首页 > 最新文献

2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)最新文献

英文 中文
Snake-Stega: A snake game-based steganography scheme snake - stega:基于蛇类游戏的隐写机制
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10177024
Susmita Mahato
When two people want to communicate secretly, they can use steganography, which entails hiding the message within a seemingly innocuous medium. This research proposes a novel approach to encrypt hidden data in the famous Snake game, which is available online. The method builds a stego-snake game resembling online snake games with several information-concealing features. This paper primarily focuses on hiding messages in the snakes' food grid, followed by a simulation of a stego-snake game with an embedded message.
当两个人想要秘密交流时,他们可以使用隐写术,这需要将信息隐藏在看似无害的媒介中。这项研究提出了一种新的方法来加密在著名的蛇游戏中隐藏的数据,这是可以在网上获得的。该方法构建了一个类似于网络蛇类游戏的剑蛇游戏,并具有若干信息隐藏特征。本文主要关注在蛇的食物网格中隐藏信息,然后模拟带有嵌入信息的stego-snake游戏。
{"title":"Snake-Stega: A snake game-based steganography scheme","authors":"Susmita Mahato","doi":"10.1109/ICSCCC58608.2023.10177024","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10177024","url":null,"abstract":"When two people want to communicate secretly, they can use steganography, which entails hiding the message within a seemingly innocuous medium. This research proposes a novel approach to encrypt hidden data in the famous Snake game, which is available online. The method builds a stego-snake game resembling online snake games with several information-concealing features. This paper primarily focuses on hiding messages in the snakes' food grid, followed by a simulation of a stego-snake game with an embedded message.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115466369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependency analysis of various factors and ML models related to Fertilizer Recommendation 肥料推荐相关因素及ML模型的相关性分析
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176974
S. Vaishnavi, Nandikaa Shanmugam, Galla Kiran, A. Priyadharshini
Adopting the same fertilizer gives minimum yield to the farmers as soil properties have changed drastically due to the change in environmental condition. In literature, different algorithmic analysis has been carried out to predict the fertilizer considering various factors, however, there is a gap in identifying every possible factor relevant to fertilizer recommendation. Hence, in our proposed work, we have utilized various soil and environmental factors like Nitrogen, Phosphorus and Potassium values, humidity, rainfall, weather condition and performed a dependency analysis of these factors to give a more accurate fertilizer prediction so as to enhance the crop yield. Algorithms such as Random Forest, Decision Tree, Support Vector Machine (SVM), Naïve Bayes (NB) and Logistic Regression (LR) have been explored to study the suitability of these algorithms in fertilizer prediction. The presented algorithms are compared based on the performance metrics such as accuracy, F1 score, Recall and precision. It is found that, among other algorithms, SVM performed better with maximum accuracy of 97% when all the factors are taken into account.
由于环境条件的变化,土壤性质发生了巨大的变化,因此采用相同的肥料只能使农民获得最低的产量。在文献中,已经进行了不同的算法分析来考虑各种因素来预测肥料,但是在识别每个可能与肥料推荐相关的因素方面存在差距。因此,在我们提出的工作中,我们利用氮、磷、钾值、湿度、降雨量、天气条件等各种土壤和环境因子,并对这些因子进行相关性分析,以更准确地预测肥料,从而提高作物产量。研究了随机森林(Random Forest)、决策树(Decision Tree)、支持向量机(Support Vector Machine, SVM)、Naïve贝叶斯(Bayes, NB)和逻辑回归(Logistic Regression, LR)等算法在肥料预测中的适用性。基于准确率、F1分数、召回率和精度等性能指标对提出的算法进行了比较。研究发现,在其他算法中,当考虑到所有因素时,SVM的准确率最高可达97%。
{"title":"Dependency analysis of various factors and ML models related to Fertilizer Recommendation","authors":"S. Vaishnavi, Nandikaa Shanmugam, Galla Kiran, A. Priyadharshini","doi":"10.1109/ICSCCC58608.2023.10176974","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176974","url":null,"abstract":"Adopting the same fertilizer gives minimum yield to the farmers as soil properties have changed drastically due to the change in environmental condition. In literature, different algorithmic analysis has been carried out to predict the fertilizer considering various factors, however, there is a gap in identifying every possible factor relevant to fertilizer recommendation. Hence, in our proposed work, we have utilized various soil and environmental factors like Nitrogen, Phosphorus and Potassium values, humidity, rainfall, weather condition and performed a dependency analysis of these factors to give a more accurate fertilizer prediction so as to enhance the crop yield. Algorithms such as Random Forest, Decision Tree, Support Vector Machine (SVM), Naïve Bayes (NB) and Logistic Regression (LR) have been explored to study the suitability of these algorithms in fertilizer prediction. The presented algorithms are compared based on the performance metrics such as accuracy, F1 score, Recall and precision. It is found that, among other algorithms, SVM performed better with maximum accuracy of 97% when all the factors are taken into account.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121045722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzified Contrast Enhancement and Segmentation For Nearly Invisible Images 模糊对比度增强与近不可见图像分割
