首页 > 最新文献

2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)最新文献

英文 中文
Human Action Recognition: A Review 人类行为识别:综述
Anju Latha Nair S., R. K. Megalingam
Human Action Recognition is a challenging problem in the field of machine vision. It finds diverse application in a range of fields, whether it be in care of elderlies, or in sports, movies, interactive gaming and other areas. Videos from various sources need to be labelled so that an awareness on what exactly a person is doing can be recognized. Human Action recognition, in its primitive form can be thought of as a combination of three processes, feature extraction, classification on the basis of the extracted features and finally, recognition of actions. The action labels are a solution to many challenges like surveillance, video retrieval and health care problems. Processing the data online is of great help in automatic surveillance in hospitals, malls, sports galleries, homes with patients
人体动作识别是机器视觉领域的一个具有挑战性的问题。它在许多领域都有广泛的应用,无论是老年人护理,还是体育、电影、互动游戏等领域。来自不同来源的视频需要贴上标签,这样才能意识到一个人到底在做什么。人类行为识别,在其原始形式可以被认为是三个过程的组合,特征提取,基于提取的特征进行分类,最后是动作识别。动作标签是许多挑战的解决方案,如监控、视频检索和医疗保健问题。在线处理数据对医院、商场、体育馆、病人家中的自动监控有很大帮助
{"title":"Human Action Recognition: A Review","authors":"Anju Latha Nair S., R. K. Megalingam","doi":"10.1109/SMART52563.2021.9676211","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676211","url":null,"abstract":"Human Action Recognition is a challenging problem in the field of machine vision. It finds diverse application in a range of fields, whether it be in care of elderlies, or in sports, movies, interactive gaming and other areas. Videos from various sources need to be labelled so that an awareness on what exactly a person is doing can be recognized. Human Action recognition, in its primitive form can be thought of as a combination of three processes, feature extraction, classification on the basis of the extracted features and finally, recognition of actions. The action labels are a solution to many challenges like surveillance, video retrieval and health care problems. Processing the data online is of great help in automatic surveillance in hospitals, malls, sports galleries, homes with patients","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131840634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Face Recognition using Convolutional Neural Network in Machine Learning 机器学习中使用卷积神经网络的人脸识别
R. Shukla, A. Sengar, Anurag Gupta, Arpit Jain, Abhilash Kumar, N. Vishnoi
Our sense of ourselves is inextricably linked to our looks. It’s required for everyday interactions, communication, and other routine duties. Face recognition algorithms that are both durable and perfect are required to construct fully automated systems that analyse the data contained in face photographs, and a variety of methodologies are currently being used. Partial facial occlusion is one of the most difficult challenges in face recognition. In real-world applications, face recognition algorithms can recognize faces hidden under masks, scarves, or sunglasses, hands on the face, things carried by a person, or external sources. The outcome, when compared to other existing algorithms, produces the best results. When utilising the suggested dataset, they provide high accuracy and a low loss function. With both trainable and non-trainable parameters, the suggested model performs admirably. The above-average accuracy of 80% indicates a strong performance in facial recognition. Face recognition from video and photos is extremely important.
