首页 > 最新文献

2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)最新文献

英文 中文
Recognizing Fake News in Social Media with Deep Learning: A Systematic Review 用深度学习识别社交媒体中的假新闻:系统回顾
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315255
R. Katarya, Mahboob Massoudi
In the last several years' social media has become a pivotal open communication model for connecting people through several platforms and in this generation, social media networks have become extremely popular, people have become more in touch with social media networks. They are using online social networks to keep in touch with other people, relatives, and friends. In the past, people were using verbal and non-verbal networks to share their ideas, opinion, feeling, and emotions with other individuals. Nowadays, people are using social media networks to share their ideas, opinions, and feeling. Also, access to news is effortless and comfort with the using of social media networks which in the past people had to use newspapers and magazines to get aware of the world situations, but now they are using from social media networks to read the latest news just in a minute after a bad or good news occurred in the world.Nowadays, people are addicted to reading the news by using social media networks, which is the easiest way for them, but one issue that sometimes decreases the popularity of social media is dealing with fake news. Here the main work is to seek the best outcome to find and detect fake and misleading news from social media networks. In addition to this, various research articles have pointed out to our research questions that are noticed in section three.
在过去的几年里,社交媒体已经成为一种关键的开放式交流模式,通过几个平台将人们联系起来,在这一代,社交媒体网络已经变得非常流行,人们越来越多地接触社交媒体网络。他们使用在线社交网络与其他人、亲戚和朋友保持联系。在过去,人们使用语言和非语言网络与他人分享他们的想法、观点、感觉和情绪。如今,人们正在使用社交媒体网络来分享他们的想法、观点和感受。此外,使用社交媒体网络获取新闻是毫不费力和舒适的,过去人们不得不使用报纸和杂志来了解世界局势,但现在他们正在使用社交媒体网络在世界上发生坏消息或好消息后的一分钟内阅读最新的新闻。如今,人们沉迷于通过使用社交媒体网络来阅读新闻,这对他们来说是最简单的方式,但有时会降低社交媒体受欢迎程度的一个问题是处理假新闻。这里的主要工作是寻求最佳结果,以发现和检测来自社交媒体网络的虚假和误导性新闻。除此之外,各种研究文章都指出了我们在第三部分要注意的研究问题。
{"title":"Recognizing Fake News in Social Media with Deep Learning: A Systematic Review","authors":"R. Katarya, Mahboob Massoudi","doi":"10.1109/ICCCSP49186.2020.9315255","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315255","url":null,"abstract":"In the last several years' social media has become a pivotal open communication model for connecting people through several platforms and in this generation, social media networks have become extremely popular, people have become more in touch with social media networks. They are using online social networks to keep in touch with other people, relatives, and friends. In the past, people were using verbal and non-verbal networks to share their ideas, opinion, feeling, and emotions with other individuals. Nowadays, people are using social media networks to share their ideas, opinions, and feeling. Also, access to news is effortless and comfort with the using of social media networks which in the past people had to use newspapers and magazines to get aware of the world situations, but now they are using from social media networks to read the latest news just in a minute after a bad or good news occurred in the world.Nowadays, people are addicted to reading the news by using social media networks, which is the easiest way for them, but one issue that sometimes decreases the popularity of social media is dealing with fake news. Here the main work is to seek the best outcome to find and detect fake and misleading news from social media networks. In addition to this, various research articles have pointed out to our research questions that are noticed in section three.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128203322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
[ICCCSP 2020 Front cover] [ICCCSP 2020封面]
Pub Date : 2020-09-28 DOI: 10.1109/icccsp49186.2020.9315249
{"title":"[ICCCSP 2020 Front cover]","authors":"","doi":"10.1109/icccsp49186.2020.9315249","DOIUrl":"https://doi.org/10.1109/icccsp49186.2020.9315249","url":null,"abstract":"","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"24 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Trojan Attacks on Deep Neural Networks 基于深度神经网络的木马攻击检测
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315256
J. Singh, V. Sharmila
Machine learning and Artificial Intelligent techniques are the most used techniques. It gives opportunity to online sharing market where sharing and adopting model is being popular. It gives attackers many new opportunities. Deep neural network is the most used approached for artificial techniques. In this paper we are presenting a Proof of Concept method to detect Trojan attacks on the Deep Neural Network. Deploying trojan models can be dangerous in normal human lives (Application like Automated vehicle). First inverse the neuron network to create general trojan triggers, and then retrain the model with external datasets to inject Trojan trigger to the model. The malicious behaviors are only activated with the trojan trigger Input. In attack, original datasets are not required to train the model. In practice, usually datasets are not shared due to privacy or copyright concerns. We use five different applications to demonstrate the attack, and perform an analysis on the factors that affect the attack. The behavior of a trojan modification can be triggered without affecting the test accuracy for normal input datasets. After generating the trojan trigger and performing an attack. It's applying SHAP as defense against such attacks. SHAP is known for its unique explanation for model predictions.
