首页 > 最新文献

2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)最新文献

英文 中文
Construction of Medical Big Data Processing and Service Framework for Digital Intelligent Transformation 面向数字化智能化转型的医疗大数据处理与服务框架构建
Chuanyang Zhang, Yufei Pang, Yu Guo
From the perspective of medical big data utilization, analyze the current situation of China's medical informatization development, build a medical big data processing and service framework for digital and intelligent transformation, and provide new ideas and methods for medical informatization and intelligent medical development. Based on information life cycle management theory, combined with a large number of literature research, a medical big data processing and service framework is constructed. The framework discusses the functions of the original data module, data collection module and integrated system module, and further expounds the content and application of digital intelligent medical services.
从医疗大数据利用的角度,分析中国医疗信息化发展现状,构建数字化、智能化转型的医疗大数据处理和服务框架,为医疗信息化和智能医疗发展提供新的思路和方法。以信息生命周期管理理论为基础,结合大量文献研究,构建医疗大数据处理与服务框架。该框架讨论了原始数据模块、数据采集模块和集成系统模块的功能,并进一步阐述了数字智能医疗服务的内容和应用。
{"title":"Construction of Medical Big Data Processing and Service Framework for Digital Intelligent Transformation","authors":"Chuanyang Zhang, Yufei Pang, Yu Guo","doi":"10.1109/CICN56167.2022.10008296","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008296","url":null,"abstract":"From the perspective of medical big data utilization, analyze the current situation of China's medical informatization development, build a medical big data processing and service framework for digital and intelligent transformation, and provide new ideas and methods for medical informatization and intelligent medical development. Based on information life cycle management theory, combined with a large number of literature research, a medical big data processing and service framework is constructed. The framework discusses the functions of the original data module, data collection module and integrated system module, and further expounds the content and application of digital intelligent medical services.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116961961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sentiment analysis for Algerian Dialect tweets 阿尔及利亚方言推文的情感分析
Lamia Ouchene, Sadik Bessou
Twitter Arabic Sentiment Analysis refers to identify and classify the sentiments expressed in the tweet. The Algerian dialect is one of the Arabic dialects used on Twitter and has some peculiarities and few resources. Our study aims to prepare and annotate a gold standard dataset for the Algerian dialect and then make a classification model with robust predictions using deep learning techniques such as pre-trained transformers which are now the de facto models in Natural Language Processing. Due to their state-of-the-art results in many tasks such as Arabic Sentiment Analysis. In this paper, we used our dataset of 20400 tweets to train three traditional machine learning classifiers (Support Vector Machine SVM, Bernoulli Naive Bayes BNB, Multinomial Naive Bayes MNB) and two deep learning architectures (Long Short-Term Memory (LSTM) and Pre-trained language model like BERT. We find that our pre-trained model performs best with 82,36% accuracy.
推特阿拉伯语情绪分析是指对推文中表达的情绪进行识别和分类。阿尔及利亚方言是Twitter上使用的阿拉伯语方言之一,有一些特点,资源很少。我们的研究旨在为阿尔及利亚方言准备和注释一个黄金标准数据集,然后使用深度学习技术(如预训练的变形器)制作一个具有鲁棒预测的分类模型,这些技术现在是自然语言处理中的事实上的模型。由于他们最先进的结果在许多任务,如阿拉伯语情绪分析。在本文中,我们使用我们的20400条推文数据集来训练三个传统的机器学习分类器(支持向量机SVM,伯努利朴素贝叶斯BNB,多项朴素贝叶斯MNB)和两个深度学习架构(长短期记忆(LSTM)和预训练语言模型如BERT)。我们发现我们的预训练模型表现最好,准确率为82,36%。
{"title":"Sentiment analysis for Algerian Dialect tweets","authors":"Lamia Ouchene, Sadik Bessou","doi":"10.1109/CICN56167.2022.10008314","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008314","url":null,"abstract":"Twitter Arabic Sentiment Analysis refers to identify and classify the sentiments expressed in the tweet. The Algerian dialect is one of the Arabic dialects used on Twitter and has some peculiarities and few resources. Our study aims to prepare and annotate a gold standard dataset for the Algerian dialect and then make a classification model with robust predictions using deep learning techniques such as pre-trained transformers which are now the de facto models in Natural Language Processing. Due to their state-of-the-art results in many tasks such as Arabic Sentiment Analysis. In this paper, we used our dataset of 20400 tweets to train three traditional machine learning classifiers (Support Vector Machine SVM, Bernoulli Naive Bayes BNB, Multinomial Naive Bayes MNB) and two deep learning architectures (Long Short-Term Memory (LSTM) and Pre-trained language model like BERT. We find that our pre-trained model performs best with 82,36% accuracy.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117163767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative Analysis of Deep Fake Detection Techniques 深度造假检测技术的比较分析