我们对自己的感觉与我们的外表密不可分。它是日常互动、沟通和其他日常任务所必需的。持久和完美的人脸识别算法需要构建完全自动化的系统来分析人脸照片中包含的数据,目前正在使用各种方法。人脸局部遮挡是人脸识别中最困难的问题之一。在现实世界的应用中,人脸识别算法可以识别隐藏在面具、围巾或太阳镜下的人脸、放在脸上的手、人携带的东西或外部来源。与其他现有算法相比,该结果产生了最好的结果。当使用建议的数据集时,它们提供了高精度和低损失函数。在参数可训练和不可训练的情况下,所建议的模型都表现得很好。高于平均水平的80%的准确率表明它在面部识别方面表现出色。视频和照片中的人脸识别非常重要。
{"title":"Face Recognition using Convolutional Neural Network in Machine Learning","authors":"R. Shukla, A. Sengar, Anurag Gupta, Arpit Jain, Abhilash Kumar, N. Vishnoi","doi":"10.1109/SMART52563.2021.9676308","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676308","url":null,"abstract":"Our sense of ourselves is inextricably linked to our looks. It’s required for everyday interactions, communication, and other routine duties. Face recognition algorithms that are both durable and perfect are required to construct fully automated systems that analyse the data contained in face photographs, and a variety of methodologies are currently being used. Partial facial occlusion is one of the most difficult challenges in face recognition. In real-world applications, face recognition algorithms can recognize faces hidden under masks, scarves, or sunglasses, hands on the face, things carried by a person, or external sources. The outcome, when compared to other existing algorithms, produces the best results. When utilising the suggested dataset, they provide high accuracy and a low loss function. With both trainable and non-trainable parameters, the suggested model performs admirably. The above-average accuracy of 80% indicates a strong performance in facial recognition. Face recognition from video and photos is extremely important.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Penetration Testing Security Tools: A Comparison 渗透测试安全工具:比较
Piyush Anand, Ajay Shankar Singh
Penetration testing (additionally referred as pen testing) is the exercise related to the checking out your PC framework, network or even internet based software aiming to discover vulnerabilities that the aggressor can likewise make the most. The main reason is constantly to peer how secure your very own machine can be or perhaps from the hacker’s point of view, exactly how confident your own machine is now. You have to be capable of look at almost all strategies which can be on the device, regardless of what computer or may be programming they work. This paper offers a top level view of equipment utilized in penetration testing.
渗透测试(也称为渗透测试)是检查你的PC框架、网络甚至基于互联网的软件,旨在发现攻击者同样可以利用的漏洞。主要原因是不断地查看您自己的机器的安全程度,或者从黑客的角度来看,您自己的机器现在究竟有多安全。你必须能够查看设备上的几乎所有策略,不管它们是什么电脑或程序。本文提供了在渗透测试中使用的设备的顶层视图。
{"title":"Penetration Testing Security Tools: A Comparison","authors":"Piyush Anand, Ajay Shankar Singh","doi":"10.1109/SMART52563.2021.9676283","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676283","url":null,"abstract":"Penetration testing (additionally referred as pen testing) is the exercise related to the checking out your PC framework, network or even internet based software aiming to discover vulnerabilities that the aggressor can likewise make the most. The main reason is constantly to peer how secure your very own machine can be or perhaps from the hacker’s point of view, exactly how confident your own machine is now. You have to be capable of look at almost all strategies which can be on the device, regardless of what computer or may be programming they work. This paper offers a top level view of equipment utilized in penetration testing.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132753665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Comprehensive Analysis of Identifying Lung Cancer via Different Machine Learning Approach 不同机器学习方法识别肺癌的综合分析
G. Paliwal, U. Kurmi
Now a day’s lungs are very important body part due to indomitable cancer problem rice in patient. Lung cancer is the most harmful disease in human life. There are many patients, how safer from cancer now a day’s also suffer from covid related problems. In this survey paper discuss the different machine learning approach to disease lung cancer. for the detection of lung cancer. using machine learning first we collection the training data set for testing data set with the help of training of data set we have to learn system learn machine to disease the lung cancer. In this article discuss different machine learning approach for cancer detection using medical image processing (MIP) techniques. Image proceeding’s help to detection the cancer and machine learning technique prediction cell origination. Deep neural network is powerful tool for detection such type of deceases detection. In the review discuss the different techniques and it’s specification.