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176516
Zaheeruddin Syed, Kanneboina Siddhartha, Thota Rahul, Aragonda Sneha, Ellandala Jhansi, K. Suganthi
Any computer vision application must first improve a picture before continuing to process it color details losses during the enhancement process is a prevalent issue with most current techniques when applied to photographs that are essentially unnoticeable the qualitatively undetectable image should be improved while maintaining its freshness and coloring. Histogram equalization, a traditional approach of contrast enhancement, resulting in more than enhancement of something like the picture, particularly one with poorer resolution. The objective of this research is to develop an innovative fuzzy inference system capable of enhancing the contrast of low-resolution photos while simultaneously addressing any existing limitations, existing techniques and segmenting the tumor in MRI images. The outcomes from the two methods are contrasted. Throughout this research, the technique results in a very tiny change in intensity value while maintaining the image's information about color and brightness. The method enhances striking contrast while preserving naturalness without introducing any artefacts. Active contour processing on these photos produces extremely accurate segmentation results. Mainly this is used to detect the tumor in MRI images with some basic morphological operations.
任何计算机视觉应用程序都必须首先改善图像,然后再继续处理它,在增强过程中,颜色细节损失是大多数当前技术普遍存在的问题,当应用于本质上不可注意的照片时,在质量上不可检测的图像应该得到改善,同时保持其新鲜度和色彩。直方图均衡化,一种传统的对比度增强方法,其结果不仅仅是图像的增强,尤其是分辨率较差的图像。本研究的目的是开发一种创新的模糊推理系统,能够增强低分辨率照片的对比度,同时解决任何现有的限制,现有的技术和分割MRI图像中的肿瘤。对比了两种方法的结果。在整个研究过程中,该技术在保持图像的颜色和亮度信息的同时,导致强度值发生非常微小的变化。该方法在不引入任何人工制品的情况下,在保持自然的同时增强了鲜明的对比度。主动轮廓处理这些照片产生非常准确的分割结果。主要是通过一些基本的形态学操作来检测MRI图像中的肿瘤。
{"title":"Fuzzified Contrast Enhancement and Segmentation For Nearly Invisible Images","authors":"Zaheeruddin Syed, Kanneboina Siddhartha, Thota Rahul, Aragonda Sneha, Ellandala Jhansi, K. Suganthi","doi":"10.1109/ICSCCC58608.2023.10176516","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176516","url":null,"abstract":"Any computer vision application must first improve a picture before continuing to process it color details losses during the enhancement process is a prevalent issue with most current techniques when applied to photographs that are essentially unnoticeable the qualitatively undetectable image should be improved while maintaining its freshness and coloring. Histogram equalization, a traditional approach of contrast enhancement, resulting in more than enhancement of something like the picture, particularly one with poorer resolution. The objective of this research is to develop an innovative fuzzy inference system capable of enhancing the contrast of low-resolution photos while simultaneously addressing any existing limitations, existing techniques and segmenting the tumor in MRI images. The outcomes from the two methods are contrasted. Throughout this research, the technique results in a very tiny change in intensity value while maintaining the image's information about color and brightness. The method enhances striking contrast while preserving naturalness without introducing any artefacts. Active contour processing on these photos produces extremely accurate segmentation results. Mainly this is used to detect the tumor in MRI images with some basic morphological operations.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122389013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multilevel Face Mask Detection System using Ensemble based Convolution Neural Network 基于集成卷积神经网络的多层人脸检测系统
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176502
V. K. Gupta, Avdhesh Gupta, Vikas Tyagi, Priyank Pandey, Richa Gupta, D. Kumar
