首页 > 最新文献

2022 5th International Conference on Advances in Science and Technology (ICAST)最新文献

英文 中文
Computer Navigation using Audio and Video Aid for Amputees and Parkinsons Patients 使用音频和视频辅助的计算机导航用于截肢者和帕金森患者
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039655
Shaurya Magar, Kharanshu Mehta, Arjav Parekh, Abhijit R. Joshi
A majority of disadvantaged children in underdeveloped countries cannot attend school due to the dearth of proper infrastructure and inadequate reading materials. Due to the pandemic, schools used various technologies to migrate quickly to online classrooms. This has greatly benefitted People with Disabilities since it made learning more accessible by removing physical impediments such as lack of infrastructure. However, ease of computer navigation still poses an issue for the disabled. This paper presents a novel approach to address this issue. We make use of Face Detection and Speech Recognition to simulate certain mouse and keyboard commands. The user can simply move their face to advance the cursor and voice command to perform the desired operation. For that the system uses the in-built camera and microphone, our solution is extremely cost-effective as compared to other commercial solutions.
由于缺乏适当的基础设施和阅读材料不足,不发达国家的大多数弱势儿童无法上学。由于疫情,学校使用各种技术迅速迁移到在线课堂。这极大地造福了残疾人,因为它消除了缺乏基础设施等物理障碍,使学习变得更容易。然而,电脑导航的便利性对残疾人来说仍然是一个问题。本文提出了一种解决这一问题的新方法。我们利用人脸检测和语音识别来模拟某些鼠标和键盘命令。用户可以简单地移动他们的脸来移动光标和语音命令来执行所需的操作。由于该系统使用内置摄像头和麦克风,与其他商业解决方案相比,我们的解决方案具有极高的成本效益。
{"title":"Computer Navigation using Audio and Video Aid for Amputees and Parkinsons Patients","authors":"Shaurya Magar, Kharanshu Mehta, Arjav Parekh, Abhijit R. Joshi","doi":"10.1109/ICAST55766.2022.10039655","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039655","url":null,"abstract":"A majority of disadvantaged children in underdeveloped countries cannot attend school due to the dearth of proper infrastructure and inadequate reading materials. Due to the pandemic, schools used various technologies to migrate quickly to online classrooms. This has greatly benefitted People with Disabilities since it made learning more accessible by removing physical impediments such as lack of infrastructure. However, ease of computer navigation still poses an issue for the disabled. This paper presents a novel approach to address this issue. We make use of Face Detection and Speech Recognition to simulate certain mouse and keyboard commands. The user can simply move their face to advance the cursor and voice command to perform the desired operation. For that the system uses the in-built camera and microphone, our solution is extremely cost-effective as compared to other commercial solutions.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131654965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning & deep learning algorithm reviews for diabetic retinopathy detection 糖尿病视网膜病变检测中的机器学习和深度学习算法综述
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039518
Pranali Hatode, Maniroja M Edinburgh
An artificial neural network, expressed as (ANN) a very popular algorithm in machine learning, developed from artificial neurons, has less computation capability, and so is less popular amongst the researchers. Deep learning or may also be called as deep neural network (DNN) has evolved with great computation capabilities with graphic processing units and also large amount of data acquisition is possible with DNN. This paper is the pure analysis and review of the performances of the ML and DL algorithms and also compares the parameters of the fundus images as it aims the detection of Diabetic Retinopathy (DR) with better accuracies. It also speaks about the analysis of another type of images particularly Optical Coherence tomography angiography also called as OCTA used for detection of DR and shows how its accuracies of detection and grading of the disease differs from that of the fundus images. DR is an impairment of diabetes has an effect on eyes and is a consequence of damaged retinal blood vessels. If these complications are identified in the very early stage, then the patient's vision misfortune can be avoided.
