首页 > 最新文献

2022 5th International Conference on Contemporary Computing and Informatics (IC3I)最新文献

英文 中文
A Survey of Virtual machine migration, Optimal Resource Management and Challenges 虚拟机迁移、最优资源管理和挑战综述
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072618
N. Kadu, Pramod E Jadhav, M. Nirmal
Virtual machines (VMs) have become increasingly valuable for resource consolidation and management due to their efficient and secure containers, as well as their capability to offer desired execution environments for applications. The cloud is also becoming increasingly popular, which is hosted in large data centers. The vast majority of these large data centers use a virtualized server infrastructure, known as a virtual machine (VM), that is managed by a cloud infrastructure service such as an open stack or cloud stack, etc. Computing, storage, and communication resources are increasingly needed in large Cloud Data Centers (CDCs). With the growth of cloud environments, VM migration has become an important criterion to ensure Quality of Service (QoS), save energy, and reduce resource usage. This paper examines the merits, challenges, and resource management aspects of virtual machines migration. In addition to providing load balancing, online system maintenance, proactive fault tolerance, power management, and resource sharing, it also helps to manage system power consumption.
由于具有高效和安全的容器,并且能够为应用程序提供所需的执行环境,虚拟机(vm)在资源整合和管理方面变得越来越有价值。云也变得越来越流行,它托管在大型数据中心中。这些大型数据中心中的绝大多数使用虚拟化服务器基础设施,即虚拟机(VM),它由云基础设施服务(如开放堆栈或云堆栈等)管理。大型云数据中心对计算、存储和通信资源的需求日益增长。随着云环境的发展,虚拟机迁移已成为保证服务质量(QoS)、节约能源和减少资源使用的重要标准。本文研究了虚拟机迁移的优点、挑战和资源管理方面。除了提供负载均衡、系统在线维护、主动容错、电源管理、资源共享等功能外,还提供系统功耗管理功能。
{"title":"A Survey of Virtual machine migration, Optimal Resource Management and Challenges","authors":"N. Kadu, Pramod E Jadhav, M. Nirmal","doi":"10.1109/IC3I56241.2022.10072618","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072618","url":null,"abstract":"Virtual machines (VMs) have become increasingly valuable for resource consolidation and management due to their efficient and secure containers, as well as their capability to offer desired execution environments for applications. The cloud is also becoming increasingly popular, which is hosted in large data centers. The vast majority of these large data centers use a virtualized server infrastructure, known as a virtual machine (VM), that is managed by a cloud infrastructure service such as an open stack or cloud stack, etc. Computing, storage, and communication resources are increasingly needed in large Cloud Data Centers (CDCs). With the growth of cloud environments, VM migration has become an important criterion to ensure Quality of Service (QoS), save energy, and reduce resource usage. This paper examines the merits, challenges, and resource management aspects of virtual machines migration. In addition to providing load balancing, online system maintenance, proactive fault tolerance, power management, and resource sharing, it also helps to manage system power consumption.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115678293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends in Robotics and Computer Integrated Manufacturing 机器人与计算机集成制造的发展趋势
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072745
A. Dixit, T. V. Kumar, Abhishek Joshi, H. Bedi, M. Chakravarthi, D. P. Singh
Today, all manufacturing businesses are expected to have the ability to produce high-quality goods with shorter lead times and the capacity to produce to a variety of customer specifications. Any industry’s production capacity has increased exponentially as a result of the use of robots in manufacturing. To resolve the aforementioned problems and maintain a nation’s revenue in the fiercely competitive international market, robotics and computer integrated manufacturing (CIM) technology are required. The main emphasis is placed on the robot’s accuracy during milling operations, and its capacity to carry out the work with the required precision is assessed. The manipulator stiffness model is utilized to estimate failures in conformity caused by the baseline cutting force, which is the same for all robots under consideration, in order to calculate this performance metric. The feasibility of the suggested method was demonstrated in experimental research including the milling of circular notches using a robot for a variety of workgroup samples and locations. As cutting force increases, the circularity index raises as well, and it may be calculated by simple scaling. The study suggests a system that is focused on the industry and allows users to rate industrial robots according to their machining precision. Some industrial robots from the KUKA family that have been graded for various machining jobs are used to test the established methodology.