Due to COVID outbreak face mask detection in the industry as well as in any gathering playing an important role. Either person worn facemask or not worn. In this CORONA situation, Use of a face mask is one such preventative that is crucial. Facial recognition technologies are now used by many businesses and organizations for their own general purposes. We are all aware of how important it has become to always wear a mask when we travel. However, as we all know, it is impossible to monitor who is wearing a mask and who is not. If some person who worn the mask, then it is not confirmed whether he/she worn it correctly or not. We make the use of AI in our daily life. We achieve this with the help of a deep learning, where we train the model using various convolution neural network approaches and created a hybrid model using bagging-based ensemble learning. Here, detection is performed based on voting-based classification so that we can enhance the accuracy of our model. We have found dataset from MAFA and Kaggle. The hybrid approach of C2N model achieved exceptional accuracy with the use of a dataset of face mask detection that contains both with and without face mask photographs. In our multilevel facemask detection system at the first level our model will predict whether the person worn facemask or not and at its second level it will predict the correctness of facemask, whether it is worn correct or not.
由于新冠疫情的爆发,口罩检测在行业以及任何聚会中都发挥着重要作用。佩戴口罩或未佩戴口罩。在这种冠状病毒的情况下,使用口罩是一种至关重要的预防措施。面部识别技术现在被许多企业和组织用于他们自己的一般目的。我们都知道旅行时戴口罩是多么重要。然而,我们都知道,谁戴口罩,谁不戴口罩是不可能监控的。如果有人戴了口罩,那么就不能确认他/她是否戴对了。我们在日常生活中使用人工智能。我们在深度学习的帮助下实现了这一点,在深度学习中,我们使用各种卷积神经网络方法训练模型,并使用基于bagging的集成学习创建混合模型。在这里,检测是基于基于投票的分类执行的,这样我们可以提高模型的准确性。我们找到了MAFA和Kaggle的数据集。C2N模型的混合方法通过使用包含带和不带面罩照片的面罩检测数据集实现了卓越的准确性。在我们的多级口罩检测系统中,我们的模型将在第一级预测该人是否佩戴口罩,在第二级预测口罩的正确性,是否佩戴正确。
{"title":"Multilevel Face Mask Detection System using Ensemble based Convolution Neural Network","authors":"V. K. Gupta, Avdhesh Gupta, Vikas Tyagi, Priyank Pandey, Richa Gupta, D. Kumar","doi":"10.1109/ICSCCC58608.2023.10176502","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176502","url":null,"abstract":"Due to COVID outbreak face mask detection in the industry as well as in any gathering playing an important role. Either person worn facemask or not worn. In this CORONA situation, Use of a face mask is one such preventative that is crucial. Facial recognition technologies are now used by many businesses and organizations for their own general purposes. We are all aware of how important it has become to always wear a mask when we travel. However, as we all know, it is impossible to monitor who is wearing a mask and who is not. If some person who worn the mask, then it is not confirmed whether he/she worn it correctly or not. We make the use of AI in our daily life. We achieve this with the help of a deep learning, where we train the model using various convolution neural network approaches and created a hybrid model using bagging-based ensemble learning. Here, detection is performed based on voting-based classification so that we can enhance the accuracy of our model. We have found dataset from MAFA and Kaggle. The hybrid approach of C2N model achieved exceptional accuracy with the use of a dataset of face mask detection that contains both with and without face mask photographs. In our multilevel facemask detection system at the first level our model will predict whether the person worn facemask or not and at its second level it will predict the correctness of facemask, whether it is worn correct or not.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129583817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Attack Simulation and Detection in Digital Substation 数字化变电站网络攻击仿真与检测
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176955
Doney Abraham, Sule YAYILGAN YILDIRIM, Filip Holík, S. Acevedo, Alemayehu Gebremedhin
Transforming electrical grids into digital systems has brought many advantages, but it has also introduced new vulnerabilities that cyber attackers can exploit. Therefore, early detection of these attacks is crucial to minimize the impact on power grid operations. This paper presents the results of our investigation into the simulation and detection of cyber attacks in digital substations. Our study focuses on comparing multiple machine learning algorithms for detecting replay attacks and false data injections. The results of our study show that the best model for replay attack detection is the Logistic Regression with an accuracy of 94%. On the other hand, for false data injection detection, multiple models show high precision, recall, F1-score, and accuracy, with the best model in terms of computation time being Support Vector Machine. Our findings provide valuable insights into using machine learning algorithms to simulate and detect cyber attacks in digital substations.