人工神经网络(artificial neural network,简称ANN)是机器学习中非常流行的一种算法,它由人工神经元发展而来,计算能力较差,因此不太受研究人员的欢迎。深度学习,也可以称为深度神经网络(DNN),已经发展成为具有图形处理单元的强大计算能力,并且可以使用DNN进行大量数据采集。本文对ML和DL算法的性能进行了纯粹的分析和回顾,并对眼底图像的参数进行了比较,目的是提高糖尿病视网膜病变(DR)的检测精度。它还讨论了另一种类型的图像的分析,特别是光学相干断层扫描血管造影,也称为OCTA,用于检测DR,并展示了其检测和疾病分级的准确性与眼底图像的不同之处。糖尿病对眼睛有影响,是视网膜血管受损的结果。如果在早期发现这些并发症,则可以避免患者的视力不幸。
{"title":"Machine learning & deep learning algorithm reviews for diabetic retinopathy detection","authors":"Pranali Hatode, Maniroja M Edinburgh","doi":"10.1109/ICAST55766.2022.10039518","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039518","url":null,"abstract":"An artificial neural network, expressed as (ANN) a very popular algorithm in machine learning, developed from artificial neurons, has less computation capability, and so is less popular amongst the researchers. Deep learning or may also be called as deep neural network (DNN) has evolved with great computation capabilities with graphic processing units and also large amount of data acquisition is possible with DNN. This paper is the pure analysis and review of the performances of the ML and DL algorithms and also compares the parameters of the fundus images as it aims the detection of Diabetic Retinopathy (DR) with better accuracies. It also speaks about the analysis of another type of images particularly Optical Coherence tomography angiography also called as OCTA used for detection of DR and shows how its accuracies of detection and grading of the disease differs from that of the fundus images. DR is an impairment of diabetes has an effect on eyes and is a consequence of damaged retinal blood vessels. If these complications are identified in the very early stage, then the patient's vision misfortune can be avoided.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Society Security App 社会保障App
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039537
R. Kanse, Harish Motekar, V. Rathod, S. Ajagekar, D. Kamble, Trupti Patil, Santosh Govind Rathod
In the housing society, daily life in urban areas has significant things to manage. Our daily necessities, such as water supply, electricity, security, and a variety of other things that are essential in residential life, fall under the purview of housing society management. In the majority of cases, society management practices a traditional method of correspondence. This absolutely has a few limitations and inconveniences. Everyday notices, month-to-month gatherings, comprehensive developments, various contacts for day-to-day needs, security alarms, high-priority communication, and numerous others may not be conveyed as expected in the ongoing situation, as the greater part of the things are getting dealt with physically. To overcome the issues caused by this time- consuming manual framework, an automated framework should be created to decrease human efforts. In most societies, work is done physically. Resident's contact information is noted on the papers. As all work is done on paper, it is undeniably challenging to oversee and monitor basically everything related to work expenses in society. This cooperative society management system will automate the entire daily life of the society. This system likewise keeps the contacts of specialized individuals or organizations that offer various types of assistance, like labour, housekeeping, pest control, equipment maintenance, and so on. There is no automated framework for all of the things that happen in society, so people can understand what's going on. This framework likewise raises invoices against all residents. This process for sustaining a society is designed to address the most widely recognized issues in societies. Utilizing this framework Advance installments or halfway instalments can be effortlessly noted and followed at any level. They require coordination among the society's management and the vendors, which offer some types of assistance, so the appropriate convenience can be given. In this maintenance bill, bills are sent in a simple way
在住房社会中,城市居民的日常生活有很多重要的事情需要管理。我们的生活必需品,如供水、供电、安全以及其他各种生活必需品,都属于住房协会管理的范围。在大多数情况下,社会管理实践传统的通信方法。这绝对有一些限制和不便。日常通知、每月聚会、综合发展、日常需求的各种联系、安全警报、高优先级通信以及许多其他可能无法在持续的情况下传达,因为大部分事情都是在物理上处理的。为了克服这种耗时的手动框架所引起的问题,应该创建一个自动化框架来减少人工的努力。在大多数社会中,工作都是体力劳动。居民的联系方式记在纸上。由于所有的工作都是在纸上完成的,不可否认的是,监督和监控社会上与工作费用有关的一切是具有挑战性的。该合作社管理系统将实现整个社会日常生活的自动化。该系统还与提供各种援助的专业个人或组织保持联系,如劳动力、家政、虫害防治、设备维护等。对于社会上发生的所有事情,没有一个自动化的框架,所以人们可以理解发生了什么。这个框架同样会向所有居民开出发票。这一维持社会的过程旨在解决社会中最广泛认可的问题。利用这个框架,可以毫不费力地记录和跟踪任何级别的提前分期或中途分期。他们需要社会管理和供应商之间的协调,供应商提供一些类型的帮助,因此可以给予适当的便利。在此维护账单中,账单以一种简单的方式发送