今天,所有的制造企业都希望有能力以更短的交货时间生产高质量的产品,并有能力生产各种客户规格。由于在制造业中使用机器人,任何行业的生产能力都呈指数级增长。为了解决上述问题,并在竞争激烈的国际市场上保持国家的收入,需要机器人和计算机集成制造(CIM)技术。主要重点放在机器人在铣削操作中的精度上,并评估其以所需精度执行工作的能力。利用机械臂刚度模型来估计由基线切削力引起的一致性失效,该基准切削力对所有考虑的机器人都是相同的,从而计算出该性能指标。该方法的可行性在实验研究中得到了证明,包括在各种工作组样品和地点使用机器人铣削圆形切口。随着切削力的增大,圆度指数也随之增大,可以用简单的标度法来计算。该研究建议建立一个专注于工业的系统,并允许用户根据工业机器人的加工精度对其进行评级。库卡家族的一些工业机器人已被分级用于各种加工工作,用于测试已建立的方法。
{"title":"Trends in Robotics and Computer Integrated Manufacturing","authors":"A. Dixit, T. V. Kumar, Abhishek Joshi, H. Bedi, M. Chakravarthi, D. P. Singh","doi":"10.1109/IC3I56241.2022.10072745","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072745","url":null,"abstract":"Today, all manufacturing businesses are expected to have the ability to produce high-quality goods with shorter lead times and the capacity to produce to a variety of customer specifications. Any industry’s production capacity has increased exponentially as a result of the use of robots in manufacturing. To resolve the aforementioned problems and maintain a nation’s revenue in the fiercely competitive international market, robotics and computer integrated manufacturing (CIM) technology are required. The main emphasis is placed on the robot’s accuracy during milling operations, and its capacity to carry out the work with the required precision is assessed. The manipulator stiffness model is utilized to estimate failures in conformity caused by the baseline cutting force, which is the same for all robots under consideration, in order to calculate this performance metric. The feasibility of the suggested method was demonstrated in experimental research including the milling of circular notches using a robot for a variety of workgroup samples and locations. As cutting force increases, the circularity index raises as well, and it may be calculated by simple scaling. The study suggests a system that is focused on the industry and allows users to rate industrial robots according to their machining precision. Some industrial robots from the KUKA family that have been graded for various machining jobs are used to test the established methodology.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115914285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Methods for Managing Full-Duplex Self-Interference 全双工自干扰处理方法研究
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073343
Shubham Saxena, Sameer Sonawane, B. P. Lohani, Ashish Garg, A. Deepak, Deepika Arora
This paper provides a comprehensive analysis of the steps necessary to disable self-interference (SI) in wireless networks and allow full duplex (FD) broadcasting. As a way of constructing mobile networks in regions where there is a scarcity of broadcast signals, the adoption of a frequency division method, also known as an in-band FD approach, has seen a rise in popularity. This method is also known as an in-band frequency division approach. Although the study does include reviews of methods for mitigating self-interference, great care has been taken to highlight not only the various strategies for mitigating the self-interference that occurs when FD equipment is activated, but also other methods that have a significant impact on self-interference in satellite propagation. While the study does include reviews of methods for mitigating self-interference, it is important to note that great care has been taken to highlight not only the various strategies for mitigating the self-interference that This review gives a scientific classification of self-interference and illustrates the usefulness of various kinds of self-interference as well as the limits that come with them. A synopsis of the study, a discussion of the difficulties encountered in the research, and a list of recommendations for the future stages are all necessary components of the review. The findings of this study might be used as a starting point and direction for future work on SI to perform FD propagation in mobile contexts with varied surrounds, such as the Internet of Things.
