首页 > 最新文献

2022 International Conference on Edge Computing and Applications (ICECAA)最新文献

英文 中文
Multi-Tier Kernel for Disease Prediction using Texture Analysis with MR Images 基于核磁共振图像纹理分析的多层核疾病预测
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936466
M. Mohan, Anuradha Patil, S. Mohana, P. Subhashini, Sumit Kushwaha, S. M. Pandian
Denoising magnetic resonance images are traditionally done individually, introducing undesired artefacts like blurring. To solve this issue, this paper offers a unique adaptive interpolation architecture that simultaneously allows for image data augmentation, noise removal, and detail augmentation. The multi-tier kernel (MTK) algorithm adjusts the extrapolation weights based on mathematical features in magnetic resonance (MR) data. The MTK weight matrix is then adaptively sharpened, and a Rician bias corrective is used to reduce Rician noise and improve small details. After processing, the noise eliminates the bias produced by the asymmetric sources. The adaptive MTK, in this way, extends the zero ordering estimating methodology to higher regression power facilitating edge maintenance and detail restoration. Investigation outcomes using genuine and MR images (with/without noise) evidenced that the algorithm delivered good restoration outcomes than conventional deep-learning-based approaches but with fewer requirements and calculation burden.
磁共振图像的去噪传统上是单独进行的,引入了不希望的人工制品,如模糊。为了解决这个问题,本文提供了一个独特的自适应插值架构,同时允许图像数据增强,去噪和细节增强。多层核(MTK)算法根据磁共振数据的数学特征调整外推权重。然后对MTK权重矩阵进行自适应锐化,并使用医师偏差校正来降低医师噪声并改善小细节。经过处理后,噪声消除了非对称源产生的偏置。通过这种方式,自适应MTK将零阶估计方法扩展到更高的回归功率,便于边缘维护和细节恢复。使用真实图像和MR图像(带/不带噪声)的调查结果证明,该算法比传统的基于深度学习的方法提供了更好的恢复结果,但要求和计算负担更少。
{"title":"Multi-Tier Kernel for Disease Prediction using Texture Analysis with MR Images","authors":"M. Mohan, Anuradha Patil, S. Mohana, P. Subhashini, Sumit Kushwaha, S. M. Pandian","doi":"10.1109/ICECAA55415.2022.9936466","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936466","url":null,"abstract":"Denoising magnetic resonance images are traditionally done individually, introducing undesired artefacts like blurring. To solve this issue, this paper offers a unique adaptive interpolation architecture that simultaneously allows for image data augmentation, noise removal, and detail augmentation. The multi-tier kernel (MTK) algorithm adjusts the extrapolation weights based on mathematical features in magnetic resonance (MR) data. The MTK weight matrix is then adaptively sharpened, and a Rician bias corrective is used to reduce Rician noise and improve small details. After processing, the noise eliminates the bias produced by the asymmetric sources. The adaptive MTK, in this way, extends the zero ordering estimating methodology to higher regression power facilitating edge maintenance and detail restoration. Investigation outcomes using genuine and MR images (with/without noise) evidenced that the algorithm delivered good restoration outcomes than conventional deep-learning-based approaches but with fewer requirements and calculation burden.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning based House Price Prediction Model 基于机器学习的房价预测模型
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936336
Chen Chee Kin, Zailan Arabee Bin Abdul Salam, Kadhar Batcha Nowshath
In this digital era, People have become more aware on purchasing a new property. Many digital tools have been developed to analyze the property marketing strategies and the buyers' budget constraints. The goal of this paper is to predict house prices for non-home owners based on their financial resources and aspirations. Estimated prices will be calculated by using different tools such as Machine Learning (ML), Artificial Neural Network (ANN) and Chatbot. All of the above-mentioned techniques were used here to determine the most effective house price from the collected dataset. This research project will particularly conduct multiple researches on the affordability of houses present within Malaysia. The motive of this work is to build a prediction model to help in the process of house price prediction and assist both buyers and seller to have a general view on the current market price and trend.
