首页 > 最新文献

2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)最新文献

英文 中文
Electronics and Internet of Things Integration 电子和物联网集成
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388353
Astik Naval, Mohd. Momin Aman, Lucky Gaur, A. Khursheed
Internet of things a new concept of the new emerging world of technology, a huge server with massive database interconnectivity between systems and the autonomous nature of machines around us makes an entire system of IOT. But what is the actual meaning of IOT and how is it implemented in our daily lives? According to a research an average person is surrounded by at least 5–10 computers in his daily work schedule however those are not conventional computers but miniature IC's, Numerous Motherboards and so on and so forth. Have we ever thought what ease of work does all these systems, working in sync with us as humans, has to offer? A LOT! What would be The Magnitude of productivity if all these systems could work autonomously without/with very less Human Effort Connected to each other? This is exactly what the INTERNET OF THINGS has to offer. In IOT, Machines around us are connected to each other with the internet which provide a whole lot of provision for the control (the user) to manipulate and use the device according to its own will. IOT is a concept of interconnectivity and technically can be termed as “Cloud Computing” which uses large sets of data around the web for connecting numerous systems with each other and Produce a sustainable working of thesystem.
物联网是新兴技术领域的一个新概念,一个巨大的服务器与系统之间的海量数据库互联,以及我们周围机器的自治性质,构成了一个完整的物联网系统。但物联网的实际含义是什么?它是如何在我们的日常生活中实现的?根据一项研究,一个普通人在他的日常工作计划中至少被5-10台计算机包围,然而这些不是传统的计算机,而是微型集成电路,无数的主板等等。我们有没有想过,所有这些与我们人类同步工作的系统,必须提供多么轻松的工作?很多!如果所有这些系统都可以自主工作,而无需/只需很少的人力相互连接,那么生产力的大小将是多少?这正是物联网所能提供的。在物联网中,我们周围的机器通过互联网相互连接,为控制(用户)根据自己的意愿操纵和使用设备提供了大量的规定。物联网是一个互联的概念,技术上可以被称为“云计算”,它使用网络周围的大量数据将众多系统相互连接起来,并产生一个可持续的系统工作。
{"title":"Electronics and Internet of Things Integration","authors":"Astik Naval, Mohd. Momin Aman, Lucky Gaur, A. Khursheed","doi":"10.1109/ICIPTM52218.2021.9388353","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388353","url":null,"abstract":"Internet of things a new concept of the new emerging world of technology, a huge server with massive database interconnectivity between systems and the autonomous nature of machines around us makes an entire system of IOT. But what is the actual meaning of IOT and how is it implemented in our daily lives? According to a research an average person is surrounded by at least 5–10 computers in his daily work schedule however those are not conventional computers but miniature IC's, Numerous Motherboards and so on and so forth. Have we ever thought what ease of work does all these systems, working in sync with us as humans, has to offer? A LOT! What would be The Magnitude of productivity if all these systems could work autonomously without/with very less Human Effort Connected to each other? This is exactly what the INTERNET OF THINGS has to offer. In IOT, Machines around us are connected to each other with the internet which provide a whole lot of provision for the control (the user) to manipulate and use the device according to its own will. IOT is a concept of interconnectivity and technically can be termed as “Cloud Computing” which uses large sets of data around the web for connecting numerous systems with each other and Produce a sustainable working of thesystem.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130481694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Injurious Comment Detection and Removal utilizing Neural Network 基于神经网络的有害评论检测与删除
Pub Date : 2021-02-17 DOI: 10.1109/iciptm52218.2021.9388331
A. Wadhwani, Priyank Jain, Shriya Sahu
There are a lot of ways to communicate in this cyber world. With this increasingly growing era there is also much obstruction in a safe and secure environment. There has been an exponential growth in cyber bullying and abusing. Deep learning methods have recently begun to be used to detect abusive comments made in online forums. Detecting, and classifying, online abusive language is a non-trivial NLP challenge because online comments are made in a wide variety of contexts, and contain words from many different formal and informal lexicons. For this to overcome we design a model that detects the level of toxicity in a message and replaces it with another phrase. It uses a Deep Neural network model that takes a message/comment as an input and checks for various parameters such as Toxic, Severe Toxic, Identity hate, threat, etc. And the application finally then replaces the portion with another word/phrase. Examining things, you care about can be troublesome. The danger of misuse and provocation online implies that numerous individuals quit communicating and offer up on looking for changed thoughts. Stages battle to adequately encourage discussions, driving numerous networks to restrict or totally shut down client remarks.