机器学习和人工智能技术是最常用的技术。这给正在流行分享和采用模式的在线分享市场带来了机会。它给攻击者提供了许多新的机会。深度神经网络是人工技术中最常用的方法。在本文中,我们提出了一种检测深度神经网络上木马攻击的概念验证方法。部署木马模型在正常的人类生活中可能是危险的(应用程序如自动车辆)。首先对神经元网络进行逆运算,生成通用的木马触发器,然后利用外部数据集对模型进行再训练,将木马触发器注入模型。恶意行为只有在输入木马触发器时才会被激活。在攻击中,不需要原始数据集来训练模型。在实践中,由于隐私或版权问题,通常不共享数据集。我们使用五个不同的应用程序来演示攻击,并对影响攻击的因素进行分析。可以触发木马修改的行为,而不会影响正常输入数据集的测试准确性。生成木马触发器并执行攻击后。它正在应用SHAP作为对此类攻击的防御。SHAP以其对模型预测的独特解释而闻名。
{"title":"Detecting Trojan Attacks on Deep Neural Networks","authors":"J. Singh, V. Sharmila","doi":"10.1109/ICCCSP49186.2020.9315256","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315256","url":null,"abstract":"Machine learning and Artificial Intelligent techniques are the most used techniques. It gives opportunity to online sharing market where sharing and adopting model is being popular. It gives attackers many new opportunities. Deep neural network is the most used approached for artificial techniques. In this paper we are presenting a Proof of Concept method to detect Trojan attacks on the Deep Neural Network. Deploying trojan models can be dangerous in normal human lives (Application like Automated vehicle). First inverse the neuron network to create general trojan triggers, and then retrain the model with external datasets to inject Trojan trigger to the model. The malicious behaviors are only activated with the trojan trigger Input. In attack, original datasets are not required to train the model. In practice, usually datasets are not shared due to privacy or copyright concerns. We use five different applications to demonstrate the attack, and perform an analysis on the factors that affect the attack. The behavior of a trojan modification can be triggered without affecting the test accuracy for normal input datasets. After generating the trojan trigger and performing an attack. It's applying SHAP as defense against such attacks. SHAP is known for its unique explanation for model predictions.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128080945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain based Producer-Consumer Model for Farmers 基于区块链的农民生产者-消费者模型
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315214
S. Revathy, S. Priya
The agricultural activity is considered to be the largest trade, as it is feeding more people. Though it is playing a vital role in economic development, the farmers who are producing the crops are not reaping abundant benefits from it. Precision agriculture systems equipped with advanced technologies allow farmers to increase their productivity in ecological friendly manner, but with minimum profit. Our traditional producer-consumer model makes farmers to hinge on the interagent or middleman to sell their goods to consumers, as they have fewer restrictions in selling the goods directly to consumers. This paper proposes Blockchain based Producer- Consumer Model (BPCM) which allows farmer to sell their goods directly to the consumers by preventing the interagents, to gain profit over farmers using smart contracts. It also resists the Sybil attack, by blocking interagent with multiple counterfeit identities to trade with consumers thereby increasing profit of the farmers.