在这个数字时代,人们对购买新房产越来越有意识。许多数字工具已经被开发出来,用于分析房地产营销策略和买家的预算约束。本文的目标是根据非住房所有者的财务资源和期望来预测他们的房价。预计价格将通过使用机器学习(ML)、人工神经网络(ANN)和聊天机器人等不同的工具来计算。本文使用上述所有技术从收集的数据集中确定最有效的房价。这个研究项目将特别对马来西亚目前的住房负担能力进行多项研究。本工作的动机是建立一个预测模型,以帮助在房价预测的过程中,帮助买卖双方对当前的市场价格和趋势有一个大致的看法。
{"title":"Machine Learning based House Price Prediction Model","authors":"Chen Chee Kin, Zailan Arabee Bin Abdul Salam, Kadhar Batcha Nowshath","doi":"10.1109/ICECAA55415.2022.9936336","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936336","url":null,"abstract":"In this digital era, People have become more aware on purchasing a new property. Many digital tools have been developed to analyze the property marketing strategies and the buyers' budget constraints. The goal of this paper is to predict house prices for non-home owners based on their financial resources and aspirations. Estimated prices will be calculated by using different tools such as Machine Learning (ML), Artificial Neural Network (ANN) and Chatbot. All of the above-mentioned techniques were used here to determine the most effective house price from the collected dataset. This research project will particularly conduct multiple researches on the affordability of houses present within Malaysia. The motive of this work is to build a prediction model to help in the process of house price prediction and assist both buyers and seller to have a general view on the current market price and trend.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Comparative Analysis of Credit Card Fraud Detection using Logistic regression with Random Forest towards an Increase in Accuracy of Prediction 利用Logistic回归与随机森林对信用卡欺诈检测提高预测精度的比较分析
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936488
M. Krishna, J. Praveenchandar
The study aims to identify the frauds committed using a payment card such as credit cards, debit cards, and also an experiment is performed to find the best suitable algorithm among Random forest and Logistic Regression. Materials and Methods: To stop the fraud detections using Random forest (N=10) and Logistic regression (N=10) with supervised learning that gives insights from the previous data. Results: The precision of the random forest is 76.29% compared with Logistic regression with accuracy of 74.65% with statistical significance value p=0.03 (p<0.05) using Independent sample t test. Conclusion: This results proved that Random forest was significantly better for Fraud detection than Logistic regression within the study’s limits.
本研究旨在识别信用卡、借记卡等支付卡的欺诈行为,并通过实验在随机森林和逻辑回归中找到最合适的算法。材料和方法:使用随机森林(N=10)和逻辑回归(N=10)与监督学习(从先前的数据中获得见解)来停止欺诈检测。结果:采用独立样本t检验,与Logistic回归相比,随机森林的准确率为76.29%,准确率为74.65%,p=0.03 (p<0.05)。结论:在研究范围内,随机森林的欺诈检测效果明显优于Logistic回归。
{"title":"Comparative Analysis of Credit Card Fraud Detection using Logistic regression with Random Forest towards an Increase in Accuracy of Prediction","authors":"M. Krishna, J. Praveenchandar","doi":"10.1109/ICECAA55415.2022.9936488","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936488","url":null,"abstract":"The study aims to identify the frauds committed using a payment card such as credit cards, debit cards, and also an experiment is performed to find the best suitable algorithm among Random forest and Logistic Regression. Materials and Methods: To stop the fraud detections using Random forest (N=10) and Logistic regression (N=10) with supervised learning that gives insights from the previous data. Results: The precision of the random forest is 76.29% compared with Logistic regression with accuracy of 74.65% with statistical significance value p=0.03 (p<0.05) using Independent sample t test. Conclusion: This results proved that Random forest was significantly better for Fraud detection than Logistic regression within the study’s limits.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"167 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114662402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
CNN based Identifying Human Activity using Smartphone Sensors 使用智能手机传感器识别人类活动
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936202
A. Nithya, K. Ishwarya, Guneet Mummaneni, Vaibhavi Verma
Human Activity Recognition has gained greater emphasize in the last few years due to its widespread applicability and psychological curiosity. This system can be adopted in innumerable applications, like healthcare monitoring systems, surveillance systems, and so on. Smart-phones have built-in multifunctional sensors like as accelerometers and gyroscopes that provide useful sensory data when participants perform daily activities thus helping in HAR activity. Highly efficient features are extracted from this sensor data and techniques like denoising, normalization and segmentation are used to reduce noise and extract valuable feature vectors. Prior research showed that deep learning methods like recurrent neural networks and one-dimensional convolution networks provide excellent results in activity recognition tasks. In this paper, an ensemble model of CNN and SVM is proposed to further improve the accuracy and provide a robust model. Experimental methods are tested on UCI-HAR dataset and compared with other state-of-the-art methods like LSTM, CNN-LSTM, and Conv LSTM.
