首页 > 最新文献

2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)最新文献

英文 中文
Fuzzy Models for Water Quality Assessment 水质评价的模糊模型
L. Arya, Gms Srivastava
Water is the most abundant substance on the earth and is the principal constituent of all living things. At the present time rising populations and improving living standards are placing increasing pressers on available water resources. In past, fuzzy rationale based methodologies have shown to be fitting to address subjectivity and vulnerability in natural issues. In this examination, an approach dependent on Fuzzy System to survey the quality of water based on limited observations is proposed. A model for water quality with fuzzy reasoning has been developed for drinking and irrigational use. Application of proposed fuzzy model is demonstrated with a case study for Yamuna River, located in India. River water quality fuzzy model based on four water parameters pH, Dissolved Oxygen (DO), Total Dissolved Solids (TDS) & Chemical Oxygen Demand (COD) and two outputs was used to evaluate the Yamuna River quality.
水是地球上最丰富的物质,是所有生物的主要成分。目前,人口的增加和生活水平的提高对现有水资源造成了越来越大的压力。过去,基于模糊理论基础的方法已被证明适合于解决自然问题中的主观性和脆弱性。本文提出了一种基于模糊系统的基于有限观测值的水质调查方法。建立了一种用于饮用和灌溉的水质模糊推理模型。最后以印度亚穆纳河为例,说明了该模糊模型的应用。采用基于pH、溶解氧(DO)、总溶解固形物(TDS)和化学需氧量(COD) 4个水质参数和2个输出的河流水质模糊模型对亚穆纳河水质进行了评价。
{"title":"Fuzzy Models for Water Quality Assessment","authors":"L. Arya, Gms Srivastava","doi":"10.1109/ICICT46931.2019.8977693","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977693","url":null,"abstract":"Water is the most abundant substance on the earth and is the principal constituent of all living things. At the present time rising populations and improving living standards are placing increasing pressers on available water resources. In past, fuzzy rationale based methodologies have shown to be fitting to address subjectivity and vulnerability in natural issues. In this examination, an approach dependent on Fuzzy System to survey the quality of water based on limited observations is proposed. A model for water quality with fuzzy reasoning has been developed for drinking and irrigational use. Application of proposed fuzzy model is demonstrated with a case study for Yamuna River, located in India. River water quality fuzzy model based on four water parameters pH, Dissolved Oxygen (DO), Total Dissolved Solids (TDS) & Chemical Oxygen Demand (COD) and two outputs was used to evaluate the Yamuna River quality.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126193480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Web based Accounting Integrated Management System (AIMS) over Cloud using Mean Stack 基于Web的会计综合管理系统(AIMS)
Akhil Kulshreshta, Neelam Rawat, Krati Saxena, Prashant Agrawal
This paper says how powerful a cloud based accounting management tool can be, which also provides platform independent services. This paper also observes the tools of MEAN stack (MongoDB, Express.js, Angular.js, Node.js) together with Material design. It also takes readers to the libraries like Bcryptjs, Body parser, Cors, JWT.
本文阐述了基于云的会计管理工具的强大之处,它还提供了与平台无关的服务。本文还观察了MEAN stack的工具(MongoDB, Express.js, Angular.js, Node.js)以及Material的设计。它还向读者介绍了Bcryptjs、Body解析器、Cors、JWT等库。
{"title":"Web based Accounting Integrated Management System (AIMS) over Cloud using Mean Stack","authors":"Akhil Kulshreshta, Neelam Rawat, Krati Saxena, Prashant Agrawal","doi":"10.1109/ICICT46931.2019.8977661","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977661","url":null,"abstract":"This paper says how powerful a cloud based accounting management tool can be, which also provides platform independent services. This paper also observes the tools of MEAN stack (MongoDB, Express.js, Angular.js, Node.js) together with Material design. It also takes readers to the libraries like Bcryptjs, Body parser, Cors, JWT.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A smart System for Fake News Detection Using Machine Learning 使用机器学习的假新闻检测智能系统
Anjali Jain, Avinash Shakya, Harsh Khatter, A. Gupta
Most of the smart phone users prefer to read the news via social media over internet. The news websites are publishing the news and provide the source of authentication. The question is how to authenticate the news and articles which are circulated among social media like WhatsApp groups, Facebook Pages, Twitter and other micro blogs & social networking sites. It is harmful for the society to believe on the rumors and pretend to be a news. The need of an hour is to stop the rumors especially in the developing countries like India, and focus on the correct, authenticated news articles. This paper demonstrates a model and the methodology for fake news detection. With the help of Machine learning and natural language processing, author tried to aggregate the news and later determine whether the news is real or fake using Support Vector Machine. The results of the proposed model is compared with existing models. The proposed model is working well and defining the correctness of results upto 93.6% of accuracy.
