首页 > 最新文献

2018 IEEE 8th International Advance Computing Conference (IACC)最新文献

英文 中文
Quality Assurance Practices in Continuous Delivery - an implementation in Big Data Domain 持续交付中的质量保证实践——在大数据领域的实现
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692131
Anish Cheriyan, R. Gondkar, T. Gopal, Suresh Babu S
This paper provides the details about the Quality Assurance practices and techniques to be followed by the QA professional (also called SQA-Software Quality Assurance) in continuous delivery mode of software development. QA professionals are responsible for the process definition, audit, training and other assurance activites in the project. The paper provides a QA model named 'ACID-QA' model which comprises of key practices which can be used by the QA professional in continuous delivery mode of software development. The objective of the 'ACID-QA' model is to provide a working model for the SQA which can be used during the planning, requirement, design, coding, testing, continuous integration, audit and release activities of the project. The paper provides an overview of each of the practice areas of the model in the further sections. This model is implemented in Big Data Hadoop File system and Map Reduce and it is found that the product quality issues found by SQA Professionals are improved by 100%. The audit findings are further detailed down in the paper.
本文提供了在软件开发的持续交付模式中QA专业人员(也称为sqa -软件质量保证)应遵循的质量保证实践和技术的细节。QA专业人员负责项目中的过程定义、审核、培训和其他保证活动。本文提供了一个名为“ACID-QA”的QA模型,该模型包含了QA专业人员在软件开发的持续交付模式中可以使用的关键实践。“ACID-QA”模型的目标是为SQA提供一个可用于项目的计划、需求、设计、编码、测试、持续集成、审核和发布活动的工作模型。本文在后面的部分中提供了该模型的每个实践领域的概述。该模型在大数据Hadoop File system和Map Reduce中实现,发现SQA专业人员发现的产品质量问题提高了100%。审计结果在文件中作了进一步的详细说明。
{"title":"Quality Assurance Practices in Continuous Delivery - an implementation in Big Data Domain","authors":"Anish Cheriyan, R. Gondkar, T. Gopal, Suresh Babu S","doi":"10.1109/IADCC.2018.8692131","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692131","url":null,"abstract":"This paper provides the details about the Quality Assurance practices and techniques to be followed by the QA professional (also called SQA-Software Quality Assurance) in continuous delivery mode of software development. QA professionals are responsible for the process definition, audit, training and other assurance activites in the project. The paper provides a QA model named 'ACID-QA' model which comprises of key practices which can be used by the QA professional in continuous delivery mode of software development. The objective of the 'ACID-QA' model is to provide a working model for the SQA which can be used during the planning, requirement, design, coding, testing, continuous integration, audit and release activities of the project. The paper provides an overview of each of the practice areas of the model in the further sections. This model is implemented in Big Data Hadoop File system and Map Reduce and it is found that the product quality issues found by SQA Professionals are improved by 100%. The audit findings are further detailed down in the paper.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126970439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Analysis of Clustering Algorithm for Facial Recognition System 人脸识别系统聚类算法的比较分析
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692091
S. Jain, Md. Umar Farooque, Vinayak Sharma
A large part of the video surveillance systems involves dealing with face detection techniques on unlabeled faces. We define several classes of faces to detect them from a surveillance footage defined using different clustering algorithms. In this paper, authors have proposed a facial clustering technique for low-resolution facial dataset obtained from video surveillance footage with the help of HAAR cascade classifier. Different models like ResNet 50 and Inception ResNet V2 were used for feature extraction with weights pre-trained on ImageNet Dataset. Further, several combinations of Scaling and calculated Dimensionality Reduction techniques were applied before being fed into clustering algorithms and finally accuracy was calculated on obtained clusters.