人类活动识别由于其广泛的适用性和心理学上的好奇心,在过去的几年里得到了更大的重视。该系统可用于无数的应用,如医疗监控系统、监视系统等。智能手机有内置的多功能传感器,如加速度计和陀螺仪,当参与者进行日常活动时提供有用的感官数据,从而有助于HAR活动。从这些传感器数据中提取高效的特征,并使用去噪、归一化和分割等技术来降低噪声并提取有价值的特征向量。先前的研究表明,深度学习方法,如循环神经网络和一维卷积网络,在活动识别任务中提供了出色的结果。本文提出了一种CNN和SVM的集成模型,进一步提高了准确率,并提供了一个鲁棒模型。实验方法在UCI-HAR数据集上进行了测试,并与LSTM、CNN-LSTM、Conv LSTM等其他最先进的方法进行了比较。
{"title":"CNN based Identifying Human Activity using Smartphone Sensors","authors":"A. Nithya, K. Ishwarya, Guneet Mummaneni, Vaibhavi Verma","doi":"10.1109/ICECAA55415.2022.9936202","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936202","url":null,"abstract":"Human Activity Recognition has gained greater emphasize in the last few years due to its widespread applicability and psychological curiosity. This system can be adopted in innumerable applications, like healthcare monitoring systems, surveillance systems, and so on. Smart-phones have built-in multifunctional sensors like as accelerometers and gyroscopes that provide useful sensory data when participants perform daily activities thus helping in HAR activity. Highly efficient features are extracted from this sensor data and techniques like denoising, normalization and segmentation are used to reduce noise and extract valuable feature vectors. Prior research showed that deep learning methods like recurrent neural networks and one-dimensional convolution networks provide excellent results in activity recognition tasks. In this paper, an ensemble model of CNN and SVM is proposed to further improve the accuracy and provide a robust model. Experimental methods are tested on UCI-HAR dataset and compared with other state-of-the-art methods like LSTM, CNN-LSTM, and Conv LSTM.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High step-up DC-DC Converter based Renewable Energy System for Improving Power Quality and Low Voltage Stress using PI Controller Technique 基于PI控制技术的高升压DC-DC变换器可再生能源系统改善电能质量和降低电压应力
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936547
Baboo Barik, D. Srinivasan, K. Arulvendhan, Suresh N
A solar cell turns photon energy into electrical potential in a P-N junction (P-Type and N-Type), which are both equivalent circuits. While synchronizing with various grid and non-linear loads, the PV Photovoltaic input source comprises oscillations distorting, voltage sags/swell, and dc voltage of power quality concerns. The proposed technique for resolving the problem is Grid-connected output-based Photovoltaic (P.V.) System Power Quality Improvement. Proportional Integral (PI) Controllers are used in this method to control parameters like sampling rate and Improved Disrupt and Observe values, which have a substantial impact on the inter oscillatory form property of PV systems. The High gain (Step-Up) DC-DC Converter coupled based capacitor is recovered by the passive clamped circuit, which also limits the switch. Maximum power point tracking is a controller technique that provides inter harmonic emission, which is one of the most significant pieces of enhancing source voltage and current. The end result is improved power quality and gain without even any distortion in the Renewable Energy System's output.