现在每天肺部都是非常重要的身体部位,因为癌症问题难治难愈。肺癌是人类生命中危害最大的疾病。有很多患者,现在远离癌症有多安全,每天也会遭受与covid相关的问题。在这篇调查论文中讨论了不同的机器学习方法来治疗肺癌。用于肺癌的检测。首先使用机器学习,我们收集训练数据集用于测试数据集,借助数据集的训练,我们必须学习系统学习机器来治疗肺癌。本文讨论了利用医学图像处理(MIP)技术进行癌症检测的不同机器学习方法。图像处理有助于癌症检测和机器学习技术预测细胞起源。深度神经网络是检测此类疾病的有力工具。在综述中讨论了不同的技术及其规范。
{"title":"A Comprehensive Analysis of Identifying Lung Cancer via Different Machine Learning Approach","authors":"G. Paliwal, U. Kurmi","doi":"10.1109/SMART52563.2021.9675304","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9675304","url":null,"abstract":"Now a day’s lungs are very important body part due to indomitable cancer problem rice in patient. Lung cancer is the most harmful disease in human life. There are many patients, how safer from cancer now a day’s also suffer from covid related problems. In this survey paper discuss the different machine learning approach to disease lung cancer. for the detection of lung cancer. using machine learning first we collection the training data set for testing data set with the help of training of data set we have to learn system learn machine to disease the lung cancer. In this article discuss different machine learning approach for cancer detection using medical image processing (MIP) techniques. Image proceeding’s help to detection the cancer and machine learning technique prediction cell origination. Deep neural network is powerful tool for detection such type of deceases detection. In the review discuss the different techniques and it’s specification.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Predicting the Improvement in Academic Performance of the Student 预测学生学业成绩的提高
Hradesh Kumar, D. Ather, Rani Astya
The intention of this paper zeroed in on improving learner performance forecast, considering their own and scholastic exhibition qualities. Because of the unbelievable development in ongoing innovation like online media, it might hinder the understudies from their real track, and this is one reason for the understudies to perform poor in scholarly exercises and it even prompts course nonconformists. Foreseeing understudies’ exhibition will make the student aware of think about their presentation and it allows as to improve their exhibition in future. The dataset utilized for the exploration purposes incorporates information about understudies’ exhibit from the scholastic and other homeroom exercises in the college during the course time., Educational information mining calculations is utilized to foresee the understudy execution which is a module in mechanized keen training frameworks.
本文的目的是在考虑学生自身和学术表现素质的基础上,提高学生的绩效预测。由于网络媒体等不断创新的令人难以置信的发展,它可能会阻碍学生脱离真正的轨道,这也是学生在学术练习中表现不佳甚至导致课程不守规矩的原因之一。预见替补的展示会让学生意识到思考他们的展示,从而使他们在未来的展示中得到改进。用于探索目的的数据集包含了关于学生在课程期间的学术表现和其他课堂练习的信息。利用教育信息挖掘计算来预测替补执行情况,这是机械化训练框架中的一个模块。
{"title":"Predicting the Improvement in Academic Performance of the Student","authors":"Hradesh Kumar, D. Ather, Rani Astya","doi":"10.1109/SMART52563.2021.9676225","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676225","url":null,"abstract":"The intention of this paper zeroed in on improving learner performance forecast, considering their own and scholastic exhibition qualities. Because of the unbelievable development in ongoing innovation like online media, it might hinder the understudies from their real track, and this is one reason for the understudies to perform poor in scholarly exercises and it even prompts course nonconformists. Foreseeing understudies’ exhibition will make the student aware of think about their presentation and it allows as to improve their exhibition in future. The dataset utilized for the exploration purposes incorporates information about understudies’ exhibit from the scholastic and other homeroom exercises in the college during the course time., Educational information mining calculations is utilized to foresee the understudy execution which is a module in mechanized keen training frameworks.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127827642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GUI Docker Implementation: Run Common Graphics User Applications Inside Docker Container GUI Docker实现:在Docker容器内运行通用图形用户应用程序
Sheetal Agarwal, Srishty Jain, Amit Kumar
Docker is a free and open-source container engine created by Docker Inc and distributed under the Apache 2.0 licence in 2013. Containers have a unique place in computing history because of their role in infrastructure virtualization. Containers execute user space on top of the operating system kernel, unlike traditional hypervisor virtualization, which runs one or more independent computers virtually on physical hardware via an intermediate layer. Containers allow a user’s work environment to be divided into several instances. Docker containers are created using application images saved and maintained in Docker hub. The Containers/Apps view shows all of your containers and applications in real time. It lets you to communicate with containers and applications directly from your machine, as well as manage the lifetime of your applications. This paper focus on a user-friendly interface for inspecting, interacting with, and managing Docker objects, such as containers and Docker Compose-based applications.
