首页 > 最新文献

2022 5th International Conference on Advances in Science and Technology (ICAST)最新文献

英文 中文
Review and Comparison of Different Methods Involved in Process of Efficient Communication Between Disabled and Normal People 残疾人与正常人有效沟通过程中不同方法的回顾与比较
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039618
Sachin Sase, B. Ballal
Sign language is a way which deaf and dumb people use for communication. These people face lots of difficulty in communication with normal people since normal people does not know the sign language. This paper describes the several methods for data collection, pre- processing, features extraction and classification for the translation of sign language to audio, along with the suggested system. The purpose of this paper is to outline several techniques for translation of sign language into audio and vice versa, as well as to develop a communication system to achieve efficient communication between disable and normal people. This project converts sign language into Audio for Dumb people and Audio into sign language for deaf people. It consists of two stages: the first stage comprises of CNN which translates an ASL hand gesture into audio, and the second stage comprises of speech recognition which translates audio from any language into sign language.
手语是聋哑人用来交流的一种方式。这些人在与正常人交流时面临很多困难,因为正常人不懂手语。本文介绍了手语语音翻译的几种数据采集、预处理、特征提取和分类方法,并提出了相应的系统。本文的目的是概述几种手语与语音的翻译技术,并开发一种沟通系统,以实现残疾人与正常人之间的有效沟通。这个项目将手语转化为哑巴的声音,将声音转化为聋哑人的手语。它包括两个阶段:第一阶段包括CNN,将美国手语手势翻译成音频,第二阶段包括语音识别,将任何语言的音频翻译成手语。
{"title":"Review and Comparison of Different Methods Involved in Process of Efficient Communication Between Disabled and Normal People","authors":"Sachin Sase, B. Ballal","doi":"10.1109/ICAST55766.2022.10039618","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039618","url":null,"abstract":"Sign language is a way which deaf and dumb people use for communication. These people face lots of difficulty in communication with normal people since normal people does not know the sign language. This paper describes the several methods for data collection, pre- processing, features extraction and classification for the translation of sign language to audio, along with the suggested system. The purpose of this paper is to outline several techniques for translation of sign language into audio and vice versa, as well as to develop a communication system to achieve efficient communication between disable and normal people. This project converts sign language into Audio for Dumb people and Audio into sign language for deaf people. It consists of two stages: the first stage comprises of CNN which translates an ASL hand gesture into audio, and the second stage comprises of speech recognition which translates audio from any language into sign language.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"20 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123618546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovations in Financial Intelligence Applications using Artificial Intelligence 使用人工智能的金融智能应用创新
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039547
S. Agarwal, Vikram Kandoria, Yash Kankriya, Anish Kuckian, Vaishali Wadhe
This article focuses on the application on momentary intelligence-supported computing technology. The article first analyzes computer science technology and its applicability within the financial field and so analyzes the thought of monetary intelligence application construction. this text takes a financial robot actually put into use by an organization as an example and introduces the particular applications and effects of economic intelligence applications within the four perspectives on the financial sector: fundamental operations, intelligent processing, data statistics, and risk management. this text provides empirical data from the appliance of AI in finance and provides references for other enterprises to use computer science technology.
本文主要研究瞬时智能支持计算技术的应用。本文首先分析了计算机科学技术及其在金融领域的应用,进而分析了货币智能应用建设的思路。本文以某机构实际投入使用的金融机器人为例,从基础操作、智能处理、数据统计和风险管理四个角度介绍了经济智能应用在金融领域的具体应用和效果。本文提供了人工智能在金融领域应用的经验数据,为其他企业运用计算机科学技术提供了参考。
{"title":"Innovations in Financial Intelligence Applications using Artificial Intelligence","authors":"S. Agarwal, Vikram Kandoria, Yash Kankriya, Anish Kuckian, Vaishali Wadhe","doi":"10.1109/ICAST55766.2022.10039547","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039547","url":null,"abstract":"This article focuses on the application on momentary intelligence-supported computing technology. The article first analyzes computer science technology and its applicability within the financial field and so analyzes the thought of monetary intelligence application construction. this text takes a financial robot actually put into use by an organization as an example and introduces the particular applications and effects of economic intelligence applications within the four perspectives on the financial sector: fundamental operations, intelligent processing, data statistics, and risk management. this text provides empirical data from the appliance of AI in finance and provides references for other enterprises to use computer science technology.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129112633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Algorithmic Approach to Audio Processing and Emotion Mapping 一种音频处理和情感映射的算法方法
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039580
Vedant Kokate, Arghyadeep Karmakar, Mustansir Kapasi, H. Chavan
Voice and speech pattern analysis can help improve conversational and persuading abilities, especially in situations or applications where direct face-to-face human engagement is not possible or preferable. This paper proposes methods for accurately predicting emotions. in a voice sample. Additive white Gaussian noise is added to avoid overfitting and create real-environment sound. This paper uses the Mel spectrogram to extract features. Multilayer Perceptron, 1D-CNN, 2D-CNN, and transformer-based parallel CNN have been used to appropriately classify human emotions from speech samples. Previously unseen, transformer-based architectures have had a breakthrough in recent times and using them in audio processing and emotion mapping is rather novel which we intend to do.