大多数智能手机用户更喜欢通过互联网上的社交媒体阅读新闻。新闻网站既发布新闻,又提供新闻的认证来源。问题是如何验证在社交媒体上传播的新闻和文章,如WhatsApp群,Facebook页面,Twitter和其他微博和社交网站。相信谣言,假装是新闻,对社会是有害的。需要一个小时的时间来停止谣言,特别是在印度这样的发展中国家,把注意力集中在正确的、经过认证的新闻文章上。本文展示了假新闻检测的模型和方法。在机器学习和自然语言处理的帮助下,作者尝试对新闻进行聚合,然后使用支持向量机来判断新闻的真假。将所提模型的计算结果与已有模型进行了比较。该模型运行良好,结果的正确率达到93.6%。
{"title":"A smart System for Fake News Detection Using Machine Learning","authors":"Anjali Jain, Avinash Shakya, Harsh Khatter, A. Gupta","doi":"10.1109/ICICT46931.2019.8977659","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977659","url":null,"abstract":"Most of the smart phone users prefer to read the news via social media over internet. The news websites are publishing the news and provide the source of authentication. The question is how to authenticate the news and articles which are circulated among social media like WhatsApp groups, Facebook Pages, Twitter and other micro blogs & social networking sites. It is harmful for the society to believe on the rumors and pretend to be a news. The need of an hour is to stop the rumors especially in the developing countries like India, and focus on the correct, authenticated news articles. This paper demonstrates a model and the methodology for fake news detection. With the help of Machine learning and natural language processing, author tried to aggregate the news and later determine whether the news is real or fake using Support Vector Machine. The results of the proposed model is compared with existing models. The proposed model is working well and defining the correctness of results upto 93.6% of accuracy.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 78
A Review on Image Classification Techniques to classify Neurological Disorders of brain MRI 脑MRI神经系统疾病图像分类技术综述
Vaishali Tyagi
Neurological disorders have more than 600 brain disease. Therefore it is very complicated task to detect and classify the brain MRI data. To classify the brain MR image by many classification techniques such as K-nearest neighbor (KNN), decision tree (DT), Support vector machine (SVM), neural network and convolutional neural network, we have study and compered K-nearest neighbor, support vector machine, decision tree, neural network and convolution neural network . In this review paper we explain which classification technique is better for detection of brain MRI data set. The detection for normal and abnormal brain MRI, the CNN improve the accuracy as compare to other classification.