本文全面分析了在无线网络中禁用自干扰(SI)和允许全双工(FD)广播所需的步骤。作为在广播信号稀缺的地区构建移动网络的一种方式,采用频分方法,也称为带内FD方法,已经越来越受欢迎。这种方法也被称为带内分频方法。虽然该研究确实包括对减轻自干扰方法的回顾,但已经非常小心地强调了不仅可以减轻FD设备激活时发生的自干扰的各种策略,而且还可以强调对卫星传播中自干扰有重大影响的其他方法。虽然该研究确实包括对减轻自我干扰方法的回顾,但重要的是要注意,该研究不仅强调了减轻自我干扰的各种策略。该综述对自我干扰进行了科学分类,并说明了各种自我干扰的有用性以及随之而来的限制。研究的摘要,研究中遇到的困难的讨论,以及对未来阶段的建议清单都是审查的必要组成部分。本研究的发现可以作为未来SI工作的起点和方向,以便在具有不同环境(如物联网)的移动环境中进行FD传播。
{"title":"A Study on Methods for Managing Full-Duplex Self-Interference","authors":"Shubham Saxena, Sameer Sonawane, B. P. Lohani, Ashish Garg, A. Deepak, Deepika Arora","doi":"10.1109/IC3I56241.2022.10073343","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073343","url":null,"abstract":"This paper provides a comprehensive analysis of the steps necessary to disable self-interference (SI) in wireless networks and allow full duplex (FD) broadcasting. As a way of constructing mobile networks in regions where there is a scarcity of broadcast signals, the adoption of a frequency division method, also known as an in-band FD approach, has seen a rise in popularity. This method is also known as an in-band frequency division approach. Although the study does include reviews of methods for mitigating self-interference, great care has been taken to highlight not only the various strategies for mitigating the self-interference that occurs when FD equipment is activated, but also other methods that have a significant impact on self-interference in satellite propagation. While the study does include reviews of methods for mitigating self-interference, it is important to note that great care has been taken to highlight not only the various strategies for mitigating the self-interference that This review gives a scientific classification of self-interference and illustrates the usefulness of various kinds of self-interference as well as the limits that come with them. A synopsis of the study, a discussion of the difficulties encountered in the research, and a list of recommendations for the future stages are all necessary components of the review. The findings of this study might be used as a starting point and direction for future work on SI to perform FD propagation in mobile contexts with varied surrounds, such as the Internet of Things.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124344946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DFR-HL: Diabetic Food Recommendation Using Hybrid Learning Methods DFR-HL:使用混合学习方法推荐糖尿病食物
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072763
R. Mittal, Varun Malik, S. V. Singh
Diabetes affects a large number of people in modern culture. Individuals must keep track of food calories and total calories consumed daily to maintain a balanced diet. Type 2 diabetes is a devastating metabolic illness that may manifest in many symptoms and complications throughout the body. In the modern day, diabetics may be found throughout all age groups in society. The increased number of reported diabetes patients may be attributed to different causes, including but not limited to harmful or chemical components blended into the food, obesity, working culture and improper diet plan, atypical lifestyle, consuming food habits, and environmental variables. As a result, saving human life requires a proper diagnosis of diabetes. When used in the healthcare industry, machine learning techniques may help doctors foresee the onset of diabetes and other complications. This research proposes the Diabetic Food Recommendation System (DFR-HL) to identify diabetes and advice patients on managing their condition via diet (DFRS). The datasets are normalized using a standard scalar with an improved Decision Tree (IDT), and the feature is selected using a Random forest. Finally, the classification has been done with Hybrid (CNN with Resnet50) DL algorithms. The experimental results are compared with performance metrics.