语音和语音模式分析可以帮助提高会话和说服能力,特别是在不可能或不需要直接面对面的情况或应用程序中。本文提出了准确预测情绪的方法。在声音样本中。添加高斯白噪声,避免过拟合,创造真实环境的声音。本文采用Mel谱图提取特征。多层感知器、1D-CNN、2D-CNN和基于变压器的并行CNN已被用于从语音样本中适当地分类人类情绪。以前看不见的,基于变压器的架构在最近有了突破,在音频处理和情感映射中使用它们是我们打算做的相当新颖的事情。
{"title":"An Algorithmic Approach to Audio Processing and Emotion Mapping","authors":"Vedant Kokate, Arghyadeep Karmakar, Mustansir Kapasi, H. Chavan","doi":"10.1109/ICAST55766.2022.10039580","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039580","url":null,"abstract":"Voice and speech pattern analysis can help improve conversational and persuading abilities, especially in situations or applications where direct face-to-face human engagement is not possible or preferable. This paper proposes methods for accurately predicting emotions. in a voice sample. Additive white Gaussian noise is added to avoid overfitting and create real-environment sound. This paper uses the Mel spectrogram to extract features. Multilayer Perceptron, 1D-CNN, 2D-CNN, and transformer-based parallel CNN have been used to appropriately classify human emotions from speech samples. Previously unseen, transformer-based architectures have had a breakthrough in recent times and using them in audio processing and emotion mapping is rather novel which we intend to do.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117062567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extrication of Survival Associated Genes of Glioblastoma Multiforme Patient through Statistical Modeling 统计学建模提取多形性胶质母细胞瘤患者生存相关基因
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039589
S. Redekar, S. Varma, A. Bhattacharjee
Glioblastoma multiforme (GBM) is an aggressive type of brain tumour that progresses quickly and has a poor survival. Survival analysis is a statistical method used to examine how long an event is likely to take place before occurring, such as death in biological organisms or failure in mechanical systems. This analysis is called as time to event analysis as it is used to determine how long it will be before a specific event of interest, like death or recurrence, happens. There are numerous statistical techniques that make it possible to estimate the overall survival (OS) of GBM patients, which is highly useful for developing targeted medicines to slow the growth of a disease. It also helps to determine factors contributing to the survival of the patient. Based on the distribution of relevant events, these statistical techniques use a variety of non-parametric, semi-parametric, and parametric approaches. From TCGA, genomic datasets of GBM patients and information on their survival are gathered for this investigation. Three statistical techniques to evaluate the patterns of event timings and investigate how much some genetic characteristics influence the risk of an event of interest, Kaplan Meier, Cox Regression Model, and Accelerated Failure Time Model are used. Significant genes that are connected to the GBM patient's survival are identified in study.