农业活动被认为是最大的贸易,因为它养活了更多的人。尽管农业在经济发展中起着至关重要的作用,但是种植农业的农民并没有从中获得丰厚的收益。配备先进技术的精准农业系统使农民能够以生态友好的方式提高生产力,但利润却很低。我们传统的生产者-消费者模式使农民依赖中间商或中间商向消费者销售他们的产品,因为他们直接向消费者销售产品的限制较少。本文提出了基于区块链的生产者-消费者模型(BPCM),该模型允许农民通过阻止中间商直接向消费者出售商品,从而使用智能合约从农民那里获得利润。它还通过阻止具有多个伪造身份的中间商与消费者进行交易,从而增加农民的利润,从而抵抗Sybil攻击。
{"title":"Blockchain based Producer-Consumer Model for Farmers","authors":"S. Revathy, S. Priya","doi":"10.1109/ICCCSP49186.2020.9315214","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315214","url":null,"abstract":"The agricultural activity is considered to be the largest trade, as it is feeding more people. Though it is playing a vital role in economic development, the farmers who are producing the crops are not reaping abundant benefits from it. Precision agriculture systems equipped with advanced technologies allow farmers to increase their productivity in ecological friendly manner, but with minimum profit. Our traditional producer-consumer model makes farmers to hinge on the interagent or middleman to sell their goods to consumers, as they have fewer restrictions in selling the goods directly to consumers. This paper proposes Blockchain based Producer- Consumer Model (BPCM) which allows farmer to sell their goods directly to the consumers by preventing the interagents, to gain profit over farmers using smart contracts. It also resists the Sybil attack, by blocking interagent with multiple counterfeit identities to trade with consumers thereby increasing profit of the farmers.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128098201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Speech-Based Virtual Travel Assistant For Visually Impaired 基于语音的视障虚拟旅行助手
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315217
N. Sripriya, S. Poornima, S. Mohanavalli, R. Bhaiya, V. Nikita
Visually-impaired people often feel handicapped and find it difficult to explore the world around them freely without any kind of help and assistance. This lack of independence restricts them from feeling confident about themselves. Furthermore, all virtual travel assistants currently existing in the market, are chatbots associated with textual interaction. While this may be useful more often than not, in certain situations, users may find textual interaction uncomfortable and prefer a conversational interface over text. An important issue of concern in the tourism industry is the monetary expense invested in travel guides by tourists. A travel assistant capable of acting as a virtual guide can help reduce this investment by a large factor. Hence, it is proposed to develop a speech-based travel bot capable of acting as a virtual tour guide. The bot will play the role of a tour guide by suggesting places and giving information about the place such as opening hours, rating, address to aid the user in knowing more about the place by interacting with the user and providing relevant information. The proposed system can also find great use in situations where a person may feel uncomfortable to text such as when driving. This speech-based virtual travel assistant/bot is implemented using speech recognition, speech synthesis, and natural language techniques to gather the user’s preference and provide the intended output. The developed bot has proved to be efficient for searching for different kinds of places and interacts well with the user and helps to find further details about a specific place as per the user’s queries. The intents for most of the queries are correctly recognized, which helps in efficient dialogue management.
