首页 > 最新文献

2023 5th International Conference on Recent Advances in Information Technology (RAIT)最新文献

英文 中文
Blockchain-based Secure Storage and Management of Electronic Health Record using a Smart Card 基于区块链的智能卡电子健康记录安全存储与管理
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126943
Ishita Srivastava, Aryaman Raj, Daya Sagar Gupta
The use of Blockchain for consistent storage, management, and sharing of healthcare records has received a lot of recent attention as a more reliable and dependable alternative to cloud-based storage. With the potential of Blockchain technology in the health sector being explored, its practical applications in real-world healthcare scenarios on a large scale are facing challenges like scalability, the authenticity of records, and management of dynamic consent of the patients for data access and sharing of medical records. The paper describes the implementation of a secured and efficient system for the storage of medical records on the Blockchain. The proposed implementation focuses on scalability, the authenticity of medical records, data privacy, and controlled access and uses Proof-of-Authority as a consensus algorithm on a Permissioned-Blockchain and two-factor authentication through a smart card. The paper also introduces a constant-time searching algorithm for faster records retrieval of Electronic Health Records. While the Proof-of-Authority consensus mechanism resolves the scalability issues, the smart card acts as the access control token, that ensures data privacy and makes it convenient for the users to operate.
使用区块链对医疗记录进行一致的存储、管理和共享,作为一种比基于云的存储更可靠、更可靠的替代方案,最近受到了很多关注。随着区块链技术在卫生领域的潜力不断被挖掘,其在现实医疗场景中的大规模实际应用面临着可扩展性、记录真实性、患者动态同意管理等挑战,以实现数据访问和医疗记录的共享。本文描述了在区块链上实现一个安全高效的医疗记录存储系统。提议的实现侧重于可扩展性、医疗记录的真实性、数据隐私和受控访问,并使用权威证明作为许可区块链上的共识算法,并通过智能卡进行双因素身份验证。为了提高电子病历的检索速度,提出了一种恒时搜索算法。授权证明共识机制解决了可扩展性问题,智能卡作为访问控制令牌,保证了数据隐私,方便用户操作。
{"title":"Blockchain-based Secure Storage and Management of Electronic Health Record using a Smart Card","authors":"Ishita Srivastava, Aryaman Raj, Daya Sagar Gupta","doi":"10.1109/RAIT57693.2023.10126943","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126943","url":null,"abstract":"The use of Blockchain for consistent storage, management, and sharing of healthcare records has received a lot of recent attention as a more reliable and dependable alternative to cloud-based storage. With the potential of Blockchain technology in the health sector being explored, its practical applications in real-world healthcare scenarios on a large scale are facing challenges like scalability, the authenticity of records, and management of dynamic consent of the patients for data access and sharing of medical records. The paper describes the implementation of a secured and efficient system for the storage of medical records on the Blockchain. The proposed implementation focuses on scalability, the authenticity of medical records, data privacy, and controlled access and uses Proof-of-Authority as a consensus algorithm on a Permissioned-Blockchain and two-factor authentication through a smart card. The paper also introduces a constant-time searching algorithm for faster records retrieval of Electronic Health Records. While the Proof-of-Authority consensus mechanism resolves the scalability issues, the smart card acts as the access control token, that ensures data privacy and makes it convenient for the users to operate.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129022626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Throughput Circuit Designs of Digital to Analog Converter 数模转换器的高吞吐量电路设计
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10127011
M. V. D. B. Anjaneya, M. Basiri
Digital to Analog Converters (DACs) have a good scope of application due to their easily implementable design structure, higher resolution, and accuracy. They are used in digital signal processing devices, digital power supplies for micro-controllers, digital potentiometers, and digital data acquisition systems. In this paper, we proposed high throughput circuit designs that perform multiple DAC operations in parallel with various resolution using the same hardware. The generated high throughput designs can be configured with the control line to perform four 2-bit, two 4-bit, and one 8-bit DAC operations. The throughput of the resistive ladder type DAC is increased by 95.70%, while that of weighted resistor type DAC is increased by 98% using the proposed hardware designs. All the proposed and existing designs are implemented with 90 nm CMOS library in Cadence Virtuoso.