在现代文化中,糖尿病影响着很多人。个人必须记录每天摄入的食物热量和总热量,以保持均衡的饮食。2型糖尿病是一种破坏性的代谢疾病,可能在全身表现出许多症状和并发症。在现代,糖尿病患者可以在社会的各个年龄组中找到。报告的糖尿病患者数量的增加可能归因于不同的原因,包括但不限于食物中混入的有害或化学成分、肥胖、工作文化和不适当的饮食计划、不典型的生活方式、消费饮食习惯和环境变量。因此,拯救人类的生命需要对糖尿病进行正确的诊断。在医疗保健行业中,机器学习技术可以帮助医生预测糖尿病和其他并发症的发病。本研究提出糖尿病食物推荐系统(DFR-HL)来识别糖尿病,并建议患者通过饮食控制病情(DFRS)。使用改进决策树(IDT)的标准标量对数据集进行归一化,并使用随机森林选择特征。最后,使用Hybrid (CNN与Resnet50)深度学习算法进行分类。实验结果与性能指标进行了比较。
{"title":"DFR-HL: Diabetic Food Recommendation Using Hybrid Learning Methods","authors":"R. Mittal, Varun Malik, S. V. Singh","doi":"10.1109/IC3I56241.2022.10072763","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072763","url":null,"abstract":"Diabetes affects a large number of people in modern culture. Individuals must keep track of food calories and total calories consumed daily to maintain a balanced diet. Type 2 diabetes is a devastating metabolic illness that may manifest in many symptoms and complications throughout the body. In the modern day, diabetics may be found throughout all age groups in society. The increased number of reported diabetes patients may be attributed to different causes, including but not limited to harmful or chemical components blended into the food, obesity, working culture and improper diet plan, atypical lifestyle, consuming food habits, and environmental variables. As a result, saving human life requires a proper diagnosis of diabetes. When used in the healthcare industry, machine learning techniques may help doctors foresee the onset of diabetes and other complications. This research proposes the Diabetic Food Recommendation System (DFR-HL) to identify diabetes and advice patients on managing their condition via diet (DFRS). The datasets are normalized using a standard scalar with an improved Decision Tree (IDT), and the feature is selected using a Random forest. Finally, the classification has been done with Hybrid (CNN with Resnet50) DL algorithms. The experimental results are compared with performance metrics.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114407218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment 大数据云计算环境下的网络安全技术比较研究
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072552
Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant
Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.
保护网络、程序和系统免受网络攻击是网络安全技术的实践。网络攻击可以获取删除或更改敏感数据的访问权限,向用户收取费用,并阻碍企业的正常运营。在目前的情况下,许多设备变得比黑客和人类更聪明,这使得实施网络安全措施的任务变得困难。在网络安全方面,收集大量数据的能力被称为大数据分析。这些功能是通过显示、解释和提取未来的洞察力来实现的,这些洞察力可以早期发现灾难性的网络威胁和攻击。通过拥有更强大、更有效的网络防御态势,组织可以更好地了解所有可能导致网络攻击的活动和行为。随着办公室变得越来越远程,云计算对于访问重要文档、程序和计算资源变得至关重要。虽然网络连接既是一种好处,也是一种诅咒,因为易于访问的文件很容易成为恶意行为者的目标,但我们预计,随着时间的推移,全球经济将更多地转移到云端。因此,加强网络安全措施对于保护遥远的敏感数据库至关重要。管理依赖于技术和建议的结合来确保云的安全。它涉及管理与云计算相关的框架、信息应用程序、安全指南、一致性领导和安全基础设施数据应用程序。支持现代云计算平台和历史知识中心安全性的原则是保密性、完整性和可用性。提出了一种新的DDoS攻击检测方法。
{"title":"A Comparative Study on Cyber security Technology in Big data Cloud Computing Environment","authors":"Amit Jain, Tripti Misra, Neha Tyagi, M. V. S. Kumar, Bhasker Pant","doi":"10.1109/IC3I56241.2022.10072552","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072552","url":null,"abstract":"Protection of networks, programs and systems from cyberattacks is the practice of cybersecurity technology. The cyberattacks are capable of gaining access for deleting or altering of data that are sensitive, demanding money from the users and obstruction of regular operations of corporates. In the present situation many devices are getting smarter than that of the hackers and humans that makes the tasks difficult for implementing the measures of cybersecurity. In terms of cyber security, the ability of collecting huge amount of data is known as big data analytics. The functions are performed through displaying, interpretation and extraction of the insights of future that can enable early detection of catastrophic cyber threats and attacks. Organizations can better understand all the activities and acts that could potentially result in cyber-attacks by having a stronger and more effective cyber defensive posture. As offices became more remote, cloud computing became crucial for gaining access to important documents, programs, and computing resources. Although connection can be both a benefit and a curse, as easily accessible files can become an easy target for hostile actors, we expect the global economy to transfer even more into the cloud over time. Therefore, efforts in strengthening cybersecurity measures are vital to safeguard distant vaults of sensitive data. The management depends on a combination of technology and advice to secure the cloud. It involves managing the framework, information applications, safe-secure guidelines, consistency leads, and secure infrastructure data applications that pertain to cloud computing. The same principles that underpin security for modern cloud computing platforms and historic knowledge centers are secrecy, integrity, and usability. The novel method of DDoS attack detection is proposed.