{"title":"Society Security App","authors":"R. Kanse, Harish Motekar, V. Rathod, S. Ajagekar, D. Kamble, Trupti Patil, Santosh Govind Rathod","doi":"10.1109/ICAST55766.2022.10039537","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039537","url":null,"abstract":"In the housing society, daily life in urban areas has significant things to manage. Our daily necessities, such as water supply, electricity, security, and a variety of other things that are essential in residential life, fall under the purview of housing society management. In the majority of cases, society management practices a traditional method of correspondence. This absolutely has a few limitations and inconveniences. Everyday notices, month-to-month gatherings, comprehensive developments, various contacts for day-to-day needs, security alarms, high-priority communication, and numerous others may not be conveyed as expected in the ongoing situation, as the greater part of the things are getting dealt with physically. To overcome the issues caused by this time- consuming manual framework, an automated framework should be created to decrease human efforts. In most societies, work is done physically. Resident's contact information is noted on the papers. As all work is done on paper, it is undeniably challenging to oversee and monitor basically everything related to work expenses in society. This cooperative society management system will automate the entire daily life of the society. This system likewise keeps the contacts of specialized individuals or organizations that offer various types of assistance, like labour, housekeeping, pest control, equipment maintenance, and so on. There is no automated framework for all of the things that happen in society, so people can understand what's going on. This framework likewise raises invoices against all residents. This process for sustaining a society is designed to address the most widely recognized issues in societies. Utilizing this framework Advance installments or halfway instalments can be effortlessly noted and followed at any level. They require coordination among the society's management and the vendors, which offer some types of assistance, so the appropriate convenience can be given. In this maintenance bill, bills are sent in a simple way","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131029565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Microstrip-line fed Dual-band C-shaped Antenna with Monopolar Characteristics for Application in WLAN 应用于无线局域网的单极特性微带线馈电双带c形天线
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039616
J. Panda, S. Mohapatra, S. K. Dash, A. Bakshi
In this paper a In this paper, a dual-band planar antenna with monopolar characteristics has been proposed which is fed by a transmission line of microstrip in nature having the C-shaped element of radiation. Two paths of resonance are created in the element of radiation which is a C-shaped structure for the operation in the in the two resonance bands simultaneously at the center frequency of resonance of 2.41 GHz and 5.59 GHz for WLAN application. Two resonating paths are approximately equal to quarter wavelength length at 2.56 GHz ($0.252lambda_{1}$) and 5.49 GHz ($0.185lambda_{2}$). The antenna which is proposed here demonstrate the sufficient gain and pattern of radiation characteristics which which enables the antenna which is proposed suitable for application in WLAMN band of operation
本文提出了一种具有单极子特性的双频平面天线,该天线由具有c形辐射元的自然微带传输线馈电。辐射元件为c型结构,在两个共振频段同时工作,中心共振频率为2.41 GHz和5.59 GHz,用于WLAN应用。在2.56 GHz ($0.252lambda_{1}$)和5.49 GHz ($0.185lambda_{2}$)处,两个谐振路径近似等于四分之一波长长度。本文所设计的天线具有足够的增益和方向图的辐射特性,使所设计的天线适合应用于WLAMN的工作频段
{"title":"Microstrip-line fed Dual-band C-shaped Antenna with Monopolar Characteristics for Application in WLAN","authors":"J. Panda, S. Mohapatra, S. K. Dash, A. Bakshi","doi":"10.1109/ICAST55766.2022.10039616","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039616","url":null,"abstract":"In this paper a In this paper, a dual-band planar antenna with monopolar characteristics has been proposed which is fed by a transmission line of microstrip in nature having the C-shaped element of radiation. Two paths of resonance are created in the element of radiation which is a C-shaped structure for the operation in the in the two resonance bands simultaneously at the center frequency of resonance of 2.41 GHz and 5.59 GHz for WLAN application. Two resonating paths are approximately equal to quarter wavelength length at 2.56 GHz ($0.252lambda_{1}$) and 5.49 GHz ($0.185lambda_{2}$). The antenna which is proposed here demonstrate the sufficient gain and pattern of radiation characteristics which which enables the antenna which is proposed suitable for application in WLAMN band of operation","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132993384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improvised Approach for Website Domain Classification 一种简易的网站域名分类方法