视障人士经常觉得自己是残疾人,在没有任何帮助和帮助的情况下,很难自由地探索周围的世界。这种独立性的缺乏限制了他们对自己的信心。此外,目前市场上所有的虚拟旅行助手都是与文本交互相关的聊天机器人。虽然这通常是有用的,但在某些情况下,用户可能会发现文本交互不舒服,并且更喜欢会话界面而不是文本。旅游业关注的一个重要问题是游客在导游上投入的金钱费用。一个能够充当虚拟导游的旅行助理可以在很大程度上减少这种投资。因此,建议开发一种能够充当虚拟导游的基于语音的旅行机器人。该机器人将扮演导游的角色,通过推荐地点并提供有关地点的信息,如开放时间、评级、地址等,帮助用户通过与用户互动并提供相关信息来更多地了解这个地方。该系统还可以在人们不太愿意发短信的情况下发挥很大作用,比如开车的时候。这个基于语音的虚拟旅行助手/机器人使用语音识别、语音合成和自然语言技术来收集用户的偏好并提供预期的输出。开发的机器人已被证明可以高效地搜索不同类型的地点,并与用户进行良好的交互,并有助于根据用户的查询找到有关特定地点的进一步细节。可以正确识别大多数查询的意图,这有助于有效地管理对话。
{"title":"Speech-Based Virtual Travel Assistant For Visually Impaired","authors":"N. Sripriya, S. Poornima, S. Mohanavalli, R. Bhaiya, V. Nikita","doi":"10.1109/ICCCSP49186.2020.9315217","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315217","url":null,"abstract":"Visually-impaired people often feel handicapped and find it difficult to explore the world around them freely without any kind of help and assistance. This lack of independence restricts them from feeling confident about themselves. Furthermore, all virtual travel assistants currently existing in the market, are chatbots associated with textual interaction. While this may be useful more often than not, in certain situations, users may find textual interaction uncomfortable and prefer a conversational interface over text. An important issue of concern in the tourism industry is the monetary expense invested in travel guides by tourists. A travel assistant capable of acting as a virtual guide can help reduce this investment by a large factor. Hence, it is proposed to develop a speech-based travel bot capable of acting as a virtual tour guide. The bot will play the role of a tour guide by suggesting places and giving information about the place such as opening hours, rating, address to aid the user in knowing more about the place by interacting with the user and providing relevant information. The proposed system can also find great use in situations where a person may feel uncomfortable to text such as when driving. This speech-based virtual travel assistant/bot is implemented using speech recognition, speech synthesis, and natural language techniques to gather the user’s preference and provide the intended output. The developed bot has proved to be efficient for searching for different kinds of places and interacts well with the user and helps to find further details about a specific place as per the user’s queries. The intents for most of the queries are correctly recognized, which helps in efficient dialogue management.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116571249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Exploratory of Hybrid Techniques on Deep Learning for Image Classification 图像分类中深度学习混合技术的探索
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315270
M. Suganthi, J. Sathiaseelan
Image Mining is an extension of data mining, which is concerned with extracting beneficial information from image data. Images are classified based on texture, size, color and morphology. Neural Networks, ImageNet, VGG16, AlexNet are renowned image recognition techniques used to identify various agriculture, medical, aerial images and so on. Convolution neural network (CNN) is a Machine learning method used to classify the images which are popularly known for robust feature extraction and information mining. A comparative study of seven CNN based hybrid image classification techniques namely CNN-ELM, CNN-KNN, CNN-GA, MLP-CNN, CNN-SVM, CNN-RNN, CNN-LSTM has been done to determine their accuracy.
图像挖掘是数据挖掘的一种扩展,涉及从图像数据中提取有益信息。图像根据纹理、大小、颜色和形态进行分类。神经网络、ImageNet、VGG16、AlexNet是著名的图像识别技术,用于识别各种农业、医疗、航空图像等。卷积神经网络(CNN)是一种用于图像分类的机器学习方法,以鲁棒特征提取和信息挖掘而闻名。对7种基于CNN的混合图像分类技术CNN- elm、CNN- knn、CNN- ga、MLP-CNN、CNN- svm、CNN- rnn、CNN- lstm进行了对比研究,确定了它们的准确率。
{"title":"An Exploratory of Hybrid Techniques on Deep Learning for Image Classification","authors":"M. Suganthi, J. Sathiaseelan","doi":"10.1109/ICCCSP49186.2020.9315270","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315270","url":null,"abstract":"Image Mining is an extension of data mining, which is concerned with extracting beneficial information from image data. Images are classified based on texture, size, color and morphology. Neural Networks, ImageNet, VGG16, AlexNet are renowned image recognition techniques used to identify various agriculture, medical, aerial images and so on. Convolution neural network (CNN) is a Machine learning method used to classify the images which are popularly known for robust feature extraction and information mining. A comparative study of seven CNN based hybrid image classification techniques namely CNN-ELM, CNN-KNN, CNN-GA, MLP-CNN, CNN-SVM, CNN-RNN, CNN-LSTM has been done to determine their accuracy.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115353855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Data Compression Algorithm for Audio and Image using Feature Extraction 基于特征提取的音频和图像数据压缩算法
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315248
Mohammad Sheraj, Ashish Chopra
We aim to achieve the highest data compression ratio in a lossy scenario while still maintaining the original image or audio files characteristics and resolution/bitrate. For this we would run feature extraction on chunks of the data and store them in a database with a specific hash as a key. This hash will be stored in the file and the full data later reconstructed from the database. The database will be created by training on a vast range of data and storing only the most common chunks encountered by hash. The compression ratio achieved for image it is 0.01 over standard raw input data.