Fatim F. Alanazi
Deep learning and artificial intelligence are important knowledge areas that have provided solutions allowing the successful resolution of complex problems. Some of these problems include, but are not limited to, human-level control, data analytics and other digitisation challenges. One of the offshoots of deep learning is a concept termed ‘deepfake’, which can be described as the imposition of video of a face image from a source to video of the face image of a target individual in order to make the targeted person appear to express the content of the source video [2]. It is important to establish the fact that deepfakes have been used for malicious purposes, becoming a threat to national security, privacy, democracy, and society at large. It is, therefore, fundamental to review the science behind the method, and the available detection techniques to curtail this digital innovation, so as to reduce its level of threat; that is the focus of this paper.
深度学习和人工智能是重要的知识领域,为成功解决复杂问题提供了解决方案。其中一些问题包括但不限于人类层面的控制、数据分析和其他数字化挑战。深度学习的一个分支是一个被称为“deepfake”的概念,它可以被描述为将来自源的人脸图像视频强加到目标个体的人脸图像视频中,以使目标个体看起来表达源视频[2]的内容。重要的是要确定一个事实,即深度伪造已被用于恶意目的,成为对国家安全、隐私、民主和整个社会的威胁。因此,审查这种方法背后的科学和现有的检测技术,以遏制这种数字创新,从而降低其威胁程度,是至关重要的;这是本文的研究重点。
{"title":"Comparative Analysis of Deep Fake Detection Techniques","authors":"Fatim F. Alanazi","doi":"10.1109/CICN56167.2022.10008363","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008363","url":null,"abstract":"Deep learning and artificial intelligence are important knowledge areas that have provided solutions allowing the successful resolution of complex problems. Some of these problems include, but are not limited to, human-level control, data analytics and other digitisation challenges. One of the offshoots of deep learning is a concept termed ‘deepfake’, which can be described as the imposition of video of a face image from a source to video of the face image of a target individual in order to make the targeted person appear to express the content of the source video [2]. It is important to establish the fact that deepfakes have been used for malicious purposes, becoming a threat to national security, privacy, democracy, and society at large. It is, therefore, fundamental to review the science behind the method, and the available detection techniques to curtail this digital innovation, so as to reduce its level of threat; that is the focus of this paper.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malicious PDF detection Based on Machine Learning with Enhanced Feature Set 基于增强特征集的机器学习恶意PDF检测
S. Yerima, A. Bashar, Ghazanfar Latif
PDF is one of the most popular document file formats due to its flexibility, platform independence and ability to embed different types of content. Over the years, PDF has become a popular attack vector for spreading malware and compromising computer systems. Existing signature-based defense systems have extremely high recall rates, but quickly become obsolete and ineffective against zero-day attacks, which makes them easy to circumvent by malicious PDF files. Recently, Machine Learning (ML) has emerged as a viable tool to improve discovery of previously unseen attacks. Hence, in this paper we present enhanced ML-based models for the detection of malicious PDF documents. We develop an approach for ML-based detection with static features derived from PDF documents leveraging existing tools and propose new, previously unused features to enhance the performance of the ML-based classifiers. Our investigative study is conducted on the recently published Evasive-PDFMal2022 dataset, which was used to evaluate seven ML classifiers based on our proposed method. The EvasivePDFMal2022 dataset consists of 4,468 benign samples and 5,557 malicious PDF samples. The results of the experiments show that our proposed approach with the enhanced features enabled improved accuracies in five out of seven of the classifiers that were evaluated. The results demonstrate the potential of the new features to increase the robustness of feature-based PDF malware detection.