多形性胶质母细胞瘤(GBM)是一种侵袭性脑肿瘤,进展迅速,生存率低。生存分析是一种统计方法,用于检查事件在发生之前可能发生的时间,例如生物有机体的死亡或机械系统的故障。这种分析被称为时间到事件分析,因为它用于确定特定事件(如死亡或复发)发生之前的时间。有许多统计技术使估计GBM患者的总生存(OS)成为可能,这对于开发靶向药物以减缓疾病的发展非常有用。它还有助于确定有助于患者生存的因素。基于相关事件的分布,这些统计技术使用各种非参数、半参数和参数方法。从TCGA中,收集了GBM患者的基因组数据集及其生存信息。使用了三种统计技术来评估事件时间模式并调查一些遗传特征对感兴趣事件风险的影响程度,即Kaplan Meier模型、Cox回归模型和加速失效时间模型。在研究中发现了与GBM患者生存相关的重要基因。
{"title":"Extrication of Survival Associated Genes of Glioblastoma Multiforme Patient through Statistical Modeling","authors":"S. Redekar, S. Varma, A. Bhattacharjee","doi":"10.1109/ICAST55766.2022.10039589","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039589","url":null,"abstract":"Glioblastoma multiforme (GBM) is an aggressive type of brain tumour that progresses quickly and has a poor survival. Survival analysis is a statistical method used to examine how long an event is likely to take place before occurring, such as death in biological organisms or failure in mechanical systems. This analysis is called as time to event analysis as it is used to determine how long it will be before a specific event of interest, like death or recurrence, happens. There are numerous statistical techniques that make it possible to estimate the overall survival (OS) of GBM patients, which is highly useful for developing targeted medicines to slow the growth of a disease. It also helps to determine factors contributing to the survival of the patient. Based on the distribution of relevant events, these statistical techniques use a variety of non-parametric, semi-parametric, and parametric approaches. From TCGA, genomic datasets of GBM patients and information on their survival are gathered for this investigation. Three statistical techniques to evaluate the patterns of event timings and investigate how much some genetic characteristics influence the risk of an event of interest, Kaplan Meier, Cox Regression Model, and Accelerated Failure Time Model are used. Significant genes that are connected to the GBM patient's survival are identified in study.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124152252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fake News Detection on Datasets 基于数据集的假新闻检测
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039650
A. Deshmukh, S. Govilkar
Traditional media is no more the only source of gaining news. Social media has taken over traditional media for various reasons, like being easy to use, free of cost, and always available. However, not all news published on social media is genuine, as it can come from unverified sources also. Most people believe what they read, and hence it is essential to check the authentication of news readers. The spread of fake news could cause severe impacts not just politically but also socially. We strongly believe that spread of intentionally created fake news is more harmful than an accidental one. This paper mainly focuses on the deliberate creation and sharing of false manipulated information intended to deceive and mislead audiences. Fake news detection is a classic classification problem though many attempts of solving it through clustering are being made. Our study mainly focuses on classification algorithms. We used various classification algorithms like SVM, DT, LR, and passive Aggressive Classifier on datasets to find if the news is real or fake on two different datasets. Evaluation parameters were executed to compare the efficiency of the various algorithm. Later we also try to find out which other social media the author accounts for to stop the spread of fake news.
传统媒体不再是获取新闻的唯一来源。由于各种原因,社交媒体已经取代了传统媒体,比如易于使用、免费、随时可用。然而,并非所有发布在社交媒体上的新闻都是真实的,因为它也可能来自未经证实的来源。大多数人相信他们所读的东西,因此检查新闻读者的身份是必要的。假新闻的传播不仅会造成政治上的严重影响,还会造成社会上的严重影响。我们坚信,故意制造的假新闻的传播比偶然的假新闻更有害。本文主要关注故意创造和分享虚假的操纵信息,旨在欺骗和误导受众。假新闻检测是一个经典的分类问题,目前已有很多通过聚类来解决的尝试。我们的研究主要集中在分类算法上。我们在数据集上使用了各种分类算法,如SVM、DT、LR和被动攻击分类器,以发现两个不同数据集上的新闻是真还是假。通过执行评估参数来比较各种算法的效率。后来我们也试图找出作者在哪些其他社交媒体上注册,以阻止假新闻的传播。
{"title":"Fake News Detection on Datasets","authors":"A. Deshmukh, S. Govilkar","doi":"10.1109/ICAST55766.2022.10039650","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039650","url":null,"abstract":"Traditional media is no more the only source of gaining news. Social media has taken over traditional media for various reasons, like being easy to use, free of cost, and always available. However, not all news published on social media is genuine, as it can come from unverified sources also. Most people believe what they read, and hence it is essential to check the authentication of news readers. The spread of fake news could cause severe impacts not just politically but also socially. We strongly believe that spread of intentionally created fake news is more harmful than an accidental one. This paper mainly focuses on the deliberate creation and sharing of false manipulated information intended to deceive and mislead audiences. Fake news detection is a classic classification problem though many attempts of solving it through clustering are being made. Our study mainly focuses on classification algorithms. We used various classification algorithms like SVM, DT, LR, and passive Aggressive Classifier on datasets to find if the news is real or fake on two different datasets. Evaluation parameters were executed to compare the efficiency of the various algorithm. Later we also try to find out which other social media the author accounts for to stop the spread of fake news.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126577464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Attention U-Net for Semantic Segmentation of Dental Panoramic X-ray images 牙科全景x射线图像语义分割的注意力u网
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039666
Dishant Padalia, K. Vora, Deepak Kumar Sharma
Dental disorders can lead to serious implications such as heart attack or strokes if not diagnosed and treated early. The diagnosis of these disorders differs from dentist to dentist due to differences in perception, poor x-ray quality because of noise, and different types of patients. As a result, there is an urgent need to create automated, AI-driven diagnostic solutions for dental disorders. Deep learning solutions have shown outstanding results in automated medical image analysis tasks. Our work proposes a U-Net with attention blocks to segment teeth from dental panoramic X-rays. The proposed Attention U-Net consists of four encoding and decoding blocks and achieved Dice Coefficient, IOU score, Specificity, and F1 Score of 0.9318, 0.8724, 0.9910, and 0.9379, respectively. The Attention U-Net achieves a 1.7% better Dice Coefficient score and 2.9% better IOU (Intersection Over Union) score than one of the best segmentation models, the U-Net. The segmented output can be used in computer-aided diagnostic (CAD) systems to detect various mouth disorders, helping the dentist diagnose the problem efficiently and accurately.