Docker是一个免费的开源容器引擎,由Docker公司创建,并于2013年在Apache 2.0许可下发布。由于容器在基础设施虚拟化中的作用,它在计算历史中占有独特的地位。容器在操作系统内核之上执行用户空间,这与传统的hypervisor虚拟化不同,后者通过中间层在物理硬件上虚拟地运行一台或多台独立计算机。容器允许将用户的工作环境划分为几个实例。Docker容器是使用在Docker hub中保存和维护的应用程序映像创建的。容器/应用程序视图实时显示所有容器和应用程序。它允许您直接从您的机器与容器和应用程序通信,以及管理应用程序的生命周期。本文重点介绍了一个用户友好的界面,用于检查、交互和管理Docker对象,如容器和基于Docker组合的应用程序。
{"title":"GUI Docker Implementation: Run Common Graphics User Applications Inside Docker Container","authors":"Sheetal Agarwal, Srishty Jain, Amit Kumar","doi":"10.1109/SMART52563.2021.9676270","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676270","url":null,"abstract":"Docker is a free and open-source container engine created by Docker Inc and distributed under the Apache 2.0 licence in 2013. Containers have a unique place in computing history because of their role in infrastructure virtualization. Containers execute user space on top of the operating system kernel, unlike traditional hypervisor virtualization, which runs one or more independent computers virtually on physical hardware via an intermediate layer. Containers allow a user’s work environment to be divided into several instances. Docker containers are created using application images saved and maintained in Docker hub. The Containers/Apps view shows all of your containers and applications in real time. It lets you to communicate with containers and applications directly from your machine, as well as manage the lifetime of your applications. This paper focus on a user-friendly interface for inspecting, interacting with, and managing Docker objects, such as containers and Docker Compose-based applications.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133774088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introspecting Intrusion Detection Systems in Dealing with Security Concerns in Cloud Environment 内省入侵检测系统在处理云环境下的安全问题
Jyoti Snehi, Manish Snehi, A. Bhandari, Vidhu Baggan, Rakesh Ahuja
Cloud computing is one of the most quickly developing computing advances in today’s IT environment. The cloud infrastructure links data and software from different geographically serving locations. In past few years, cloud computing has developed as a contemporary platform for extremely scalable and on-demand delivery. The most difficult challenge has been assuring the network’s reliability. In the cloud, shared pool IT services such as networks, servers, data, software, and utilities are subject to many types of intrusion attacks. Intrusion Detection Systems (IDS) are a form of security that helps to reduce the vulnerabilities of cloud environments. The purpose of this paper is to look into cloud-based intrusion detection systems as well as the techniques that support them. We examined the most recent cloud-based IDS solution implementations and proposed a Network Intrusion detection technology as a solution for cloud-based system security and protection.
云计算是当今IT环境中发展最快的计算技术之一。云基础设施将来自不同地理位置的数据和软件连接起来。在过去的几年中,云计算已经发展成为一个具有高度可伸缩性和按需交付的现代平台。最困难的挑战是保证网络的可靠性。在云中,共享池IT服务(如网络、服务器、数据、软件和实用程序)会受到多种类型的入侵攻击。入侵检测系统(IDS)是一种安全形式,有助于减少云环境的漏洞。本文的目的是研究基于云的入侵检测系统以及支持它们的技术。我们研究了最新的基于云的入侵检测解决方案的实现,并提出了一种网络入侵检测技术作为基于云的系统安全和保护的解决方案。
{"title":"Introspecting Intrusion Detection Systems in Dealing with Security Concerns in Cloud Environment","authors":"Jyoti Snehi, Manish Snehi, A. Bhandari, Vidhu Baggan, Rakesh Ahuja","doi":"10.1109/SMART52563.2021.9676258","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676258","url":null,"abstract":"Cloud computing is one of the most quickly developing computing advances in today’s IT environment. The cloud infrastructure links data and software from different geographically serving locations. In past few years, cloud computing has developed as a contemporary platform for extremely scalable and on-demand delivery. The most difficult challenge has been assuring the network’s reliability. In the cloud, shared pool IT services such as networks, servers, data, software, and utilities are subject to many types of intrusion attacks. Intrusion Detection Systems (IDS) are a form of security that helps to reduce the vulnerabilities of cloud environments. The purpose of this paper is to look into cloud-based intrusion detection systems as well as the techniques that support them. We examined the most recent cloud-based IDS solution implementations and proposed a Network Intrusion detection technology as a solution for cloud-based system security and protection.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124124123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cyber-Bullying Detection in Social Media Platform using Machine Learning 基于机器学习的社交媒体平台网络欺凌检测
Vaibhav Jain, Ashendra Kumar Saxena, A. Senthil, A. Jain, Arpit Jain
Now a day’s our smart gadgets are not only devices but true friends of human-being. Social-Networking, one from them provides us a virtual home far from home, where everyone feels connected even from thousand miles is one of the brighter sides of new era. The dark side of this coin is equally the worst, as this also increases the vulnerability of young people to threatening situations online.This Paper is divided into three main tasks, as a very first task, we explored various forms of Cyber-Crime, reviewed Cyber-Bullying, its forms, methods, effects, and the available recent research to detect and prevent it. Secondly, for the experimental purpose, we have collected data of Twitter’s 35000+ tweets, prepared/wrangled that data to fed it to various smart machine learning algorithms, then applied five important ML algorithms to those tweets for classification and prediction into two main classes ‘offensive’ or ‘non-offensive’. Finally, a comparison has been done among those ML algorithms based on several performance metrics.