神经系统疾病有600多种脑部疾病。因此,对脑MRI数据进行检测和分类是一项非常复杂的任务。为了利用k近邻(KNN)、决策树(DT)、支持向量机(SVM)、神经网络和卷积神经网络等多种分类技术对脑MR图像进行分类,对k近邻、支持向量机、决策树、神经网络和卷积神经网络进行了研究和比较。在这篇综述中,我们解释了哪种分类技术更适合于脑MRI数据集的检测。在对正常和异常脑MRI的检测上,CNN的准确率较其他分类方法有所提高。
{"title":"A Review on Image Classification Techniques to classify Neurological Disorders of brain MRI","authors":"Vaishali Tyagi","doi":"10.1109/ICICT46931.2019.8977658","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977658","url":null,"abstract":"Neurological disorders have more than 600 brain disease. Therefore it is very complicated task to detect and classify the brain MRI data. To classify the brain MR image by many classification techniques such as K-nearest neighbor (KNN), decision tree (DT), Support vector machine (SVM), neural network and convolutional neural network, we have study and compered K-nearest neighbor, support vector machine, decision tree, neural network and convolution neural network . In this review paper we explain which classification technique is better for detection of brain MRI data set. The detection for normal and abnormal brain MRI, the CNN improve the accuracy as compare to other classification.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122702024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Survey on Railway Assets: A Potential Domain for Big Data 铁路资产调查:大数据的潜在领域
Yogita Jain, Yogesh
The railway is an infrastructure insistent industry in which each railroad is operated and maintained on the basis of a significant quantity of data and information gathered from various sources. This paper examines the big data technologies to maintain and enhance the rail industry. Currently, a huge quantity of rail data is being collected at numerous sources in different countries. However, the available data is not effectively utilized with the traditionally existing techniques and technologies. Thus the significant information remains buried under a large number of gigabytes. The paper discusses, 5V’s concept of big data (velocity, volume, veracity, variety, and value) in the railroads monitoring system. Also addresses the different available monitoring systems for rail track defects, application of visual data analysis in railroads for passenger flow with a case study of Shanghai metro network, optimization in big data with a critical dissection of Metaheuristics method and how big technologies leads to big challenges in the real-time railway system.
铁路是一个坚持基础设施建设的行业,每条铁路的运营和维护都是基于从各种来源收集的大量数据和信息。本文探讨了维护和提升铁路行业的大数据技术。目前,正在从不同国家的众多来源收集大量铁路数据。然而,现有的传统技术和技术并没有有效地利用现有的数据。因此,重要的信息仍然隐藏在大量的千兆字节中。本文讨论了5V铁路监控系统中大数据(速度、容量、准确性、种类和价值)的概念。本文还讨论了不同的轨道缺陷监测系统、可视化数据分析在铁路客流中的应用(以上海地铁网络为例)、基于元启发式方法的大数据优化以及大技术如何在实时铁路系统中带来大挑战。
{"title":"A Survey on Railway Assets: A Potential Domain for Big Data","authors":"Yogita Jain, Yogesh","doi":"10.1109/ICICT46931.2019.8977714","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977714","url":null,"abstract":"The railway is an infrastructure insistent industry in which each railroad is operated and maintained on the basis of a significant quantity of data and information gathered from various sources. This paper examines the big data technologies to maintain and enhance the rail industry. Currently, a huge quantity of rail data is being collected at numerous sources in different countries. However, the available data is not effectively utilized with the traditionally existing techniques and technologies. Thus the significant information remains buried under a large number of gigabytes. The paper discusses, 5V’s concept of big data (velocity, volume, veracity, variety, and value) in the railroads monitoring system. Also addresses the different available monitoring systems for rail track defects, application of visual data analysis in railroads for passenger flow with a case study of Shanghai metro network, optimization in big data with a critical dissection of Metaheuristics method and how big technologies leads to big challenges in the real-time railway system.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"218 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127995968","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Comparative Study of Big Data Frameworks 大数据框架比较研究
H. K. Gupta, Dr. Rafat Parveen
We are really living in ever growing volume of data production. The huge amount of data in terabyte and petabytes are generating in real word and it is a challenging task to access, storage, analysis of all structured, unstructured and semi structured heterogeneous and complex data, also traditional tools is not suitable towards distributed and real-time processing. We need an efficient framework for processing such heterogeneous data and transform it into optimized meaningful information. There are many frameworks for distributed computing has been developed to perform huge amount of data processing. Hadoop Map Reduce is the extensively used framework because of its scalability, security, latency and efficiency, and reliability. The intension of this paper is to relative study of common framework such as Hadoop, Spark, Flink, Samza and Storm.