数模转换器(dac)由于其易于实现的设计结构、较高的分辨率和精度而具有良好的应用范围。它们用于数字信号处理设备,微控制器的数字电源,数字电位器和数字数据采集系统。在本文中,我们提出了使用相同硬件以不同分辨率并行执行多个DAC操作的高吞吐量电路设计。生成的高吞吐量设计可以配置控制线来执行四个2位,两个4位和一个8位DAC操作。采用所提出的硬件设计,电阻阶梯型DAC的吞吐量提高了95.70%,加权电阻型DAC的吞吐量提高了98%。所有提出的和现有的设计都是在Cadence Virtuoso的90纳米CMOS库中实现的。
{"title":"High Throughput Circuit Designs of Digital to Analog Converter","authors":"M. V. D. B. Anjaneya, M. Basiri","doi":"10.1109/RAIT57693.2023.10127011","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10127011","url":null,"abstract":"Digital to Analog Converters (DACs) have a good scope of application due to their easily implementable design structure, higher resolution, and accuracy. They are used in digital signal processing devices, digital power supplies for micro-controllers, digital potentiometers, and digital data acquisition systems. In this paper, we proposed high throughput circuit designs that perform multiple DAC operations in parallel with various resolution using the same hardware. The generated high throughput designs can be configured with the control line to perform four 2-bit, two 4-bit, and one 8-bit DAC operations. The throughput of the resistive ladder type DAC is increased by 95.70%, while that of weighted resistor type DAC is increased by 98% using the proposed hardware designs. All the proposed and existing designs are implemented with 90 nm CMOS library in Cadence Virtuoso.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123834472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sweep Coverage with Faults 扫描故障覆盖
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126982
Amit Kumar Dhar, B. Gorain, Madhuri Mahawar
Time variant coverage, called sweep coverage in wireless sensor networks has got attention from various re-searchers in recent time. In this problem, a set of mobile sensors are collectively monitoring certain area of interest (AoI). In various applications periodic monitoring of the AoI is sufficient. For a given time period, the objective of the sweep coverage problem is to find minimum number of mobile sensors so that the periodic monitoring can be guaranteed. This problem has been studied by various researchers in the context of point, area and barrier coverage problems. The sweep coverage problem on a graph is studied in [11]. In this problem, for a given input graph, minimum number of mobile sensors must be deployed such a way that all nodes of the graph must be visited by at least one mobile sensor. The sweep coverage problem is NP-hard and can not be approximated within a factor of 2 [16]. In this paper, we propose a fault-tolerant sweep coverage algorithm. For a given integer, using our proposed algorithm, the non-faulty sensors adjusted their movement and guarantees sweep coverage of all the nodes of an undirected weighted graph if at most sensors becomes faulty.