如今,我们的智能设备不仅是设备,而且是人类真正的朋友。社交网络为我们提供了一个远离家乡的虚拟家园,在那里,即使千里之外,每个人都感到彼此相连,这是新时代的光明一面之一。这枚硬币的阴暗面同样是最糟糕的,因为这也增加了年轻人在网络威胁情况下的脆弱性。本文分为三个主要任务,作为第一个任务,我们探讨了网络犯罪的各种形式,回顾了网络欺凌,它的形式,方法,影响,以及现有的研究,以检测和预防它。其次,出于实验目的,我们收集了Twitter的35000多条推文的数据,准备/整理这些数据,将其提供给各种智能机器学习算法,然后将五种重要的ML算法应用于这些推文,将其分类和预测为“攻击性”或“非攻击性”两大类。最后,基于几个性能指标对这些机器学习算法进行了比较。
{"title":"Cyber-Bullying Detection in Social Media Platform using Machine Learning","authors":"Vaibhav Jain, Ashendra Kumar Saxena, A. Senthil, A. Jain, Arpit Jain","doi":"10.1109/SMART52563.2021.9676194","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676194","url":null,"abstract":"Now a day’s our smart gadgets are not only devices but true friends of human-being. Social-Networking, one from them provides us a virtual home far from home, where everyone feels connected even from thousand miles is one of the brighter sides of new era. The dark side of this coin is equally the worst, as this also increases the vulnerability of young people to threatening situations online.This Paper is divided into three main tasks, as a very first task, we explored various forms of Cyber-Crime, reviewed Cyber-Bullying, its forms, methods, effects, and the available recent research to detect and prevent it. Secondly, for the experimental purpose, we have collected data of Twitter’s 35000+ tweets, prepared/wrangled that data to fed it to various smart machine learning algorithms, then applied five important ML algorithms to those tweets for classification and prediction into two main classes ‘offensive’ or ‘non-offensive’. Finally, a comparison has been done among those ML algorithms based on several performance metrics.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124151041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Analysis Machine Learning Approach and Model on Hyper Spectral (Sentinel-2) Images for Land Cover Classification: Using SVM 基于SVM的高光谱(Sentinel-2)影像土地覆盖分类分析机器学习方法与模型
Ranjana Sharma, Deepika Pantola, Shankar Dutt Kalony, Ritik Agarwal
The goal of this research study will be to research different machine learning algorithm via context oriented methodology with or without entropy for sub-pixel categorization utilizing Sentinel 2, multi-Spectral data extract reasonably accurate information for different land cover classes. To study the capabilities of Machine Learning Applications for Crop Identification and Use of temporal data information for crop planning in Machine Learning Algorithm this exploration will supportive to check Capability of Red Edge band to consolidate Crop phenology in crop recognizable proof. In this analysis work knowledge classification approach are going to be applied whereas getting ready land use and land covered map victimization for multi-spectral remote sensing knowledge sets (Sentinel-2/ Land sat). The data sets to be used in this research work will be fine spatial resolution data, to ensure classify approaches towards spatial data set and classification.