由于其灵活性、平台独立性和嵌入不同类型内容的能力,PDF是最流行的文档文件格式之一。多年来,PDF已成为传播恶意软件和危及计算机系统的流行攻击媒介。现有的基于签名的防御系统具有极高的召回率,但对于零日攻击很快就会过时和无效,这使得它们很容易被恶意PDF文件绕过。最近,机器学习(ML)已经成为一种可行的工具,可以改进以前看不见的攻击的发现。因此,在本文中,我们提出了用于检测恶意PDF文档的增强的基于ml的模型。我们利用现有工具开发了一种基于ml的检测方法,使用源自PDF文档的静态特征,并提出了以前未使用的新特征,以增强基于ml的分类器的性能。我们的调查研究是在最近发表的Evasive-PDFMal2022数据集上进行的,该数据集用于评估基于我们提出的方法的七个ML分类器。EvasivePDFMal2022数据集由4,468个良性样本和5,557个恶意PDF样本组成。实验结果表明,我们提出的具有增强特征的方法在七个被评估的分类器中有五个提高了准确性。结果证明了新特征在提高基于特征的PDF恶意软件检测的鲁棒性方面的潜力。
{"title":"Malicious PDF detection Based on Machine Learning with Enhanced Feature Set","authors":"S. Yerima, A. Bashar, Ghazanfar Latif","doi":"10.1109/CICN56167.2022.10008374","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008374","url":null,"abstract":"PDF is one of the most popular document file formats due to its flexibility, platform independence and ability to embed different types of content. Over the years, PDF has become a popular attack vector for spreading malware and compromising computer systems. Existing signature-based defense systems have extremely high recall rates, but quickly become obsolete and ineffective against zero-day attacks, which makes them easy to circumvent by malicious PDF files. Recently, Machine Learning (ML) has emerged as a viable tool to improve discovery of previously unseen attacks. Hence, in this paper we present enhanced ML-based models for the detection of malicious PDF documents. We develop an approach for ML-based detection with static features derived from PDF documents leveraging existing tools and propose new, previously unused features to enhance the performance of the ML-based classifiers. Our investigative study is conducted on the recently published Evasive-PDFMal2022 dataset, which was used to evaluate seven ML classifiers based on our proposed method. The EvasivePDFMal2022 dataset consists of 4,468 benign samples and 5,557 malicious PDF samples. The results of the experiments show that our proposed approach with the enhanced features enabled improved accuracies in five out of seven of the classifiers that were evaluated. The results demonstrate the potential of the new features to increase the robustness of feature-based PDF malware detection.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126154139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
I-Light: An Improved Lighting System For Poultry Farms I-Light:改良的家禽农场照明系统
Ertie Abana, Hubert Chester Damo, Ariel Lorenzo, Shedric Dimayuga, Peejay Paguirigan, Princess Gail Dineros, Korrrine Villaverde
This study developed an improved lighting system called i-Light that incorporates three major factors in the growth of broilers which include color, photoperiod, and light intensity. Arduino Mega microcontroller was used to control the overall system. This system was compared to the existing traditional lighting system (TL) and LED lighting system (LL) in terms of broiler growth mortality rate and power usage. The results showed that the i-Light system performed better than both TL and LL systems. In terms of growth, the i-Light system demonstrates its ability to outperform TL and LL as seen by the fact that the i-Light system's weight gain on the final week of experimentation is 55.45% heavier than TL and 36.36% heavier than LL. It was also shown that the system logs the lowest mortality rate compared to the TL and LL system which records a 30% mortality rate which is more ideal than the 50% shown on TL and 40% for LL. The power usage results show that the i-Light used the least electricity. The i-Light system is 75.44% more efficient than the TL which saves up to 95.914 PHP monthly. On the other hand, i-Light is 63.12% more efficient than LL which saves up to 53.42 PHP per month. The i-Light system developed in the study can be a viable option for poultry farmers.