很大一部分视频监控系统涉及处理未标记人脸的人脸检测技术。我们定义了几类人脸,以从使用不同聚类算法定义的监控录像中检测它们。本文提出了一种基于HAAR级联分类器的低分辨率视频监控数据集聚类技术。使用不同的模型,如ResNet 50和Inception ResNet V2,在ImageNet Dataset上预训练权值进行特征提取。此外,在将缩放和计算降维技术的几种组合应用于聚类算法之前,最后计算得到的聚类的精度。
{"title":"Comparative Analysis of Clustering Algorithm for Facial Recognition System","authors":"S. Jain, Md. Umar Farooque, Vinayak Sharma","doi":"10.1109/IADCC.2018.8692091","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692091","url":null,"abstract":"A large part of the video surveillance systems involves dealing with face detection techniques on unlabeled faces. We define several classes of faces to detect them from a surveillance footage defined using different clustering algorithms. In this paper, authors have proposed a facial clustering technique for low-resolution facial dataset obtained from video surveillance footage with the help of HAAR cascade classifier. Different models like ResNet 50 and Inception ResNet V2 were used for feature extraction with weights pre-trained on ImageNet Dataset. Further, several combinations of Scaling and calculated Dimensionality Reduction techniques were applied before being fed into clustering algorithms and finally accuracy was calculated on obtained clusters.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125926193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Transfer Learning based CNN approach for Classification of Horticulture plantations using Hyperspectral Images 基于迁移学习的高光谱园艺种植园分类CNN方法
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692142
Priyanka Natrajan, Smruthi Rajmohan, S. Sundaram, S. Natarajan, R. Hebbar
Hyperspectral images (HSIs) are satellite images that provide spectral and spatial detail of a given region. This makes them uniquely suitable to classify objects in the scene. Classification of Hyperspectral images can be efficiently performed using the Convolutional Neural Network (CNN) in Machine Learning. In this research, a framework is proposed that leverages Transfer Learning and CNN to classify crop distributions of Horticulture Plantations. The Hyperspectral dataset consists of images and known labels, also known as groundtruth. However, some of the HSIs are unlabelled due to the lack of groundtruth available for the same. Hence, the proposed method adopts the Transfer Learning technique to overcome this. The model was trained on a publicly available and labelled hyperspectral dataset. This was then tested on the field samples of Chikkaballapur district of Karnataka, India which was provided by the Indian Space Research Organisation (ISRO). The CNN built leverages both the spectral and spatial correlations of the HSIs. Due to the amount of detail in HSIs, they are fed in as patches into the convolutional layers of the network. The diverse information provided by these images is exploited by deploying a three-dimensional kernel. This joint representation of both spectral and spatial information provides higher discriminating power, thus allowing a more accurate classification of the crop distributions in the field. The experimental results of this method prove that feeding images as patches trains the CNN better and applying Transfer Learning has a more generic and wider scope.
高光谱图像(hsi)是提供给定区域的光谱和空间细节的卫星图像。这使得它们非常适合对场景中的物体进行分类。机器学习中的卷积神经网络(CNN)可以有效地对高光谱图像进行分类。在本研究中,提出了一个利用迁移学习和CNN对园艺种植园作物分布进行分类的框架。高光谱数据集由图像和已知标签组成,也称为groundtruth。然而,一些hsi是未标记的,因为缺乏相同的基础真相。因此,本文提出的方法采用迁移学习技术来克服这一问题。该模型是在一个公开可用和标记的高光谱数据集上训练的。然后在印度空间研究组织(ISRO)提供的印度卡纳塔克邦奇卡巴拉普尔地区的实地样本上进行了测试。建立的CNN利用了hsi的光谱和空间相关性。由于hsi中的大量细节,它们作为补丁被馈送到网络的卷积层中。通过部署三维内核,可以利用这些图像提供的各种信息。这种光谱和空间信息的联合表示提供了更高的判别能力,从而可以更准确地对田间作物分布进行分类。该方法的实验结果证明,将图像作为patch馈送能更好地训练CNN,应用迁移学习具有更通用和更广泛的范围。
{"title":"A Transfer Learning based CNN approach for Classification of Horticulture plantations using Hyperspectral Images","authors":"Priyanka Natrajan, Smruthi Rajmohan, S. Sundaram, S. Natarajan, R. Hebbar","doi":"10.1109/IADCC.2018.8692142","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692142","url":null,"abstract":"Hyperspectral images (HSIs) are satellite images that provide spectral and spatial detail of a given region. This makes them uniquely suitable to classify objects in the scene. Classification of Hyperspectral images can be efficiently performed using the Convolutional Neural Network (CNN) in Machine Learning. In this research, a framework is proposed that leverages Transfer Learning and CNN to classify crop distributions of Horticulture Plantations. The Hyperspectral dataset consists of images and known labels, also known as groundtruth. However, some of the HSIs are unlabelled due to the lack of groundtruth available for the same. Hence, the proposed method adopts the Transfer Learning technique to overcome this. The model was trained on a publicly available and labelled hyperspectral dataset. This was then tested on the field samples of Chikkaballapur district of Karnataka, India which was provided by the Indian Space Research Organisation (ISRO). The CNN built leverages both the spectral and spatial correlations of the HSIs. Due to the amount of detail in HSIs, they are fed in as patches into the convolutional layers of the network. The diverse information provided by these images is exploited by deploying a three-dimensional kernel. This joint representation of both spectral and spatial information provides higher discriminating power, thus allowing a more accurate classification of the crop distributions in the field. The experimental results of this method prove that feeding images as patches trains the CNN better and applying Transfer Learning has a more generic and wider scope.