本研究的目的是研究不同的机器学习算法,通过上下文导向的方法,使用或不使用熵进行亚像素分类,利用Sentinel 2,多光谱数据提取不同土地覆盖类别的合理准确信息。为了研究机器学习应用于作物识别的能力,以及在机器学习算法中使用时间数据信息进行作物规划,该探索将有助于检查红边带在作物识别证明中巩固作物物候的能力。在本分析中,将应用工作知识分类方法,同时为多光谱遥感知识集(Sentinel-2/ land sat)准备土地利用和土地覆盖地图受害。本研究使用的数据集将是精细空间分辨率数据,以确保对空间数据集和分类的分类方法。
{"title":"Analysis Machine Learning Approach and Model on Hyper Spectral (Sentinel-2) Images for Land Cover Classification: Using SVM","authors":"Ranjana Sharma, Deepika Pantola, Shankar Dutt Kalony, Ritik Agarwal","doi":"10.1109/SMART52563.2021.9676331","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9676331","url":null,"abstract":"The goal of this research study will be to research different machine learning algorithm via context oriented methodology with or without entropy for sub-pixel categorization utilizing Sentinel 2, multi-Spectral data extract reasonably accurate information for different land cover classes. To study the capabilities of Machine Learning Applications for Crop Identification and Use of temporal data information for crop planning in Machine Learning Algorithm this exploration will supportive to check Capability of Red Edge band to consolidate Crop phenology in crop recognizable proof. In this analysis work knowledge classification approach are going to be applied whereas getting ready land use and land covered map victimization for multi-spectral remote sensing knowledge sets (Sentinel-2/ Land sat). The data sets to be used in this research work will be fine spatial resolution data, to ensure classify approaches towards spatial data set and classification.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Object-Text Detection and Recognition System 对象文本检测与识别系统
Pervez Shoaib Ilyasi, Gautam Gupta, M. S. Sai, K. Saatwik, B. S. Kumar, Dinesh Vij
The object recognition system based on deep learning has been applied in different domains, e.g. in the Intelligent transportation system, Autonomous driving system, etc. Along with object detection, in numerous scenes, text detection and recognition have conjointly brought abundant attention and analysis application.Real-time object detection and dimensioning as well as text recognition are important topics for many branches of the industry today.The projected system consists of object – text, detection and recognition module, and a dimension measuring module. This system offers an improved method of classifying objects and calculating their measures in real-time from video sequences. The proposed system uses OpenCV libraries, which comprise erosion algorithms, canny edge detection, dilation, and contour detection. To accomplish the task of the text recognition Tesseract OCR engine is employed.
基于深度学习的目标识别系统在智能交通系统、自动驾驶系统等领域得到了广泛的应用。与目标检测一样,在众多的场景中,文本检测和识别也得到了广泛的关注和分析应用。实时对象检测和标注以及文本识别是当今许多行业分支的重要主题。投影系统由目标文本、检测识别模块和尺寸测量模块组成。该系统提供了一种改进的从视频序列中对目标进行实时分类并计算其度量的方法。该系统采用OpenCV库,包括侵蚀算法、边缘检测、扩张和轮廓检测。为了完成文本识别的任务,采用了Tesseract OCR引擎。
{"title":"Object-Text Detection and Recognition System","authors":"Pervez Shoaib Ilyasi, Gautam Gupta, M. S. Sai, K. Saatwik, B. S. Kumar, Dinesh Vij","doi":"10.1109/SMART52563.2021.9675310","DOIUrl":"https://doi.org/10.1109/SMART52563.2021.9675310","url":null,"abstract":"The object recognition system based on deep learning has been applied in different domains, e.g. in the Intelligent transportation system, Autonomous driving system, etc. Along with object detection, in numerous scenes, text detection and recognition have conjointly brought abundant attention and analysis application.Real-time object detection and dimensioning as well as text recognition are important topics for many branches of the industry today.The projected system consists of object – text, detection and recognition module, and a dimension measuring module. This system offers an improved method of classifying objects and calculating their measures in real-time from video sequences. The proposed system uses OpenCV libraries, which comprise erosion algorithms, canny edge detection, dilation, and contour detection. To accomplish the task of the text recognition Tesseract OCR engine is employed.","PeriodicalId":356096,"journal":{"name":"2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)","volume":"176 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114426891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 10th International Conference on System Modeling & Advancement in Research Trends (SMART)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1