太阳能电池在P-N结(p型和n型)中将光子能量转化为电势,两者都是等效电路。在与各种电网和非线性负载同步的同时,光伏光伏输入电源存在振荡畸变、电压跌落/膨胀、直流电压等电能质量问题。为解决这一问题,提出了基于并网输出的光伏发电(pv)技术。系统电能质量改进。该方法使用比例积分(PI)控制器来控制采样率和改进的干扰和观察值等参数,这些参数对光伏系统的互振形式性质有很大影响。基于高增益(升压)DC-DC变换器耦合的电容由无源箝位电路恢复,这也限制了开关。最大功率点跟踪是一种提供谐波间发射的控制技术,是提高电源电压和电流的重要手段之一。最终的结果是改善了电能质量和增益,甚至在可再生能源系统的输出中没有任何失真。
{"title":"High step-up DC-DC Converter based Renewable Energy System for Improving Power Quality and Low Voltage Stress using PI Controller Technique","authors":"Baboo Barik, D. Srinivasan, K. Arulvendhan, Suresh N","doi":"10.1109/ICECAA55415.2022.9936547","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936547","url":null,"abstract":"A solar cell turns photon energy into electrical potential in a P-N junction (P-Type and N-Type), which are both equivalent circuits. While synchronizing with various grid and non-linear loads, the PV Photovoltaic input source comprises oscillations distorting, voltage sags/swell, and dc voltage of power quality concerns. The proposed technique for resolving the problem is Grid-connected output-based Photovoltaic (P.V.) System Power Quality Improvement. Proportional Integral (PI) Controllers are used in this method to control parameters like sampling rate and Improved Disrupt and Observe values, which have a substantial impact on the inter oscillatory form property of PV systems. The High gain (Step-Up) DC-DC Converter coupled based capacitor is recovered by the passive clamped circuit, which also limits the switch. Maximum power point tracking is a controller technique that provides inter harmonic emission, which is one of the most significant pieces of enhancing source voltage and current. The end result is improved power quality and gain without even any distortion in the Renewable Energy System's output.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123403893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Breast Abnormality Framework for Detection and Evaluation of Breast Abnormal Parameters 用于乳腺异常参数检测与评估的智能乳腺异常框架
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936206
A. P, Avinash Sharma, S. R. Kawale, S. P. Diwan, Dankan Gowda V
Unlike the healthy cells in the breast tissue, cancerous breast cells are unwelcome and have strange properties. In both sexes, this will quickly expand and infiltrate adjacent tissue, leading to the formation of a tumour. Using the Intelligent-Breast Abnormality Detection (I-BAD) framework, many breast cancer parameters are evaluated in this article. It has already been shown that some indicators may be used for early detection of breast cancer. There is also discussion of the instruments and strategies that facilitate the monitoring of the selected breast health metrics. Classification methods that use machine learning to store and analyse data are also discussed. The suggested I-BAD framework’s process is then visually shown in clean drawings.
与乳腺组织中的健康细胞不同,乳腺癌细胞不受欢迎,并且具有奇怪的特性。在两性中,这将迅速扩大并浸润邻近组织,导致肿瘤的形成。利用智能乳房异常检测(I-BAD)框架,本文评估了许多乳腺癌参数。已经有研究表明,一些指标可以用于乳腺癌的早期检测。还讨论了促进监测选定的乳房健康指标的手段和战略。还讨论了使用机器学习来存储和分析数据的分类方法。然后,建议的I-BAD框架的过程以清晰的图纸直观地显示出来。
{"title":"Intelligent Breast Abnormality Framework for Detection and Evaluation of Breast Abnormal Parameters","authors":"A. P, Avinash Sharma, S. R. Kawale, S. P. Diwan, Dankan Gowda V","doi":"10.1109/ICECAA55415.2022.9936206","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936206","url":null,"abstract":"Unlike the healthy cells in the breast tissue, cancerous breast cells are unwelcome and have strange properties. In both sexes, this will quickly expand and infiltrate adjacent tissue, leading to the formation of a tumour. Using the Intelligent-Breast Abnormality Detection (I-BAD) framework, many breast cancer parameters are evaluated in this article. It has already been shown that some indicators may be used for early detection of breast cancer. There is also discussion of the instruments and strategies that facilitate the monitoring of the selected breast health metrics. Classification methods that use machine learning to store and analyse data are also discussed. The suggested I-BAD framework’s process is then visually shown in clean drawings.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123278040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Technique to Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Removing Redundant Packets 一种通过去除冗余数据包提高异构无线传感器网络生存期的技术
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936560
Junaid Ahmed Mohammed Abdul, Santhosh Kumar Dhatrika, P. Kumar
A Wireless Sensor Network is an infrastructure-free wireless network that uses an ad-hoc deployment of a large number of wireless sensors to monitor system, physical, and environmental factors. Sensor node energy consumption is a major determinant of wireless sensor network longevity. The Distributed Energy-aware Fuzzy Logic-based routing algorithm (DEFL) proposed in this paper aims to strike a compromise between energy efficiency measures balance. For the shortest path calculation, our architecture captures the network state using relevant energy measurements and maps them to cost values. I also added a Redundant Packet Monitoring Algorithm to each sensor node as a recommended technique, which attaches temporary memory to each sensor node and checks it anytime the sensor node senses any data.
