首页 > 最新文献

2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)最新文献

英文 中文
Optimum Analysis of Imbalanced Network for Intrusion Detection using LSTM Convolution Technique 基于LSTM卷积技术的入侵检测不平衡网络优化分析
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10140458
Monika Meena, Rakesh Kumar Tiwari
Analyzing network packets to determine whether they are genuine or suspicious are called “Intrusion Detection.” The significant difficulties associated with this space incorporates the tremendous volume of information for preparing and the quick and streaming information that will be accommodated the expectation interaction. In addition, the intrusion detection model faces additional difficulties as a result of the domain's inherent data imbalance. The classification accuracy and other parameters of enhanced LSTM are contrasted with those of conventional deep learning and other machine learning methods in this study. In addition to classifying the tweets, this framework can be used to investigate user attitudes toward Indian higher education. Two algorithms form the basis of the proposed framework: Using the evolutionary algorithm to improve LSTM. Because the standard LSTM algorithm can select parameter values at random, the enhanced LSTM algorithm uses the evolutionary algorithm to enhance its functionality.
分析网络数据包以确定它们是真实的还是可疑的被称为“入侵检测”。与此空间相关的重大困难包括用于准备的大量信息以及将适应预期交互的快速和流式信息。此外,由于该领域固有的数据不平衡性,使得入侵检测模型面临着额外的困难。本研究将增强LSTM的分类精度等参数与传统深度学习和其他机器学习方法进行对比。除了对推文进行分类之外,这个框架还可以用来调查用户对印度高等教育的态度。两种算法构成了该框架的基础:使用进化算法改进LSTM。由于标准LSTM算法可以随机选择参数值,因此增强的LSTM算法使用进化算法来增强其功能。
{"title":"Optimum Analysis of Imbalanced Network for Intrusion Detection using LSTM Convolution Technique","authors":"Monika Meena, Rakesh Kumar Tiwari","doi":"10.1109/ICAAIC56838.2023.10140458","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10140458","url":null,"abstract":"Analyzing network packets to determine whether they are genuine or suspicious are called “Intrusion Detection.” The significant difficulties associated with this space incorporates the tremendous volume of information for preparing and the quick and streaming information that will be accommodated the expectation interaction. In addition, the intrusion detection model faces additional difficulties as a result of the domain's inherent data imbalance. The classification accuracy and other parameters of enhanced LSTM are contrasted with those of conventional deep learning and other machine learning methods in this study. In addition to classifying the tweets, this framework can be used to investigate user attitudes toward Indian higher education. Two algorithms form the basis of the proposed framework: Using the evolutionary algorithm to improve LSTM. Because the standard LSTM algorithm can select parameter values at random, the enhanced LSTM algorithm uses the evolutionary algorithm to enhance its functionality.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121263878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Synthesis from Themes Captured in Poems using Latent Diffusion Models 利用潜在扩散模型从诗歌中捕获的主题中合成图像
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141274
Mayank Virmani, A. M. Michael, Manjiri Pathak, K. S. Pai, V. B. Prasad
Due to the presence of complex literary devices such as metaphors and imagery, poetry can be difficult to comprehend. This is especially true for literary works of classical poets like Kaalidasa that employ intricate, often conflicting themes which tend to be particularly tedious to interpret and decipher. The beauty of these works of art tends to get lost in translation. A visual representation in the form of images corresponding to the various themes in the poetry, greatly aids in providing a clearer understanding of the meaning and imagery described. The main aim here is to make classical poetry more accessible by generating detailed images that capture and depict the metaphors and themes used in various works of literature. The core task in this paper is to employ novel machine learning (NLP) techniques to detect and extract the central themes and keywords from the poems that encapsulate the essence of the literary work. This is done using transformer models fine-tuned specifically on a summarization dataset, that generate an abstractive summary of the segment of input text. Maintaining context while doing so is essential to the accuracy of the images being generated. Further, this summary is then provided as an input to a Latent Diffusion Model to generate detailed images corresponding to the poetry. The goal of the project is to make it easier to consume and enjoy classical works of literature by providing additional context and information in the form of images complementing the poetry.