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114619480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Retinal blood vessel segmentation using AI 人工智能视网膜血管分割
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073307
I. S. Chakrapani, Shubhi Gupta, Narender Chinthamu, H. S. Pokhariya, B. Babu, Annam Takshitha Rao
Retinal microvascular is a dependable marker of abnormalities in vessel morphology, that have been linked to a variety of clinical disorders, both in ocular and metastatic disease. However, accurate vessel segmentation, which would be intricate- and time-intensive, is required for objective and statistical evaluation of the retinal blood vessels. In terms of segmenting retinal vessels, artificial intelligence (AI) has shown a significant amount of promise. In this study, the fundus images retinal blood vessel is segmented using deep learning methods. The data set required for this study is collected from the Kaggle website and pre-processed using various techniques to make it compatible with the deep learning models. The pre-processed images are then segmented using deep learning models such as LadderNet and UNet. The efficiency of the deep learning models are validated using performance metrics such as Intersection of Union (IoU), accuracy and F1 score. This study shows an accuracy of 0.98% using the UNet deep learning model and it is deemed to be an efficient model than the pre-existing models.
视网膜微血管是血管形态异常的可靠标志,与多种临床疾病有关,包括眼部疾病和转移性疾病。然而,为了对视网膜血管进行客观的统计评估,需要精确的血管分割,这将是复杂和耗时的。在分割视网膜血管方面,人工智能(AI)已经显示出巨大的前景。本研究采用深度学习方法对眼底图像视网膜血管进行分割。本研究所需的数据集从Kaggle网站收集,并使用各种技术进行预处理,使其与深度学习模型兼容。然后使用LadderNet和UNet等深度学习模型对预处理后的图像进行分割。深度学习模型的效率通过诸如Union交集(IoU)、准确性和F1分数等性能指标进行验证。本研究表明,使用UNet深度学习模型的准确率为0.98%,并且被认为是比现有模型更有效的模型。
{"title":"Retinal blood vessel segmentation using AI","authors":"I. S. Chakrapani, Shubhi Gupta, Narender Chinthamu, H. S. Pokhariya, B. Babu, Annam Takshitha Rao","doi":"10.1109/IC3I56241.2022.10073307","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073307","url":null,"abstract":"Retinal microvascular is a dependable marker of abnormalities in vessel morphology, that have been linked to a variety of clinical disorders, both in ocular and metastatic disease. However, accurate vessel segmentation, which would be intricate- and time-intensive, is required for objective and statistical evaluation of the retinal blood vessels. In terms of segmenting retinal vessels, artificial intelligence (AI) has shown a significant amount of promise. In this study, the fundus images retinal blood vessel is segmented using deep learning methods. The data set required for this study is collected from the Kaggle website and pre-processed using various techniques to make it compatible with the deep learning models. The pre-processed images are then segmented using deep learning models such as LadderNet and UNet. The efficiency of the deep learning models are validated using performance metrics such as Intersection of Union (IoU), accuracy and F1 score. This study shows an accuracy of 0.98% using the UNet deep learning model and it is deemed to be an efficient model than the pre-existing models.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"254 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114938507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Skin Cancer Prediction using Neural Networks and Transfer Learning 使用神经网络和迁移学习预测皮肤癌的比较分析
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073139
Soumitra Das, Durgaprasad Gangodkar, R. Singh, P. Vijay, Ankit Bhardwaj, Amit Semwal