如果不及早诊断和治疗,牙齿疾病会导致严重的后果,如心脏病发作或中风。不同的牙医对这些疾病的诊断也不同,因为他们的感知不同,x光片的质量因噪音而差,以及不同的患者类型。因此,迫切需要为牙齿疾病创建自动化、人工智能驱动的诊断解决方案。深度学习解决方案在自动医学图像分析任务中显示出出色的效果。我们的工作提出了一个带有注意块的U-Net,用于从牙齿全景x射线中分割牙齿。本文提出的注意力U-Net由4个编解码块组成,其Dice Coefficient、IOU score、Specificity和F1 score分别为0.9318、0.8724、0.9910和0.9379。注意力U-Net比最好的分割模型之一U-Net的Dice Coefficient得分高1.7%,IOU (Intersection Over Union)得分高2.9%。分割输出可用于计算机辅助诊断(CAD)系统中检测各种口腔疾病,帮助牙医高效准确地诊断问题。
{"title":"An Attention U-Net for Semantic Segmentation of Dental Panoramic X-ray images","authors":"Dishant Padalia, K. Vora, Deepak Kumar Sharma","doi":"10.1109/ICAST55766.2022.10039666","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039666","url":null,"abstract":"Dental disorders can lead to serious implications such as heart attack or strokes if not diagnosed and treated early. The diagnosis of these disorders differs from dentist to dentist due to differences in perception, poor x-ray quality because of noise, and different types of patients. As a result, there is an urgent need to create automated, AI-driven diagnostic solutions for dental disorders. Deep learning solutions have shown outstanding results in automated medical image analysis tasks. Our work proposes a U-Net with attention blocks to segment teeth from dental panoramic X-rays. The proposed Attention U-Net consists of four encoding and decoding blocks and achieved Dice Coefficient, IOU score, Specificity, and F1 Score of 0.9318, 0.8724, 0.9910, and 0.9379, respectively. The Attention U-Net achieves a 1.7% better Dice Coefficient score and 2.9% better IOU (Intersection Over Union) score than one of the best segmentation models, the U-Net. The segmented output can be used in computer-aided diagnostic (CAD) systems to detect various mouth disorders, helping the dentist diagnose the problem efficiently and accurately.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced RSA Cryptosystem: A Secure and Nimble Approach 增强型RSA密码系统:一种安全灵活的方法
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039627
Tanay Gandhi, Meith Navlakha, Rahul Raheja, Varun Mehta, Yash Jhaveri, N. Shekokar
With the rise in Internet and Network applications in the last decade, there is a need for making communication over the internet to be more secure and strong in order to avoid cyber-attacks. The use of digital signatures has been widely used and there is a need to strengthen the existing public key algorithms. RSA is among the most common public key algorithms but is prone to security risks and attacks due to the advancing computing technology. This paper suggests a new algorithm based on RSA which increases the randomness and diffusion of the RSA algorithm making it more secure from cyber-attacks than RSA. The suggested approach employs four prime integers to generate two sets of public and private keys and involves double encryption and decryption. This modified form of the RSA method adds to the complexity of the encryption process while simultaneously decreasing the decryption time by leveraging the Chinese Remainder theorem.