在这个网络世界里有很多交流的方式。随着这个日益增长的时代,在安全可靠的环境中也存在许多障碍。网络欺凌和虐待呈指数级增长。深度学习方法最近开始被用于检测在线论坛上的辱骂性评论。在线辱骂语言的检测和分类是一项非同小可的NLP挑战,因为在线评论是在各种各样的上下文中发表的,并且包含来自许多不同正式和非正式词汇的单词。为了克服这个问题,我们设计了一个模型来检测消息中的毒性水平,并用另一个短语替换它。它使用深度神经网络模型,将消息/评论作为输入,并检查各种参数,如有毒,严重有毒,身份仇恨,威胁等。应用程序最后用另一个单词/短语替换该部分。检查你关心的东西可能会很麻烦。网络滥用和挑衅的危险意味着许多人不再交流,转而寻求改变想法。阶段斗争充分鼓励讨论,推动许多网络限制或完全关闭客户评论。
{"title":"Injurious Comment Detection and Removal utilizing Neural Network","authors":"A. Wadhwani, Priyank Jain, Shriya Sahu","doi":"10.1109/iciptm52218.2021.9388331","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388331","url":null,"abstract":"There are a lot of ways to communicate in this cyber world. With this increasingly growing era there is also much obstruction in a safe and secure environment. There has been an exponential growth in cyber bullying and abusing. Deep learning methods have recently begun to be used to detect abusive comments made in online forums. Detecting, and classifying, online abusive language is a non-trivial NLP challenge because online comments are made in a wide variety of contexts, and contain words from many different formal and informal lexicons. For this to overcome we design a model that detects the level of toxicity in a message and replaces it with another phrase. It uses a Deep Neural network model that takes a message/comment as an input and checks for various parameters such as Toxic, Severe Toxic, Identity hate, threat, etc. And the application finally then replaces the portion with another word/phrase. Examining things, you care about can be troublesome. The danger of misuse and provocation online implies that numerous individuals quit communicating and offer up on looking for changed thoughts. Stages battle to adequately encourage discussions, driving numerous networks to restrict or totally shut down client remarks.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Development of Cognitive IoT Assistance System for Visually Impaired 视障认知物联网辅助系统的设计与开发
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388372
C. P. Mallikarjuna Gowda, Raju Hajare, P. Pavan
In this paper, the problem of object recognition faced by visually impaired people in their daily life is considered. This problem causes them to face problem while crossing road and sometimes land them in the scenario of accident. In the literature different assistive solutions have been proposed to assist the visually impaired people. Some of them are Assistance from stick, Robot Assistance and Assistance by the visually fit people. Assistance from stick helps them to sense the object and also helps them to carry out various activities such as walking, negotiating a crowd and so on, but at the same time they won't know the object that is in front of them. Robots help them to navigate from one place to another, but at the same time it is highly expensive. Assistance from visually fit people is not a viable solution since; nowadays in this busy world people do not find time to help others. Looking at the problems faced by the visually impaired people, an assistive technology solution is being proposed by leveraging Internet of Thing (IoT), Machine Learning and Embedded Technologies for the visually impaired that helps them to move from one place to another without depending on others. The solution employs Google Tensor Flow Machine Learning Framework for the classification of the real-world objects. Therefore, the proposed system can rise the cognizance of the explored environment, it interacts with its user by means of audio messages and at the same time it is a cost-effective solution.