The skin is the body’s outermost layer, concealing/covering many physical organs, muscles, and other innumerable bodily parts. The research found that the body’s exposure to ultraviolet light is the main contributor to skin cancer (UV). There are many layers to the surface, but the top and dermis are where cancer first appears. Variations in you complexion or the appearance of a blemish in many locations on your body are the most common warning signs. The only way to prevent cancer is to stay as far away from Uvr as you can, that could stop their skin from coming into contact with the disease. According to statistics, cases of this cancer are not only increased but are increasing swiftly as a result of the ozone layer’s deterioration, which causes it to stop emitting dangerous energy and, as a result, come into contact with our skin. For the following problem, several different strategies including machine learning, deep learning, and data augmentation are being used. Bayes Classifier, linear regression, random woodland, retiree, artificial neural network, and dnn are just a few of the many techniques used. The research makes an effort to put both transfer learning and deep learning approaches to use in order to provide a result that shows which performed best for the next challenge.
皮肤是身体的最外层,隐藏着许多身体器官、肌肉和其他无数的身体部位。研究发现,人体暴露在紫外线下是皮肤癌(UV)的主要原因。表面有很多层,但顶部和真皮层是癌症首先出现的地方。肤色的变化或身体许多部位出现瑕疵是最常见的警告信号。预防癌症的唯一方法就是尽可能远离紫外线,这样可以防止他们的皮肤接触到疾病。据统计,这种癌症的病例不仅在增加,而且还在迅速增加,这是由于臭氧层的恶化,这使得它停止释放危险的能量,因此,与我们的皮肤接触。对于下面的问题,使用了几种不同的策略,包括机器学习、深度学习和数据增强。贝叶斯分类器、线性回归、随机林地、退休人员、人工神经网络和深度神经网络只是使用的许多技术中的一小部分。该研究努力将迁移学习和深度学习方法结合起来,以提供一个结果,显示哪种方法在下一个挑战中表现最好。
{"title":"Comparative Analysis of Skin Cancer Prediction using Neural Networks and Transfer Learning","authors":"Soumitra Das, Durgaprasad Gangodkar, R. Singh, P. Vijay, Ankit Bhardwaj, Amit Semwal","doi":"10.1109/IC3I56241.2022.10073139","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073139","url":null,"abstract":"The skin is the body’s outermost layer, concealing/covering many physical organs, muscles, and other innumerable bodily parts. The research found that the body’s exposure to ultraviolet light is the main contributor to skin cancer (UV). There are many layers to the surface, but the top and dermis are where cancer first appears. Variations in you complexion or the appearance of a blemish in many locations on your body are the most common warning signs. The only way to prevent cancer is to stay as far away from Uvr as you can, that could stop their skin from coming into contact with the disease. According to statistics, cases of this cancer are not only increased but are increasing swiftly as a result of the ozone layer’s deterioration, which causes it to stop emitting dangerous energy and, as a result, come into contact with our skin. For the following problem, several different strategies including machine learning, deep learning, and data augmentation are being used. Bayes Classifier, linear regression, random woodland, retiree, artificial neural network, and dnn are just a few of the many techniques used. The research makes an effort to put both transfer learning and deep learning approaches to use in order to provide a result that shows which performed best for the next challenge.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116000841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections 基于神经网络的汽车以太网连接漏洞扫描
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10073107
A. Raizada, Manbir Kaur Brar
A need for enhancing our everyday lives is the widespread use of interconnected and interoperable computer systems. The same is true for exploitable defects that are uncontrollable by humans. Computer security methods are necessary to handle contact because of the weaknesses. Reliable connection requires security standards and advancements in protection measures to counter escalating security issues. This paper offers building an adaptive and durable intrusion detection system utilizing deep learning systems to recognize and categorise cyber-attacks. The emphasis is on how learning or deep neuronal systems (DCNNs) may aid adaptive IDS with developing capabilities discern between known and new or negligible networking detectable qualities, disconnecting the intrusive party and reducing the danger of exposure. The effectiveness of the model was shown using the UNSW-NB15 database, whose represents real current network activity in addition to artificially constructed attack behavior.