无线传感器网络中的时变覆盖,即扫描覆盖,近年来受到了各种研究者的关注。在这个问题中,一组移动传感器共同监测特定的感兴趣区域(AoI)。在各种应用中,定期监测AoI就足够了。对于给定的时间段,扫描覆盖问题的目标是找到最小数量的移动传感器,以保证周期性监测。这一问题已经在点覆盖、面积覆盖和屏障覆盖的背景下得到了广泛的研究。在[11]中研究了图上的扫描覆盖问题。在这个问题中,对于给定的输入图,必须部署最少数量的移动传感器,使得图的所有节点必须被至少一个移动传感器访问。扫描覆盖问题是NP-hard问题,不能在2 b[16]的系数内近似。本文提出了一种容错扫描覆盖算法。对于给定的整数,使用我们提出的算法,非故障传感器调整它们的运动,并保证无向加权图的所有节点的扫描覆盖,如果大多数传感器出现故障。
{"title":"Sweep Coverage with Faults","authors":"Amit Kumar Dhar, B. Gorain, Madhuri Mahawar","doi":"10.1109/RAIT57693.2023.10126982","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126982","url":null,"abstract":"Time variant coverage, called sweep coverage in wireless sensor networks has got attention from various re-searchers in recent time. In this problem, a set of mobile sensors are collectively monitoring certain area of interest (AoI). In various applications periodic monitoring of the AoI is sufficient. For a given time period, the objective of the sweep coverage problem is to find minimum number of mobile sensors so that the periodic monitoring can be guaranteed. This problem has been studied by various researchers in the context of point, area and barrier coverage problems. The sweep coverage problem on a graph is studied in [11]. In this problem, for a given input graph, minimum number of mobile sensors must be deployed such a way that all nodes of the graph must be visited by at least one mobile sensor. The sweep coverage problem is NP-hard and can not be approximated within a factor of 2 [16]. In this paper, we propose a fault-tolerant sweep coverage algorithm. For a given integer, using our proposed algorithm, the non-faulty sensors adjusted their movement and guarantees sweep coverage of all the nodes of an undirected weighted graph if at most sensors becomes faulty.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131103580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Throughput Circuit Design of Flash Type Analog to Digital Converter Flash型模数转换器的高通量电路设计
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126785
Shivalasya Chinthala, M. Basiri
Analog to Digital Converters (ADCs) have a good scope of application due to their high reliability, speed, band-width, and resolution. They are used in digital signal processing devices, satellite communications, digital storage oscilloscopes, micro-controllers, RADAR processing, and digital multimeters. In this paper, we propose a high throughput circuit design that performs multiple ADC operations in parallel by using the same hardware. The proposed high throughput design can be configured with a control line to perform one 3-bit operation or two 2-bit operations in parallel. The throughput of the 3-bit Flash Type conventional ADC is increased by 10 times using the proposed hardware design. All the proposed and conventional designs are implemented with 90 nm CMOS library in Cadence Virtuoso.
模数转换器(adc)由于其高可靠性、高速度、高带宽和高分辨率而具有良好的应用范围。它们用于数字信号处理设备、卫星通信、数字存储示波器、微控制器、雷达处理和数字万用表。在本文中,我们提出了一种高吞吐量电路设计,通过使用相同的硬件并行执行多个ADC操作。所提出的高吞吐量设计可以配置一条控制线来并行执行一个3位操作或两个2位操作。采用所提出的硬件设计,3位闪存型传统ADC的吞吐量提高了10倍。所有提出的和传统的设计都是在Cadence Virtuoso的90纳米CMOS库中实现的。
{"title":"High Throughput Circuit Design of Flash Type Analog to Digital Converter","authors":"Shivalasya Chinthala, M. Basiri","doi":"10.1109/RAIT57693.2023.10126785","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126785","url":null,"abstract":"Analog to Digital Converters (ADCs) have a good scope of application due to their high reliability, speed, band-width, and resolution. They are used in digital signal processing devices, satellite communications, digital storage oscilloscopes, micro-controllers, RADAR processing, and digital multimeters. In this paper, we propose a high throughput circuit design that performs multiple ADC operations in parallel by using the same hardware. The proposed high throughput design can be configured with a control line to perform one 3-bit operation or two 2-bit operations in parallel. The throughput of the 3-bit Flash Type conventional ADC is increased by 10 times using the proposed hardware design. All the proposed and conventional designs are implemented with 90 nm CMOS library in Cadence Virtuoso.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131686442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices 用于资源受限物联网设备安全交易的轻量级区块链框架
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126898
R. Raj, Mohona Ghosh
Internet of Things (IoT)-based applications are making a big impact in various sectors of our daily life, like smart cities, smart healthcare, smart industries, etc. IoT networks usually require a centralized server or certain authorities to manage and control devices scattered over the network. As a result of centralized management, IoT network security is put at risk. By integrating blockchain technology with IoT, we can create a decentralized and secure network. However, traditional blockchain implementation on IoT devices is not the best solution. It requires high computational capacity to achieve consensus over data communicated among devices, which is not feasible for resource constraint IoT devices. Furthermore, the data generated by IoT devices is massive, making it impossible to keep in blockchain after a certain point. Several models have been proposed in the literature to address these challenges. In 2021, Fusion Chain was proposed as a lightweight blockchain framework that was shown to be the lightest of all models. However, this model is not secure. In this paper, we highlight the various security issues within this framework. We then propose a secure version of Fusion chain, termed Fusion Chain-S, that overcomes these security issues and also provides enhanced storage and access policies for every data element. Also, to make it fault-tolerant, we have used COAP (Constrained Application Protocol) as an integrity channel. We provide a comprehensive security analysis of our framework and prove it using BAN logic. To the best of our knowledge, our improved model is the most lightweight and secure among the other peer models.