我们确实生活在不断增长的数据生产中。现实世界中产生的海量数据以tb和pb为单位,对所有结构化、非结构化和半结构化的异构和复杂数据进行访问、存储和分析是一项具有挑战性的任务,传统工具也不适合分布式和实时处理。我们需要一个有效的框架来处理这些异构数据,并将其转化为优化的有意义的信息。目前已经开发了许多用于分布式计算的框架来执行大量的数据处理。Hadoop Map Reduce是广泛使用的框架,因为它具有可扩展性、安全性、延迟、效率和可靠性。本文的重点是对Hadoop、Spark、Flink、Samza、Storm等常用框架进行比较研究。
{"title":"Comparative Study of Big Data Frameworks","authors":"H. K. Gupta, Dr. Rafat Parveen","doi":"10.1109/ICICT46931.2019.8977680","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977680","url":null,"abstract":"We are really living in ever growing volume of data production. The huge amount of data in terabyte and petabytes are generating in real word and it is a challenging task to access, storage, analysis of all structured, unstructured and semi structured heterogeneous and complex data, also traditional tools is not suitable towards distributed and real-time processing. We need an efficient framework for processing such heterogeneous data and transform it into optimized meaningful information. There are many frameworks for distributed computing has been developed to perform huge amount of data processing. Hadoop Map Reduce is the extensively used framework because of its scalability, security, latency and efficiency, and reliability. The intension of this paper is to relative study of common framework such as Hadoop, Spark, Flink, Samza and Storm.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126849250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Taxonomy & Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter 基于攻击向量、CVSS和复杂度参数的云计算漏洞分类与分析
N. Mishra, R. Singh
The world is witnessing an exceptional expansion in the cloud enabled services which is further growing day by day due to advancement & requirement of technology. However, the identification of vulnerabilities & its exploitation in the cloud computing will always be the major challenge and concern for any cloud computing system. To understand the challenges and its consequences and further provide mitigation techniques for the vulnerabilities, the identification of cloud specific vulnerabilities needs to be examined first and after identification of vulnerabilities a detailed taxonomy must be positioned. In this paper several cloud specific identified vulnerabilities have been studied which is listed by the NVD, ENISA CSA etc accordingly a unified taxonomy for security vulnerabilities has been prepared. In this paper we proposed a comprehensive taxonomy for cloud specific vulnerabilities on the basis of several parameters like attack vector, CVSS score, complexity etc which will be further act as input for the analysis and mitigation of cloud vulnerabilities. Scheming of Taxonomy of vulnerabilities is an effective way for cloud administrators, cloud mangers, cloud consumers and other stakeholders for identifying, understanding and addressing security risks.