广泛使用互联互通的计算机系统是提高我们日常生活质量的需要。对于人类无法控制的可利用缺陷也是如此。计算机安全处理方法是必要的,因为接触的弱点。可靠的连接需要安全标准和先进的保护措施,以应对不断升级的安全问题。本文提出了一种利用深度学习系统来识别和分类网络攻击的自适应和持久的入侵检测系统。重点是学习或深度神经系统(DCNNs)如何帮助具有发展能力的自适应IDS区分已知和新的或可忽略的网络可检测特性,断开侵入方的连接并减少暴露的危险。使用UNSW-NB15数据库证明了该模型的有效性,该数据库除了人工构建的攻击行为外,还代表了当前真实的网络活动。
{"title":"Neural Networks for Vulnerability Scanning in Automobiles Ethernet Connections","authors":"A. Raizada, Manbir Kaur Brar","doi":"10.1109/IC3I56241.2022.10073107","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10073107","url":null,"abstract":"A need for enhancing our everyday lives is the widespread use of interconnected and interoperable computer systems. The same is true for exploitable defects that are uncontrollable by humans. Computer security methods are necessary to handle contact because of the weaknesses. Reliable connection requires security standards and advancements in protection measures to counter escalating security issues. This paper offers building an adaptive and durable intrusion detection system utilizing deep learning systems to recognize and categorise cyber-attacks. The emphasis is on how learning or deep neuronal systems (DCNNs) may aid adaptive IDS with developing capabilities discern between known and new or negligible networking detectable qualities, disconnecting the intrusive party and reducing the danger of exposure. The effectiveness of the model was shown using the UNSW-NB15 database, whose represents real current network activity in addition to artificially constructed attack behavior.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116365931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification Rules based Breast Cancer Detection using Machine Learning Approach 基于分类规则的乳腺癌检测机器学习方法
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072832
D. Mitra, Neha Sharma, Mamoon Rashid, R. Singh
One of the medical field’s most researched issues is cancer diagnosis. Many researchers have concentrated on performance enhancement and achieving successful outcomes. One of the most lethal forms of cancer is breast cancer. A significant issue in cancer diagnosis research is the diagnosis of this cancer. A kind of artificial intelligence called machine learning allows a machine to grow over time. In bio informatics, machine learning is frequently employed, notably in the detection of breast cancer. supervised learning method known as K-nearest neighbors’ approach, is one well-liked techniques. It’s really intriguing to use the K-NN in medical diagnostics. The value of parameter “k” & distance have a significant impact on the findings’ quality. This indicates how many neighbors are in proximity. In this paper, we assess the performance of various K-NN algorithmic distances. Additionally, we investigate this distance using various “k” parameter values and classification algorithms (the formula used to determine a sample’s classification).