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130543907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Real Time Monitoring and Controlling of Water Level in Dams using IoT 利用物联网实时监测和控制大坝水位
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692099
Sai Sreekar Siddula, P. Jain, M. D. Upadhayay
Dams provide us with a wide range of social, economic, environmental benefits by helping us in controlling the flow of water, generating hydroelectric power, flood control, waste management, navigational purposes and act as habitats for aquatic life. India has progressed a lot in the construction of dams and water reservoirs after Independence and now we are among the best dam builders in the world. We have around 4300 dams in India and many more are already under the process of construction. But even today most of these dams use the conventional methods of dam management for controlling the dam gates and dam maintenance. In the current fast paced modern world where we are trying to automate all the processes around us, it’s high time that we revamp the management of our dams using Internet of Things. In this paper we have proposed and implemented a novel idea of automating the process of dam management from collecting the data of water level to control the dam gates. This idea will help us to streamline the control of dams throughout the country and reduce the manpower for dam maintenance.
水坝为我们提供了广泛的社会、经济和环境效益,帮助我们控制水流、发电、防洪、废物管理、导航目的,并作为水生生物的栖息地。独立后,印度在水坝和水库建设方面取得了很大进展,现在我们是世界上最好的水坝建设者之一。印度大约有4300座水坝,还有更多正在建设中。但即使在今天,这些大坝中的大多数仍然使用传统的大坝管理方法来控制大坝闸门和大坝维护。在当今快节奏的现代世界中,我们试图将我们周围的所有流程自动化,现在是我们使用物联网来改造水坝管理的时候了。本文提出并实现了一种从水位数据采集到闸门控制的大坝管理过程自动化的新思路。这个想法将有助于我们在全国范围内简化水坝的管理,减少水坝维护的人力。
{"title":"Real Time Monitoring and Controlling of Water Level in Dams using IoT","authors":"Sai Sreekar Siddula, P. Jain, M. D. Upadhayay","doi":"10.1109/IADCC.2018.8692099","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692099","url":null,"abstract":"Dams provide us with a wide range of social, economic, environmental benefits by helping us in controlling the flow of water, generating hydroelectric power, flood control, waste management, navigational purposes and act as habitats for aquatic life. India has progressed a lot in the construction of dams and water reservoirs after Independence and now we are among the best dam builders in the world. We have around 4300 dams in India and many more are already under the process of construction. But even today most of these dams use the conventional methods of dam management for controlling the dam gates and dam maintenance. In the current fast paced modern world where we are trying to automate all the processes around us, it’s high time that we revamp the management of our dams using Internet of Things. In this paper we have proposed and implemented a novel idea of automating the process of dam management from collecting the data of water level to control the dam gates. This idea will help us to streamline the control of dams throughout the country and reduce the manpower for dam maintenance.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128222042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Efficient Method for text Encryption using Elliptic Curve Cryptography 一种利用椭圆曲线加密的有效文本加密方法
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692087
P. Das, C. Giri
Elliptic curve cryptography (ECC) is an emerging and efficient cryptography technique which can be applied in various fields of application such as sensor network, network security, authentication, signature verification and in the different applications of the internet of things (IOT). ECC is lightweight, efficient and more secure compare to any other public key cryptography. Different methods have been proposed in the literature to convert input message to elliptic curve point but all of them lack in security, scalability and computationally inefficient for large input size. So, a scalable and computationally efficient algorithm is highly required. In this paper, we propose two different algorithms for input message to elliptic curve point conversion which will reduce communication cost and computational cost of encryption and decryption. The experimental result also shows that the proposed algorithms give better performance and best suitable for large size input text compared to any other existing algorithms.