由于存在复杂的文学手段,如隐喻和意象,诗歌可能很难理解。对于像Kaalidasa这样的古典诗人的文学作品来说尤其如此,这些作品采用了复杂的,经常是相互矛盾的主题,这些主题往往特别乏味,难以解释和破译。这些艺术作品的美往往在翻译中消失了。与诗歌主题相对应的图像形式的视觉表现,极大地有助于提供对所描述的意义和意象的更清晰理解。这里的主要目的是通过生成捕捉和描绘各种文学作品中使用的隐喻和主题的详细图像,使古典诗歌更容易理解。本文的核心任务是采用新颖的机器学习(NLP)技术从诗歌中检测和提取中心主题和关键词,这些主题和关键词概括了文学作品的本质。这是使用专门针对摘要数据集进行微调的转换器模型来完成的,该模型生成输入文本片段的抽象摘要。在这样做的同时保持上下文对生成的图像的准确性至关重要。此外,该摘要随后作为潜在扩散模型的输入提供,以生成与诗歌对应的详细图像。该项目的目标是通过以图像的形式提供额外的背景和信息来补充诗歌,从而使古典文学作品更容易消费和享受。
{"title":"Image Synthesis from Themes Captured in Poems using Latent Diffusion Models","authors":"Mayank Virmani, A. M. Michael, Manjiri Pathak, K. S. Pai, V. B. Prasad","doi":"10.1109/ICAAIC56838.2023.10141274","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141274","url":null,"abstract":"Due to the presence of complex literary devices such as metaphors and imagery, poetry can be difficult to comprehend. This is especially true for literary works of classical poets like Kaalidasa that employ intricate, often conflicting themes which tend to be particularly tedious to interpret and decipher. The beauty of these works of art tends to get lost in translation. A visual representation in the form of images corresponding to the various themes in the poetry, greatly aids in providing a clearer understanding of the meaning and imagery described. The main aim here is to make classical poetry more accessible by generating detailed images that capture and depict the metaphors and themes used in various works of literature. The core task in this paper is to employ novel machine learning (NLP) techniques to detect and extract the central themes and keywords from the poems that encapsulate the essence of the literary work. This is done using transformer models fine-tuned specifically on a summarization dataset, that generate an abstractive summary of the segment of input text. Maintaining context while doing so is essential to the accuracy of the images being generated. Further, this summary is then provided as an input to a Latent Diffusion Model to generate detailed images corresponding to the poetry. The goal of the project is to make it easier to consume and enjoy classical works of literature by providing additional context and information in the form of images complementing the poetry.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127356755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification of Disease in Cassava Leaf using Deep Learning 基于深度学习的木薯叶片病害识别
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141161
Siddharth Magadum, Srikar S, Suprith Hattikal, Y. M., Priya Badrinath
Automating the disease detection in plants is one of the most complex recent challenges faced by agricultural experts and farmers worldwide. The traditional laboratory testing methods are inefficient for detecting diseases in crops such as cassava. Unlike rice and maize, cassava is the third-largest source of carbohydrates. It is nutritious, it consists of resistant starch and its root is high in vitamin C. These plants suffer from four major diseases which spread to neighboring cassava plants and affect the cultivation. This paper describes the work done to detect and classify the disease, which will help in figuring out if the crop is healthy and can prevent further spread of disease. Computer vision is a subset of deep learning, which trains computers to interpret and understand the visual world. The paper discusses various ways for training models and their results for disease classification. The work achieves the best accuracy of 89.01% by using the EfficientNetB3 model.
