首页 > 最新文献

2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)最新文献

英文 中文
Factors Related To The Improvement of Face Anti-Spoofing Detection Techniques With CNN Classifier CNN分类器改进人脸抗欺骗检测技术的相关因素
Sonali R. Chavan, S. Sherekar, V. Thakre
Face recognition is one of the most successful application & has recently gain popularity with significant attention. Extensive research has been done in recognising the identity of the user from their facial image. Security issue on face recognition systems persists as a primary concern. although there are so many detection methods have been proposed but still it has some drawbacks in terms of parameters performance, size of datasets and generalisation ability to detect unseen face attacks So it is a challenging task to the researchers to proposed a robust face detection technique. This paper adopted comprehensive presentation of proposed Anti-spoofing techniques followed by features, datasets, parameters. Paper also provides experimental view on extensive comparative analysis of parameters, classifiers and databases which will be use to protect from various types of Face Spoofing attacks and depicted the purely CNN based existing methodology with general Face Spoofing detection module.
人脸识别是最成功的应用之一,最近得到了广泛的关注。在从面部图像识别用户身份方面已经进行了广泛的研究。人脸识别系统的安全问题一直是人们关注的焦点。尽管已经提出了许多检测方法,但在检测隐性人脸攻击的参数性能、数据集的大小和泛化能力等方面仍存在一些不足,因此提出一种鲁棒的人脸检测技术对研究人员来说是一项具有挑战性的任务。本文从特征、数据集、参数等方面全面介绍了所提出的抗欺骗技术。论文还提供了对参数、分类器和数据库的广泛比较分析的实验观点,这些参数、分类器和数据库将用于防止各种类型的人脸欺骗攻击,并描述了纯基于CNN的现有方法与通用人脸欺骗检测模块。
{"title":"Factors Related To The Improvement of Face Anti-Spoofing Detection Techniques With CNN Classifier","authors":"Sonali R. Chavan, S. Sherekar, V. Thakre","doi":"10.1109/iccica52458.2021.9697292","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697292","url":null,"abstract":"Face recognition is one of the most successful application & has recently gain popularity with significant attention. Extensive research has been done in recognising the identity of the user from their facial image. Security issue on face recognition systems persists as a primary concern. although there are so many detection methods have been proposed but still it has some drawbacks in terms of parameters performance, size of datasets and generalisation ability to detect unseen face attacks So it is a challenging task to the researchers to proposed a robust face detection technique. This paper adopted comprehensive presentation of proposed Anti-spoofing techniques followed by features, datasets, parameters. Paper also provides experimental view on extensive comparative analysis of parameters, classifiers and databases which will be use to protect from various types of Face Spoofing attacks and depicted the purely CNN based existing methodology with general Face Spoofing detection module.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A brief study on the prediction of crop disease using machine learning approaches 利用机器学习方法预测作物病害的简要研究
Gawande Apeksha R., Sherekar Swati S.
The intention of this entire survey is to evaluate the importance and impact of the articles which have been posted with the identify device gaining knowledge of-primarily based totally early detection of crop disorder or prediction of fungal illnesses on vegetation with the help of device gaining knowledge of and facts mining techniques at some stage in the duration 2016-2020. It likewise uncovers that the territory of plant disorder has gotten elevated and hobby with the aid of using researchers, studies investment institutions, and experts. The electronically available peer-review journal papers from Google Scholar, Web of Sciences, and papers available at Mendeley desktop application databases were reviewed. The following parameters were considered while reviewing the papers. 1. Which machine learning or data mining algorithmic approach was used? 2. Which performance metrics were used? 3. Which plant diseases data set was used? 4. How was the performance analysis carried out? 5. Whether the results were compared with some other techniques? The computer algorithms-based articles deal with the early detection of plant disease and were published between 2016 and 2020 were reviewed. From the top-refered to explore distributions relating to AI based expectation of plant infection, it is seen that mixture models were broadly used over a singular order model. A broadly utilized relapse model with SVM, variations of choice trees, and Naive Bayes models are having the best exhibition for early expectation of yield infections.