随着互联网和网络应用在过去十年中的兴起,为了避免网络攻击,需要使互联网上的通信更加安全和强大。数字签名的使用已经得到了广泛的应用,需要对现有的公钥算法进行加强。RSA是最常用的公钥算法之一,但由于计算技术的进步,RSA容易存在安全风险和攻击。本文提出了一种基于RSA的新算法,它增加了RSA算法的随机性和扩散性,使其在网络攻击中比RSA更安全。建议的方法使用四个素数来生成两组公钥和私钥,并涉及双重加密和解密。这种RSA方法的修改形式增加了加密过程的复杂性,同时通过利用中国剩余定理减少了解密时间。
{"title":"Enhanced RSA Cryptosystem: A Secure and Nimble Approach","authors":"Tanay Gandhi, Meith Navlakha, Rahul Raheja, Varun Mehta, Yash Jhaveri, N. Shekokar","doi":"10.1109/ICAST55766.2022.10039627","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039627","url":null,"abstract":"With the rise in Internet and Network applications in the last decade, there is a need for making communication over the internet to be more secure and strong in order to avoid cyber-attacks. The use of digital signatures has been widely used and there is a need to strengthen the existing public key algorithms. RSA is among the most common public key algorithms but is prone to security risks and attacks due to the advancing computing technology. This paper suggests a new algorithm based on RSA which increases the randomness and diffusion of the RSA algorithm making it more secure from cyber-attacks than RSA. The suggested approach employs four prime integers to generate two sets of public and private keys and involves double encryption and decryption. This modified form of the RSA method adds to the complexity of the encryption process while simultaneously decreasing the decryption time by leveraging the Chinese Remainder theorem.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131548396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lossy Image Compression-A Comparison Between Wavelet Transform, Principal Component Analysis, K-Means and Autoencoders 有损图像压缩——小波变换、主成分分析、k均值和自编码器的比较
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039613
Ankit Thakker, Nikhil Namboodiri, Ritik Mody, Riya Tasgaonkar, Mansi Kambli
For many years, lossless image compression has been a promising topic of study. Various techniques have been created over time to obtain an approximation of the reduced data size. While discrete wavelet transform (DWT) and discrete cosine transform (DCT) have historically been employed for the purpose of compressing images, various machine learning methods and deep learning networks are now being offered. In this research, we conduct a comparative analysis of conventional and contemporary lossy image compression techniques on the Kodak Dataset, including Autoencoders, Principal Component Analysis (PCA), K-Means, and Discrete Wavelet Transform (DWT). The metrics used for the evaluation of the proposed study are Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Compression Ratio (CR), and Structural Similarity Index (SSIM).
多年来,无损图像压缩一直是一个很有前途的研究课题。随着时间的推移,已经创建了各种技术来获得减少的数据大小的近似值。虽然离散小波变换(DWT)和离散余弦变换(DCT)历来被用于压缩图像,但现在提供了各种机器学习方法和深度学习网络。在本研究中,我们在柯达数据集上对传统和现代有损图像压缩技术进行了比较分析,包括自动编码器、主成分分析(PCA)、K-Means和离散小波变换(DWT)。用于评估拟议研究的指标是均方误差(MSE)、峰值信噪比(PSNR)、压缩比(CR)和结构相似性指数(SSIM)。
{"title":"Lossy Image Compression-A Comparison Between Wavelet Transform, Principal Component Analysis, K-Means and Autoencoders","authors":"Ankit Thakker, Nikhil Namboodiri, Ritik Mody, Riya Tasgaonkar, Mansi Kambli","doi":"10.1109/ICAST55766.2022.10039613","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039613","url":null,"abstract":"For many years, lossless image compression has been a promising topic of study. Various techniques have been created over time to obtain an approximation of the reduced data size. While discrete wavelet transform (DWT) and discrete cosine transform (DCT) have historically been employed for the purpose of compressing images, various machine learning methods and deep learning networks are now being offered. In this research, we conduct a comparative analysis of conventional and contemporary lossy image compression techniques on the Kodak Dataset, including Autoencoders, Principal Component Analysis (PCA), K-Means, and Discrete Wavelet Transform (DWT). The metrics used for the evaluation of the proposed study are Mean Squared Error (MSE), Peak Signal to Noise Ratio (PSNR), Compression Ratio (CR), and Structural Similarity Index (SSIM).","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"99 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131879143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Handling of Big Data and Network Traffic Control: A Review 大数据高效处理与网络流量控制综述
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039607
S. Virnodkar, Kashyap Kotak, R. Jinturkar, Prince Karania
The digital world is lately experiencing tremendous increase in the number of users, leading to almost an exponential growth in data, which in turn has increased the number of users accessing the data, thus making the antecedent data handling and digital traffic handling techniques counterproductive. As a result, a demand for new technologies and standards for handling this huge amount of data and traffic accessing the data has come into sight. This review paper focuses on analyzing the presently existing big data handling technologies. This paper also discusses the network traffic handling methods used till date.