本研究开发了一种称为i-Light的改进照明系统,该系统结合了肉鸡生长的三个主要因素,即颜色、光周期和光强度。整个系统采用Arduino Mega微控制器进行控制。将该系统与现有传统照明系统(TL)和LED照明系统(LL)在肉鸡生长死亡率和耗电量方面进行比较。结果表明,i-Light系统的处理效果优于TL和LL系统。在生长方面,i-Light系统表现出优于TL和LL的能力,在实验的最后一周,i-Light系统的增重比TL重55.45%,比LL重36.36%。研究还表明,与TL和LL系统相比,该系统记录的死亡率最低,后者记录的死亡率为30%,比TL显示的50%和LL显示的40%更为理想。电力使用结果表明,i-Light使用最少的电力。i-Light系统的效率比TL高75.44%,TL每月节省高达95.914 PHP。另一方面,i-Light比LL效率高63.12%,每月节省高达53.42 PHP。研究中开发的i-Light系统可以成为家禽养殖户的可行选择。
{"title":"I-Light: An Improved Lighting System For Poultry Farms","authors":"Ertie Abana, Hubert Chester Damo, Ariel Lorenzo, Shedric Dimayuga, Peejay Paguirigan, Princess Gail Dineros, Korrrine Villaverde","doi":"10.1109/CICN56167.2022.10008367","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008367","url":null,"abstract":"This study developed an improved lighting system called i-Light that incorporates three major factors in the growth of broilers which include color, photoperiod, and light intensity. Arduino Mega microcontroller was used to control the overall system. This system was compared to the existing traditional lighting system (TL) and LED lighting system (LL) in terms of broiler growth mortality rate and power usage. The results showed that the i-Light system performed better than both TL and LL systems. In terms of growth, the i-Light system demonstrates its ability to outperform TL and LL as seen by the fact that the i-Light system's weight gain on the final week of experimentation is 55.45% heavier than TL and 36.36% heavier than LL. It was also shown that the system logs the lowest mortality rate compared to the TL and LL system which records a 30% mortality rate which is more ideal than the 50% shown on TL and 40% for LL. The power usage results show that the i-Light used the least electricity. The i-Light system is 75.44% more efficient than the TL which saves up to 95.914 PHP monthly. On the other hand, i-Light is 63.12% more efficient than LL which saves up to 53.42 PHP per month. The i-Light system developed in the study can be a viable option for poultry farmers.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114911306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT IoTZeroJar:用于检测物联网零日攻击的蜜罐架构
Mahmoud Ellouh, Mustafa Ghaleb, Muhamad Felemban
IoT enables the communication of electronic devices and sensors with the Internet using standard protocols to achieve autonomy, robustness, and reliable data exchange among devices and real applications. The wide variety of IoT devices has led to raising concerns about the security of interconnected devices. IoT manufacturers have been increasing recently, which has resulted in building IoT devices with different standards, protocols, features, and technologies. However, the lack of implementation of security features for IoT devices has led the IoT devices to be susceptible to attacks and targeted by adversaries. In order to provide an efficient honeypot-based solution, it should benefit from the malicious traffic in the filtering phase to detect zero-day attacks. In this paper, we propose IoTZeroJar, a honeypot system to detect the attacker's malicious activities and analyze zero-day attacks.