基于物联网(IoT)的应用正在对我们日常生活的各个领域产生重大影响,如智慧城市、智能医疗、智能工业等。物联网网络通常需要一个集中的服务器或一定的权限来管理和控制分散在网络上的设备。由于集中管理,物联网网络安全面临风险。通过将区块链技术与物联网相结合,我们可以创建一个分散和安全的网络。然而,在物联网设备上实现传统的区块链并不是最好的解决方案。设备间通信数据达成共识需要很高的计算能力,这对于资源受限的物联网设备来说是不可行的。此外,物联网设备产生的数据是巨大的,超过某一点就不可能保存在区块链中。文献中提出了几个模型来解决这些挑战。2021年,Fusion Chain被提出作为轻量级区块链框架,被证明是所有模型中最轻的。然而,这种模式并不安全。在本文中,我们重点介绍了该框架中的各种安全问题。然后,我们提出了一个安全版本的Fusion chain,称为Fusion chain - s,它克服了这些安全问题,并为每个数据元素提供了增强的存储和访问策略。此外,为了使其具有容错性,我们使用了COAP(约束应用程序协议)作为完整性通道。我们对我们的框架进行了全面的安全性分析,并使用BAN逻辑进行了证明。据我们所知,我们改进的模型是其他对等模型中最轻量级和最安全的。
{"title":"A Lightweight Blockchain Framework for secure transaction in resource constrained IoT devices","authors":"R. Raj, Mohona Ghosh","doi":"10.1109/RAIT57693.2023.10126898","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126898","url":null,"abstract":"Internet of Things (IoT)-based applications are making a big impact in various sectors of our daily life, like smart cities, smart healthcare, smart industries, etc. IoT networks usually require a centralized server or certain authorities to manage and control devices scattered over the network. As a result of centralized management, IoT network security is put at risk. By integrating blockchain technology with IoT, we can create a decentralized and secure network. However, traditional blockchain implementation on IoT devices is not the best solution. It requires high computational capacity to achieve consensus over data communicated among devices, which is not feasible for resource constraint IoT devices. Furthermore, the data generated by IoT devices is massive, making it impossible to keep in blockchain after a certain point. Several models have been proposed in the literature to address these challenges. In 2021, Fusion Chain was proposed as a lightweight blockchain framework that was shown to be the lightest of all models. However, this model is not secure. In this paper, we highlight the various security issues within this framework. We then propose a secure version of Fusion chain, termed Fusion Chain-S, that overcomes these security issues and also provides enhanced storage and access policies for every data element. Also, to make it fault-tolerant, we have used COAP (Constrained Application Protocol) as an integrity channel. We provide a comprehensive security analysis of our framework and prove it using BAN logic. To the best of our knowledge, our improved model is the most lightweight and secure among the other peer models.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132041117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAVs-assisted Multi-Hop D2D Communication using Hybrid PTS for disaster management 使用混合PTS进行灾害管理的无人机辅助多跳D2D通信
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10127102
Sayanti Ghosh, A. Bhowmick, Sanjay Dhar Roy, S. Kundu
An unmanned aerial vehicle (UAV) assisted communication is a promising technique for assisting ground users in a non-functional area (NFA) or disaster area. All the base stations (BSs) in the disaster area are partially or fully damaged due to the natural calamity. Device-to-device (D2D) communication can be a good solution for direct connection between users in an NFA. In this paper, we propose a UAV-assisted multi-hop D2D communication for a hybrid power-time switching (PTS). Moreover, a D2D user of a cluster can communicate with another D2D user in a different cluster through UAVs. However, D2D users can harvest energy from their respective ad-hoc energy stations and forward the information to the nearby D2D user following a hybrid PTS-based strategy. We have proposed a time frame for the same and shown a node-based energy harvesting strategy. The expressions of outage probability, and throughput, are developed for the Rician random variable. The impact of parameters such as energy harvesting factor and energy harvesting efficiency on the network performance is also indicated. A simulation model is developed in MATLAB to assess the performance.