我们的目标是在有损的情况下实现最高的数据压缩比,同时仍然保持原始图像或音频文件的特征和分辨率/比特率。为此,我们将对数据块进行特征提取,并将它们存储在数据库中,并使用特定的哈希作为键。该散列将存储在文件中,然后从数据库中重建完整的数据。数据库将通过对大量数据进行训练并仅存储哈希遇到的最常见块来创建。与标准原始输入数据相比,图像的压缩比为0.01。
{"title":"Data Compression Algorithm for Audio and Image using Feature Extraction","authors":"Mohammad Sheraj, Ashish Chopra","doi":"10.1109/ICCCSP49186.2020.9315248","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315248","url":null,"abstract":"We aim to achieve the highest data compression ratio in a lossy scenario while still maintaining the original image or audio files characteristics and resolution/bitrate. For this we would run feature extraction on chunks of the data and store them in a database with a specific hash as a key. This hash will be stored in the file and the full data later reconstructed from the database. The database will be created by training on a vast range of data and storing only the most common chunks encountered by hash. The compression ratio achieved for image it is 0.01 over standard raw input data.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126751837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of Imitative Control Modalities for a 3 Degree of Freedom Robotic Arm 三自由度机械臂的仿真控制模式设计
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315273
H. Gokul, S. V. Kanna, H. Akshay Kumar, Vignesh Ravikumar
This research article focuses on enabling real-time Human-Robot Interaction (HRI) with two input control modalities designed to control a robotic arm. The robotic arm comprises of 3 Degrees of Freedom (DOF) and is controlled using the following 2 strategies: Inertial Sensor-glove and Image-based visual servoing. The Mathematical model of the given 3 DOF robotic arm was derived and the two proposed methods were explicitly designed for the same. The inertial sensor-glove, worn by the user, is embedded with inertial sensors that provide data to track the motion of the user's arm. The Image-based visual servoing modality is a mono-vision based approach which tracks the motion of a target object held by the user using a camera and operates similar to a mouse-pointer but in 3 dimensions. Fitts’s Targeting tasks were performed to analyse the performance of these Human-Robot Interactive input modalities.
本文的研究重点是实现实时人机交互(HRI)与两种输入控制模式的设计,以控制机械臂。机械臂由3个自由度组成,采用以下两种策略进行控制:惯性传感器手套和基于图像的视觉伺服。推导了给定三自由度机械臂的数学模型,并针对该模型明确设计了两种方法。用户佩戴的惯性传感器手套嵌入了惯性传感器,可以提供数据来跟踪用户手臂的运动。基于图像的视觉伺服模式是一种基于单视觉的方法,它跟踪用户使用相机持有的目标物体的运动,操作类似于鼠标指针,但在三维空间中。执行Fitts的目标任务来分析这些人机交互输入模式的性能。
{"title":"Design of Imitative Control Modalities for a 3 Degree of Freedom Robotic Arm","authors":"H. Gokul, S. V. Kanna, H. Akshay Kumar, Vignesh Ravikumar","doi":"10.1109/ICCCSP49186.2020.9315273","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315273","url":null,"abstract":"This research article focuses on enabling real-time Human-Robot Interaction (HRI) with two input control modalities designed to control a robotic arm. The robotic arm comprises of 3 Degrees of Freedom (DOF) and is controlled using the following 2 strategies: Inertial Sensor-glove and Image-based visual servoing. The Mathematical model of the given 3 DOF robotic arm was derived and the two proposed methods were explicitly designed for the same. The inertial sensor-glove, worn by the user, is embedded with inertial sensors that provide data to track the motion of the user's arm. The Image-based visual servoing modality is a mono-vision based approach which tracks the motion of a target object held by the user using a camera and operates similar to a mouse-pointer but in 3 dimensions. Fitts’s Targeting tasks were performed to analyse the performance of these Human-Robot Interactive input modalities.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of sharp objects using deep neural network based object detection algorithm 锐利物体检测采用基于深度神经网络的物体检测算法
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315272
R. Kayalvizhi, S. Malarvizhi, S. Choudhury, A. Topkar, P. Vijayakumar