数字世界最近正在经历用户数量的巨大增长,导致数据几乎呈指数级增长,这反过来又增加了访问数据的用户数量,从而使先前的数据处理和数字流量处理技术适得其反。因此,需要新的技术和标准来处理如此庞大的数据和访问数据的流量。本文重点分析了目前已有的大数据处理技术。本文还讨论了目前常用的网络流量处理方法。
{"title":"Efficient Handling of Big Data and Network Traffic Control: A Review","authors":"S. Virnodkar, Kashyap Kotak, R. Jinturkar, Prince Karania","doi":"10.1109/ICAST55766.2022.10039607","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039607","url":null,"abstract":"The digital world is lately experiencing tremendous increase in the number of users, leading to almost an exponential growth in data, which in turn has increased the number of users accessing the data, thus making the antecedent data handling and digital traffic handling techniques counterproductive. As a result, a demand for new technologies and standards for handling this huge amount of data and traffic accessing the data has come into sight. This review paper focuses on analyzing the presently existing big data handling technologies. This paper also discusses the network traffic handling methods used till date.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133093037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a T-shaped UWB Textile Antenna for WiMax/WLAN Application 用于WiMax/WLAN应用的t形超宽带纺织天线设计
Pub Date : 2022-12-02 DOI: 10.1109/ICAST55766.2022.10039615
Sonal R. Jatkar, N. Kasat
In this article, conductive electro-textile and cotton substrate is used to fabricate a T-shaped ultra-wideband (UWB) antenna. Using ANSYS high frequency structural simulator (HFSS), $mathrm{S}11leq-10 text{dB}$ and Voltage Standing Wave Ratio $(text{VSWR})leq 2$ is obtained for the coplanar waveguide (CPW)–fed antenna over the range of frequency from 3.5 to 12 GHz. The antenna's 50 mm x 38 mm x 0.6 mm dimensions allowed it to radiate in a directed manner with a 5 dBi average peak gain over the whole impedance bandwidth. This paper's main contribution is the use of a wearable antenna with a 159.24% wide impedance bandwidth.
本文采用导电电织物和棉质衬底制备了t型超宽带天线。利用ANSYS高频结构模拟器(HFSS)计算了共面波导馈电天线在3.5 ~ 12 GHz频率范围内的驻波比$mathrm{S}11leq-10 text{dB}$和电压驻波比$(text{VSWR})leq 2$。天线的尺寸为50mm x 38mm x 0.6 mm,使其能够在整个阻抗带宽上以5dbi的平均峰值增益定向辐射。本文的主要贡献是使用了159.24的可穿戴天线% wide impedance bandwidth.
{"title":"Design of a T-shaped UWB Textile Antenna for WiMax/WLAN Application","authors":"Sonal R. Jatkar, N. Kasat","doi":"10.1109/ICAST55766.2022.10039615","DOIUrl":"https://doi.org/10.1109/ICAST55766.2022.10039615","url":null,"abstract":"In this article, conductive electro-textile and cotton substrate is used to fabricate a T-shaped ultra-wideband (UWB) antenna. Using ANSYS high frequency structural simulator (HFSS), $mathrm{S}11leq-10 text{dB}$ and Voltage Standing Wave Ratio $(text{VSWR})leq 2$ is obtained for the coplanar waveguide (CPW)–fed antenna over the range of frequency from 3.5 to 12 GHz. The antenna's 50 mm x 38 mm x 0.6 mm dimensions allowed it to radiate in a directed manner with a 5 dBi average peak gain over the whole impedance bandwidth. This paper's main contribution is the use of a wearable antenna with a 159.24% wide impedance bandwidth.","PeriodicalId":225239,"journal":{"name":"2022 5th International Conference on Advances in Science and Technology (ICAST)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115040860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Advances in Science and Technology (ICAST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1