物联网使电子设备和传感器能够使用标准协议与互联网进行通信,从而实现设备和实际应用之间的自主性、鲁棒性和可靠的数据交换。物联网设备种类繁多,引发了人们对互联设备安全性的担忧。物联网制造商最近一直在增加,这导致构建具有不同标准,协议,功能和技术的物联网设备。然而,物联网设备缺乏安全功能的实施导致物联网设备容易受到攻击并成为对手的目标。为了提供一个高效的基于蜜罐的解决方案,它应该受益于过滤阶段的恶意流量来检测零日攻击。在本文中,我们提出了IoTZeroJar,这是一个蜜罐系统,用于检测攻击者的恶意活动并分析零日攻击。
{"title":"IoTZeroJar: Towards a Honeypot Architecture for Detection of Zero-Day Attacks in IoT","authors":"Mahmoud Ellouh, Mustafa Ghaleb, Muhamad Felemban","doi":"10.1109/CICN56167.2022.10008323","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008323","url":null,"abstract":"IoT enables the communication of electronic devices and sensors with the Internet using standard protocols to achieve autonomy, robustness, and reliable data exchange among devices and real applications. The wide variety of IoT devices has led to raising concerns about the security of interconnected devices. IoT manufacturers have been increasing recently, which has resulted in building IoT devices with different standards, protocols, features, and technologies. However, the lack of implementation of security features for IoT devices has led the IoT devices to be susceptible to attacks and targeted by adversaries. In order to provide an efficient honeypot-based solution, it should benefit from the malicious traffic in the filtering phase to detect zero-day attacks. In this paper, we propose IoTZeroJar, a honeypot system to detect the attacker's malicious activities and analyze zero-day attacks.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116525904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 & Lung Disease Detection using Deep Learning 使用深度学习进行COVID-19和肺部疾病检测
Manali Shukla, B. Tripathi, Malti Nagle, B. Chaurasia
Corona virus disease 2019 (COVID-19) is an infectious disease. We have proposed a COVID-19 disease detection using deep learning method in this paper. Novel disease coronavirus bring forth diverse effect on population. Exponential growth of virus and lack of knowledge of treatment was the biggest challenge for doctors to save patient's life. Due to less availability of ventilator and ICU clinical trial and testing overloaded of COVID-19 health status. Lung infection diagnosed by Chest X-ray found as best and fastest approach to detect severity of COVID-19. The work presents an AI model to detect the COVID-19 by diagnoses of chest X-ray report. Chest X-ray report finding has been conducted using CNN (convolution neural network) model with ResNet50 and VGG 19 model. The model classify the patients into four category COVID-19, normal, pneumonia, lung obesity. AI model train the X-ray image through image processing methods with an accuracy of 99.3%. The efficacy of proposed model also has been analyzed in terms of accuracy, specificity, and sensitivity, precision.
2019冠状病毒病(COVID-19)是一种传染病。本文提出了一种基于深度学习的COVID-19疾病检测方法。新型冠状病毒对人群的影响是多方面的。病毒呈指数级增长,缺乏治疗知识是医生拯救患者生命的最大挑战。由于呼吸机和ICU临床试验和测试的可用性较少,COVID-19健康状况超负荷。通过胸部x线诊断肺部感染是检测COVID-19严重程度的最佳和最快方法。本文提出了一种通过胸部x线报告诊断检测新冠肺炎的人工智能模型。胸部x线报告发现采用CNN(卷积神经网络)模型,结合ResNet50和VGG 19模型。该模型将患者分为新冠肺炎、正常、肺炎、肺型肥胖四类。AI模型通过图像处理方法训练x射线图像,准确率达到99.3%。本文还从准确性、特异性、敏感性、精密度等方面分析了该模型的有效性。
{"title":"COVID-19 & Lung Disease Detection using Deep Learning","authors":"Manali Shukla, B. Tripathi, Malti Nagle, B. Chaurasia","doi":"10.1109/CICN56167.2022.10008269","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008269","url":null,"abstract":"Corona virus disease 2019 (COVID-19) is an infectious disease. We have proposed a COVID-19 disease detection using deep learning method in this paper. Novel disease coronavirus bring forth diverse effect on population. Exponential growth of virus and lack of knowledge of treatment was the biggest challenge for doctors to save patient's life. Due to less availability of ventilator and ICU clinical trial and testing overloaded of COVID-19 health status. Lung infection diagnosed by Chest X-ray found as best and fastest approach to detect severity of COVID-19. The work presents an AI model to detect the COVID-19 by diagnoses of chest X-ray report. Chest X-ray report finding has been conducted using CNN (convolution neural network) model with ResNet50 and VGG 19 model. The model classify the patients into four category COVID-19, normal, pneumonia, lung obesity. AI model train the X-ray image through image processing methods with an accuracy of 99.3%. The efficacy of proposed model also has been analyzed in terms of accuracy, specificity, and sensitivity, precision.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122505002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Three-dimensional Reconstruction of Retinal Blood Vessels based on Binocular Vision 基于双目视觉的视网膜血管三维重建