本文主要研究视障人士在日常生活中所面临的物体识别问题。这个问题导致他们在过马路时遇到问题,有时会让他们陷入事故的境地。在文献中提出了不同的辅助解决方案来帮助视障人士。其中包括手杖辅助、机器人辅助和视觉障碍者辅助。拐杖的帮助可以帮助他们感知物体,也可以帮助他们进行各种活动,如走路,穿过人群等,但同时他们不会知道面前的物体。机器人帮助他们从一个地方导航到另一个地方,但同时也非常昂贵。视力正常的人的帮助不是一个可行的解决方案,因为;如今在这个繁忙的世界里,人们找不到时间去帮助别人。针对视障人士面临的问题,正在提出一种辅助技术解决方案,利用物联网(IoT)、机器学习和嵌入式技术为视障人士提供帮助,帮助他们从一个地方移动到另一个地方,而无需依赖他人。该解决方案采用谷歌张量流机器学习框架对现实世界中的物体进行分类。因此,该系统可以提高对所探索环境的认知,通过音频信息与用户进行交互,同时也是一种经济有效的解决方案。
{"title":"Design and Development of Cognitive IoT Assistance System for Visually Impaired","authors":"C. P. Mallikarjuna Gowda, Raju Hajare, P. Pavan","doi":"10.1109/ICIPTM52218.2021.9388372","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388372","url":null,"abstract":"In this paper, the problem of object recognition faced by visually impaired people in their daily life is considered. This problem causes them to face problem while crossing road and sometimes land them in the scenario of accident. In the literature different assistive solutions have been proposed to assist the visually impaired people. Some of them are Assistance from stick, Robot Assistance and Assistance by the visually fit people. Assistance from stick helps them to sense the object and also helps them to carry out various activities such as walking, negotiating a crowd and so on, but at the same time they won't know the object that is in front of them. Robots help them to navigate from one place to another, but at the same time it is highly expensive. Assistance from visually fit people is not a viable solution since; nowadays in this busy world people do not find time to help others. Looking at the problems faced by the visually impaired people, an assistive technology solution is being proposed by leveraging Internet of Thing (IoT), Machine Learning and Embedded Technologies for the visually impaired that helps them to move from one place to another without depending on others. The solution employs Google Tensor Flow Machine Learning Framework for the classification of the real-world objects. Therefore, the proposed system can rise the cognizance of the explored environment, it interacts with its user by means of audio messages and at the same time it is a cost-effective solution.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115669255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Web based recommendation system using Multi-attribute collaborative filtering for user satisfaction 基于Web的多属性协同过滤用户满意度推荐系统
Pub Date : 2021-02-17 DOI: 10.1109/iciptm52218.2021.9388319
Priya Shrivastava, D. Sharma
In the wide area of personalized user based recommendation, although resource attribute is one the biggest important factors in recognizing user preferences, the researchers take into consideration among the user interest differences in resource attribute. As per previous research, both prediction and similarity computation are not extremely precise. There are some areas which have some space for improvements. In terms of accuracy, this paper proposed a modified ratio based multi-attribute method to calculate the similarity, providing us a new evaluation model of user interest based on resource multi-attribute. By comparing the multi attribute values we can find similarity between users and items using PARAFAC algorithm which is also responsible to handle large dataset and parallel computation among multi-attribute. This proposed method is also able to evaluate performance using this large data set of real web services whose experimental results explain that proposed method, in this paper, achieve better prediction and take less time in computation than various references considered.
在基于用户的个性化推荐领域中,虽然资源属性是识别用户偏好的最重要因素之一,但研究者考虑了用户之间在资源属性上的兴趣差异。根据以往的研究,预测和相似度计算都不是非常精确。有些地方还有改进的空间。在准确率方面,本文提出了一种改进的基于比例的多属性相似度计算方法,为我们提供了一种新的基于资源多属性的用户兴趣评价模型。通过对多属性值的比较,利用PARAFAC算法找到用户和项目之间的相似度,该算法还负责处理大型数据集和多属性间的并行计算。本文提出的方法还可以使用大量的真实web服务数据集来评估性能,实验结果表明,本文提出的方法比各种参考文献所考虑的方法具有更好的预测效果和更少的计算时间。
{"title":"Web based recommendation system using Multi-attribute collaborative filtering for user satisfaction","authors":"Priya Shrivastava, D. Sharma","doi":"10.1109/iciptm52218.2021.9388319","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388319","url":null,"abstract":"In the wide area of personalized user based recommendation, although resource attribute is one the biggest important factors in recognizing user preferences, the researchers take into consideration among the user interest differences in resource attribute. As per previous research, both prediction and similarity computation are not extremely precise. There are some areas which have some space for improvements. In terms of accuracy, this paper proposed a modified ratio based multi-attribute method to calculate the similarity, providing us a new evaluation model of user interest based on resource multi-attribute. By comparing the multi attribute values we can find similarity between users and items using PARAFAC algorithm which is also responsible to handle large dataset and parallel computation among multi-attribute. This proposed method is also able to evaluate performance using this large data set of real web services whose experimental results explain that proposed method, in this paper, achieve better prediction and take less time in computation than various references considered.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116093589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Technique of Encryption Decryption Based On Image 基于图像的现代加密解密技术
Pub Date : 2021-02-17 DOI: 10.1109/iciptm52218.2021.9388361
Hemlata
In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.