将电网转变为数字系统带来了许多优势,但也带来了网络攻击者可以利用的新漏洞。因此,及早发现这些攻击对于减少对电网运行的影响至关重要。本文介绍了我们对数字变电站网络攻击的模拟和检测的研究结果。我们的研究重点是比较用于检测重放攻击和虚假数据注入的多种机器学习算法。我们的研究结果表明,重放攻击检测的最佳模型是逻辑回归,准确率为94%。另一方面,对于假数据注入检测,多个模型显示出较高的精度、召回率、f1分数和准确性,其中在计算时间方面最好的模型是支持向量机。我们的研究结果为使用机器学习算法模拟和检测数字变电站的网络攻击提供了有价值的见解。
{"title":"Cyber Attack Simulation and Detection in Digital Substation","authors":"Doney Abraham, Sule YAYILGAN YILDIRIM, Filip Holík, S. Acevedo, Alemayehu Gebremedhin","doi":"10.1109/ICSCCC58608.2023.10176955","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176955","url":null,"abstract":"Transforming electrical grids into digital systems has brought many advantages, but it has also introduced new vulnerabilities that cyber attackers can exploit. Therefore, early detection of these attacks is crucial to minimize the impact on power grid operations. This paper presents the results of our investigation into the simulation and detection of cyber attacks in digital substations. Our study focuses on comparing multiple machine learning algorithms for detecting replay attacks and false data injections. The results of our study show that the best model for replay attack detection is the Logistic Regression with an accuracy of 94%. On the other hand, for false data injection detection, multiple models show high precision, recall, F1-score, and accuracy, with the best model in terms of computation time being Support Vector Machine. Our findings provide valuable insights into using machine learning algorithms to simulate and detect cyber attacks in digital substations.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129923008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic Data Structure in smart agriculture 智能农业中的概率数据结构
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176985
Gourav Singhal, Amritpal Singh
In the modern world, the use of IoT devices and emerging technologies are contributing to a daily escalation in data generation. Numerous novel approaches are arising to handle such copious amounts of data. The utilization of this data in making decisions related to agriculture, combined with the integration of smart agriculture techniques, can enhance the conventional agricultural system. Smart agriculture relies heavily on the seamless integration and coordination of various devices. Data retrieval, storage, and analysis are some of the crucial tasks in this field. Data security, privacy, real-time decision-making, and semi-structured and unstructured data are some of the challenges and limitations of using traditional approaches when dealing with a high amount of generated data. For handling data and getting a real-time response in smart agriculture Probabilistic Data Structures (PDS) are used as an effective and efficient solution for various applications. Providing a thorough analysis of how PDS applications are utilized in the realm of smart agriculture is the main objective of this paper. This study takes an in-depth look into the important area of smart agriculture, examining its inception, obstacles, areas of research that require further exploration, and possible future paths. This paper aims to provide a comprehensive examination of PDS in smart agriculture, catering to readers and researchers who seek to expand their knowledge in this area. Additionally, this paper aims to identify potential research opportunities within this field.