椭圆曲线加密(ECC)是一种新兴的高效加密技术,可应用于传感器网络、网络安全、身份验证、签名验证等各个应用领域以及物联网(IOT)的不同应用中。与任何其他公钥加密相比,ECC轻量级,高效且更安全。文献中提出了各种将输入信息转换为椭圆曲线点的方法,但这些方法都缺乏安全性、可扩展性,并且在大输入规模下计算效率低下。因此,需要一种可扩展且计算效率高的算法。本文提出了两种不同的输入信息到椭圆曲线点的转换算法,以降低通信成本和加解密的计算成本。实验结果还表明,与现有算法相比,该算法具有更好的性能,最适合大尺寸输入文本。
{"title":"An Efficient Method for text Encryption using Elliptic Curve Cryptography","authors":"P. Das, C. Giri","doi":"10.1109/IADCC.2018.8692087","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692087","url":null,"abstract":"Elliptic curve cryptography (ECC) is an emerging and efficient cryptography technique which can be applied in various fields of application such as sensor network, network security, authentication, signature verification and in the different applications of the internet of things (IOT). ECC is lightweight, efficient and more secure compare to any other public key cryptography. Different methods have been proposed in the literature to convert input message to elliptic curve point but all of them lack in security, scalability and computationally inefficient for large input size. So, a scalable and computationally efficient algorithm is highly required. In this paper, we propose two different algorithms for input message to elliptic curve point conversion which will reduce communication cost and computational cost of encryption and decryption. The experimental result also shows that the proposed algorithms give better performance and best suitable for large size input text compared to any other existing algorithms.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128114015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
MIRA : Moment Invariability Analysis of Footprint Features MIRA:足迹特征矩不变性分析
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692109
Riti Kushwaha, N. Nain, Gaurav Singal
Person authentication using footprint is still an abandoned field even though it has physiological and behavioral both types of available features due to unavailibilty of dataset. To examine the credibility of footprint we have collected the footprint dataset. This dataset collection is done in 2 phases. 1) We have collected the 2 footprint samples of each foot from 110 persons and 2) We have collected the 5 footprint sample of each foot from 80 people. The paper scanner is used for the data collection and whole footprint is captured. The collected samples are taken at different orientations and position, sometimes scanner is not aligned and creates noise.To overcome these problem a footprint image requires extensive preprocessing. To make any image invariant to translation and rotation, we use Hu’s 7 moment invariant features. It can efficiently check that an input image belongs to a particular person or not even after translation, scaling and rotation. The probability of translation and scaling is very less in footprint, but slight rotation in foot image is noticeable, which could result in different geometry features for same person. This technique is not suitable for the authentication but it can surely reduce the sample space by rejecting the samples. If the difference of 3rd order moment invariant value of two samples is more then the decided threshold, then samples surely does not belong to the same person. This reduced sample size could be used further in authentication. It reduces the time complexity and computation cost. We tested it on 1320 images with the FMR of 4.52% and FNMR of 5.18%. It leads us to the conclusion that 3rd order of moment is enough to make any image rotation invariant.