在今天的技术时代,信息共享和数据传输迅速增加。面对第三方访问数据的问题一直是数据通信专家高度关注的问题。安全措施在保证数据和资源的准确性、安全性和完整性的前提下,发挥着重要的作用。这种方法是为了获得安全的通信。有许多保护数据安全的技术。为了提高数据的安全性,防止未经授权的用户使用数据,提出了基于图像的MODREN加密解密技术。使用密钥生成、密钥交换和二进制补码进行数据(文本/图像)认证。
{"title":"Modern Technique of Encryption Decryption Based On Image","authors":"Hemlata","doi":"10.1109/iciptm52218.2021.9388361","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388361","url":null,"abstract":"In today's age of technology, sharing of information and transfer of data has increased rapidly. The problem of facing the third party accessing the has been the issue of highly concern for the experts of data communication. The security measures plays an important role to provide authentication only of the authorized person, with accuracy, safety and integrity of data and resources. This method is to gain secure communication. There are number of techniques for security of data. To enhance the security to made the data safe from un authorized users “MODREN TECHNIQUE OF ENCRYPTION DECRYPTION BASED ON IMAGE.” Is designed by using key generation, key exchange and binary complements for data (text/image) authentication.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID19 Remote Engineering Education: Learning of an Embedded System with Practical Perspective covid - 19远程工程教育:嵌入式系统的实用视角学习
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388360
S. Khant, Atul Patel
Covid19 pandemic has affected all sectors including academic institutions. In countries like India, population is at peak and risk factor for infection is high if government allows to start the institute in full fledge. It is stressful for students and researchers to work without any hardware support. The goal of the paper is to help the academicians and researchers by looking into the system with new simulation techniques. Various experiments related to embedded system are simulated and working is demonstrated through the help of online simulation tools. All important analog interface sensors are demonstrated with this online tool. Various issues occurred during simulations, block diagram, algorithms and results are also discussed. By studying these issues students can able to learn the basic concepts and fundamentals related to interfacing devices and components with your embedded system. As the simulation system is online. The reliability and flexibility issues are also considered. Simulation tool uses all virtual electronics components like analog and digital sensors, Controllers (Arduino), switches, LED and LCD displays and many more.
新冠肺炎疫情对包括学术机构在内的各行各业都产生了影响。在印度这样的国家,如果政府允许全面启动该研究所,人口正处于高峰期,感染的风险因素也很高。没有任何硬件支持,学生和研究人员的工作压力很大。本文的目的是通过新的仿真技术来帮助学者和研究人员研究该系统。利用在线仿真工具对嵌入式系统相关的各种实验进行了仿真和演示。所有重要的模拟接口传感器演示与此在线工具。讨论了仿真过程中出现的各种问题、框图、算法和结果。通过研究这些问题,学生可以学习与嵌入式系统接口设备和组件相关的基本概念和基础知识。由于仿真系统是在线的。同时还考虑了可靠性和灵活性问题。仿真工具使用所有虚拟电子元件,如模拟和数字传感器,控制器(Arduino),开关,LED和LCD显示器等等。
{"title":"COVID19 Remote Engineering Education: Learning of an Embedded System with Practical Perspective","authors":"S. Khant, Atul Patel","doi":"10.1109/ICIPTM52218.2021.9388360","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388360","url":null,"abstract":"Covid19 pandemic has affected all sectors including academic institutions. In countries like India, population is at peak and risk factor for infection is high if government allows to start the institute in full fledge. It is stressful for students and researchers to work without any hardware support. The goal of the paper is to help the academicians and researchers by looking into the system with new simulation techniques. Various experiments related to embedded system are simulated and working is demonstrated through the help of online simulation tools. All important analog interface sensors are demonstrated with this online tool. Various issues occurred during simulations, block diagram, algorithms and results are also discussed. By studying these issues students can able to learn the basic concepts and fundamentals related to interfacing devices and components with your embedded system. As the simulation system is online. The reliability and flexibility issues are also considered. Simulation tool uses all virtual electronics components like analog and digital sensors, Controllers (Arduino), switches, LED and LCD displays and many more.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125507691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Review on Medical Image Denoising Techniques 医学图像去噪技术综述
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388367
Simarjeet Kaur, Jimmy Singla, Nikita, Amar Singh