整个调查的目的是评估在2016-2020年期间的某个阶段,通过识别设备获取知识(主要基于作物病害的完全早期检测或植被真菌疾病的预测)发布的文章的重要性和影响,该设备获取知识和事实挖掘技术。它还揭示了在研究人员、研究投资机构和专家的帮助下,植物紊乱的领域得到了提升和重视。从Google Scholar, Web of Sciences和Mendeley桌面应用程序数据库中获得的电子同行评议期刊论文进行了审查。在审查论文时考虑了以下参数。1. 使用了哪种机器学习或数据挖掘算法?2. 使用了哪些性能指标?3.使用了哪个植物病害数据集?4. 性能分析是如何进行的?5. 结果是否与其他技术进行了比较?回顾了2016年至2020年间发表的基于计算机算法的植物病害早期检测文章。从顶部参考的探索与基于人工智能的植物感染预期相关的分布,可以看出混合模型被广泛使用于单阶模型。基于支持向量机的复发模型、选择树的变化和朴素贝叶斯模型在产量感染的早期预期中有最好的表现。
{"title":"A brief study on the prediction of crop disease using machine learning approaches","authors":"Gawande Apeksha R., Sherekar Swati S.","doi":"10.1109/iccica52458.2021.9697143","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697143","url":null,"abstract":"The intention of this entire survey is to evaluate the importance and impact of the articles which have been posted with the identify device gaining knowledge of-primarily based totally early detection of crop disorder or prediction of fungal illnesses on vegetation with the help of device gaining knowledge of and facts mining techniques at some stage in the duration 2016-2020. It likewise uncovers that the territory of plant disorder has gotten elevated and hobby with the aid of using researchers, studies investment institutions, and experts. The electronically available peer-review journal papers from Google Scholar, Web of Sciences, and papers available at Mendeley desktop application databases were reviewed. The following parameters were considered while reviewing the papers. 1. Which machine learning or data mining algorithmic approach was used? 2. Which performance metrics were used? 3. Which plant diseases data set was used? 4. How was the performance analysis carried out? 5. Whether the results were compared with some other techniques? The computer algorithms-based articles deal with the early detection of plant disease and were published between 2016 and 2020 were reviewed. From the top-refered to explore distributions relating to AI based expectation of plant infection, it is seen that mixture models were broadly used over a singular order model. A broadly utilized relapse model with SVM, variations of choice trees, and Naive Bayes models are having the best exhibition for early expectation of yield infections.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"799 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117042825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning Algorithms in WSNs and its Applications 无线传感器网络中的机器学习算法及其应用
A. Raut, S. Khandait
Wireless sensor network (WSN) the unique and utmost encouraging tools for monitoring the real-time applications. It has been utilized in various areas particularly for offering real-time monitoring and control applications which attempts to monitor and record the environmental parameters and takes the appropriate decisions on time in a difficult situation. In recent enlargements Machine Learning (ML) techniques has been used to solve different problems in WSNs to ensure that good decisions can be made in the complex situations in time. Applying ML will help in boosting the efficiency of WSNs, as well as limiting humanoid intervention or re-programming. We have studied previous work for addressing the issues in Quality of Service (QoS) provisioning in WSNs. In addition we done the survey of ML based techniques used to address the issues in WSNs in the recent era.
无线传感器网络(WSN)是监测实时应用的独特和最令人鼓舞的工具。它已被用于各个领域,特别是提供实时监测和控制应用,试图监测和记录环境参数,并在困难情况下及时作出适当的决定。在最近的扩展中,机器学习技术被用于解决无线传感器网络中的各种问题,以确保在复杂的情况下及时做出良好的决策。应用机器学习将有助于提高wsn的效率,并限制人形干预或重新编程。我们研究了以前解决无线传感器网络中服务质量(QoS)供应问题的工作。此外,我们还对近年来用于解决wsn问题的基于ML的技术进行了调查。
{"title":"Machine Learning Algorithms in WSNs and its Applications","authors":"A. Raut, S. Khandait","doi":"10.1109/iccica52458.2021.9697319","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697319","url":null,"abstract":"Wireless sensor network (WSN) the unique and utmost encouraging tools for monitoring the real-time applications. It has been utilized in various areas particularly for offering real-time monitoring and control applications which attempts to monitor and record the environmental parameters and takes the appropriate decisions on time in a difficult situation. In recent enlargements Machine Learning (ML) techniques has been used to solve different problems in WSNs to ensure that good decisions can be made in the complex situations in time. Applying ML will help in boosting the efficiency of WSNs, as well as limiting humanoid intervention or re-programming. We have studied previous work for addressing the issues in Quality of Service (QoS) provisioning in WSNs. In addition we done the survey of ML based techniques used to address the issues in WSNs in the recent era.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123923901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Using OCR to automate document conversion to LATEX 使用OCR自动将文档转换为LATEX
Shashwat Pandey, Aditya Rohatgi
The process of transforming a physical document to a digital version leaves loose ends in several portions. There is a lack of solutions that offer end-to-end conversion of hard copies entailing images, graphs, tables, and other details into soft copies. To this end, we attempt to develop a computationally efficient algorithm to convert a document into its digital version through LATEX representations of the hard copy. Our research efforts take the problem of using OCR techniques into account for converting an image of a typesetted document into LATEX. This work serves as a proof of concept that equation layouts can be learned and individual character recognition is possible with not so sophisticated OCR techniques. The method we created to break the problem down step by step helped modularize and compartmentalize the tasks so that each can focus on the different types of issues that can occur at different levels of granularity.