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039588
A. Dalvi, Binita Soni, Naman Shah, Dishika Mehta, Archi Mamaniya, Swadit Chandan, Smriti Chaudhary
In today's world, all search engine portals use suggestions to provide users with various options while searching for websites of a genre. The search engine needs to understand the genre of these websites to give the user relevant suggestions for websites. According to a survey, as of June 2021, about 1.86 billion websites are available on the Web. After looking at these statistics, a manual classification seems rather impractical and tedious. Owing to technological advancements, the authors have used machine learning to categorize websites into a group of preset genres provided in a curated dataset prepared in this particular work. The websites are classified into eleven domains according to popularity and user convenience. It was then made accessible through a dynamic web application that used the machine learning model to predict the type of website after taking the user's input. The authors have explored various classification models for this categorization and implemented the most suitable model with the highest accuracy as the final website domain classifier. The proposed model is also verified using the “web genre corpus 2004 (Genre-KI-04)” open dataset created for website genre classification.
在当今世界,所有的搜索引擎门户网站都使用建议,为用户在搜索某一类型的网站时提供各种选择。搜索引擎需要了解这些网站的类型,才能给用户提供相关的网站建议。根据一项调查,截至2021年6月,约有18.6亿个网站在网络上可用。在查看了这些统计数据之后,手动分类似乎相当不切实际和乏味。由于技术的进步,作者已经使用机器学习将网站分类为一组预设类型,这些预设类型提供在本特定工作中准备的策划数据集中。这些网站根据受欢迎程度和使用方便程度分为11个域名。然后通过一个动态web应用程序访问它,该应用程序使用机器学习模型来预测用户输入后的网站类型。作者为此探索了多种分类模型,并实现了最适合的、准确率最高的模型作为最终的网站域分类器。该模型还使用为网站类型分类创建的“网络类型语料库2004 (genre - ki -04)”开放数据集进行了验证。
{"title":"An Improvised Approach for Website Domain Classification","authors":"A. Dalvi, Binita Soni, Naman Shah, Dishika Mehta, Archi Mamaniya, Swadit Chandan, Smriti Chaudhary","doi":"10.1109/ICAST55766.2022.10039588","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039588","url":null,"abstract":"In today's world, all search engine portals use suggestions to provide users with various options while searching for websites of a genre. The search engine needs to understand the genre of these websites to give the user relevant suggestions for websites. According to a survey, as of June 2021, about 1.86 billion websites are available on the Web. After looking at these statistics, a manual classification seems rather impractical and tedious. Owing to technological advancements, the authors have used machine learning to categorize websites into a group of preset genres provided in a curated dataset prepared in this particular work. The websites are classified into eleven domains according to popularity and user convenience. It was then made accessible through a dynamic web application that used the machine learning model to predict the type of website after taking the user's input. The authors have explored various classification models for this categorization and implemented the most suitable model with the highest accuracy as the final website domain classifier. The proposed model is also verified using the “web genre corpus 2004 (Genre-KI-04)” open dataset created for website genre classification.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133720989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fire Detection using HSV Color Picker: A Review 使用HSV选色器进行火灾探测:综述
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039624
Aditi Adurkar, Priya Patel, Manasvi Sabnis, Pradnya Patil
Massive wildfires are destroying homes and habitats around the world. With wildfires, early detection and prevention become keys to containing the fire. Three days ago, France had to evacuate more than 16,000 people threatened by wildfires in the south-west. There were 1,36,604 fire points in India from January 1 to March 31, 2022, according to the Forest Survey of India (FSI). Our project leverages pioneering AI techniques to detect wildfires at very early stages, way faster than the current systems used. However, we believe that these can be automated with the help of machine learning algorithms. The system will seamlessly detect fire with data from various sources, like IoT devices, satellite data, and data provided by users living nearby the forest. The use of different technologies gives us a unique advantage and helps us detect wildfires faster.