在非功能区(NFA)或灾区,无人机辅助通信是一种很有前途的技术。受自然灾害影响,灾区基站全部或部分受损。设备到设备(D2D)通信是NFA中用户之间直接连接的一个很好的解决方案。在本文中,我们提出了一种用于混合功率-时间交换(PTS)的无人机辅助多跳D2D通信。此外,集群中的D2D用户可以通过无人机与不同集群中的另一个D2D用户通信。然而,D2D用户可以从他们各自的临时能源站收集能量,并按照基于pts的混合策略将信息转发给附近的D2D用户。我们提出了一个时间框架,并展示了一个基于节点的能量收集策略。给出了随机变量的停机概率和吞吐量的表达式。分析了能量收集系数和能量收集效率等参数对网络性能的影响。在MATLAB中建立了仿真模型来评估其性能。
{"title":"UAVs-assisted Multi-Hop D2D Communication using Hybrid PTS for disaster management","authors":"Sayanti Ghosh, A. Bhowmick, Sanjay Dhar Roy, S. Kundu","doi":"10.1109/RAIT57693.2023.10127102","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10127102","url":null,"abstract":"An unmanned aerial vehicle (UAV) assisted communication is a promising technique for assisting ground users in a non-functional area (NFA) or disaster area. All the base stations (BSs) in the disaster area are partially or fully damaged due to the natural calamity. Device-to-device (D2D) communication can be a good solution for direct connection between users in an NFA. In this paper, we propose a UAV-assisted multi-hop D2D communication for a hybrid power-time switching (PTS). Moreover, a D2D user of a cluster can communicate with another D2D user in a different cluster through UAVs. However, D2D users can harvest energy from their respective ad-hoc energy stations and forward the information to the nearby D2D user following a hybrid PTS-based strategy. We have proposed a time frame for the same and shown a node-based energy harvesting strategy. The expressions of outage probability, and throughput, are developed for the Rician random variable. The impact of parameters such as energy harvesting factor and energy harvesting efficiency on the network performance is also indicated. A simulation model is developed in MATLAB to assess the performance.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115663664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Ensemble Architecture for Knee Osteoarthritis Severity Prediction and Report Generation* 基于深度集成架构的膝骨关节炎严重程度预测与报告生成*
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126826
Taniya Saini, Ashok Ajad, M. K. Niranjan
Knee osteoarthritis is a condition in which the knee's articular cartilage, which is a slippery material that normally protects bones from joint friction, degenerates and changes to the underneath of the cartilage. If detected early the degeneration can be slowed down. The severity is relied on for detection on the expertise of Physicians. In this paper, to automatically measure OA severity we discuss the usage of deep CNN as a tool to successively develop a system, that is based on a grading system known as Kallgren-Lawrence (KL-grading). In this approach the OA severity is predicted using the radiographic Images. The method of automatic prediction of knee OA severity comprises three steps. a) Automatic localization of the knee joints. b) Classification of the localized knee joints and c) Create the report summary for identified symptoms The CNN is trained from scratch on the X-ray images. Along with the development of severity prediction through localization and classification, we will be developing the method to automatic report generation that consists of the description of the finding from the radiographs.