In recent times, with rapid growth in technology, medical imaging has become popular in healthcare. The impression of these improvements in the medical field has become evident that technology can able to diagnose disease in a much better way than before. Medical images play a vital role in the detection and prediction of disease but these images may tend to corrupt by some kind of noise or artifacts during the image acquisition process. The presence of noise makes images unclear, fine details and features of the original image are lost which leads to inaccurate detection of disease. Hence, different denoising methods are required to eliminate noise without losing image features (edges, corners, and other sharp structures). Researchers have already proposed different tools and techniques to reduce noise. Each technique has its merits and demerits. Hence preprocessing of medical images is a mandatory and essential process to get accurate results. This review article provides a comprehensive survey of different noises, denoising models, contrast enhancement methods, quality matrices. In addition, the main aim of this paper is to conduct a detailed analysis of various preprocessing techniques used on medical images which include Computed Tomography (CT), Magnetic Resonance images (MRI), Positron Emission Tomography (PET), 2D/3DULTRASOUND images.
近年来,随着技术的快速发展,医学成像在医疗保健领域越来越受欢迎。医学领域的这些进步给人的印象已经变得很明显,技术能够比以前更好地诊断疾病。医学图像在疾病的检测和预测中起着至关重要的作用,但在图像采集过程中,这些图像容易受到某种噪声或伪影的破坏。噪声的存在使图像不清晰,失去了原始图像的细节和特征,导致疾病的检测不准确。因此,需要使用不同的去噪方法来消除噪声,同时不损失图像特征(边缘、角和其他尖锐结构)。研究人员已经提出了不同的工具和技术来减少噪音。每种技术都有其优点和缺点。因此,医学图像的预处理是获得准确结果的必要过程。本文综述了各种噪声、去噪模型、对比度增强方法和质量矩阵。此外,本文的主要目的是对计算机断层扫描(CT)、磁共振成像(MRI)、正电子发射断层扫描(PET)、二维/三维超声图像等医学图像的各种预处理技术进行详细分析。
{"title":"Review on Medical Image Denoising Techniques","authors":"Simarjeet Kaur, Jimmy Singla, Nikita, Amar Singh","doi":"10.1109/ICIPTM52218.2021.9388367","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388367","url":null,"abstract":"In recent times, with rapid growth in technology, medical imaging has become popular in healthcare. The impression of these improvements in the medical field has become evident that technology can able to diagnose disease in a much better way than before. Medical images play a vital role in the detection and prediction of disease but these images may tend to corrupt by some kind of noise or artifacts during the image acquisition process. The presence of noise makes images unclear, fine details and features of the original image are lost which leads to inaccurate detection of disease. Hence, different denoising methods are required to eliminate noise without losing image features (edges, corners, and other sharp structures). Researchers have already proposed different tools and techniques to reduce noise. Each technique has its merits and demerits. Hence preprocessing of medical images is a mandatory and essential process to get accurate results. This review article provides a comprehensive survey of different noises, denoising models, contrast enhancement methods, quality matrices. In addition, the main aim of this paper is to conduct a detailed analysis of various preprocessing techniques used on medical images which include Computed Tomography (CT), Magnetic Resonance images (MRI), Positron Emission Tomography (PET), 2D/3DULTRASOUND images.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131890602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hotel Site Planning Using Geographic Information System-Proposed Conceptual Model for Darjeeling District 基于地理信息系统的酒店场地规划——大吉岭地区概念模型
Pub Date : 2021-02-17 DOI: 10.1109/iciptm52218.2021.9388343
Malini Singh, Sudipta Mukherjee, A. Mukhopadhyay
Planning is an integral part of any business. Industry or business cannot successfully move further without proper planning. Hospitality business contributes a considerable amount to the country's economy. It is considered as a significant source of employment for every country because it involves massive human resources to render the service. On the other hand, a high amount of investment is needed to establish proper infrastructure to cater to the need of every customer, i.e. tourists in different categories. Thus hotel planning should be done very carefully. It is noticed that many hotels are running in the loss in India or other countries due to faulty planning and management. There is a need for proper scientific planning before constructing any hotel. Measurement of different parameters and criteria should be carefully verified and monitored by using statistical tools before the project is begun. In this paper, researchers have tried to propose a conceptual model by identifying different criteria and parameters which are mandatory for hotel planning. Researchers have also shown a conceptual framework of hotel site selection process by using Geographic Information System (GIS) as a part of scientific decision-making tools which is also known as Spatial Decision Support System (SDSS). An analysis is also made by formulating a model to show that GIS based decision-making process is very much scientific and can be used in effective hotel planning.