世界各地的大规模野火正在摧毁家园和栖息地。对于野火,早期发现和预防成为控制火势的关键。三天前,法国西南部受到野火威胁的1.6万多人被迫撤离。根据印度森林调查(FSI)的数据,从2022年1月1日到3月31日,印度有136604个火点。我们的项目利用先进的人工智能技术在非常早期的阶段检测野火,比目前使用的系统快得多。然而,我们相信这些可以在机器学习算法的帮助下自动化。该系统将利用各种来源的数据,如物联网设备、卫星数据和居住在森林附近的用户提供的数据,无缝地探测火灾。不同技术的使用给了我们独特的优势,帮助我们更快地探测到野火。
{"title":"Fire Detection using HSV Color Picker: A Review","authors":"Aditi Adurkar, Priya Patel, Manasvi Sabnis, Pradnya Patil","doi":"10.1109/ICAST55766.2022.10039624","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039624","url":null,"abstract":"Massive wildfires are destroying homes and habitats around the world. With wildfires, early detection and prevention become keys to containing the fire. Three days ago, France had to evacuate more than 16,000 people threatened by wildfires in the south-west. There were 1,36,604 fire points in India from January 1 to March 31, 2022, according to the Forest Survey of India (FSI). Our project leverages pioneering AI techniques to detect wildfires at very early stages, way faster than the current systems used. However, we believe that these can be automated with the help of machine learning algorithms. The system will seamlessly detect fire with data from various sources, like IoT devices, satellite data, and data provided by users living nearby the forest. The use of different technologies gives us a unique advantage and helps us detect wildfires faster.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115408072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Layer 2 Solutions to Improve the Scalability of Blockchain 提高区块链可扩展性的第二层解决方案
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039486
Shweta Shirodkar, Kaustubh Kulkarni, Rushikesh Khanjode, Surekha Kohle, Priyanka Deshmukh, Pradnya Patil
Blockchain based decentralized currencies are getting much attention these days and being used widely and deployed commercially, many popular platforms are accepting them as a mode of payment. The most popular among all is Bitcoin (BTC) has achieved great success, but these increased transaction volumes introduced problems like low throughput and high transaction processing time. It's not just with the Bitcoin but also other currencies based on Bitcoin which basically use proof of work principle to register a transaction on distributed ledger also facing similar issues leading to question of scalability of blockchain. This paper focuses on the solutions which can be implemented to make the blockchain scalable.
如今,基于区块链的去中心化货币正受到越来越多的关注,并被广泛使用和商业部署,许多流行的平台都接受它们作为一种支付方式。其中最受欢迎的是比特币(BTC)取得了巨大的成功,但这些增加的交易量带来了低吞吐量和高交易处理时间等问题。不仅仅是比特币,其他基于比特币的货币基本上都是使用工作量证明原理在分布式账本上注册交易,也面临着类似的问题,导致区块链的可扩展性问题。本文重点介绍了可以实现区块链可扩展性的解决方案。
{"title":"Layer 2 Solutions to Improve the Scalability of Blockchain","authors":"Shweta Shirodkar, Kaustubh Kulkarni, Rushikesh Khanjode, Surekha Kohle, Priyanka Deshmukh, Pradnya Patil","doi":"10.1109/ICAST55766.2022.10039486","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039486","url":null,"abstract":"Blockchain based decentralized currencies are getting much attention these days and being used widely and deployed commercially, many popular platforms are accepting them as a mode of payment. The most popular among all is Bitcoin (BTC) has achieved great success, but these increased transaction volumes introduced problems like low throughput and high transaction processing time. It's not just with the Bitcoin but also other currencies based on Bitcoin which basically use proof of work principle to register a transaction on distributed ledger also facing similar issues leading to question of scalability of blockchain. This paper focuses on the solutions which can be implemented to make the blockchain scalable.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115475179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment Analysis on Text with Emoticons Using Supervised Algorithm 基于监督算法的表情文本情感分析
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039660
Pooja Tikhe, Aditi Chhabria
Use of Social media is on a high level now a days. Everything going to be socially uploaded with a large interest Usually people uses text as well as emotional icons called emoticons to express their emotions. Sentiment Analysis is to show person's emotions, opinion by their reviews or posts. There are already many techniques to show calculations of sentiment analysis by posts or reviews like naive bayes or support vector machine. These gives better result in sentiment analysis field. Existing system uses unsupervised method of polarity calculation to analyze sentiment from text and emoticons. Without use of predefined dictionary it calculates polarity on the basis of presence of emoticons. However it restrict presence of emoticons to classify text and analyze sentiment. Proposed system works on Supervised learning method. It reduces restriction of presence of emoticons in existing system. It can work on only text, only emoticons as well as combination of both. Preprocessing steps contains feature extraction and removal of stop words. Here c5 classifier has been used for better accuracy and classify posts by rule-set.