无线传感器网络是一种无需基础设施的无线网络,它使用大量无线传感器的临时部署来监视系统、物理和环境因素。传感器节点能耗是无线传感器网络寿命的主要决定因素。本文提出的基于分布式能量感知模糊逻辑的路由算法(DEFL)旨在在能源效率度量平衡之间达成妥协。对于最短路径计算,我们的架构使用相关的能量测量来捕获网络状态,并将它们映射到成本值。我还向每个传感器节点添加了一个冗余数据包监控算法,作为推荐的技术,它将临时内存附加到每个传感器节点,并在传感器节点感知到任何数据时检查它。
{"title":"A Technique to Improve the Lifetime of Heterogeneous Wireless Sensor Networks by Removing Redundant Packets","authors":"Junaid Ahmed Mohammed Abdul, Santhosh Kumar Dhatrika, P. Kumar","doi":"10.1109/ICECAA55415.2022.9936560","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936560","url":null,"abstract":"A Wireless Sensor Network is an infrastructure-free wireless network that uses an ad-hoc deployment of a large number of wireless sensors to monitor system, physical, and environmental factors. Sensor node energy consumption is a major determinant of wireless sensor network longevity. The Distributed Energy-aware Fuzzy Logic-based routing algorithm (DEFL) proposed in this paper aims to strike a compromise between energy efficiency measures balance. For the shortest path calculation, our architecture captures the network state using relevant energy measurements and maps them to cost values. I also added a Redundant Packet Monitoring Algorithm to each sensor node as a recommended technique, which attaches temporary memory to each sensor node and checks it anytime the sensor node senses any data.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121904674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pest Identification and Control using Deep Learning and Augmented Reality 使用深度学习和增强现实的害虫识别和控制
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936053
Ascharya Soni, Anuraag Khare, P. S. Darshan Balaji, Sachin Verma, K. P. Asha Rani, S. Gowrishankar
It is crucial to comprehend how insect pest populations affect the subsequent yield or harvest since the ultimate goal of agriculture is to provide a sustained economic production of crop products. Using pesticides is the simplest technique to manage the pest infestation. However, using pesticides improperly or in excess can harm both people and animals as well as the plants. Machine learning algorithms and image processing techniques are widely used in agricultural research, and they have significant potential, particularly in plant protection, which ultimately leads to crop management. This paper highlights the detection of pests and their control measures. A smartphone camera will capture photographs of the pests through a mobile app built using the Flutter framework. The images are then analyzed in the app using various transfer learning based models for available pest identification kaggle dataset. The flutter framework offers the ability to monitor targets in real-time on a mobile device and aids in visualizing the detected pest by integrating augmented reality on to the app.
了解害虫种群如何影响随后的产量或收获是至关重要的,因为农业的最终目标是提供作物产品的持续经济生产。使用杀虫剂是控制虫害最简单的方法。然而,使用不当或过量的农药会伤害人和动物以及植物。机器学习算法和图像处理技术广泛应用于农业研究,它们具有巨大的潜力,特别是在植物保护方面,最终导致作物管理。本文重点介绍了害虫的检测及防治措施。智能手机摄像头将通过使用Flutter框架构建的移动应用程序捕捉害虫的照片。然后在应用程序中使用各种基于迁移学习的模型来分析可用的害虫识别kaggle数据集。flutter框架提供了在移动设备上实时监控目标的能力,并通过将增强现实集成到应用程序上,帮助可视化检测到的害虫。
{"title":"Pest Identification and Control using Deep Learning and Augmented Reality","authors":"Ascharya Soni, Anuraag Khare, P. S. Darshan Balaji, Sachin Verma, K. P. Asha Rani, S. Gowrishankar","doi":"10.1109/ICECAA55415.2022.9936053","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936053","url":null,"abstract":"It is crucial to comprehend how insect pest populations affect the subsequent yield or harvest since the ultimate goal of agriculture is to provide a sustained economic production of crop products. Using pesticides is the simplest technique to manage the pest infestation. However, using pesticides improperly or in excess can harm both people and animals as well as the plants. Machine learning algorithms and image processing techniques are widely used in agricultural research, and they have significant potential, particularly in plant protection, which ultimately leads to crop management. This paper highlights the detection of pests and their control measures. A smartphone camera will capture photographs of the pests through a mobile app built using the Flutter framework. The images are then analyzed in the app using various transfer learning based models for available pest identification kaggle dataset. The flutter framework offers the ability to monitor targets in real-time on a mobile device and aids in visualizing the detected pest by integrating augmented reality on to the app.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114074938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Security in Edge Computing by using Cognitive Trust Management Model 利用认知信任管理模型提高边缘计算的安全性