计划是任何企业不可缺少的一部分。没有适当的规划,工业或商业就无法成功地进一步发展。酒店业对国家经济的贡献相当大。它被认为是每个国家就业的一个重要来源,因为它需要大量的人力资源来提供服务。另一方面,需要大量的投资来建立适当的基础设施,以满足每一个客户的需求,即不同类别的游客。因此,酒店规划应该做得非常仔细。值得注意的是,在印度或其他国家,由于规划和管理不善,许多酒店都在亏损经营。在建造任何酒店之前,都需要进行适当的科学规划。在工程开始前,应使用统计工具仔细核实和监测不同参数和标准的测量结果。在本文中,研究人员试图通过确定酒店规划的不同标准和参数来提出一个概念模型。研究人员还展示了将地理信息系统(GIS)作为科学决策工具的一部分,即空间决策支持系统(SDSS),来进行酒店选址过程的概念框架。通过建立模型进行分析,表明基于GIS的决策过程是非常科学的,可以有效地用于酒店规划。
{"title":"Hotel Site Planning Using Geographic Information System-Proposed Conceptual Model for Darjeeling District","authors":"Malini Singh, Sudipta Mukherjee, A. Mukhopadhyay","doi":"10.1109/iciptm52218.2021.9388343","DOIUrl":"https://doi.org/10.1109/iciptm52218.2021.9388343","url":null,"abstract":"Planning is an integral part of any business. Industry or business cannot successfully move further without proper planning. Hospitality business contributes a considerable amount to the country's economy. It is considered as a significant source of employment for every country because it involves massive human resources to render the service. On the other hand, a high amount of investment is needed to establish proper infrastructure to cater to the need of every customer, i.e. tourists in different categories. Thus hotel planning should be done very carefully. It is noticed that many hotels are running in the loss in India or other countries due to faulty planning and management. There is a need for proper scientific planning before constructing any hotel. Measurement of different parameters and criteria should be carefully verified and monitored by using statistical tools before the project is begun. In this paper, researchers have tried to propose a conceptual model by identifying different criteria and parameters which are mandatory for hotel planning. Researchers have also shown a conceptual framework of hotel site selection process by using Geographic Information System (GIS) as a part of scientific decision-making tools which is also known as Spatial Decision Support System (SDSS). An analysis is also made by formulating a model to show that GIS based decision-making process is very much scientific and can be used in effective hotel planning.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134450732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Robot for Collection and Segregation of Garbage 智能垃圾收集和分类机器人
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388369
Akanksha, Muskan Gupta, M. M. Tripathi
This paper proposes a robotic bot to collect the litter thrown and segregate the garbage so as to reduce human effort and keep the environment clean. The proposed robotic bot autonomously identifies garbage and classifies it into biodegradable and non-biodegradable. The final collected garbage is, in a way, segregated automatically. The robot moves towards the garbage just like a rag picker does. When the robot's bins are full, a signalling system is created. This autonomous bot is capable of collecting, segregating and providing signals if the garbage bin is full. The yolov4 model was used to train a dataset of 10,000 images of both the categories and the model was able to detectthe test images with adequate efficiency of 99.66 percent, making it promising candidate for using as an alternative to human effort.