使用足迹的身份验证仍然是一个被遗弃的领域,尽管它具有生理和行为两种类型的可用特性,但由于数据集不可用。为了检验足迹的可信度,我们收集了足迹数据集。这个数据集收集分两个阶段完成。1)我们收集了110个人每只脚2个足迹样本。2)我们收集了80个人每只脚5个足迹样本。纸张扫描器用于数据收集,并捕获整个足迹。采集的样品是在不同的方向和位置,有时扫描仪不对齐和产生噪声。为了克服这些问题,足迹图像需要大量的预处理。为了使任意图像不受平移和旋转的影响,我们使用了Hu的7矩不变特征。它可以有效地检查输入图像是否属于特定的人,甚至在平移,缩放和旋转之后。在足迹中,平移和缩放的概率很小,但在脚图像中,轻微的旋转是明显的,这可能导致同一个人的几何特征不同。虽然这种方法不适合用于身份验证,但它可以通过拒绝样本来减小样本空间。如果两个样本的三阶矩不变值之差大于确定的阈值,则样本肯定不属于同一个人。减少的样本量可以进一步用于身份验证。它降低了时间复杂度和计算成本。我们对1320张图像进行了测试,FMR为4.52%,FNMR为5.18%。它使我们得出结论,三阶矩足以使任何图像旋转不变。
{"title":"MIRA : Moment Invariability Analysis of Footprint Features","authors":"Riti Kushwaha, N. Nain, Gaurav Singal","doi":"10.1109/IADCC.2018.8692109","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692109","url":null,"abstract":"Person authentication using footprint is still an abandoned field even though it has physiological and behavioral both types of available features due to unavailibilty of dataset. To examine the credibility of footprint we have collected the footprint dataset. This dataset collection is done in 2 phases. 1) We have collected the 2 footprint samples of each foot from 110 persons and 2) We have collected the 5 footprint sample of each foot from 80 people. The paper scanner is used for the data collection and whole footprint is captured. The collected samples are taken at different orientations and position, sometimes scanner is not aligned and creates noise.To overcome these problem a footprint image requires extensive preprocessing. To make any image invariant to translation and rotation, we use Hu’s 7 moment invariant features. It can efficiently check that an input image belongs to a particular person or not even after translation, scaling and rotation. The probability of translation and scaling is very less in footprint, but slight rotation in foot image is noticeable, which could result in different geometry features for same person. This technique is not suitable for the authentication but it can surely reduce the sample space by rejecting the samples. If the difference of 3rd order moment invariant value of two samples is more then the decided threshold, then samples surely does not belong to the same person. This reduced sample size could be used further in authentication. It reduces the time complexity and computation cost. We tested it on 1320 images with the FMR of 4.52% and FNMR of 5.18%. It leads us to the conclusion that 3rd order of moment is enough to make any image rotation invariant.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127460143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Computer Vision System for Iris Recognition Based on Deep Learning 基于深度学习的虹膜识别计算机视觉系统
Pub Date : 2018-12-01 DOI: 10.1109/IADCC.2018.8692114
Shefali Arora, M. Bhatia
Biometric systems are playing an important role in identifying a person, thus contributing to global security. There are many possible biometrics, for example height, DNA, handwriting etc., but computer vision based biometrics have found an important place in the domain of human identification. Computer vision based biometrics include identification of face, fingerprints, iris etc. and using their abilities to create efficient authentication systems. In this paper, we work on a dataset [1] of iris images and make use of deep learning to identify and verify the iris of a person. Hyperparameter tuning for deep networks and optimization techniques have been taken into account in this system. The proposed system is trained using a combination of Convolutional Neural Networks and Softmax classifier to extract features from localized regions of the input iris images. This is followed by classification into one out of 224 classes of the dataset. From the results, we conclude that the choice of hyperparameters and optimizers affects the efficiency of our proposed system. Our proposed approach outperforms existing approaches by attaining a high accuracy of 98 percent.