Chao-liang Wu, Zhiming Lv, Hua-zhu Liu, Xiaoqing Zhao
Due to the limited perception ability of the naked eye, it is difficult to accurately locate the micro scale retinal vessels, which is easy to cause organ damage in the process of surgery. Therefore, the retinal vascular reconstruction method based on binocular stereo vision is studied. Firstly, build a binocular vision detection system and then calibrate and correct the system. Secondly, filter and segment the collected 3D printed eyeball blood vessel model image, and calculate the parallax and depth map by constructing the error energy function. After that, the high-precision 3D point cloud model can be obtained. Finally, the error analysis of three-dimensional point cloud is carried out by binocular parallax principle. The experimental results show that this method can control the error within 0.5 mm and meet the requirements of retinal vascular surgery.
由于肉眼感知能力有限,难以准确定位微尺度视网膜血管,极易在手术过程中造成器官损伤。为此,研究了基于双目立体视觉的视网膜血管重建方法。首先搭建双目视觉检测系统,然后对系统进行标定和校正。其次,对采集到的3D打印眼球血管模型图像进行滤波和分割,通过构造误差能量函数计算视差图和深度图;然后得到高精度的三维点云模型。最后,利用双目视差原理对三维点云进行了误差分析。实验结果表明,该方法可将误差控制在0.5 mm以内,满足视网膜血管手术的要求。
{"title":"Three-dimensional Reconstruction of Retinal Blood Vessels based on Binocular Vision","authors":"Chao-liang Wu, Zhiming Lv, Hua-zhu Liu, Xiaoqing Zhao","doi":"10.1109/CICN56167.2022.10008256","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008256","url":null,"abstract":"Due to the limited perception ability of the naked eye, it is difficult to accurately locate the micro scale retinal vessels, which is easy to cause organ damage in the process of surgery. Therefore, the retinal vascular reconstruction method based on binocular stereo vision is studied. Firstly, build a binocular vision detection system and then calibrate and correct the system. Secondly, filter and segment the collected 3D printed eyeball blood vessel model image, and calculate the parallax and depth map by constructing the error energy function. After that, the high-precision 3D point cloud model can be obtained. Finally, the error analysis of three-dimensional point cloud is carried out by binocular parallax principle. The experimental results show that this method can control the error within 0.5 mm and meet the requirements of retinal vascular surgery.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"10 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128669778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Stacked Ensemble Technique to Improve Classification Accuracy for Neurological Disorder Detection on Reddit posts 一种提高神经系统疾病检测准确率的混合堆叠集成技术
Tejaswita Garg, S. K. Gupta
Sentiment analysis helps in the early detection of depression as identify unpleasant mental states in people who are at risk for developing mental disorders. By utilizing both syntactic and semantic information, modelling approaches for sentiment analysis rely on machine learning algorithms. In this paper, a hybrid stacked ensemble learning approach has been used for the detection of depression as a neurological disorder. With the help of pre-trained word embeddings, the Word2Vec, GloVe and Fasttext are chosen for data preprocessing and feature extraction. Then, to identify depressed and non depressed identities, we integrate a hybrid stacked ensemble learning approach over Random Forest (RF), Support vector machines (SVM), K-Nearest Neighbor (KNN) and Catboost classifier (CBC) as base models whereas logistic regression (LR) as meta model classifier. The results of the experiments show that suggested model performs best with our proposed model than individual models. It is also found that with Word2Vec word embedding model, the proposed model achieved the higher accuracy as 99% in comparison to GloVe and Fasttext that categorizes depressed over non depressed users on the social media platforms.