Deep learning algorithms have the ability to learn complex functions and provide state-of-the-art results for com-puter vision problems. In recent times, these algorithms far exceeded the existing computer vision based techniques for object detection in X-ray imaging systems. So far, in literature single class of object namely gun and its parts were considered for detection using the SIXray10 database. We propose deep learning-based solution for the detection of sharp objects namely knife, scissors, wrench, pliers in the SIXray 10database. We propose two models namely model A and model B using a common object detection algorithm- YOLOv3 (You Only Look Once) with InceptionV3 and ResNet-50. YOLO is a deep neural network based object detection algorithm that performs the task in one-shot which allows real time inference in video of 15-30 fps. The model is FCN (Fully Convolutional Network) as has the capacity to perform both regression and classification by sharing weights for both the tasks. The network predicts a rectangular box called bounding box around the predicted object of interest along with the associated class. We analyze the performance of both model in terms of mAP. We achieve mean accuracy of 59.95% for model-A and 63.35% for Model-B. The most daunting part of the project is the low ratio of harmful to nonharmful items. By performing rigorous experiments we came up with the best set of possible results which uses varied pretrained neural networks for feature extraction in tandem with YOLO model for object detection. We endeavor to improve on these existing results so as these systems can be successfully deployed in airports to minimize human error and improve security in such environments.
深度学习算法具有学习复杂函数的能力,并为计算机视觉问题提供最先进的结果。近年来,这些算法远远超过了现有的基于计算机视觉的x射线成像系统中的目标检测技术。到目前为止,文献中只考虑使用SIXray10数据库检测一类物体,即枪支及其部件。我们提出了基于深度学习的解决方案来检测尖锐物体,即SIXray 10数据库中的刀、剪刀、扳手、钳子。我们提出了两个模型,即模型A和模型B,使用通用的目标检测算法- YOLOv3(你只看一次)与InceptionV3和ResNet-50。YOLO是一种基于深度神经网络的目标检测算法,它可以在15-30 fps的视频中进行实时推理。该模型是FCN(全卷积网络),它具有通过共享两个任务的权重来执行回归和分类的能力。该网络在预测的感兴趣的对象周围预测一个称为边界框的矩形框以及相关的类。我们从mAP的角度分析了两种模型的性能。模型a和模型b的平均准确率分别为59.95%和63.35%。该项目最令人生畏的部分是有害物品与无害物品的低比例。通过严格的实验,我们提出了一组最好的可能结果,使用各种预训练的神经网络进行特征提取,并结合YOLO模型进行目标检测。我们努力改进这些现有的结果,使这些系统能够成功地部署在机场,以尽量减少人为错误,提高这种环境下的安全性。
{"title":"Detection of sharp objects using deep neural network based object detection algorithm","authors":"R. Kayalvizhi, S. Malarvizhi, S. Choudhury, A. Topkar, P. Vijayakumar","doi":"10.1109/ICCCSP49186.2020.9315272","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315272","url":null,"abstract":"Deep learning algorithms have the ability to learn complex functions and provide state-of-the-art results for com-puter vision problems. In recent times, these algorithms far exceeded the existing computer vision based techniques for object detection in X-ray imaging systems. So far, in literature single class of object namely gun and its parts were considered for detection using the SIXray10 database. We propose deep learning-based solution for the detection of sharp objects namely knife, scissors, wrench, pliers in the SIXray 10database. We propose two models namely model A and model B using a common object detection algorithm- YOLOv3 (You Only Look Once) with InceptionV3 and ResNet-50. YOLO is a deep neural network based object detection algorithm that performs the task in one-shot which allows real time inference in video of 15-30 fps. The model is FCN (Fully Convolutional Network) as has the capacity to perform both regression and classification by sharing weights for both the tasks. The network predicts a rectangular box called bounding box around the predicted object of interest along with the associated class. We analyze the performance of both model in terms of mAP. We achieve mean accuracy of 59.95% for model-A and 63.35% for Model-B. The most daunting part of the project is the low ratio of harmful to nonharmful items. By performing rigorous experiments we came up with the best set of possible results which uses varied pretrained neural networks for feature extraction in tandem with YOLO model for object detection. We endeavor to improve on these existing results so as these systems can be successfully deployed in airports to minimize human error and improve security in such environments.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secured Automated Complaint Generation System for Organizations 为机构提供安全的自动投诉生成系统