将物理文档转换为数字版本的过程在几个部分留下了遗漏。缺乏提供端到端将包含图像、图形、表格和其他细节的硬拷贝转换为软拷贝的解决方案。为此,我们试图开发一种计算效率高的算法,通过硬拷贝的LATEX表示将文档转换为数字版本。我们的研究工作考虑了使用OCR技术将排版文档的图像转换为LATEX的问题。这项工作证明了等式布局是可以学习的,个人字符识别是可能的,不那么复杂的OCR技术。我们创建的逐步分解问题的方法有助于模块化和划分任务,以便每个任务都可以专注于可能在不同粒度级别上发生的不同类型的问题。
{"title":"Using OCR to automate document conversion to LATEX","authors":"Shashwat Pandey, Aditya Rohatgi","doi":"10.1109/iccica52458.2021.9697266","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697266","url":null,"abstract":"The process of transforming a physical document to a digital version leaves loose ends in several portions. There is a lack of solutions that offer end-to-end conversion of hard copies entailing images, graphs, tables, and other details into soft copies. To this end, we attempt to develop a computationally efficient algorithm to convert a document into its digital version through LATEX representations of the hard copy. Our research efforts take the problem of using OCR techniques into account for converting an image of a typesetted document into LATEX. This work serves as a proof of concept that equation layouts can be learned and individual character recognition is possible with not so sophisticated OCR techniques. The method we created to break the problem down step by step helped modularize and compartmentalize the tasks so that each can focus on the different types of issues that can occur at different levels of granularity.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129066843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Twitter Sentiment Analysis using Natural Language Processing 使用自然语言处理的推特情感分析
Suhashini Chaurasia, S. Sherekar, Vilas Thakare
Social media is the richest source of text generated by the user. So there is a necessity to automate the system to help organizing and classifying the opinions posted on social media sites. Proposed methodology framework using Artificial Recurrent Neural Network (ARNN) with bi-directional long short term memory (LSTM) has been used for the classification of sentiments. Structure for RNN with bidirectional LSTM is depicted. US airline Twitter sentiment dataset has been analysed using bidirectional LSTM model. Text with varying length is taken for the experiment. Graphical representation of the analysis has been depicted in this paper. Confusion matrix shows the result. At the end it is concluded that the sentiments are analysed and classified as positive, negative or neutral.