如今,社交媒体的使用率很高。通常人们会使用文字和情感图标(emoticon)来表达情感。情感分析是通过人们的评论或帖子来展示他们的情绪和观点。已经有很多技术可以通过帖子或评论来显示情感分析的计算,比如朴素贝叶斯或支持向量机。这些方法在情感分析领域得到了较好的结果。现有系统采用无监督的极性计算方法对文本和表情符号进行情感分析。不使用预定义的字典,它计算极性的基础上存在的表情符号。然而,它限制了表情符号的存在,以对文本进行分类和分析情感。提出了一种基于监督学习方法的系统。它减少了现有系统中表情符号存在的限制。它可以只对文本,表情符号以及两者的组合工作。预处理步骤包括特征提取和停止词的去除。这里使用c5分类器来提高准确性,并根据规则集对帖子进行分类。
{"title":"Sentiment Analysis on Text with Emoticons Using Supervised Algorithm","authors":"Pooja Tikhe, Aditi Chhabria","doi":"10.1109/ICAST55766.2022.10039660","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039660","url":null,"abstract":"Use of Social media is on a high level now a days. Everything going to be socially uploaded with a large interest Usually people uses text as well as emotional icons called emoticons to express their emotions. Sentiment Analysis is to show person's emotions, opinion by their reviews or posts. There are already many techniques to show calculations of sentiment analysis by posts or reviews like naive bayes or support vector machine. These gives better result in sentiment analysis field. Existing system uses unsupervised method of polarity calculation to analyze sentiment from text and emoticons. Without use of predefined dictionary it calculates polarity on the basis of presence of emoticons. However it restrict presence of emoticons to classify text and analyze sentiment. Proposed system works on Supervised learning method. It reduces restriction of presence of emoticons in existing system. It can work on only text, only emoticons as well as combination of both. Preprocessing steps contains feature extraction and removal of stop words. Here c5 classifier has been used for better accuracy and classify posts by rule-set.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116899260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid CNN-LSTM network to detect Dysarthria using Mel-Frequency Cepstral Coefficients 基于mel频率倒谱系数的CNN-LSTM混合网络检测构音障碍
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039514
K. Vora, Dishant Padalia, Darshil Mehta, Deepak Kumar Sharma
Dysarthria is a speech problem acquired at birth due to cerebral palsy (CP) or developed after severe brain damage. Dysarthria affects more than 70% of Parkinson's patients and 10% to 65% of people with traumatic brain injury. It is critical to detect dysarthria and other voice speech difficulties early to diagnose the underlying cause. Intelligent systems capable of identifying dysarthria with incredible precision have been developed using audio processing techniques and various deep learning models. This paper presents a hybrid CNN-LSTM model for classifying patients with dysarthria using audio recordings. The CNN-LSTM combination helps capture spatial and temporal information where CNN acts as a feature extractor while LSTM functions as a classifier. The proposed model was trained on the publicly available 9184 audio recordings from the TORGO dataset, and various audio augmentation techniques were employed to generate synthetic data. A total of 128 features were extracted using Mel Frequency Cepstral Coefficients (MFCC) and fed into the architecture as inputs. The K-fold cross-validation technique was used to avoid overfitting and increase the generalization capability of the model. The proposed architecture achieved a state-of-the-art 99.59% accuracy on the dataset. The presented work will minimize the workload of speech pathologists and help them detect dysarthria precisely and effectively.