膝关节骨性关节炎是膝关节关节软骨(一种通常保护骨骼免受关节摩擦的光滑材料)退化并在软骨底部发生变化的一种疾病。如果及早发现,退化可以减缓。严重程度的检测依赖于医生的专业知识。在本文中,为了自动测量OA严重程度,我们讨论了使用深度CNN作为工具来相继开发一个系统,该系统基于一个称为Kallgren-Lawrence (KL-grading)的评分系统。在这种方法中,OA的严重程度是通过x线图像来预测的。膝关节OA严重程度的自动预测方法包括三个步骤。a)膝关节自动定位。b)局部膝关节的分类c)针对已识别的症状创建报告摘要CNN是根据x射线图像从头开始训练的。随着通过定位和分类进行严重程度预测的发展,我们将开发自动生成报告的方法,该方法由x光片发现的描述组成。
{"title":"Deep Ensemble Architecture for Knee Osteoarthritis Severity Prediction and Report Generation*","authors":"Taniya Saini, Ashok Ajad, M. K. Niranjan","doi":"10.1109/RAIT57693.2023.10126826","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126826","url":null,"abstract":"Knee osteoarthritis is a condition in which the knee's articular cartilage, which is a slippery material that normally protects bones from joint friction, degenerates and changes to the underneath of the cartilage. If detected early the degeneration can be slowed down. The severity is relied on for detection on the expertise of Physicians. In this paper, to automatically measure OA severity we discuss the usage of deep CNN as a tool to successively develop a system, that is based on a grading system known as Kallgren-Lawrence (KL-grading). In this approach the OA severity is predicted using the radiographic Images. The method of automatic prediction of knee OA severity comprises three steps. a) Automatic localization of the knee joints. b) Classification of the localized knee joints and c) Create the report summary for identified symptoms The CNN is trained from scratch on the X-ray images. Along with the development of severity prediction through localization and classification, we will be developing the method to automatic report generation that consists of the description of the finding from the radiographs.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122992781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Emotion Recognition from Masked Faces using Inception-v3 基于Inception-v3的蒙面表情识别
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126777
Ashi Agarwal, Seba Susan
The identification of human emotions from facial expressions is intriguing and challenging research given the subtle differences between certain emotions. Face masks are nowadays strongly recommended to minimize infection transmission due to Covid-19. Successful emotion identification from masked faces is challenging since the lower part of the face contributes significant cues for emotion identification. In this work, we investigate transfer learning using deep pre-trained networks for emotion recognition from masked faces. Specifically, we fine-tune the pre-trained models: - EfficientNet-BO, ResNet-50, Inception-v3, Xception and AlexNet, on the benchmark Facial Expression Recognition (FER) 2013 dataset containing seven categories of emotions, namely, angry, disgust, fear, happy, sad, surprise and neutral. The experiments reveal that the Inception-v3 model outperformed all other deep learning models and the machine learning models Support Vector Machine (SVM) and Artificial Neural Network (ANN), for facial emotion recognition from masked faces.
鉴于某些情绪之间的微妙差异,从面部表情中识别人类情绪是一项有趣且具有挑战性的研究。现在强烈建议戴口罩,以尽量减少Covid-19引起的感染传播。成功识别蒙面人脸的情绪是具有挑战性的,因为面部的下半部对情绪识别有重要的线索。在这项工作中,我们使用深度预训练网络来研究迁移学习,以从蒙面人脸中识别情感。具体来说,我们对预先训练的模型进行了微调:- EfficientNet-BO, ResNet-50, Inception-v3, Xception和AlexNet,基于基准面部表情识别(FER) 2013数据集,该数据集包含七种情绪,即愤怒,厌恶,恐惧,快乐,悲伤,惊讶和中性。实验表明,Inception-v3模型在面部情绪识别方面优于所有其他深度学习模型和机器学习模型支持向量机(SVM)和人工神经网络(ANN)。