社交媒体是用户生成的最丰富的文本来源。因此,有必要将该系统自动化,以帮助组织和分类发布在社交媒体网站上的意见。提出了一种基于双向长短期记忆的人工循环神经网络(ARNN)的情感分类方法框架。描述了具有双向LSTM的RNN的结构。使用双向LSTM模型分析了美国航空公司Twitter情绪数据集。实验采用不同长度的文本。本文用图形表示了分析结果。混淆矩阵显示了结果。最后得出结论,对情绪进行了分析,并将其分为积极、消极或中性。
{"title":"Twitter Sentiment Analysis using Natural Language Processing","authors":"Suhashini Chaurasia, S. Sherekar, Vilas Thakare","doi":"10.1109/iccica52458.2021.9697136","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697136","url":null,"abstract":"Social media is the richest source of text generated by the user. So there is a necessity to automate the system to help organizing and classifying the opinions posted on social media sites. Proposed methodology framework using Artificial Recurrent Neural Network (ARNN) with bi-directional long short term memory (LSTM) has been used for the classification of sentiments. Structure for RNN with bidirectional LSTM is depicted. US airline Twitter sentiment dataset has been analysed using bidirectional LSTM model. Text with varying length is taken for the experiment. Graphical representation of the analysis has been depicted in this paper. Confusion matrix shows the result. At the end it is concluded that the sentiments are analysed and classified as positive, negative or neutral.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114281524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of non technical factors responsible for power losses at MSEB 研究导致MSEB电力损耗的非技术因素
D. Singh, S. Kediya, R. Mahajan, P. Asthana
The paper has attempted to understand and unveil the non-technical causes of power electric losses. Many studies have covered the reasons for technical losses but here the author has covered the power losses due to manpower employed in MSEB (Maharashtra state electricity Board). The major findings of the study were that employees needs to be made aware about power losses. Employees are uninterested in continuing their inquisitiveness. Furthermore, they are unconcerned in learning new skills. Hence these factors led to negative outcome regarding power loss. They need to be given more training so that they can take effective measures to check the issue.
本文试图了解和揭示电力损耗的非技术原因。许多研究都涵盖了技术损失的原因,但在这里,作者涵盖了由于MSEB(马哈拉施特拉邦电力局)雇用的人力造成的电力损失。这项研究的主要发现是,员工需要意识到电力损失。员工们对继续他们的好奇心不感兴趣。此外,他们不关心学习新技能。因此,这些因素导致了有关功率损失的负面结果。他们需要接受更多的培训,这样他们才能采取有效的措施来解决这个问题。
{"title":"Study of non technical factors responsible for power losses at MSEB","authors":"D. Singh, S. Kediya, R. Mahajan, P. Asthana","doi":"10.1109/iccica52458.2021.9697173","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697173","url":null,"abstract":"The paper has attempted to understand and unveil the non-technical causes of power electric losses. Many studies have covered the reasons for technical losses but here the author has covered the power losses due to manpower employed in MSEB (Maharashtra state electricity Board). The major findings of the study were that employees needs to be made aware about power losses. Employees are uninterested in continuing their inquisitiveness. Furthermore, they are unconcerned in learning new skills. Hence these factors led to negative outcome regarding power loss. They need to be given more training so that they can take effective measures to check the issue.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125328154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SDN based Blockchain Architecture for Security Performance of VANETs 基于SDN的区块链架构实现VANETs的安全性能
Swapna Choudhary, S. Dorle
Vehicular ad hoc networks (VANETs) are used in intelligent transportation systems to provide safety and security with a reduction in traffic jams using vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) unit communications. During the communication, nodes are always under various security threads. In order to reduce the possibility of these attacks and to normalize traffic flow in the network, a software-defined network (SDN) is used. SDN will improve centralized visibility as all the underlying open flow switches are connected to the controller, which will reduce the routing load in the network. SDN doesn’t provide a high level of security to the network, hence protocols like encryption, hashing, etc. are applied to the VANET. In the paper, SDN based blockchain algorithm is applied, which coordinates network traffic and improves the overall security of the network. Security analysis of the proposed algorithm demonstrates that blockchain with encrypted SDN removes more than 90% of the network attacks as compared to its non- blockchain SDN.