植物病害检测自动化是全球农业专家和农民面临的最复杂的挑战之一。传统的实验室检测方法在检测木薯等作物病害方面效率低下。与大米和玉米不同,木薯是碳水化合物的第三大来源。它营养丰富,由抗性淀粉组成,其根富含维生素c。这些植物患有四种主要疾病,这些疾病会传播给邻近的木薯植物并影响种植。本文介绍了检测和分类病害所做的工作,这将有助于确定作物是否健康,并可以防止疾病的进一步传播。计算机视觉是深度学习的一个子集,它训练计算机来解释和理解视觉世界。本文讨论了用于疾病分类的各种模型训练方法及其结果。使用effentnetb3模型,获得了89.01%的最佳准确率。
{"title":"Identification of Disease in Cassava Leaf using Deep Learning","authors":"Siddharth Magadum, Srikar S, Suprith Hattikal, Y. M., Priya Badrinath","doi":"10.1109/ICAAIC56838.2023.10141161","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141161","url":null,"abstract":"Automating the disease detection in plants is one of the most complex recent challenges faced by agricultural experts and farmers worldwide. The traditional laboratory testing methods are inefficient for detecting diseases in crops such as cassava. Unlike rice and maize, cassava is the third-largest source of carbohydrates. It is nutritious, it consists of resistant starch and its root is high in vitamin C. These plants suffer from four major diseases which spread to neighboring cassava plants and affect the cultivation. This paper describes the work done to detect and classify the disease, which will help in figuring out if the crop is healthy and can prevent further spread of disease. Computer vision is a subset of deep learning, which trains computers to interpret and understand the visual world. The paper discusses various ways for training models and their results for disease classification. The work achieves the best accuracy of 89.01% by using the EfficientNetB3 model.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114917964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bi-LSTM Neural Network Approach to Detect and Recognize Cyberthreats, Cyberstalking and Extremist Tweets in Twitter Bi-LSTM神经网络方法检测和识别网络威胁、网络跟踪和Twitter中的极端主义推文
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10140281
A. K, R. O, J. D, S. S
Phishing attacks, in which victims are handed dangerous URLs, are among the cyberthreats. When you engage with these sites, a process of credential stealing begins. Furthermore, there has been an increase in the transmission of terrorist and extremist tweets, as well as cyberstalking operations, in recent days. As technology advances this can be addressed with machine learning approaches and artificial intelligence by developing models and conducting automated tweet identification. Cyberthreats, cyberstalking, and extremist comments are anticipated using this live algorithm. The dataset obtained from Kaggle is given as input to the model and are trained using the Bi-LSTM method based on a twitter dataset. The algorithm has outstanding performance scores, with a total accuracy of 93% and F1 score of 95%.
网络钓鱼攻击是网络威胁之一,受害者会得到危险的url。当你与这些网站互动时,一个窃取凭证的过程就开始了。此外,最近几天,恐怖主义和极端主义推文的传播以及网络跟踪行动有所增加。随着技术的进步,这可以通过机器学习方法和人工智能来解决,通过开发模型和进行自动推文识别。网络威胁、网络跟踪和极端主义评论都可以使用这种实时算法。从Kaggle获得的数据集作为模型的输入,并使用基于twitter数据集的Bi-LSTM方法进行训练。该算法具有优异的性能分数,总准确率为93%,F1分数为95%。
{"title":"Bi-LSTM Neural Network Approach to Detect and Recognize Cyberthreats, Cyberstalking and Extremist Tweets in Twitter","authors":"A. K, R. O, J. D, S. S","doi":"10.1109/ICAAIC56838.2023.10140281","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10140281","url":null,"abstract":"Phishing attacks, in which victims are handed dangerous URLs, are among the cyberthreats. When you engage with these sites, a process of credential stealing begins. Furthermore, there has been an increase in the transmission of terrorist and extremist tweets, as well as cyberstalking operations, in recent days. As technology advances this can be addressed with machine learning approaches and artificial intelligence by developing models and conducting automated tweet identification. Cyberthreats, cyberstalking, and extremist comments are anticipated using this live algorithm. The dataset obtained from Kaggle is given as input to the model and are trained using the Bi-LSTM method based on a twitter dataset. The algorithm has outstanding performance scores, with a total accuracy of 93% and F1 score of 95%.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115186395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Child Digital Monitoring and Controlling System 儿童数字监控系统
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141525
S. Yazhini, Jeyam StudentCSE, StudentCSE, MS. T. Savitha, Devi Apcse, StudentCSE S. Vignesh
Kids who use their phones excessively may experience a range of concerns, including impaired attention, sleep disruptions, mental health problems, eye problems, and obesity. To solve this problem, a system for safety monitoring has been proposed that would let parents watch their kids' whereabouts from a distance. This system functions covertly in the background, gathering phone records, message information, contact lists, and precise location without the child's knowledge. It locates the child's position using the AGPS, and Dijkstra algorithm. The algorithms RSA and AES are employed. The programme, which functions like a spy app, is meant to shield youngsters from offensive material, exploitation, and cyberbullying.