{"title":"Emotion Recognition from Masked Faces using Inception-v3","authors":"Ashi Agarwal, Seba Susan","doi":"10.1109/RAIT57693.2023.10126777","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126777","url":null,"abstract":"The identification of human emotions from facial expressions is intriguing and challenging research given the subtle differences between certain emotions. Face masks are nowadays strongly recommended to minimize infection transmission due to Covid-19. Successful emotion identification from masked faces is challenging since the lower part of the face contributes significant cues for emotion identification. In this work, we investigate transfer learning using deep pre-trained networks for emotion recognition from masked faces. Specifically, we fine-tune the pre-trained models: - EfficientNet-BO, ResNet-50, Inception-v3, Xception and AlexNet, on the benchmark Facial Expression Recognition (FER) 2013 dataset containing seven categories of emotions, namely, angry, disgust, fear, happy, sad, surprise and neutral. The experiments reveal that the Inception-v3 model outperformed all other deep learning models and the machine learning models Support Vector Machine (SVM) and Artificial Neural Network (ANN), for facial emotion recognition from masked faces.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133478568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Realistic Benchmark Datasets for Team Formation Problem in Social Networks 社交网络中团队形成问题的现实基准数据集
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10127014
Bobby Ramesh Addanki, Bhavani S Durga
Many heuristic algorithms have been proposed in the literature to solve the team formation problem. The researchers considered a project as a set of skills selected randomly from the given pool of skills. But this leads to a skewed distribution of skills in the projects with many skills having very few experts, which we term as rare skills. In this work, we create a realistic bench-mark dataset for this problem. In general, any project/task in the industry can be seen to have a good mix of popular as well as rare skills. We first conduct an empirical study of the distribution of popular skills vs rare skills in the well-known DBLP (Digital Bibliography & Library Project) data set. The distribution of popularity of skills is shown to satisfy a power law with a heavy tail, indicating the presence of a large number of skills with very few experts and a small number of highly popular skills. We build a realistic a benchmark dataset using stratified random sampling to form tasks with various distributions of popular and rare skills. The classical team formation algorithms are evaluated using this new benchmark dataset. The evaluation is done with respect to the available communication costs in the literature as well as the execution time incurred by the algorithms. It has been observed from the experiments that all the measures show lower values of communication cost for tasks having higher proportion of popular skills.
文献中提出了许多启发式算法来解决团队组建问题。研究人员将项目视为从给定的技能池中随机选择的一组技能。但这导致了项目中技能分布的不平衡,许多技能只有很少的专家,我们称之为稀有技能。在这项工作中,我们为这个问题创建了一个现实的基准数据集。一般来说,行业中的任何项目/任务都可以很好地结合流行技能和稀有技能。我们首先在著名的DBLP(数字书目与图书馆项目)数据集中对流行技能和稀有技能的分布进行了实证研究。技能受欢迎程度的分布符合一个重尾的幂律,这表明存在大量的技能,专家很少,而高度受欢迎的技能数量很少。我们使用分层随机抽样的方法构建了一个真实的基准数据集,以形成具有不同分布的流行和罕见技能的任务。使用这个新的基准数据集对经典的队形算法进行了评估。评估是根据文献中可用的通信成本以及算法所产生的执行时间进行的。从实验中可以观察到,所有的测量结果都表明,当任务中流行技能的比例较高时,其沟通成本值较低。
{"title":"Realistic Benchmark Datasets for Team Formation Problem in Social Networks","authors":"Bobby Ramesh Addanki, Bhavani S Durga","doi":"10.1109/RAIT57693.2023.10127014","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10127014","url":null,"abstract":"Many heuristic algorithms have been proposed in the literature to solve the team formation problem. The researchers considered a project as a set of skills selected randomly from the given pool of skills. But this leads to a skewed distribution of skills in the projects with many skills having very few experts, which we term as rare skills. In this work, we create a realistic bench-mark dataset for this problem. In general, any project/task in the industry can be seen to have a good mix of popular as well as rare skills. We first conduct an empirical study of the distribution of popular skills vs rare skills in the well-known DBLP (Digital Bibliography & Library Project) data set. The distribution of popularity of skills is shown to satisfy a power law with a heavy tail, indicating the presence of a large number of skills with very few experts and a small number of highly popular skills. We build a realistic a benchmark dataset using stratified random sampling to form tasks with various distributions of popular and rare skills. The classical team formation algorithms are evaluated using this new benchmark dataset. The evaluation is done with respect to the available communication costs in the literature as well as the execution time incurred by the algorithms. It has been observed from the experiments that all the measures show lower values of communication cost for tasks having higher proportion of popular skills.