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936568
D. Ganesh, K. Suresh, M. S. Kumar, K. Balaji, Sreedhar Burada
As a result of this new computer design, edge computing can process data rapidly and effectively near to the source, avoiding network resource and latency constraints. By shifting computing power to the network edge, edge computing decreases the load on cloud services centers while also reducing the time required for users to input data. Edge computing advantages for data-intensive services, in particular, could be obscured if access latency becomes a bottleneck. Edge computing raises a number of challenges, such as security concerns, data incompleteness, and a hefty up-front and ongoing expense. There is now a shift in the worldwide mobile communications sector toward 5G technology. This unprecedented attention to edge computing has come about because 5G is one of the primary entry technologies for large-scale deployment. Edge computing privacy has been a major concern since the technology’s inception, limiting its adoption and advancement. As the capabilities of edge computing have evolved, so have the security issues that have arisen as a result of these developments, as well as the increasing public demand for privacy protection. The lack of trust amongst IoT devices is exacerbated by the inherent security concerns and assaults that plague IoT edge devices. A cognitive trust management system is proposed to reduce this malicious activity by maintaining the confidence of an appliance & managing the service level belief & Quality of Service (QoS). Improved packet delivery ratio and jitter in cognitive trust management systems based on QoS parameters show promise for spotting potentially harmful edge nodes in computing networks at the edge.
由于这种新的计算机设计,边缘计算可以在靠近源的地方快速有效地处理数据,避免了网络资源和延迟的限制。通过将计算能力转移到网络边缘,边缘计算减少了云服务中心的负载,同时也减少了用户输入数据所需的时间。如果访问延迟成为瓶颈,边缘计算对数据密集型服务的优势可能会被掩盖。边缘计算带来了许多挑战,例如安全问题、数据不完整以及大量的前期和持续费用。现在,全球移动通信领域正在向5G技术转变。这种对边缘计算前所未有的关注之所以出现,是因为5G是大规模部署的主要入口技术之一。自该技术问世以来,边缘计算隐私一直是一个主要问题,限制了它的采用和发展。随着边缘计算功能的发展,这些发展所产生的安全问题以及公众对隐私保护的需求也在不断增加。困扰物联网边缘设备的固有安全问题和攻击加剧了物联网设备之间缺乏信任。提出了一种认知信任管理系统,通过维护设备的信任、管理服务水平信念和服务质量(QoS)来减少这种恶意活动。在基于QoS参数的认知信任管理系统中,改进的数据包传送率和抖动显示了在边缘计算网络中发现潜在有害边缘节点的希望。
{"title":"Improving Security in Edge Computing by using Cognitive Trust Management Model","authors":"D. Ganesh, K. Suresh, M. S. Kumar, K. Balaji, Sreedhar Burada","doi":"10.1109/ICECAA55415.2022.9936568","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936568","url":null,"abstract":"As a result of this new computer design, edge computing can process data rapidly and effectively near to the source, avoiding network resource and latency constraints. By shifting computing power to the network edge, edge computing decreases the load on cloud services centers while also reducing the time required for users to input data. Edge computing advantages for data-intensive services, in particular, could be obscured if access latency becomes a bottleneck. Edge computing raises a number of challenges, such as security concerns, data incompleteness, and a hefty up-front and ongoing expense. There is now a shift in the worldwide mobile communications sector toward 5G technology. This unprecedented attention to edge computing has come about because 5G is one of the primary entry technologies for large-scale deployment. Edge computing privacy has been a major concern since the technology’s inception, limiting its adoption and advancement. As the capabilities of edge computing have evolved, so have the security issues that have arisen as a result of these developments, as well as the increasing public demand for privacy protection. The lack of trust amongst IoT devices is exacerbated by the inherent security concerns and assaults that plague IoT edge devices. A cognitive trust management system is proposed to reduce this malicious activity by maintaining the confidence of an appliance & managing the service level belief & Quality of Service (QoS). Improved packet delivery ratio and jitter in cognitive trust management systems based on QoS parameters show promise for spotting potentially harmful edge nodes in computing networks at the edge.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122467909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Densely Search based Fire-Fly (DSFF) Optimization Algorithm for Image Classification Application 一种新的基于密集搜索的萤火虫(DSFF)优化算法在图像分类中的应用