在现代世界,物联网设备和新兴技术的使用正在促进数据生成的日常升级。为了处理如此大量的数据,出现了许多新颖的方法。利用这些数据做出与农业相关的决策,结合智能农业技术的整合,可以增强传统农业系统。智能农业在很大程度上依赖于各种设备的无缝集成和协调。数据检索、存储和分析是该领域的一些关键任务。数据安全、隐私、实时决策以及半结构化和非结构化数据是在处理大量生成数据时使用传统方法的一些挑战和限制。对于智能农业中的数据处理和实时响应,概率数据结构(PDS)是一种有效且高效的解决方案。本文的主要目的是全面分析PDS应用程序在智能农业领域的应用情况。本研究深入研究了智能农业的重要领域,研究了它的起源、障碍、需要进一步探索的研究领域以及可能的未来路径。本文旨在提供智能农业中PDS的全面检查,以迎合寻求扩大其在该领域知识的读者和研究人员。此外,本文旨在确定该领域的潜在研究机会。
{"title":"Probabilistic Data Structure in smart agriculture","authors":"Gourav Singhal, Amritpal Singh","doi":"10.1109/ICSCCC58608.2023.10176985","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176985","url":null,"abstract":"In the modern world, the use of IoT devices and emerging technologies are contributing to a daily escalation in data generation. Numerous novel approaches are arising to handle such copious amounts of data. The utilization of this data in making decisions related to agriculture, combined with the integration of smart agriculture techniques, can enhance the conventional agricultural system. Smart agriculture relies heavily on the seamless integration and coordination of various devices. Data retrieval, storage, and analysis are some of the crucial tasks in this field. Data security, privacy, real-time decision-making, and semi-structured and unstructured data are some of the challenges and limitations of using traditional approaches when dealing with a high amount of generated data. For handling data and getting a real-time response in smart agriculture Probabilistic Data Structures (PDS) are used as an effective and efficient solution for various applications. Providing a thorough analysis of how PDS applications are utilized in the realm of smart agriculture is the main objective of this paper. This study takes an in-depth look into the important area of smart agriculture, examining its inception, obstacles, areas of research that require further exploration, and possible future paths. This paper aims to provide a comprehensive examination of PDS in smart agriculture, catering to readers and researchers who seek to expand their knowledge in this area. Additionally, this paper aims to identify potential research opportunities within this field.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129270235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolution Neural Network for Facial Kinship Verification 基于卷积神经网络的面部亲属关系验证
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176509
Kusum, Vijay Kumar
The process of detecting whether two people in a given pair of face pictures are biologically related or not is known as facial kinship verification. Deep learning-based techniques, in particular Convolutional Neural Networks (CNNs), have excelled at this challenge in recent years. In this article, we will compare a number of pre-trained CNN models and hybrid models to one another. Also, try to check performance by ensembling these models. The models are trained on the large-scale KinFaceW-I dataset and evaluated on the KinFaceW- II dataset, achieving state-of-the-art performance. In order to evaluate the performance, we have made our new dataset similar to the KinFaceW dataset. Additionally, our technique exhibits resilience to a variety of facial variables, including alterations in age, posture, and expression. Overall, can get a potential answer to the problem of facial kinship verification, which is crucial in numerous disciplines such as forensic investigation, family history research, and social media analysis. At last paper identified a ensembled or single models which work well on KinFace dataset and new dataset introduced by this paper.