过度使用手机的孩子可能会遇到一系列问题,包括注意力受损、睡眠中断、心理健康问题、眼睛问题和肥胖。为了解决这个问题,一个安全监控系统已经被提出,它可以让父母从远处看到孩子的行踪。该系统在后台秘密运行,在孩子不知情的情况下收集电话记录、短信信息、联系人名单和精确位置。它使用AGPS和Dijkstra算法来定位孩子的位置。采用了RSA和AES算法。该程序的功能类似于间谍应用程序,旨在保护青少年免受攻击性内容、剥削和网络欺凌的侵害。
{"title":"Child Digital Monitoring and Controlling System","authors":"S. Yazhini, Jeyam StudentCSE, StudentCSE, MS. T. Savitha, Devi Apcse, StudentCSE S. Vignesh","doi":"10.1109/ICAAIC56838.2023.10141525","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141525","url":null,"abstract":"Kids who use their phones excessively may experience a range of concerns, including impaired attention, sleep disruptions, mental health problems, eye problems, and obesity. To solve this problem, a system for safety monitoring has been proposed that would let parents watch their kids' whereabouts from a distance. This system functions covertly in the background, gathering phone records, message information, contact lists, and precise location without the child's knowledge. It locates the child's position using the AGPS, and Dijkstra algorithm. The algorithms RSA and AES are employed. The programme, which functions like a spy app, is meant to shield youngsters from offensive material, exploitation, and cyberbullying.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115576841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Network-based Approach to Predict Protein Secondary Structure 基于神经网络的蛋白质二级结构预测方法
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10140404
Arifur Rahman, Anik Mahmud, Pintu Chandra Shill
Protein Secondary structure prediction is an emerging topic in bioinformatics to understand briefly the functions of protein and their role in drug invention, medicine and biology. In our research we have applied two recurrent neural network based approach Bi-LSTM (Bidirectional Long Short-Term Memory) and LSTM (Long Short-Term Memory). Our research was focused on primary structure up to 134 in length of amino acids. Initially our proposed model produced a ‘Indexed Lexicon of corpus’ using tri-gram conversion for primary structure strings. Each primary structure tri-gram transformed snippets is substituted with its associated index mentioned in ‘Indexed corpus’. The indexed parameter vector inputted into our proposed Bi-LSTM and LSTM model. We got best accuracy when we have used two Bi-LSTM and three LSTM layers respectively in Bi-LSTM and LSTM models. To prevent biasness and minimize overfitting problem we have utilized two dropout layers for each of Bi-LSTM and LSTM model. We have operated our model on ccPDB 2.0 benchmark dataset. There is total eight states protein secondary structure in this dataset. For this sst8 secondary structure we have achieved 83.24% accuracy for our proposed LSTM model and 89.10% accuracy for our Bi-LSTM model. We have configured our model to run for 50 epochs with batch size 64. For compilation of our models we have utilized ‘adam’ optimizer and the ‘categorical crossentropy’ loss function. To make dataset balanced to our model we have also employed 5-fold cross validation.
蛋白质二级结构预测是生物信息学领域的一个新兴课题,旨在简要了解蛋白质的功能及其在药物发明、医学和生物学中的作用。在我们的研究中,我们应用了两种基于递归神经网络的方法Bi-LSTM(双向长短期记忆)和LSTM(长短期记忆)。我们的研究主要集中在长度为134的氨基酸一级结构上。最初,我们提出的模型使用三格转换对主要结构字符串生成了一个“语料库索引词典”。每个主结构三元图转换片段都用“索引语料库”中提到的相关索引替换。将索引参数向量输入到我们提出的Bi-LSTM和LSTM模型中。当我们在Bi-LSTM和LSTM模型中分别使用两层和三层LSTM时,得到了最好的精度。为了防止偏倚和最小化过拟合问题,我们为Bi-LSTM和LSTM模型各使用了两个dropout层。我们在ccPDB 2.0基准数据集上运行了我们的模型。该数据集中共有8种状态的蛋白质二级结构。对于sst8二级结构,我们所提出的LSTM模型的准确率达到了83.24%,Bi-LSTM模型的准确率达到了89.10%。我们将模型配置为运行50个epoch,批大小为64。为了编译我们的模型,我们使用了“adam”优化器和“分类交叉熵”损失函数。为了使数据集与我们的模型平衡,我们还采用了5倍交叉验证。
{"title":"Neural Network-based Approach to Predict Protein Secondary Structure","authors":"Arifur Rahman, Anik Mahmud, Pintu Chandra Shill","doi":"10.1109/ICAAIC56838.2023.10140404","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10140404","url":null,"abstract":"Protein Secondary structure prediction is an emerging topic in bioinformatics to understand briefly the functions of protein and their role in drug invention, medicine and biology. In our research we have applied two recurrent neural network based approach Bi-LSTM (Bidirectional Long Short-Term Memory) and LSTM (Long Short-Term Memory). Our research was focused on primary structure up to 134 in length of amino acids. Initially our proposed model produced a ‘Indexed Lexicon of corpus’ using tri-gram conversion for primary structure strings. Each primary structure tri-gram transformed snippets is substituted with its associated index mentioned in ‘Indexed corpus’. The indexed parameter vector inputted into our proposed Bi-LSTM and LSTM model. We got best accuracy when we have used two Bi-LSTM and three LSTM layers respectively in Bi-LSTM and LSTM models. To prevent biasness and minimize overfitting problem we have utilized two dropout layers for each of Bi-LSTM and LSTM model. We have operated our model on ccPDB 2.0 benchmark dataset. There is total eight states protein secondary structure in this dataset. For this sst8 secondary structure we have achieved 83.24% accuracy for our proposed LSTM model and 89.10% accuracy for our Bi-LSTM model. We have configured our model to run for 50 epochs with batch size 64. For compilation of our models we have utilized ‘adam’ optimizer and the ‘categorical crossentropy’ loss function. To make dataset balanced to our model we have also employed 5-fold cross validation.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122580566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning based Beach Cleaning Robot 基于深度学习的海滩清洁机器人