Pub Date : 2022-10-13 DOI: 10.1109/ICECAA55415.2022.9936409
D. Mahalakshmi, S. Appavu alias Balamurugan, M. Chinnadurai, D. Vaishnavi
Data processing and analytics are wide spread study with profound applications. Data analytics deals with deriving or applying an algorithm to an application that work with dataset. The proposed work analyses the image data with optimization algorithm by using novel method of Fire-Fly (FF) algorithm, which is named as Densely Search Fire-Fly (DSFF) optimization algorithm. The Neural Network (NN) is applied to classify the optimized data. In this process, the optimized data refers to selective attributes from the raw data of image features. To test the performance of proposed optimization, the Gabor feature extraction method is used to fetch the features from raw image data. The Gabor method retrieves the pattern in various angle of projections. This produces 5 × 8 number of patterns to represent the image feature. From this feature attributes of whole image dataset, the optimization search for the best attributes by the reference of weight value is calculated from the particles of Fire-Fly. According to the best selection of attributes from the objective function, the neurons in a network that can segregate the different classes in the training dataset. The performance of the proposed FF algorithm are compared with the traditional optimization methods in the image classification application.
数据处理和分析是一门广泛应用的学科。数据分析处理的是导出或将算法应用于处理数据集的应用程序。本文采用一种新的萤火虫(FF)算法,即密集搜索萤火虫(DSFF)优化算法,对图像数据进行优化分析。应用神经网络对优化后的数据进行分类。在此过程中,优化数据是指从图像特征的原始数据中选择属性。为了测试所提出的优化方法的性能,使用Gabor特征提取方法从原始图像数据中提取特征。Gabor方法在不同角度的投影中检索模式。这将产生5 × 8个图案来表示图像特征。从整个图像数据集的特征属性中,从萤火虫的粒子中计算权重值的参考来优化搜索最佳属性。根据目标函数中属性的最佳选择,网络中的神经元可以隔离训练数据集中的不同类别。在图像分类应用中,将所提出的FF算法与传统的优化方法进行了性能比较。
{"title":"A Novel Densely Search based Fire-Fly (DSFF) Optimization Algorithm for Image Classification Application","authors":"D. Mahalakshmi, S. Appavu alias Balamurugan, M. Chinnadurai, D. Vaishnavi","doi":"10.1109/ICECAA55415.2022.9936409","DOIUrl":"https://doi.org/10.1109/ICECAA55415.2022.9936409","url":null,"abstract":"Data processing and analytics are wide spread study with profound applications. Data analytics deals with deriving or applying an algorithm to an application that work with dataset. The proposed work analyses the image data with optimization algorithm by using novel method of Fire-Fly (FF) algorithm, which is named as Densely Search Fire-Fly (DSFF) optimization algorithm. The Neural Network (NN) is applied to classify the optimized data. In this process, the optimized data refers to selective attributes from the raw data of image features. To test the performance of proposed optimization, the Gabor feature extraction method is used to fetch the features from raw image data. The Gabor method retrieves the pattern in various angle of projections. This produces 5 × 8 number of patterns to represent the image feature. From this feature attributes of whole image dataset, the optimization search for the best attributes by the reference of weight value is calculated from the particles of Fire-Fly. According to the best selection of attributes from the objective function, the neurons in a network that can segregate the different classes in the training dataset. The performance of the proposed FF algorithm are compared with the traditional optimization methods in the image classification application.","PeriodicalId":273850,"journal":{"name":"2022 International Conference on Edge Computing and Applications (ICECAA)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125234714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 International Conference on Edge Computing and Applications (ICECAA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1