检测两个人在给定的一对面部照片中是否有生物学上的关系的过程被称为面部亲属关系验证。近年来,基于深度学习的技术,特别是卷积神经网络(cnn),在这一挑战上表现出色。在本文中,我们将比较一些预训练的CNN模型和混合模型。此外,尝试通过集成这些模型来检查性能。这些模型在大规模的KinFaceW- i数据集上进行训练,并在KinFaceW- II数据集上进行评估,实现了最先进的性能。为了评估性能,我们使我们的新数据集类似于KinFaceW数据集。此外,我们的技术显示出对各种面部变量的弹性,包括年龄、姿势和表情的变化。总的来说,可以得到面部亲属关系验证问题的潜在答案,这在法医调查、家族史研究和社交媒体分析等众多学科中至关重要。最后,本文确定了在KinFace数据集和本文引入的新数据集上运行良好的集成或单个模型。
{"title":"Convolution Neural Network for Facial Kinship Verification","authors":"Kusum, Vijay Kumar","doi":"10.1109/ICSCCC58608.2023.10176509","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176509","url":null,"abstract":"The process of detecting whether two people in a given pair of face pictures are biologically related or not is known as facial kinship verification. Deep learning-based techniques, in particular Convolutional Neural Networks (CNNs), have excelled at this challenge in recent years. In this article, we will compare a number of pre-trained CNN models and hybrid models to one another. Also, try to check performance by ensembling these models. The models are trained on the large-scale KinFaceW-I dataset and evaluated on the KinFaceW- II dataset, achieving state-of-the-art performance. In order to evaluate the performance, we have made our new dataset similar to the KinFaceW dataset. Additionally, our technique exhibits resilience to a variety of facial variables, including alterations in age, posture, and expression. Overall, can get a potential answer to the problem of facial kinship verification, which is crucial in numerous disciplines such as forensic investigation, family history research, and social media analysis. At last paper identified a ensembled or single models which work well on KinFace dataset and new dataset introduced by this paper.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124108514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Pneumonia Cases from X-ray Chest Images using Deep Learning Based on Transfer Learning CNN and Hyperparameter Optimization 基于迁移学习CNN和超参数优化的x线胸片肺炎病例深度学习检测
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176853
S. Agrawal, Pragati Agrawal
Pneumonia is a viral infection affecting many people, especially in underdeveloped and impoverished nations where contaminated, crowded, and unhygienic living conditions are common and inadequate healthcare infrastructures. Recognizing pneumonia immediately is a challenging step that can increase survival odds and allow for early-stage treatment. The successful construction of prediction models makes use of the artificial intelligence discipline of deep learning. There are many approaches to identifying pneumonia, including CT scans, pulse oximetry, and many others, but X-ray tomography is the most popular method. However, reviewing chest X-rays (CXR) is difficult and vulnerable to subjectivity variations. Using x-ray chest images, this study suggests a novel deep learning-based architecture for the quick diagnosis of covid-19 and pneumonia cases. As our basic model, we use the CNN transfer learning models VGG16, ResNet50, and InceptionV3. To adjust the hyperparameters of our model, we use random search optimization approach.
肺炎是一种影响许多人的病毒感染,特别是在不发达和贫困国家,在这些国家,污染、拥挤和不卫生的生活条件是常见的,卫生保健基础设施不足。立即识别肺炎是一个具有挑战性的步骤,可以增加生存几率并允许早期治疗。预测模型的成功构建利用了深度学习这一人工智能学科。有许多方法可以识别肺炎,包括CT扫描、脉搏血氧仪等,但x射线断层扫描是最常用的方法。然而,检查胸部x光片(CXR)是困难的,容易受到主观性变化的影响。利用x射线胸部图像,本研究提出了一种新的基于深度学习的架构,用于快速诊断covid-19和肺炎病例。我们使用CNN迁移学习模型VGG16、ResNet50和InceptionV3作为基本模型。为了调整模型的超参数,我们使用了随机搜索优化方法。
{"title":"Detection of Pneumonia Cases from X-ray Chest Images using Deep Learning Based on Transfer Learning CNN and Hyperparameter Optimization","authors":"S. Agrawal, Pragati Agrawal","doi":"10.1109/ICSCCC58608.2023.10176853","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176853","url":null,"abstract":"Pneumonia is a viral infection affecting many people, especially in underdeveloped and impoverished nations where contaminated, crowded, and unhygienic living conditions are common and inadequate healthcare infrastructures. Recognizing pneumonia immediately is a challenging step that can increase survival odds and allow for early-stage treatment. The successful construction of prediction models makes use of the artificial intelligence discipline of deep learning. There are many approaches to identifying pneumonia, including CT scans, pulse oximetry, and many others, but X-ray tomography is the most popular method. However, reviewing chest X-rays (CXR) is difficult and vulnerable to subjectivity variations. Using x-ray chest images, this study suggests a novel deep learning-based architecture for the quick diagnosis of covid-19 and pneumonia cases. As our basic model, we use the CNN transfer learning models VGG16, ResNet50, and InceptionV3. To adjust the hyperparameters of our model, we use random search optimization approach.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128078227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Precision Agriculture: Crop Image Segmentation and Loss Evaluation through Drone Surveillance 精准农业:无人机监控作物图像分割与损失评估
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176980
P. Patidar, D. Tomar, R. Pateriya, Y. K. Sharma
Agriculture is the most important source of livelihood. Crop segmentation has become an important role in precision agriculture which helps farmers to make decisions about crop damage and its production. However, it's a challenging task to achieve precision in the agriculture field. Drone Surveillance helps to achieve that crop yield assessment, crop damage, crop health, and other parameters. This paper focuses on image segmentation of crops, classified into categories like sparse and dense crops with the multitemporal data image taken by Drone. This model proposed and studied shows the loss percentage in crop identification by image segmentation process, it helps farmers to get good compensation for crops to survey through Drone (UAV) techniques. A detailed analysis with outcome of thisis explained further.