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141099
Joseph K.A, Joshua Sony C, Lakshmi Rajkumar M, Syam Krishna P.S, Ambily Francis, Anju Babu
Robots are now more autonomous and effective than ever because to the quick development of digital technologies. Future advancements in robotics could change how people and robots interact. Robots will likely carry out a range of tasks in public areas. Robots could significantly enhance our quality of life and add to the atmosphere, capacity for creativity, and safety of public spaces. However, as this tendency advances, there is a danger that robots will negatively alter public areas and social relationships. This research study investigates how public policy may both improve opportunities brought about by the presence of robots in public spaces and lessen the risks of unfavorable consequences by analyzing prior methods to utilizing and controlling disruptive technology. Robots are effective in waste management also. By using object detection robots could clean the wastes automatically and efficiently by making the surroundings clean.
由于数字技术的快速发展,机器人现在比以往任何时候都更加自主和有效。未来机器人技术的进步可能会改变人与机器人的互动方式。机器人可能会在公共场所执行一系列任务。机器人可以显著提高我们的生活质量,增加公共空间的氛围、创造力和安全性。然而,随着这种趋势的发展,机器人可能会对公共场所和社会关系产生负面影响。本研究通过分析利用和控制颠覆性技术的先前方法,探讨公共政策如何改善机器人在公共空间的存在所带来的机会,并减少不利后果的风险。机器人在废物管理方面也很有效。利用物体检测技术,机器人可以自动高效地清理垃圾,使周围环境变得干净。
{"title":"Deep Learning based Beach Cleaning Robot","authors":"Joseph K.A, Joshua Sony C, Lakshmi Rajkumar M, Syam Krishna P.S, Ambily Francis, Anju Babu","doi":"10.1109/ICAAIC56838.2023.10141099","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141099","url":null,"abstract":"Robots are now more autonomous and effective than ever because to the quick development of digital technologies. Future advancements in robotics could change how people and robots interact. Robots will likely carry out a range of tasks in public areas. Robots could significantly enhance our quality of life and add to the atmosphere, capacity for creativity, and safety of public spaces. However, as this tendency advances, there is a danger that robots will negatively alter public areas and social relationships. This research study investigates how public policy may both improve opportunities brought about by the presence of robots in public spaces and lessen the risks of unfavorable consequences by analyzing prior methods to utilizing and controlling disruptive technology. Robots are effective in waste management also. By using object detection robots could clean the wastes automatically and efficiently by making the surroundings clean.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122473535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-based Decentralized Smart Healthcare for Patient Monitoring on Deep Learning 基于深度学习的患者监测的基于云的分散式智能医疗
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141120
Sripriya Arunachalam, Shanthi H J, G. Sivagurunathan, Shyamali Das, D. Anand, Thanga Raj M
Over the past few years, there has been a meteoric surge in the quantity of digital information available online for instantaneous sharing, persistent archiving, and inquiring. It has expanded the possibilities for using digital data that is both decentralised and ad hoc in order to make decisions quickly. At present, e-Healthcare is among the most sought-after sectors for EHR and telemedicine communication. Securing electronic health records (EHR) has become a topic of intense interest in recent years, with previous works employing a wide range of methods to better ensure the confidentiality and security of EHR at a reasonable price. There are a number of serious problems with the current research, including computational complexity, increased process time, information leakage, vulnerability to various assaults, scalability difficulty, etc. Clinical data analysis presents several difficulties, but disease prediction is one of the most significant ones. The suggested study aims to apply deep learning (DL) classification algorithms for disease prediction. A technique that utilises cloud computing, fog computing, and IoMT more recently has been presented for diagnosing illness. Fast DL classification analysis is performed in the fog layer. When compared to the alternative proposed model Bi-CNN, the healthcare model's efficiency in the Bi-LSTM simulation yields significantly better results: 97.31% of accuracy, 97.58% of recall, 96.90% of precision, 94.90% of F1-measure, 97.25% of specificity, and 94.80% of G-mean.
