S. Nanda","doi":"10.1109/CSI54720.2022.9923950","DOIUrl":"https://doi.org/10.1109/CSI54720.2022.9923950","url":null,"abstract":"Due to the low energy attenuation of an acoustic wave in water, the side-scan sonar imaging technique is popularly used for underwater exploration. The images collected in this process contain a high amount of noise, which poses a challenge to accurately detecting underwater objects. In this paper, the de-noising of such images is carried out through a non-local means filtering algorithm. The obtained denoised images are further segmented to effectively determine the object, shadow, and background. The segmentation task is formulated as a clustering problem, and a recently reported nature-inspired algorithm known as Reptile Search Algorithm (RSA) is used. The RSA is based on the hunting behavior of crocodiles in a specific region. The Davies-Bouldin index is used as the fitness function to perform the clustering. The performance of the proposed method is evaluated on four plane and four-ship images collected from the benchmark KLSG-II dataset. The obtained results are compared with the image segmentation performed by particle swarm optimization and genetic algorithm. Comparative results reveal that the proposed RSA-based model obtained better results in de-noising and effectively segmenting the eight images.","PeriodicalId":221137,"journal":{"name":"2022 International Conference on Connected Systems & Intelligence (CSI)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121559961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 International Conference on Connected Systems & Intelligence (CSI)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1