车辆自组织网络(VANETs)用于智能交通系统,通过车辆对车辆(V2V)和车辆对路边(V2R)单元通信,提供安全和保障,减少交通拥堵。在通信过程中,节点始终处于不同的安全线程下。为了减少这些攻击的可能性,并使网络中的流量规范化,使用了软件定义网络(SDN)。SDN将提高集中可视性,因为所有底层开放流交换机都连接到控制器,这将减少网络中的路由负载。SDN不为网络提供高水平的安全性,因此像加密、散列等协议被应用于VANET。本文采用基于SDN的区块链算法,对网络流量进行协调,提高了网络的整体安全性。对所提出算法的安全性分析表明,与非区块链SDN相比,加密SDN的区块链消除了90%以上的网络攻击。
{"title":"SDN based Blockchain Architecture for Security Performance of VANETs","authors":"Swapna Choudhary, S. Dorle","doi":"10.1109/iccica52458.2021.9697270","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697270","url":null,"abstract":"Vehicular ad hoc networks (VANETs) are used in intelligent transportation systems to provide safety and security with a reduction in traffic jams using vehicle-to-vehicle (V2V) and vehicle-to-roadside (V2R) unit communications. During the communication, nodes are always under various security threads. In order to reduce the possibility of these attacks and to normalize traffic flow in the network, a software-defined network (SDN) is used. SDN will improve centralized visibility as all the underlying open flow switches are connected to the controller, which will reduce the routing load in the network. SDN doesn’t provide a high level of security to the network, hence protocols like encryption, hashing, etc. are applied to the VANET. In the paper, SDN based blockchain algorithm is applied, which coordinates network traffic and improves the overall security of the network. Security analysis of the proposed algorithm demonstrates that blockchain with encrypted SDN removes more than 90% of the network attacks as compared to its non- blockchain SDN.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131593874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effect of Leadership and Innovations on Business Performance: A Structural Equation Modelling Analysis 领导与创新对企业绩效的影响:结构方程模型分析
Pramod Jadhav, A. Shelke, C. Sonar
The cognitive intelligence is vital for human adaptation and subsistence. It encompasses wisdom and mental ability in regards to learning, evaluation and solving the problems. In almost all sectors, companies are facing acute competition. Employing cognitive intelligence, industries are adopting enormous operational excellence measures to thrive their success. Hence cognitive leadership is important driving force that influences the organizational success through the human capital. This research endeavors to study such cognitive leadership attempts in anticipating the vulnerability, defining and applying various strategies in creation of innovation nurturing environment. An influence of cognitive leadership in influencing the risk mitigation and non-technical innovation strategies is analyzed while examining their impact on the business success within a theoretical lens of socio-cognitive space and capabilities-based view (CBV) of strategic management frameworks using partial least squares (PLS) method of structural equations modelling (SEM).
认知智力对人类的适应和生存至关重要。它包含了学习、评价和解决问题的智慧和心智能力。在几乎所有行业,企业都面临着激烈的竞争。利用认知智能,行业正在采用大量的卓越运营措施来茁壮成长。因此,认知领导是通过人力资本影响组织成功的重要驱动力。本研究旨在探讨认知领导在创造创新培育环境中,对脆弱性的预判、各种策略的定义与运用。在影响风险缓解和非技术创新战略的认知领导的影响进行了分析,同时检查其对企业成功的影响在社会认知空间和战略管理框架的基于能力的观点(CBV)的理论视角内使用结构方程建模(SEM)的偏最小二乘(PLS)方法。
{"title":"Effect of Leadership and Innovations on Business Performance: A Structural Equation Modelling Analysis","authors":"Pramod Jadhav, A. Shelke, C. Sonar","doi":"10.1109/iccica52458.2021.9697282","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697282","url":null,"abstract":"The cognitive intelligence is vital for human adaptation and subsistence. It encompasses wisdom and mental ability in regards to learning, evaluation and solving the problems. In almost all sectors, companies are facing acute competition. Employing cognitive intelligence, industries are adopting enormous operational excellence measures to thrive their success. Hence cognitive leadership is important driving force that influences the organizational success through the human capital. This research endeavors to study such cognitive leadership attempts in anticipating the vulnerability, defining and applying various strategies in creation of innovation nurturing environment. An influence of cognitive leadership in influencing the risk mitigation and non-technical innovation strategies is analyzed while examining their impact on the business success within a theoretical lens of socio-cognitive space and capabilities-based view (CBV) of strategic management frameworks using partial least squares (PLS) method of structural equations modelling (SEM).","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"340 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131836123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative analysis on Intrusion Detection system through ML and DL Techniques: Survey 基于ML和DL技术的入侵检测系统的比较分析
C. Sekhar, K. Pavani, M. Rao
Daily, large amounts of data are generated. Unauthorized users should be kept away from the data. Issues and problems arose one after the other as a result of the continuous development of network security. To avoid these malicious attacks, deep learning and machine learning methodologies are frequently used. Machine learning is a branch of the computer field that studies computational algorithms to convert empirical data into usable models. This field originated from the communities of traditional statics and intelligent retrieval. Machine learning includes deep learning as a subset. A system that can be trained to recognise objects using raw input has referred to as a deep learning system. In this study, we are applying DL techniques such as CNN, DNN, LSTM and RNN on NSL-KDD dataset. In this paper, we conduct a comparative analysis of multiple algorithms to determine which model is best for network security based on the network conditions and environment.