在过去的几年中,在线上可用于即时共享、持久存档和查询的数字信息数量急剧增加。它扩大了使用数字数据的可能性,这些数据既分散又特别,以便快速做出决策。目前,电子医疗是电子健康档案和远程医疗通讯最受欢迎的领域之一。近年来,电子健康档案(EHR)的安全已成为一个备受关注的话题,以往的工作采用了各种方法,以合理的价格更好地确保电子健康档案的保密性和安全性。目前的研究存在许多严重的问题,包括计算复杂性、处理时间增加、信息泄露、易受各种攻击、可扩展性困难等。临床数据分析存在一些困难,但疾病预测是其中最重要的困难之一。该研究旨在将深度学习(DL)分类算法应用于疾病预测。最近出现了一种利用云计算、雾计算和IoMT进行疾病诊断的技术。在雾层中进行快速深度学习分类分析。与备选模型Bi-CNN相比,医疗保健模型在Bi-LSTM模拟中的效率显著提高:准确率为97.31%,召回率为97.58%,精度为96.90%,F1-measure为94.90%,特异性为97.25%,G-mean为94.80%。
{"title":"Cloud-based Decentralized Smart Healthcare for Patient Monitoring on Deep Learning","authors":"Sripriya Arunachalam, Shanthi H J, G. Sivagurunathan, Shyamali Das, D. Anand, Thanga Raj M","doi":"10.1109/ICAAIC56838.2023.10141120","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141120","url":null,"abstract":"Over the past few years, there has been a meteoric surge in the quantity of digital information available online for instantaneous sharing, persistent archiving, and inquiring. It has expanded the possibilities for using digital data that is both decentralised and ad hoc in order to make decisions quickly. At present, e-Healthcare is among the most sought-after sectors for EHR and telemedicine communication. Securing electronic health records (EHR) has become a topic of intense interest in recent years, with previous works employing a wide range of methods to better ensure the confidentiality and security of EHR at a reasonable price. There are a number of serious problems with the current research, including computational complexity, increased process time, information leakage, vulnerability to various assaults, scalability difficulty, etc. Clinical data analysis presents several difficulties, but disease prediction is one of the most significant ones. The suggested study aims to apply deep learning (DL) classification algorithms for disease prediction. A technique that utilises cloud computing, fog computing, and IoMT more recently has been presented for diagnosing illness. Fast DL classification analysis is performed in the fog layer. When compared to the alternative proposed model Bi-CNN, the healthcare model's efficiency in the Bi-LSTM simulation yields significantly better results: 97.31% of accuracy, 97.58% of recall, 96.90% of precision, 94.90% of F1-measure, 97.25% of specificity, and 94.80% of G-mean.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121893044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Image Classification Model using ResNet101 and VGG16 基于ResNet101和VGG16的混合图像分类模型
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10140790
G. Surekha, Patlolla Sai Keerthana, Nallantla Jaswanth Varma, Tummala Sai Gopi
Deep convolution neural networks have made sig-nificant advances in object identification. The popularity of machine learning-based image classification has increased as a result of developments in deep learning algorithms that makes it possible to extract features from images. Yet, conventional image classification algorithms are far too incorrect and untrustworthy to address the problem. Automation is crucial due to the vast geographic areas that must be explored and the scarcity of researchers available to carry out the searches. The proposed work employs deep learning-based image classification using a hybrid model of ResNet101 and VGG16 to address the challenges of image classification in large geographic areas using satellite images.