Pub Date : 2020-09-28 DOI: 10.1109/ICCCSP49186.2020.9315243
K. Vidya, Lavanya Amalbabu, K.S Sowndharya, S. balaji
In our society, complaint systems are all done manually by humans and there are no automated system wherein the complaints are identified and sent to the respective authority all by itself. A complaint about our day to day activities based on the images can be identified and given as a report. This reduces lot of manual time and may speedup the remedial process. In this system, the users need to upload an image which will be analyzed and classified based on remedial departments. Thus the amount of manual work both on the user and the organization is minimized by feasibly producing an automated system that can generate a report about the problem without human intervention during the process. Based on the institutional requirements, the complaints are classified as website-based and object-based using an image classification system. The web-related complaints are handled by optical character recognition and the object-based complaints are handled by object detection and data mining techniques. The images are trained and tested through various classification system and their performances are compared. The user is also provided with a feature of adding location along with the complaint image which makes less complication in finding the place of fault and based on which a report is generated and forwarded to corresponding department. Thus, this paper aims in proposing an automated complaint generation and reporting system for Institutions by classifying user input images using image processing and data mining techniques.
在我们的社会中,投诉系统都是由人类手动完成的,没有自动识别投诉并将其发送给相应当局的自动系统。对我们日常活动的投诉可以根据图像进行识别并作为报告给出。这减少了大量的人工时间,并可能加快补救过程。在本系统中,用户需要上传一张图片,然后根据补救部门对图片进行分析和分类。因此,通过可行地生成一个自动化系统,用户和组织的手工工作量都被最小化,该系统可以在过程中生成关于问题的报告,而无需人工干预。根据机构要求,使用图像分类系统将投诉分为基于网站和基于对象的投诉。网络投诉采用光学字符识别处理,基于对象的投诉采用对象检测和数据挖掘技术处理。通过各种分类系统对图像进行训练和测试,并对其性能进行比较。用户还具有随投诉图像添加位置的功能,减少了查找故障地点的复杂性,并根据该位置生成报告并转发给相应部门。因此,本文旨在通过使用图像处理和数据挖掘技术对用户输入的图像进行分类,为机构提出一个自动投诉生成和报告系统。
{"title":"Secured Automated Complaint Generation System for Organizations","authors":"K. Vidya, Lavanya Amalbabu, K.S Sowndharya, S. balaji","doi":"10.1109/ICCCSP49186.2020.9315243","DOIUrl":"https://doi.org/10.1109/ICCCSP49186.2020.9315243","url":null,"abstract":"In our society, complaint systems are all done manually by humans and there are no automated system wherein the complaints are identified and sent to the respective authority all by itself. A complaint about our day to day activities based on the images can be identified and given as a report. This reduces lot of manual time and may speedup the remedial process. In this system, the users need to upload an image which will be analyzed and classified based on remedial departments. Thus the amount of manual work both on the user and the organization is minimized by feasibly producing an automated system that can generate a report about the problem without human intervention during the process. Based on the institutional requirements, the complaints are classified as website-based and object-based using an image classification system. The web-related complaints are handled by optical character recognition and the object-based complaints are handled by object detection and data mining techniques. The images are trained and tested through various classification system and their performances are compared. The user is also provided with a feature of adding location along with the complaint image which makes less complication in finding the place of fault and based on which a report is generated and forwarded to corresponding department. Thus, this paper aims in proposing an automated complaint generation and reporting system for Institutions by classifying user input images using image processing and data mining techniques.","PeriodicalId":310458,"journal":{"name":"2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129783203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2020 4th International Conference on Computer, Communication and Signal Processing (ICCCSP)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1