每天都会产生大量的数据。未经授权的用户应远离数据。随着网络安全的不断发展,各种问题层出不穷。为了避免这些恶意攻击,深度学习和机器学习方法经常被使用。机器学习是计算机领域的一个分支,它研究将经验数据转换为可用模型的计算算法。该领域起源于传统的静态和智能检索领域。机器学习包括深度学习作为一个子集。一个可以通过训练来识别使用原始输入的物体的系统被称为深度学习系统。在本研究中,我们将CNN、DNN、LSTM和RNN等深度学习技术应用于NSL-KDD数据集。在本文中,我们对多种算法进行比较分析,根据网络条件和环境来确定哪种模型最适合网络安全。
{"title":"Comparative analysis on Intrusion Detection system through ML and DL Techniques: Survey","authors":"C. Sekhar, K. Pavani, M. Rao","doi":"10.1109/iccica52458.2021.9697291","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697291","url":null,"abstract":"Daily, large amounts of data are generated. Unauthorized users should be kept away from the data. Issues and problems arose one after the other as a result of the continuous development of network security. To avoid these malicious attacks, deep learning and machine learning methodologies are frequently used. Machine learning is a branch of the computer field that studies computational algorithms to convert empirical data into usable models. This field originated from the communities of traditional statics and intelligent retrieval. Machine learning includes deep learning as a subset. A system that can be trained to recognise objects using raw input has referred to as a deep learning system. In this study, we are applying DL techniques such as CNN, DNN, LSTM and RNN on NSL-KDD dataset. In this paper, we conduct a comparative analysis of multiple algorithms to determine which model is best for network security based on the network conditions and environment.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning Based Automated Approach To Detect Brain Disease Anomalies 基于机器学习的脑疾病异常自动检测方法
Shatrughan Dubey, Yogadhar Pandey
This paper proposed a new model which isi based oni the classification methods such asi support vector machine neurali network andi optimization methods which isi bi-logically inspired method for the improving the classifier results in the terms ofisome performance parameters such as accuracy, precision, recall etc., here we measure the all performance parameters for the various dataset such as heart patients, liver patients andi cancer patients and improve the rate of classification or resultsi with compare than other existing techniques. The alli patient’s dataset whichi is taken fromitheiuci machine learning repository whichi providei the authentic dataset for the research work and thei simulation software isimatlab. Ini thisi paper our experimental results shows thati theibetter detectioniratei of classification for performance parameters thani other existingi techniques.
本文提出了一种基于支持向量机、神经网络等分类方法和基于双逻辑启发的优化方法的新模型,以提高分类器在准确率、精密度、召回率等方面的性能参数,并对不同数据集(如心脏病患者、与其他现有技术相比,提高了肝癌患者和肝癌患者的分类率或结果。所有患者的数据集取自uci机器学习存储库,为研究工作提供了真实的数据集,他们的模拟软件是imatlab。本文的实验结果表明,该方法对性能参数分类的检测效果优于现有的其他方法。
{"title":"Machine Learning Based Automated Approach To Detect Brain Disease Anomalies","authors":"Shatrughan Dubey, Yogadhar Pandey","doi":"10.1109/iccica52458.2021.9697122","DOIUrl":"https://doi.org/10.1109/iccica52458.2021.9697122","url":null,"abstract":"This paper proposed a new model which isi based oni the classification methods such asi support vector machine neurali network andi optimization methods which isi bi-logically inspired method for the improving the classifier results in the terms ofisome performance parameters such as accuracy, precision, recall etc., here we measure the all performance parameters for the various dataset such as heart patients, liver patients andi cancer patients and improve the rate of classification or resultsi with compare than other existing techniques. The alli patient’s dataset whichi is taken fromitheiuci machine learning repository whichi providei the authentic dataset for the research work and thei simulation software isimatlab. Ini thisi paper our experimental results shows thati theibetter detectioniratei of classification for performance parameters thani other existingi techniques.","PeriodicalId":327193,"journal":{"name":"2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131663763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Computational Intelligence and Computing Applications (ICCICA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1