本文提出了一种机器人来收集丢弃的垃圾和分类垃圾,以减少人类的劳动,保持环境清洁。该机器人能够自主识别垃圾,并将其分为可生物降解和不可生物降解两类。在某种程度上,最终收集的垃圾是自动隔离的。机器人向垃圾移动,就像拾荒者一样。当机器人的箱子装满时,就会产生一个信号系统。如果垃圾桶满了,这个自动机器人能够收集、分离并发出信号。yolov4模型用于训练包含这两个类别的10,000张图像的数据集,该模型能够以99.66%的效率检测测试图像,使其成为替代人工工作的有希望的候选对象。
{"title":"Smart Robot for Collection and Segregation of Garbage","authors":"Akanksha, Muskan Gupta, M. M. Tripathi","doi":"10.1109/ICIPTM52218.2021.9388369","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388369","url":null,"abstract":"This paper proposes a robotic bot to collect the litter thrown and segregate the garbage so as to reduce human effort and keep the environment clean. The proposed robotic bot autonomously identifies garbage and classifies it into biodegradable and non-biodegradable. The final collected garbage is, in a way, segregated automatically. The robot moves towards the garbage just like a rag picker does. When the robot's bins are full, a signalling system is created. This autonomous bot is capable of collecting, segregating and providing signals if the garbage bin is full. The yolov4 model was used to train a dataset of 10,000 images of both the categories and the model was able to detectthe test images with adequate efficiency of 99.66 percent, making it promising candidate for using as an alternative to human effort.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134487107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Behavioral Biometrics for Adaptive Authentication in Digital Banking - Guard Against Flawless Privacy 行为生物识别技术在数字银行中的自适应认证——防范完美的隐私
Pub Date : 2021-02-17 DOI: 10.1109/ICIPTM52218.2021.9388364
Supriya Lamba Sahdev, Saurabh Singh, Navleen Kaur, Laraibe Siddiqui
This study throws light on the usage of Behavioral Biometrics in Digital banking arena. In current scenario more of physiological biometric modalities are being used in Digital Banking in comparison to psychological/ behavioral modalities which are difficult to record or mimic making behavioral biometrics more secure against replay attacks. This study suggests the usage of mobile screen swipe and touch data for user verification. The experiments were performed using publicly available UMDAA02 mobile swipe data set. The results of the study present a fine-tuned feature set for a swipe-based authentication system for mobile devices used for Digital Banking. It has been observed that with the suggested feature set, K-NN outperforms Naïve bays and SVM algorithms with the best EER of 14%. With the kind of performance shown by K-NN this study strongly suggests, swipe-based authentication system that can be used as a secondary layer of security in the digital banking system.
本研究揭示了行为生物识别技术在数字银行领域的应用。在目前的情况下,与难以记录或模仿的心理/行为模式相比,更多的生理生物识别模式被用于数字银行,这使得行为生物识别技术更安全,可以抵御重放攻击。本研究建议使用手机屏幕滑动和触摸数据进行用户验证。实验使用公开可用的UMDAA02移动滑动数据集进行。研究结果为用于数字银行的移动设备的基于刷卡的认证系统提供了一个微调的功能集。已经观察到,使用建议的特征集,K-NN以14%的最佳EER优于Naïve bayes和SVM算法。由于K-NN所显示的这种性能,这项研究强烈表明,基于刷卡的身份验证系统可以用作数字银行系统的第二层安全保障。
{"title":"Behavioral Biometrics for Adaptive Authentication in Digital Banking - Guard Against Flawless Privacy","authors":"Supriya Lamba Sahdev, Saurabh Singh, Navleen Kaur, Laraibe Siddiqui","doi":"10.1109/ICIPTM52218.2021.9388364","DOIUrl":"https://doi.org/10.1109/ICIPTM52218.2021.9388364","url":null,"abstract":"This study throws light on the usage of Behavioral Biometrics in Digital banking arena. In current scenario more of physiological biometric modalities are being used in Digital Banking in comparison to psychological/ behavioral modalities which are difficult to record or mimic making behavioral biometrics more secure against replay attacks. This study suggests the usage of mobile screen swipe and touch data for user verification. The experiments were performed using publicly available UMDAA02 mobile swipe data set. The results of the study present a fine-tuned feature set for a swipe-based authentication system for mobile devices used for Digital Banking. It has been observed that with the suggested feature set, K-NN outperforms Naïve bays and SVM algorithms with the best EER of 14%. With the kind of performance shown by K-NN this study strongly suggests, swipe-based authentication system that can be used as a secondary layer of security in the digital banking system.","PeriodicalId":315265,"journal":{"name":"2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)","volume":"216 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133316065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2021 International Conference on Innovative Practices in Technology and Management (ICIPTM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1