农业是最重要的民生来源。作物分割在精准农业中发挥着重要的作用,它可以帮助农民对作物的损害和产量进行决策。然而,在农业领域实现精准化是一项具有挑战性的任务。无人机监视有助于实现作物产量评估、作物损害、作物健康和其他参数。本文主要对农作物进行图像分割,利用无人机拍摄的多时相数据图像,将农作物分为稀疏和密集两类。提出并研究的模型显示了图像分割过程中作物识别的损失百分比,帮助农民通过无人机(UAV)技术对作物进行调查,获得良好的补偿。并对结果进行了详细的分析。
{"title":"Precision Agriculture: Crop Image Segmentation and Loss Evaluation through Drone Surveillance","authors":"P. Patidar, D. Tomar, R. Pateriya, Y. K. Sharma","doi":"10.1109/ICSCCC58608.2023.10176980","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176980","url":null,"abstract":"Agriculture is the most important source of livelihood. Crop segmentation has become an important role in precision agriculture which helps farmers to make decisions about crop damage and its production. However, it's a challenging task to achieve precision in the agriculture field. Drone Surveillance helps to achieve that crop yield assessment, crop damage, crop health, and other parameters. This paper focuses on image segmentation of crops, classified into categories like sparse and dense crops with the multitemporal data image taken by Drone. This model proposed and studied shows the loss percentage in crop identification by image segmentation process, it helps farmers to get good compensation for crops to survey through Drone (UAV) techniques. A detailed analysis with outcome of thisis explained further.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125638287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion Detection Techniques For Security and Privacy of 6G Applications 6G应用的安全与隐私入侵检测技术
Pub Date : 2023-05-26 DOI: 10.1109/ICSCCC58608.2023.10176740
Priya Kohli, Sachin Sharma, Priya Matta
With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.
6G是一项新兴技术,具有极高的速度、高计算成本和巨大的需求。由于无线和动态,它存在安全和隐私问题。合法注册的车辆及其驾驶员的实时数据可能会因未经授权入侵完全连接的网络上的节点而遭到破坏。这种行为可能会降低网络速度或危及其可靠性。描述了与许多流行的算法和策略有关的跨网络节点的未经授权的入侵。随着对即将开展的工作的讨论,对先前提供的方法进行了比较检查。
{"title":"Intrusion Detection Techniques For Security and Privacy of 6G Applications","authors":"Priya Kohli, Sachin Sharma, Priya Matta","doi":"10.1109/ICSCCC58608.2023.10176740","DOIUrl":"https://doi.org/10.1109/ICSCCC58608.2023.10176740","url":null,"abstract":"With its extraordinarily high speed, high computational cost, and significant requirement, 6G is an emerging technology. It has security and privacy issues as a result of being wireless and dynamic. Real-time data about legally registered cars and their drivers can be compromised by an unauthorized intrusion into a node over a fully connected network. Such actions could slow down the network or jeopardize its reliability. The unauthorized invasion of a node across a network is described in relation to many popular algorithms and strategies. Regressive along with the discussion of upcoming work, comparative examination of previously offered methodologies is conducted.","PeriodicalId":359466,"journal":{"name":"2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-05-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122262067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1