世界正在见证云服务的非凡扩张,由于技术的进步和要求,云服务日益增长。然而,云计算中的漏洞识别及其利用一直是云计算系统面临的主要挑战和关注的问题。要了解这些挑战及其后果,并进一步为这些漏洞提供缓解技术,首先需要检查特定于云的漏洞的识别,在识别漏洞之后,必须确定详细的分类。本文研究了NVD、ENISA、CSA等列出的几种云特定识别漏洞,并据此编制了统一的安全漏洞分类。在本文中,我们提出了基于攻击向量、CVSS评分、复杂性等几个参数的云特定漏洞的综合分类,这些参数将进一步作为云漏洞分析和缓解的输入。漏洞分类法规划是云管理员、云管理人员、云消费者和其他利益相关者识别、理解和解决安全风险的有效方法。
{"title":"Taxonomy & Analysis of Cloud Computing Vulnerabilities through Attack Vector, CVSS and Complexity Parameter","authors":"N. Mishra, R. Singh","doi":"10.1109/ICICT46931.2019.8977667","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977667","url":null,"abstract":"The world is witnessing an exceptional expansion in the cloud enabled services which is further growing day by day due to advancement & requirement of technology. However, the identification of vulnerabilities & its exploitation in the cloud computing will always be the major challenge and concern for any cloud computing system. To understand the challenges and its consequences and further provide mitigation techniques for the vulnerabilities, the identification of cloud specific vulnerabilities needs to be examined first and after identification of vulnerabilities a detailed taxonomy must be positioned. In this paper several cloud specific identified vulnerabilities have been studied which is listed by the NVD, ENISA CSA etc accordingly a unified taxonomy for security vulnerabilities has been prepared. In this paper we proposed a comprehensive taxonomy for cloud specific vulnerabilities on the basis of several parameters like attack vector, CVSS score, complexity etc which will be further act as input for the analysis and mitigation of cloud vulnerabilities. Scheming of Taxonomy of vulnerabilities is an effective way for cloud administrators, cloud mangers, cloud consumers and other stakeholders for identifying, understanding and addressing security risks.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130594461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain 在私有区块链上存储和认证教育文档的去中心化方法
A. Shrivastava, Chetan Vashistth, Akash Rajak, A. Tripathi
A decentralized private Blockchain implementation for academic document storage and document verification can add self-sovereignty to the process. It can dramatically minimize the time and cost of verification at various layers of verification. Blockchain would remove all the layers at all and it will provide immediate auditing of any document. So, the request and response will be truly real time in our case.Apart from speeding up the verification process, it will also increase the security of personal education data and will check all kind of misuse also. Putting documents on Blockchain would increase the security, because all the data would only be accessible by private key and proper authentication to that private key.We are proposing a private Blockchain that would be managed by some private vendors and only those vendors will take part in consensus. So, we are using proof of stake consensus in our case. We are using private IPFS database server for storing our documents over Blockchain. We are considering Ethereum Blockchain ecosystem in our case. Alternatively we can also use Hyperledger Fabric for implementation but that discussion is out of the scope for current document.
用于学术文档存储和文档验证的去中心化私有区块链实现可以将自我主权添加到该过程中。它可以极大地减少在各个验证层进行验证的时间和成本。区块链将消除所有的层,它将提供对任何文档的即时审计。因此,在我们的示例中,请求和响应将是真正实时的。除了加快验证过程外,还将提高个人教育数据的安全性,并检查各种滥用行为。将文档放在区块链上可以提高安全性,因为所有数据只能通过私钥和对该私钥的适当认证来访问。我们正在提议一个私人区块链,由一些私人供应商管理,只有这些供应商才会参与共识。因此,在我们的案例中,我们使用了权益证明共识。我们使用私有IPFS数据库服务器在区块链上存储我们的文档。我们正在考虑以太坊区块链生态系统。或者,我们也可以使用Hyperledger Fabric来实现,但讨论超出了当前文档的范围。
{"title":"A Decentralized Way to Store and Authenticate Educational Documents on Private Blockchain","authors":"A. Shrivastava, Chetan Vashistth, Akash Rajak, A. Tripathi","doi":"10.1109/ICICT46931.2019.8977633","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977633","url":null,"abstract":"A decentralized private Blockchain implementation for academic document storage and document verification can add self-sovereignty to the process. It can dramatically minimize the time and cost of verification at various layers of verification. Blockchain would remove all the layers at all and it will provide immediate auditing of any document. So, the request and response will be truly real time in our case.Apart from speeding up the verification process, it will also increase the security of personal education data and will check all kind of misuse also. Putting documents on Blockchain would increase the security, because all the data would only be accessible by private key and proper authentication to that private key.We are proposing a private Blockchain that would be managed by some private vendors and only those vendors will take part in consensus. So, we are using proof of stake consensus in our case. We are using private IPFS database server for storing our documents over Blockchain. We are considering Ethereum Blockchain ecosystem in our case. Alternatively we can also use Hyperledger Fabric for implementation but that discussion is out of the scope for current document.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133289197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A Comparative Study of Fruit Defect Segmentation Techniques 水果缺陷分割技术的比较研究
Lalita Chaudhary, Yogesh Yogesh
This paper elaborates different methods of image segmentation proposed on various fruit images. There are many ways to segment the image modified for a special need. One method is not applicable to all images to get the desired output. In this paper, defective fruit images are taken for segmentation. By applying various segmentation algorithms, the best methods are observed by comparing the results. There are many ways to implement image segmentation. In this paper various methods like k-means, edge detection, watershed and thresholding is applied for fruit defect segmentation.