深度卷积神经网络在目标识别方面取得了重大进展。由于深度学习算法的发展,使得从图像中提取特征成为可能,基于机器学习的图像分类越来越受欢迎。然而,传统的图像分类算法太不正确和不可信,无法解决这个问题。由于必须探索的广阔地理区域和可用于进行搜索的研究人员的稀缺,自动化是至关重要的。提出的工作采用基于深度学习的图像分类,使用ResNet101和VGG16的混合模型来解决使用卫星图像在大地理区域进行图像分类的挑战。
{"title":"Hybrid Image Classification Model using ResNet101 and VGG16","authors":"G. Surekha, Patlolla Sai Keerthana, Nallantla Jaswanth Varma, Tummala Sai Gopi","doi":"10.1109/ICAAIC56838.2023.10140790","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10140790","url":null,"abstract":"Deep convolution neural networks have made sig-nificant advances in object identification. The popularity of machine learning-based image classification has increased as a result of developments in deep learning algorithms that makes it possible to extract features from images. Yet, conventional image classification algorithms are far too incorrect and untrustworthy to address the problem. Automation is crucial due to the vast geographic areas that must be explored and the scarcity of researchers available to carry out the searches. The proposed work employs deep learning-based image classification using a hybrid model of ResNet101 and VGG16 to address the challenges of image classification in large geographic areas using satellite images.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"160 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122039161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Approach for Breast Cancer Prediction: A Review 乳腺癌预测的机器学习方法综述
Pub Date : 2023-05-04 DOI: 10.1109/ICAAIC56838.2023.10141164
Yashwant Wankhade, Shrividya Toutam, Khushboo Thakre, Kamlesh Kalbande, Prasheel N. Thakre
Breast cancer is a complicated and diverse illness that affects millions of women worldwide. A correct diagnosis and early detection are essential for effective therapy and better patient outcomes. In the past few years, developing predictive models and machine learning algorithms has received a lot of interest in the detection and diagnosis of breast cancer. This research study intends to present a thorough overview of the most recent breast cancer prognostic models, covering risk assessment, diagnosis, and prognosis. This paper addresses many different data types, including clinical, genetic, and imaging data, used in breast cancer prediction, as well as the several machine learning techniques used, including SVM, naïve Bayes, and random forests. A comparative analysis of different algorithms with methodology has been provided in this research study.
乳腺癌是一种复杂多样的疾病,影响着全世界数百万妇女。正确的诊断和早期发现对于有效治疗和改善患者预后至关重要。在过去的几年里,开发预测模型和机器学习算法在乳腺癌的检测和诊断方面受到了很多关注。本研究旨在全面概述最新的乳腺癌预后模型,包括风险评估、诊断和预后。本文讨论了用于乳腺癌预测的许多不同的数据类型,包括临床,遗传和成像数据,以及使用的几种机器学习技术,包括支持向量机,naïve贝叶斯和随机森林。本研究对不同的算法和方法进行了比较分析。
{"title":"Machine Learning Approach for Breast Cancer Prediction: A Review","authors":"Yashwant Wankhade, Shrividya Toutam, Khushboo Thakre, Kamlesh Kalbande, Prasheel N. Thakre","doi":"10.1109/ICAAIC56838.2023.10141164","DOIUrl":"https://doi.org/10.1109/ICAAIC56838.2023.10141164","url":null,"abstract":"Breast cancer is a complicated and diverse illness that affects millions of women worldwide. A correct diagnosis and early detection are essential for effective therapy and better patient outcomes. In the past few years, developing predictive models and machine learning algorithms has received a lot of interest in the detection and diagnosis of breast cancer. This research study intends to present a thorough overview of the most recent breast cancer prognostic models, covering risk assessment, diagnosis, and prognosis. This paper addresses many different data types, including clinical, genetic, and imaging data, used in breast cancer prediction, as well as the several machine learning techniques used, including SVM, naïve Bayes, and random forests. A comparative analysis of different algorithms with methodology has been provided in this research study.","PeriodicalId":267906,"journal":{"name":"2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116591739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 2nd International Conference on Applied Artificial Intelligence and Computing (ICAAIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1