医学领域研究最多的问题之一是癌症诊断。许多研究人员都把注意力集中在提高绩效和取得成功的结果上。最致命的癌症之一是乳腺癌。癌症诊断研究中的一个重要问题是这种癌症的诊断。一种叫做机器学习的人工智能可以让机器随着时间的推移而成长。在生物信息学中,机器学习经常被使用,特别是在乳腺癌的检测中。被称为k近邻法的监督学习方法是一种很受欢迎的技术。在医学诊断中使用K-NN真的很有趣。参数“k”的值和距离对结果质量有显著影响。这表示有多少邻居在附近。在本文中,我们评估了各种K-NN算法距离的性能。此外,我们使用各种“k”参数值和分类算法(用于确定样本分类的公式)来研究这个距离。
{"title":"Classification Rules based Breast Cancer Detection using Machine Learning Approach","authors":"D. Mitra, Neha Sharma, Mamoon Rashid, R. Singh","doi":"10.1109/IC3I56241.2022.10072832","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072832","url":null,"abstract":"One of the medical field’s most researched issues is cancer diagnosis. Many researchers have concentrated on performance enhancement and achieving successful outcomes. One of the most lethal forms of cancer is breast cancer. A significant issue in cancer diagnosis research is the diagnosis of this cancer. A kind of artificial intelligence called machine learning allows a machine to grow over time. In bio informatics, machine learning is frequently employed, notably in the detection of breast cancer. supervised learning method known as K-nearest neighbors’ approach, is one well-liked techniques. It’s really intriguing to use the K-NN in medical diagnostics. The value of parameter “k” & distance have a significant impact on the findings’ quality. This indicates how many neighbors are in proximity. In this paper, we assess the performance of various K-NN algorithmic distances. Additionally, we investigate this distance using various “k” parameter values and classification algorithms (the formula used to determine a sample’s classification).","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"208 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116386933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review: Data Security in Cloud Computing Using Machine Learning 综述:使用机器学习的云计算数据安全
Pub Date : 2022-12-14 DOI: 10.1109/IC3I56241.2022.10072968
Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi
In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.
在今天的IT行业中,云计算和更广泛的云服务部门已经获得了广泛的接受。简而言之,云服务提供云计算,它允许通过互联网按需访问it资源,并采用基于订阅授权和集中托管的按使用付费定价模式。随着21世纪越来越数字化,对公共云服务的需求正以前所未有的速度增长。云计算使得通过互联网访问服务器、存储、数据库和各种应用服务变得容易。云环境支持各种优点,但也有一些缺点。尽管云服务提供商实施了最高的行业认证和安全要求,但在第三方服务提供商上存储敏感数据总是存在风险。在讨论数据安全性时,安全和隐私必须发挥重要作用,特别是在处理敏感数据时。为了解决这个问题,已经产生了许多解决方案。由于现有的解决方案缺乏分析,因此有必要对现有的重要工作进行发现、分类和分析。本文介绍并简要分析了在云环境中安全交换和保护数据的主要方法。对每种特定技术的讨论涵盖了其在数据保护中的作用,该领域的前瞻性和可靠的解决方案,范围,未来方向等。然后根据需求和结果探索方法的适用性和完整性。
{"title":"A Review: Data Security in Cloud Computing Using Machine Learning","authors":"Pravallika Kandi, Sujith Raj Tarapatla, Surinder Kumar, Harshitha Kadiyam, Dinesh Chowdary, Nageswara Rao Moparthi","doi":"10.1109/IC3I56241.2022.10072968","DOIUrl":"https://doi.org/10.1109/IC3I56241.2022.10072968","url":null,"abstract":"In today's IT industry, cloud computing, and the broader cloud services sector have gained widespread acceptance. To put it simply, cloud services provide cloud computing, which enables on-demand access to IT resources through the internet and employs a pay-per-use pricing model based on subscription authorization and centralized hosting. The need for public cloud services is increasing at an unprecedented rate as the 21st century becomes more digital. Cloud computing makes it easy to access servers, storage, databases, and various application services via the internet. The cloud environment supports a variety of advantages, but it also has a few drawbacks. Regardless of the highest industry certifications and security requirements implemented by cloud service providers, there are always risks when storing sensitive data on third-party service providers. Security and privacy must play a significant role when discussing data security, especially when handling sensitive data. Many solutions have been created to deal with this problem. It is necessary to discover, classify, and analyze the significant existing work because there is a shortage of analysis among the current solutions. This paper relates and briefly analyses the top methods for safely exchanging and safeguarding data in a cloud setting. The discussion of each specific technique covers its role in data protection, prospective and reliable solutions in the field, scope, future directions, etc. The applicability and integrity of the methodologies are then explored regarding the demands and results.","PeriodicalId":274660,"journal":{"name":"2022 5th International Conference on Contemporary Computing and Informatics (IC3I)","volume":"542 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122069154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1