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"11 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114109485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy Outage Analysis of Energy Harvesting Enabled Two User Cooperative NOMA 基于能量收集的两用户协同NOMA保密中断分析
Pub Date : 2023-03-03 DOI: 10.1109/RAIT57693.2023.10126578
A. Baranwal, Sanjay Dhar Roy, S. Kundu
In this paper, we evaluate the secrecy outage probability (SOP) of two user cooperative non-orthogonal multiple access (C-NOMA) network in the presence of a passive eavesdropper (E). The near user $(U_{1})$ harvests energy from the superimposed signal transmitted by source (S). The near user $(U_{1})$ acts as a relay and retransmits the message signal to a far user $(U_{2})$. The E eavesdrops the signal for $U_{1}$ and $U_{2}$ transmitted from $mathbf{S}$ and eavesdorp the signal of $U_{2}$ relayed from $U_{1}$. An MRC is applied at E on two copies of signals obtained for $U_{2}$. An analytical framework for evaluating SOP is presented. We obtain an analytical expression for SOP of $U_{1}$, while an analytical expression of SOP of $U_{2}$ at high SNR approximation is obtained. Impact of several netwrok parameters such as target secrecy rate, energy harvesting parameters on SOP is indicated. Our analytical results are supported by monte-carlo simulation carried out in MATLAB.
本文计算了无源窃听者(E)存在时两用户合作非正交多址(C-NOMA)网络的保密中断概率(SOP)。近用户$(U_{1})$从源(S)发送的叠加信号中获取能量,近用户$(U_{1})$作为中继将消息信号重传给远用户$(U_{2})$。E窃听从$mathbf{S}$发送的$U_{1}$和$U_{2}$的信号,并窃听从$U_{1}$转发的$U_{2}$的信号。在E处对$U_{2}$获得的两个信号副本施加MRC。提出了一个评价SOP的分析框架。我们得到了$U_{1}$的SOP的解析表达式,同时得到了$U_{2}$的SOP在高信噪比近似下的解析表达式。指出了目标保密率、能量收集参数等网络参数对SOP的影响。我们的分析结果得到了MATLAB中蒙特卡罗仿真的支持。
{"title":"Secrecy Outage Analysis of Energy Harvesting Enabled Two User Cooperative NOMA","authors":"A. Baranwal, Sanjay Dhar Roy, S. Kundu","doi":"10.1109/RAIT57693.2023.10126578","DOIUrl":"https://doi.org/10.1109/RAIT57693.2023.10126578","url":null,"abstract":"In this paper, we evaluate the secrecy outage probability (SOP) of two user cooperative non-orthogonal multiple access (C-NOMA) network in the presence of a passive eavesdropper (E). The near user <tex>$(U_{1})$</tex> harvests energy from the superimposed signal transmitted by source (S). The near user <tex>$(U_{1})$</tex> acts as a relay and retransmits the message signal to a far user <tex>$(U_{2})$</tex>. The E eavesdrops the signal for <tex>$U_{1}$</tex> and <tex>$U_{2}$</tex> transmitted from <tex>$mathbf{S}$</tex> and eavesdorp the signal of <tex>$U_{2}$</tex> relayed from <tex>$U_{1}$</tex>. An MRC is applied at E on two copies of signals obtained for <tex>$U_{2}$</tex>. An analytical framework for evaluating SOP is presented. We obtain an analytical expression for SOP of <tex>$U_{1}$</tex>, while an analytical expression of SOP of <tex>$U_{2}$</tex> at high SNR approximation is obtained. Impact of several netwrok parameters such as target secrecy rate, energy harvesting parameters on SOP is indicated. Our analytical results are supported by monte-carlo simulation carried out in MATLAB.","PeriodicalId":281845,"journal":{"name":"2023 5th International Conference on Recent Advances in Information Technology (RAIT)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121938884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2023 5th International Conference on Recent Advances in Information Technology (RAIT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1