构音障碍是一种在出生时由于脑瘫(CP)或严重脑损伤后发展起来的语言问题。构音障碍影响了超过70%的帕金森患者和10%至65%的创伤性脑损伤患者。早期发现构音障碍和其他语音障碍是诊断潜在原因的关键。使用音频处理技术和各种深度学习模型,已经开发出能够以难以置信的精度识别构音障碍的智能系统。本文提出了一种混合CNN-LSTM模型,用于使用录音对构音障碍患者进行分类。CNN-LSTM组合有助于捕获空间和时间信息,其中CNN作为特征提取器,而LSTM作为分类器。该模型在TORGO数据集中公开的9184段录音上进行了训练,并使用了各种音频增强技术来生成合成数据。使用Mel频率倒谱系数(MFCC)提取了128个特征,并将其作为输入输入到该体系结构中。采用K-fold交叉验证技术避免了模型的过拟合,提高了模型的泛化能力。所提出的架构在数据集上达到了最先进的99.59%的准确率。所提出的工作将减少语言病理学家的工作量,并帮助他们准确有效地检测构音障碍。
{"title":"Hybrid CNN-LSTM network to detect Dysarthria using Mel-Frequency Cepstral Coefficients","authors":"K. Vora, Dishant Padalia, Darshil Mehta, Deepak Kumar Sharma","doi":"10.1109/ICAST55766.2022.10039514","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039514","url":null,"abstract":"Dysarthria is a speech problem acquired at birth due to cerebral palsy (CP) or developed after severe brain damage. Dysarthria affects more than 70% of Parkinson's patients and 10% to 65% of people with traumatic brain injury. It is critical to detect dysarthria and other voice speech difficulties early to diagnose the underlying cause. Intelligent systems capable of identifying dysarthria with incredible precision have been developed using audio processing techniques and various deep learning models. This paper presents a hybrid CNN-LSTM model for classifying patients with dysarthria using audio recordings. The CNN-LSTM combination helps capture spatial and temporal information where CNN acts as a feature extractor while LSTM functions as a classifier. The proposed model was trained on the publicly available 9184 audio recordings from the TORGO dataset, and various audio augmentation techniques were employed to generate synthetic data. A total of 128 features were extracted using Mel Frequency Cepstral Coefficients (MFCC) and fed into the architecture as inputs. The K-fold cross-validation technique was used to avoid overfitting and increase the generalization capability of the model. The proposed architecture achieved a state-of-the-art 99.59% accuracy on the dataset. The presented work will minimize the workload of speech pathologists and help them detect dysarthria precisely and effectively.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128889205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Dynamics of a Bug Bounty Platform 漏洞赏金平台的动态
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039642
Ashish Bhushan, Vivekananda Billa, Minal Sonkar, Vighnesh Chavan
A security vulnerability in software, often referred as a bug, is a weakness in software code that arises as a result of unforeseen design decisions or model mathematical inadequacies. It is a security problem that could be used in cyberattacks to gain entry to digitally stored data unless the defect is fixed with a software patch. We found that a growing community of developers can shift the production from inside the company to its ecosystem partners (eg. bug bounty hunters) using a comprehensive framework for code exposure. That is, instead of closed vertical integration, enterprises can opt to innovate utilizing open external contracts. It's preferable if the center of value creation shifts from within the company to outside. Digital commodities, unlike physical items, allow businesses to maximize spillovers. Bug Bounty Programs use crowdsourcing to find bugs. Bug Bounty Programs (BBPs) are becoming standard security practices within enterprises, thanks to the benefits of crowdsourcing flaw and vulnerability management. Bug bounty programs help businesses by enlisting the help of hackers who can find flaws in their software. Because these programs have access to a larger number of hackers or testers, the chances of detecting problems before malicious hackers try to exploit them are higher. It can be a good public relations option for businesses. These programs can also act as a signal to the public and regulators that a company's security program is well-developed. The relevance of these types of programs is expected to grow, as they have become an industry standard that should attract investment from all companies. We evaluate the existing competitors in the market and learn from the case studies accessible while designing our own bug bounty platform. We also look at the Vulnerability Market Mechanism as well as five key aspects of BBP practice: Scoping of BBPs, Timing of Crowd Engagement, Quality of Submission, Researcher-Firm Communication, and Hackers Motivation Management. We examine difficulties in each area and aim to put strategies in place to improve the effectiveness of BBP. This study contributes to research and practice by identifying difficulties and best practices in crowdsourcing information security for rapid vulnerability detection and mitigation.