情绪分析有助于早期发现抑郁症,因为它可以识别出有发展为精神障碍风险的人的不愉快的精神状态。通过利用句法和语义信息,情感分析的建模方法依赖于机器学习算法。在本文中,混合堆叠集成学习方法已被用于检测抑郁症作为一种神经系统疾病。在预训练词嵌入的帮助下,选择Word2Vec、GloVe和Fasttext进行数据预处理和特征提取。然后,为了识别抑郁和非抑郁身份,我们在随机森林(RF),支持向量机(SVM), k -近邻(KNN)和Catboost分类器(CBC)上集成了混合堆叠集成学习方法作为基本模型,而逻辑回归(LR)作为元模型分类器。实验结果表明,本文提出的模型比单个模型的性能更好。研究还发现,使用Word2Vec词嵌入模型,与GloVe和Fasttext对社交媒体平台上的抑郁用户和非抑郁用户进行分类相比,所提出的模型达到了99%的更高准确率。
{"title":"A Hybrid Stacked Ensemble Technique to Improve Classification Accuracy for Neurological Disorder Detection on Reddit posts","authors":"Tejaswita Garg, S. K. Gupta","doi":"10.1109/CICN56167.2022.10008283","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008283","url":null,"abstract":"Sentiment analysis helps in the early detection of depression as identify unpleasant mental states in people who are at risk for developing mental disorders. By utilizing both syntactic and semantic information, modelling approaches for sentiment analysis rely on machine learning algorithms. In this paper, a hybrid stacked ensemble learning approach has been used for the detection of depression as a neurological disorder. With the help of pre-trained word embeddings, the Word2Vec, GloVe and Fasttext are chosen for data preprocessing and feature extraction. Then, to identify depressed and non depressed identities, we integrate a hybrid stacked ensemble learning approach over Random Forest (RF), Support vector machines (SVM), K-Nearest Neighbor (KNN) and Catboost classifier (CBC) as base models whereas logistic regression (LR) as meta model classifier. The results of the experiments show that suggested model performs best with our proposed model than individual models. It is also found that with Word2Vec word embedding model, the proposed model achieved the higher accuracy as 99% in comparison to GloVe and Fasttext that categorizes depressed over non depressed users on the social media platforms.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129020862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Narrative Court Documents for Use in Police Academic Education 探索叙事法庭文书在警察学术教育中的应用
Ezdihar N. Bifari, W. Alhalabi
Court judgments from several nations have recently been published and made accessible online for study, adding to the growing number of online resources available today. As a recommendation, the legal databases can be incorporated into the training of crime scene investigators and made available as a learning resource. A text mining method was used to identify relevant documents, including crime scenes, and categorize them according to the kind of crime committed. The results from the statistical data support the possibility of useful information about crime scenes and murder cases in legal documents.
最近,一些国家的法院判决已被公布,并可在网上查阅,增加了目前可用的在线资源的数量。作为一项建议,法律数据库可以纳入犯罪现场调查人员的培训,并作为一种学习资源提供。使用文本挖掘方法识别包括犯罪现场在内的相关文件,并根据犯罪类型对其进行分类。统计数据的结果支持在法律文件中提供有关犯罪现场和谋杀案件的有用信息的可能性。
{"title":"Exploring Narrative Court Documents for Use in Police Academic Education","authors":"Ezdihar N. Bifari, W. Alhalabi","doi":"10.1109/CICN56167.2022.10008327","DOIUrl":"https://doi.org/10.1109/CICN56167.2022.10008327","url":null,"abstract":"Court judgments from several nations have recently been published and made accessible online for study, adding to the growing number of online resources available today. As a recommendation, the legal databases can be incorporated into the training of crime scene investigators and made available as a learning resource. A text mining method was used to identify relevant documents, including crime scenes, and categorize them according to the kind of crime committed. The results from the statistical data support the possibility of useful information about crime scenes and murder cases in legal documents.","PeriodicalId":287589,"journal":{"name":"2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)","volume":"31 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121210318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2022 14th International Conference on Computational Intelligence and Communication Networks (CICN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1