本文阐述了针对各种水果图像提出的不同的图像分割方法。有许多方法可以分割为特殊需要修改的图像。一种方法并不适用于所有图像以获得所需的输出。本文采用有缺陷的水果图像进行分割。通过对各种分割算法的比较,得出了最佳的分割方法。实现图像分割的方法有很多。本文采用k-means、边缘检测、分水岭和阈值分割等方法对水果缺陷进行分割。
{"title":"A Comparative Study of Fruit Defect Segmentation Techniques","authors":"Lalita Chaudhary, Yogesh Yogesh","doi":"10.1109/ICICT46931.2019.8977692","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977692","url":null,"abstract":"This paper elaborates different methods of image segmentation proposed on various fruit images. There are many ways to segment the image modified for a special need. One method is not applicable to all images to get the desired output. In this paper, defective fruit images are taken for segmentation. By applying various segmentation algorithms, the best methods are observed by comparing the results. There are many ways to implement image segmentation. In this paper various methods like k-means, edge detection, watershed and thresholding is applied for fruit defect segmentation.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"322 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134162332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Piggy ATM: A Meticulously crafted Interface to instil Money Management skill in Children 猪ATM:一个精心制作的界面灌输金钱管理技能的孩子
S. Arya, Shivani Deshmukh, Maithili Desai
This research paper is about the design of an interface of the ATM for the kids. Like adults, even kids face situations in which they need emergency money, especially when they are on field trips or picnics. To accomplish this, we carried out a thorough market research with parents as well as children to understand requirements of the ATM as per different age groups. We designed the interface customized for each age group and gender. Our aim is to help kids explore the use and importance of money. There are a variety of ways or games which allow children to role play with money; but there is nothing to let them explore money management and banking. By using an ATM for kids, children will be able to integrate these additional building blocks into their life at an early stage.
本研究论文是关于儿童ATM机的接口设计。像成年人一样,即使是孩子也会面临需要应急资金的情况,尤其是在实地考察或野餐的时候。为了做到这一点,我们对家长和孩子进行了彻底的市场调查,以了解不同年龄段的ATM需求。我们为每个年龄组和性别设计了定制的界面。我们的目标是帮助孩子们探索金钱的用途和重要性。有各种各样的方法或游戏可以让孩子们扮演与钱有关的角色;但没有什么可以让他们探索资金管理和银行业。通过为孩子们使用自动取款机,孩子们将能够在早期阶段将这些额外的积木融入他们的生活中。
{"title":"Piggy ATM: A Meticulously crafted Interface to instil Money Management skill in Children","authors":"S. Arya, Shivani Deshmukh, Maithili Desai","doi":"10.1109/ICICT46931.2019.8977682","DOIUrl":"https://doi.org/10.1109/ICICT46931.2019.8977682","url":null,"abstract":"This research paper is about the design of an interface of the ATM for the kids. Like adults, even kids face situations in which they need emergency money, especially when they are on field trips or picnics. To accomplish this, we carried out a thorough market research with parents as well as children to understand requirements of the ATM as per different age groups. We designed the interface customized for each age group and gender. Our aim is to help kids explore the use and importance of money. There are a variety of ways or games which allow children to role play with money; but there is nothing to let them explore money management and banking. By using an ATM for kids, children will be able to integrate these additional building blocks into their life at an early stage.","PeriodicalId":412668,"journal":{"name":"2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134302953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2019 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1