软件中的安全漏洞,通常被称为bug,是软件代码中的一个弱点,它是由于不可预见的设计决策或模型数学不足而产生的。这是一个安全问题,可能被用于网络攻击,以进入数字存储的数据,除非用软件补丁修复这个缺陷。我们发现,不断壮大的开发者社区可以将产品从公司内部转移到其生态系统合作伙伴(例如。Bug赏金猎人)使用全面的代码暴露框架。也就是说,企业可以选择利用开放的外部契约进行创新,而不是封闭的垂直整合。如果价值创造的中心从公司内部转移到外部,那就更好了。与实物商品不同,数字商品允许企业将溢出效应最大化。漏洞赏金计划使用众包来寻找漏洞。由于众包漏洞和漏洞管理的好处,漏洞赏金计划(bbp)正在成为企业内的标准安全实践。漏洞赏金计划通过招募能够发现软件漏洞的黑客来帮助企业。因为这些程序可以访问大量的黑客或测试人员,所以在恶意黑客试图利用它们之前检测到问题的机会更高。这对企业来说是一个很好的公关选择。这些程序也可以作为一个信号,向公众和监管机构表明,一家公司的安全程序是发达的。这些项目的相关性预计会增长,因为它们已经成为一个行业标准,应该吸引所有公司的投资。在设计我们自己的漏洞赏金平台时,我们评估了市场上现有的竞争对手,并从可访问的案例研究中学习。我们还研究了脆弱性市场机制以及BBP实践的五个关键方面:BBP的范围、群体参与的时机、提交的质量、研究人员与公司的沟通以及黑客动机管理。我们审查了每个领域的困难,并旨在制定战略,以提高BBP的有效性。本研究确定了为快速发现和缓解漏洞而进行众包信息安全方面的困难和最佳做法,有助于研究和实践。
{"title":"The Dynamics of a Bug Bounty Platform","authors":"Ashish Bhushan, Vivekananda Billa, Minal Sonkar, Vighnesh Chavan","doi":"10.1109/ICAST55766.2022.10039642","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039642","url":null,"abstract":"A security vulnerability in software, often referred as a bug, is a weakness in software code that arises as a result of unforeseen design decisions or model mathematical inadequacies. It is a security problem that could be used in cyberattacks to gain entry to digitally stored data unless the defect is fixed with a software patch. We found that a growing community of developers can shift the production from inside the company to its ecosystem partners (eg. bug bounty hunters) using a comprehensive framework for code exposure. That is, instead of closed vertical integration, enterprises can opt to innovate utilizing open external contracts. It's preferable if the center of value creation shifts from within the company to outside. Digital commodities, unlike physical items, allow businesses to maximize spillovers. Bug Bounty Programs use crowdsourcing to find bugs. Bug Bounty Programs (BBPs) are becoming standard security practices within enterprises, thanks to the benefits of crowdsourcing flaw and vulnerability management. Bug bounty programs help businesses by enlisting the help of hackers who can find flaws in their software. Because these programs have access to a larger number of hackers or testers, the chances of detecting problems before malicious hackers try to exploit them are higher. It can be a good public relations option for businesses. These programs can also act as a signal to the public and regulators that a company's security program is well-developed. The relevance of these types of programs is expected to grow, as they have become an industry standard that should attract investment from all companies. We evaluate the existing competitors in the market and learn from the case studies accessible while designing our own bug bounty platform. We also look at the Vulnerability Market Mechanism as well as five key aspects of BBP practice: Scoping of BBPs, Timing of Crowd Engagement, Quality of Submission, Researcher-Firm Communication, and Hackers Motivation Management. We examine difficulties in each area and aim to put strategies in place to improve the effectiveness of BBP. This study contributes to research and practice by identifying difficulties and best practices in crowdsourcing information security for rapid vulnerability detection and mitigation.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130929468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Advances in Science and Technology (ICAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1