生物识别系统在识别个人身份方面发挥着重要作用,从而有助于全球安全。有许多可能的生物识别技术,例如身高、DNA、笔迹等,但基于计算机视觉的生物识别技术已经在人体识别领域找到了重要的位置。基于计算机视觉的生物识别技术包括识别人脸、指纹、虹膜等,并利用它们的能力创建高效的身份验证系统。在本文中,我们处理虹膜图像的数据集[1],并利用深度学习来识别和验证人的虹膜。该系统考虑了深度网络的超参数整定和优化技术。该系统使用卷积神经网络和Softmax分类器的组合训练,从输入虹膜图像的局部区域提取特征。然后从数据集的224个类别中选择一个分类。结果表明,超参数和优化器的选择会影响系统的效率。我们提出的方法优于现有的方法,达到98%的高精度。
{"title":"A Computer Vision System for Iris Recognition Based on Deep Learning","authors":"Shefali Arora, M. Bhatia","doi":"10.1109/IADCC.2018.8692114","DOIUrl":"https://doi.org/10.1109/IADCC.2018.8692114","url":null,"abstract":"Biometric systems are playing an important role in identifying a person, thus contributing to global security. There are many possible biometrics, for example height, DNA, handwriting etc., but computer vision based biometrics have found an important place in the domain of human identification. Computer vision based biometrics include identification of face, fingerprints, iris etc. and using their abilities to create efficient authentication systems. In this paper, we work on a dataset [1] of iris images and make use of deep learning to identify and verify the iris of a person. Hyperparameter tuning for deep networks and optimization techniques have been taken into account in this system. The proposed system is trained using a combination of Convolutional Neural Networks and Softmax classifier to extract features from localized regions of the input iris images. This is followed by classification into one out of 224 classes of the dataset. From the results, we conclude that the choice of hyperparameters and optimizers affects the efficiency of our proposed system. Our proposed approach outperforms existing approaches by attaining a high accuracy of 98 percent.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131157236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Performance measurement and analysis of shooting form of basketball players using a wearable IoT system 基于可穿戴物联网系统的篮球运动员投篮形态测量与分析
Pub Date : 2018-10-01 DOI: 10.1109/CIMCA.2018.8739721
S. Shankar, R. Suresh, Viswanath Talasila, Vinay Sridhar
Rapid advancement in the development of Internet of Things (IoT) based smart wearable devices has motivated us to develop a device which can monitor the performance and analyze the shooting form of basketball players remotely. In this paper, we present the design of a system that can measure and analyze in real time, the free throw shooting action of a professional basketball player. A new heuristic tool has also been developed to analyse every phase of the shooting action to segment out an ideal shooting action of individual players. The developed tool is proven to be more efficient than the conventional k-map clustering approach.
基于物联网(IoT)的智能可穿戴设备的快速发展促使我们开发一种可以远程监控篮球运动员的表现和分析投篮姿势的设备。本文设计了一个能够实时测量和分析职业篮球运动员罚球动作的系统。一种新的启发式工具也被开发出来,用于分析射门动作的每个阶段,以分割出单个球员的理想射门动作。开发的工具被证明比传统的k-map聚类方法更有效。
{"title":"Performance measurement and analysis of shooting form of basketball players using a wearable IoT system","authors":"S. Shankar, R. Suresh, Viswanath Talasila, Vinay Sridhar","doi":"10.1109/CIMCA.2018.8739721","DOIUrl":"https://doi.org/10.1109/CIMCA.2018.8739721","url":null,"abstract":"Rapid advancement in the development of Internet of Things (IoT) based smart wearable devices has motivated us to develop a device which can monitor the performance and analyze the shooting form of basketball players remotely. In this paper, we present the design of a system that can measure and analyze in real time, the free throw shooting action of a professional basketball player. A new heuristic tool has also been developed to analyse every phase of the shooting action to segment out an ideal shooting action of individual players. The developed tool is proven to be more efficient than the conventional k-map clustering approach.","PeriodicalId":365713,"journal":{"name":"2018 IEEE 8th International Advance Computing Conference (IACC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116665115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2018 IEEE 8th International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1